Information Security Alfred Thompson firstname.lastname@example.org http://www.acthompson.net http://blog.acthompson.net @AlfredTwo
IntroductionWriting computer Software since 1972Using the Internet since 198227 years working for major software companies Most recently 9 years at Microsoft9 years of teaching and writing textbooks Currently on the CS 2012 curriculum committeeFrequent speaker at educational technology events
Data EncryptionPGP Whole Disk Encryption Product of SymanticMicrosoft BitLocker (Whole Disk) Included in Windows 7 and 8Microsoft Office (Document encryption) Not the most secure in the worldPGP International Project Open Source http://www.pgpi.org/
They Are Out To Get You Phishing E-mail sent by Spam online criminals Unwanted to trick you into e-mail, instant revealing personal messages, information and other onlineIdentity Theft communicationA crime where con Hoaxesartists get your personalinformation and access E-mail sent by onlineyour cash and/or credit criminals to trick you into giving them money
Verify Storieshttp://snopes.com/http://urbanlegends.about.com/Stories should be sourced!If it’s too good to be true it probably is falseWhy yes it could hurt to pass it along
MalwareViruses/WormsSoftware programsdesigned to invade Trojansyour computer, and Viruses that pretend to becopy, damage, or helpful programs while Spywaredelete your data. destroying your Software that tracks data, damaging your your online activities or computer, and stealing displays endless ads. your personal information.
Avoiding MalwareKeep your operating system updatedInstall and keep updated an anti virus packageDon’t install things you are not sure ofPay attention to web browser warnings
Responsibility Goes Both Ways SSL for encrypted transactions Privacy Policies must be taken seriously Companies are responsible for protecting your data