• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Information security
 

Information security

on

  • 241 views

 

Statistics

Views

Total Views
241
Views on SlideShare
241
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • http://www.microsoft.com/security/default.aspxhttps://www.microsoft.com/security/pc-security/password-checker.aspx
  • The rankings were created by SplashData who gathered the data from the millions of stolen passwords posted online by hackers in 2012 and ranked them in order of popularity http://gizmodo.com/5954372/the-25-most-popular-passwords-of-2012
  • PGP Whole Disk Encryption - http://www.symantec.com/whole-disk-encryptionMicrosoft BitLocker - http://windows.microsoft.com/en-US/windows7/products/features/bitlocker
  • http://www.microsoft.com/en-us/download/details.aspx?id=5201

Information security Information security Presentation Transcript

  • Information Security Alfred Thompson act2@acthompson.net http://www.acthompson.net http://blog.acthompson.net @AlfredTwo
  • IntroductionWriting computer Software since 1972Using the Internet since 198227 years working for major software companies Most recently 9 years at Microsoft9 years of teaching and writing textbooks Currently on the CS 2012 curriculum committeeFrequent speaker at educational technology events
  • AgendaBasic SecurityData SecurityInternet hazardsIndustry Responsibilities
  • Lock the DoorPasswords are your keys Make them solid Keep them safe Don’t use the same key for everythingEasy to remember – hard to guess
  • 25 Most Popular Passwords of 20121. password (Unchanged)2. 123456 (Unchanged) 14. sunshine (Up 1)3. 12345678 (Unchanged) 15. master (Down 1)4. abc123 (Up 1) 16. 123123 (Up 4)5. qwerty (Down 1) 17. welcome (New)6. monkey (Unchanged) 18. shadow (Up 1)7. letmein (Up 1) 19. ashley (Down 3)8. dragon (Up 2) 20. football (Up 5)9. 111111 (Up 3) 21. jesus (New)10. baseball (Up 1) 22. michael (Up 2)11. iloveyou (Up 2) 23. ninja (New)12. trustno1 (Down 3) 24. mustang (New)13. 1234567 (Down 6) 25. password1 (New)
  • Password ExtensionsBiometricsSecondary PasswordsPhysical devices• Smart Cards• Encryption Keys on flash sticks
  • Keeping Data Safe
  • Data EncryptionPGP Whole Disk Encryption Product of SymanticMicrosoft BitLocker (Whole Disk) Included in Windows 7 and 8Microsoft Office (Document encryption) Not the most secure in the worldPGP International Project Open Source http://www.pgpi.org/
  • Encrypted Communications https://silentcircle.com/
  • They Are Out To Get You Phishing E-mail sent by Spam online criminals Unwanted to trick you into e-mail, instant revealing personal messages, information and other onlineIdentity Theft communicationA crime where con Hoaxesartists get your personalinformation and access E-mail sent by onlineyour cash and/or credit criminals to trick you into giving them money
  • Be Careful Out There
  • Phishinghttp://www.wombatsecurity.com/antiphishingphil
  • Verify Storieshttp://snopes.com/http://urbanlegends.about.com/Stories should be sourced!If it’s too good to be true it probably is falseWhy yes it could hurt to pass it along
  • MalwareViruses/WormsSoftware programsdesigned to invade Trojansyour computer, and Viruses that pretend to becopy, damage, or helpful programs while Spywaredelete your data. destroying your Software that tracks data, damaging your your online activities or computer, and stealing displays endless ads. your personal information.
  • Avoiding MalwareKeep your operating system updatedInstall and keep updated an anti virus packageDon’t install things you are not sure ofPay attention to web browser warnings
  • Responsibility Goes Both Ways SSL for encrypted transactions Privacy Policies must be taken seriously Companies are responsible for protecting your data
  • Secure Socket Layer
  • Application Responsibility
  • Resourceshttp://www.microsoft.com/securityhttp://www.fbi.gov/about-us/investigate/cyber/cyberhttp://www.cnet.com/internet-security/