Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cybersecurity

657 views

Published on

Presented at the
LECET Information Technology Conference
Washington, DC
May 2, 2012
by Carrie S. Leary, Ann Arundel Community College

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Cybersecurity

  1. 1. CybersecurityLECET Information Technology Conference | May 2, 2012 Carrie Leary | Anne Arundel Community College
  2. 2. Background AACC CyberWatch OrganizationsCenter of Academic Advanced Technological Public & Private Sectors Excellence Education Center Curriculum AAS Degree in ResearchInformation Assurance & Cybersecurity K-12 Training Training Certificates Professional Development Network Security Server Administration CISCO Networking Collegiate Cybersecurity Awareness Forensic Defense Competitions
  3. 3. What is Cybersecurity? Defined as… Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack - Merriam-Webster The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this -Oxford Dictionaries
  4. 4. What are the needs?96,600 Network & Computer System Administrators 65,700 Information Security Analysts110,000 Computer Support Specialists 120,000 Computer Systems Analysts Bureau of Labor Statistics | Employment Change 2010 - 2020
  5. 5. The Problem Current IT WorkforceWorkforce Graduates Needs
  6. 6. Identifying the Workforce Information Technology (IT) jobs found in every industry and across numerous job functions Lack of job training and skills Pending baby boom retirements Lack of interest in STEM fields Lack career info
  7. 7. 1986 - 1996
  8. 8. 2000 - 2004
  9. 9. 2004 - 2008
  10. 10. 2009 - current
  11. 11. Why worry?Our Nation Organizations Individuals Loss of Intelligence  Loss of Data  Identity Theft Critical  Reduced  Financial Loss Infrastructure/ Productivity  Inconvenience Power Grid  Financial Loss  Loss of Trust by Customers  Bankruptcy
  12. 12. The Problem Current IT WorkforceWorkforce Graduates Needs
  13. 13. Avoid Weak Passwords
  14. 14. Accessing the Internet
  15. 15. Accessing the InternetChoose your browser carefully.Select Google Chrome, MozillaFirefox, of Safari if possible.Keep Web Browser up-to-date.Install patches as they are releasedUse secure websites.Look for “https” when transmittingconfidential information.Never click links.Always type the web addressdirectly into the address bar.
  16. 16. Accessing the InternetDo not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. shouldnot be used when transmitting confidentialinformation.Password protect your home WiFiPassword protecting decreased the number ofunauthorized users on your connection.Do not broadcast the SSID of your home WiFi.Hiding the name of your network decreases thenumber of unauthorized users on your connectionBe careful when selecting and answering PasswordRecovery Questions.Do not select questions that others know theanswer to or can utilize social engineering todetermine.
  17. 17. Accessing the InternetDo not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. shouldnot be used when transmitting confidentialinformation.Password protect your home WiFiPassword protecting decreased the number ofunauthorized users on your connection.Do not broadcast the SSID of your home WiFi.Hiding the name of your network decreases thenumber of unauthorized users on your connectionBe careful when selecting and answering PasswordRecovery Questions.Do not select questions that others know theanswer to or can utilize social engineering todetermine.
  18. 18. Accessing the InternetDo not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. shouldnot be used when transmitting confidentialinformation.Password protect your home WiFiPassword protecting decreased the number ofunauthorized users on your connection.Do not broadcast the SSID of your home WiFi.Hiding the name of your network decreases thenumber of unauthorized users on your connectionBe careful when selecting and answering PasswordRecovery Questions.Do not select questions that others know theanswer to or can utilize social engineering todetermine.
  19. 19. Accessing the InternetDo not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. shouldnot be used when transmitting confidentialinformation.Password protect your home WiFiPassword protecting decreased the number ofunauthorized users on your connection.Do not broadcast the SSID of your home WiFi.Hiding the name of your network decreases thenumber of unauthorized users on your connectionBe careful when selecting and answering PasswordRecovery Questions.Do not select questions that others know theanswer to or can utilize social engineering todetermine.
  20. 20. Evolving Infrastructure We continue to embrace new technology  Mobile Device  Virtualization  Cloud Computing Need a workforce versed in specific technical knowledgeAs the number of the need for data security to defend storage needs willconnected devices analytics will against robust threats increase, increases increase, and will be essential
  21. 21. Be Smart with your Smartphone Only connect to protected WiFi Be vigilant when clicking web links Use a complex password Keep firmware updated Only download apps from trusted sources Pay attention to the data the phone is accessing
  22. 22. Cloud Computing Built on TRUST!
  23. 23. Cloud Computing – Know what to askSystem Downtime Encryption of data Disaster Recovery Data Retention Policy (in transit and at rest) Plan Data Integrity Identity and Access Regulatory Location of Data Assurance Management Compliance Centers/ Physical Security
  24. 24. Moving Forward Awareness and Training are essential! Resources • Stay Safe Online http://www.staysafeonline.org/ • National Institute of Standards and Technology (NIST) www.nist.gov • National Initiative for Cybersecurity Education (NICE)http://csrc.nist.gov/nice/ • CyberWatch ATE Center www.cyberwatchcenter.org • Cyber Maryland http://www.cybermaryland.org/
  25. 25. Questions?Carrie Leary | csleary@aacc.edu | 410-777-7088
  26. 26. Resources Stay Safe Online http://www.staysafeonline.org/ National Institute of Standards and Technology (NIST) www.nist.gov National Initiative for Cybersecurity Education (NICE) http://csrc.nist.gov/nice/ CyberWatch www.cyberwatchcenter.org Cyber Maryland http://www.cybermaryland.org/
  27. 27. Resources http://www.intel.com/content/www/us/en/communications/inte rnet-minute-infographic.html http://www.confidenttechnologies.com/infographic http://www.makeuseof.com/tech-fun/the-only-thing-internet- explorer-is-good-for/

×