The document discusses basic information security topics such as using strong passwords, encrypting data, avoiding phishing scams and malware, and the responsibilities of both individuals and companies to maintain security. It also provides examples of popular passwords, encryption tools, and resources for verifying security threats and learning more about how to stay safe online.
1. Information Security
Alfred Thompson
act2@acthompson.net
http://www.acthompson.net
http://blog.acthompson.net
@AlfredTwo
2. Introduction
Writing computer Software since 1972
Using the Internet since 1982
27 years working for major software companies
Most recently 9 years at Microsoft
9 years of teaching and writing textbooks
Currently on the CS 2012 curriculum committee
Frequent speaker at educational technology events
8. Data Encryption
PGP Whole Disk Encryption
Product of Symantic
Microsoft BitLocker (Whole Disk)
Included in Windows 7 and 8
Microsoft Office (Document encryption)
Not the most secure in the world
PGP International Project
Open Source
http://www.pgpi.org/
10. They Are Out To Get You
Phishing
E-mail sent by Spam
online criminals
Unwanted
to trick you into
e-mail, instant
revealing personal
messages,
information
and other online
Identity Theft communication
A crime where con Hoaxes
artists get your personal
information and access E-mail sent by online
your cash and/or credit criminals to trick you
into giving them money
14. Malware
Viruses/Worms
Software programs
designed to invade Trojans
your computer, and Viruses that pretend to be
copy, damage, or helpful programs while Spyware
delete your data. destroying your Software that tracks
data, damaging your your online activities or
computer, and stealing displays endless ads.
your personal
information.
15. Avoiding Malware
Keep your operating system updated
Install and keep updated an anti virus package
Don’t install things you are not sure of
Pay attention to web browser warnings
16. Responsibility Goes Both Ways
SSL for encrypted transactions
Privacy Policies must be taken seriously
Companies are responsible for protecting your data
The rankings were created by SplashData who gathered the data from the millions of stolen passwords posted online by hackers in 2012 and ranked them in order of popularity http://gizmodo.com/5954372/the-25-most-popular-passwords-of-2012
PGP Whole Disk Encryption - http://www.symantec.com/whole-disk-encryptionMicrosoft BitLocker - http://windows.microsoft.com/en-US/windows7/products/features/bitlocker