Information security


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • The rankings were created by SplashData who gathered the data from the millions of stolen passwords posted online by hackers in 2012 and ranked them in order of popularity
  • PGP Whole Disk Encryption - BitLocker -
  • Information security

    1. 1. Information Security Alfred Thompson @AlfredTwo
    2. 2. IntroductionWriting computer Software since 1972Using the Internet since 198227 years working for major software companies Most recently 9 years at Microsoft9 years of teaching and writing textbooks Currently on the CS 2012 curriculum committeeFrequent speaker at educational technology events
    3. 3. AgendaBasic SecurityData SecurityInternet hazardsIndustry Responsibilities
    4. 4. Lock the DoorPasswords are your keys Make them solid Keep them safe Don’t use the same key for everythingEasy to remember – hard to guess
    5. 5. 25 Most Popular Passwords of 20121. password (Unchanged)2. 123456 (Unchanged) 14. sunshine (Up 1)3. 12345678 (Unchanged) 15. master (Down 1)4. abc123 (Up 1) 16. 123123 (Up 4)5. qwerty (Down 1) 17. welcome (New)6. monkey (Unchanged) 18. shadow (Up 1)7. letmein (Up 1) 19. ashley (Down 3)8. dragon (Up 2) 20. football (Up 5)9. 111111 (Up 3) 21. jesus (New)10. baseball (Up 1) 22. michael (Up 2)11. iloveyou (Up 2) 23. ninja (New)12. trustno1 (Down 3) 24. mustang (New)13. 1234567 (Down 6) 25. password1 (New)
    6. 6. Password ExtensionsBiometricsSecondary PasswordsPhysical devices• Smart Cards• Encryption Keys on flash sticks
    7. 7. Keeping Data Safe
    8. 8. Data EncryptionPGP Whole Disk Encryption Product of SymanticMicrosoft BitLocker (Whole Disk) Included in Windows 7 and 8Microsoft Office (Document encryption) Not the most secure in the worldPGP International Project Open Source
    9. 9. Encrypted Communications
    10. 10. They Are Out To Get You Phishing E-mail sent by Spam online criminals Unwanted to trick you into e-mail, instant revealing personal messages, information and other onlineIdentity Theft communicationA crime where con Hoaxesartists get your personalinformation and access E-mail sent by onlineyour cash and/or credit criminals to trick you into giving them money
    11. 11. Be Careful Out There
    12. 12. Phishing
    13. 13. Verify Stories should be sourced!If it’s too good to be true it probably is falseWhy yes it could hurt to pass it along
    14. 14. MalwareViruses/WormsSoftware programsdesigned to invade Trojansyour computer, and Viruses that pretend to becopy, damage, or helpful programs while Spywaredelete your data. destroying your Software that tracks data, damaging your your online activities or computer, and stealing displays endless ads. your personal information.
    15. 15. Avoiding MalwareKeep your operating system updatedInstall and keep updated an anti virus packageDon’t install things you are not sure ofPay attention to web browser warnings
    16. 16. Responsibility Goes Both Ways SSL for encrypted transactions Privacy Policies must be taken seriously Companies are responsible for protecting your data
    17. 17. Secure Socket Layer
    18. 18. Application Responsibility
    19. 19. Resources