SlideShare a Scribd company logo
1 of 19
Information Security
          Alfred Thompson
       act2@acthompson.net
    http://www.acthompson.net
    http://blog.acthompson.net
            @AlfredTwo
Introduction

Writing computer Software since 1972
Using the Internet since 1982
27 years working for major software companies
  Most recently 9 years at Microsoft
9 years of teaching and writing textbooks
  Currently on the CS 2012 curriculum committee
Frequent speaker at educational technology events
Agenda


Basic Security
Data Security
Internet hazards
Industry Responsibilities
Lock the Door


Passwords are your keys
  Make them solid
  Keep them safe
  Don’t use the same key for everything
Easy to remember – hard to guess
25 Most Popular Passwords of 2012
1. password    (Unchanged)
2. 123456      (Unchanged)   14. sunshine (Up 1)
3. 12345678    (Unchanged)   15. master (Down 1)
4. abc123      (Up 1)        16. 123123   (Up 4)
5. qwerty      (Down 1)      17. welcome (New)
6. monkey      (Unchanged)   18. shadow (Up 1)
7. letmein     (Up 1)        19. ashley   (Down 3)
8. dragon      (Up 2)        20. football (Up 5)
9. 111111      (Up 3)        21. jesus    (New)
10. baseball   (Up 1)        22. michael (Up 2)
11. iloveyou   (Up 2)        23. ninja    (New)
12. trustno1   (Down 3)      24. mustang (New)
13. 1234567    (Down 6)      25. password1       (New)
Password Extensions
Biometrics
Secondary Passwords
Physical devices
• Smart Cards
• Encryption Keys on flash sticks
Keeping Data Safe
Data Encryption

PGP Whole Disk Encryption
  Product of Symantic
Microsoft BitLocker (Whole Disk)
  Included in Windows 7 and 8
Microsoft Office (Document encryption)
  Not the most secure in the world
PGP International Project
  Open Source
  http://www.pgpi.org/
Encrypted Communications




     https://silentcircle.com/
They Are Out To Get You


                            Phishing
                            E-mail sent by                         Spam
                            online criminals
                                                                   Unwanted
                            to trick you into
                                                                   e-mail, instant
                            revealing personal
                                                                   messages,
                            information
                                                                   and other online
Identity Theft                                                     communication
A crime where con                         Hoaxes
artists get your personal
information and access                    E-mail sent by online
your cash and/or credit                   criminals to trick you
                                          into giving them money
Be Careful Out There
Phishing




http://www.wombatsecurity.com/antiphishingphil
Verify Stories


http://snopes.com/
http://urbanlegends.about.com/

Stories should be sourced!
If it’s too good to be true it probably is false
Why yes it could hurt to pass it along
Malware



Viruses/Worms
Software programs
designed to invade   Trojans
your computer, and   Viruses that pretend to be
copy, damage, or     helpful programs while       Spyware
delete your data.    destroying your              Software that tracks
                     data, damaging your          your online activities or
                     computer, and stealing       displays endless ads.
                     your personal
                     information.
Avoiding Malware


Keep your operating system updated
Install and keep updated an anti virus package
Don’t install things you are not sure of
Pay attention to web browser warnings
Responsibility Goes Both Ways


 SSL for encrypted transactions
 Privacy Policies must be taken seriously
 Companies are responsible for protecting your data
Secure Socket Layer
Application Responsibility
Resources


http://www.microsoft.com/security
http://www.fbi.gov/about-us/investigate/cyber/cyber
http://www.cnet.com/internet-security/

More Related Content

What's hot

Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®Danny Fredericks
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger Abhishek Hirapara
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking pptKrishma Sandesra
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 
Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515lisawhipp
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 

What's hot (19)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Facebook
FacebookFacebook
Facebook
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity tips
Cybersecurity tipsCybersecurity tips
Cybersecurity tips
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
E.technology
E.technologyE.technology
E.technology
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515
 
C 7
C 7C 7
C 7
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Are Your Security Aware?
Are Your Security Aware?Are Your Security Aware?
Are Your Security Aware?
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 

Viewers also liked

아틀란티스 호텔 수족관2
아틀란티스 호텔 수족관2아틀란티스 호텔 수족관2
아틀란티스 호텔 수족관2Don Kang
 
Canvas july 21 2015 add students
Canvas july 21 2015 add studentsCanvas july 21 2015 add students
Canvas july 21 2015 add studentsPenny Christensen
 
Content Area Vocabulary Sms 3 20 06b
Content Area Vocabulary Sms 3 20 06bContent Area Vocabulary Sms 3 20 06b
Content Area Vocabulary Sms 3 20 06bPenny Christensen
 
Cała Praga Śpiewa czyli jak to zrobić śpiewająco
Cała Praga Śpiewa czyli jak to zrobić śpiewającoCała Praga Śpiewa czyli jak to zrobić śpiewająco
Cała Praga Śpiewa czyli jak to zrobić śpiewającoPragaNaWalizkach
 
Ziggy ansah1
Ziggy ansah1Ziggy ansah1
Ziggy ansah1turieva18
 
Asignacion maria 3
Asignacion maria 3Asignacion maria 3
Asignacion maria 3tate2096
 
Bitácora 14 de tecnología
Bitácora 14 de tecnologíaBitácora 14 de tecnología
Bitácora 14 de tecnologíaSteisy Contreras
 
Tecnologías aplicadas a la educación
Tecnologías aplicadas a la educaciónTecnologías aplicadas a la educación
Tecnologías aplicadas a la educaciónmelissa duran solares
 
Tu Presencia Será Importante Para Lograr El Objetivo De Esta Noche
Tu Presencia Será Importante Para Lograr El Objetivo De Esta NocheTu Presencia Será Importante Para Lograr El Objetivo De Esta Noche
Tu Presencia Será Importante Para Lograr El Objetivo De Esta Nochemiriam
 
Prepositions after verbs
Prepositions after verbsPrepositions after verbs
Prepositions after verbsJennifer Flores
 
Common mistakes with plurals
Common mistakes with pluralsCommon mistakes with plurals
Common mistakes with pluralsJennifer Flores
 
Thermal management for Printed Circuit Boards
Thermal management for Printed Circuit BoardsThermal management for Printed Circuit Boards
Thermal management for Printed Circuit BoardsR. J. McRep
 
How i am surviving being bought out by
How i am surviving being bought out byHow i am surviving being bought out by
How i am surviving being bought out byKathleen Weaver
 

Viewers also liked (19)

아틀란티스 호텔 수족관2
아틀란티스 호텔 수족관2아틀란티스 호텔 수족관2
아틀란티스 호텔 수족관2
 
Canvas july 21 2015 add students
Canvas july 21 2015 add studentsCanvas july 21 2015 add students
Canvas july 21 2015 add students
 
Content Area Vocabulary Sms 3 20 06b
Content Area Vocabulary Sms 3 20 06bContent Area Vocabulary Sms 3 20 06b
Content Area Vocabulary Sms 3 20 06b
 
Cała Praga Śpiewa czyli jak to zrobić śpiewająco
Cała Praga Śpiewa czyli jak to zrobić śpiewającoCała Praga Śpiewa czyli jak to zrobić śpiewająco
Cała Praga Śpiewa czyli jak to zrobić śpiewająco
 
Facility
FacilityFacility
Facility
 
Ziggy ansah1
Ziggy ansah1Ziggy ansah1
Ziggy ansah1
 
Asignacion maria 3
Asignacion maria 3Asignacion maria 3
Asignacion maria 3
 
Bitácora 14 de tecnología
Bitácora 14 de tecnologíaBitácora 14 de tecnología
Bitácora 14 de tecnología
 
Tecnologías aplicadas a la educación
Tecnologías aplicadas a la educaciónTecnologías aplicadas a la educación
Tecnologías aplicadas a la educación
 
Tu Presencia Será Importante Para Lograr El Objetivo De Esta Noche
Tu Presencia Será Importante Para Lograr El Objetivo De Esta NocheTu Presencia Será Importante Para Lograr El Objetivo De Esta Noche
Tu Presencia Será Importante Para Lograr El Objetivo De Esta Noche
 
MongoDB_Developer
MongoDB_DeveloperMongoDB_Developer
MongoDB_Developer
 
Prepositions after verbs
Prepositions after verbsPrepositions after verbs
Prepositions after verbs
 
Teatro con delitto
Teatro con delittoTeatro con delitto
Teatro con delitto
 
Common mistakes with plurals
Common mistakes with pluralsCommon mistakes with plurals
Common mistakes with plurals
 
Suffixes
SuffixesSuffixes
Suffixes
 
Prepositionn to
Prepositionn toPrepositionn to
Prepositionn to
 
Comparison of-adverbs
Comparison of-adverbsComparison of-adverbs
Comparison of-adverbs
 
Thermal management for Printed Circuit Boards
Thermal management for Printed Circuit BoardsThermal management for Printed Circuit Boards
Thermal management for Printed Circuit Boards
 
How i am surviving being bought out by
How i am surviving being bought out byHow i am surviving being bought out by
How i am surviving being bought out by
 

Similar to Information security

Similar to Information security (20)

Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
My presentation
My presentationMy presentation
My presentation
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybercrime and IT ACT
Cybercrime and IT ACTCybercrime and IT ACT
Cybercrime and IT ACT
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Recently uploaded

Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Information security

Editor's Notes

  1. http://www.microsoft.com/security/default.aspxhttps://www.microsoft.com/security/pc-security/password-checker.aspx
  2. The rankings were created by SplashData who gathered the data from the millions of stolen passwords posted online by hackers in 2012 and ranked them in order of popularity http://gizmodo.com/5954372/the-25-most-popular-passwords-of-2012
  3. PGP Whole Disk Encryption - http://www.symantec.com/whole-disk-encryptionMicrosoft BitLocker - http://windows.microsoft.com/en-US/windows7/products/features/bitlocker
  4. http://www.microsoft.com/en-us/download/details.aspx?id=5201