210 likes | 260 Views
Information Security -Network and Mobile Security. MS in Information Systems and Assurance. Information Assurance. Survey Highlights. 61% of you prefer using mobile device to surf the Internet. 46% of you spend 2 hours or less daily on mobile device.
E N D
InformationSecurity-NetworkandMobileSecurity MS in Information Systems and Assurance
Survey Highlights • 61% of you prefer using mobile device to surf the Internet. • 46% of you spend 2 hours or less daily on mobile device. • 42% of you indicate they have lost their mobile devices before. • 39% of you never change passwords and 6% change 3 times a year. • 64% of you have used unsecured network. • 27% of you will keep using even if the app would collect personal information
Historical hackers • Profile: • Male • Between 14 and 34 years of age • Computer addicted • No permanent girlfriend No Commercial Interest !!!
World’s Greatest Teenage Hackers • James Kosta: The 13-Year-Old Who Hacked Everything • Matthew Weigman: The 14-Year-Old Who Hacked SWAT • Jonathan James: The 15-Year-Old Who Hacked NASA • Richard Pryce: The 16-Year-Old Who Hacked the Pentagon
Tips for Safe Browsing Do use a secure network Do not enter usernames and password on sites that do not use HTTPS. Close your browser after leaving secure sites.
Technology Demo: WireShark Captures packets in real time and display them in human-readable format Includes filters, color-coding and other features that let you dig deep into network traffic and inspect individual packets.
Smartphone Risks • Increase mobility → Increased exposure • Easily lost or stolen • device, content, identity • Susceptible to threats and attacks • App-based, Web-based, SMS/Text message-based
What if you were Donald Trumps’ secretary…? On March 17, 2017, a laptop containing Trump Tower floor plans and information on the Clinton investigation was stolen from the car of a Secret Service agent. What would you do? Get everything back in 24 hours, If not, you’re fired !!!
Quick Response Codes OR Code – Wait Before You Scan! • Speaking of mobile devices and the web, a relatively new development is the “Quick Response” or “QR” code, the little square dot-like bar codes that are meant to be photographed by mobile devices as a convenient way of taking your mobile device to a particular location online (or giving folks a phone number, text, etc.) • Quick, what do those barcodes say, eh?
Mobile APPS- Security Risk Concerns • McDonald's App Leaks Details of 2.2 Million Customers: A vulnerable application used by millions of McDonald’s customers in India was recently found to leak personal information on its users. • Google removed 132 Android apps from its store after researchers found that their HTML code contained hidden, malicious iframes.
Social Problems • There aren’t always solutions to all of these problems • Humans will continue to be tricked into giving out information they shouldn’t • So, the best that can be done is to implement a wide variety of solutions and more closely monitor who has access to what network resources and information.
Best Security Practices • Password protect Passcode protect Pass swipe protect?
Best Security Practices cont. • Install Security Software • Anti-virus and anti-malware available for mobile devices • Keep your apps up-to-date • Install a phone finder app • Enroll in a backup program • Set device to wipe contents after specified number of failed login attempts
Best Security Practices cont. • When installing apps • Take time to read the small print • What information does the app require access to? • Where are you downloading the app from? • Is it the app store location set by default on the phone?
Best Security Practices cont. • Know where your device is at all times • Be mindful of how you use your device • Follow same guidelines as you do for your computer • Double check URLs for accuracy • Don’t open suspicious links • Make sure the Website is secure before giving any personal data
Lost or Stolen? • Treat as if your purse or wallet • File a report with law enforcement • Contact your service vendor to cancel your service and report your device missing • If you have a backup/wipe program, contact your vendor to have them wipe the device
Key Points • Password/Passcode protect your device • Lock your device • Use anti-virus software • Sync/back up your data • Install a phone finder app