160 likes | 243 Views
Cyber Security Awareness. Kelley Goldblatt Michigan State Police Michigan Cyber Command Center (MC3). Cyber’s Impact. Cyber touches everything Critical Infrastructure Power, water, gas, banking, transportation Military and industry Personal lives School, work, and home
E N D
Cyber Security Awareness Kelley Goldblatt Michigan State Police Michigan Cyber Command Center (MC3)
Cyber’s Impact Cyber touches everything • Critical Infrastructure • Power, water, gas, banking, transportation • Military and industry • Personal lives • School, work, and home Reliance on cyber has helped create vulnerabilities
Criminal Cyber Investigation Computer and Network Forensics Cyber Intelligence – Gathering & Sharing Cyber Assessment Services Dark Web Analysis Services Michigan Cyber Command Center (MC3)
Threat Components Destruction: Physical destruction of information or communications systems rendering them unusable Corruption: The changing of information such that it is no longer accurate or useful Removal: The removing of information so that it cannot be accessed, but is not destroyed Disclosure: Unauthorized release of confidential or sensitive information to the detriment of owner and said data Interruption: Interfering with communications such that legitimate users cannot send or receive messages
Examples • Destruction • Brick the machine • Part failure • Corruption • Personal information • Erode trust • Removal • Espionage • Credit card data
Examples Cont. • Disclosure • Personal data • Organization’s secrets • Interruption • Keep you from accessing what you need • Keep others from accessing you
Do…. • When making purchases online, use HTTPS whenever possible • Keep your passwords private and use a separate password for each account • Utilize anti-virus, anti-malware, and other security software • Keep all of your software patched and updated • Limit your use of public wi-fi networks
Do…. • Safely dispose of personal information • Permanently deleting personal information from electronic devices such as phones and computers before getting rid of them • Monitor your credit score • Check one credit bureaus every four months • Utilize features such as credit freezes when possible • Monitor your financial accounts frequently
Don’t…. • Overshare on social networking sites • Make purchases when on public Wi-Fi • Click on links or attachment found in unsolicited emails • Give out personal information over the phone, internet, or mail unless you have initiated the contact
Contact:Kelley Goldblatt Michigan state police Michigan cyber command center (MC3)MC3@Michigan.gov877-MI-CYBER