240 likes | 256 Views
Understand the importance of information systems security and techniques to safeguard your data, including password best practices, Wi-Fi security risks, physical security measures, social engineering awareness, and access controls. This informative guide offers valuable insights to keep your personal and business data secure.
E N D
What is Information Systems Security? • Protecting your data – usually referring to your online or electronic data.
How do we protect our data? • Passwords • Traditional Passwords – a string of characters that allows access to a system • PIN – personal number used to gain access to a system. Usually 4-8 digits • Fingerprints – cannot be forgotten, forged, or guessed. • Facial Recognition – cannot be forgotten but can be forged. Machines that aren’t as sophisticated can be tricked by photos of you.
Good vs.Bad Passwords • https://www.youtube.com/watch?v=opRMrEfAIiI (2 min. 40 sec) Do you think the passwords in the video were good? Why or why not?
What makes a password good? • Using symbols • Having long passwords (at least 12 characters but longer is better) • Not using personal information (like birthday or pet names) • Using a combination of numbers and letters * Handout
Password Game • Split up into 4-5 groups. • Come up with a password that you think will be strong but realistic. (i.e. make sure somebody would be able to use it and remember it in real life). • Present your password to the class. • Check to see which group created the strongest password! • http://password-checker.online-domain-tools.com/
Public Wifi Scares • Fake Wifi (“Flyingstar2”) • Password Free Networks (unencrypted data)
Demo - Wireshark • Wireshark is an open source packet analyzer (packet sniffer) that can intercept information that is going across a network and keep track of it. • https://www.youtube.com/watch?v=_WQe36pZ3mA(start at 1 min 10 sec)
Physical Security • Protecting your data – usually referring to your online or electronic data, but physical security is an important part too! • How can we protect our physical spaces? • Locks • Secure spaces/vaults • Badges
What would you do? • If you were working on a film what would you want to keep physically safe? • How could you keep those things safe?
Social Engineering • Tricking people into giving you personal or confidential information • https://www.youtube.com/watch?v=zUWlnHPzJcA&t=16s (stop at 1 min)
Social Engineering • People use social engineering to: • Try to figure out passwords • Get bank information • Learn company or government secrets • Ex. Kane Gable and CIA John Brennan in 2017
Access Controls • Access control is a security technique that regulates who or what can view or use resources in a computing environment. Can be physical or logical. • Why do you think having access controls is important? • Note that this protects data not only from attackers, but also from employees who may make mistakes.
Summary • Protecting personal and proprietary information is important! • Passwords should be strong and unique. • Be careful when using public wifi. • Keep physical areas and information secure. • Make use of access controls when necessary.
Thank you! • Questions?
Sources • https://www.makeuseof.com/tag/lock-methods-android-phone/ • https://www.bayometric.com/eliminate-password-fingerprint-password-manager/ • https://searchsecurity.techtarget.com/definition/password • https://www.computerhope.com/jargon/p/pin.htm • https://www.technologyreview.com/s/542576/youve-been-misled-about-what-makes-a-good-password/ • https://www.usatoday.com/story/tech/2013/07/01/free-wi-fi-risks/2480167/ • https://blog.lookout.com/spoofed-wifi-60-minutes • https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering • https://www.telegraph.co.uk/news/2018/01/19/british-15-year-old-gained-access-intelligence-operations-afghanistan/ • https://www.helpnetsecurity.com/2018/01/22/hack-social-engineering/ • https://theblast.com/rupauls-drag-race-leaked-episodes-lawsuit/ • https://searchsecurity.techtarget.com/definition/access-control • http://mentalfloss.com/uk/entertainment/27204/how-one-line-of-text-nearly-killed-toy-story-2