Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in...

41
Protecting Yourself from Virtual Threats

Transcript of Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in...

Page 1: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Protecting Yourself from Virtual Threats

Page 2: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Who We Are

• 2008 LLHS Graduates

– BBA with a focus in Operations/Marketing– MBA in Marketing and MIS

– BBA with a focus in Accounting– MAACT with a focus in Information Assurance

Page 3: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Internet Safety

Page 4: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Student Internet Usage

16%

20%

18%

1%

26%

19%

Internet Activities

Games

Email/IM

Shopping

Blogs

Social NetworkingOther

Page 5: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Internet Safety

Page 6: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Protect Yourself from Online Predators

• 1 in 5 teenagers ages 10 to 17 have received unwanted sexual solicitation online

• Predators utilize the Internet to target teenagers

• By posting personal information about yourself, you are providing them with what they need to start a conversation.

Page 7: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Protecting Your Identity from Predators

• It is important to protect your personal identity by not posting or listing any information that an individual can use to locate you or gather too much information on you.

• This includes:– Posting Pictures (partying pictures, provocative pictures, etc.)– Listing personal information (phone number, address, interests, etc.)– Listing information about your whereabouts (checking in on

Facebook, allowing location services on your smart phone, etc.)

Page 8: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Protecting Yourself from Identity Theft

• Since 2004, individuals ages 14 to 29 have the rate of identity theft.

• This is due to the credit reports of teens and young adults being clean and therefore the fraud takes longer to identify.

• How to Protect Yourself:– Use anti-virus software– Use strong passwords– Be cautious when

using cloud computing– Be aware of the

security of your WIFI– Do not share too much

information online

Page 9: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Your Online Reputation

• Have you ever Googled yourself?– Look at the information that comes up and

determine if you would want other individuals to see it.

• Everything that you put online is traceable by universities and potential employers. – This can have an impact on your future and

reputation.

Page 10: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

How to Avoid Damaging Your Reputation

• With employers, universities, and scholarships checking your online print, it is important to make sure it is clean.

• You can do this by:– Not posting provocative pictures– Not posting pictures of you taking part in illegal

activity (drugs, underage drinking, etc.)– Thinking twice about the comments and statuses

that you post about others– Always consider the consequences of what you

post!

Page 11: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Not Everything Online is True

• It may be difficult to distinguish who is a predator online.

• In chat rooms or social networking sites, a predator may appear to be a 16 year old female but is actually a 50 year old male.

• Predators use fake information, pictures, and interests to gain your trust and then make contact with you.

Page 12: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

NOTECARD ACTIVITY

Notecard Activity

Page 13: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

NOTECARD ACTIVITY

Facebook Experiment

Page 14: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Facebook Experiment

Page 15: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Outcome of FB Experiment

Results of Friend Requests How we created the account

• Created the Profile on October 29th

• Added a fake picture and cover photo

• Included education info, contact info, etc.

• ‘Liked’ things that fit the targeted age group

• Sent friend requests to 40 LLHS students/alum

Out of the 40 requests we sent only ONE student asked if we knew each other

Page 16: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Cyber Bullying

Page 17: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Harm on the Internet

• Cyber Bullying– “When a child or teenager is harassed,

humiliated, embarrassed, threatened or tormented using digital technology.”

– Cyber bulling can only happen between minors.

• Cyber Harassment – “When an adult harasses children, teenagers,

or other adults.”

Page 18: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Statistics on Cyber-Bullying

• Around half of teens have been the victims of cyber bullying

• Fewer than 1 in 5 cyber bullying incidents are reported to law enforcement

• Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet.

• Girls are somewhat more likely than boys to be involved in cyber bullying

Page 19: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Cyber Bullying

• Sexting: “sending nude pictures via text message.”– 20% of teenagers admit to engaging in sexting

• Messages can be forwarded to unintended recipients

• Could be embarrassing if pictures were seen by unintended parties

Page 20: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Jessica Logan

Page 21: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Survey ResultsHave you, or someone you’ve known,

been the victim of cyber-bullying?

Yes35%

No65%

Page 22: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

How To Protect Yourself

• Don’t share personal information or photos– Even if it seems like a good idea at the time!

• Make a copy of the message, photo or video– Screen shots

• File a report with local police department• Don’t give the bully any reaction

Page 23: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Password Safety

Page 24: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Survey Results

Yes48%

No52%

Different Passwords for Different Accounts?

Page 25: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Passwords

• “First line of defense against cyber-criminals”

• Phishing– “Phishing is a technique of fraudulently

obtaining private information.”• Sending E-mails• Making Phone calls• Creating links to false websites

Page 26: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Passwords

Page 27: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Passwords

Page 28: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

How to Detect a Phishing Site

• Fake websites whose look and feel are almost identical to the legitimate site– Generic greetings– Threats to your account and requests for

immediate action– Requests for personal information– Suspicious links– Misspellings and poor grammar

Page 29: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Passwords

• Social Engineering Attack– “The art of manipulating people into performing

actions to gain confidential information.”

Page 30: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Passwords

• Social Engineering– Hackers may probe for information that can

lead to your security being compromised• Be careful what information you give out to whom

– Mother’s maiden name?– Where you were born?– What was your favorite pet’s name?

– Retrieving information from social networking profiles

Page 31: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Survey ResultsDo friends and family know your passwords?

Yes68%

No29%

Not Sure3%

Page 32: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Passwords

• Best Practices– Use unique passwords for each account

• Use an app to store passwords– Use long passwords– Use numbers, letters (upper /lower case) and

symbols– Updated password recovery settings

• Brute Force Attack– Program that guesses passwords by trial-and-error– Weak Password: hours – Strong Password: several years

Page 33: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Brute Force Attack

• Most commonly used password: “password”– How long would it take to crack this password

that only uses lower case letters?• Approximately 5.5 hours http://www.lockdown.co.uk/?pg=combi

• A better alternative: “P@ssw0rd”– How long would it take to crack this password

that uses lower and upper case letters, numbers, and special symbols?• Approximately 23 years http://www.lockdown.co.uk/?pg=combi

Page 34: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Worst Passwords of 2012

Page 35: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

IT Careers

Page 36: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Students Interested in IT Career

Page 37: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Top 10 Best Jobs of 20121) Nurse

2) Software Developer

3) Pharmacist

4) Medical Assistant

5) Database Administrator

6) Web Developer

7) Computer Systems Analyst

8) Physical Therapist

9) Computer Programmer

10) Occupational Therapist

Page 38: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

IT Careers

• Salary: $54,360-$87,790• Write code and develop software applications

Software Developer

• Salary: $41,570-$115,660• Build, organize, and maintain the data of a company

Database Administrator

• Salary: $43,190-$119,940• Design, create, and maintain websitesWeb Developer

• Salary: $48,360-$119,070• Determine technological needs of clients and make

recommendations on system needs

Computer Systems Analyst

• Salary: $40,820-$114,180• Write code to create computer programs

Computer Programmer

Page 39: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

IT Degrees

• BSCS/ MSCS:– Computer Science

• Required Math: Calculus l & ll, Linear Algebra, and Statistics

• 51 hours in computer logic, programming, and other computer topics

• BBA/ MBA:– Management Information Systems

• Required Math: Calculus l, Statistics• 15 hours of MIS courses

Page 40: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Employers

• Local:

http://www.cis.cornell.edu/ics/images/instt-snl.jpg; http://siliconangle.com/files/2011/05/intel-logo.jpg; http://upload.wikimedia.org/wikipedia/commons/thumb/7/70/US-FBI-ShadedSeal.svg/136px-US-FBI-ShadedSeal.svg.png; http://images.fanpop.com/images/image_uploads/Apple-Logo-apple-41156_1024_768.jpg; http://a.abcnews.com/images/Technology/ht_microsoft_cc_120823_wg.jpg; http://face.com/blog/wp-content/uploads/2012/06/503165914_f8a5d293bc_o1.jpg; http://s1.cdn.memeburn.com/wp-content/uploads/google_logo.jpg

• Corporate:

Page 41: Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Questions?