Technology Awareness & Information Security Survey Results 50%

Technology Awareness & Information Security Survey Results  50%

Technology Awareness & Information Security Survey Results 50% class has smart phones 64% class has shared personal info over the internet 71% class has personal info posted on FB 57% class uses check-in feature on FB Survey Results 25% class does not use privacy settings on FB 61% class add friends to social networks

that they have only met once or twice 8% class shares their passwords with others Survey Results Do you ever look at or do things on the internet that you wouldnt want your parents(s)/guardian(s), or friends to know about? 14% class responded Yes 75% class responded No 11% class responded Not sure What About Your Privacy?

Passwords Privacy Settings Location Settings Scams Social Engineering Schools/Employers

MIS, IA, Computer Science How Do You Use IT? Calls Text Music

Email Internet Apps GPS Connect Share Organize Events Learn

Brute Force Attacks Celebrity social media accounts, hacked! Often victims of brute force attacks Ex. 2009 President Obama Twitter account Exploits often reveal weaknesses, in this case there were no limits on login attempts so the attacker was able to repeatedly try to gain unauthorized access Passwords Video http:// 56 Passwords Password Competition Passwords Continued Password Length Maximum Number of Operations (guesses)

Maximum Time to Crack 8 208,827,064,576 7 seconds 9 5,429,503,678,976 3 minutes

10 141,167,095,653,376 1.3 hours 11 3,670,344,486,987,780 34 hours 12

95,428,956,661,682,200 36.8 days 13 2,481,152,873,203,740,000 2.6 years 14 64,509,974,703,297,200,000

68.2 years 15 1,677,259,342,285,730,000,000 1,772.9 years 16 43,608,742,899,428,900,000,000 46,094.1 years

Password Length Maximum Number of Operation (guesses) Maximum Time to Crack 8 2,044,140,858,654,980

18.9 hours 9 167,619,550,409,708,000 64.7 days 10 13,744,803,133,596,100,000 14.5 years

11 1,127,073,856,954,880,000,000 1,191.3 years 12 92,420,056,270,299,900,000,000 97,687.4 years 13

7,578,444,614,164,590,000,000,000 8,010,363.4 years 14 621,432,458,361,496,000,000,000,000 656,849,799.6 years 15 50,957,461,585,642,700,000,000,000,000

16 4,178,511,850,022,700,000,000,000,000,000 53,861,683,563.4 years 4,416,658,052,197.2 years Protect Your Password Never share your password Password length is better than complexity Use a mixture of upper case, lower case, numbers, and symbols Change it periodically

Social Media South Park video south_park_facebook_friends_episode/ Social Media Employers want to know if you are active How do you present yourself? Just write down your username and password and well get back to you! For certain positions that require security clearances such as DoE, DoD,

Law Enforcement, must forfeit account information and passwords from all sites/blogs you participate in. Privacy FB Privacy Settings http:// I Privacy

Keep it personal Think before you link Where were you last night? Sign Out! Facebook/Twitter privacy settings Location settings from picture/checking in Not a good idea to show your location or tell FB that you and your family will be gone on vacation.

Privacy Privacy video http:// wY Current Event General Petraeus Emails

Create Separate Emails Too Good To Be True Curious? Antivirus Software Dumpster Diving Spokeo Spokeo Video http:// A

Threats Scams Social Engineering Shoulder Surfing Online Tattoo Online Tattoo http:// Related Degrees BS in Computer Science BBA in MIS MBA in MIS, IA or MOT

CIARE and NMRCFL Partnership with the FBI and its Regional Computer Forensics Lab (RCFL), housed at UNM, through training, and student internships and Co-Ops. NSA National Security Agency (NSA) and the Department of Homeland Security (DHS) designated a center of academic excellence in IA (CAEIA) at UNM. Recruit from UNM Offensive and defensive positions in cyber

security. AC/DC Virus Handouts Closing Final Video http:// &feature=endscreen Sources UNM Info: Password Info: Whitman, Michael E., and Herbert J. Mattord. Principles

of information security. 4th ed. Boston, MA: Course Technology, 2012. Print. Online Tattoo Video: http:// Spokeo Video: Sources SouthPark Video: cebook_friends_episode/ Handouts:http :// sheets.pdf

President Obama Video: http:// creen Sources Wikipedia: General Petraeus News Article: Twitter exploits 588628 /

Recently Viewed Presentations

  • Atypical and Infrequent Sellar and Suprasellar Lesions: What

    Atypical and Infrequent Sellar and Suprasellar Lesions: What

    Liliequist membrane is an arachnoid membrane from the dorsum sellae to the anterior edge of the mamillary body. It has a vertical mesencephalic segment as well. This membrane has neurosurgical importance especially in endoscopic and microinvasive surgery. Imaging. This membrane...
  • Diapositive 1 - Infectiologie

    Diapositive 1 - Infectiologie

    Josiane Warszawski,Véronique Goulet Dépistage de l'infection à Chlamydia trachomatis dans un Centre de planification familiale et d'orthogénie, Bordeaux, France, 2005 Bertille de Barbeyrac 1, Karine Tilatti2, Sophie Raherison1, Claudine Mathieu2, Sandrine Frantz-Blancpain2, Maïthé Clerc1, Véronique Goulet3, Christiane Bébéar1 ...
  • The Old Southwest - Alabama Department of Archives and History

    The Old Southwest - Alabama Department of Archives and History

    The Old Southwest Frontier Alabama After the American Revolution, many immigrants came to the United States seeking a better life. At this same time, many pioneer settlers began to move west from Virginia, North Carolina, South Carolina and Georgia.
  • mining an unexpected source of innovation: lessons from

    mining an unexpected source of innovation: lessons from

    Where the brand name isn't what's important—it's the functionality and features of the device itself. And I'll talk more about this in a bit. * Shanzhai manufacturing has also come to include the idea of indigenous innovation. So this is...


    Poor Housekeeping: When clients, managers or safety professionals walk through your work site, housekeeping is an accurate indicator of everyone's attitude about quality, production and safety. Poor housekeeping creates hazards of all types. A well maintained area sets a standard...
  • The Effects of Soil Compaction on Radish Growth

    The Effects of Soil Compaction on Radish Growth

    The Effects of Soil Compaction on Radish Growth I.E., T.G., D.H., M.M., and Janice Wing Project from STEM Earth Central Plant Growth Basics Required conditions Water Nutrients Soil medium Sunlight Temperature Role of pore space in soil Compaction Modeling human...
  • ITE PC v4.0 Chapter 1

    ITE PC v4.0 Chapter 1

    The password used in the Packet Tracer activities in this chapter is: PT_ccna5. Chapter 8: Assessment. Students should complete Chapter 8, "Assessment" after completing Chapter 8. Quizzes, labs, Packet Tracers and other activities can be used to informally assess student...
  • Chapter 1 Introduction: Matter and Measurement

    Chapter 1 Introduction: Matter and Measurement

    A sample of a chlorohydrocarbon with a mass of 4.599 g, containing C, H and Cl, was combusted in excess oxygen to yield 6.274 g of CO 2 and 3.212 g of H 2. O.Calculate the empirical formula of the...