Technology Awareness & Information Security Survey Results 50%
Technology Awareness & Information Security Survey Results 50% class has smart phones 64% class has shared personal info over the internet 71% class has personal info posted on FB 57% class uses check-in feature on FB Survey Results 25% class does not use privacy settings on FB 61% class add friends to social networks
that they have only met once or twice 8% class shares their passwords with others Survey Results Do you ever look at or do things on the internet that you wouldnt want your parents(s)/guardian(s), or friends to know about? 14% class responded Yes 75% class responded No 11% class responded Not sure What About Your Privacy?
Passwords Privacy Settings Location Settings Scams Social Engineering Schools/Employers
MIS, IA, Computer Science How Do You Use IT? Calls Text Music
Email Internet Apps GPS Connect Share Organize Events Learn
Brute Force Attacks Celebrity social media accounts, hacked! Often victims of brute force attacks Ex. 2009 President Obama Twitter account Exploits often reveal weaknesses, in this case there were no limits on login attempts so the attacker was able to repeatedly try to gain unauthorized access Passwords Video http://
abclocal.go.com/kabc/video?id=8361862&pid=83618 56 Passwords Password Competition https://www.grc.com/haystack.htm Passwords Continued Password Length Maximum Number of Operations (guesses)
Maximum Time to Crack 8 208,827,064,576 7 seconds 9 5,429,503,678,976 3 minutes
95,428,956,661,682,200 36.8 days 13 2,481,152,873,203,740,000 2.6 years 14 64,509,974,703,297,200,000
68.2 years 15 1,677,259,342,285,730,000,000 1,772.9 years 16 43,608,742,899,428,900,000,000 46,094.1 years
Password Length Maximum Number of Operation (guesses) Maximum Time to Crack 8 2,044,140,858,654,980
18.9 hours 9 167,619,550,409,708,000 64.7 days 10 13,744,803,133,596,100,000 14.5 years
11 1,127,073,856,954,880,000,000 1,191.3 years 12 92,420,056,270,299,900,000,000 97,687.4 years 13
7,578,444,614,164,590,000,000,000 8,010,363.4 years 14 621,432,458,361,496,000,000,000,000 656,849,799.6 years 15 50,957,461,585,642,700,000,000,000,000
16 4,178,511,850,022,700,000,000,000,000,000 53,861,683,563.4 years 4,416,658,052,197.2 years Protect Your Password Never share your password Password length is better than complexity Use a mixture of upper case, lower case, numbers, and symbols Change it periodically
Social Media South Park video http://www.metacafe.com/watch/4496591/ south_park_facebook_friends_episode/ Social Media Employers want to know if you are active How do you present yourself? Just write down your username and password and well get back to you! For certain positions that require security clearances such as DoE, DoD,
Law Enforcement, must forfeit account information and passwords from all sites/blogs you participate in. Privacy FB Privacy Settings http:// www.youtube.com/watch?v=HPqwJWm-0t I Privacy
Keep it personal Think before you link Where were you last night? Sign Out! Facebook/Twitter privacy settings Location settings from picture/checking in Not a good idea to show your location or tell FB that you and your family will be gone on vacation.
Privacy Privacy video http:// www.youtube.com/watch?v=N2vARzvWx wY Current Event General Petraeus Emails
Create Separate Emails Too Good To Be True Curious? Antivirus Software Dumpster Diving Spokeo Spokeo Video http:// www.youtube.com/watch?v=JPFLagxnDs A
Threats Scams Social Engineering Shoulder Surfing Online Tattoo Online Tattoo http:// www.youtube.com/watch?v=ZLLEzErtAX8 Related Degrees BS in Computer Science BBA in MIS MBA in MIS, IA or MOT
CIARE and NMRCFL Partnership with the FBI and its Regional Computer Forensics Lab (RCFL), housed at UNM, through training, and student internships and Co-Ops. NSA National Security Agency (NSA) and the Department of Homeland Security (DHS) designated a center of academic excellence in IA (CAEIA) at UNM. Recruit from UNM Offensive and defensive positions in cyber
security. AC/DC Virus Handouts Closing Final Video http:// www.youtube.com/watch?v=NSGc-TyExIc &feature=endscreen Sources UNM Info: http://mba.mgt.unm.edu/forms/pdf/MBAIA.pdf Password Info: https://www.grc.com/haystack.htm Whitman, Michael E., and Herbert J. Mattord. Principles
Liliequist membrane is an arachnoid membrane from the dorsum sellae to the anterior edge of the mamillary body. It has a vertical mesencephalic segment as well. This membrane has neurosurgical importance especially in endoscopic and microinvasive surgery. Imaging. This membrane...
Josiane Warszawski,Véronique Goulet Dépistage de l'infection à Chlamydia trachomatis dans un Centre de planification familiale et d'orthogénie, Bordeaux, France, 2005 Bertille de Barbeyrac 1, Karine Tilatti2, Sophie Raherison1, Claudine Mathieu2, Sandrine Frantz-Blancpain2, Maïthé Clerc1, Véronique Goulet3, Christiane Bébéar1 ...
The Old Southwest Frontier Alabama After the American Revolution, many immigrants came to the United States seeking a better life. At this same time, many pioneer settlers began to move west from Virginia, North Carolina, South Carolina and Georgia.
Where the brand name isn't what's important—it's the functionality and features of the device itself. And I'll talk more about this in a bit. * Shanzhai manufacturing has also come to include the idea of indigenous innovation. So this is...
Poor Housekeeping: When clients, managers or safety professionals walk through your work site, housekeeping is an accurate indicator of everyone's attitude about quality, production and safety. Poor housekeeping creates hazards of all types. A well maintained area sets a standard...
The Effects of Soil Compaction on Radish Growth I.E., T.G., D.H., M.M., and Janice Wing Project from STEM Earth Central Plant Growth Basics Required conditions Water Nutrients Soil medium Sunlight Temperature Role of pore space in soil Compaction Modeling human...
The password used in the Packet Tracer activities in this chapter is: PT_ccna5. Chapter 8: Assessment. Students should complete Chapter 8, "Assessment" after completing Chapter 8. Quizzes, labs, Packet Tracers and other activities can be used to informally assess student...