SlideShare una empresa de Scribd logo
1 de 34
Cybersecurity
LECET Information Technology Conference | May 2, 2012
        Carrie Leary | Anne Arundel Community College
Background

    AACC                   CyberWatch                  Organizations
Center of Academic        Advanced Technological       Public & Private Sectors
    Excellence               Education Center

                                  Curriculum
     AAS Degree in                                             Research
Information Assurance &
     Cybersecurity
                                 K-12 Training

                                                               Training
      Certificates
                           Professional Development
   Network Security
 Server Administration
  CISCO Networking          Collegiate Cybersecurity          Awareness
        Forensic             Defense Competitions
What is Cybersecurity?

 Defined as…

 Measures taken to protect a computer or computer system (as
   on the Internet) against unauthorized access or attack
                                         - Merriam-Webster

 The state of being protected against the criminal or
   unauthorized use of electronic data, or the measures taken to
   achieve this                          -Oxford Dictionaries
What are the needs?

96,600 Network & Computer System Administrators
   65,700 Information Security Analysts
110,000              Computer Support Specialists


     120,000 Computer Systems Analysts
       Bureau of Labor Statistics | Employment Change 2010 - 2020
The Problem




 Current         IT       Workforce
Workforce     Graduates    Needs
Identifying the Workforce
 Information Technology (IT)
   jobs found in every industry
   and across numerous job
   functions

 Lack of job training and skills

 Pending baby boom
   retirements

 Lack of interest in STEM
   fields

 Lack career info
1986 - 1996
2000 - 2004
2004 - 2008
2009 - current
Why worry?




Our Nation               Organizations        Individuals
 Loss of Intelligence    Loss of Data        Identity Theft
 Critical                Reduced             Financial Loss
   Infrastructure/          Productivity       Inconvenience
   Power Grid             Financial Loss
                          Loss of Trust by
                            Customers
                          Bankruptcy
The Problem




 Current         IT       Workforce
Workforce     Graduates    Needs
Avoid Weak Passwords
Accessing the Internet
Accessing the Internet

Choose your browser carefully.
Select Google Chrome, Mozilla
Firefox, of Safari if possible.
Keep Web Browser up-to-date.
Install patches as they are released

Use secure websites.
Look for “https” when transmitting
confidential information.
Never click links.
Always type the web address
directly into the address bar.
Accessing the Internet
Do not use unsecure WiFi.
Free WiFi at Starbucks, McDonalds, etc. should
not be used when transmitting confidential
information.

Password protect your home WiFi
Password protecting decreased the number of
unauthorized users on your connection.


Do not broadcast the SSID of your home WiFi.
Hiding the name of your network decreases the
number of unauthorized users on your connection


Be careful when selecting and answering Password
Recovery Questions.
Do not select questions that others know the
answer to or can utilize social engineering to
determine.
Accessing the Internet
Do not use unsecure WiFi.
Free WiFi at Starbucks, McDonalds, etc. should
not be used when transmitting confidential
information.

Password protect your home WiFi
Password protecting decreased the number of
unauthorized users on your connection.


Do not broadcast the SSID of your home WiFi.
Hiding the name of your network decreases the
number of unauthorized users on your connection


Be careful when selecting and answering Password
Recovery Questions.
Do not select questions that others know the
answer to or can utilize social engineering to
determine.
Accessing the Internet
Do not use unsecure WiFi.
Free WiFi at Starbucks, McDonalds, etc. should
not be used when transmitting confidential
information.

Password protect your home WiFi
Password protecting decreased the number of
unauthorized users on your connection.


Do not broadcast the SSID of your home WiFi.
Hiding the name of your network decreases the
number of unauthorized users on your connection


Be careful when selecting and answering Password
Recovery Questions.
Do not select questions that others know the
answer to or can utilize social engineering to
determine.
Accessing the Internet
Do not use unsecure WiFi.
Free WiFi at Starbucks, McDonalds, etc. should
not be used when transmitting confidential
information.

Password protect your home WiFi
Password protecting decreased the number of
unauthorized users on your connection.


Do not broadcast the SSID of your home WiFi.
Hiding the name of your network decreases the
number of unauthorized users on your connection


Be careful when selecting and answering Password
Recovery Questions.
Do not select questions that others know the
answer to or can utilize social engineering to
determine.
Evolving Infrastructure

 We continue to embrace new technology
     Mobile Device
     Virtualization
     Cloud Computing

 Need a workforce versed in specific technical knowledge



As the number of                         the need for data    security to defend
                    storage needs will
connected devices                          analytics will    against robust threats
                         increase,
    increases                              increase, and       will be essential
Be Smart with your Smartphone

                                   Only connect to
                                   protected WiFi

                         Be vigilant when
                         clicking web links


                      Use a complex password



                      Keep firmware updated


                         Only download apps from
                         trusted sources
                                 Pay attention to
                                 the data the phone
                                 is accessing
Cloud Computing




         Built on TRUST!
Cloud Computing – Know what to ask




System Downtime     Encryption of data       Disaster Recovery   Data Retention Policy
                  (in transit and at rest)          Plan




 Data Integrity    Identity and Access         Regulatory          Location of Data
  Assurance           Management               Compliance              Centers/
                                                                   Physical Security
Moving Forward

  Awareness and Training are essential!


  Resources

  • Stay Safe Online
    http://www.staysafeonline.org/
  • National Institute of Standards and Technology (NIST)
    www.nist.gov
  • National Initiative for Cybersecurity Education
    (NICE)http://csrc.nist.gov/nice/
  • CyberWatch ATE Center
    www.cyberwatchcenter.org
  • Cyber Maryland
    http://www.cybermaryland.org/
Questions?
Carrie Leary | csleary@aacc.edu | 410-777-7088
Resources
 Stay Safe Online
   http://www.staysafeonline.org/

 National Institute of Standards and Technology (NIST)
   www.nist.gov

 National Initiative for Cybersecurity Education (NICE)
   http://csrc.nist.gov/nice/

 CyberWatch
   www.cyberwatchcenter.org

 Cyber Maryland
   http://www.cybermaryland.org/
Resources

 http://www.intel.com/content/www/us/en/communications/inte
  rnet-minute-infographic.html

 http://www.confidenttechnologies.com/infographic

 http://www.makeuseof.com/tech-fun/the-only-thing-internet-
  explorer-is-good-for/

Más contenido relacionado

La actualidad más candente

Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
Octogence
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
CODE BLUE
 
Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership
Leonardo
 

La actualidad más candente (20)

Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011)
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills Gap
 
ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Cyber security basics
Cyber security basics Cyber security basics
Cyber security basics
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
Readying your IT Infrastructure for Cloud
Readying your IT Infrastructure for CloudReadying your IT Infrastructure for Cloud
Readying your IT Infrastructure for Cloud
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership
 
Isa Chapters Cyber is Hard presentation v1.0
Isa Chapters Cyber  is Hard presentation v1.0Isa Chapters Cyber  is Hard presentation v1.0
Isa Chapters Cyber is Hard presentation v1.0
 
Mobile security
Mobile securityMobile security
Mobile security
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
 

Destacado

Destacado (13)

RFID Offering From SIPL
RFID Offering From SIPLRFID Offering From SIPL
RFID Offering From SIPL
 
Jisc RSC Eastern Technical Managers forum October 2013 WIFI AND BYOD AT LONG ...
Jisc RSC Eastern Technical Managers forum October 2013 WIFI AND BYOD AT LONG ...Jisc RSC Eastern Technical Managers forum October 2013 WIFI AND BYOD AT LONG ...
Jisc RSC Eastern Technical Managers forum October 2013 WIFI AND BYOD AT LONG ...
 
What's Next in Cybersecurity Policy
What's Next in Cybersecurity PolicyWhat's Next in Cybersecurity Policy
What's Next in Cybersecurity Policy
 
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
WiFi for Events - a guide to getting it right
WiFi for Events - a guide to getting it rightWiFi for Events - a guide to getting it right
WiFi for Events - a guide to getting it right
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Teacher Zen with Google Tools and Apps
Teacher Zen with Google Tools and AppsTeacher Zen with Google Tools and Apps
Teacher Zen with Google Tools and Apps
 
Wifi Ppt
Wifi PptWifi Ppt
Wifi Ppt
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Similar a Cybersecurity

Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
caca1009
 

Similar a Cybersecurity (20)

Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
itmsday2.pptx
itmsday2.pptxitmsday2.pptx
itmsday2.pptx
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Domain 6 of CEH Wireless Network Hacking.pptx
Domain 6 of CEH Wireless Network Hacking.pptxDomain 6 of CEH Wireless Network Hacking.pptx
Domain 6 of CEH Wireless Network Hacking.pptx
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdf
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Big data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursBig data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is Yours
 

Último

Último (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Cybersecurity

  • 1. Cybersecurity LECET Information Technology Conference | May 2, 2012 Carrie Leary | Anne Arundel Community College
  • 2. Background AACC CyberWatch Organizations Center of Academic Advanced Technological Public & Private Sectors Excellence Education Center Curriculum AAS Degree in Research Information Assurance & Cybersecurity K-12 Training Training Certificates Professional Development Network Security Server Administration CISCO Networking Collegiate Cybersecurity Awareness Forensic Defense Competitions
  • 3. What is Cybersecurity?  Defined as…  Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack - Merriam-Webster  The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this -Oxford Dictionaries
  • 4.
  • 5. What are the needs? 96,600 Network & Computer System Administrators 65,700 Information Security Analysts 110,000 Computer Support Specialists 120,000 Computer Systems Analysts Bureau of Labor Statistics | Employment Change 2010 - 2020
  • 6. The Problem Current IT Workforce Workforce Graduates Needs
  • 7. Identifying the Workforce  Information Technology (IT) jobs found in every industry and across numerous job functions  Lack of job training and skills  Pending baby boom retirements  Lack of interest in STEM fields  Lack career info
  • 12.
  • 13. Why worry? Our Nation Organizations Individuals  Loss of Intelligence  Loss of Data  Identity Theft  Critical  Reduced  Financial Loss Infrastructure/ Productivity  Inconvenience Power Grid  Financial Loss  Loss of Trust by Customers  Bankruptcy
  • 14. The Problem Current IT Workforce Workforce Graduates Needs
  • 15.
  • 18.
  • 19. Accessing the Internet Choose your browser carefully. Select Google Chrome, Mozilla Firefox, of Safari if possible. Keep Web Browser up-to-date. Install patches as they are released Use secure websites. Look for “https” when transmitting confidential information. Never click links. Always type the web address directly into the address bar.
  • 20.
  • 21. Accessing the Internet Do not use unsecure WiFi. Free WiFi at Starbucks, McDonalds, etc. should not be used when transmitting confidential information. Password protect your home WiFi Password protecting decreased the number of unauthorized users on your connection. Do not broadcast the SSID of your home WiFi. Hiding the name of your network decreases the number of unauthorized users on your connection Be careful when selecting and answering Password Recovery Questions. Do not select questions that others know the answer to or can utilize social engineering to determine.
  • 22. Accessing the Internet Do not use unsecure WiFi. Free WiFi at Starbucks, McDonalds, etc. should not be used when transmitting confidential information. Password protect your home WiFi Password protecting decreased the number of unauthorized users on your connection. Do not broadcast the SSID of your home WiFi. Hiding the name of your network decreases the number of unauthorized users on your connection Be careful when selecting and answering Password Recovery Questions. Do not select questions that others know the answer to or can utilize social engineering to determine.
  • 23. Accessing the Internet Do not use unsecure WiFi. Free WiFi at Starbucks, McDonalds, etc. should not be used when transmitting confidential information. Password protect your home WiFi Password protecting decreased the number of unauthorized users on your connection. Do not broadcast the SSID of your home WiFi. Hiding the name of your network decreases the number of unauthorized users on your connection Be careful when selecting and answering Password Recovery Questions. Do not select questions that others know the answer to or can utilize social engineering to determine.
  • 24. Accessing the Internet Do not use unsecure WiFi. Free WiFi at Starbucks, McDonalds, etc. should not be used when transmitting confidential information. Password protect your home WiFi Password protecting decreased the number of unauthorized users on your connection. Do not broadcast the SSID of your home WiFi. Hiding the name of your network decreases the number of unauthorized users on your connection Be careful when selecting and answering Password Recovery Questions. Do not select questions that others know the answer to or can utilize social engineering to determine.
  • 25. Evolving Infrastructure  We continue to embrace new technology  Mobile Device  Virtualization  Cloud Computing  Need a workforce versed in specific technical knowledge As the number of the need for data security to defend storage needs will connected devices analytics will against robust threats increase, increases increase, and will be essential
  • 26.
  • 27. Be Smart with your Smartphone Only connect to protected WiFi Be vigilant when clicking web links Use a complex password Keep firmware updated Only download apps from trusted sources Pay attention to the data the phone is accessing
  • 28.
  • 29. Cloud Computing Built on TRUST!
  • 30. Cloud Computing – Know what to ask System Downtime Encryption of data Disaster Recovery Data Retention Policy (in transit and at rest) Plan Data Integrity Identity and Access Regulatory Location of Data Assurance Management Compliance Centers/ Physical Security
  • 31. Moving Forward Awareness and Training are essential! Resources • Stay Safe Online http://www.staysafeonline.org/ • National Institute of Standards and Technology (NIST) www.nist.gov • National Initiative for Cybersecurity Education (NICE)http://csrc.nist.gov/nice/ • CyberWatch ATE Center www.cyberwatchcenter.org • Cyber Maryland http://www.cybermaryland.org/
  • 32. Questions? Carrie Leary | csleary@aacc.edu | 410-777-7088
  • 33. Resources  Stay Safe Online http://www.staysafeonline.org/  National Institute of Standards and Technology (NIST) www.nist.gov  National Initiative for Cybersecurity Education (NICE) http://csrc.nist.gov/nice/  CyberWatch www.cyberwatchcenter.org  Cyber Maryland http://www.cybermaryland.org/
  • 34. Resources  http://www.intel.com/content/www/us/en/communications/inte rnet-minute-infographic.html  http://www.confidenttechnologies.com/infographic  http://www.makeuseof.com/tech-fun/the-only-thing-internet- explorer-is-good-for/

Notas del editor

  1. Background about Industry
  2. What is missing is a skilled competent workforce to fill all of the open job. Far more than we have applicants to pursue
  3. Why do we need so many? Let’s talk about the changes that have occurred in the industry and how the landscape has changed.
  4. What is missing is a skilled competent workforce to fill all of the open job. Far more than we have applicants to pursueWe are not able to develop technology as fast as neededNeed to get individual users to feel accountable and practice safe security
  5. Biggest threats come from within the organization – not following polices and guidelines
  6. Technology is now so accessible to so many# of connected device – storage, analytics, and security to protect against robust threats
  7. What does your phone know about you? What are you giving it access to?
  8. Only download apps from trusted sources, such as reputable app stores and download sites. Remember to look at the developer name, reviews, and star ratings.After clicking on a web link, pay close attention to the address to make sure it matches the website it claims to be if you are asked to enter account or login information.Set a password on your mobile device so that if it is lost or stolen, your data is difficult to access.Download a mobile security tool that scans every app you download for malware and spyware and can help you locate a lost or stolen device. For extra protection, make sure your security app can also protect from unsafe websites.Be alert for unusual behaviors on your phone, which could be a sign that it is infected. These behaviors may include unusual text messages, strange charges to the phone bill, and suddenly decreased battery life.Make sure to download firmware updates as soon as they are available for your device.
  9. Handing over trustMost valuable thing to a company is their data