SlideShare une entreprise Scribd logo
1  sur  13
Information Security
2013 Roadshow
Roadshow Outline
 Why We Care About Information Security
 Safe Computing
• Recognize a Secure Web Site (HTTPS)
• How to Spot a Spoofed Web Site
• Recognize a Phishing Attempt
• What is Social Engineering
 Privacy and Compliance
• PCI/HIPAA/FERPA
• Policy
• Privacy and Best Practice
Why We Care About Information Security
Personal Reasons:
Identity Theft
Loss of Data
Financial Loss
Poor Computer Performance
Institutional Reasons:
Protect Middlebury College and The Monterey Institute of International Studies
Compliance with Laws and Standards
Prevent Reputational Damage
Reduce Legal Liability for the College
As Well As the Personal Reasons Listed Above
How do I Know a Web Site is Secure?
• HTTPS in the Address bar
is an indicator of a secure
web site.
• A web site encrypted with
SSL should display a near the
address bar.
• Not all devices or
browsers
display the
same.
What is a Spoofed Web Site
• Just because the site
looks like MIIS
does not mean it is
• Check the address or URL
• Never enter login information unless the site is secure and you have checked the URL
How to Spot Phishing
 
 
 
 
• Forward all suspected Phishing messages to phishing@miis.edu before deleting the
message.
• If you fall victim to a phishing attack RESET your password immediately and then call the
Helpdesk.
What is FakeAV
• Tries to look like regular AV
• Clicking on the warning will download a virus
• Often the best bet is a hard shutdown of the
system
• Know what your AV warnings look like 
• Sophos anti-virus does offer some web
protections which help to prevent the download
activity of FakeAV.
Social Engineering
• Social engineering, in the context of security, is understood to mean the art of manipulating people
into performing actions or divulging confidential information. While it is similar to a confidence trick or
simple fraud, it is typically trickery or deception for the purpose of information gathering, fraud, or
computer system access; in most cases the attacker never comes face-to-face with the victims.
(From Wikipedia)
Examples:
• You are in a hotel and receive a call from the front desk to confirm your credit card details.
• You receive a call at work from support services asking for your password to fix a problem on your
computer.
• You are at home and get a call from the help desk asking for your login information to reset your email
account.
What Laws Protect Information Here at Monterey
• Family Education Rights and Privacy Act (FERPA) = Student Data
• Health Information Portability and Accountability Act (HIPAA) = Health Data
• Sarbanes – Oxley Act (SOX) = Financial Data for Businesses
• Gramm Leach Bliley Act (GLBA) = Financial Data for Lending Institutions
• California Law SB 1386 / VT Act 162 = State Breach Notification laws
• Payment Card Industry Standards (PCI-DSS) = Credit/Debit Card Data
What Policies Protect Information Here at Monterey
• Privacy Policy = Confidentiality of Data
http://go.miis.edu/privacy
• Network Monitoring Policy = Protection of College Technology Resources
http://go.miis.edu/netmon
• Technical Incident Response Policy = Response to Information Security Events
http://go.miis.edu/tirp
• Data Classification Policy = Defines Data Types
Not in handbook as of yet
• Red Flags Policy = Identity Theft Protection
Not presently in hand book
• PCI Policy = Payment Card Data Handling
http://go.miis.edu/policy?pci
Other Policies Live Here:
http://www.miis.edu/media/view/30606/original/employee_handbook_rev_02.01.2013.pdf
What are Some Best Practices
Do• Look for HTTPS and other key address
indicators when you are going to different web
sites.
• Use a strong challenge question in Banner SSB
• Redaction – remove or mask (block out)
personally identifiable information when sharing
data
• Be suspicious of unsolicited email or phone calls.
•Lock your computer or secure information when
you leave your work space.
•Use Anti-Virus on both your work and home
systems
•Use secure passwords which you change often.
This also applies to mobile devices.
Do
What are Some Best Practices
Do Not• DO NOT write down or share your passwords
- tools such as eWallet or 1Password work
well as secure password storage alternatives.
• DO NOT store confidential data on unencrypted
thumb drives or other unsecured media
-if you need to transfer the data encrypt the
file or password protect the file and keep a
master copy on the server.
Do Not
• DO NOT place confidential data in email
-email a link to where the file is stored.
This may add complexity but increases
security. Windows Explorer can show
you the path to the location of the file.
• DO NOT record sensitive data on the College
web site, blog or Wiki
Discussion and Links
Please share your thoughts!
Information Security Resources:
http://go.middlebury.edu/infosec
http://go.miis.edu/infosec
Report Information Security Events To: infosec@middlebury.edu

Contenu connexe

Tendances

Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDumindu Pahalawatta
 
Managing Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social WebManaging Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social WebBoyd Neil
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital EraFrederick Lane
 
Your've Been Hacked in Florida! Now What?
Your've Been Hacked in Florida! Now What?Your've Been Hacked in Florida! Now What?
Your've Been Hacked in Florida! Now What?Schellman & Company
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and SecurityAnuMarySunny
 
The "Current" State of Privacy Law
The "Current" State of Privacy LawThe "Current" State of Privacy Law
The "Current" State of Privacy LawChuck Kunz
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16Glenn E. Davis
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Who owns your data ans why should you care
Who owns your data ans why should you careWho owns your data ans why should you care
Who owns your data ans why should you careDerek Keats
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryEMC
 
Presentatie Lex Slaghuis KJO9- Crowdsourcing
Presentatie Lex Slaghuis KJO9- CrowdsourcingPresentatie Lex Slaghuis KJO9- Crowdsourcing
Presentatie Lex Slaghuis KJO9- CrowdsourcingMediamatic
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentationteriwoja
 

Tendances (19)

Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Privacy
PrivacyPrivacy
Privacy
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Managing Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social WebManaging Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social Web
 
Hacking
HackingHacking
Hacking
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital Era
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Your've Been Hacked in Florida! Now What?
Your've Been Hacked in Florida! Now What?Your've Been Hacked in Florida! Now What?
Your've Been Hacked in Florida! Now What?
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
The "Current" State of Privacy Law
The "Current" State of Privacy LawThe "Current" State of Privacy Law
The "Current" State of Privacy Law
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Who owns your data ans why should you care
Who owns your data ans why should you careWho owns your data ans why should you care
Who owns your data ans why should you care
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
Presentatie Lex Slaghuis KJO9- Crowdsourcing
Presentatie Lex Slaghuis KJO9- CrowdsourcingPresentatie Lex Slaghuis KJO9- Crowdsourcing
Presentatie Lex Slaghuis KJO9- Crowdsourcing
 
Presentation ce dem14 satyan ramlal
Presentation ce dem14   satyan ramlalPresentation ce dem14   satyan ramlal
Presentation ce dem14 satyan ramlal
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
HACKING
HACKINGHACKING
HACKING
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 

En vedette

Pjb Probes 2009
Pjb Probes 2009Pjb Probes 2009
Pjb Probes 2009toluene
 
GTUG JS will save us all
GTUG JS will save us allGTUG JS will save us all
GTUG JS will save us allMário Valente
 
Bahamas Gospel 2009 Betn Concept Deck
Bahamas Gospel 2009  Betn Concept DeckBahamas Gospel 2009  Betn Concept Deck
Bahamas Gospel 2009 Betn Concept Deckstephcrumbley
 
Probes 2010
Probes 2010Probes 2010
Probes 2010toluene
 
Miis Reorganization
Miis ReorganizationMiis Reorganization
Miis Reorganizationmcgilla
 

En vedette (7)

Pjb Probes 2009
Pjb Probes 2009Pjb Probes 2009
Pjb Probes 2009
 
GTUG JS will save us all
GTUG JS will save us allGTUG JS will save us all
GTUG JS will save us all
 
Bahamas Gospel 2009 Betn Concept Deck
Bahamas Gospel 2009  Betn Concept DeckBahamas Gospel 2009  Betn Concept Deck
Bahamas Gospel 2009 Betn Concept Deck
 
Red7 Product Management Software Tools Overview
Red7 Product Management Software Tools OverviewRed7 Product Management Software Tools Overview
Red7 Product Management Software Tools Overview
 
Probes 2010
Probes 2010Probes 2010
Probes 2010
 
Web Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN TestingWeb Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN Testing
 
Miis Reorganization
Miis ReorganizationMiis Reorganization
Miis Reorganization
 

Similaire à Information Security Roadshow Outline

itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcareNicholas Davis
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
OSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationOSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationDr. Lydia Kostopoulos
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Lawley Insurance
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Protecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity TheftProtecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity TheftMary Lou Roberts
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101SecurityMetrics
 

Similaire à Information Security Roadshow Outline (20)

itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
OSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationOSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security Presentation
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacy
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Protecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity TheftProtecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity Theft
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 

Information Security Roadshow Outline

  • 2. Roadshow Outline  Why We Care About Information Security  Safe Computing • Recognize a Secure Web Site (HTTPS) • How to Spot a Spoofed Web Site • Recognize a Phishing Attempt • What is Social Engineering  Privacy and Compliance • PCI/HIPAA/FERPA • Policy • Privacy and Best Practice
  • 3. Why We Care About Information Security Personal Reasons: Identity Theft Loss of Data Financial Loss Poor Computer Performance Institutional Reasons: Protect Middlebury College and The Monterey Institute of International Studies Compliance with Laws and Standards Prevent Reputational Damage Reduce Legal Liability for the College As Well As the Personal Reasons Listed Above
  • 4. How do I Know a Web Site is Secure? • HTTPS in the Address bar is an indicator of a secure web site. • A web site encrypted with SSL should display a near the address bar. • Not all devices or browsers display the same.
  • 5. What is a Spoofed Web Site • Just because the site looks like MIIS does not mean it is • Check the address or URL • Never enter login information unless the site is secure and you have checked the URL
  • 6. How to Spot Phishing         • Forward all suspected Phishing messages to phishing@miis.edu before deleting the message. • If you fall victim to a phishing attack RESET your password immediately and then call the Helpdesk.
  • 7. What is FakeAV • Tries to look like regular AV • Clicking on the warning will download a virus • Often the best bet is a hard shutdown of the system • Know what your AV warnings look like  • Sophos anti-virus does offer some web protections which help to prevent the download activity of FakeAV.
  • 8. Social Engineering • Social engineering, in the context of security, is understood to mean the art of manipulating people into performing actions or divulging confidential information. While it is similar to a confidence trick or simple fraud, it is typically trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victims. (From Wikipedia) Examples: • You are in a hotel and receive a call from the front desk to confirm your credit card details. • You receive a call at work from support services asking for your password to fix a problem on your computer. • You are at home and get a call from the help desk asking for your login information to reset your email account.
  • 9. What Laws Protect Information Here at Monterey • Family Education Rights and Privacy Act (FERPA) = Student Data • Health Information Portability and Accountability Act (HIPAA) = Health Data • Sarbanes – Oxley Act (SOX) = Financial Data for Businesses • Gramm Leach Bliley Act (GLBA) = Financial Data for Lending Institutions • California Law SB 1386 / VT Act 162 = State Breach Notification laws • Payment Card Industry Standards (PCI-DSS) = Credit/Debit Card Data
  • 10. What Policies Protect Information Here at Monterey • Privacy Policy = Confidentiality of Data http://go.miis.edu/privacy • Network Monitoring Policy = Protection of College Technology Resources http://go.miis.edu/netmon • Technical Incident Response Policy = Response to Information Security Events http://go.miis.edu/tirp • Data Classification Policy = Defines Data Types Not in handbook as of yet • Red Flags Policy = Identity Theft Protection Not presently in hand book • PCI Policy = Payment Card Data Handling http://go.miis.edu/policy?pci Other Policies Live Here: http://www.miis.edu/media/view/30606/original/employee_handbook_rev_02.01.2013.pdf
  • 11. What are Some Best Practices Do• Look for HTTPS and other key address indicators when you are going to different web sites. • Use a strong challenge question in Banner SSB • Redaction – remove or mask (block out) personally identifiable information when sharing data • Be suspicious of unsolicited email or phone calls. •Lock your computer or secure information when you leave your work space. •Use Anti-Virus on both your work and home systems •Use secure passwords which you change often. This also applies to mobile devices. Do
  • 12. What are Some Best Practices Do Not• DO NOT write down or share your passwords - tools such as eWallet or 1Password work well as secure password storage alternatives. • DO NOT store confidential data on unencrypted thumb drives or other unsecured media -if you need to transfer the data encrypt the file or password protect the file and keep a master copy on the server. Do Not • DO NOT place confidential data in email -email a link to where the file is stored. This may add complexity but increases security. Windows Explorer can show you the path to the location of the file. • DO NOT record sensitive data on the College web site, blog or Wiki
  • 13. Discussion and Links Please share your thoughts! Information Security Resources: http://go.middlebury.edu/infosec http://go.miis.edu/infosec Report Information Security Events To: infosec@middlebury.edu

Notes de l'éditeur

  1. What is HTTPS and how does HTTPS/SSL protect you. What is the significance of the Lock and how can one use the lock to help themself.
  2. I am on an HTTPS site why is that not enough. The site looks like Middlebury how can I tell it is not. What is an address bar in the first place. What if I am on my phone. How do I check the URLL in an email link?
  3. What is phishing? Why do people do this stuff in the first place? What is the risk of a phishing attack or those spoofed web sites