This document provides information about several presentations on managing your digital footprint being held during National Cyber Security Awareness Month at ASU. The presentations include topics such as managing the information you share online, understanding your online reputation, how hackers access personal information, and testing your security knowledge to win an iPad. The document also provides background on the main presenter, Jim Webb, and encourages participants to attend the presentations to learn how to better control access to their personal information online and protect themselves from potential threats.
3. ASU National Cyber Security Awareness
Month
Managing Your Digital Footprint
Date: 10/7/2014
Time: 2:15 - 3:30
Location: 137B Macrae Peak
Do you know how much information you are sharing,
who has this data, and who wants to collect it? Learn
tools and methods that can help you make informed
decisions about your personal information.
Your Online Reputation
Date: 10/21/2014
Time: 2:15 - 3:30
Location 137B Macrae Peak
Learn how to OWN your online reputation and make
sure that your best side is always presented to the
world.
Anatomy Of A Hack
Date: 10/14/2014
Time: 2:15 - 3:30
Location: 137B Macrae Peak
Criminals have learned how to use our phones, laptops
and even refrigerators against us. How do they do it,
what can they steal, and how can we protect
ourselves?
Campus Presentations
4. ASU National Cyber Security Awareness
Month
Test your security knowledge and earn a chance to win an IPAD mini!
Watch three short security awareness videos, answers the questions correctly and you can
win!
ASU Employee Security Video Contest
Email us to get started: security@appstate.edu
5. ASU National Cyber Security Awareness
Month
Jim Webb
CISSP, CISM, CEH, CCE, ITILv3
Chief Information Security Officer
ITS - Office of Information Security
Email: webbjt@appstate.edu
Twitter: @appinfosec
About Presenter
6. There Are Two Versions of You.
Real You
In the Flesh
“Online You”
Online data about
you.
9. Your Digital Footprint
Active Footprint - What we INTENTIONALLY share...
Our ...
Pics
Social Links/Posts
Comments
“Likes” / +1s
Online Reviews
Web
Searches
10. Passive Footprint - What we often UNINTENTIONALLY share.
Our ...
Connection Info
Computer Information
Location Information
Your Digital Footprint
11. Demonstration:
Location Data
Location Based Services
Cell-Tower Based (100m accuracy)
GPS Based (20m)
Wifi Triangulation (200m accuracy)
IP Approximation
User Provided
Document Geo-Tagging (Images)
Demo: Recon-NG and Pushpin Location Data
Your Digital Footprint
WHERE ARE YOU NOW?
WHERE HAVE YOU BEEN?
13. Up Front: Let’s Dispel Privacy Myths
Myth #1: All Sharing Is Bad!!
Sharing has many
benefits!
Myth #2: Only Paranoid People Care About Privacy.
14. 5 Reasons Your FootPrint Matters
Your FootPrint May Outlive You
Internet Archive
https://archive.org/
Things Get Weird
http://liveson.org/connect.php
1986 - 2.6 Exabytes 1993 - 15.8 Exabtyes 2000- 54.5 Exabtyes 2007- 295 Exabtyes
2014 - 2,837 Exabtyes
15. 5 Reasons Your FootPrint Matters
Cyber Vetting
Candidate posted a photo of a warrant for his arrest
Candidate featured a pig as his closest friend
Candidate posted his dental exam results
Candidate was actively involved in a demonic cult
Candidate posted Sasquatch pictures he had taken
Strange Profile Decisions
16. 5 Reasons Your FootPrint Matters
Government Monitoring
This means different things to different citizens.
17. 5 Reasons Your FootPrint Matters
Hacking and Online Trust
Biographical Info and Password Recovery
18. 5 Reasons Your FootPrint Matters
Behavioral Targeting
Persistent Identification and Consumer Profiles
19. 5 Reasons Your FootPrint Matters
Demonstration:
Watching The Watchers
Demo Using: Lightbeam
20. Why It Will Matter Even More.
Internet of Things
21. Why It Will Matter Even More.
Augmented Reality
Convergence
23. Managing Your Digital Footprint
Managing Your Digital Footprint
Two Goals:
Awareness and Agency!
24. Information Sharing Is Bi-Directional
Be Aware - Access is An Exchange
It is impossible to not leave behind
some amount of information.
“Every Contact Leaves A Trace.”
- Edmund Locard
25. Our Information Can Be Bought.
Be Aware - Information Brokers
“Background Investigations Providers”
Example: http://www.ussearch.com/
Yes SSNs also: http://peopleinfofind.com/find-social-
security-number/
26. Who Are We Giving Our Data To?
Be Aware - Who Has Your Data
Including Usual Suspects
27. Who Are We Giving Our Data To?
Also….
Popular Niche Applications
28. Who Is Collecting Our Data?
Be Aware -
Privacy Implications of
Mobile Applications Permissions
29. Who Is Collecting Our Data?
Be Aware: “Free” Services
There is still no such thing as free
lunch.
30. What Are They Doing With It?
Be Aware : Privacy Policies and
You Can’t Read Them All
How To Use Tosdr -
https://tosdr.org/index.html Source: The Cost of Reading Privacy Policies:
http://goo.gl/s0jp2N
31. Privacy Tools That Give You Choice
Ghostery
https://www.ghostery.com/
Disconnect
https://disconnect.me
Agency- Ability To Make Choice
LookOut
https://www.lookout.com/
Google Alerts
Self - Searches
32. “May You Live In Interesting Times”
PRIVACY SECURITY
File last been saved by someone named Dennis.
Using version of MS Word at:
Christ Lutheran Church Park City library.