SlideShare une entreprise Scribd logo
1  sur  35
Managing Your Digital Footprint
http://www.staysafeonline.org/ncsam/
ASU National Cyber Security Awareness
Month
Managing Your Digital Footprint
Date: 10/7/2014
Time: 2:15 - 3:30
Location: 137B Macrae Peak
Do you know how much information you are sharing,
who has this data, and who wants to collect it? Learn
tools and methods that can help you make informed
decisions about your personal information.
Your Online Reputation
Date: 10/21/2014
Time: 2:15 - 3:30
Location 137B Macrae Peak
Learn how to OWN your online reputation and make
sure that your best side is always presented to the
world.
Anatomy Of A Hack
Date: 10/14/2014
Time: 2:15 - 3:30
Location: 137B Macrae Peak
Criminals have learned how to use our phones, laptops
and even refrigerators against us. How do they do it,
what can they steal, and how can we protect
ourselves?
Campus Presentations
ASU National Cyber Security Awareness
Month
Test your security knowledge and earn a chance to win an IPAD mini!
Watch three short security awareness videos, answers the questions correctly and you can
win!
ASU Employee Security Video Contest
Email us to get started: security@appstate.edu
ASU National Cyber Security Awareness
Month
Jim Webb
CISSP, CISM, CEH, CCE, ITILv3
Chief Information Security Officer
ITS - Office of Information Security
Email: webbjt@appstate.edu
Twitter: @appinfosec
About Presenter
There Are Two Versions of You.
Real You
In the Flesh
“Online You”
Online data about
you.
Understanding Online You
We need common terminology:
What is an “Online Identity”?
Understanding Online You
We need common terminology:
“Digital Footprint” ≠ “Online Identity”
Your Digital Footprint
Active Footprint - What we INTENTIONALLY share...
Our ...
Pics
Social Links/Posts
Comments
“Likes” / +1s
Online Reviews
Web
Searches
Passive Footprint - What we often UNINTENTIONALLY share.
Our ...
Connection Info
Computer Information
Location Information
Your Digital Footprint
Demonstration:
Location Data
Location Based Services
Cell-Tower Based (100m accuracy)
GPS Based (20m)
Wifi Triangulation (200m accuracy)
IP Approximation
User Provided
Document Geo-Tagging (Images)
Demo: Recon-NG and Pushpin Location Data
Your Digital Footprint
WHERE ARE YOU NOW?
WHERE HAVE YOU BEEN?
Your Digital Footprint
WHERE ARE YOU NOW?
WHERE HAVE YOU BEEN?
Up Front: Let’s Dispel Privacy Myths
Myth #1: All Sharing Is Bad!!
Sharing has many
benefits!
Myth #2: Only Paranoid People Care About Privacy.
5 Reasons Your FootPrint Matters
Your FootPrint May Outlive You
Internet Archive
https://archive.org/
Things Get Weird
http://liveson.org/connect.php
1986 - 2.6 Exabytes 1993 - 15.8 Exabtyes 2000- 54.5 Exabtyes 2007- 295 Exabtyes
2014 - 2,837 Exabtyes
5 Reasons Your FootPrint Matters
Cyber Vetting
Candidate posted a photo of a warrant for his arrest
Candidate featured a pig as his closest friend
Candidate posted his dental exam results
Candidate was actively involved in a demonic cult
Candidate posted Sasquatch pictures he had taken
Strange Profile Decisions
5 Reasons Your FootPrint Matters
Government Monitoring
This means different things to different citizens.
5 Reasons Your FootPrint Matters
Hacking and Online Trust
Biographical Info and Password Recovery
5 Reasons Your FootPrint Matters
Behavioral Targeting
Persistent Identification and Consumer Profiles
5 Reasons Your FootPrint Matters
Demonstration:
Watching The Watchers
Demo Using: Lightbeam
Why It Will Matter Even More.
Internet of Things
Why It Will Matter Even More.
Augmented Reality
Convergence
Imagine a World Where Your Two Selves Converge
Managing Your Digital Footprint
Managing Your Digital Footprint
Two Goals:
Awareness and Agency!
Information Sharing Is Bi-Directional
Be Aware - Access is An Exchange
It is impossible to not leave behind
some amount of information.
“Every Contact Leaves A Trace.”
- Edmund Locard
Our Information Can Be Bought.
Be Aware - Information Brokers
“Background Investigations Providers”
Example: http://www.ussearch.com/
Yes SSNs also: http://peopleinfofind.com/find-social-
security-number/
Who Are We Giving Our Data To?
Be Aware - Who Has Your Data
Including Usual Suspects
Who Are We Giving Our Data To?
Also….
Popular Niche Applications
Who Is Collecting Our Data?
Be Aware -
Privacy Implications of
Mobile Applications Permissions
Who Is Collecting Our Data?
Be Aware: “Free” Services
There is still no such thing as free
lunch.
What Are They Doing With It?
Be Aware : Privacy Policies and
You Can’t Read Them All
How To Use Tosdr -
https://tosdr.org/index.html Source: The Cost of Reading Privacy Policies:
http://goo.gl/s0jp2N
Privacy Tools That Give You Choice
Ghostery
https://www.ghostery.com/
Disconnect
https://disconnect.me
Agency- Ability To Make Choice
LookOut
https://www.lookout.com/
Google Alerts
Self - Searches
“May You Live In Interesting Times”
PRIVACY SECURITY
File last been saved by someone named Dennis.
Using version of MS Word at:
Christ Lutheran Church Park City library.
“May You Live In Interesting Times”
“May You Live In Interesting Times”
THANK YOU!
QUESTIONS / THOUGHTS?

Contenu connexe

Tendances

Feb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber worldFeb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber worldScott Burnett
 
Digital Volunteering in Care Homes - Connecting Care
Digital Volunteering in Care Homes - Connecting CareDigital Volunteering in Care Homes - Connecting Care
Digital Volunteering in Care Homes - Connecting CareLasa UK
 
Ethics in development of Information Technology
Ethics in development of Information TechnologyEthics in development of Information Technology
Ethics in development of Information TechnologyAnKit Mhatre
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 nFatimaAmin26
 
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...edSocialMedia
 
Freedom and Privacy in the Mobile World
Freedom and Privacy in the Mobile WorldFreedom and Privacy in the Mobile World
Freedom and Privacy in the Mobile WorldJessie Helfrich
 
Mark zuckerberg worl
Mark zuckerberg worlMark zuckerberg worl
Mark zuckerberg worlanzar coowar
 
Pp e safe online p2
Pp e safe online p2Pp e safe online p2
Pp e safe online p2FatimaAmin26
 

Tendances (14)

Augmented reality
Augmented realityAugmented reality
Augmented reality
 
Feb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber worldFeb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber world
 
Digital Volunteering in Care Homes - Connecting Care
Digital Volunteering in Care Homes - Connecting CareDigital Volunteering in Care Homes - Connecting Care
Digital Volunteering in Care Homes - Connecting Care
 
Ethics in development of Information Technology
Ethics in development of Information TechnologyEthics in development of Information Technology
Ethics in development of Information Technology
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
 
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
 
Di Monte - Research Libraries and the Internet of Things
Di Monte - Research Libraries and the Internet of ThingsDi Monte - Research Libraries and the Internet of Things
Di Monte - Research Libraries and the Internet of Things
 
Multi media
Multi mediaMulti media
Multi media
 
Freedom and Privacy in the Mobile World
Freedom and Privacy in the Mobile WorldFreedom and Privacy in the Mobile World
Freedom and Privacy in the Mobile World
 
Mark zuckerberg worl
Mark zuckerberg worlMark zuckerberg worl
Mark zuckerberg worl
 
Wireless Trends
Wireless TrendsWireless Trends
Wireless Trends
 
User Centric Design
User Centric DesignUser Centric Design
User Centric Design
 
Pp e safe online p2
Pp e safe online p2Pp e safe online p2
Pp e safe online p2
 
Big foot presentation
Big foot presentationBig foot presentation
Big foot presentation
 

Similaire à Copy of Managing Your Digital Footprint

N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)Christopher Lisasi
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014Steve Sokoloski
 
Digital footprint@wse march13
Digital footprint@wse march13Digital footprint@wse march13
Digital footprint@wse march13Justino Lourenço
 
Digital Footprint in our world
Digital Footprint in our worldDigital Footprint in our world
Digital Footprint in our worldJustino Lourenço
 
Privacy and social media
Privacy and social mediaPrivacy and social media
Privacy and social mediaAbirAhmed48
 
21-Trends in computing and ethical issues (1).pptx
21-Trends in computing and ethical issues (1).pptx21-Trends in computing and ethical issues (1).pptx
21-Trends in computing and ethical issues (1).pptxpraveena93589
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120jram2113
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
What's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyWhat's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyFabrizio Gramuglio
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
Big Data Analytics - The New Cold War
Big Data Analytics - The New Cold WarBig Data Analytics - The New Cold War
Big Data Analytics - The New Cold WarKunal Dutta
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017NRC
 
Possibilities and perils of the data-driven world.
Possibilities and perils of the data-driven world.Possibilities and perils of the data-driven world.
Possibilities and perils of the data-driven world.joshuakauffman
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Tomorrow th'internet
Tomorrow th'internetTomorrow th'internet
Tomorrow th'internetTom Goodwin
 

Similaire à Copy of Managing Your Digital Footprint (20)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014
 
Digital footprint@wse march13
Digital footprint@wse march13Digital footprint@wse march13
Digital footprint@wse march13
 
Digital Footprint in our world
Digital Footprint in our worldDigital Footprint in our world
Digital Footprint in our world
 
Privacy and social media
Privacy and social mediaPrivacy and social media
Privacy and social media
 
21-Trends in computing and ethical issues (1).pptx
21-Trends in computing and ethical issues (1).pptx21-Trends in computing and ethical issues (1).pptx
21-Trends in computing and ethical issues (1).pptx
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
What's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyWhat's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacy
 
FILM260 Flipbook submission
FILM260 Flipbook submissionFILM260 Flipbook submission
FILM260 Flipbook submission
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
TEDx Leuven 2012
TEDx Leuven 2012TEDx Leuven 2012
TEDx Leuven 2012
 
Big Data Analytics - The New Cold War
Big Data Analytics - The New Cold WarBig Data Analytics - The New Cold War
Big Data Analytics - The New Cold War
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
Possibilities and perils of the data-driven world.
Possibilities and perils of the data-driven world.Possibilities and perils of the data-driven world.
Possibilities and perils of the data-driven world.
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Tomorrow th'internet
Tomorrow th'internetTomorrow th'internet
Tomorrow th'internet
 

Copy of Managing Your Digital Footprint

  • 3. ASU National Cyber Security Awareness Month Managing Your Digital Footprint Date: 10/7/2014 Time: 2:15 - 3:30 Location: 137B Macrae Peak Do you know how much information you are sharing, who has this data, and who wants to collect it? Learn tools and methods that can help you make informed decisions about your personal information. Your Online Reputation Date: 10/21/2014 Time: 2:15 - 3:30 Location 137B Macrae Peak Learn how to OWN your online reputation and make sure that your best side is always presented to the world. Anatomy Of A Hack Date: 10/14/2014 Time: 2:15 - 3:30 Location: 137B Macrae Peak Criminals have learned how to use our phones, laptops and even refrigerators against us. How do they do it, what can they steal, and how can we protect ourselves? Campus Presentations
  • 4. ASU National Cyber Security Awareness Month Test your security knowledge and earn a chance to win an IPAD mini! Watch three short security awareness videos, answers the questions correctly and you can win! ASU Employee Security Video Contest Email us to get started: security@appstate.edu
  • 5. ASU National Cyber Security Awareness Month Jim Webb CISSP, CISM, CEH, CCE, ITILv3 Chief Information Security Officer ITS - Office of Information Security Email: webbjt@appstate.edu Twitter: @appinfosec About Presenter
  • 6. There Are Two Versions of You. Real You In the Flesh “Online You” Online data about you.
  • 7. Understanding Online You We need common terminology: What is an “Online Identity”?
  • 8. Understanding Online You We need common terminology: “Digital Footprint” ≠ “Online Identity”
  • 9. Your Digital Footprint Active Footprint - What we INTENTIONALLY share... Our ... Pics Social Links/Posts Comments “Likes” / +1s Online Reviews Web Searches
  • 10. Passive Footprint - What we often UNINTENTIONALLY share. Our ... Connection Info Computer Information Location Information Your Digital Footprint
  • 11. Demonstration: Location Data Location Based Services Cell-Tower Based (100m accuracy) GPS Based (20m) Wifi Triangulation (200m accuracy) IP Approximation User Provided Document Geo-Tagging (Images) Demo: Recon-NG and Pushpin Location Data Your Digital Footprint WHERE ARE YOU NOW? WHERE HAVE YOU BEEN?
  • 12. Your Digital Footprint WHERE ARE YOU NOW? WHERE HAVE YOU BEEN?
  • 13. Up Front: Let’s Dispel Privacy Myths Myth #1: All Sharing Is Bad!! Sharing has many benefits! Myth #2: Only Paranoid People Care About Privacy.
  • 14. 5 Reasons Your FootPrint Matters Your FootPrint May Outlive You Internet Archive https://archive.org/ Things Get Weird http://liveson.org/connect.php 1986 - 2.6 Exabytes 1993 - 15.8 Exabtyes 2000- 54.5 Exabtyes 2007- 295 Exabtyes 2014 - 2,837 Exabtyes
  • 15. 5 Reasons Your FootPrint Matters Cyber Vetting Candidate posted a photo of a warrant for his arrest Candidate featured a pig as his closest friend Candidate posted his dental exam results Candidate was actively involved in a demonic cult Candidate posted Sasquatch pictures he had taken Strange Profile Decisions
  • 16. 5 Reasons Your FootPrint Matters Government Monitoring This means different things to different citizens.
  • 17. 5 Reasons Your FootPrint Matters Hacking and Online Trust Biographical Info and Password Recovery
  • 18. 5 Reasons Your FootPrint Matters Behavioral Targeting Persistent Identification and Consumer Profiles
  • 19. 5 Reasons Your FootPrint Matters Demonstration: Watching The Watchers Demo Using: Lightbeam
  • 20. Why It Will Matter Even More. Internet of Things
  • 21. Why It Will Matter Even More. Augmented Reality Convergence
  • 22. Imagine a World Where Your Two Selves Converge
  • 23. Managing Your Digital Footprint Managing Your Digital Footprint Two Goals: Awareness and Agency!
  • 24. Information Sharing Is Bi-Directional Be Aware - Access is An Exchange It is impossible to not leave behind some amount of information. “Every Contact Leaves A Trace.” - Edmund Locard
  • 25. Our Information Can Be Bought. Be Aware - Information Brokers “Background Investigations Providers” Example: http://www.ussearch.com/ Yes SSNs also: http://peopleinfofind.com/find-social- security-number/
  • 26. Who Are We Giving Our Data To? Be Aware - Who Has Your Data Including Usual Suspects
  • 27. Who Are We Giving Our Data To? Also…. Popular Niche Applications
  • 28. Who Is Collecting Our Data? Be Aware - Privacy Implications of Mobile Applications Permissions
  • 29. Who Is Collecting Our Data? Be Aware: “Free” Services There is still no such thing as free lunch.
  • 30. What Are They Doing With It? Be Aware : Privacy Policies and You Can’t Read Them All How To Use Tosdr - https://tosdr.org/index.html Source: The Cost of Reading Privacy Policies: http://goo.gl/s0jp2N
  • 31. Privacy Tools That Give You Choice Ghostery https://www.ghostery.com/ Disconnect https://disconnect.me Agency- Ability To Make Choice LookOut https://www.lookout.com/ Google Alerts Self - Searches
  • 32. “May You Live In Interesting Times” PRIVACY SECURITY File last been saved by someone named Dennis. Using version of MS Word at: Christ Lutheran Church Park City library.
  • 33. “May You Live In Interesting Times”
  • 34. “May You Live In Interesting Times”

Notes de l'éditeur

  1. Need statistics.