Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the...
Transcript of Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the...
![Page 1: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/1.jpg)
![Page 2: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/2.jpg)
Welcome to Security Awareness Month
Securing the Saluki-Cyber AwarenessHosted by
Prabha Manda & Abby Razer
October 2017WEL
CO
ME
![Page 3: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/3.jpg)
Why Are We Here Today?
• To learn about what it means to be cyber aware
• To learn about and respond to email phishing
• To learn about and respond to text smishing
• To learn about and protect sensitive data
• To learn about how to keep your data secure
• To learn about you and why you are here?
To protect all of us, individually and as an institution, against malicious tampering and interference through our connected systems.
Security is a Critical Issue
![Page 4: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/4.jpg)
Why Are You Here Today?You Are Part of the Solution
• Afraid of Technology
• The World is Scary
• To Get Free Stuff!
• Someone Said to Come
![Page 5: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/5.jpg)
What Does It Mean To Be Cyber Aware?Internet Security
Also known as Online Security ,are steps taken to protect your information online.
Data Protection
The process of protecting data from getting lost or damaged.
Password
A word or string of characters used to prove to the computer, you are who you
say you are.
![Page 6: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/6.jpg)
What is Incident Response?
A preplanned set of actions that identifies an incident and limits damage without causing further harm.
Incident Response
![Page 7: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/7.jpg)
How SIUC Security Works
The SIU Security Team has precise processes and procedures in place to address security issues.
6 Steps of Incident Response
1. Plan and prepare for response
2. Detect events—identify incidents
3. Contain incidents w/o additional harm
4. Acquire evidence
5. Analyze evidence
6. Resolve event or incident
Prabha MandaSecurity Analyst
Incident Response
![Page 8: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/8.jpg)
Can you respond to these incidents?
Kahoot.itLet’s Have Fun!
![Page 9: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/9.jpg)
![Page 10: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/10.jpg)
How should you respond?
• Delete the e-mail
• Don’t click any links
• Check the current scam list at
http://oit.siu.edu/infosecurity/news-and-scams/
Email Phishing
![Page 11: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/11.jpg)
![Page 12: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/12.jpg)
How should you respond?
• Delete the text message
Text Smishing
![Page 13: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/13.jpg)
What is Sensitive Data?
Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.
http://whatis.techtarget.com/definition/sensitive-information
![Page 14: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/14.jpg)
Sensitive Data vs. Not
Sensitive Not Sensitive/Public
Social Security Number Course Catalog
Health Records Schedule of Classes
Driver’s License Number Name
Bank Account Number Business Address
Passport Number Business TelephoneNumber
Student Information Education & Training Background
Human Subjects Research Data
Job Postings
What to protect ?
![Page 15: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/15.jpg)
Laws and Requirements
Laws/Requirements related to sensitive data
• Illinois Personal Information Protection Act (PIPA)
• Payment Card Control Industry-Data Security Standards (PCI-DSS)
• Health Insurance Portability and Accountability Act (HIPAA)
• Family Educational Rights and Privacy Act (FERPA)
• Gramm-Leach Bliley Act
• Red Flags Rule
• SIUC Policy
What are my responsibilities?
![Page 16: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/16.jpg)
What Can I Do to Protect SIU Data?
• Lock your computer ( for windows + L )
• Store passwords securely
• Don’t leak information by accidentally
• sending things to the wrong people,
• saying the wrong thing in the wrong place,
• mislaying printed documents or
• leaving meeting rooms without erasing whiteboards.
• Save your work regularly somewhere safe
• Encrypt sensitive data
• Keep work and personal information separate
Keeping SIU’s Data Secure
![Page 17: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/17.jpg)
What Can I Do to Protect My Information?
• STOP .THINK .CONNECT
• Be careful when connecting to public networks/Wi-Fi
• Secure your home network, make sure your Wi-Fi has a strong password
• Backup your data
• Use Anti-virus and Anti-malware
• Keep your computers up to date.(Operating System updates, browser updates, application updates)- possibly automate updates
Keeping Your Data Secure
![Page 18: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/18.jpg)
We Are Here to Help and Assist
Resources
• http://oit.siu.edu/infosecurity/
• Scam List
• Twitter #SIUCscam
• Information Security Policies
• http://oit.siu.edu/infosecurity/security-day17/presentation-handout.php
![Page 19: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/19.jpg)
19
Questions?
![Page 20: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/20.jpg)
Securing the Saluki-Cyber AwarenessHosted by Prabha Manda & Abby Razer
October 2017
Than
k yo
u
![Page 21: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/21.jpg)
To Contact Our Experts
SalukiTech618-453-5155 [email protected]
Jimmy BrownOffice of Information Technology, Desktop [email protected]
Prabha MandaOffice of Information Technology, [email protected]
Steve AldridgeOffice of Information Technology, [email protected]
Security Resources Available to You
![Page 22: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/22.jpg)
22
We have a new look to make it easier to find what you need.
Visit us at:
http://oit.siu.edu/infosecurity/
![Page 23: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/23.jpg)
ProfessionalAssistance for End User Needs
![Page 24: Welcome to Security Awareness Month · Welcome to Security Awareness Month Securing the Saluki-Cyber Awareness Hosted by Prabha Manda & Abby Razer OME October 2017](https://reader035.fdocuments.us/reader035/viewer/2022081600/6025e20f5eef424f9c68e875/html5/thumbnails/24.jpg)
Type of scam where fraudsters trick a victim into divulging personal or financial information with email lures.
PHISHING
Phreaking
Original form of hacking. Hacking of phone systems
in 1970s.
Fishing
Like fishing with a bait, hackers “fish” for information with email lures.
Ph
Fishing
Login