Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Generalized Security Awareness Training

No description

Jason Pufahl

on 7 February 2018

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Generalized Security Awareness Training

Thank You For
Your Time!

Applying Information Security Fundamentals Will Help Protect Yourself and Your Employer
Know Where Your Data Is
Protect Your Data
Create & Protect Strong passPHRASES
Keep Your Computer (including mobile devices) Maintained
Trust Your Instincts!
Some Final Words…
Back Up & Protect Your Important Data!

Mobile Computers
Laptops & Tablets
Smartphones (Pictures)

Cloud Services Can Be a Great, Inexpensive, Option
Synchronizing is NOT Backup
Data Backups
Install it Once
Update it Daily
Scan Weekly
Antivirus Software
Install ALL Security Patches

Microsoft Windows
Macintosh OS X
Adobe Acrobat Reader
Adobe Flash Player
Microsoft Word, Excel, PowerPoint
Computer Security (Continued)
Beware of Shareware/Freeware/Games
Downloaded from the internet
Sent in an email
Brought in from a USB flash drive

*(Almost) Nothing in Life is Free
Computer/Application Security
Viruses, Spyware, Trojan horse files
PDF Files

Ask the Questions?
Were you expecting it?
Is it from someone you know?
Is the email something you would expect from them?
Does it seem too good to be true?
Are you being asked for your password?
Email Security
Web Browser Security
Web Browser Security

Web Browser
URL – The Only Thing You Can Trust

Computer Security
Computer/Application Security

Scenario 1: Brute Force
It can be your Hotmail account, Facebook, or any other easy target

Scenario 2: Hacking / Cracking
Stealing data as it’s being entered, steal encrypted password files, or read emails or other documents with sensitive data

Scenario 3: Eavesdropping
Listening in on passwords being sent or emails

Scenario 4: They Just Ask!
How Bad Guys Get Passwords
Q: Why are Passwords Such a Big Deal?
A: It Is All About the Money!

Passwords, IT systems and data constitute BIG BUSINESS
Online fraud cost $48 Billion 2016
Organized Crime Results in Targeted Attacks
SSN / CNN / Bank Accounts
Intellectual Property
Research Data
Why Bad Guys Do Bad Things
Password Management

Keep work and personal email separate

Freeze your credit and check your credit scores

Never email, send or post confidential data

Manage your social media presence

Online Privacy
Online Privacy
Password Management Techniques
Computer Security
Data Backups
Key Components to Effective
Information Security

Personal Identity Costs
Social Security Number - $5
Credit Card Number - $2-$90
Physical Credit Card - $180
Bank Account - $80-300
Total Identity - $3500
Identity Reclamation - $631 and ~33 hours

Cited: Panda Security
Data Breach Costs Hit Home
Examples of Data Breaches
Data Breach Costs
Personal Identity Theft
Intellectual Property
Data Loss
Information Security Impacts Everyone
Passphrases are Easier to Remember 
Satisfy Complexity Rules Easily
Passphrases are Next to Impossible to Crack
Passwords vs. Passphrase
To protect the University’s systems, services and data against unauthorized use, disclosure, modification, damage and loss.
UConn's Information Security Office Focus:
You Would Be!
What if you forgot to lock your front door, or close your windows to your home and you were burglarized.

Who would be responsible for your loss ?
You Would Be!
If you gave your house keys to someone and they stole everything in your house, who would be responsible?
Fundamentals In
Information Security

Presented by Jason Pufahl
Chief Information
Security Officer, UConn

Data Breach Costs Hit Home
University Department Costs:

Two years credit monitoring - $36/record
Administrative overhead - $2/record
Flat fee - $500
Assuming 20% opt-in & 10,000 lost records = Cost of $76,500.
Phishing Not Fishing....
Giving Someone Your Password is the Same Thing as Giving Them Your House/Car Keys
How UConn Handles Security
Vulnerability Assessment
Information Security Policies
Incident Response
UConn's Tool for PII Remediation
Security is Your Responsibility
Full transcript