Cyber Security Awareness Day October 17, 2013 Welcome Dr. Amanda Lee Vice President of Instructional Services Session 1 Are You Protected? Mark Grover & Garrett Baltezegar CFCC Instructors Why are we here? Awareness Definition: a. Knowledge or perception of a situation or fact b. Concern about and well-informed interest in a particular situation or development Knowledge Resources: www.cfcc.edu/cybersecurity Topics Terminology Passwords Malware Wireless How do I protect myself? Topics Terminology Passwords Malware Wireless How do I protect myself? Terminology Threat Vulnerability A weakness that allows a threat to bypass security Malware An event or object that may defeat security resulting in a loss. Any program intended to cause harm. Virus Performs annoying or destructive activities – requires user intervention to activate. Terminology Worm Trojan Program advertised to do one thing but does something else. Hacker Takes advantage of vulnerabilities to enter a computer – does NOT require user interaction to spread. A person that illegally breaks into, or attempts to break into, a computer system. Phishing Emails that attempt to trick users into surrendering private information or visit malicious websites. Topics Terminology Passwords Malware Wireless How do I protect myself? Passwords Weak Passwords: Found in Dictionary Too Short Contain Personal Information Reused multiple times Not Changed Passwords Which password is better? Xp4!e% Thisisaverylongpassword Length ALWAYS trumps complexity http://howsecureismypassword.net Passwords Any password that can be memorized is a weak password. Solution? Use a PASSPHRASE NEVER share your password with anyone. Topics Terminology Passwords Malware Wireless How do I protect myself? Malware Can you recognize Malware? Can you recognize a Phishing attack? Demonstration Topics Terminology Passwords Malware Wireless How do I protect myself? Wireless Routers Use STRONG passwords to lock down the device Disable Use STRONG wireless security options Use Remote Management WPA2 instead of WEP Bluetooth Turn OFF if not actively in use Topics Terminology Passwords Malware Wireless How do I protect myself? How do I protect myself? Keep your Operating System up to date Install and update your AntiVirus solution Install and update a Malware scanning solution Recognize Phishing Scams Use STRONG Passwords Backup Important files Session 2 Topics in Information Security Zachary Mitcham Chief Information Security Officer University of North Carolina Wilmington Cyber Security Awareness Day October 17, 2013