Upload
national-lecet
View
440
Download
1
Tags:
Embed Size (px)
DESCRIPTION
Presented at the LECET Information Technology Conference Washington, DC May 2, 2012 by Carrie S. Leary, Ann Arundel Community College
Citation preview
CybersecurityLECET Information Technology Conference | May 2, 2012
Carrie Leary | Anne Arundel Community College
Background
AACCCenter of Academic
Excellence
AAS Degree in Information Assurance &
Cybersecurity
Certificates
Network Security
Server Administration
CISCO Networking
Forensic
CyberWatchAdvanced Technological
Education Center
Curriculum
K-12 Training
Professional Development
Collegiate Cybersecurity Defense Competitions
OrganizationsPublic & Private Sectors
Research
Training
Awareness
What is Cybersecurity?
Defined as…
Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack
- Merriam-Webster
The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this -Oxford Dictionaries
What are the needs?
96,600 Network & Computer System Administrators
65,700 Information Security Analysts
110,000 Computer Support Specialists
120,000 Computer Systems Analysts
Bureau of Labor Statistics | Employment Change 2010 - 2020
The Problem
Current Workforce
IT Graduates
Workforce
Needs
Identifying the Workforce
Information Technology (IT) jobs found in every industry and across numerous job functions
Lack of job training and skills
Pending baby boom retirements
Lack of interest in STEM fields
Lack career info
1986 - 1996
2000 - 2004
2004 - 2008
2009 - current
Why worry?
Our Nation Loss of Intelligence Critical
Infrastructure/Power Grid
Organizations Loss of Data Reduced
Productivity Financial Loss Loss of Trust by
Customers Bankruptcy
Individuals Identity Theft Financial Loss Inconvenience
The Problem
Current Workforce
IT Graduates
Workforce
Needs
Avoid Weak Passwords
Accessing the Internet
Accessing the Internet
Choose your browser carefully.Select Google Chrome, Mozilla Firefox, of Safari if possible.
Keep Web Browser up-to-date.Install patches as they are released
Use secure websites. Look for “https” when transmitting confidential information.
Never click links.Always type the web address directly into the address bar.
Accessing the Internet
Do not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. should not be used when transmitting confidential information.
Password protect your home WiFiPassword protecting decreased the number of unauthorized users on your connection.
Do not broadcast the SSID of your home WiFi.Hiding the name of your network decreases the number of unauthorized users on your connection
Be careful when selecting and answering Password Recovery Questions.Do not select questions that others know the answer to or can utilize social engineering to determine.
RISK
RISK
RISK
FREE
Accessing the Internet
Do not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. should not be used when transmitting confidential information.
Password protect your home WiFiPassword protecting decreased the number of unauthorized users on your connection.
Do not broadcast the SSID of your home WiFi.Hiding the name of your network decreases the number of unauthorized users on your connection
Be careful when selecting and answering Password Recovery Questions.Do not select questions that others know the answer to or can utilize social engineering to determine.
Accessing the Internet
Do not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. should not be used when transmitting confidential information.
Password protect your home WiFiPassword protecting decreased the number of unauthorized users on your connection.
Do not broadcast the SSID of your home WiFi.Hiding the name of your network decreases the number of unauthorized users on your connection
Be careful when selecting and answering Password Recovery Questions.Do not select questions that others know the answer to or can utilize social engineering to determine.
Accessing the Internet
Do not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. should not be used when transmitting confidential information.
Password protect your home WiFiPassword protecting decreased the number of unauthorized users on your connection.
Do not broadcast the SSID of your home WiFi.Hiding the name of your network decreases the number of unauthorized users on your connection
Be careful when selecting and answering Password Recovery Questions.Do not select questions that others know the answer to or can utilize social engineering to determine.
Evolving Infrastructure
We continue to embrace new technology Mobile Device Virtualization Cloud Computing
Need a workforce versed in specific technical knowledge
As the number of connected devices
increases
storage needs will increase,
the need for data analytics will increase, and
security to defend against robust threats
will be essential
Be Smart with your Smartphone
Only connect to protected WiFi
Be vigilant when clicking web links
Use a complex password
Keep firmware updated
Only download apps from trusted sources
Pay attention to the data the phone is accessing
Cloud Computing
Built on TRUST!
Cloud Computing – Know what to ask
System Downtime Encryption of data (in transit and at rest)
Disaster Recovery Plan Data Retention Policy
Data Integrity Assurance
Identity and Access Management
Regulatory Compliance
Location of Data Centers/
Physical Security
Moving Forward
Awareness and Training are essential!
• Stay Safe Onlinehttp://www.staysafeonline.org/
• National Institute of Standards and Technology (NIST) www.nist.gov
• National Initiative for Cybersecurity Education (NICE)http://csrc.nist.gov/nice/
• CyberWatch ATE Centerwww.cyberwatchcenter.org
• Cyber Marylandhttp://www.cybermaryland.org/
Resources
Questions?Carrie Leary | [email protected] | 410-777-7088
Resources
Stay Safe Onlinehttp://www.staysafeonline.org/
National Institute of Standards and Technology (NIST) www.nist.gov
National Initiative for Cybersecurity Education (NICE)http://csrc.nist.gov/nice/
CyberWatchwww.cyberwatchcenter.org
Cyber Marylandhttp://www.cybermaryland.org/
Resources
http://www.intel.com/content/www/us/en/communications/internet-minute-infographic.html
http://www.confidenttechnologies.com/infographic
http://www.makeuseof.com/tech-fun/the-only-thing-internet-explorer-is-good-for/