34
Cybersecurity LECET Information Technology Conference | May 2, 2012 Carrie Leary | Anne Arundel Community College

Cybersecurity

Embed Size (px)

DESCRIPTION

Presented at the LECET Information Technology Conference Washington, DC May 2, 2012 by Carrie S. Leary, Ann Arundel Community College

Citation preview

Page 1: Cybersecurity

CybersecurityLECET Information Technology Conference | May 2, 2012

Carrie Leary | Anne Arundel Community College

Page 2: Cybersecurity

Background

AACCCenter of Academic

Excellence

AAS Degree in Information Assurance &

Cybersecurity

Certificates

Network Security

Server Administration

CISCO Networking

Forensic

CyberWatchAdvanced Technological

Education Center

Curriculum

K-12 Training

Professional Development

Collegiate Cybersecurity Defense Competitions

OrganizationsPublic & Private Sectors

Research

Training

Awareness

Page 3: Cybersecurity

What is Cybersecurity?

Defined as…

Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack

- Merriam-Webster

The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this -Oxford Dictionaries

Page 4: Cybersecurity
Page 5: Cybersecurity

What are the needs?

96,600 Network & Computer System Administrators

65,700 Information Security Analysts

110,000 Computer Support Specialists

120,000 Computer Systems Analysts

Bureau of Labor Statistics | Employment Change 2010 - 2020

Page 6: Cybersecurity

The Problem

Current Workforce

IT Graduates

Workforce

Needs

Page 7: Cybersecurity

Identifying the Workforce

Information Technology (IT) jobs found in every industry and across numerous job functions

Lack of job training and skills

Pending baby boom retirements

Lack of interest in STEM fields

Lack career info

Page 8: Cybersecurity

1986 - 1996

Page 9: Cybersecurity

2000 - 2004

Page 10: Cybersecurity

2004 - 2008

Page 11: Cybersecurity

2009 - current

Page 12: Cybersecurity
Page 13: Cybersecurity

Why worry?

Our Nation Loss of Intelligence Critical

Infrastructure/Power Grid

Organizations Loss of Data Reduced

Productivity Financial Loss Loss of Trust by

Customers Bankruptcy

Individuals Identity Theft Financial Loss Inconvenience

Page 14: Cybersecurity

The Problem

Current Workforce

IT Graduates

Workforce

Needs

Page 15: Cybersecurity
Page 16: Cybersecurity

Avoid Weak Passwords

Page 17: Cybersecurity

Accessing the Internet

Page 18: Cybersecurity
Page 19: Cybersecurity

Accessing the Internet

Choose your browser carefully.Select Google Chrome, Mozilla Firefox, of Safari if possible.

Keep Web Browser up-to-date.Install patches as they are released

Use secure websites. Look for “https” when transmitting confidential information.

Never click links.Always type the web address directly into the address bar.

Page 20: Cybersecurity
Page 21: Cybersecurity

Accessing the Internet

Do not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. should not be used when transmitting confidential information.

Password protect your home WiFiPassword protecting decreased the number of unauthorized users on your connection.

Do not broadcast the SSID of your home WiFi.Hiding the name of your network decreases the number of unauthorized users on your connection

Be careful when selecting and answering Password Recovery Questions.Do not select questions that others know the answer to or can utilize social engineering to determine.

RISK

RISK

RISK

FREE

Page 22: Cybersecurity

Accessing the Internet

Do not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. should not be used when transmitting confidential information.

Password protect your home WiFiPassword protecting decreased the number of unauthorized users on your connection.

Do not broadcast the SSID of your home WiFi.Hiding the name of your network decreases the number of unauthorized users on your connection

Be careful when selecting and answering Password Recovery Questions.Do not select questions that others know the answer to or can utilize social engineering to determine.

Page 23: Cybersecurity

Accessing the Internet

Do not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. should not be used when transmitting confidential information.

Password protect your home WiFiPassword protecting decreased the number of unauthorized users on your connection.

Do not broadcast the SSID of your home WiFi.Hiding the name of your network decreases the number of unauthorized users on your connection

Be careful when selecting and answering Password Recovery Questions.Do not select questions that others know the answer to or can utilize social engineering to determine.

Page 24: Cybersecurity

Accessing the Internet

Do not use unsecure WiFi.Free WiFi at Starbucks, McDonalds, etc. should not be used when transmitting confidential information.

Password protect your home WiFiPassword protecting decreased the number of unauthorized users on your connection.

Do not broadcast the SSID of your home WiFi.Hiding the name of your network decreases the number of unauthorized users on your connection

Be careful when selecting and answering Password Recovery Questions.Do not select questions that others know the answer to or can utilize social engineering to determine.

Page 25: Cybersecurity

Evolving Infrastructure

We continue to embrace new technology Mobile Device Virtualization Cloud Computing

Need a workforce versed in specific technical knowledge

As the number of connected devices

increases

storage needs will increase,

the need for data analytics will increase, and

security to defend against robust threats

will be essential

Page 26: Cybersecurity
Page 27: Cybersecurity

Be Smart with your Smartphone

Only connect to protected WiFi

Be vigilant when clicking web links

Use a complex password

Keep firmware updated

Only download apps from trusted sources

Pay attention to the data the phone is accessing

Page 28: Cybersecurity
Page 29: Cybersecurity

Cloud Computing

Built on TRUST!

Page 30: Cybersecurity

Cloud Computing – Know what to ask

System Downtime Encryption of data (in transit and at rest)

Disaster Recovery Plan Data Retention Policy

Data Integrity Assurance

Identity and Access Management

Regulatory Compliance

Location of Data Centers/

Physical Security

Page 31: Cybersecurity

Moving Forward

Awareness and Training are essential!

• Stay Safe Onlinehttp://www.staysafeonline.org/

• National Institute of Standards and Technology (NIST) www.nist.gov

• National Initiative for Cybersecurity Education (NICE)http://csrc.nist.gov/nice/

• CyberWatch ATE Centerwww.cyberwatchcenter.org

• Cyber Marylandhttp://www.cybermaryland.org/

Resources

Page 32: Cybersecurity

Questions?Carrie Leary | [email protected] | 410-777-7088

Page 33: Cybersecurity

Resources

Stay Safe Onlinehttp://www.staysafeonline.org/

National Institute of Standards and Technology (NIST) www.nist.gov

National Initiative for Cybersecurity Education (NICE)http://csrc.nist.gov/nice/

CyberWatchwww.cyberwatchcenter.org

Cyber Marylandhttp://www.cybermaryland.org/