SlideShare a Scribd company logo
1 of 20
Personal Digital Security
Implications for the home and the office
Sponsored by
Lydia Kostopoulos, PhD
@LKCYBER
June 4, 2015
Personal Digital Security
What it entails.
What it means for you:
• As an individual
• As an employee for your company
What you can do about it
Personal Digital Security
• Protection of your identity,
communications, accounts,
assets and technology
from malicious intruders.
• Protection of personal
tools: SIM cards,
contactless credit cards,
health and digital security
devices, biometric data,
IOTs, etc.
• Read Terms of Service (ToS) and Privacy Policies before agreeing.
• Update and patch software often.
• Don’t share personal information unless absolutely necessary.
• Don’t click on suspicious links and do not open email attachments from people you don’t know.
• Be conscious of meta-data.
• Read Terms of Service (ToS) and Privacy Policies before agreeing.
• Pay attention to the site link at the top and make sure it is a secure connection.
• Avoid being a phishing victim and pay attention to email headers to make sure they are legit.
HOME
Leakage awareness!
Personal Digital Security
• Read Terms of Service (ToS) and Privacy Policies before agreeing.
• Update and patch software often.
• Don’t share personal information unless absolutely necessary.
• Don’t click on suspicious links and do not open email attachments from people you don’t know.
• Be conscious of meta-data.
• Read Terms of Service (ToS) and Privacy Policies before agreeing.
• Pay attention to the site link at the top and make sure it is a secure connection.
• Avoid being a phishing victim and pay attention to email headers to make sure they are legit.
OFFICE
Policies!
Data Loss Prevention (DLP)
Source: COMSEC Consulting: Information Security
What measures have you taken to secure the following?
Security is an evolving process.
Keep an open mind
to learning!
Awareness
is key.
Stress Reduction Kit
Bang
Head
Here
Directions:
1. Place kit on FIRM surface.
2. Follow directions in circle of kit.
3. Repeat step 2 as necessary, or until unconscious.
4. If unconscious, cease stress reduction activity.
“Digital equivalent of locking
the front door to your home and
not leaving your car keys in the
ignition”. – Marc Goodman
Avoid 85% of
common digital
threats.
Government
Cyber Security Evaluation Tool
(self-assessment)
FBI and Private Sector Partnership
Association of persons who represent businesses,
academic institutions, state and local law enforcement
agencies, and others dedicated to sharing information
and intelligence to prevent hostile acts against the U.S.
• Meetings
• Newsletters
• Briefs
https://ics-cert.us-cert.gov/Assessments
https://www.infragard.org
http://www.stopthinkconnect.org/
https://www.fcc.gov/cyberforsmallbiz
• Cyber Security Tips for Small Businesses
Guide
Keeping Your Social Media Accounts Secure
Defense Media Activity
• Protective Measures
• Checklist
• Social Media Tips
Government
Private Sector
https://www.social-engineer.com
• Social Engineering
• Physical Security
• Information Security
https://www.securingthehuman.org
• Awareness Posters/Presentations
• Newsletter
• Security Awareness Guidance
• Internet Security for Kids
Newsletter on latest phishing trendshttps://www.knowbe4.com
Non-Profit
http://www.antiphishing.org/
• In association with CyLab at Carnegie Mellon
• Education Initiative
• Phishing landing page example
• HTTPS Everywhere Add-On
https://www.eff.org/https-everywhere
https://www.staysafeonline.org/business-safe-online/
Resources for businesses
• Risk Assessment
• Threat monitoring strategies
• Reporting cyber attacks
• Implementing a cybersecurity plan
• Protecting customers
• Training employees
• Training & Videos
• Guides
• Newsletters & Tips
Everyone plays a role in corporate security.
OSAC: Personal Digital Security Presentation

More Related Content

What's hot

Digital de addiction - By Amresh Tiwari
Digital de addiction - By Amresh TiwariDigital de addiction - By Amresh Tiwari
Digital de addiction - By Amresh TiwariAmresh Tiwari
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Lilly Nesbitt's Flipbook- The Impact of Social Media on Mental Health
Lilly Nesbitt's Flipbook- The Impact of Social Media on Mental HealthLilly Nesbitt's Flipbook- The Impact of Social Media on Mental Health
Lilly Nesbitt's Flipbook- The Impact of Social Media on Mental HealthLilly Nesbitt
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying caitlynx48
 
Security and social media
Security and social mediaSecurity and social media
Security and social mediaJP Rains, MBA
 
social media and mental health
social media and mental healthsocial media and mental health
social media and mental healthramkumar g s
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networkingBryan Tran
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide sharebr03wood
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety PresentationMichael Richards
 
339 sigurnost djece na internetu prezentacija-sos2
339 sigurnost djece na internetu prezentacija-sos2339 sigurnost djece na internetu prezentacija-sos2
339 sigurnost djece na internetu prezentacija-sos2Pogled kroz prozor
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power pointmb29thom
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Cyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group AnonymousCyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group Anonymousccastronovo
 
Cyber bullying and internet addiction
Cyber bullying and internet addictionCyber bullying and internet addiction
Cyber bullying and internet addictionJeromeIsturis
 
Bezpieczny Internet - Weronika Kinasz
Bezpieczny Internet - Weronika KinaszBezpieczny Internet - Weronika Kinasz
Bezpieczny Internet - Weronika KinaszJolanta Tokarek
 

What's hot (20)

Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Digital de addiction - By Amresh Tiwari
Digital de addiction - By Amresh TiwariDigital de addiction - By Amresh Tiwari
Digital de addiction - By Amresh Tiwari
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Lilly Nesbitt's Flipbook- The Impact of Social Media on Mental Health
Lilly Nesbitt's Flipbook- The Impact of Social Media on Mental HealthLilly Nesbitt's Flipbook- The Impact of Social Media on Mental Health
Lilly Nesbitt's Flipbook- The Impact of Social Media on Mental Health
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Security and social media
Security and social mediaSecurity and social media
Security and social media
 
social media and mental health
social media and mental healthsocial media and mental health
social media and mental health
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
339 sigurnost djece na internetu prezentacija-sos2
339 sigurnost djece na internetu prezentacija-sos2339 sigurnost djece na internetu prezentacija-sos2
339 sigurnost djece na internetu prezentacija-sos2
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group AnonymousCyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group Anonymous
 
Cyber bullying and internet addiction
Cyber bullying and internet addictionCyber bullying and internet addiction
Cyber bullying and internet addiction
 
Bezpieczny Internet - Weronika Kinasz
Bezpieczny Internet - Weronika KinaszBezpieczny Internet - Weronika Kinasz
Bezpieczny Internet - Weronika Kinasz
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Viewers also liked

Student organization president and vice president training
Student organization president and vice president trainingStudent organization president and vice president training
Student organization president and vice president trainingBelmontSELD
 
Pasquale & ulisses gramática da língua portuguesa - nova edição
Pasquale & ulisses   gramática da língua portuguesa - nova ediçãoPasquale & ulisses   gramática da língua portuguesa - nova edição
Pasquale & ulisses gramática da língua portuguesa - nova ediçãopardal' silva
 
O Urbanismo - de Françoise Choay
O Urbanismo - de Françoise ChoayO Urbanismo - de Françoise Choay
O Urbanismo - de Françoise ChoayAline Naue
 
الشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابع
الشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابعالشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابع
الشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابعnawal al-matary
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyDr. Lydia Kostopoulos
 
Ecology of the Mind
Ecology of the MindEcology of the Mind
Ecology of the Mindpaulla86
 
Metric measurement conversions review
Metric measurement conversions reviewMetric measurement conversions review
Metric measurement conversions reviewAubrey14
 
Gym registration - 2014 Apps for Good Entry
Gym registration - 2014 Apps for Good EntryGym registration - 2014 Apps for Good Entry
Gym registration - 2014 Apps for Good Entryjackojgy
 

Viewers also liked (16)

Student organization president and vice president training
Student organization president and vice president trainingStudent organization president and vice president training
Student organization president and vice president training
 
กำเนิด
กำเนิดกำเนิด
กำเนิด
 
ฟิสิกส์พื้นฐาน
ฟิสิกส์พื้นฐานฟิสิกส์พื้นฐาน
ฟิสิกส์พื้นฐาน
 
Pasquale & ulisses gramática da língua portuguesa - nova edição
Pasquale & ulisses   gramática da língua portuguesa - nova ediçãoPasquale & ulisses   gramática da língua portuguesa - nova edição
Pasquale & ulisses gramática da língua portuguesa - nova edição
 
O Urbanismo - de Françoise Choay
O Urbanismo - de Françoise ChoayO Urbanismo - de Françoise Choay
O Urbanismo - de Françoise Choay
 
الشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابع
الشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابعالشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابع
الشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابع
 
A&a v2
A&a v2A&a v2
A&a v2
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
 
สถิติอ้าง
สถิติอ้างสถิติอ้าง
สถิติอ้าง
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
 
Ecology of the Mind
Ecology of the MindEcology of the Mind
Ecology of the Mind
 
Presentation1
Presentation1Presentation1
Presentation1
 
Presentation1
Presentation1Presentation1
Presentation1
 
Metric measurement conversions review
Metric measurement conversions reviewMetric measurement conversions review
Metric measurement conversions review
 
Gym registration - 2014 Apps for Good Entry
Gym registration - 2014 Apps for Good EntryGym registration - 2014 Apps for Good Entry
Gym registration - 2014 Apps for Good Entry
 
สารเคมีในเกษตรกรรมและอุตสาหกรรม
สารเคมีในเกษตรกรรมและอุตสาหกรรมสารเคมีในเกษตรกรรมและอุตสาหกรรม
สารเคมีในเกษตรกรรมและอุตสาหกรรม
 

Similar to OSAC: Personal Digital Security Presentation

How Much Do You Trust Email?
How Much Do You Trust Email?How Much Do You Trust Email?
How Much Do You Trust Email?Echoworx
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxvasidharta
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measuresManish Singh
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miismcgilla
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal lifeNathan Lesser
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar SessionKalilur Rahman
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 

Similar to OSAC: Personal Digital Security Presentation (20)

Data Privacy
Data PrivacyData Privacy
Data Privacy
 
How Much Do You Trust Email?
How Much Do You Trust Email?How Much Do You Trust Email?
How Much Do You Trust Email?
 
Security Awareness Presentation Fall 2013
Security Awareness Presentation Fall 2013Security Awareness Presentation Fall 2013
Security Awareness Presentation Fall 2013
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacy
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miis
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal life
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Idenity Theft
Idenity TheftIdenity Theft
Idenity Theft
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
E commerce
E commerce E commerce
E commerce
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 

More from Dr. Lydia Kostopoulos

Versatility at the Tip of the Spear: Food Security and the Utility of SOF
Versatility at the  Tip of the Spear:  Food Security and  the Utility of SOFVersatility at the  Tip of the Spear:  Food Security and  the Utility of SOF
Versatility at the Tip of the Spear: Food Security and the Utility of SOFDr. Lydia Kostopoulos
 
The Corporate Social Responsibility of Artificial Intelligence
The Corporate Social Responsibility  of Artificial IntelligenceThe Corporate Social Responsibility  of Artificial Intelligence
The Corporate Social Responsibility of Artificial IntelligenceDr. Lydia Kostopoulos
 
The Longevity Dividend: What advancements in longevity science mean for indiv...
The Longevity Dividend: What advancements in longevity science mean for indiv...The Longevity Dividend: What advancements in longevity science mean for indiv...
The Longevity Dividend: What advancements in longevity science mean for indiv...Dr. Lydia Kostopoulos
 
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...Dr. Lydia Kostopoulos
 
Imagination Performance: Thinking Beyond GPT
Imagination Performance: Thinking Beyond GPT Imagination Performance: Thinking Beyond GPT
Imagination Performance: Thinking Beyond GPT Dr. Lydia Kostopoulos
 
Decoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDecoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDr. Lydia Kostopoulos
 
Micro Journaling - Intermediate Cycle Tracker
Micro Journaling - Intermediate Cycle TrackerMicro Journaling - Intermediate Cycle Tracker
Micro Journaling - Intermediate Cycle TrackerDr. Lydia Kostopoulos
 
Decoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDecoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDr. Lydia Kostopoulos
 
Strategic Foresight: Sense-making in an Era of Rapid Change
Strategic Foresight: Sense-making in an Era of Rapid ChangeStrategic Foresight: Sense-making in an Era of Rapid Change
Strategic Foresight: Sense-making in an Era of Rapid ChangeDr. Lydia Kostopoulos
 
Technological Surrogacy & Predictive Powers
Technological Surrogacy & Predictive PowersTechnological Surrogacy & Predictive Powers
Technological Surrogacy & Predictive PowersDr. Lydia Kostopoulos
 
Humans over Hardware: Posturing SOF for the Future
Humans over Hardware:  Posturing SOF for the FutureHumans over Hardware:  Posturing SOF for the Future
Humans over Hardware: Posturing SOF for the FutureDr. Lydia Kostopoulos
 
The Mindset to Thrive in Uncertain, Turbulent & Exponential Times
The Mindset to Thrive in Uncertain, Turbulent & Exponential TimesThe Mindset to Thrive in Uncertain, Turbulent & Exponential Times
The Mindset to Thrive in Uncertain, Turbulent & Exponential TimesDr. Lydia Kostopoulos
 
Leadx: Public-Private Partnership Exercise Handout
Leadx: Public-Private Partnership Exercise HandoutLeadx: Public-Private Partnership Exercise Handout
Leadx: Public-Private Partnership Exercise HandoutDr. Lydia Kostopoulos
 
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...Dr. Lydia Kostopoulos
 
Part IV: Workwear Fashion, Human Anatomy, Transparency & Technology
Part IV: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart IV: Workwear Fashion, Human Anatomy, Transparency & Technology
Part IV: Workwear Fashion, Human Anatomy, Transparency & TechnologyDr. Lydia Kostopoulos
 
Part III: Workwear Fashion, Human Anatomy, Transparency & Technology
Part III: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart III: Workwear Fashion, Human Anatomy, Transparency & Technology
Part III: Workwear Fashion, Human Anatomy, Transparency & TechnologyDr. Lydia Kostopoulos
 
Part II: Workwear Fashion, Human Anatomy, Transparency & Technology
Part II: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart II: Workwear Fashion, Human Anatomy, Transparency & Technology
Part II: Workwear Fashion, Human Anatomy, Transparency & TechnologyDr. Lydia Kostopoulos
 
Part I: Workwear Fashion, Human Anatomy, Transparency & Technology
Part I: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart I: Workwear Fashion, Human Anatomy, Transparency & Technology
Part I: Workwear Fashion, Human Anatomy, Transparency & TechnologyDr. Lydia Kostopoulos
 
#ArtAboutAI - The First Pieces [Digital Exhibit]
#ArtAboutAI - The First Pieces [Digital Exhibit]#ArtAboutAI - The First Pieces [Digital Exhibit]
#ArtAboutAI - The First Pieces [Digital Exhibit]Dr. Lydia Kostopoulos
 

More from Dr. Lydia Kostopoulos (20)

Versatility at the Tip of the Spear: Food Security and the Utility of SOF
Versatility at the  Tip of the Spear:  Food Security and  the Utility of SOFVersatility at the  Tip of the Spear:  Food Security and  the Utility of SOF
Versatility at the Tip of the Spear: Food Security and the Utility of SOF
 
The Corporate Social Responsibility of Artificial Intelligence
The Corporate Social Responsibility  of Artificial IntelligenceThe Corporate Social Responsibility  of Artificial Intelligence
The Corporate Social Responsibility of Artificial Intelligence
 
The Longevity Dividend: What advancements in longevity science mean for indiv...
The Longevity Dividend: What advancements in longevity science mean for indiv...The Longevity Dividend: What advancements in longevity science mean for indiv...
The Longevity Dividend: What advancements in longevity science mean for indiv...
 
Letter from the Frontline in 2050
Letter from the Frontline in 2050Letter from the Frontline in 2050
Letter from the Frontline in 2050
 
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
 
Imagination Performance: Thinking Beyond GPT
Imagination Performance: Thinking Beyond GPT Imagination Performance: Thinking Beyond GPT
Imagination Performance: Thinking Beyond GPT
 
Decoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDecoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic Capabilities
 
Micro Journaling - Intermediate Cycle Tracker
Micro Journaling - Intermediate Cycle TrackerMicro Journaling - Intermediate Cycle Tracker
Micro Journaling - Intermediate Cycle Tracker
 
Decoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDecoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic Capabilities
 
Strategic Foresight: Sense-making in an Era of Rapid Change
Strategic Foresight: Sense-making in an Era of Rapid ChangeStrategic Foresight: Sense-making in an Era of Rapid Change
Strategic Foresight: Sense-making in an Era of Rapid Change
 
Technological Surrogacy & Predictive Powers
Technological Surrogacy & Predictive PowersTechnological Surrogacy & Predictive Powers
Technological Surrogacy & Predictive Powers
 
Humans over Hardware: Posturing SOF for the Future
Humans over Hardware:  Posturing SOF for the FutureHumans over Hardware:  Posturing SOF for the Future
Humans over Hardware: Posturing SOF for the Future
 
The Mindset to Thrive in Uncertain, Turbulent & Exponential Times
The Mindset to Thrive in Uncertain, Turbulent & Exponential TimesThe Mindset to Thrive in Uncertain, Turbulent & Exponential Times
The Mindset to Thrive in Uncertain, Turbulent & Exponential Times
 
Leadx: Public-Private Partnership Exercise Handout
Leadx: Public-Private Partnership Exercise HandoutLeadx: Public-Private Partnership Exercise Handout
Leadx: Public-Private Partnership Exercise Handout
 
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
 
Part IV: Workwear Fashion, Human Anatomy, Transparency & Technology
Part IV: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart IV: Workwear Fashion, Human Anatomy, Transparency & Technology
Part IV: Workwear Fashion, Human Anatomy, Transparency & Technology
 
Part III: Workwear Fashion, Human Anatomy, Transparency & Technology
Part III: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart III: Workwear Fashion, Human Anatomy, Transparency & Technology
Part III: Workwear Fashion, Human Anatomy, Transparency & Technology
 
Part II: Workwear Fashion, Human Anatomy, Transparency & Technology
Part II: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart II: Workwear Fashion, Human Anatomy, Transparency & Technology
Part II: Workwear Fashion, Human Anatomy, Transparency & Technology
 
Part I: Workwear Fashion, Human Anatomy, Transparency & Technology
Part I: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart I: Workwear Fashion, Human Anatomy, Transparency & Technology
Part I: Workwear Fashion, Human Anatomy, Transparency & Technology
 
#ArtAboutAI - The First Pieces [Digital Exhibit]
#ArtAboutAI - The First Pieces [Digital Exhibit]#ArtAboutAI - The First Pieces [Digital Exhibit]
#ArtAboutAI - The First Pieces [Digital Exhibit]
 

Recently uploaded

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

OSAC: Personal Digital Security Presentation

  • 1. Personal Digital Security Implications for the home and the office Sponsored by Lydia Kostopoulos, PhD @LKCYBER June 4, 2015
  • 2. Personal Digital Security What it entails. What it means for you: • As an individual • As an employee for your company What you can do about it
  • 3. Personal Digital Security • Protection of your identity, communications, accounts, assets and technology from malicious intruders. • Protection of personal tools: SIM cards, contactless credit cards, health and digital security devices, biometric data, IOTs, etc.
  • 4.
  • 5. • Read Terms of Service (ToS) and Privacy Policies before agreeing. • Update and patch software often. • Don’t share personal information unless absolutely necessary. • Don’t click on suspicious links and do not open email attachments from people you don’t know. • Be conscious of meta-data. • Read Terms of Service (ToS) and Privacy Policies before agreeing. • Pay attention to the site link at the top and make sure it is a secure connection. • Avoid being a phishing victim and pay attention to email headers to make sure they are legit. HOME Leakage awareness!
  • 7. • Read Terms of Service (ToS) and Privacy Policies before agreeing. • Update and patch software often. • Don’t share personal information unless absolutely necessary. • Don’t click on suspicious links and do not open email attachments from people you don’t know. • Be conscious of meta-data. • Read Terms of Service (ToS) and Privacy Policies before agreeing. • Pay attention to the site link at the top and make sure it is a secure connection. • Avoid being a phishing victim and pay attention to email headers to make sure they are legit. OFFICE Policies!
  • 9. Source: COMSEC Consulting: Information Security
  • 10. What measures have you taken to secure the following?
  • 11.
  • 12.
  • 13. Security is an evolving process. Keep an open mind to learning! Awareness is key. Stress Reduction Kit Bang Head Here Directions: 1. Place kit on FIRM surface. 2. Follow directions in circle of kit. 3. Repeat step 2 as necessary, or until unconscious. 4. If unconscious, cease stress reduction activity.
  • 14. “Digital equivalent of locking the front door to your home and not leaving your car keys in the ignition”. – Marc Goodman Avoid 85% of common digital threats.
  • 15. Government Cyber Security Evaluation Tool (self-assessment) FBI and Private Sector Partnership Association of persons who represent businesses, academic institutions, state and local law enforcement agencies, and others dedicated to sharing information and intelligence to prevent hostile acts against the U.S. • Meetings • Newsletters • Briefs https://ics-cert.us-cert.gov/Assessments https://www.infragard.org http://www.stopthinkconnect.org/ https://www.fcc.gov/cyberforsmallbiz • Cyber Security Tips for Small Businesses Guide Keeping Your Social Media Accounts Secure Defense Media Activity • Protective Measures • Checklist • Social Media Tips
  • 17. Private Sector https://www.social-engineer.com • Social Engineering • Physical Security • Information Security https://www.securingthehuman.org • Awareness Posters/Presentations • Newsletter • Security Awareness Guidance • Internet Security for Kids Newsletter on latest phishing trendshttps://www.knowbe4.com
  • 18. Non-Profit http://www.antiphishing.org/ • In association with CyLab at Carnegie Mellon • Education Initiative • Phishing landing page example • HTTPS Everywhere Add-On https://www.eff.org/https-everywhere https://www.staysafeonline.org/business-safe-online/ Resources for businesses • Risk Assessment • Threat monitoring strategies • Reporting cyber attacks • Implementing a cybersecurity plan • Protecting customers • Training employees • Training & Videos • Guides • Newsletters & Tips
  • 19. Everyone plays a role in corporate security.

Editor's Notes

  1. Image source: http://blockandnation.com/office/cms/wp-content/uploads/presentation.png
  2. Image source: https://ec.europa.eu/digital-agenda/sites/digital-agenda/files/cybersecurity.jpg
  3. Image source: http://deloitteblog.co.za.www102.cpt1.host-h.net/wp-content/uploads/2012/11/Cyber-Crime-Security.png http://utc.fsu.edu/images/memlog.png http://icons.iconarchive.com/icons/icons-land/vista-people/256/Office-Customer-Female-Dark-icon.png http://www2.psd100.com/ppp/2013/11/2801/Women-business-users-1128025128.png http://i.kinja-img.com/gawker-media/image/upload/s--bscpo9YZ--/c_fit,fl_progressive,q_80,w_320/187xkwy3ipvo4png.png https://securitycentric.com.au/images/articles/byod.png http://www.thearcnlc.org/images/WAI/ss-card.png http://www.trinitychristian.info/sites/default/files/calendar_icon.png http://shoppingdarbar.com/images/credit-card.png https://e2e.ti.com/cfs-file/__key/communityserver-blogs-components-weblogfiles/00-00-00-04-89/2248.Remote-home-control-shutterstock_5F00_143542750.jpg https://cdn1.iconfinder.com/data/icons/credit-card-icons/512/cards.png http://jerryching.no-ip.org/Software/Photo/Icon/Windows%207%20Blue%20Icons%20&%20Cursors/PNG/Folders/Documents.png http://icons.iconarchive.com/icons/visualpharm/finance/256/credit-card-icon.png http://images.sodahead.com/polls/002325777/5831125244_game_consoles_h_xlarge.png http://icons.iconarchive.com/icons/itzikgur/my-seven/512/Pictures-Canon-icon.png http://www.outsideline.co.uk/blog/wp-content/uploads/2012/10/newsletterOSL_13.101258.jpg
  4. Image source: http://i.dailymail.co.uk/i/pix/2013/03/29/article-2300976-18FD128D000005DC-500_634x631.jpg http://buttehumane.org/page/_files/dog_cat.png https://blogs.sans.org/securingthehuman/files/2011/06/STH-BinaryFamily1.png http://gallery.yopriceville.com/var/albums/Free-Clipart-Pictures/Happy-Birthday-PNG/Happy_BirthdayCake_PNG_Clipart_Picture.png?m=1421925579
  5. Image source: http://www.computerexpressohio.com/images/Computer_Security.png http://atoztolet.com/images/privacypolicy.png http://www.computing.co.uk/IMG/830/208830/362-ca-03-phishing-emails-illo.jpg https://www.hallaminternet.com/assets/https.jpg https://cdn.tutsplus.com/psd/uploads/legacy/psdtutsarticles/roundup_2009_12_1/5.jpg
  6. Image source: http://www.proximex.com/sites/default/files/header_sol_corpsecurity.png http://cdn2.hubspot.net/hub/30658/file-25638968-jpg/images/corporate_security-resized-600.jpg https://newpagedigital.files.wordpress.com/2013/04/pdf-jpg-word-icons2.jpg http://www.verypdf.com/wordpress/wp-content/uploads/2014/04/image_thumb21.png
  7. Image source: http://www.computerexpressohio.com/images/Computer_Security.png http://atoztolet.com/images/privacypolicy.png http://www.computing.co.uk/IMG/830/208830/362-ca-03-phishing-emails-illo.jpg https://www.hallaminternet.com/assets/https.jpg http://policytool.net/images/privacy-policy-graphic.jpg
  8. Image source: http://cdn.socialh.com/wp-content/uploads/2013/03/data-leakage.jpg
  9. Source: http://blog.comsecglobal.com/2011/02/evolution-of-data-loss-prevention.html Image source: Image source: http://i.i.cbsi.com/cnwk.1d/i/tim2/2013/08/30/TrashIconX.png http://www.wpclipart.com/office/trash/paper_shredder.png http://totaltechnology.ae/totaltechnology/mob-site-total/services/icons_services/socialmedia.png https://billmullins.files.wordpress.com/2010/08/image11.png http://now.symassets.com/now/en/GB_SITE/pu/images/Non-Product/Misc/img_cyber_criminal_283x229.png
  10. Image source: http://corporateserver.cortado.com/portals/24/images/ProductTour/MDM/mc_controlpanel_circles.png
  11. Image source: http://res.cloudinary.com/hacksurfer/image/upload/v1399329154/wd9nwlfy9nekmgrtavkt.png
  12. Image source: http://3.bp.blogspot.com/-5-JrXm4uhTU/T4cd_4M14CI/AAAAAAAAAh0/3uIyohJ8Qns/s1600/9240672-a-metal-toggle-switch-with-plate-reading-open-mind-and-closed-mind-flipped-into-the-open-minded-posi.jpg https://badgeville.com/sites/default/files/styles/612x336_blog/public/blog/plants.jpg?itok=hfY1jId8 http://previewcf.turbosquid.com/Preview/2014/05/25__23_00_00/skelton_key2.pnga6f30a1e-9692-4e91-8ca9-2ad6e7da364eLarger.jpg
  13. http://www.futurecrimesbook.com/protect-yourself-the-update-protocol http://www.futurecrimesbook.com/wp-content/uploads/2015/02/futurecrimes_bookshot2.png
  14. DHS – CSET https://ics-cert.us-cert.gov/Assessments Infragard - https://www.infragard.org/ http://affiliate-101.com/wp-content/uploads/2015/04/free-resources-to-learn-affiliate-marketing.jpg DOD - http://www.defense.gov/documents/WEB_Guide_to_Keeping_Your_Social_Media_Accounts_Secure_2015.pdf Stop Think Connect: http://www.stopthinkconnect.org/ FCC https://www.fcc.gov/cyberforsmallbiz SANS – Secure the Human http://www.securingthehuman.org/ Social-Engineer.com Podcasts https://www.social-engineer.com/ http://www.social-engineer.org/category/podcast/ KnowBe4 - http://www.knowbe4.com http://www.knowbe4.com/cyberheist-news/ Image source: http://upload.wikimedia.org/wikipedia/commons/thumb/8/8a/Seal_of_the_United_States_Department_of_Homeland_Security.svg/1027px-Seal_of_the_United_States_Department_of_Homeland_Security.svg.png http://www.fbi.gov/about-us/history/seal-motto/image/fbi_seal.jpg https://pbs.twimg.com/profile_images/148495155/infragard_seal-full.jpg https://ics-cert.us-cert.gov/sites/default/files/cset_banner_noVersion.png https://www.offensive-security.com/wp-content/uploads/2009/09/se400.jpg http://fhmin.org/wp-content/uploads/sites/2/2013/11/podcast.jpg http://web.usca.edu/dotAsset/e60c99ae-fd76-4eb3-8315-66cef7affa31.gif http://www.plus91.in/wp-content/themes/twentytwelve/images/news.png http://thedailyjournalist.com/wp-content/uploads/2012/04/Infragard-1.jpg http://www.eci.com/blog/images/3-6-12%20tabletop%20meeting.jpg http://readysouthflorida.org/wp-content/uploads/2013/10/stop-think-connect.gif
  15. Poster From: http://www.stopthinkconnect.org/resources/f
  16. DHS – CSET https://ics-cert.us-cert.gov/Assessments Infragard - https://www.infragard.org/ http://affiliate-101.com/wp-content/uploads/2015/04/free-resources-to-learn-affiliate-marketing.jpg SANS – Secure the Human http://www.securingthehuman.org/ Social-Engineer.com Podcasts https://www.social-engineer.com/ http://www.social-engineer.org/category/podcast/ KnowBe4 - http://www.knowbe4.com http://www.knowbe4.com/cyberheist-news/ Image source: http://upload.wikimedia.org/wikipedia/commons/thumb/8/8a/Seal_of_the_United_States_Department_of_Homeland_Security.svg/1027px-Seal_of_the_United_States_Department_of_Homeland_Security.svg.png http://www.fbi.gov/about-us/history/seal-motto/image/fbi_seal.jpg https://pbs.twimg.com/profile_images/148495155/infragard_seal-full.jpg https://ics-cert.us-cert.gov/sites/default/files/cset_banner_noVersion.png https://www.offensive-security.com/wp-content/uploads/2009/09/se400.jpg http://fhmin.org/wp-content/uploads/sites/2/2013/11/podcast.jpg http://web.usca.edu/dotAsset/e60c99ae-fd76-4eb3-8315-66cef7affa31.gif http://webbiquity.com/wp-content/uploads/2011/02/Email-Icon.jpg
  17. Stay Safe Online https://www.staysafeonline.org/business-safe-online/ Center for Internet Security https://msisac.cisecurity.org/ https://msisac.cisecurity.org/resources/videos/free-training.cfm Anti-Phishing Working Group http://www.antiphishing.org/ http://education.apwg.org/safety-messaging-convention/ https://www.eff.org/https-everywhere Image source: http://docs.apwg.org/images/logo.gif http://siliconangle.com/files/2011/06/electronicfrontierfoundation.png http://www.paritynews.com/wp-content/uploads/2013/08/https-everywhere.jpg
  18. Image source: http://eccitsolutions.com/wp-content/uploads/2013/01/computer-network-security.png
  19. https://blog.cyveillance.com/wp-content/uploads/2011/02/batman-robin-fourwhere-agent-x-comic.jpg http://3.bp.blogspot.com/-93eMF7KJDVE/UtgH01MGiRI/AAAAAAAAA_o/6quKMAvTzAs/s1600/140116-questions.jpg