UA Student Security Awareness/Anti- Phishing Campaign
|
|
|
- Diane Norman
- 10 years ago
- Views:
Transcription
1 PROJECT PROPOSAL Posted: 4/21/14 UA Student Security Awareness/Anti- Phishing Campaign OBJECTIVE: University students are attractive targets for identity thieves and hackers. According to the FTC s Consumer Sentinel Network Data Book for 2012, they are among the highest percentage of identity theft victims. Many students do not realize the potential for fraud and do not guard their personal information as closely as they should. Student s Social Security Numbers and birthdates are listed on everything from identification cards to social networking sites, making this information readily available to enterprising thieves. Universities and colleges are also attractive targets because they not only have valuable information, but their open environments make it easier for hackers to infiltrate systems undetected. Creating a student- focused awareness program will provide the following benefits to the UA Community: 1. Foster the security culture, and drive home the concept of security as a habit. 2. Increase students awareness of the resources available to them that are covered by their tech fee. 3. Create collaborative opportunities with UA academic departments that have marketing and audiovisual skill sets. 4. Provide the next generation with strong security habits that they can utilize as they graduate and join the fulltime workforce. PROGRAM: The UA Student Security Awareness/Anti- Phishing Campaign has been entitled the Think Campaign. The main objective of this project is to provide education and awareness to members of the University of Arizona, from students to faculty and staff. Through future efforts by the University of Arizona Information Security team, various risks and threats directed at these key stakeholders can be minimized due to increased user awareness. Initially, the scope of this project is to create a program directed toward the student population. However, the materials developed can easily be adapted and used for other stakeholders, including faculty and staff. The primary goal of the Think Campaign will be to foster a culture committed to security that will minimize inherent risks associated with technology and the internet. Our project will be focused on the stakeholders, and less about the actual technology. In order for this project to have a significant impact on our stakeholders, the following deliverables are proposed:
2 Relatable skits/videos that will touch on the various topics and issues outlined in the Project Description section above. Physical and digital posters, table toppers, free giveaways, newsletters, as well as other outreach materials. Security screensavers on departmental and OSCR computer lab desktop and laptop computers. Presentations to classes, organizations and forums Hands- on interactive activities, such as tent on the mall Enhancement of services includes: Taking a strategic approach, rather than a scatter- gun approach, to educating our student population on securing their information, identities and systems. This is significant, as the student population is by far the largest portion of the UA community. Potential for partnerships with other University units, including Eller College of Management and the College of Fine Arts, with the intent to provide internship opportunities for Marketing and Visual Arts students. These students would be tasked with creating awareness materials that will appeal to their peers and optimize campus security awareness. Additionally, this will provide student interns with portfolio enhancing projects and real- world marketing and visual art experience. Internal efficiencies are measured by a reduction in security incidents, including compromised accounts, compromised systems, and stolen laptops and mobile devices. Initially, the project is confined to work done primarily by three student workers, the Program Manager and the Senior Information Security Analyst. Increased security awareness for undergraduate and graduate students will help to mitigate risk to both University and personal information assets. BUDGET:
3 LAUNCH TIMELINE: UA Information Security has extremely limited funding. As a result, the project team will seek monies from the IT Student Advisory Board (ITSAB) for this project in the coming fiscal year. As well, the team will work to partner with campus organizations that may be able to augment the resources available, which will help with cost savings. Potential collaborations include working with Office of the CIO Marketing and Communications Team, Dean of Students Office, Residence Life, ASUA, Student Union, Student Affairs Marketing, ASUA Bookstores, Greek Life, and Academic Units. The Think Campaign has been logically and functionally separated into 3 distinct sequential phases: 1. Create design and creation of new outreach message/skit/video. 2. Deploy newly created outreach mechanism will be spread throughout UITS, followed by the University at large. 3. After- Action follow- up action item for participants with survey to increase end- user acceptance moving forward. Objectives of the Think Campaign may include: Implement an awareness/outreach program consisting of at least 3 relatable videos and supporting documentation (via print media) pertaining to, but not limited to online reputation, social media, phishing, IT Security, and password protection by the beginning of the 2014/2015 academic year. Implement a sustainable process for conducting student/faculty/staff outreach events by July Staffing Collaboration with academic departments, e.g., Eller College of Management and College of Fine Arts Collaboration with administrative departments, such as Dean of Students Office, OSCR, 24/7 IT Support Center, Residence Life, Student Affairs Marketing, Greek Life, and ASUA Create internship positions in UAIS Create repeatable audience opportunities, such as MIS 111, MIS 415/416/417 Procedures for continuing program PROJECT MEMBERS: Project Sponsor: Christian Schreiber - University Information Security Officer Project Manager: Teresa Banks - Manager, Information Security and Compliance Programs Barry Brummund - Deputy Chief Information Officer, Office of the CIO ITSAB Executive Board Members IT Student Advisory Board, UITS
4 APPENDIX: SAMPLES Sample Think Campaign Topics and Scenarios Online Reputation: 1. Think before you post - Disgruntled employee has a bad day, posts something inappropriate without thinking, later pulled into his supervisor s office and is reprimanded. 2. Think before you post - A hacker will do his homework prior to trying to hack or take over someone s account. If you have personal information that is also security question worthy like secret question: where were you born? on your profile you make it that much easier for intruders to gain access. (like leaving the key under the mat) 3. Think before you act - Student at a party takes unprofessional pictures and they get posted on social media. Next day for job interview employer tells them that they only employ professionals. 4. Think before you act - Disgruntled student goes on rant after finding out the results of his college entrance. Review committee comes across rant and decides not to give student a second chance. Social Media: 1. Think before you post - A student posts their home address and phone number under profile information. They get in an argument with a stranger in class and threats are made. The stranger looks the student up and now knows where they live as well as their phone number. 2. Think before you add - Student trying to get to 10,000 friends on social media doesn t think about who he is adding just how many friends he will have. 3. Think before you share - Student doesn t set privacy settings on account and allows strangers to see personal information. 4. Think before you Tweet - Family household tweets that they will be out on vacation for a week. Come back to find out they were robbed. 5. Think before you Instagram - Student, over time, shares massive amounts of personal photos. Similar to a hacker scoping out a target with available online information, the pictures also allow for the hacker to steal his/her identity. 6. Think before you Vine - Student shares enough short vines of his/her house that a thief is able to scope out the location without ever getting within 100 yards. Phishing: 1. Think before you open - Student sees flashy and sexy headlines in the subject line of numerous s, once he or she opens the , he has in- HTML pictures set to automatically display, therefore leading to a computer virus. 2. Think before you click - Student receives dozens of s every day, tired of verifying their senders and links, ends up getting computer virus that ruins his HDD. 3. Think before you reply - Student is prompted to win a new ipad by numerous s claiming to be University studies, replies with credentials and personal information, identity theft occurs. (SSN).
5 4. Think before you release - Student gets offered a job via . Student replies back with interest. Employer asks for personal information. Student releases sensitive information. (SSN). Antivirus & Firewall: 1. Think before you surf - An unsuspecting student is casually browsing the internet without antivirus. As he moves from website to website, he is unprotected from a plethora of vulnerabilities, contract computer virus. In need of SOPHOS. 2. Think before you download - Another unsuspecting student is trying to download his favorite new music and movies from various unverified websites. In need of McAfee Siteadvisor. (verify Flash and video viewer.) Passwords and Passphrases: 1. Think before you share - Student is in need of help for online quizzes and homework. Shares his password with multiple friends (maybe even through social media) and now his account becomes locked and/or his SSN/UA personal information/financial aid is compromised. 2. Think before you create - Student is prompted to create a new password as his or her previous password has expired. Because he or she is in a rush, a weak password is created. SAMPLE ARTWORK
6
7
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
FTC Fact Sheet Identify Yourself
FTC Fact Sheet Identify Yourself 5 10 15 20 25 30 35 40 You might have heard about identity theft: it s what can happen when a thief gets enough of someone s information to commit fraud. Why should people
Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics
SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced
When Fraud Comes Knocking
When Fraud Comes Knocking Identity theft occurs when someone uses your name, Social Security number, credit card number, or other personal information without your permission. It is a very serious crime.
Introduction to Computer Security
Introduction to Computer Security Rev. Sept 2015 What is Computer Security? 2 Computer Security is the protection of computing systems and the data that they store or access 3 Why is Computer Security
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION
IDENTITY THEFT IT S POSSIBLE@ PROTECT YOUR IDENTITY protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IT S POSSIBLE @ What Is Identity Theft? According to the FBI, identity theft is the fastest
Learn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
STOP THINK CLICK Seven Practices for Safer Computing
Seven Practices for Safer Computing Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than earlier generations
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
Information Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable
what you need to know
A P Identity u b l i c a t i o n o f t h e S o u t h C a r o l i n a D e p a r t m e n Theft t o f C o n s u m e r A f f a i r s what you need to know Step By Step: What To Do After a Security Breach #1:
Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation
Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation June 2009 Cairo, Egypt Joanna P. Crane Identity Theft Program Manager Senior Attorney The views
Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online
Research Conducted By: Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online [ photo here The Teen Online Identity Generation Theft Gap November November 20132012
Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives
Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against
Tips for Banking Online Safely
If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining
BE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
2012 NCSA / McAfee Online Safety Survey
2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security
Digital Consumer s Online Trends and Risks
Digital Consumer s Online Trends and Risks Modern consumers live a full-scale digital life. Their virtual assets like personal photos and videos, work documents, passwords to access social networking and
IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION
IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION @ What Is Identity Theft? IDENTITY THEFT
Protecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot
CYBER INFORMATION SECURITY AWARENESS AND PROTECTION PRACTICES. Strengthening Your Community at the Organizational Level
CYBER INFORMATION SECURITY AWARENESS AND PROTECTION PRACTICES Strengthening Your Community at the Organizational Level Las Vegas, Nevada 2012 Security Awareness and Why is it Important? In today s economic
Activities for Protecting Your Identity and Computer for Middle and High School Students
Activities for Protecting Your Identity and Computer for Middle and High School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these be
Protect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
Fraud and Identity Theft. Megan Stearns, Credit Counselor
Fraud and Identity Theft Megan Stearns, Credit Counselor Agenda Fraud and identity theft statistics Fraud Identity theft Identity theft prevention Protecting your Social Security Number Online prevention
1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
Identity Theft Protection
Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms
National Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
High Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
Identity Theft Problem and Solutions
Identity Theft Problem and Solutions October 7, 2011 Michigan Cyber Summit 2011 Jon Miller Steiger Regional Director The views expressed are those of the speaker and not necessarily those of the FTC or
I ve been breached! Now what?
I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have
Retail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
ANDRA ZAHARIA MARCOM MANAGER
10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal
IDENTITY THEFT: MINIMIZING YOUR RISK
IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social
7 PRACTICES FOR SAFER COMPUTING
7 PRACTICES FOR SAFER COMPUTING The Committee on Social Responsibility Produced in cooperation with the Federal Trade Commission EFFICIENT SHOPPING ACCESS TO INFORMATION, MUSIC, AND GAMES EDUCATIONAL RESOURCES
When you are prompted to enroll, you will be asked to enter a Security Phrase and select/answer three different Challenge Questions.
IMPORTANT SECURITY INFORMATION We take your online security seriously. Your online banking site contains a security feature called Enhanced Authentication. Everyone will be required to enroll in Enhanced
Information Security Awareness: How to Get Users Asking for More
Information Security Awareness: How to Get Users Asking for More Kelley J. Bogart, CISSP Senior Information Security Analyst, University of Arizona Synopsis Any effective information security program has
How-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
How to stay safe online
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
Dean College Social Media Handbook
Dean College Social Media Handbook Goals of this Handbook To help Dean College employees and groups engage with social media in constructive and fun ways while contributing to the overall goals of the
A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014
A Small Business Approach to Big Business Cyber Security Brent Bettis, CISSP 23 September, 2014 1 First, a Video http://www.youtube.com/watch?v=cj8wakqwlna 2 3 Agenda Threat Landscape Strategic Initiatives
How To Protect Your Online Banking From Fraud
DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction
Utica College. Information Security Plan
Utica College Information Security Plan Author: James Farr (Information Security Officer) Version: 1.0 November 1 2012 Contents Introduction... 3 Scope... 3 Information Security Organization... 4 Roles
References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
Basic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
What are the common online dangers?
ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of
Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
Class 3: Identify Tricks and Scams Online
Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary
BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME Executive Summary In support of National Cyber Security Awareness Month (October), ESET and the National Cyber Security Alliance (NCSA) commissioned
ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS
$ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security
Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.
TrendLabs Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. We live out our digital lives on the Internet. There, communication is quicker and easier, and our
Identity Theft Protection
Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity
White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
ITAR Compliance Best Practices Guide
ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations
Computer Security Self-Test: Questions & Scenarios
Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
The Department of Health and Human Services Privacy Awareness Training. Fiscal Year 2015
The Department of Health and Human Services Privacy Awareness Training Fiscal Year 2015 Course Objectives At the end of the course, you will be able to: Define privacy and explain its importance. Identify
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
