Cyber Security Fair. Promoting Safe Secure Technology. January 5, 2010



Similar documents
California State Polytechnic University, Pomona. Desktop Security Standard and Guidelines

SECURITY CONSIDERATIONS FOR LAW FIRMS

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Signal Customized Helpdesk Course

Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.

Principles of Information Assurance Syllabus

WCA WEBINAR SERIES: The Case for Cyber Security Training

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G188eng verdraft)

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

2016 Cyber Security Calendar. Neela, Grade 4 State of Delaware

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011.

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Online Banking Fraud Prevention Recommendations and Best Practices

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

E-Business, E-Commerce

Defending Against Data Beaches: Internal Controls for Cybersecurity

FORBIDDEN - Ethical Hacking Workshop Duration

Loophole+ with Ethical Hacking and Penetration Testing

ASK PC Certified Information Systems Security Expert - CISSE

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

2015 Cyber Security Calendar. Ashlyn, Grade 10 State of Oklahoma

Cyber Security. Securing Your Mobile and Online Banking Transactions

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 276 Windows Security Management

The Ministry of Information & Communication Technology MICT

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Cisco Advanced Services for Network Security

Uncover security risks on your enterprise network

Introduction to Cybersecurity Overview. October 2014

Introduction to WSU

Information Security Basics: Starting a Security Awareness Program at your Station. Seton R. Droppers, CISSP PBS

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Internet threats: steps to security for your small business

EndUser Protection. Peter Skondro. Sophos

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

How To Understand Cyber Security

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Reliance Bank Fraud Prevention Best Practices

Ed McMurray, CISA, CISSP, CTGA CoNetrix

2011 NCSA / McAfee Internet Home Users Survey

Small businesses: What you need to know about cyber security

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them

INFORMATION SECURITY FOR YOUR AGENCY

Information Security Attack Tree Modeling for Enhancing Student Learning

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Hesperbot. Analysts at IKARUS Security Software GmbH successfully removed a self-locking Android Malware from an infected smartphone

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

Research Imperatives

California State Polytechnic University, Pomona. Network Monitoring Guidelines

Cyber Security Education: My Personal Thoughts. Bharat Doshi

Preparing Your Personal Computer to Connect to the VPN

Microsoft Windows Intune: Cloud-based solution

3 day Workshop on Cyber Security & Ethical Hacking

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Preventing Corporate Account Takeover Fraud

A Technical Template for HIPAA Security Compliance

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Introduction. Special thanks to the following individuals who were instrumental in the development of the toolkits:

Websense: Worldwide Leader in Web Filtering Expands into Web Security

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Crosscheck Web Services Patent Pending Automated SOA Compliance and Security Assessment

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

TECHNICAL VULNERABILITY & PATCH MANAGEMENT

Don t Fall Victim to Cybercrime:

Teaching Information Security to Engineering Managers

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

InfoSec Academy Application & Secure Code Track

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Tutorial Letter Semester 1/2016 FEEDBACK TUTORIAL LETTER, ACCOUNTING INFORMATION SYSTEMS (AIS822S) Assignment 1 Solutions and Comments.

STOP.THINK.CONNECT A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION

HIPAA Compliance for Mobile Healthcare. Peter J. Haigh, FHIMSS Verizon

AVeS Cloud Security powered by SYMANTEC TM

PENETRATION TESTING GUIDE. 1

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Web Security School Final Exam

Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

2011 NATIONAL SMALL BUSINESS STUDY

How To Manage A System Vulnerability Management Program

National Cyber Security Awareness Month Seeks #TalentHack Solutions to Overcome the Cybersecurity Skills Gap

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

THOMAS WELCH, CISSP, CPP, CISA, CISM, CFI, CHS-III SUMMARY

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

Countermeasures against Spyware

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Windows 7, Enterprise Desktop Support Technician

G DATA MOBILE MALWARE REPORT

Deploying Firewalls Throughout Your Organization

How are we keeping Hackers away from our UCD networks and computer systems?

Anti- Virus Protection Get real-time protection against viruses, worms, Trojans and rootkits.

Student Tech Security Training. ITS Security Office

Getting Started with Symantec Endpoint Protection

Skyline College Computer Science Program Review Executive Summary

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Transcription:

Cyber Security Fair Promoting Safe Secure Technology January 5, 2010 Anna Carlin Lecturer Computer Information Systems Christopher Laasch IT Administrator Division of Student Affairs

Agenda Expected Learning Outcomes Why we hold the event Target Audience & Marketing Methods of Data Collection Demographics Actual Learning Outcomes Questions

Expected Learning Outcomes Raise level of security awareness Improve program based on student interest and emerging computer security threats

Why hold the event? October is National Cyber Security Awareness Month DHS, NSA, FBI, Educause Cal Poly Pomona is a national resource for cyber awareness Educause Resource Kit Poster and Video Contest SecureIT Conference Most Security tools are behind what crackers are using for attacks

Successful Partnerships SWIFT and MISSA - peer mentoring SAITS funding, time, and hardware Academic Affairs website & event management Computer Information Systems funding & time ISO funding & time I&IT funding & hardware

Computer Information Systems & Computer Science Professors gave extra credit, furlough assignment, exam questions. An event promoted by the Center for Information Assurance as part of their certification and RISSC grant with Mt. Sac Data collected used to propose new GE class Computer Science Department extra credit for attendance Chaffey Cisco Network Academy Mt. SAC A+ certification courses included questions from the event on their final exams along with giving extra credit CSUSB CSUSB Infosec club vanpool CPP Theater Department (2008) Student Health Services

Structure of the program Exhibit Hall Industry and Clubs Educate attendees on security related products Peer mentoring Financial Support Presentations Select topics that people are interested in exploring or learning Choose topics from emerging technologies and/or security treats Live hacking Peer to Peer education Promotes club membership for SWIFT and MISSA Website past presentations and current trends

Target Audience Security s weakest link is people - Social Engineering easiest way to break into systems - Improperly configured security tools open doors Average person is irritated by strong security Technical Focus CIS, CS and ECE Community College Tech Programs Community members with an Interest in security Professional Organizations: ISSA, ISACA Allows us to increase the technical level of presentations

Methods of data collection Bronco Access Card Session Surveys Likert Scale Open Ended Structured Survey

Bronco Access Card SAITS provided service & created standard d template t for Data Warehouse for other Divisional events Accurate attendance counts Complete biographic and major data

Exhibit Hall Attendance by College Attendance by Ethnic Group Presentation Attendance Attendance by Gender

Unknowns? 8% could be attributed to: Students from Cal State San Bernardino student club Students from Mt. Sac s A+ certification classes Students from Chaffey Community College s CISCO Network Academy General public from Daily Bulletin news article

Session Survey Likert Scale Rate the presentation on a scale from 1-5 Security Professionals Microsoft Mode 5 Foundstone Mode 5 Student Teams MISSA Mode 4 SWIFT Mode 4

Open Ended Session Question What did you learn? Passwords are not secure Architecture of security is still the same Tricks of how to secure my PC better How to possibly own my cousins computer How could it have been better? New Hacking Trends Real World Examples If the virus examples could work More time, longer presentations hands on What topics would you want to see next year? Smartphone Hacking Non-profit/low cost security solutions Hands on Different Career Fields More of how to hack Proxy switching, Botnets

Structured Survey Over 300 surveys were collected Rate your security knowledge: Novice Intermediate Expert IØwnu What tools do you use to secure your system? Antivirus i Firewall Automated t Updates WEP/WPA Encrypted files Anti-Spyware Password Has your computer infected with Malware?

Structured Survey Results Rate your security knowledge Novice (33%) Intermediate (59%) Expert (4%) I0wnu (4%) Has your PC ever been infected with malware? Yes (67%) No (33%)

Learning Outcomes Raise level of security awareness Passwords are not secure Architecture of security is still the same Tricks of how to secure my PC better Improve program based on student interest and emerging threats Non-profit/low cost security solutions Hands on

An evolving program Improve program based on student interest and emerging computer security threats Non-profit/low cost security solutions Hands on Reach students, staff, and faculty unaware of the computer security threats on how to protect themselves

Conclusions Unexpected Outcomes Quality of data from bronco access cards Rating on Foundstone presentation switched from advertised General public interest CSUSB vanpool with students Continued partnerships with community colleges Save the Date: October 28, 2010 Copyright 2010, Cal Poly Cyber Security Fair Committee

Questions Contacts t Anna Carlin: acarlin@csupomona.edu Christopher Laasch: claasch@csupomona.edu CSF 2010: Practically Ethical Hacking October 28 - Ursa Major

Resources CPP Cyber Security Fair Website http://www.csupomona.edu/~cyberfair/ Educause NCSAM Resource Kit: https://wiki.internet2.edu/confluence/display/itsg2/ncsam+resource+kit i t t2 / /di l /it 2/NCSAM Stay Safe OnLine http://www.staysafeonline.org/ NYTimes article on Cyber Ninjas http://www.nytimes.com/2010/01/03/education/edlife/03cybersecurity.html