2. Background
AACC CyberWatch Organizations
Center of Academic Advanced Technological Public & Private Sectors
Excellence Education Center
Curriculum
AAS Degree in Research
Information Assurance &
Cybersecurity
K-12 Training
Training
Certificates
Professional Development
Network Security
Server Administration
CISCO Networking Collegiate Cybersecurity Awareness
Forensic Defense Competitions
3. What is Cybersecurity?
Defined as…
Measures taken to protect a computer or computer system (as
on the Internet) against unauthorized access or attack
- Merriam-Webster
The state of being protected against the criminal or
unauthorized use of electronic data, or the measures taken to
achieve this -Oxford Dictionaries
4.
5. What are the needs?
96,600 Network & Computer System Administrators
65,700 Information Security Analysts
110,000 Computer Support Specialists
120,000 Computer Systems Analysts
Bureau of Labor Statistics | Employment Change 2010 - 2020
7. Identifying the Workforce
Information Technology (IT)
jobs found in every industry
and across numerous job
functions
Lack of job training and skills
Pending baby boom
retirements
Lack of interest in STEM
fields
Lack career info
13. Why worry?
Our Nation Organizations Individuals
Loss of Intelligence Loss of Data Identity Theft
Critical Reduced Financial Loss
Infrastructure/ Productivity Inconvenience
Power Grid Financial Loss
Loss of Trust by
Customers
Bankruptcy
19. Accessing the Internet
Choose your browser carefully.
Select Google Chrome, Mozilla
Firefox, of Safari if possible.
Keep Web Browser up-to-date.
Install patches as they are released
Use secure websites.
Look for “https” when transmitting
confidential information.
Never click links.
Always type the web address
directly into the address bar.
20.
21. Accessing the Internet
Do not use unsecure WiFi.
Free WiFi at Starbucks, McDonalds, etc. should
not be used when transmitting confidential
information.
Password protect your home WiFi
Password protecting decreased the number of
unauthorized users on your connection.
Do not broadcast the SSID of your home WiFi.
Hiding the name of your network decreases the
number of unauthorized users on your connection
Be careful when selecting and answering Password
Recovery Questions.
Do not select questions that others know the
answer to or can utilize social engineering to
determine.
22. Accessing the Internet
Do not use unsecure WiFi.
Free WiFi at Starbucks, McDonalds, etc. should
not be used when transmitting confidential
information.
Password protect your home WiFi
Password protecting decreased the number of
unauthorized users on your connection.
Do not broadcast the SSID of your home WiFi.
Hiding the name of your network decreases the
number of unauthorized users on your connection
Be careful when selecting and answering Password
Recovery Questions.
Do not select questions that others know the
answer to or can utilize social engineering to
determine.
23. Accessing the Internet
Do not use unsecure WiFi.
Free WiFi at Starbucks, McDonalds, etc. should
not be used when transmitting confidential
information.
Password protect your home WiFi
Password protecting decreased the number of
unauthorized users on your connection.
Do not broadcast the SSID of your home WiFi.
Hiding the name of your network decreases the
number of unauthorized users on your connection
Be careful when selecting and answering Password
Recovery Questions.
Do not select questions that others know the
answer to or can utilize social engineering to
determine.
24. Accessing the Internet
Do not use unsecure WiFi.
Free WiFi at Starbucks, McDonalds, etc. should
not be used when transmitting confidential
information.
Password protect your home WiFi
Password protecting decreased the number of
unauthorized users on your connection.
Do not broadcast the SSID of your home WiFi.
Hiding the name of your network decreases the
number of unauthorized users on your connection
Be careful when selecting and answering Password
Recovery Questions.
Do not select questions that others know the
answer to or can utilize social engineering to
determine.
25. Evolving Infrastructure
We continue to embrace new technology
Mobile Device
Virtualization
Cloud Computing
Need a workforce versed in specific technical knowledge
As the number of the need for data security to defend
storage needs will
connected devices analytics will against robust threats
increase,
increases increase, and will be essential
26.
27. Be Smart with your Smartphone
Only connect to
protected WiFi
Be vigilant when
clicking web links
Use a complex password
Keep firmware updated
Only download apps from
trusted sources
Pay attention to
the data the phone
is accessing
30. Cloud Computing – Know what to ask
System Downtime Encryption of data Disaster Recovery Data Retention Policy
(in transit and at rest) Plan
Data Integrity Identity and Access Regulatory Location of Data
Assurance Management Compliance Centers/
Physical Security
31. Moving Forward
Awareness and Training are essential!
Resources
• Stay Safe Online
http://www.staysafeonline.org/
• National Institute of Standards and Technology (NIST)
www.nist.gov
• National Initiative for Cybersecurity Education
(NICE)http://csrc.nist.gov/nice/
• CyberWatch ATE Center
www.cyberwatchcenter.org
• Cyber Maryland
http://www.cybermaryland.org/
What is missing is a skilled competent workforce to fill all of the open job. Far more than we have applicants to pursue
Why do we need so many? Let’s talk about the changes that have occurred in the industry and how the landscape has changed.
What is missing is a skilled competent workforce to fill all of the open job. Far more than we have applicants to pursueWe are not able to develop technology as fast as neededNeed to get individual users to feel accountable and practice safe security
Biggest threats come from within the organization – not following polices and guidelines
Technology is now so accessible to so many# of connected device – storage, analytics, and security to protect against robust threats
What does your phone know about you? What are you giving it access to?
Only download apps from trusted sources, such as reputable app stores and download sites. Remember to look at the developer name, reviews, and star ratings.After clicking on a web link, pay close attention to the address to make sure it matches the website it claims to be if you are asked to enter account or login information.Set a password on your mobile device so that if it is lost or stolen, your data is difficult to access.Download a mobile security tool that scans every app you download for malware and spyware and can help you locate a lost or stolen device. For extra protection, make sure your security app can also protect from unsafe websites.Be alert for unusual behaviors on your phone, which could be a sign that it is infected. These behaviors may include unusual text messages, strange charges to the phone bill, and suddenly decreased battery life.Make sure to download firmware updates as soon as they are available for your device.
Handing over trustMost valuable thing to a company is their data