Information Assurance Instructor
Department of State
This course provides training any individual using social media such as Facebook, LinkedIn, Twitter, SnapChat, etc., regarding information assurance and security best practices. In this presentation, there will be an examination of possible results of:
- A social engineering attack using tactics and freely available tools from the Internet to harvest information
- The consequences of not applying the guidance and recommendations of security specialists in our personal lives
There will examples of social media venues that are often targeted and specific areas of concern with real world examples and types of data that put individuals at risk. There will be an exercise for the audience involving doing “searches” on themselves to demonstrate what personal information is already available and how it could be manipulated and used against them. Also addressed will be typical attack methods, how data is aggregated by adversaries and potential consequences when an individual is targeted and hacked.
These demonstrations will in turn create an enhanced awareness of “digital implications”, provide insights into potential personal vulnerabilities and address how to protect one’s self in the future.
- Periodically search for your name and information on the people search sites
- Scrub accounts to be certain the level of exposure is reduced
- Maintain separation of professional and personal accounts
- Awareness of activities online and only post what is absolutely necessary