Element 9 - Digital Security
SMART Learning Objectives
![Digital Security Learning Objectives](/uploads/7/0/1/9/70199053/published/9.jpg?1495195207)
After reviewing the content in this workshop, you should be able to perform the following:
1. Define Digital Security
2. Describe negative impacts from poor of digital security
3. Provide examples of how compromised digital security can be prevented
1. Define Digital Security
2. Describe negative impacts from poor of digital security
3. Provide examples of how compromised digital security can be prevented
![Ransomware Screen Image](/uploads/7/0/1/9/70199053/published/9-digital-security.jpg?1495241750)
Digital Security Overview
Digital Security involves electronic precautions individuals and organizations take to ensure network and device security and protection from outside harm. Individuals with intent to do harm can steal personal identity, data, and damage computer equipment resulting in loss of finances, compromise of personal information, and cost of replacing equipment. Methods used to prevent digital compromise include installing and updating computer virus protection, network firewalls, and backing up data to a secure location such as a cloud or auxiliary drive. Digital security is not an individual problem. Hackers with intent to do harm can unleash viruses worldwide that compromise networks and cost millions to repair. National security is also vulnerable to attack. As with human viruses, prevention is key in preventing computer viruses and compromise at all levels, from personal to national (Ribble, 2015).
Digital Security involves electronic precautions individuals and organizations take to ensure network and device security and protection from outside harm. Individuals with intent to do harm can steal personal identity, data, and damage computer equipment resulting in loss of finances, compromise of personal information, and cost of replacing equipment. Methods used to prevent digital compromise include installing and updating computer virus protection, network firewalls, and backing up data to a secure location such as a cloud or auxiliary drive. Digital security is not an individual problem. Hackers with intent to do harm can unleash viruses worldwide that compromise networks and cost millions to repair. National security is also vulnerable to attack. As with human viruses, prevention is key in preventing computer viruses and compromise at all levels, from personal to national (Ribble, 2015).
![AF Cybersecurity Shield](/uploads/7/0/1/9/70199053/published/150820-f-xxxxx-011.jpg?1495241756)
Connections to Digital Security
As an employee of the Air Force, digital security is paramount, guaranteed by network protections overseen by Air Force Information and Communication organizations. To the end user, this protection is invisible and seamless. Employees are required to use a Common Access Card, or CAC to access unclassified networks to prevent system compromise from unauthorized users. Another security precaution introduced in the last 10 years is the prevention of peripheral external data storage such as USB data storage. A connection to digital security as a supervisor involves an employee who accidently inserts a USB data storage device in a computer. Software is used to detect both the user and type of device to immediately alert Information and Communications, resulting in an investigation and reporting procedure to explain the use of an external storage device, and additional employee training to prevent future occurrences.
As an employee of the Air Force, digital security is paramount, guaranteed by network protections overseen by Air Force Information and Communication organizations. To the end user, this protection is invisible and seamless. Employees are required to use a Common Access Card, or CAC to access unclassified networks to prevent system compromise from unauthorized users. Another security precaution introduced in the last 10 years is the prevention of peripheral external data storage such as USB data storage. A connection to digital security as a supervisor involves an employee who accidently inserts a USB data storage device in a computer. Software is used to detect both the user and type of device to immediately alert Information and Communications, resulting in an investigation and reporting procedure to explain the use of an external storage device, and additional employee training to prevent future occurrences.
NPR Audio Broadcasts
1. Ransomware Attacks Begin to Stabilize After Compromising Networks Worldwide
May 15, 2017 – Length: 4:34
Summary: The volume of ransomware attacks is slowing or stabilizing around the world, according to government officials and security experts. And the amount of ransom paid out by victims is relatively small — just tens of thousands of dollars. But the scope of the attack in more than 100 countries is still massive, its disruptions are widespread, and the weaknesses it exposed in computer systems can only be described as frightening (Shahani, 2017).
1. Ransomware Attacks Begin to Stabilize After Compromising Networks Worldwide
May 15, 2017 – Length: 4:34
Summary: The volume of ransomware attacks is slowing or stabilizing around the world, according to government officials and security experts. And the amount of ransom paid out by victims is relatively small — just tens of thousands of dollars. But the scope of the attack in more than 100 countries is still massive, its disruptions are widespread, and the weaknesses it exposed in computer systems can only be described as frightening (Shahani, 2017).
Link to original broadcast and transcript: http://www.npr.org/2017/05/15/528502897/ransomware-attacks-begin-to-stabilize-after-compromising-networks-worldwide
2. Companies and Users Can Do More to Stay Secure With Smart Devices
Mar 26, 2017 – Length: 4:16
Summary: None of the top internet and telecom companies passed in the latest Ranking Digital Rights rankings in regard to individuals' privacy standards. But what can they do better and what can we do at home? (Garcia-Navarro, 2017).
Link to original broadcast and transcript: http://www.npr.org/sections/alltechconsidered/2017/03/26/521362526/companies-and-users-can-do-more-to-stay-secure-with-smart-devices
References
Garcia-Navarro, L (2017, March 26). Weekend Edition Sunday [Radio Series] National Public Radio. Retrieved from http://www.npr.org/sections/alltechconsidered/2017/03/26/521362526/companies-and-users-can-do-more-to-stay-secure-with-smart-devices
Ribble, M. (2015). Digital citizenship in schools. Eugene, Or: International Society for Technology in Education.
Shahani, A (Host). (2017, May 15). All Things Considered [Radio Series] National Public Radio. Retrieved from http://www.npr.org/2017/05/15/528502897/ransomware-attacks-begin-to-stabilize-after-compromising-networks-worldwide
Garcia-Navarro, L (2017, March 26). Weekend Edition Sunday [Radio Series] National Public Radio. Retrieved from http://www.npr.org/sections/alltechconsidered/2017/03/26/521362526/companies-and-users-can-do-more-to-stay-secure-with-smart-devices
Ribble, M. (2015). Digital citizenship in schools. Eugene, Or: International Society for Technology in Education.
Shahani, A (Host). (2017, May 15). All Things Considered [Radio Series] National Public Radio. Retrieved from http://www.npr.org/2017/05/15/528502897/ransomware-attacks-begin-to-stabilize-after-compromising-networks-worldwide