MATHVISITORS Archives

Math Visitors

MATHVISITORS@LISTSERV.UTA.EDU

Options: Use Forum View

Use Monospaced Font
Show HTML Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Reply To:
Math Visitors <[log in to unmask]>
Date:
Thu, 27 Sep 2018 14:36:18 +0000
Content-Type:
multipart/related
Parts/Attachments:
text/plain (7 kB) , text/html (33 kB) , image001.png (219 kB) , image002.jpg (16 kB) , image003.jpg (12 kB) , image004.jpg (9 kB)
Greetings,

The September 2018 Maverick Cyber Security newsletter is now available! You are welcome to download and share the content with your students, family, and friends via email; however, do not post the documents to public facing websites.

We hope you enjoy this monthly addition to our Information Security Awareness Program here at UT Arlington.

[Description: cid:image002.png@01D0F495.BFF89C30]


Information Security Awareness Materials
https://mavsuta.sharepoint.com/sites/iso-awareness<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmavsuta.sharepoint.com%2Fsites%2Fiso-awareness%250d&data=02%7C01%7Cmichael.schmidtkunz%40uta.edu%7Ce677f53a15fb43ba5f8b08d623f816ad%7C5cdc5b43d7be4caa8173729e3b0a62d9%7C0%7C0%7C636735945792600680&sdata=c6uRssy%2FDk%2BxFGj%2FZe0AkGcdhuO7%2FOqAgHRLtAGPPro%3D&reserved=0>



September 2018 - Newsletter<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmavsuta.sharepoint.com%2F%3Ab%3A%2Fs%2Fiso-awareness%2FESn1n_cZL-JKlYmU0xyKxVsBjwrfFwwr_jT7P7pyJySztQ%3Fe%3DjyylPG&data=02%7C01%7Cmichael.schmidtkunz%40uta.edu%7Ce677f53a15fb43ba5f8b08d623f816ad%7C5cdc5b43d7be4caa8173729e3b0a62d9%7C0%7C0%7C636735945792600680&sdata=rILbWbO2SlCvy4MvVP%2BSRQMvval%2BBAYYxd9%2FpTEQr6c%3D&reserved=0>


September 2018 - Poster<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmavsuta.sharepoint.com%2F%3Ab%3A%2Fs%2Fiso-awareness%2FESi5ik3xrO5NiHFbXJ9xPM4B3BUJluCSe-fbi2_1n-n57A%3Fe%3DZDkbyI&data=02%7C01%7Cmichael.schmidtkunz%40uta.edu%7Ce677f53a15fb43ba5f8b08d623f816ad%7C5cdc5b43d7be4caa8173729e3b0a62d9%7C0%7C0%7C636735945792610688&sdata=jTAzy%2Bi6XPCBrmCYb1SV0GP0BPquGSp89FXGA4W7Cgc%3D&reserved=0>

[cid:image002.jpg@01D455AF.F9DA2D50]<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmavsuta.sharepoint.com%2F%3Ab%3A%2Fs%2Fiso-awareness%2FEZH4RNqziCFMlPgjMXkTFOYB19EJpetGnxLcBEQXohMMSA&data=02%7C01%7Cmichael.schmidtkunz%40uta.edu%7Ce677f53a15fb43ba5f8b08d623f816ad%7C5cdc5b43d7be4caa8173729e3b0a62d9%7C0%7C0%7C636735945792610688&sdata=V1TilBtWWnFy%2FfRYyYs5T34pYh4qbCCelM%2FCeikJ1kQ%3D&reserved=0>

[cid:image003.jpg@01D455AF.F9DA2D50]<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmavsuta.sharepoint.com%2F%3Ab%3A%2Fs%2Fiso-awareness%2FERSiepnu8OFBpKAVau_0UM4BQElkEhbJmBdGZ7n1ePNpPA%3Fe%3D7RwIiv&data=02%7C01%7Cmichael.schmidtkunz%40uta.edu%7Ce677f53a15fb43ba5f8b08d623f816ad%7C5cdc5b43d7be4caa8173729e3b0a62d9%7C0%7C0%7C636735945792620692&sdata=C3SVDvnrUAGxiRzM2y%2FJ23pAVpwCZnLqOjTxB%2F7vuC0%3D&reserved=0>

September 2018 Cyber Security Awareness Newsletter:

The Human Side of Security
There is no shortage of technical solutions for defending organizations against cyber threats. A quick internet search yields many options for threat detection, threat prevention, and a variety of other services aimed at keeping data secure.

But security, at its core, is a people process.  People create strong passwords. People use common sense to avoid falling for phishing scams. People develop security software to help defend other people (from people).
Focusing on the human elements of cybersecurity, from both an end-user and cybercriminal perspective, makes it easier to understand what end-users are up against daily, and also gives a face to a complex topic that many think is highly technical.

Scavenger Hunt Questions (and Answers):

1.     People that use strong situational awareness and common sense to prevent security incidents are known as what? (Human Firewalls)

2.     _______________ is the art of manipulating or deceiving individuals to gain unauthorized access, both physical and digital. (Social Engineering)

3.     This type of phishing attack targets specific people and organizations. (Spear Phishing)

4.     Organizations hire ___________ to break into their networks and buildings and expose flaws. (Penetration Testers)

5.     What does BEC stand for? (Business Email Compromise)

Link to NewsLetter<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmavsuta.sharepoint.com%2F%3Ab%3A%2Fs%2Fiso-awareness%2FESn1n_cZL-JKlYmU0xyKxVsBjwrfFwwr_jT7P7pyJySztQ%3Fe%3DjyylPG&data=02%7C01%7Cmichael.schmidtkunz%40uta.edu%7Ce677f53a15fb43ba5f8b08d623f816ad%7C5cdc5b43d7be4caa8173729e3b0a62d9%7C0%7C0%7C636735945792630700&sdata=gvy6vHGy%2BPvtNb%2B5dA1RdEoERULAqg%2FJ65qBx%2BxQ4Mc%3D&reserved=0>

Posters are a wonderful way to share tips with faculty, staff, and students in passing, or when waiting.  Feel free to print and post these items in high traffic areas.  Best printed on 11x17 paper.
Click Here for September 2018 Poster<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmavsuta.sharepoint.com%2F%3Ab%3A%2Fs%2Fiso-awareness%2FESi5ik3xrO5NiHFbXJ9xPM4B3BUJluCSe-fbi2_1n-n57A%3Fe%3DZDkbyI&data=02%7C01%7Cmichael.schmidtkunz%40uta.edu%7Ce677f53a15fb43ba5f8b08d623f816ad%7C5cdc5b43d7be4caa8173729e3b0a62d9%7C0%7C0%7C636735945792630700&sdata=IPWk9dUNRBPCY7jSQ1rHsFhQJcbCnaWaST%2B2h11B1Hk%3D&reserved=0>





[cid:image004.jpg@01D455AF.F9DA2D50]<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmavsuta.sharepoint.com%2F%3Av%3A%2Fs%2Fiso-awareness%2FEaS4xPJNUw9Plw5dv0TIwkYBhul7P-WWRGqQeYtNT8sNiQ%3Fe%3DS8uYfj&data=02%7C01%7Cmichael.schmidtkunz%40uta.edu%7Ce677f53a15fb43ba5f8b08d623f816ad%7C5cdc5b43d7be4caa8173729e3b0a62d9%7C0%7C0%7C636735945792640704&sdata=mZG%2Fxd1Y0cQKLQaNEUpLZc6a96y6272sTvI81WSHY28%3D&reserved=0>


September 2018 - Video <https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmavsuta.sharepoint.com%2F%3Av%3A%2Fs%2Fiso-awareness%2FES_Fj2YCZH9BkswWV_kkGUwBw8H6JMXXOlhSkCzQ9iYl1g%3Fe%3DbgsynM&data=02%7C01%7Cmichael.schmidtkunz%40uta.edu%7Ce677f53a15fb43ba5f8b08d623f816ad%7C5cdc5b43d7be4caa8173729e3b0a62d9%7C0%7C0%7C636735945792640704&sdata=08BMS0NgDxp0Ub4Po3ycQ29IQ6Eg3IjsLvcq1cLIcj4%3D&reserved=0>

Fake Help Desk Pretexting

Click here<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmavsuta.sharepoint.com%2F%3Av%3A%2Fs%2Fiso-awareness%2FES_Fj2YCZH9BkswWV_kkGUwBw8H6JMXXOlhSkCzQ9iYl1g%3Fe%3DbgsynM&data=02%7C01%7Cmichael.schmidtkunz%40uta.edu%7Ce677f53a15fb43ba5f8b08d623f816ad%7C5cdc5b43d7be4caa8173729e3b0a62d9%7C0%7C0%7C636735945792650712&sdata=kiN2tT%2F4XSdkx2Ij5W9Q3PCfeRf71GOvqR7sPOoTIcA%3D&reserved=0> to learn more!

https://mavsuta.sharepoint.com/sites/iso-awareness<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmavsuta.sharepoint.com%2Fsites%2Fiso-awareness&data=02%7C01%7Cmichael.schmidtkunz%40uta.edu%7Ce677f53a15fb43ba5f8b08d623f816ad%7C5cdc5b43d7be4caa8173729e3b0a62d9%7C0%7C0%7C636735945792650712&sdata=siB8Vr41sTrNvhwqc12EcWl0Sy6sgQ9bz8wlNmTWHeI%3D&reserved=0>










Previous Newsletter Issues
All awareness materials are available on the Info Sec Awareness site!<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmavsuta.sharepoint.com%2Fsites%2Fiso-awareness%2FSitePages%2FHome.aspx&data=02%7C01%7Cmichael.schmidtkunz%40uta.edu%7Ce677f53a15fb43ba5f8b08d623f816ad%7C5cdc5b43d7be4caa8173729e3b0a62d9%7C0%7C0%7C636735945792660716&sdata=8H1eacMaiH8%2Be%2FhN67GcDfRAqhW3Hz3iiDxGJCPCkLc%3D&reserved=0>

Archived Cyber Security Newsletters may also be found on the Information Security Office Website at www.uta.edu/security/newsletters/index.php<https://na01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.uta.edu%2Fsecurity%2Fnewsletters%2Findex.php&data=02%7C01%7Cmichael.schmidtkunz%40uta.edu%7Ce677f53a15fb43ba5f8b08d623f816ad%7C5cdc5b43d7be4caa8173729e3b0a62d9%7C0%7C0%7C636735945792670724&sdata=hi8RQqjLqzuy4LpABhsv2GfnrCHLxjJtck64EMtYu38%3D&reserved=0>









ATOM RSS1 RSS2