APRIL 6 - 7, 2016

Youngstown State University

One University Plaza

Youngstown, Ohio 44555

CYBERSECURITY & PRIVACY

A W A R E N E S S

DAY

 

STOP. THINK. CONNECT.™ is the global cybersecurity awareness campaign to help all digital citizens stay safer and more secure online. The message was created by an unprecedented coalition of private companies, non-profits and government organizations with leadership provided by the National Cyber Security Alliance (NCSA) and the APWG. The campaign was launched in October of 2010 by the STOP. THINK. CONNECT. Messaging Convention in partnership with the U.S. government, including the White House. NCSA, in partnership with the APWG, continue to lead the campaign. The Department of Homeland Security leads the federal engagement in the campaign.


Their Goal is to:


Increase and reinforce awareness of cybersecurity, including associated risks and threats, and provide solutions for increasing cybersecurity.


Communicate approaches and strategies for the public to keep themselves, their families and their communities safer online.


Shift perception of cybersecurity among the American public from avoidance of the unknown to acknowledgement of shared responsibility.


Engage the public, the private sector, and state and local governments in our nation's effort to improve cybersecurity.


Increase the number of national stakeholders and community-based organizations engaged in educating the public about cybersecurity and what people can do to protect themselves online.


WHAT IS CPA DAY?


The Cybersecurity & Privacy Awareness Day was developed by the Northeast Ohio Association of Computing Machinery (NEOACM). It is co-sponsored by Information Security and Ethical Hacking Association (ISEHA), a Youngstown State University student orgaization, and the Computer Science and Information Systems Department. CPA Day is designed to engage and educate the public about cybersecurity and privacy, how to be safe online and exercise responsible behavior, and how to increase awareness and resiliency of in the event of a cyber incident. On this day, attendees will hear from leaders in cybersecurity from Northeast Ohio and across the country who will speak on very important topics understandable to anyone. 









PRIVACY IN CYBERSPACE


The world we live in is more connected than ever before. The Internet touches all aspects of everyone’s life, from work, to school, and in performing everyday activities like shopping, paying bills and taxes. We conduct an ever more increasing portion of our daily lives online. In doing so, we create a growing and permanent digital footprint with each and every activity, a Google search, Facebook “like” and eBay purchase. Since "being online" is now such a regular activity, we do not give much thought to the consequences of all this e-disclosure or its cumulative effects over time. We express concern over our digital privacy rights when we see and experience the lost of stolen data from some company like Target or Sony. And we are very upset when we learn of organizations tracking our online behavior. So as Internet users, we must be more vigilant about practicing safe, online habits; as a community, we need to ensure that Internet safety is perceived as a shared responsibility at home, in the workplace, and throughout our communities.


Privacy interest in cybersecurity is also concerned with establishing protocols and effective oversight regarding when, why, and how government agencies may gain access to personal information that is collected, retained, used, or shared. U.S. businesses and government share this responsibility for the insecurity of consumer online personal information. There is no single federal minimum standard for data protection that enforces fair information practices (FIPs). Fair information practices regulate and enforce consumer privacy rights regarding data collection, retention, use, and sharing of personal information. The federal approach has focused not on the protection of personal information, but on the purpose of the information collection.


The history of U.S. government agencies conducting sanctioned and unsanctioned surveillance of domestic communication by colluding with telecommunications and wire communication companies is well known.  Domestic surveillance first began as a means of acquiring information on criminal activities and then quickly moved to documenting people's engagement in social or political activities.  One of these challenges facing digital communications users is that this medium suits those inclined to spy unlike any other form of surveillance because the intruder can hide the fact that a communication has been compromised. NSA is no amateur at snooping into personal communications that are secured by law.


CYBERSECURITY CONCERNS


Spyware has caused online consumers to be victimized by cyber-threats. Computer viruses, worms, or malware, phishing and social engineering are other tactics of victimization.  For individuals and organizations that rely on the Internet for research, access to information, collaboration, political participation, fundraising, coalition building, campaigns, advocacy, organized dissent, political speech, watchdog actions against government and businesses, freedom of expression, dissemination of information or for outreach to constituencies, cybersecurity matters a great deal. Cybersecurity is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.


Large and small companies suffer from cyber-threats within and outside of their control such as data breaches, theft of company secrets, spying, attacks on computer networks, and damage to critical systems. Companies when considering the challenges of cybersecurity look into new business applications such as cloud computing to secure their data. But cloud computing has enormous security and privacy risks. This relates to its dependence on untrustworthy or unevaluated third parties.


New business and government services such as the efforts to digitize health records and updating critical infrastructure such as the "Smart Grid" all offer new cybersecurity privacy challenges for consumers.


Cyber-attacks or incidents that threaten the command and control structure of the national government or its assets including national defense, emergency response, and economic systems are of growing concern. The digital infrastructure of the nation must be treated as a strategic national asset. The new mission is to deter, detect, and defend against disruptions and attacks of all descriptions.


WHAT SHOULD WE DO


Cyberspace is global, but the freedoms that are protected by constitutional rights, human rights norms, and legal institutions are defined by treaty or geography. Cybersecurity may be defined by governments, but will have a lasting impact on many rights and civil liberties enjoyed by free people throughout the world who engage in cyber-communications. Freedom of expression, freedom of association, economic opportunity, and political discourse may be redefined by the course the United States charts for cybersecurity.


CYBERSECURITY VS. PRIVACY