Student Inform—October 21, 2024

Contents:


Invitation for Wednesday, Oct. 30: Join UITS in the Carmichael Student Center!

Hey, Owls! We want to hear from you—your feedback on KSU’s IT services helps us improve your experience. Plus, we have some awesome swag to give away!

Join us on Wednesday, Oct. 30, between 10 a.m. and 12 p.m. in the Carmichael Student Center (Kennesaw).

What will you do?

  • Spill: Share your perspective on KSU technology
  • Spin: Spin the "prize wheel" for a reward

Can't make it this week? No problem! We'll have additional "spill and spin" events throughout Fall 2024:

  • Wednesday, Nov. 6, between 10 a.m. and 12 p.m. in the lobby of the Academic Learning Center (Kennesaw)
  • Thursday, Nov. 14, between 10 a.m. and 12 p.m. in the lobby of the Atrium Building (Marietta)

Mark your calendars, and let’s make IT at KSU even better—together!

Return to top of page


UITS is Hiring a Communications Assistant

Are you a skilled communicator? Would you enjoy creating graphics for social media, flyers, and digital signage? Are you looking for a fun campus job that will provide professional development and look great on your resume? If you answered YES, you will enjoy working as a Communications Assistant for University Information Technology Services (UITS)! Search Handshake for Job #9382118—or click here to apply.

Return to top of page


Artificial Intelligence, Security, and You

As artificial intelligence (AI) becomes a larger part of everyone’s lives, it’s
important to understand the threat it poses to security. Let’s review what
AI is, how it can be used for malicious purposes, and what it means for
security.

AI Defined

The concept of AI refers to computers and machines that perform tasks
normally requiring human intelligence. AI systems work by being trained
on large amounts of data that is then analyzed and used to make decisions.
There are many forms and functions of AI. Generative AI, for example, can
generate content such as text, images, audio, and video.

AI-Powered Attacks

As AI evolves, so too will AI-powered attacks. A few examples of how
criminals use AI include:

  • Given that AI can create realistic video or audio recordings, attackers
    can use it to generate content that appears to come from a trusted
    individual saying or doing something they actually aren't.

  • A small sample of someone's voice can be used to generate speech that
    sounds like a real person, which can trick people into believing they are
    talking with someone they know.

  • Through AI automation, social engineers can cast a wide net and
    increase the volume of their attacks. This process requires less effort
    on the attacker’s part and means they can target a greater number of
    people.

AI, Security, and You

Cybercriminals and scammers are already using AI to their advantage.
Here’s what you can do to identify and avoid AI-powered attacks at work
and home:

  • The power of AI means that everyone needs to take extra precautions
    as a part of their daily routines. For example, when handling emails,
    thoroughly inspect the entire message and never open random links or
    attachments.

  • Even if AI helps attackers hide their intentions, there will still be warning
    signs. Stay alert for common indicators of scams, such as threatening
    language, urgent messages, and suspicious requests.

  • The zero trust model assumes everything is untrustworthy until proven
    otherwise — a great approach to all things security. At a basic level,
    never assume someone is who they claim, regardless of how they
    engage with you.

  • Always following policy is a simple, effective way to maintain security.
    If you’re allowed to use AI tools for work, be sure you understand your
    organization’s guidelines for doing so.

Download the PDF version from the security awareness company.

Return to top of page


Cybersecurity Presentation: AI Voice Automated Cloning Scams

Did your distressed mother just call you for help? Are you certain it was your mother? Artificial Intelligence technology is advancing rapidly and available to a large audience. Not all uses of AI are to make our lives easier. Learn how to spot AI voice scams in this engaging talk by Dr. Humayun Zafar (Professor of Information Security and Assurance).

Tuesday, Oct, 22, 11–11:30 a.m. via Teams—Register on Owl Life

Return to top of page


Cybersecurity Awareness Training: Let's Hit 7000!

Hooty Hoo, student assistants! Nearly 4000 of you have completed Fall 2024 Cybersecurity Awareness Training. Can we soar to 7000 by the end of this week?

Remember: The USG requires all KSU employees, including student assistants, to complete this training by October 31. Don't wait!

How to Complete Your Training

The training is available on KnowBe4, the USG's cybersecurity training platform. You can complete the training online or in person:

  • Tuesday, October 22, from 10–10:30 a.m. in the J.M. Wilson Student Center, room A216 (Marietta)

Need help? UITS is here for you! Contact the KSU IT Service Desk with any questions or concerns.

Thank you for helping protect university data!

Return to top of page

©