Presentation is loading. Please wait.

Presentation is loading. Please wait.

Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,

Similar presentations


Presentation on theme: "Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,"— Presentation transcript:

1 Safe Computing Practices

2 Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012, http://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/

3 Why would anyone want to hack me? - Online Card Shops “... the site is offering a pack of 1,245 cards stolen two months ago from stores in Massachusetts and Connecticut for the bargain price of USD $10,500.” 2 Krebs, Brian, “Peek Inside a Professional Carding Shop”, 14 Jun 2014, http://krebsonsecurity.com/2014/06/peek-inside-a-professional-carding-shop/ http://krebsonsecurity.com/2014/06/peek-inside-a-professional-carding-shop/

4 Phishing Example 1 3

5 Phishing Example 1 - Red Flags 4

6 Phishing Example 2 5 Emails sent from a compromised @middlebury.edu email account!

7 Phishing Example 3 6

8 Phishing Example 4 - Malicious Attachment 7

9 Malicious Downloads 8 -- http://www.howtogeek.com/168691/how-to-avoid-installing-junk-programs- when-downloading-free-software/

10 Malicious Add-Ons and Plugins 9 -- http://www.howtogeek.com/168691/how-to-avoid-installing-junk-programs- when-downloading-free-software/

11 Please don’t share passwords 10

12 There’s no such thing as a free lunch USB storage key 11

13 Data Classification – What to Collect and How 12 ●http://go.middlebury.edu/sensitivedata ●http://go.miis.edu/sensitivedata

14 Resources on Information Security Policies: Privacy Policy =Confidentiality of Data http://go.middlebury.edu/privacy Network Monitoring Policy = Protection of College Technology Resources http://go.middlebury.edu/netmon Technical Incident Response Policy = Response to Information Security Events http://go.middlebury.edu/tirp Data Classification Policy = Defines Data Types http://go.Middlebury.edu/dcp Red Flags Policy = Identity Theft Protection Not presently in hand book PCI Policy = Payment Card Data Handling http://go.middlebury.edu/pcipolicy Web Sites: Middlebury’s Information Security http://go.middlebury.edu/infosec Phishing Information http://go.middlebury.edu/phish http://www.phishing.org/ Protect Yourself On-line http://www.onguardonline.gov/ Parents Resource for Kids On-line http://getnetwise.org/ Best Practices for Home and Work http://www.nsa.gov/ia/_files/factsheets/ Best_Practices_Datasheets.pdf

15 Discussion and Links Please share your thoughts! Information Security Resources: http://go.middlebury.edu/infosec http://go.miis.edu/infosec http://go.middlebury.edu/infosecfeedback Report Information Security Events To: infosec@middlebury.edu


Download ppt "Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,"

Similar presentations


Ads by Google