Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.

Slides:



Advertisements
Similar presentations
Securing A Wireless Home Network. Wireless Facts Range about feet from access point Security anyone can eavesdrop on an unsecured wireless network.
Advertisements

10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager.
Security in Wireless Networks Juan Camilo Quintero D
Securing Wireless Technology Another professional and intellectual presentation of Phillip Speagle.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
Chapter 9 Connecting to and Setting up a Network
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Chapter 8: Configuring Network Connectivity. 2/24 Objectives Learn how to configure a network adapter Learn about the Network and Sharing Center Learn.
Bullet-Proofing Your Wireless Router By Steve Janss.
Securing a Wireless Network
Working From Your Home Computer Safely: The Ten Commandments Stephen Jones, GSEC, A+ With special thanks to Balakrishnan Ramachandran.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Wireless Networking 102.
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
Wireless Networks Tamus, Zoltán Ádám
CIS 103 — Applied Computer Technology Last Edited: September 17, 2010 by C.Herbert Wireless Home Networks.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
Steps To Set Up Your Home Wireless Network You can use a wireless network to share Internet access, files, printers, and more. Or you can use it to surf.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Presented by: Dr. Munam Ali Shah
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
Getting Started. Searching The best way to find information on the web: googling What search engines are there?
Protecting Your Wireless Network Protecting Your Wireless Network University of Tasmania School Of Computing 2007.
I T Essentials I Chapter 4 JEOPARDY PreventativeMaintenanceTrouble-shootingSecurityMaintenancePotpourri
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
CS591-Fall 10 Clonts 1 Wireless Network Security Michael Clonts.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
The Basics of HOME NETWORKS Capstone Technologies Group Brian Sammons.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Securing A Wireless Home Network. Simple home wired LAN.
CSC 116 Nov Administrative Required 2 nd exam will be next week on Wed  Nov 18th It will be short (10 questions) It will only cover chapters.
Securing your Personal Wireless Networks By: Bryan Oxendale.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
How To Set Up A Wireless Network. What is a wireless network  A wireless network is a computer network that allows computers and other electronic devices.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Module Overview Overview of Wireless Networks Configure a Wireless Network.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Introducing, Installing, and Upgrading Windows 7
Gary m. smith, usaf (Retired)
Instructor Materials Chapter 6 Building a Home Network
TECHNOLOGY GUIDE THREE
Securing A Wireless Network
Wireless Network Security
Chapter 11: It’s a Network
Home Computer Security
How To Set Up A Wireless Network
Cybersecurity and Cyberhygiene
Introduction to Networking Security
Presentation transcript:

Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory

Cyber Security 45% believe cyber security is just as important as border security…

Cost of Cyber Security Cyber Crime in 2011 Anticipated future cost of Cyber Crime Global Drug Trafficking $388 billion $411 billion

Today’s Agenda 1.Building Defenses Firewalls, Malware Protection and LUA 2.Sharing Information Wireless Networking Security 3.Being Alert and Vigilant Good Cyber Behavior

Windows Security Center Start -> Settings -> Control Panel -> Security Center

System Updates Ever See these? Patch and Update Your System!!! – Control Panel -> Windows Update – (XP Only)

Malware Protection Trend Micro = FREE for BEA Employees – – instructions and download

Non-Admin Rights At Work: “Least User Access” (LUA) At Home: Standard User vs. Administrator You should have at least 3 accounts on every computer Administrator Account – Only for installing software Your Account (Standard user) – Daily access 1 Account per child (Standard User) Standard (non-administrator) accounts prevent the installation of unwanted software. This includes viruses, malware, and games (which might not be as innocent as you think).

How To Setup Multiple Accounts Start, (Settings), Control Panel User Accounts

How To Setup Multiple Accounts

QUESTIONS ABOUT PATCHING, MALWARE AND LUA? Before moving on to wireless networks…

Wireless Home Networking

Layered Protection First Layer of Protection – Change Default Administrator Passwords (and Usernames) – Change the Default SSID – Disable SSID Broadcast Second Layer of Protection – Turn on (Compatible) WPA / WEP Encryption – Consider Hard Wire Computer (Home Office/Business Computer) Advanced Layer of Protection – Assign Static IP Addresses to Devices – Enable MAC Address Filtering

First Level – Change Default Passwords Most Popular Brands: Linksys NETGEAR D-Link Belkin Dynex Warning – Be Sure To Write Down Any Changes (Keep a Computer Log Book)

First Level - Change the Default SSID Use something descriptive but cryptive AmmonResidence - Bad AmRes1House - Better

First Level - Disable the SSID Broadcast

Layered Protection First Layer of Protection – Change Default Administrator Passwords (and Usernames) – Change the Default SSID – Disable SSID Broadcast Second Layer of Protection – Turn on (Compatible) WPA / WEP Encryption – Consider Hard Wire Computer (Home Office/Business Computer) Advanced Layer of Protection – Assign Static IP Addresses to Devices – Enable MAC Address Filtering

Second Level – Turn on WPA/WEP WEP (Wired Equivalent Privacy) – Weakest but better than nothing WPA (Wi-Fi Protected Access) WPA2 (WPA version 2) They all encrypt the signal but not the content Both devices (Wireless Access Point and the Laptop)

Second Level – Take Computer Off Air Does not need portability (i.e. home office computer) Contains sensitive data Wire it directly to your Wireless Access Point

Layered Protection First Layer of Protection – Change Default Administrator Passwords (and Usernames) – Change the Default SSID – Disable SSID Broadcast Second Layer of Protection – Turn on (Compatible) WPA / WEP Encryption – Hard Wire One Computer (Home Office/Business Computer) Advanced Layer of Protection – Assign Static IP Addresses to Devices – Enable MAC Address Filtering

Advanced Level – IP Address Restriction IP Internet Protocol address Easier than a MAC to spoof If someone were to know or guess it IPv4 example – developed in the early 1980’s – 2 32 address spaces or – 4.3 billion unique address spaces IPv6 a401:0db8:0000:1234:0af0:0567:0001:0001 – developed in the mid1990’s – × address spaces or – 340 trillion trillion trillion unique addresses

Advanced Level – MAC Address Restrict Media Access Control Address Unique to every piece of IT equipment Example 01:a3:5f:08:23:1c Very hard to spoof Number is burned into the hardware layer of the device

Okay Let’s Review First Layer of Protection – THE MOAT – Change Default Administrator Passwords (and Usernames) – Change the Default SSID – Disable SSID Broadcast Second Layer of Protection – THE DRAWBRIDGE – Turn on (Compatible) WPA / WEP Encryption – Consider Hard Wire Computer (Home Office/Business Computer) Advanced Layer of Protection – THICK WALLS – Assign Static IP Addresses to Devices – Enable MAC Address Filtering

Good User Practices Do Not Auto-Connect to Wi-Fi Networks – Manually Connect – Don’t Talk To Strangers Enable Firewalls On Each Computer – Add another Level of Protection Position the Router or Access Point Safely – Avoid Upstairs near a Window (radio signals travel a long way) Turn off Network during Extended Periods of Non-Use – Vacation – Long Weekend

What New In Wireless Routers Cisco (Linksys) and DLink just released new lines of Wireless Routers

QUESTIONS ABOUT WIRELESS NETWORKS? Before moving on to human behaviors…

2 Big Behavioral Mistakes Using Weak Passwords Victim to Phishing

Defend Yourself Use longer passwords Upper and Lowercase Add Special Characters Change your password often

Identifying A Phishing Attack 1.Ask Yourself: Do I associate with this company? 2.Look for Spelling/Grammar mistakes? 3.Sense of Urgency 4.Threats 5.“Too Good To Be True” 6.Seeking Charitable Donations 7.Non Official URLs

Summary of Defending Yourself Patch and update your system Run effective malware detection Secure your wireless network Use stronger passwords Mouse over links before clicking “Think Before You Click!”

QUESTIONS? Jonathan Homer