Security Awareness: Security Tips for Protecting Ourselves Online Friday, May 20, 2011 Brian Allen, CISSP Network Security Analyst.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
SECURITY CHECK Protecting Your System and Yourself Source:
7 Effective Habits when using the Internet Philip O’Kane 1.
Security Awareness: Security Tips for Protecting Ourselves Online Wednesday, February 10th, 2010 Brian Allen Network Security Analyst,
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Security for Internet Every Day Use Standard Security Practices and New Threats.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Trojan Horse Program Presented by : Lori Agrawal.
The Most Dangerous Places on The Web (according to PC World)
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Free Software Alternatives: Avast! Anti-virus
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
1 Computer Security: Protect your PC and Protect Yourself.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Security for Seniors SeniorNet Help Desk
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Protecting Your Computer & Your Information
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Topics in Internet Security A&D Lunch & Learn Brown Bag Friday, August 19, 2011 Brian Allen, CISSP Network Security Analyst, Washington.
Learning In A Techno World How Safe is Your Cyberspace?
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Staying Safe Online Keep your Information Secure.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Security Awareness Month: Security Tips for Protecting Ourselves Online Friday, October 30th, 2009 Brian Allen Network Security Analyst,
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Internet Security and Your Computer Welcome to Boot Camp.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
W elcome to our Presentation. Presentation Topic Virus.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Cybersecurity Test Review Introduction to Digital Technology.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
What they are and how to protect against them
Protect Your Computer Against Harmful Attacks!
Computer Security.
Presentation transcript:

Security Awareness: Security Tips for Protecting Ourselves Online Friday, May 20, 2011 Brian Allen, CISSP Network Security Analyst Washington University in St. Louis

Let’s Talk About… Facebook/Social Networking Password Security AV Products Home Wireless Router Security Laptop Security Safe Web Browsing Phishing Examples Online Banking Virus Example and Case Study

Facebook/Social Networking:

Password Security

Parents’ Password Cracked On First Try The Onion News Feb 27, 2002 REDONDO BEACH, CA – Nick Berrigan, 14, successfully hacked into his parents’ AOL account on the first try Tuesday, correctly guessing that “Digby” was their password. “They actually used the dog’s name,” said Berrigan, deactivating the parental controls on his AOL account.

Free Password Managers 1.KeePass – I use this one 2.Password Safe – Bruce Schneier’s Project 3.PassPack –An online password manager Commercial Password Manager: 4.1Password -”Works great on iPhone and OS X”

Free Antivirus Tools

Antivirus I look for: – the fastest – update themselves automatically – have an easy to use interface AVG = AntiVir = Avast =

From CNET.com Editor Reviews AVG Popularity: * Total downloads 227,792,675 Avira AntiVir Popularity: * Total downloads 61,994,231 Avast Popularity: * Total downloads 60,978,532

AVG Interface

AVG Will Check Every

Avira AntiVir Interface

AVAST Interface

Home Wireless Router Tips

Change Default Password Firewall is on by Default WPA2, not WPA or WEP MAC Address Filtering Leave SSID on No personal info in SSID like Smith_Family

Change The Default Password

Firewall Is On By Default

WPA2

MAC Address Filtering

Home Wireless Router Tips Change Default Password Firewall is on by Default WPA2, not WPA or WEP MAC Address Filtering Leave SSID on No personal info in SSID like Smith_Family

Laptop Tracking Software

Key Questions to Consider How hard is it to disable or remove the software? Who will have access to the collected data? How many laptops are lost or stolen every year?

LoJack Pros Very difficult to disable The company, only with the user’s permission, can log in to: – Take pictures – Erase the hard drive Will work with police to recover the laptop

LoJack Bios Compatibility Asus Dell Gammatech Getac Gateway General Dynamics HP Fujitsu Lenovo (IBM Thinkpad) Motion Computing Panasonic Toshiba

LoJack Cons Bios compatibility does not include Macintosh – 40% student machines are Macs Most Expensive - $49 per laptop The company can get access into laptops, although it is only to be initiated by the owner after it is reported stolen

Laptop/USB Encryption USB Hardware Encryption – IronKey $$$ Laptop/USB Encryption – TrueCrypt (Free!)

Safe Web Browsing

Four OS Security Tips Make sure the operating system has: – Update automatically – Firewall turned on – All accounts have strong passwords – Up-to-date Anti-virus tool

Link Security Tips Don’t click links or open attachments in s. If you have any doubt, get confirmation directly from the sender. Be wary of messages that include attractive offers or urgent requests. Watch out for links that require you to immediately provide a login and password. Type the URL directly into Google.

Browser Security Tips I use Firefox as my regular browser. Firefox will automatically update itself. Firefox 3 and 4 have Phishing and Malware Protection on by default. Use the Add Block Plus Firefox Addon.

The Top Firefox Addon (By Far)

Without AdBlock Plus

With AdBlock Plus

Phishing Examples

Phishing

Spear Phishing Example

Online Banking

Important Online Banking Tip Never type your bank url into a browser Or click on a url that looks like your bank Always let Google find it for you – Should be the first link

Virus Example and Case Study:

First: Different Types of Infections Viruses – Rely on users to spread: attachments, links in an Worms – can spread on their own Trojans – A malicious file that appears to be legitimate Bots – A worm that phones home to a Command & Controller so the attacker can give it instructions

What Do The Infections Do? Send Spam Attack other machines Set up a Phishing site Act as a proxy for other malicious traffic Download spyware/adware to the machine Run a keylogger

Koobface Botnet Koobface made an estimated $2m since July 2009 It makes money by selling scareware (fake anti- virus), doing click fraud and other scams. Koobface targets Facebook and other sites. 400,000+ bots; 20,000+ fake Facebook accounts Tricks users to execute malware disguised as Flash updates needed to view shocking content. The malware turns PCs into zombie drones under the control of hackers.

Fake Anti-Virus Screen Shot

KoobFace Botnet How it works in one example: Koobface is a Russian based botnet The threat arrives as a Facebook private message that contains a supposed link to a youtube video

Don’t Click the LINK!

Koobface Example Continued Users who are tricked into clicking the link are redirected to other pages until they finally end up at a spoofed YouTube site called YuoTube

Don’t Trust the “Adobe Flash Update”!

How KoobFace works It navigates through users’ FB pages to search for their friends. It phones home to get the actual message that the worm will then spread to your friends. McAfee says it is not unusual to see 10,000 Koobface variants in one month. TrendLabs considers Zeus and Koobface to be the most prolific malware families

Koobface Targets MacOSX A new version of Koobface attacks Mac OSX spreads through Facebook. Security company Intego says this version uses a malicious Java applet to attack users.

Thank You! Brian Allen, CISSP

Password Managers: KeePass: Password Safe: PassPack: 1Password ($): Antivirus: AVG: AntiVir: Avast : Laptop Tracking: LoJack($): USB/Laptop Encryption: Ironkey($): TrueCrypt: Firefox Ad Blocker: AdBlock Plushttps://addons.mozilla.org/en-US/firefox/addon/adblock-plus Brian Allen