Becoming More Secure Online: Passwords & Social networking Walid Al-Saqaf For the Workshop: Secure Information Gathering, Storing, and Sharing Istanbul,

Slides:



Advertisements
Similar presentations
Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Advertisements

1©2013 Check Point Software Technologies Ltd. [Protected] Non-confidential content Top 10 Security Best Practices for Small Business Small business need.
1 5 steps to enjoying a safer internet experience SID 2013 presentation for adults who work/volunteer with children, young people and vulnerable adults.
Authentication and Constructing Strong Passwords.
Recommendations on the future of online GyroScope & Databse implementation.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Social Networking Systems: Education Awareness Briefing.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Internet Security In the 21st Century Presented by Daniel Mills.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Threats to I.T Internet security By Cameron Mundy.
Behind Closed Doors Digital Danger the dark side of the net with Sue Watling and Jim Rogers 1 st April 2014 No walls, no doors, no boundaries, nowhere.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Yourself Online (Information Assurance)
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Staying Safe Online Keep your Information Secure.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Scams & Schemes Common Sense Media.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Suggested grade levels 7-12 Students will explore strategies that promote personal safety when using the texting-based social network, Twitter.
Everyday Cyber Security April 27 th Why Should You Care? Ensuring your privacy and security Protecting yourself and others Practicing safe internet.
1. password (Unchanged) (Down 6) (Unchanged)14. sunshine (Up 1) (Unchanged)15. master (Down 1) 4. abc123 (Up.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
Birmingham News Sunday October 28, 2012  password1.
Return to the PC Security web page Lesson 6: Improving Security.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
1. password (Unchanged) (Down 6) (Unchanged)14. sunshine (Up 1) (Unchanged)15. master (Down 1) 4. abc123 (Up.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Staying Safe On Social Media. Website Security  How do you know if a website is secure?  Celebrities  http vs https  http: Hypertext Transfer Protocol.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Computer Security Sample security policy Dr Alexei Vernitski.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
David Wigley HCC Security Architect Security Trends for 2016.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
1. password (Unchanged) (Down 6) (Unchanged)14. sunshine (Up 1) (Unchanged)15. master (Down 1) 4. abc123 (Up.
E- SAFETY INFORMATION EVENING 13 July T EACHING E - SAFETY T HINK UK NOW A recommended website for children to look.
1. password (Unchanged) (Down 6) (Unchanged)14. sunshine (Up 1) (Unchanged)15. master (Down 1) 4. abc123 (Up.
September 19, 2016 Steve Konecny CFE, CIRA, CEH, CRISC Hands on Hacking.
Internet Safety.
PASSWORD SECURITY A Melbourne Athenaeum Library
Hotspot Shield Protect Your Online Identity
Class Name: Online Safety & Privacy Basics
Information Security.
Cybersecurity Awareness
Setting up an online account
Internet Safety – Social Media
最容易被破解的25個密碼.
CS101 Security.
Presentation transcript:

Becoming More Secure Online: Passwords & Social networking Walid Al-Saqaf For the Workshop: Secure Information Gathering, Storing, and Sharing Istanbul, Turkey January, 2011

Passwords are your first line of defense - Every password is a vulnerability due to keyloggers, phishing, etc. - Exposure of passwords of accounts could be devastating - Victims of password theft could be unaware for some time that their password is compromised (identity theft, spamming, hoaxes, etc.) - Brute-force password crackers available for free and can be planted by trojansBrute-force password crackers password qwerty abc123 monkey letmein trustno1 dragon baseball iloveyou master sunshine ashley bailey passw0rd shadow superman qazwsx michael football *(SplashData study Nov 2011) Another study by ZoneAlarm The top 25 stolen passwords*

Technology makes password hacking easier

No one is immune from password hacking!

Best practices and useful tips - should be changed regularly - should be long enough, yet easy to remember for the user - should include UPPER and lower cases plus non-alphanumeric characters - can be stored through Password managers if memorizing is not possible - should be long & tough to guess (for others) [no dictionary words] - should never be transmitted through unencrypted channels - should not be used in public cafes unless you verify security settings - should be different for different platforms/applications - should normally not be stored on servers (do not use ‘remember me’) - should not be allowed to be stored in your browser/client application - should never be shared

Securing passwords - Securing passwords is extremely important (can’t be emphasized enough) - Using password management is possible if you have too many to remember: - offline (e.g., KeePass, RoboForm, Sxipper [FF add-on]) - online (e.g., Passpack, Clipperz) - alternatives to multiple passwords (e.g., OpenID) - You need to weigh the risks to reward ratio before proceeding

Social networking: Risk vs. Reward - Despite many advantages, social networking is insecure because: - They require that you give up some information publicly - The only secure method of access is a username and password - They may be accessible through browsers that have vulnerabilities - Misunderstanding/misinterpreting privacy terms could be devastating - You cannot control what information about you posted by your friends - You need to read the EULA, Privacy Agreement and Terms of Use - You have to Understand the privacy settings carefully - You should be cautious when installing software recommended by them - Think before you post anything to the public (e.g., CNN’s Nasr) - Assess risk of using social networking websites at cafes & public places

The dark side of social networking - The longer you communicate, the more likely that you would reveal information about yourself - The more data/pictures you put online, the more you endanger your privacy - The more friends you have, the easier you could be tracked, exploited - Bullying, abuse, exploitation, threats, intimidation, etc. are on the rise “Facebook seems to be a place where people aren't being cautious enough” - DeDomenico-Payne (The dark side of social media)The dark side of social media

Social Network addiction is no joke

Social networking could cause liability

Social networks not suitable for sensitive data - Social networks are public and aim at exposing information - Sensitive data needs to be encrypted, protected with multiple methods, which are not available in networks - Website transmission encryption (HTTPS) needs to be used for social networking websites when possible - Proxy/tunneling encryption (e.g., Tor) could be useful

The dark side of social networking - The longer you communicate, the more likely that you would reveal information about yourself - The more data/pictures you put online, the more you endanger your privacy - The more friends you have, the easier you could be tracked, exploited - Bullying, abuse, exploitation, threats, intimidation, etc. are on the rise “Facebook seems to be a place where people aren't being cautious enough” - DeDomenico-Payne (The dark side of social media)The dark side of social media

Exercise 1- Review all your passwords and find which ones do not meet the security requirements based on good practice mentioned here 2- Change those passwords and ensure that the new ones meet those criteria 3- Read the privacy-related instructions of the two major social networking sites that you use (e.g., Facebook, Twitter) 4- Mark the points that you think could be of potential concern for activists in your country or region 5- Discuss how those points could prevent users in your country to register with fake/anonymous identities and what that would mean to activists in your country and the risk associated with revealing their identities and their private chatting messages.