Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.

Similar presentations


Presentation on theme: "Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory."— Presentation transcript:

1 Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory

2 Cyber Security 45% believe cyber security is just as important as border security…

3 Cost of Cyber Security Cyber Crime in 2011 Anticipated future cost of Cyber Crime Global Drug Trafficking - 2011 $388 billion $411 billion

4 Today’s Agenda 1.Building Defenses Firewalls, Malware Protection and LUA 2.Sharing Information Wireless Networking Security 3.Being Alert and Vigilant Good Cyber Behavior

5 Windows Security Center Start -> Settings -> Control Panel -> Security Center

6 System Updates Ever See these? Patch and Update Your System!!! – Control Panel -> Windows Update – (XP Only) http://windowsupdate.microsoft.com

7 Malware Protection Trend Micro = FREE for BEA Employees – http://virus.inl.gov – instructions and download

8 Non-Admin Rights At Work: “Least User Access” (LUA) At Home: Standard User vs. Administrator You should have at least 3 accounts on every computer Administrator Account – Only for installing software Your Account (Standard user) – Daily access 1 Account per child (Standard User) Standard (non-administrator) accounts prevent the installation of unwanted software. This includes viruses, malware, and games (which might not be as innocent as you think).

9 How To Setup Multiple Accounts Start, (Settings), Control Panel User Accounts

10 How To Setup Multiple Accounts

11 QUESTIONS ABOUT PATCHING, MALWARE AND LUA? Before moving on to wireless networks…

12 Wireless Home Networking

13 Layered Protection First Layer of Protection – Change Default Administrator Passwords (and Usernames) – Change the Default SSID – Disable SSID Broadcast Second Layer of Protection – Turn on (Compatible) WPA / WEP Encryption – Consider Hard Wire Computer (Home Office/Business Computer) Advanced Layer of Protection – Assign Static IP Addresses to Devices – Enable MAC Address Filtering

14 First Level – Change Default Passwords Most Popular Brands: Linksys NETGEAR D-Link Belkin Dynex Warning – Be Sure To Write Down Any Changes (Keep a Computer Log Book)

15 First Level - Change the Default SSID Use something descriptive but cryptive AmmonResidence - Bad AmRes1House - Better

16 First Level - Disable the SSID Broadcast

17 Layered Protection First Layer of Protection – Change Default Administrator Passwords (and Usernames) – Change the Default SSID – Disable SSID Broadcast Second Layer of Protection – Turn on (Compatible) WPA / WEP Encryption – Consider Hard Wire Computer (Home Office/Business Computer) Advanced Layer of Protection – Assign Static IP Addresses to Devices – Enable MAC Address Filtering

18 Second Level – Turn on WPA/WEP WEP (Wired Equivalent Privacy) – Weakest but better than nothing WPA (Wi-Fi Protected Access) WPA2 (WPA version 2) They all encrypt the signal but not the content Both devices (Wireless Access Point and the Laptop)

19 Second Level – Take Computer Off Air Does not need portability (i.e. home office computer) Contains sensitive data Wire it directly to your Wireless Access Point

20 Layered Protection First Layer of Protection – Change Default Administrator Passwords (and Usernames) – Change the Default SSID – Disable SSID Broadcast Second Layer of Protection – Turn on (Compatible) WPA / WEP Encryption – Hard Wire One Computer (Home Office/Business Computer) Advanced Layer of Protection – Assign Static IP Addresses to Devices – Enable MAC Address Filtering

21 Advanced Level – IP Address Restriction IP Internet Protocol address Easier than a MAC to spoof If someone were to know or guess it IPv4 example 134.20.80.215 – developed in the early 1980’s – 2 32 address spaces or – 4.3 billion unique address spaces IPv6 a401:0db8:0000:1234:0af0:0567:0001:0001 – developed in the mid1990’s – 3.403 × 10 38 address spaces or – 340 trillion trillion trillion unique addresses

22 Advanced Level – MAC Address Restrict Media Access Control Address Unique to every piece of IT equipment Example 01:a3:5f:08:23:1c Very hard to spoof Number is burned into the hardware layer of the device

23 Okay Let’s Review First Layer of Protection – THE MOAT – Change Default Administrator Passwords (and Usernames) – Change the Default SSID – Disable SSID Broadcast Second Layer of Protection – THE DRAWBRIDGE – Turn on (Compatible) WPA / WEP Encryption – Consider Hard Wire Computer (Home Office/Business Computer) Advanced Layer of Protection – THICK WALLS – Assign Static IP Addresses to Devices – Enable MAC Address Filtering

24 Good User Practices Do Not Auto-Connect to Wi-Fi Networks – Manually Connect – Don’t Talk To Strangers Enable Firewalls On Each Computer – Add another Level of Protection Position the Router or Access Point Safely – Avoid Upstairs near a Window (radio signals travel a long way) Turn off Network during Extended Periods of Non-Use – Vacation – Long Weekend

25 What New In Wireless Routers Cisco (Linksys) and DLink just released new lines of Wireless Routers

26 QUESTIONS ABOUT WIRELESS NETWORKS? Before moving on to human behaviors…

27 2 Big Behavioral Mistakes Using Weak Passwords Victim to Phishing

28 Defend Yourself Use longer passwords Upper and Lowercase Add Special Characters Change your password often

29

30

31

32

33

34 Identifying A Phishing Attack 1.Ask Yourself: Do I associate with this company? 2.Look for Spelling/Grammar mistakes? 3.Sense of Urgency 4.Threats 5.“Too Good To Be True” 6.Seeking Charitable Donations 7.Non Official URLs

35 Summary of Defending Yourself Patch and update your system Run effective malware detection Secure your wireless network Use stronger passwords Mouse over links before clicking “Think Before You Click!”

36 QUESTIONS? Jonathan Homer SecAware@inl.gov


Download ppt "Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory."

Similar presentations


Ads by Google