Your SlideShare is downloading. ×
Dark Alleys Part1740
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Dark Alleys Part1740

366
views

Published on

idk dnt fukin ask me!!

idk dnt fukin ask me!!

Published in: Economy & Finance, Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
366
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Transcript

    • 1. Dark Alleys of the Internet Part 1 ACE/NETC 2007 June 19, 2007 Albuquerque, NM
    • 2. Security
      • Security is the condition of being protected against danger or loss ( http://en.wikipedia.org/wiki/Security )
      • Tradeoff between risk to assets & mitigation of risk to those assets
    • 3. “ But I Have Nothing”
      • How Wrong!
        • Pass your wallets down the row
        • Pass your cell phones down the row
        • Pass your list of phone numbers down the row
      • Recognize that you have something of value on the computer or network
    • 4. Assets?
    • 5. Assets
      • University Financial System
      • Personally Identifiable Information (PII)
      • Clients’ PII
      • Your account
      • Credit Cards
      • Phone Companies
    • 6. Passwords
      • A common security solution is password
      • No reason to share password because you can:
        • Share files/folders
        • Remote Desktop
        • E-mail Proxy
        • Online Resources like Google Docs
    • 7. Managing Passwords
      • Trade-offs
        • Different passwords for different systems
        • Require passwords to change
      • Password Managers
        • Password Safe
          • http://passwordsafe.sourceforge.net
        • Others
          • http://www.lifehack.org/articles/technology/10-free-ways-to-track-all-your-passwords.html
      • Choosing a good pass phrase
        • “ 1wbiDCH” (I was born in Dale County Hospital)
        • http://www.aces.edu/extconnections/2006/10/
    • 8. Safely Using Email Avoid hoaxes and phishing attempts
    • 9. Hoaxes
      • Trickery
      • Please forward
      • Usually harmless
      • Waste time and resources
    • 10. Phishing Clues
      • Return address appears to be legitimate
      • Warns of consequences unless urgent action is taken
      • No personal info or account name/number in message
      • Name of link doesn’t match destination
        • Name of link: https://www.firstnational.com
        • Destination of link: http://www.sargonas.con/firstnational/login.htm
      • Link is not secure (HTTPS)
      • http://www.aces.edu/extconnections/2006/12
      • http://www.wikipedia.org/wiki/Phishing
      • http://jdorner.blogspot.com/2007/03/every-now-and-then-i-come-across.html
    • 11. Don’t Become A Victim
      • “ Google” a sentence from the message to see if it’s a hoax or phishing attempt
      • Never click on web links and be mindful of HTTPS
      • Only open attachments which are in expected messages (just because you know the sender doesn’t mean the message is legitimate)
    • 12. Protecting You and Your Operating System
    • 13. Ways to Secure MS Windows
      • Install virus protection software
      • Turn on the Windows firewall
      • Turn on Windows updates
      • Use spyware/adware prevention software
      • Use Windows Security Center
      • Use limited accounts
      • Use password for every account
    • 14. Virus Protection Software
      • Install & routinely update virus protection software
        • McAfee
          • Virus Protection Only!
          • Purchase from any Office Supply Store
        • AVG
          • Free for non-commercial use
          • Download at www.downloads.com
        • Symantec (Norton)
          • Resource intensive
    • 15. Windows Firewall
      • Choose “On”
      • Only unblock programs that you trust
    • 16. Windows Updates
      • Select “Automatic (recommended)”
      • Select “Everyday”
      • Choose an appropriate time
      • Leave computer on! (check sleep/ hibernate)
    • 17. Spyware/Malware Prevention Software
      • Preventative—combine w/ Reactive
        • Windows Defender
          • http://www.microsoft.com/athome/security/spyware/software/default.mspx
        • AVG Anti-Spyware
          • www.downloads.com
      • Reactive (run once a week)
        • Spybot
          • www.downloads.com
        • Adaware
          • www.downloads.com
    • 18. Security Center
      • Ensures:
        • Firewall is on
        • Automatic updates are installed
        • Virus protection installed & up-to-date
    • 19. Security Center Click on the shield to fix the problem You don’t want the RED or Yellow shield
    • 20. Limited Accounts
      • Prohibited from installing software
        • Prevents installation of malware/viruses
        • User has access to currently installed software
      • Prohibited from accessing Administrator’s documents & settings
        • Prevents changes to administrator password
        • Prevents access to Administrator’s Documents, Desktop, etc.
      • Create/modify system accounts under “ Control Panel/User Accounts ”
    • 21. Limited Accounts
      • Easily switch between accounts
      • Leave programs running while others login (windows-L)
    • 22. Home Networking Everyone Needs a Router!
    • 23. Home Networking Routers
      • One internet connection, multiple computers
      • Firewall protection
      • Access restrictions
    • 24. One Internet Connection
    • 25. Firewall Protection
      • One-way valve that lets you out, but doesn’t let intruders in
        • Prevents unauthorized access to your computer(s)
        • Hides your computer(s) from the internet while still allowing access to the internet
      • Justification: Attacks on AU (week of 5/28-6/02)
        • 90,540 blocked
        • 25,147 suspicious
        • 3,893 possibly successful
    • 26. Access Restrictions
      • Control when a computer can access the internet
        • Deny/Allow by website or keyword
      • Multiple configurations
        • Everyday or only on school days etc.
        • All the time, or only between 4p.m. & 10p.m, etc.
    • 27. Secure Wireless
      • Disable wireless, if you’re not using it
      • Most routers can be configured w/a CD
      • What can be done manually?
        • Change the SSID (wireless network name)
        • Disable SSID Broadcast (make it invisible)
        • Require a password to join the wireless network
        • Restrict by MAC address
    • 28. Questions? Thank You! Greg Parmer , Jonas Bowersock , Scott Snyder , Anne Adrian