Cyber Security AwarenessJason MurrayTechTalk LiveMay 7, 2013
Goals• Promote cyber security awareness• Offer self-protection techniques• Discuss methods to secure personal information•...
http://www.youtube.com/watch_popup?v=pLty-2U4BXs
0%2%4%6%8%10%12%14%Concerns● Symantec blocked 5.5 billion malware attacks last year– 81% increase over the previous year (...
SC Magazine● http://www.scmagazine.com/may-2013-global-threats/slideshow/1299/● eBook
FortiGuard Center● http://www.fortiguard.com/● Live Threat Monitor
Valuable Content• Identity• SSN• Demographics• Credit Cards• Bank accounts• Intellectual Property• Business plans• Innovat...
Vulnerabilities• Computers• Networks• Systems• Game consoles• Phones• Houses• Cars• GPS systems
Greatest Threat• Users
Security Threats• Social Engineering– Facebook– Twitter– LinkedIn
Security Threats• PhishingSource: APWG
Security Threats• PhishingFrom: MICHELLE REILLY [mailto:mreilly@westfieldnjk12.org]Sent: Monday, January 28, 2013 11:21 PM...
Security Threats• Malware– Viruses● Trojans● Worms● rootkits– Spyware● Ransomware● Adware● keyloggers
Trojan Horse
Security Threats• Man in the Middle Attack• Eavesdropping• Beware of free WiFi• KARMA
Security Threats• Computer/Flash drive Theft
Security Threats• Script Kiddies– YouTube– Google
Passwords• www.howsecureismypassword.net• Avoidance• Personal information• Facebook• 2 step verification• Best Practice
Penetration Testing• Blackbuntu• BackTrack• Metasploit
Additional Tools• Hiren’s Boot Disk• Nmap & ZenMap• Cain & Abel• Nessus• AirCrack-ng
Communication Security• Secure Instant Message• Pidgin• Pidgin OTR Plugin• Prevents eavesdropping
Communication Security• Anonymization• Hides the true Internet address• Masks the geographical location• Circumvents onlin...
Communication Security• HTTP vs HTTPS• Encryption• HTTPS• Designed to withstand eavesdropping• Subject to decryption by SS...
Website Vulnerabilities• Hacked websites• Hacked advertisements• Cookies• Tracking• Injections• Malware• Redirection
Communication Security• CyberGhost VPN• Hotspot Shield• SpotFlux
Mobile SecurityAndroid; 69%iOS; 19%Blackberry; 5%Symbian; 3%Windows; 3% Others; 2%Android iOS Blackberry Symbian Windows O...
Mobile Defense• Lock passwords• Device encryption• Tracking software• Disable WiFi & Bluetooth when not in use• Antivirus ...
Android• Lookout (tracking)• Prey (tracking)• WhisperCore (disk encryption)• RedPhone (conversation encryption)• TextSecur...
Summary
Resources• NEK Cyber Operations• Androidfreeware.net• IDC World Mobile Phone Tracker• APWG• Wireless Defense• SC magazine•...
Cyber security awareness
Cyber security awareness
Upcoming SlideShare
Loading in...5
×

Cyber security awareness

530

Published on

General Overview of cyber security for educational environment

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
530
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
48
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cyber security awareness

  1. 1. Cyber Security AwarenessJason MurrayTechTalk LiveMay 7, 2013
  2. 2. Goals• Promote cyber security awareness• Offer self-protection techniques• Discuss methods to secure personal information• Provide examples of protection software
  3. 3. http://www.youtube.com/watch_popup?v=pLty-2U4BXs
  4. 4. 0%2%4%6%8%10%12%14%Concerns● Symantec blocked 5.5 billion malware attacks last year– 81% increase over the previous year (computerworld.com)● Kaspersky detecting 200,000 new/variant malwares per day (kaspersky.com)Position Industry Rate1 Education 146%2 Retail & wholesale 104%3 Health Care 100%4 Banking & Finance 69%5 Food & Beverage 58%6 Government 46%January Malware EncountersSource:CiscoRatesabove100%reflecthigherthanmedianrateofencounterUnited States 11.52%Japan 3.47%Colombia 2.53%Source:FortinetFrance 1.87%Canada 1.74%Received Spam (Top 5 Regions)
  5. 5. SC Magazine● http://www.scmagazine.com/may-2013-global-threats/slideshow/1299/● eBook
  6. 6. FortiGuard Center● http://www.fortiguard.com/● Live Threat Monitor
  7. 7. Valuable Content• Identity• SSN• Demographics• Credit Cards• Bank accounts• Intellectual Property• Business plans• Innovational ideas• Marketing campaigns• Thoughts
  8. 8. Vulnerabilities• Computers• Networks• Systems• Game consoles• Phones• Houses• Cars• GPS systems
  9. 9. Greatest Threat• Users
  10. 10. Security Threats• Social Engineering– Facebook– Twitter– LinkedIn
  11. 11. Security Threats• PhishingSource: APWG
  12. 12. Security Threats• PhishingFrom: MICHELLE REILLY [mailto:mreilly@westfieldnjk12.org]Sent: Monday, January 28, 2013 11:21 PMTo: employee-web@webmaster.orgSubject: Important Technical Web Notice!Important Technical Web Notice!Your mailbox has exceeded one or more size limits set by theadministrator. You may not be able to send or receive new messagesuntil the mailbox size is reduced. For more space, please CLICK HERE<http://systemcheck-res.ucoz.com/index1.htm> to upgrade your webmail account.The new secure feature upgrades your inbox to a clean, modern lookwhile maintaining your contacts, passwords, aliases and more. Its fast.Its intuitive. Its email at its best.Thank you for your cooperation.Information and Technology DESKTHE MAIL TEAM.
  13. 13. Security Threats• Malware– Viruses● Trojans● Worms● rootkits– Spyware● Ransomware● Adware● keyloggers
  14. 14. Trojan Horse
  15. 15. Security Threats• Man in the Middle Attack• Eavesdropping• Beware of free WiFi• KARMA
  16. 16. Security Threats• Computer/Flash drive Theft
  17. 17. Security Threats• Script Kiddies– YouTube– Google
  18. 18. Passwords• www.howsecureismypassword.net• Avoidance• Personal information• Facebook• 2 step verification• Best Practice
  19. 19. Penetration Testing• Blackbuntu• BackTrack• Metasploit
  20. 20. Additional Tools• Hiren’s Boot Disk• Nmap & ZenMap• Cain & Abel• Nessus• AirCrack-ng
  21. 21. Communication Security• Secure Instant Message• Pidgin• Pidgin OTR Plugin• Prevents eavesdropping
  22. 22. Communication Security• Anonymization• Hides the true Internet address• Masks the geographical location• Circumvents online tracking technologies• Software• Tor• Bounces on a network of relays
  23. 23. Communication Security• HTTP vs HTTPS• Encryption• HTTPS• Designed to withstand eavesdropping• Subject to decryption by SSL stripping tools• Wireshark with SSL decryption support• HTTPS Everywhere• FireFox plugin• Chrome plugin
  24. 24. Website Vulnerabilities• Hacked websites• Hacked advertisements• Cookies• Tracking• Injections• Malware• Redirection
  25. 25. Communication Security• CyberGhost VPN• Hotspot Shield• SpotFlux
  26. 26. Mobile SecurityAndroid; 69%iOS; 19%Blackberry; 5%Symbian; 3%Windows; 3% Others; 2%Android iOS Blackberry Symbian Windows OthersSource: IDC Worldwide Mobile Phone Tracker, February 14, 2013
  27. 27. Mobile Defense• Lock passwords• Device encryption• Tracking software• Disable WiFi & Bluetooth when not in use• Antivirus software• Remote wipe
  28. 28. Android• Lookout (tracking)• Prey (tracking)• WhisperCore (disk encryption)• RedPhone (conversation encryption)• TextSecure (text encryption)• Gibberbot (messaging encryption)Source: androidfreeware.net
  29. 29. Summary
  30. 30. Resources• NEK Cyber Operations• Androidfreeware.net• IDC World Mobile Phone Tracker• APWG• Wireless Defense• SC magazine• SC education security ebook• Fortiguard
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×