Cyber security awareness

  • 394 views
Uploaded on

General Overview of cyber security for educational environment

General Overview of cyber security for educational environment

More in: Education , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
394
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
38
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Cyber Security AwarenessJason MurrayTechTalk LiveMay 7, 2013
  • 2. Goals• Promote cyber security awareness• Offer self-protection techniques• Discuss methods to secure personal information• Provide examples of protection software
  • 3. http://www.youtube.com/watch_popup?v=pLty-2U4BXs
  • 4. 0%2%4%6%8%10%12%14%Concerns● Symantec blocked 5.5 billion malware attacks last year– 81% increase over the previous year (computerworld.com)● Kaspersky detecting 200,000 new/variant malwares per day (kaspersky.com)Position Industry Rate1 Education 146%2 Retail & wholesale 104%3 Health Care 100%4 Banking & Finance 69%5 Food & Beverage 58%6 Government 46%January Malware EncountersSource:CiscoRatesabove100%reflecthigherthanmedianrateofencounterUnited States 11.52%Japan 3.47%Colombia 2.53%Source:FortinetFrance 1.87%Canada 1.74%Received Spam (Top 5 Regions)
  • 5. SC Magazine● http://www.scmagazine.com/may-2013-global-threats/slideshow/1299/● eBook
  • 6. FortiGuard Center● http://www.fortiguard.com/● Live Threat Monitor
  • 7. Valuable Content• Identity• SSN• Demographics• Credit Cards• Bank accounts• Intellectual Property• Business plans• Innovational ideas• Marketing campaigns• Thoughts
  • 8. Vulnerabilities• Computers• Networks• Systems• Game consoles• Phones• Houses• Cars• GPS systems
  • 9. Greatest Threat• Users
  • 10. Security Threats• Social Engineering– Facebook– Twitter– LinkedIn
  • 11. Security Threats• PhishingSource: APWG
  • 12. Security Threats• PhishingFrom: MICHELLE REILLY [mailto:mreilly@westfieldnjk12.org]Sent: Monday, January 28, 2013 11:21 PMTo: employee-web@webmaster.orgSubject: Important Technical Web Notice!Important Technical Web Notice!Your mailbox has exceeded one or more size limits set by theadministrator. You may not be able to send or receive new messagesuntil the mailbox size is reduced. For more space, please CLICK HERE<http://systemcheck-res.ucoz.com/index1.htm> to upgrade your webmail account.The new secure feature upgrades your inbox to a clean, modern lookwhile maintaining your contacts, passwords, aliases and more. Its fast.Its intuitive. Its email at its best.Thank you for your cooperation.Information and Technology DESKTHE MAIL TEAM.
  • 13. Security Threats• Malware– Viruses● Trojans● Worms● rootkits– Spyware● Ransomware● Adware● keyloggers
  • 14. Trojan Horse
  • 15. Security Threats• Man in the Middle Attack• Eavesdropping• Beware of free WiFi• KARMA
  • 16. Security Threats• Computer/Flash drive Theft
  • 17. Security Threats• Script Kiddies– YouTube– Google
  • 18. Passwords• www.howsecureismypassword.net• Avoidance• Personal information• Facebook• 2 step verification• Best Practice
  • 19. Penetration Testing• Blackbuntu• BackTrack• Metasploit
  • 20. Additional Tools• Hiren’s Boot Disk• Nmap & ZenMap• Cain & Abel• Nessus• AirCrack-ng
  • 21. Communication Security• Secure Instant Message• Pidgin• Pidgin OTR Plugin• Prevents eavesdropping
  • 22. Communication Security• Anonymization• Hides the true Internet address• Masks the geographical location• Circumvents online tracking technologies• Software• Tor• Bounces on a network of relays
  • 23. Communication Security• HTTP vs HTTPS• Encryption• HTTPS• Designed to withstand eavesdropping• Subject to decryption by SSL stripping tools• Wireshark with SSL decryption support• HTTPS Everywhere• FireFox plugin• Chrome plugin
  • 24. Website Vulnerabilities• Hacked websites• Hacked advertisements• Cookies• Tracking• Injections• Malware• Redirection
  • 25. Communication Security• CyberGhost VPN• Hotspot Shield• SpotFlux
  • 26. Mobile SecurityAndroid; 69%iOS; 19%Blackberry; 5%Symbian; 3%Windows; 3% Others; 2%Android iOS Blackberry Symbian Windows OthersSource: IDC Worldwide Mobile Phone Tracker, February 14, 2013
  • 27. Mobile Defense• Lock passwords• Device encryption• Tracking software• Disable WiFi & Bluetooth when not in use• Antivirus software• Remote wipe
  • 28. Android• Lookout (tracking)• Prey (tracking)• WhisperCore (disk encryption)• RedPhone (conversation encryption)• TextSecure (text encryption)• Gibberbot (messaging encryption)Source: androidfreeware.net
  • 29. Summary
  • 30. Resources• NEK Cyber Operations• Androidfreeware.net• IDC World Mobile Phone Tracker• APWG• Wireless Defense• SC magazine• SC education security ebook• Fortiguard