Cyber security awareness


Published on

General Overview of cyber security for educational environment

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Cyber security awareness

  1. 1. Cyber Security AwarenessJason MurrayTechTalk LiveMay 7, 2013
  2. 2. Goals• Promote cyber security awareness• Offer self-protection techniques• Discuss methods to secure personal information• Provide examples of protection software
  3. 3.
  4. 4. 0%2%4%6%8%10%12%14%Concerns● Symantec blocked 5.5 billion malware attacks last year– 81% increase over the previous year (● Kaspersky detecting 200,000 new/variant malwares per day ( Industry Rate1 Education 146%2 Retail & wholesale 104%3 Health Care 100%4 Banking & Finance 69%5 Food & Beverage 58%6 Government 46%January Malware EncountersSource:CiscoRatesabove100%reflecthigherthanmedianrateofencounterUnited States 11.52%Japan 3.47%Colombia 2.53%Source:FortinetFrance 1.87%Canada 1.74%Received Spam (Top 5 Regions)
  5. 5. SC Magazine●● eBook
  6. 6. FortiGuard Center●● Live Threat Monitor
  7. 7. Valuable Content• Identity• SSN• Demographics• Credit Cards• Bank accounts• Intellectual Property• Business plans• Innovational ideas• Marketing campaigns• Thoughts
  8. 8. Vulnerabilities• Computers• Networks• Systems• Game consoles• Phones• Houses• Cars• GPS systems
  9. 9. Greatest Threat• Users
  10. 10. Security Threats• Social Engineering– Facebook– Twitter– LinkedIn
  11. 11. Security Threats• PhishingSource: APWG
  12. 12. Security Threats• PhishingFrom: MICHELLE REILLY []Sent: Monday, January 28, 2013 11:21 PMTo: employee-web@webmaster.orgSubject: Important Technical Web Notice!Important Technical Web Notice!Your mailbox has exceeded one or more size limits set by theadministrator. You may not be able to send or receive new messagesuntil the mailbox size is reduced. For more space, please CLICK HERE<> to upgrade your webmail account.The new secure feature upgrades your inbox to a clean, modern lookwhile maintaining your contacts, passwords, aliases and more. Its fast.Its intuitive. Its email at its best.Thank you for your cooperation.Information and Technology DESKTHE MAIL TEAM.
  13. 13. Security Threats• Malware– Viruses● Trojans● Worms● rootkits– Spyware● Ransomware● Adware● keyloggers
  14. 14. Trojan Horse
  15. 15. Security Threats• Man in the Middle Attack• Eavesdropping• Beware of free WiFi• KARMA
  16. 16. Security Threats• Computer/Flash drive Theft
  17. 17. Security Threats• Script Kiddies– YouTube– Google
  18. 18. Passwords•• Avoidance• Personal information• Facebook• 2 step verification• Best Practice
  19. 19. Penetration Testing• Blackbuntu• BackTrack• Metasploit
  20. 20. Additional Tools• Hiren’s Boot Disk• Nmap & ZenMap• Cain & Abel• Nessus• AirCrack-ng
  21. 21. Communication Security• Secure Instant Message• Pidgin• Pidgin OTR Plugin• Prevents eavesdropping
  22. 22. Communication Security• Anonymization• Hides the true Internet address• Masks the geographical location• Circumvents online tracking technologies• Software• Tor• Bounces on a network of relays
  23. 23. Communication Security• HTTP vs HTTPS• Encryption• HTTPS• Designed to withstand eavesdropping• Subject to decryption by SSL stripping tools• Wireshark with SSL decryption support• HTTPS Everywhere• FireFox plugin• Chrome plugin
  24. 24. Website Vulnerabilities• Hacked websites• Hacked advertisements• Cookies• Tracking• Injections• Malware• Redirection
  25. 25. Communication Security• CyberGhost VPN• Hotspot Shield• SpotFlux
  26. 26. Mobile SecurityAndroid; 69%iOS; 19%Blackberry; 5%Symbian; 3%Windows; 3% Others; 2%Android iOS Blackberry Symbian Windows OthersSource: IDC Worldwide Mobile Phone Tracker, February 14, 2013
  27. 27. Mobile Defense• Lock passwords• Device encryption• Tracking software• Disable WiFi & Bluetooth when not in use• Antivirus software• Remote wipe
  28. 28. Android• Lookout (tracking)• Prey (tracking)• WhisperCore (disk encryption)• RedPhone (conversation encryption)• TextSecure (text encryption)• Gibberbot (messaging encryption)Source:
  29. 29. Summary
  30. 30. Resources• NEK Cyber Operations•• IDC World Mobile Phone Tracker• APWG• Wireless Defense• SC magazine• SC education security ebook• Fortiguard
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.