Security starts at Home (Protecting your business by protecting your computer.) Jayson E. Street,  CISSP, GSEC,  GCFA, IEM...
Let go of my EGO  <ul><li>Lets start out with a little about yours truly. </li></ul><ul><li>[email_address] </li></ul>
Know yourself know your enemy <ul><li>Sun Wu (Tzu) “Ping-fa”(The Art of War) </li></ul><ul><li>“ Thus it is said that one ...
Contents <ul><li>INTRO </li></ul><ul><li>Basic PC Safety </li></ul><ul><li>Identity Theft Issues  </li></ul><ul><li>Discus...
What should you do? <ul><li>Use a Firewall </li></ul><ul><li>Keep Your Computer(s) Patched </li></ul><ul><li>Use Virus Pro...
Use a Firewall <ul><li>Hardware </li></ul><ul><ul><li>Linksys </li></ul></ul><ul><li>Software </li></ul><ul><ul><li>Norton...
Keep Your Computer(s) Patched <ul><li>Windows Update </li></ul><ul><ul><li>http://update.microsoft.com </li></ul></ul><ul>...
Use Virus Protection Software <ul><li>There are plenty of choices: </li></ul><ul><ul><li>McAfee, Symantec, F-Prot, etc… </...
Email Safety – KRESV Test <ul><li>The  K now Test – Is the email from someone you know? </li></ul><ul><li>The  R eceived T...
SCAMS! <ul><li>No one in Africa with millions of dollars to smuggle out of the country is going to ask for help in an emai...
More Basic Tips <ul><li>Remove File Sharing if not needed </li></ul><ul><li>Encrypt confidential data (you can find free e...
Identity Theft Issues <ul><li>How do thieves get your information? </li></ul><ul><li>&quot;Dumpster diving&quot; - often v...
Identity Theft Issues <ul><li>How do thieves get your information? </li></ul><ul><li>Public records - for example, if you ...
Identity Theft Issues <ul><li>What do thieves do with your information? </li></ul><ul><li>Open credit accounts and buy pro...
Identity Theft Issues <ul><li>10 Ways to Protect Yourself </li></ul><ul><li>Be very careful about to whom you give out per...
Identity Theft Issues <ul><li>10 Ways to Protect Yourself (continued) </li></ul><ul><li>Minimize the number of credit card...
Identity Theft Issues <ul><li>Web resources on Identity Theft: </li></ul><ul><li>Federal Trade Commission: </li></ul><ul><...
Now let’s learn from others <ul><li>Discussion and Questions???? </li></ul><ul><li>Or several minutes of uncomfortable sil...
Upcoming SlideShare
Loading in …5
×

Infosec 4 The Home

286 views
263 views

Published on

A talk for the average home user on how to better secure their computer on the Internet.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
286
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Infosec 4 The Home

  1. 1. Security starts at Home (Protecting your business by protecting your computer.) Jayson E. Street, CISSP, GSEC, GCFA, IEM, IAM, CCSE, CCSA, Security+
  2. 2. Let go of my EGO <ul><li>Lets start out with a little about yours truly. </li></ul><ul><li>[email_address] </li></ul>
  3. 3. Know yourself know your enemy <ul><li>Sun Wu (Tzu) “Ping-fa”(The Art of War) </li></ul><ul><li>“ Thus it is said that one who knows the enemy and knows himself will not be endangered in a hundred engagements. One who does not know the enemy but knows himself will sometimes be victorious, sometimes meet with defeat. One who knows neither the enemy nor himself will invariably be defeated in every engagement!” </li></ul>
  4. 4. Contents <ul><li>INTRO </li></ul><ul><li>Basic PC Safety </li></ul><ul><li>Identity Theft Issues </li></ul><ul><li>Discussion </li></ul>
  5. 5. What should you do? <ul><li>Use a Firewall </li></ul><ul><li>Keep Your Computer(s) Patched </li></ul><ul><li>Use Virus Protection Software </li></ul>
  6. 6. Use a Firewall <ul><li>Hardware </li></ul><ul><ul><li>Linksys </li></ul></ul><ul><li>Software </li></ul><ul><ul><li>Norton </li></ul></ul><ul><ul><li>ZoneAlarm </li></ul></ul><ul><li>Test Yourself </li></ul><ul><ul><li>http://www.hackerwatch.org/probe/ </li></ul></ul>
  7. 7. Keep Your Computer(s) Patched <ul><li>Windows Update </li></ul><ul><ul><li>http://update.microsoft.com </li></ul></ul><ul><ul><li>Download patches automatically </li></ul></ul><ul><ul><li>Install patches manually </li></ul></ul><ul><li>Don’t Forget Microsoft Office </li></ul><ul><ul><li>http://office.microsoft.com/officeupdate/ </li></ul></ul>
  8. 8. Use Virus Protection Software <ul><li>There are plenty of choices: </li></ul><ul><ul><li>McAfee, Symantec, F-Prot, etc… </li></ul></ul><ul><li>Auto-Update daily </li></ul><ul><li>Auto-Scan enabled </li></ul>
  9. 9. Email Safety – KRESV Test <ul><li>The K now Test – Is the email from someone you know? </li></ul><ul><li>The R eceived Test – Have you received email from this person before? </li></ul><ul><li>The E xpect Test – Were you expecting an email with an attachment from this person? </li></ul><ul><li>The S ense Test – Do the contents described in the subject line and the name of the attachment make sense? </li></ul><ul><li>The V irus Test – Does the email contain a virus? To determine this, you will need to install and use an anti-virus program such as McAfee or Norton. </li></ul>
  10. 10. SCAMS! <ul><li>No one in Africa with millions of dollars to smuggle out of the country is going to ask for help in an email. </li></ul><ul><li>Bill Gates is not going to give you money for forwarding an email. </li></ul><ul><li>Sending a “chain” email will not bring you luck – but it might help someone learn some things about you. </li></ul><ul><li>Legitimate companies will not ask you for your password in an email. </li></ul><ul><li>Check them out: http://www.snopes.com </li></ul>
  11. 11. More Basic Tips <ul><li>Remove File Sharing if not needed </li></ul><ul><li>Encrypt confidential data (you can find free encryption tools from www.download.com) </li></ul><ul><li>Lock down WiFi (Wireless Network Connectivity) </li></ul><ul><li>Use Good Passwords </li></ul><ul><ul><li>Change passwords often </li></ul></ul><ul><ul><li>Use alpha-numeric characters </li></ul></ul><ul><ul><li>No password is “Un”crackable. There are an abundance of tools hackers may use to get your password </li></ul></ul><ul><ul><li>Do not use your user name or full name </li></ul></ul>
  12. 12. Identity Theft Issues <ul><li>How do thieves get your information? </li></ul><ul><li>&quot;Dumpster diving&quot; - often very personal information is just thrown away.  People get credit card solicitations that they throw out as &quot;junk mail.&quot;  An identity thief could  use that offer to open credit in your name.  Other sources for digging through trash are businesses, law firms, medical facilities, accountants and banks. </li></ul><ul><li>Roommates, relatives, &quot;friends&quot; and estranged spouses - all have access to very personal information, and may be very motivated to misuse that information. </li></ul><ul><li>Waiters / Waitresses - you hand them your credit card at a restaurant and they disappear for five minutes.  Do you know what they did with your credit card while they were out of sight? </li></ul>
  13. 13. Identity Theft Issues <ul><li>How do thieves get your information? </li></ul><ul><li>Public records - for example, if you have been involved in a divorce, many of your financial records could potentially be part of the public record and available by searching at the courthouse.  For a thief - why dig in the trash? </li></ul><ul><li>Hacking - many people now have high-speed internet connections at their homes.  That makes their personal computers (full of tax return, checking account and investment records) an excellent target for an identity thief. </li></ul>
  14. 14. Identity Theft Issues <ul><li>What do thieves do with your information? </li></ul><ul><li>Open credit accounts and buy products / services. </li></ul><ul><li>Get phone or utility service. </li></ul><ul><li>Get a job (the Social Security Administration has information about how to detect this) </li></ul><ul><li>Commit a crime (there have been reports ranging from traffic violations to international drug trafficking). </li></ul><ul><li>Buy a car. </li></ul><ul><li>Rent an apartment. </li></ul>
  15. 15. Identity Theft Issues <ul><li>10 Ways to Protect Yourself </li></ul><ul><li>Be very careful about to whom you give out personal identification information. </li></ul><ul><li>Never provide any personal, bank account or credit card information to anyone who contacts you through a telephone solicitation. </li></ul><ul><li>Keep items with personal information in a safe place. </li></ul><ul><li>Tear Up/Destroy all old personal information.  </li></ul><ul><li>Sign any credit or debit cards with permanent ink as soon as you receive them.  </li></ul>
  16. 16. Identity Theft Issues <ul><li>10 Ways to Protect Yourself (continued) </li></ul><ul><li>Minimize the number of credit cards and other items with personal information that you carry. </li></ul><ul><li>Do not leave envelopes containing your checks in your home mailbox. </li></ul><ul><li>Give out your Social Security Number only when necessary. </li></ul><ul><li>Be careful when creating passwords or PIN's.  </li></ul><ul><li>Monitor your credit card statements and your credit report. </li></ul>
  17. 17. Identity Theft Issues <ul><li>Web resources on Identity Theft: </li></ul><ul><li>Federal Trade Commission: </li></ul><ul><li>http://www.consumer.gov/idtheft/ </li></ul><ul><li>Social Security Administration </li></ul><ul><li>http://www.ssa.gov/pubs/idtheft.htm </li></ul><ul><li>Boston Federal Reserve Bank </li></ul><ul><li>http://www.bos.frb.org/consumer/identity/ </li></ul><ul><li>Better Business Bureau </li></ul><ul><li>http://www.bbb.org/alerts/idtheft.asp </li></ul>
  18. 18. Now let’s learn from others <ul><li>Discussion and Questions???? </li></ul><ul><li>Or several minutes of uncomfortable silence it’s your choice. </li></ul><ul><li>http://f0rb1dd3n.com/s1s/WP/ </li></ul><ul><li>http://forums.stratagem-one.com </li></ul>

×