View stunning SlideShares in full-screen with the new iOS app!Introducing SlideShare for AndroidExplore all your favorite topics in the SlideShare appGet the SlideShare app to Save for Later — even offline
View stunning SlideShares in full-screen with the new Android app!View stunning SlideShares in full-screen with the new iOS app!
Security and Privacy Brown Bag source: https://xkcd.com/936/
proudly presents theSecurity and Privacy brown bag for nonprofits
Road Map• Setting the context• Your online identity• Examples of social engineering• Passwords and password management• Your email (the skeleton key)
NPower Northwest• Vision o A thriving community with high performing nonprofits.• Mission o To strengthen the nonprofit sector by catalyzing innovation and driving adoption of technology solutions.
IntroductionsStephen EggersHandsOn Tech AmeriCorp VISTAServing at NPower NWstephene@npowernw.org
Setting the contextPrivacy• Managing your online presence• What can people learn about you?• What can people do with that knowledge?Security• Best practices• Password management• The skeleton key: your email account
What do you know about me?From my website & blog: • Which cities I have lived in and now live in • Specific clubs that I am in • The names of some of my friends • Some specific events I participated inFrom NPower: • Where I work & what I do • Specific projects that I am involved in
What do you know about me?From all search results: • Some YouTube videos from 2004 - 2012 • My hobbies based on forum posts • Can determine some items I own based on forum posts • More photos Name Alias/handle/username
Social engineering (hacking)"...social engineering was extremely effective inreaching my goals without resorting to using atechnical exploit. I would look for the weakest linkin the chain that was the least risk and cost to me[...] if an attacker can walk into the server roomwithout much chance of detection, thats all shewrote" Kevin Mitnick (arrested in 1995)
Social engineering todayHBGary and HBGary Federal are technology security companies that were hacked in February of 2011 • Retrieved username and password database through known vulnerability in CMS • CEO and COO had very short passwords and were recovered • CEO and COO used same credentials for other services (Twitter, email, LinkedIn) • Attackers simply asked the Chief Security Specialist through series of emails for a reminder as to their usernames and passwords • HBGarys website was defaced, thousands of emails made public, people were fired and the CEO resigned
Social engineering today Want my friends phone numbers? • Create a "clone" of me on Facebook with public data • Send friend requests to friends of my friends • Assume 500 friend requests were made, and 5% accepted • We now have an account that can friend request direct friends, but this time we have many mutual friends in commonAt the Silver Bullet security conference in São Paulo, UOLDiveo chief securityofficer Nelson Novaes Neto demonstrated this in November 2011
Social engineering todayIs your location attached to your tweet, embedded in a photosmetadata, or did you forget to make your Google Mapsunlisted?
What can you do?Everyone:• Review your privacy settings• Know what you put in the public domain• Be aware of social engineering strategiesIT best practices: • Use unique, strong passwords • Keep systems up to date and patched
PasswordsUse a long password with a mix of uppercase andlowercase letters and numbersIdeal: Dw0lGgBeAx0h10EiothF8FnU4G7yk37LtPTIuAcuqqGkdKD8cqIN2eIMtXzriXConsider using a password management toolExamples: KeePass, LastPass, Firefox, Chrome
Passwords - a new model• Consider 1 or 2 long (10+ digits) alphanumeric master passwords• Reset all other passwords and store in password locker• All other passwords should be thought of as "disposable" • Dont bother remembering them • Make them super long • Reset them frequently, whenever you forget them, or dont have access to your locker storage Reset a password? To your email it goes!
Your email accountThe skeleton key to your online identity. Protect this! Google account: google.com/accountsOutlook / Exchange: • Account timeout after multiple failed guesses • Phones accessing exchange should require a screen password and allow for a remote wipe
Final PSA• Do not have to fear online banking and shopping• Use long, unique passwords (and try a password management tool)• Check your privacy settings on commonly used services• Google yourself and any aliases or "handles"• Protect your email account• Understand that youre more likely to be conned than hacked• For IT admins: keep services patched and up to date
Any questions? Is that it?!photo by http://www.flickr.com/photos/plasticrevolver/164351244/