Security and Privacy Brown Bag


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • What do I mean by security and what do I mean by privacy? Online Identity - what is out there for anyone to discover?  Social engineering - what can people do with "public domain" knowledge? What the heck to do with all the passwords Friendly PSA about your email account
  • Give live demo of my search results.
  • Give live demo of my search results. This is your online alias or username...  Need one for just about all websites such as youtube, any forums, etc.
  • An important part of security and privacy is knowing what is out there. Knowing what's in the "public domain" meaning anyone who can do some sort of detective work. When you leave today, Google yourself.  Google your alias as well. Remember my livejournal? A friend back in middle school wrote a very scathing entry about his father.
  • Image from!/kevinmitnick
  • SQL injection into CMS Retrieved username/password database DB was not salted and no iterative hashing Passwords were 6 lowercase letters and 2 numbers Recovered passwords from CEO and COO users Linux machine had a 6 month old unpatched  privilege escalation vulnerability  that allowed superuser access.  The other username/password was used for twitter, facebook, google apps, etc. Reset everyone's passwords through google apps Started mailing people through their emails
  • Give demo of user information
  • Security and Privacy Brown Bag

    1. 1. Security and Privacy Brown Bag source:
    2. 2. proudly presents theSecurity and Privacy brown bag for nonprofits
    3. 3. Road Map• Setting the context• Your online identity• Examples of social engineering• Passwords and password management• Your email (the skeleton key)
    4. 4. NPower Northwest• Vision o A thriving community with high performing nonprofits.• Mission o To strengthen the nonprofit sector by catalyzing innovation and driving adoption of technology solutions.
    5. 5. IntroductionsStephen EggersHandsOn Tech AmeriCorp VISTAServing at NPower
    6. 6. Setting the contextPrivacy• Managing your online presence• What can people learn about you?• What can people do with that knowledge?Security• Best practices• Password management• The skeleton key: your email account
    7. 7. What do you know about me?
    8. 8. What do you know about me?From my website & blog: • Which cities I have lived in and now live in • Specific clubs that I am in • The names of some of my friends • Some specific events I participated inFrom NPower: • Where I work & what I do • Specific projects that I am involved in
    9. 9. What do you know about me?
    10. 10. What do you know about me?From all search results: • Some YouTube videos from 2004 - 2012 • My hobbies based on forum posts • Can determine some items I own based on forum posts • More photos Name                            Alias/handle/username
    11. 11. Social engineering (hacking)" engineering was extremely effective inreaching my goals without resorting to using atechnical exploit. I would look for the weakest linkin the chain that was the least risk and cost to me[...] if an attacker can walk into the server roomwithout much chance of detection, thats all shewrote" Kevin Mitnick (arrested in 1995)
    12. 12. Social engineering todayHBGary and HBGary Federal are technology security companies that were hacked in February of 2011 • Retrieved username and password database through known vulnerability in CMS • CEO and COO had very short passwords and were recovered • CEO and COO used same credentials for other services (Twitter, email, LinkedIn) • Attackers simply asked the Chief Security Specialist through series of emails for a reminder as to their usernames and passwords • HBGarys website was defaced, thousands of emails made public, people were fired and the CEO resigned
    13. 13. Social engineering today Want my friends phone numbers? • Create a "clone" of me on Facebook with public data • Send friend requests to friends of my friends • Assume 500 friend requests were made, and 5% accepted • We now have an account that can friend request direct friends, but this time we have many mutual friends in commonAt the Silver Bullet security conference in São Paulo, UOLDiveo chief securityofficer Nelson Novaes Neto demonstrated this in November 2011
    14. 14. Social engineering todayIs your location attached to your tweet, embedded in a photosmetadata, or did you forget to make your Google Mapsunlisted?
    15. 15. What can you do?Everyone:• Review your privacy settings• Know what you put in the public domain• Be aware of social engineering strategiesIT best practices: • Use unique, strong passwords • Keep systems up to date and patched
    16. 16. PasswordsUse a long password with a mix of uppercase andlowercase letters and numbersIdeal: Dw0lGgBeAx0h10EiothF8FnU4G7yk37LtPTIuAcuqqGkdKD8cqIN2eIMtXzriXConsider using a password management toolExamples: KeePass, LastPass, Firefox, Chrome
    17. 17. Passwords - a new model• Consider 1 or 2 long (10+ digits) alphanumeric master  passwords• Reset all other passwords and store in password locker• All other passwords should be thought of as "disposable" • Dont bother remembering them • Make them super long • Reset them frequently, whenever you forget them, or dont have access to your locker storage Reset a password? To your email it goes!
    18. 18. Your email accountThe skeleton key to your online identity. Protect this! Google account: / Exchange: • Account timeout after multiple failed guesses • Phones accessing exchange should require a screen password and allow for a remote wipe
    19. 19. Final PSA• Do not have to fear online banking and shopping• Use long, unique passwords (and try a password management tool)• Check your privacy settings on commonly used services• Google yourself and any aliases or "handles"• Protect your email account• Understand that youre more likely to be conned than hacked• For IT admins: keep services patched and up to date
    20. 20. Any questions? Is that it?!photo by