Steven Mandzik   Web 2.0 Security
Danah Boyd
    Privacy = Control
Anil Dash
One of the biggest benefits of that reality is that I now have control.
The information I choose to reveal...

G...
Social Engineering
Facts
★ 50% of security breaches have come from federal/state
  government (since 2005)

★ Spear Phishing US Government em...
Top Problems
★ Social Engineering

★ Spear Phishing

★ Updates

★ Passwords

★ Identity Theft
OBE -- (not top problems)
★ Anti-Virus

★ Identity Theft

★ Passwords (kinda)
Solutions
Simple
Simplify
★ Financial

★ Social

★ News
Financial
E*Trade
Amex
Social
News
Passwords
             Strong Password Definition, Requirements and Guidelines


•A strong password is a password that mee...
OAuth




        Facebook Connect
Finally!
Upgrade, Upgrade
Upgra
Steven Mandzik
Director of Green IT, Navstar Inc.

Steve@acleanlife.org

twitter: robotchampion

www.acleanlife.org --- ww...
Web20security
Web20security
Web20security
Web20security
Upcoming SlideShare
Loading in...5
×

Web20security

341

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
341
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Web20security

  1. 1. Steven Mandzik Web 2.0 Security
  2. 2. Danah Boyd Privacy = Control
  3. 3. Anil Dash One of the biggest benefits of that reality is that I now have control. The information I choose to reveal... Granted, I'll never have total control. But look at most people who are concerned with privacy. They're fighting a losing battle, trying to prevent their personal information from being available on the web at all. If you recognize that it's going to happen, your best bet is to choose how, when, and where it shows up.
  4. 4. Social Engineering
  5. 5. Facts ★ 50% of security breaches have come from federal/state government (since 2005) ★ Spear Phishing US Government email resulted 74,000 compromised computers ★ State actors -- Google v China -- East Europe Mafia
  6. 6. Top Problems ★ Social Engineering ★ Spear Phishing ★ Updates ★ Passwords ★ Identity Theft
  7. 7. OBE -- (not top problems) ★ Anti-Virus ★ Identity Theft ★ Passwords (kinda)
  8. 8. Solutions
  9. 9. Simple
  10. 10. Simplify ★ Financial ★ Social ★ News
  11. 11. Financial
  12. 12. E*Trade
  13. 13. Amex
  14. 14. Social
  15. 15. News
  16. 16. Passwords Strong Password Definition, Requirements and Guidelines •A strong password is a password that meets the following guidelines: •Be 7 or 14 characters long. •Contain both uppercase and lowercase letters. •Contain numbers. •Contain symbols, such as ` ! " ? $ ? % ^ & * ( ) _ - + = { [ } ] : ; @ ' ~ # | < , > . ? / •Contain a symbol in the second, third, fourth, fifth or sixth position (due to the way in which encryption works). •Not resemble any of your previous passwords. •Not be your name, your friend's or family member's name, or your login. •Not be a dictionary word or common name.
  17. 17. OAuth Facebook Connect
  18. 18. Finally!
  19. 19. Upgrade, Upgrade Upgra
  20. 20. Steven Mandzik Director of Green IT, Navstar Inc. Steve@acleanlife.org twitter: robotchampion www.acleanlife.org --- www.stevenmandzik.com
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×