Your SlideShare is downloading. ×
Information Security Day for Penn State Ag Sciences
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Information Security Day for Penn State Ag Sciences

1,987
views

Published on

Too often faculty and staff fail to realize how important individual actions are to the security of computing systems. What each person does (or doesn't do) makes a significant difference with regards …

Too often faculty and staff fail to realize how important individual actions are to the security of computing systems. What each person does (or doesn't do) makes a significant difference with regards to both their individual privacy and the greater security of the institution.

To reinforce the idea that everyone must work together to ensure a secure computing environment, an Information Security Day was held within our College. This session will relate the concept behind the day and how it was held.

Information security and security awareness topics were discussed via short, "bite-sized" Adobe Connect sessions and included:

• Dangers of Social Networking
• Computer Best Practices to Prevent Malware
• How to Respond to an ‘Antivirus’ Pop-Up Ad
• Better Passwords and Pass Phrases
• Protecting Your Data

Published in: Technology, Education

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,987
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • There's a positive side to each of these negative principles: Design security controls that account for human behavior. Study cognitive science and practical psychology to support your decisions. This is also critical for gaining support for security initiatives, not just design of individual controls. Engage in intelligence and counter-threat operations to the best of your ability. Once an attack has started, your first line of security has already failed. Use checklists to remember the simple stuff, but any real security must be designed using a risk-based approach. As a corollary, you can't implement risk-based security if you don't really understand the risks; and most people don't understand the risks. Be the expert. Adopt anti-exploitation wherever possible. Vulnerability-driven security is always behind the threat. React faster and better . Incident response is more important than any other single security control.
  • Usually admin and admin
  • A USB drive belonging to the Army was found for sale at a bazaar just outside of Afghanistan. According to an email from Lt. Col. Thomas Collins, the Army does not know how the flash drive was lost in the first place. 120,000 patients of Wilcox Memorial Hospital in Lihue, Hawaii are still looking for a USB drive containing sensitive information such as their names, addresses, Social Security numbers and medical record numbers. Since its disappearance, the use of USB drives has been banned in the hospital. 6,500 former and current students at the University of Kentucky are waiting for a professor’s USB drive, which contained Social Security numbers and grades, to be recovered. The university is reportedly "reevaluating" the use of these drives.
  • Encryption software when properly installed, configured and used can help protect sensitive information at rest and greatly limit the number of reportable data breaches requiring victim notification. Once encrypted with a strong passphrase, if your computer does get stolen, the thieves can access only the meaningless encrypted data, and not your sensitive files.
  • Transcript

    • 1. Vince Verbeke http://www.slideshare.net/vcv1/info-secday-pennstate
    • 2.
      • Dangers of Social Networking 9:00 am to 10:00 am
      • Computer Best Practices to Prevent Malware 10:30 am to 11:30 am
      • How to Respond to an ‘Antivirus’ Pop-Up Ad 12:00 pm to 1:00 pm
      • Better Passwords and Pass Phrases 1:30 pm to 2:30 pm
      • Protecting Your Data 3:00 pm to 4:00 pm
    • 3.
      • Dangers of Social Networking Who are your friends really?
      • Computer Best Practices to Prevent Malware Update! Update! Update!
      • How to Respond to an ‘Antivirus’ Pop-Up Ad Warning! Warning! Warning!
      • Better Passwords and Pass Phrases Who would want my information?
      • Protecting Your Data Let’s be safe out there!
    • 4.
      • All the IT groups within the College work to make a safe computing environment
        • Install Antivirus Software
        • Network Threat Protection
        • Firewalls
      • Individual’s actions are of great importance to the security of computing systems
      • What you do (or don’t do) matters as well
      • We need your help and support
    • 5.
      • Don't expect human behavior to change. Ever
      • You cannot survive with defense alone
      • Not all threats are equal, and all checklists are wrong
      • You cannot eliminate all vulnerabilities
      • You will be breached
      • Source: http://securosis.com/blog/my-personal-security-guiding-principles/
    • 6.
      • What threats are out there
      • How can we minimize our risk
    • 7.
      • Twitter Phishing Attack Spreading via Direct Message (Feb 20, 2010)
      • Facebook Accounts Hacked; 1.5 Million Login IDs For Sale? (April 23, 2010)
      • Google Asking Buzz Users to Confirm Contacts (April 6, 2010)
      • Foursquare's privacy loopholes (March 25, 2010)
    • 8.
      • Twitter Phishing Attack Spreading via Direct Message (Feb 20, 2010)
      • Facebook Accounts Hacked; 1.5 Million Login IDs For Sale? (April 23, 2010)
      • Google Asking Buzz Users to Confirm Contacts (April 6, 2010)
      • Foursquare's privacy loopholes (March 25, 2010)
    • 9.
      • Facebook Safety Center
      • Sophos's recommendations for Facebook settings
      • Facebook Newbie | Good Practices
        • Be careful of stuff sent to you, even by people you respect (their Facebook account may have been hacked)
        • Limit or eliminate access to games and plugins
        • Think before you click
      • Let’s look at my FB page...
    • 10.
      • The Internet is fun but also dangerous
      • People don’t know what they do and can easily be duped
      • The more cool stuff, the more risks
      • Updates should be applied religiously
      • Browsing to a site (ANY site) can infect your computer
      • Source: Safe Computing Tips For All
    • 11.
      • You need to review and look at your various social media account settings
      • Be aware that what you post is there for everyone to see
        • bad folks to gather and sell
        • Google to cache
        • Library of Congress to archive (April 28, 2010)
      • Walk away from Social Media
    • 12.
      • Where are the threats coming from
      • What can we do to shield ourselves
      • What to do if infected
    • 13.  
    • 14.
      • Malware authors attempt to evade detection by continually releasing new variants in an effort to outpace the release of new signatures by antivirus vendors
      • More than 126 million malicious samples were detected in the wild in 2 nd half of 2009
      • Misc. Potentially Unwanted Software 1 st Half 09 2 nd Half 09 Diff 2,753,008 4,674,336 69.8%
      • Source: Microsoft Security Intelligence Report Volume 8 (Apr 2010)
    • 15.
      • Infection rates for more recently released operating systems are consistently lower than previous ones
      • For operating systems with service packs, each successive service pack has a lower infection rate than the one before it.
      • The infection rate for Windows XP with SP3 is less than half of that for SP2, and less than a third of that for SP1.
      • Source: Microsoft Security Intelligence Report Volume 8 (Apr 2010)
    • 16.
      • QuickTime (and iTunes)
      • Sun Java (and remove old versions)
      • Adobe Flash Player
      • Firefox
      • Real Player
      • See How To Download Latest Updates for Enterprise Dell Computers for a list
      • YOU NEED TO FIND THE TIME!!
    • 17.
      • Don’t click on, or attempt to close, any of the malware windows
      • SHUT DOWN
      • Contact Ag IT Support at 814-865-1229 or submit a Help Request from another machine http://agsci.psu.edu/it/help-request
      • Ag IT will ...
        • Attempt to clean the infection
        • Will back up the data and re-image the machine
    • 18.
      • Computers can be infected from any website
      • THINK, THINK, THINK ... BEFORE YOU CLICK, especially in search results
      • If you receive a message from unrecognized or unsolicited source, be wary
      • Apply Windows updates and apply your 3 rd party updates
        • Subscribe to AgSci IT Tech Alerts
        • Read AgSci IT eNews
      • If infected, shut down, and contact Ag IT
    • 19.
      • What just happened
      • What if the computer is infected
    • 20.  
    • 21.
      • Don't panic
      • Go to another computer and print How To Respond to an "Antivirus" Pop-Up Ad http://agsci.psu.edu/it/how-to/respond-to-an-antivirus-pop-up-ad
      • Let’s review the steps
    • 22.
      • Computers can be infected from any website
      • THINK, THINK, THINK ... BEFORE YOU CLICK
      • Apply Windows updates and apply your 3 rd party updates
        • Subscribe to AgSci IT Tech Alerts
        • Read AgSci IT eNews
      • If infected, you can try these steps (or shut down, and contact Ag IT straightaway)
    • 23.
      • What are password rules for the College
      • What are Penn State’s guidelines
      • What are good passwords
      • What are bad passwords
      • How can you protect your passwords
      • How can you remember your passwords
      • What other tech hardware uses passwords
      • Questions ... Questions .... Questions
    • 24.
      • Use two numbers in the first eight characters.
      • Pick long passwords, at least 8 characters in length if the system allows it.
      • Don't use a common dictionary word, a name, a string of numbers, or your User ID.
      • Certain special characters may be used. Examples of permitted special characters are $ . , ! % ^ *
      • Source: http://its.psu.edu/password/bestpractices.html
    • 25.
      • Use a password based on a phrase
      • phrase: "It was a dark and stormy night...". password : iWadasn7 method: Chose first letter from each word, followed by the age of nephew.
      • phrase: My Brother's Birthday Is april(4) Twenty Two Nineteen Sixty three(3) password : mbbi4tt19s3 method: Chose first letter from most words, and substitute numbers for letters
    • 26.
      • Anything so complicated you have to write it down
      • Anything in all upper case or lower case
      • Anything with the first or last character uppercase and the rest lower case
      • Anything you've come across as a textbook example
      • Anything containing letters of the alphabet only
    • 27.
      • Interleave two words e.g. Penn State = PsEtNaNte
      • Interleave a word with a numeric string e.g. flash 978 = f9L7a0s8H
      • Concatenate two words, possibly with a symbol as delimiter e.g. egG^rIbBoN (read: egg^ribbon)
      • Source: Choosing Your Password (PDF)
    • 28.
      • Embed special characters or non-alphanumeric symbols ($ . , ! % ^ *)
      • Misspell (but consistently!)
      • Unorthodox caPitaliZation
      • Use a personally significant acronym e.g. WaPSftG (We Are Penn State For The Glory)
      • Replace letters with digits or equivalent characters, and words with abbreviations e.g. $h0wprg^m or Eag!RnPH*LL
      • Don't re-use same password
    • 29.
      • Do not let anyone else know or use your password; this is a violation of University policy
      • For optimum security, don't write your password down. Don’t post it on your computer or anywhere around your desk.
      • If the URL does not begin with "https" then you should not use your Penn State Access Account password.
      • Source: http://its.psu.edu/password/bestpractices.html#misuse
    • 30.
      • Both Penn State and the College require that you update passwords at least once a year
      • For security reasons, it is recommended that you change these passwords every 6 months
      • Neither Penn State or the College will ever send you an E-mail asking for your password
    • 31.
      • Software allows you to create a “master” password to store passwords for all your other accounts
      • Encrypts your passwords
      • Fill in remembers online forms
      • Examples: KeePass - http://keepass.info/ LastPass - http://lastpass.com/ RoboForm - http://www.roboform.com/
    • 32.
      • Home Routers with default password http://www.routerpasswords.com/
      • Multifunction devices with default passwords http://www.passwordsdatabase.com/vendor/xerox
      • Multifunction print, scan and fax devices have the ability to store faxes, scans & print jobs to memory, and can archive to hard disk A Security Assessment of the Ricoh Afcio 450E Multifunction Device (2003)
    • 33.
      • Password should be at least 8 characters
      • Use a pass-phrase
      • Use mixed case, embed at least 2 numbers and one special character in your passwords
      • Change your Penn State and Ag passwords every 6 months
      • Don’t share your passwords (or write down)
      • Don’t use your Penn State or Ag password for any other purpose (like Facebook)
    • 34.
        • What if an EN computer was stolen
        • What if you misplaced a USB drive with research or sensitive information
        • What does the future hold for data safety on University machines
        • Can you check your online identity
    • 35.
      • Report theft to local authorities
      • Change Passwords IMMEDIATELY
      • Report the theft to Ag IT
      • Report the theft to Penn State Security
      • Report the theft to Dell (if applicable)
      • Source: http://agsci.psu.edu/it/how-to/what-to-do-if-your-computer-is-stolen
    • 36.
      • If thief has physical access, they can gain access to the drive contents ... PERIOD
      • Reboot from a CD and reset the local Windows password on that machine
      • Reboot from a Linux CD (Ultimate Boot CD) and gain access to entire hard drive
      • Spend less than $50 on a hard drive caddy to mount your drive as an external device
    • 37.
      • Upside - small size, easy portability, durability, and low cost make them very popular
      • Downside – they are just as easy to swipe and to conceal as well as misplace or lose
      • Many horror stories involving missing USB drives
    • 38.
      • Record your EN computer’s Service Tag and Express Service Code (other computers record the serial number)
      • Physically secure the machine
      • Do not leave laptops unattended in public
      • Label your computer (laptops at least) with name and contact information (but not your password)
      • More: How to deal with a lost or stolen laptop
    • 39.
      • Label the drive with “If Found” and a phone number
      • Create Rohos Mini Drive allows you to create a password-protected partition on USB drives http://www.rohos.com/products/rohos-mini-drive/
      • Demonstration
    • 40.
      • Operate computers in ‘least privilege’ mode
        • Better system security
        • Less obtrusive in Windows 7
      • Enable full disk encryption to protect data from thieves
        • Feature is built-in to Windows 7 Enterprise
    • 41.
      • Think security all the time
      • With Windows 7 on EN machines, security will be more stringent
      • Check your online identity
    • 42.
      • 202 total participants across all 5 sessions
        • 56 – Dangers of Social Networking
        • 56 - Best Practices to Prevent Malware
        • 31 - Respond to an 'Antivirus' Pop-Up
        • 26 - Better Passwords and Pass Phrases
        • 31 - Protecting Your Data
      • 85 unique participants
      • 34 (16 %) attended single session
      • 51 (25%) attended more than one session
      • 14 attended each of the sessions
    • 43.
      • Views of Recorded Sessions http://agsci.psu.edu/it/training/self-paced-learning/information-security-day-april-29-2010
        • 20 – Dangers of Social Networking
        • 10 - Best Practices to Prevent Malware
        • 4 - Respond to an 'Antivirus' Pop-Up
        • 11 - Better Passwords and Pass Phrases
        • 3 - Protecting Your Data
      • 48 "additional" participants
      • Overall impact: 202 + 48 = 250
    • 44.
      • 85 unique out of 202 is 42%
      • 42% of 48 recorded watchers is 20
      • 105 total unique
      • ~ 1400 full time faculty, staff, educators, and tech service staff in College of Ag Sciences
      • Reached 7.5% of the College
      • We DID ASK these people to carry the message to co-workers
    • 45.
      • September 21 during ITChatter
      • ITChatter Series is a monthly lunch conversation about technologies
      • ITChatter runs from 12:15 to12:50
      • We’ll do follow-up on all 5 topics
      • Check out our Training Page http://agsci.psu.edu/it/training/self-paced-learning/itchatter-series
    • 46.
      • Security and security awareness is NOT a once and done deal
      • We will continue to use eNews and Tech Alerts to keep awareness "in the face" of college faculty and staff
      • We must be vigilant and aware in our technology use each and every day
      • This message MUST be delivered .... each and every day if necessary
      • SECURITY DAY AS ONGOING SERIES