Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cybersecurity - NSA Style

16,672 views

Published on

The National Security Agency offers up free cyber security tips on their website www.nsa.gov/ia. This slideshare is a consolidation of those tips for easy reading and understanding.

Published in: Business
  • Be the first to comment

Cybersecurity - NSA Style

  1. 1. 5 NSA CYBERSECURITY TIPS cc: Simon Greig Photo - https://www.flickr.com/photos/32563803@N00
  2. 2. THESE TIPS ARE STRAIGHT FROM THE NSA WEBSITE cc: RuffLife - https://www.flickr.com/photos/40993822@N06
  3. 3. WWW.NSA.GOV/IA cc: AMWRanes - https://www.flickr.com/photos/59525567@N00
  4. 4. TELLS ME THESE WILL NEGATE 95% OF ALL ATTACKS MY NSA CONNECTION cc: MANYBITS - https://www.flickr.com/photos/38176611@N04
  5. 5. THEY'RE SIMPLE AND INEXPENSIVE cc: Dave Dugdale - https://www.flickr.com/photos/37387065@N05
  6. 6. 1. USE WHITELISTS cc: Ludwig Gatzke - https://www.flickr.com/photos/16851909@N00
  7. 7. BY DEFAULT EVERYTHING ELSE IS BLOCKED cc: timothymeaney - https://www.flickr.com/photos/41101678@N00
  8. 8. DECIDE WHICH PROGRAMS ARE ALLOWED TO RUN ONLY ADMINISTRATORS cc: USAID_IMAGES - https://www.flickr.com/photos/46658241@N06
  9. 9. 2. CONTROL ADMIN PRIVILEGES cc: Poster Boy NYC - https://www.flickr.com/photos/26296445@N05
  10. 10. GRANT PRIVILEGES ONLY WHEN ABSOLUTELY NECESSARY cc: colemama - https://www.flickr.com/photos/33901022@N00
  11. 11. LOG & MONITOR ADMINISTRATOR ACTIVITY cc: casey.marshall - https://www.flickr.com/photos/25299470@N00
  12. 12. ADMINSTRATIVE ACCOUNTS • No email account • Not connected to internet • Two factor access cc: chrisinplymouth - https://www.flickr.com/photos/21450297@N06
  13. 13. ADMINISTRATOR PASSWORDS • Can't reuse • Greater than 14 characters • Must change frequently • Good policy for entire organization cc: mkandlez - https://www.flickr.com/photos/25541021@N00
  14. 14. RESTRICT WHERE & WHEN ADMINISTRATORS CAN ROAM cc: samgrover - https://www.flickr.com/photos/44124379481@N01
  15. 15. 3. LIMIT WORKSTATION TO WORKSTATION COMMUNICATION cc: Wiertz Sébastien - https://www.flickr.com/photos/36169570@N08
  16. 16. REALLY? HARD TO BELIEVE IT'S STILL ALLOWED ANYWHERE cc: Greencolander - https://www.flickr.com/photos/37539977@N00
  17. 17. 4. USE ANTI-VIRUS FILE-REPUTATION-SERVICE cc: Bruno Santos - https://www.flickr.com/photos/65062705@N00
  18. 18. MUST HAVE COMPLETE THREAT PICTURE AT ALL TIMES cc: Hkuchera - https://www.flickr.com/photos/59263064@N00
  19. 19. WITHIN SECONDS INSTEAD OF HOURS OR DAYS UPDATES cc: wwarby - https://www.flickr.com/photos/26782864@N00
  20. 20. 5. ANTI-EXPLOITATION TURN IT ON cc: moofbong - https://www.flickr.com/photos/81314692@N00
  21. 21. IS USUALLY A HACKER'S FIRST STEP EXPLOITATION cc: dustball - https://www.flickr.com/photos/85783274@N00
  22. 22. EFFECTIVE AGAINST COMMON ATTACKS cc: Tddy - https://www.flickr.com/photos/40434084@N06
  23. 23. STANDARD EQUIPMENT AND IT'S FREE cc: othree - https://www.flickr.com/photos/12452841@N00
  24. 24. IMPLEMENT THESE STEPS TODAY cc: c.fuentes2007 - https://www.flickr.com/photos/22143940@N08
  25. 25. SHARE

×