SlideShare a Scribd company logo
1 of 12
DefendingYour Accounts, Devices, &Anonymity
 Information is power!
 Tech is very good today… even for hackers
 John the Ripper & GPUs
 Hacking effected 48% of Americans in 2014 & cost
businesses nearly $500mil in losses
 3.1 million Americans had their phones stolen in 2013
(1.4 million lost their phones)
 Not all hackers are evil (black hat)
 White hats find and help fix problems
 Nations are also in the game
 Stuxnet worm
 PRISM program
 Bugs (Heartbleed)
 Brute force hacking
 John the Ripper
 Social engineering
 Con men
 Packet sniffing
 WireShark
 Robbery
 3.1 million
 Viruses/worms
 Bugs
 PGP
 AES
 RSA
 PBKDF2: Password-Based Key Derivation Function 2
 WPA 2 (WiFi ProtectedAccess)
 WiFi encryption
 TLS (https)
 Internet communication encryption
 Print scan (Touch ID / hand)
 Mostly safe from everyone but the police
 Eye scan (retina / iris)
 Odor sensor (breath)
 Voice recognition
 Face recognition
 The best password is a semisensical passphrase
 th3Qu!ckBr0wnf0XjumP3d.
 Minimum 9 characters including both upper &
lowercase letters, numbers, and specials
 Here’s a strong/unique passcode: !sWt^%vTR]/9
 Two-factor authentication (2FA) can also be
used for additional security
 Sadly, some sites restrict passcodes to 15
characters and/or do not allow specials
 Something you know & something you have
 Apple
 Google
 Microsoft
 Facebook
 Yahoo
 Evernote
 Cloud storage (Tresorit)
 E*Trade,Vanguard, PayPal, etc…
 Amazon
 80% of top security experts use one!
 1Password
 LastPass
 Dashlane
 KeePass
 Norton Identity Safe
 iCloud Keychain
 Google Synch
 Browsers
 Computer / Device specific
 Change the router nameASAP
 Change the admin password ASAP
 Change the gateway’s IP address
 UseWPA2 withAES encryption!
 Quantum computing
 Massively parallel
 Current passwords snap like a twig
 Quantum encryption
 Unbreakable
 The act of intercepting it breaks it
 VPNs
 Route users through multiple IPs masking their
identity and location
 TOR *
 Browser based
 Uses proxies
 Always use HTTPS for commerce & utilize the
EFF’s HTTPS Everywhere extension
 Use 2FA on password recovery email accounts
 Do not underestimate the physical security of your
computers & mobile devices (use a PIN)
 Social engineering is a powerful tool
▪ As is dumpster diving
 Encrypt your PC’s hard drive (VeraCrypt)
 Use PayPal – Keep payment info. in one place
 If you’re not using a password manager, write your
passcodes down and keep them in a safe place.
That said, use a password manager!

More Related Content

What's hot

Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A DiscussionKaushik Patra
 
Web defacement
Web defacementWeb defacement
Web defacementstudent
 
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011shawn_merdinger
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdingershawn_merdinger
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information securityJayanth Vinay
 
The Basics of Ethical Hacking
The Basics of Ethical HackingThe Basics of Ethical Hacking
The Basics of Ethical HackingVamshi TG
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSecureState
 
STH-TopFiveSecuritySteps-TipsSheet
STH-TopFiveSecuritySteps-TipsSheetSTH-TopFiveSecuritySteps-TipsSheet
STH-TopFiveSecuritySteps-TipsSheetMorgan Prince
 
Security Assessment
Security AssessmentSecurity Assessment
Security AssessmentAnil Nayak
 
Barcamp 2009-Ninjitsu Attack Hack For Fun and Profit
Barcamp  2009-Ninjitsu Attack Hack For Fun and ProfitBarcamp  2009-Ninjitsu Attack Hack For Fun and Profit
Barcamp 2009-Ninjitsu Attack Hack For Fun and ProfitPrathan Phongthiproek
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hackeryanizaki
 

What's hot (19)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 
Hacking final
Hacking finalHacking final
Hacking final
 
Web defacement
Web defacementWeb defacement
Web defacement
 
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdinger
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
The Basics of Ethical Hacking
The Basics of Ethical HackingThe Basics of Ethical Hacking
The Basics of Ethical Hacking
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
STH-TopFiveSecuritySteps-TipsSheet
STH-TopFiveSecuritySteps-TipsSheetSTH-TopFiveSecuritySteps-TipsSheet
STH-TopFiveSecuritySteps-TipsSheet
 
Security Assessment
Security AssessmentSecurity Assessment
Security Assessment
 
Barcamp 2009-Ninjitsu Attack Hack For Fun and Profit
Barcamp  2009-Ninjitsu Attack Hack For Fun and ProfitBarcamp  2009-Ninjitsu Attack Hack For Fun and Profit
Barcamp 2009-Ninjitsu Attack Hack For Fun and Profit
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Hacking
Hacking Hacking
Hacking
 

Viewers also liked

Fleet Robo - Fleet Management Solution for Transportation, Logistics & Vehicl...
Fleet Robo - Fleet Management Solution for Transportation, Logistics & Vehicl...Fleet Robo - Fleet Management Solution for Transportation, Logistics & Vehicl...
Fleet Robo - Fleet Management Solution for Transportation, Logistics & Vehicl...fleetrobo
 
Enterprise Mobilty Trends 2013- An Agenda for the CIO
Enterprise Mobilty Trends 2013- An Agenda for the CIOEnterprise Mobilty Trends 2013- An Agenda for the CIO
Enterprise Mobilty Trends 2013- An Agenda for the CIORegalix
 
Rob Kemp - Portfolio
Rob Kemp - PortfolioRob Kemp - Portfolio
Rob Kemp - PortfolioRob Kemp
 
Narrative Storyboard
Narrative StoryboardNarrative Storyboard
Narrative Storyboardshannonmwynne
 
2017 Bell Joy Ride Program
2017 Bell Joy Ride Program2017 Bell Joy Ride Program
2017 Bell Joy Ride ProgramKristin Michal
 
Breez Project Presentation
Breez Project PresentationBreez Project Presentation
Breez Project PresentationBrooke Blann
 
Fleet Robo-Fleet Management Solutions with GPS Vehicle Tracking System
Fleet Robo-Fleet Management Solutions with GPS Vehicle Tracking System Fleet Robo-Fleet Management Solutions with GPS Vehicle Tracking System
Fleet Robo-Fleet Management Solutions with GPS Vehicle Tracking System fleetrobo
 
A380 qantas ao-2010-089_final_report
A380 qantas ao-2010-089_final_reportA380 qantas ao-2010-089_final_report
A380 qantas ao-2010-089_final_reportAlberto Garcia Romera
 
First Annual Automotive Mobility Study
First Annual Automotive Mobility StudyFirst Annual Automotive Mobility Study
First Annual Automotive Mobility StudyDave Fish, Ph.D.
 
2015 Global Trend Forecast (Technology, Media & Telecoms)
2015 Global Trend Forecast (Technology, Media & Telecoms)2015 Global Trend Forecast (Technology, Media & Telecoms)
2015 Global Trend Forecast (Technology, Media & Telecoms)CM Research
 
Re-thinking policies for the tourism sharing economy
Re-thinking policies for the tourism sharing economyRe-thinking policies for the tourism sharing economy
Re-thinking policies for the tourism sharing economyOECDTourism
 
12 Vital elements of the Subscription Business Model
12 Vital elements of the Subscription Business Model12 Vital elements of the Subscription Business Model
12 Vital elements of the Subscription Business ModelMurat @ InnovationTactics.com
 
Sharing Economy & Tourism
Sharing Economy & TourismSharing Economy & Tourism
Sharing Economy & TourismTOPOSOPHY
 
Mobile Trends in Mobility Apps
Mobile Trends in Mobility AppsMobile Trends in Mobility Apps
Mobile Trends in Mobility AppsPieter Baert
 
2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)CM Research
 

Viewers also liked (20)

Fleet Robo - Fleet Management Solution for Transportation, Logistics & Vehicl...
Fleet Robo - Fleet Management Solution for Transportation, Logistics & Vehicl...Fleet Robo - Fleet Management Solution for Transportation, Logistics & Vehicl...
Fleet Robo - Fleet Management Solution for Transportation, Logistics & Vehicl...
 
Enterprise Mobilty Trends 2013- An Agenda for the CIO
Enterprise Mobilty Trends 2013- An Agenda for the CIOEnterprise Mobilty Trends 2013- An Agenda for the CIO
Enterprise Mobilty Trends 2013- An Agenda for the CIO
 
The Sharing Economy
The Sharing EconomyThe Sharing Economy
The Sharing Economy
 
Rob Kemp - Portfolio
Rob Kemp - PortfolioRob Kemp - Portfolio
Rob Kemp - Portfolio
 
OOAD (1)
OOAD (1)OOAD (1)
OOAD (1)
 
Vehicle Accessibility Consultants Slideshow
Vehicle Accessibility Consultants SlideshowVehicle Accessibility Consultants Slideshow
Vehicle Accessibility Consultants Slideshow
 
Ideate project
Ideate projectIdeate project
Ideate project
 
Narrative Storyboard
Narrative StoryboardNarrative Storyboard
Narrative Storyboard
 
2017 Bell Joy Ride Program
2017 Bell Joy Ride Program2017 Bell Joy Ride Program
2017 Bell Joy Ride Program
 
Breez Project Presentation
Breez Project PresentationBreez Project Presentation
Breez Project Presentation
 
Fleet Robo-Fleet Management Solutions with GPS Vehicle Tracking System
Fleet Robo-Fleet Management Solutions with GPS Vehicle Tracking System Fleet Robo-Fleet Management Solutions with GPS Vehicle Tracking System
Fleet Robo-Fleet Management Solutions with GPS Vehicle Tracking System
 
A380 qantas ao-2010-089_final_report
A380 qantas ao-2010-089_final_reportA380 qantas ao-2010-089_final_report
A380 qantas ao-2010-089_final_report
 
First Annual Automotive Mobility Study
First Annual Automotive Mobility StudyFirst Annual Automotive Mobility Study
First Annual Automotive Mobility Study
 
2015 Global Trend Forecast (Technology, Media & Telecoms)
2015 Global Trend Forecast (Technology, Media & Telecoms)2015 Global Trend Forecast (Technology, Media & Telecoms)
2015 Global Trend Forecast (Technology, Media & Telecoms)
 
Re-thinking policies for the tourism sharing economy
Re-thinking policies for the tourism sharing economyRe-thinking policies for the tourism sharing economy
Re-thinking policies for the tourism sharing economy
 
RideConnect Pitch Deck
RideConnect Pitch DeckRideConnect Pitch Deck
RideConnect Pitch Deck
 
12 Vital elements of the Subscription Business Model
12 Vital elements of the Subscription Business Model12 Vital elements of the Subscription Business Model
12 Vital elements of the Subscription Business Model
 
Sharing Economy & Tourism
Sharing Economy & TourismSharing Economy & Tourism
Sharing Economy & Tourism
 
Mobile Trends in Mobility Apps
Mobile Trends in Mobility AppsMobile Trends in Mobility Apps
Mobile Trends in Mobility Apps
 
2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)
 

Similar to Digital Security

password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key loggerPatel Mit
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Securitydrkelleher
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Miigaa Mine
 
Digital Security for Journalists
Digital Security for JournalistsDigital Security for Journalists
Digital Security for JournalistsLaurent Eschenauer
 
Digital security for journalists laurent eschenauer
Digital security for journalists  laurent eschenauerDigital security for journalists  laurent eschenauer
Digital security for journalists laurent eschenauerNelly Luna
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hackingeiti panchkula
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hackingsatish kumar
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for ActivistsGreg Stromire
 

Similar to Digital Security (20)

Dr. Alan Shark
Dr. Alan SharkDr. Alan Shark
Dr. Alan Shark
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
 
Computer security
Computer securityComputer security
Computer security
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Digital Security for Journalists
Digital Security for JournalistsDigital Security for Journalists
Digital Security for Journalists
 
Digital security for journalists laurent eschenauer
Digital security for journalists  laurent eschenauerDigital security for journalists  laurent eschenauer
Digital security for journalists laurent eschenauer
 
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
Hacker
HackerHacker
Hacker
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Computer & Data Security
Computer & Data SecurityComputer & Data Security
Computer & Data Security
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for Activists
 
ASSIST - Fraud Presentation
ASSIST - Fraud PresentationASSIST - Fraud Presentation
ASSIST - Fraud Presentation
 

More from Milford Public Library (10)

Electronic Databases
Electronic DatabasesElectronic Databases
Electronic Databases
 
Mobile Apps
Mobile AppsMobile Apps
Mobile Apps
 
Basic Computer Skills
Basic Computer SkillsBasic Computer Skills
Basic Computer Skills
 
Unleash the Power of Your Cell Phone: The Tricorder in Your Pocket
Unleash the Power of Your Cell Phone: The Tricorder in Your PocketUnleash the Power of Your Cell Phone: The Tricorder in Your Pocket
Unleash the Power of Your Cell Phone: The Tricorder in Your Pocket
 
Streaming Media & the Cloud
Streaming Media & the CloudStreaming Media & the Cloud
Streaming Media & the Cloud
 
Mint
MintMint
Mint
 
Makerspace
MakerspaceMakerspace
Makerspace
 
The Internet of Things (IoT)
The Internet of Things (IoT)The Internet of Things (IoT)
The Internet of Things (IoT)
 
Evernote
EvernoteEvernote
Evernote
 
Emerging Technology
Emerging TechnologyEmerging Technology
Emerging Technology
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Digital Security

  • 2.  Information is power!  Tech is very good today… even for hackers  John the Ripper & GPUs  Hacking effected 48% of Americans in 2014 & cost businesses nearly $500mil in losses  3.1 million Americans had their phones stolen in 2013 (1.4 million lost their phones)  Not all hackers are evil (black hat)  White hats find and help fix problems  Nations are also in the game  Stuxnet worm  PRISM program  Bugs (Heartbleed)
  • 3.  Brute force hacking  John the Ripper  Social engineering  Con men  Packet sniffing  WireShark  Robbery  3.1 million  Viruses/worms  Bugs
  • 4.  PGP  AES  RSA  PBKDF2: Password-Based Key Derivation Function 2  WPA 2 (WiFi ProtectedAccess)  WiFi encryption  TLS (https)  Internet communication encryption
  • 5.  Print scan (Touch ID / hand)  Mostly safe from everyone but the police  Eye scan (retina / iris)  Odor sensor (breath)  Voice recognition  Face recognition
  • 6.  The best password is a semisensical passphrase  th3Qu!ckBr0wnf0XjumP3d.  Minimum 9 characters including both upper & lowercase letters, numbers, and specials  Here’s a strong/unique passcode: !sWt^%vTR]/9  Two-factor authentication (2FA) can also be used for additional security  Sadly, some sites restrict passcodes to 15 characters and/or do not allow specials
  • 7.  Something you know & something you have  Apple  Google  Microsoft  Facebook  Yahoo  Evernote  Cloud storage (Tresorit)  E*Trade,Vanguard, PayPal, etc…  Amazon
  • 8.  80% of top security experts use one!  1Password  LastPass  Dashlane  KeePass  Norton Identity Safe  iCloud Keychain  Google Synch  Browsers  Computer / Device specific
  • 9.  Change the router nameASAP  Change the admin password ASAP  Change the gateway’s IP address  UseWPA2 withAES encryption!
  • 10.  Quantum computing  Massively parallel  Current passwords snap like a twig  Quantum encryption  Unbreakable  The act of intercepting it breaks it
  • 11.  VPNs  Route users through multiple IPs masking their identity and location  TOR *  Browser based  Uses proxies
  • 12.  Always use HTTPS for commerce & utilize the EFF’s HTTPS Everywhere extension  Use 2FA on password recovery email accounts  Do not underestimate the physical security of your computers & mobile devices (use a PIN)  Social engineering is a powerful tool ▪ As is dumpster diving  Encrypt your PC’s hard drive (VeraCrypt)  Use PayPal – Keep payment info. in one place  If you’re not using a password manager, write your passcodes down and keep them in a safe place. That said, use a password manager!

Editor's Notes

  1. There are always tradeoffs between security & convenience…
  2. ashleymadison.com hack – 37 million users (10% of U.S.) Identity theft effects about 15 million Americans each year
  3. JtR = password cracker / can run through thousands/sec (potentially billions) Kevin Mitnick, king of hackers (con man) Cell industry: Only 47% of users use PINs to secure their phones Device kill switch was killed by Congress (Find My iPhone – find, lock, wipe / Send Last Location) Ransomware has even targeted police Firewall all routers and PCs, use virus protection (Avast), & keep your software updated!
  4. Pretty Good Privacy (PGP) Advanced Encryption Standard (AES) Rivest, Shamir, Adleman (RSA) Transport Layer Security (TLS)
  5. Not as secure as passcodes, but way more convenient. Hopefully more people will lock their devices now With Touch ID, turn phone off before dealing with police as iPhones require PIN on restart
  6. “Diceware” is the most effective (random) method to generate strong/unique passcodes without using a password manager 16 character+ passcodes are mostly secure from brute force attempts LIE for the answers to security questions & note the lies in your password manager! *Usernames can also be varied from site to site and changed like passwords if allowed
  7. REQUIRES cell phone. The “real” way is to use a 2nd phone… Good as an ALERT for when someone does attempt unauthorized access Authorize least two different devices & store backup codes someplace safe! Evernote can also encrypt notes internally via desktop client Tresorit : Only you hold key & servers operate under Swiss law Mention Vanguard’s device specific login option
  8. The ONLY easy way to implement both strong & unique passcodes 1Password can backup to iCloud, Dropbox, or Wifi & never stores your master key! Change password for Google Synch Recommend 2FA if backing-up to the cloud for extra security
  9. Default brand names, passwords, and gateway IPs are online so don’t use them! For extra security limit admin acess to Ethernet only or by MAC address
  10. From hundreds of millions/sec to thousands of trillions/sec Researchers recently got five atoms to factor the number 15, and they say it is scalable!
  11. Bonus! While you’re at it, why not browse the Internet anonymously too? Also the Signal messaging & voice app! Mention EFF’s new Privacy Badger extension for blocking unwanted tracking cookies Cracked by Carnegie Mellon for the Government (irony)
  12. Lock your devices with passcodes! iPhones can be set to wipe after 10 failed attempts Windows Vista+ can auto encrypt hard drive (BitLocker) Using 2FA on PayPal isn't a bad idea either... Be cautious around (unknown) open & ad hoc networks / Disable Java extension when unnecessary / Don’t use IE / Tape over webcams when not in use Apple users should also change their iCloud security key! *The secret to digital security is random characters, lies, and a password manager!