Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Its presentation

405 views

Published on

IT security presentation. Basic stuff.

Published in: Education
  • Be the first to comment

  • Be the first to like this

Its presentation

  1. 1. IT security A quick introduction (featuring statistics) 2011 Spring Morten Bo Nielsen [email_address]
  2. 2. Overview <ul><li>Introduction
  3. 3. Common use </li><ul><li>Browsers, Emails </li></ul><li>Minimizing risk </li><ul><li>Updates, Security awareness </li></ul><li>Perspective
  4. 4. Questions </li></ul>
  5. 5. Introducing security <ul><li>Physical </li><ul><li>Seat belts
  6. 6. Don't share PIN
  7. 7. Lock doors
  8. 8. Avoid bad neighborhoods
  9. 9. And more... </li></ul></ul><ul><li>Virtual </li><ul><li>Passwords
  10. 10. Antivirus
  11. 11. Firewalls
  12. 12. Browsing habits
  13. 13. Awareness
  14. 14. And more... </li></ul></ul>
  15. 15. Browsing <ul><li>The browser </li><ul><li>Internet explorer
  16. 16. Chrome
  17. 17. Firefox
  18. 18. Others </li></ul><li>4 of 5 installations are vulnerable </li></ul>References: <ul><li>The register </li></ul>
  19. 19. Good vs. bad sites <ul><li>Just avoid “the dark side”
  20. 20. Trusted sites have problems also </li><ul><li>Bad user content
  21. 21. Malicious activity </li></ul></ul>This discussion is beyond the scope of this presentation
  22. 22. Email <ul><li>Inherently insecure </li><ul><li>Build to work, not to be secure
  23. 23. Faking emails are easy
  24. 24. HTML and javascript makes it worse </li></ul></ul>
  25. 25. Spam <ul><li>Spam works </li><ul><li>E.g. 1 billion mails gives $7000 per day </li></ul></ul>References: <ul><li>Wired.com </li></ul>
  26. 26. Phishing <ul><li>Phishing </li><ul><li>“Click this link”
  27. 27. Could be fake email from e.g. a bank or ebay </li></ul></ul>(Example on next slide)
  28. 29. Difference between email source domain and “click here” domain” Limitted time offer They have paired my email address and my name. Taken from the EAL homepage?
  29. 30. Software updates References: <ul><li>Net-security.org </li></ul><ul><li>Windows </li><ul><li>31% of vulnerabilities
  30. 31. Automatic updates from MS
  31. 32. (use it, it works!) </li></ul></ul><ul><li>3 rd party </li><ul><li>69%
  32. 33. 13 vendors average
  33. 34. Automatic updates? Might not exist. </li></ul></ul>
  34. 35. Security awareness <ul><li>Email hygiene </li><ul><li>You did not win the email lottery
  35. 36. Lolitta from Russia has not single you out
  36. 37. Don't click links </li></ul></ul><ul><li>Browsing habits </li><ul><li>Stay anonymous
  37. 38. Beware of social media
  38. 39. Be extra careful when money is involved </li></ul></ul>
  39. 40. Security awareness <ul><li>Your PC </li><ul><li>Automatic updates and antivirus are mandatory
  40. 41. USB pens are virus carriers
  41. 42. Install trusted programs or addons only </li></ul></ul><ul><li>The rest </li><ul><li>Passwords...
  42. 43. Do backups
  43. 44. Decide on your level of security </li></ul></ul>
  44. 45. Perspectives <ul><li>Mobile devices
  45. 46. Networked devices (Router, printer)
  46. 47. More networked devices (TVs, refrigerators, etc.) </li></ul>It is not that bad, but I got your attention, no?

×