SlideShare a Scribd company logo
1 of 86
IT Security For Librarians:
Outrunning The Bear
Blake Carver
LYRASIS Systems Administrator
Week One: Intro
Who and How and What
Privacy & Security in general
Why this is all important
5 Basic Things
Week Two: Outrunning The Bear
Privacy
Passwords
Securing Your Devices
Web Browsers
Email
Staying Safe On-line
Week Three: Outrunning The Bear @ Your Library
Training: Thinking & Behavior
Threat Modeling
Hardware & Networks
Week Four: The Web – Sites & Servers
How websites get hacked
Web Servers and Networks
Servers in general
Everything You Need To Know
• Passwords: L E N G T H
• Paranoia: Think Before You Click
• BackuPs: Frequent and Automatic
• Patches: Set to Auto
• Ponder Before Posting
Intro
Quick Review
All software can be exploited.
Obscurity is not always security.
Everything is worth something.
Worry about likely attacks.
Security isn’t Either / Or.
Being a bad guy is a full time job.
Surveillance Is The Business Model Of The
Internet.
• http://blog.whitehatsec.com/wp-content/uploads/ven.png
Privacy
Surveillance Is The Business
Model Of The Internet
Privacy
'Silent Listeners'
“They” are out there collecting shared
personal information that oftentimes, users
are completely unaware they’re sharing.
Privacy
This Data Is Power & Money
Privacy
When it comes to Privacy...
Librarians are different.
Privacy
Good Security Means Better Privacy
Don’t be the place that gave away your
patrons personal information. Once it’s out
there you can’t get it back.
Privacy
There Is Value To Privacy
Privacy Troubles Are Small & Incremental
Privacy
The Data We Leave Behind Is
Our Digital Foot Prints
Privacy
"Getting your privacy back is
like getting your virginity back,"Jim Reavis, Executive Director of the non-profit Cloud Security Alliance
Privacy
• We don’t know how our information is used,
stored or shared and for how long
• We don’t know who has access
• We don’t know if it’s safe
Privacy
On the InterWebs, the
companies entrusted to keep
our personal data safe are
invariably the ones who have
the most to gain from not doing
so.
Robert X. Cringely
Privacy
Nearly every privacy policy on
the Web starts with the phrase
"we value your privacy," but
almost none of them actually
mean it.
Robert X. Cringely
Privacy
We value your data
Privacy
“Not having a [company name] account does not
mean that they have no information about you. It’s
more like you don’t have a password to access your
data.”
https://www.martinruenz.de/article/data-privacy/2016/02/14/the-dark-side-of-big-data.html
What About Your ISP?
So Many Footprints
All HTTP Traffic
All HTTPS Domains/Sites Via DNS
All Those "Things"
Phone Carriers & Apps?
What Can We Do?
Awareness & Education
Decentralize
FOSS and Self Hosting
• Are there new social norms now?
• Are people okay with less privacy?
• Should this make any difference to your library
policies?
Privacy
Passwords
Passwords
Reuse
Weak
Here’s a hint for someone trying
to get passwords from any
library…
It's Easy to Create Long Crazy Unique and
Confusing Passwords.
The Downside? Remembering Them
Any decent password is either
nearly impossible to remember
or too long to deal with.
Passwords
How Did They Get Me?
Guessed
Password Reset
Stolen Mobile Device
Phishing
Trojans
API Exploitation
Third Party App Exploitation
Website Breach
What Have We Learned From
Breaches?
• Passwords Are Reused
• Passwords Are Weak
Passwords
OCL Hashcat
These and ALL the tools and
attacks only ever get bigger
better faster stronger cheaper
easier and more common.
Attackers can steal more than the current
passwords of the given users; they can also
lift the password histories…
Passwords
Password Policy
• Be at least 15 characters in length.
• Contain at least 3 of the following 4 character types:
– Uppercase letters (ABCDEFGHIJKLMNOPQRSTUVWXYZ)
– Lowercase letters (abcdefghijklmnopqrstuvwxyz)
– Symbols (,./’~<?;:”[]{}|!@#$%^&*()_=-+)
– Numbers (0123456789)
• Not be similar to or contain any portion of your name or login name
• Not contain English words that are longer than 4 letters
• Not begin or end with a number
• Not be the same as any of the previous 24 passwords in the password history
• Be changed at least once every 60 days
• NOT Use a sequence of keys on the keyboard, such as QWERTY or 12345
• NOT Use information about yourself, family members, friends or pets. This includes (in
whole or in part) names, birthdates, nicknames, addresses, phone numbers
• NOT Use words associated with your occupation or hobbies
• NOT Use words associated with popular culture, such as song titles, names of sports teams,
etc.
• NOT Be reused for multiple accounts
• Must not repeat any of your last ten passwords.
• Must not have been your password in during the last ten days.
• Must not be a word in a language, slang, dialect, or jargon.
• Must not be related to personal identity, history, environment, or other personal associations.
• Must not be shared or displayed in plain view.
Passwords
O-|s9q[#*FjJ9k@d5tads7HJ&^4&!@&$#s(6@G
Passwords
people respond to policies, perversely
ZAQ!@#$
Passwords
Kill your P@55W0RD policies
"Much of the extra strength demanded by
the more restrictive policies is superfluous: it
causes considerable inconvenience for
negligible security improvement."
Passwords
All passwords must be at
least 20 characters
Passwords
Simple Things Make a Strong
Password
• DO Make it as _l o n g_ as you can
• Do not reuse it on multiple sites
• Do not use numb3r5 1n pl@c3 of letterz
• Some Letters – UPPER and lower case
• Use some numbers
• Maybe a something else (*%$@!-+=)
Passwords
Should You Change Your
Passwords Every X # of Months?
• Email?
• Bank Account?
• Network?
• Server?
• Router?
• Facebook & Twitter?
• Library Web Site?
• LISNews?
Passwords
Don’t Test Your Memory
Anything dependent on memory doesn’t
scale
• Use a password manager
– LastPass, KeePass[X], 1Password, Dashlane..
• Use A Pass Phrase
• Nobody – nobody – is immune from getting hacked
Passwords
Assume Your Password Will Be
Stolen
Passwords
Not A Case Of If, But When
Passwords
Have your accounts been
compromised?
https://haveibeenpwned.com/
Passwords
Passwords aren’t the only
insecure part of logging in
End of Passwords – Next - Staying Safe Online
Are You Using Strong Usernames /
E-mail Addresses?
These are like your passwords.
They should be properly handled and
secured!
“Computers”
Staying Safe Online
It ain’t about what’s most secure…
its about what the bad guys focus on
Staying Safe Online
How Do You Know If You Are
Infected?
• Fans Spinning Wildly
• Programs start unexpectedly
• Your firewall yells at you
• Odd emails FROM you
• Freezes
• Your browser behaves funny
• Sudden slowness
• Change in behavior
• Odd sounds or beeps
• Random Popups
• Unwelcome images
• Disappearing files
• Random error messages
Staying Safe Online
You Don’t
Malware's chief weapon is
invisibility
and surprise… and fear…
http://xkcd.com/1180/
Your antivirus software is a seat
belt – not a force field.
- Alfred Huger
Staying Safe Online
Research: 80% of Carberp infected
computers had antivirus software
installed
Which of your accounts is most
valuable?
• Email
• Bank
• Social Network
• Shopping
• Gaming
• Blogs
Own the Email, Own the Person
Use a second factor of
authentication
Email
• Don’t trust anything
• Don’t leave yourself logged in
• 2 Factor Authentication
• Passwords
Staying Safe Online
Surfing The Web
90% of fully undetected malware
was delivered via web-browsing.
It took antivirus vendors 4x as
long to detect malware from web-based
applications as opposed to email
(20 days for web, 5 days for email).
paloaltonetworks.com
The majority of encounters
happen in the places that online
users visit the most—and think
are safe.
2013 Cisco Annual Security Report
Browsers
• Use Two & Keep Updated
• Know Your Settings
–Phishing & Malware Detection - Turned ON
–Software Security & Auto / Silent Patching -
Turned ON
• A Few Recommended Plugins:
–Something to Limit JavaScript
–Something to Force HTTPS
–Something to stop trackers
–Something to Block Ads
Staying Safe Online
Privacy Badger uBlock Origin
Disconnect
But The Internet Is Free Because
Of Ads...
• Malicious content is 27 times more likely to
be encountered via search engines than
counterfeit software
• Online ads were 182 times more likely to
deliver malware than an adult site
Cisco’s 2012 Annual Security Report
According to a just-published post from Malwarebytes, a flurry of malvertising
appeared over the weekend, almost out of the blue. It hit some of the biggest
publishers in the business, including msn.com, nytimes.com, bbc.com, aol.com,
my.xfinity.com, nfl.com, realtor.com, theweathernetwork.com, thehill.com, and
newsweek.com. Affected networks included those owned by Google, AppNexis,
AOL, and Rubicon. The attacks are flowing from two suspicious domains...
Why Block Ads?
You’re given the ability to block 3rd Party Requests and JA and selectively block other things
All this stuff is downloaded onto you computer.
When you’re not running blockers you’re letting in a TON of random and unseen things.
Saves bandwidth – Especially on Mobile
Speeds up pages and load times
Cookies and other persistent trackers that follow you around
Your searches, sites, history and other data builds a profile, your preferences are bought and sold
Malvertising through evil and hacked sites
Ads slow down performance and eat up resources
Ads Add in distractions - noises, colors, flashes blinking and beeping and flashing
Never Trust Public Wi-Fi
Use A VPN
Staying Safe Online
Social Media
• Understand and adjust your privacy
settings
• Be skeptical of everything
–especially ANYONE asking you for money
Staying Safe Online
Watch Your Apps
“Privacy Protection for Social Networking Platforms“
A Felt and D Evans, Web 2.0 Security & Privacy (W2SP), 2008.
Felt and Evans studied the top 150 Facebook applications and
found that 90% of them didn’t need any of the user data which
they were able to access while the other 10% were largely using personal
information for trivial things such as displaying it to the user or choosing a
horoscope. Of the 14 applications with non-trivial data use, four were
contravening Facebook’s Terms of Service.
Love Everyone…
Trust No One.
“...if you're not the customer
you're the product being
sold”
metafilter.com/95152
Staying Safe Online
Free Services Are Expensive
Mobile Devices - Threats
• Trojans, Viruses & Malware
• Lost and/or Stolen
• Opaque Apps Permissions
 Access To Everything
• Open Wi-Fi Networks and Public Hotspots
Staying Safe Online
If I took your portable right
now....
What would I have access to?
Staying Safe Online
Mobile Devices
1. Encrypt it
2. Password it
3. Backup it
4. Case it
5. It is not forever
Staying Safe Online
Carry A Safe
Not A Suitcase
Staying Safe Online – Next - Libraries
IoT – The Internet of Things
Small easy to forget
Small easy to multiply
Full of Vulnerabilities
Security is an afterthought
Sold and forgotten
Security degrades rapidly
Hidden accounts
Insecure defaults
Patching complicated
Updates never
Who's responsible: manufacturer or consumer?
I bought some awful light bulbs
so you don't have to
So, in summary: it's a device that infringes my copyright, gives you
root access in response to trivial credentials, has access control
that depends entirely on nobody ever looking at the packets, is
sufficiently poorly implemented that you can crash both it and the
bulbs, has a cloud access protocol that has no security
whatsoever and also acts as an easy mechanism for people to
circumvent your network security. This may be the single worst
device I've ever bought.
https://mjg59.dreamwidth.org/40397.html
I stayed in a hotel with Android
lightswitches and it was just as
bad as you'd imagine
It's basically as bad as it could be - once I'd figured out the gateway, I
could access the control systems on every floor and query other rooms to
figure out whether the lights were on or not, which strongly implies that I
could control them as well. ... hotels are happily deploying systems with
no meaningful security, and the outcome of sending a constant stream of
"Set room lights to full" and "Open curtain" commands at 3AM seems
fairly predictable.
We're doomed.
https://mjg59.dreamwidth.org/40505.htm
l
Shodan
https://www.shodan.io/
Shodan is the world's first search engine for
Internet-connected devices.
Simplicity is security.
Let’s Review
• We all have something worth stealing
• Surveillance Is The Business Model Of The
Internet
• Passwords
• Locking Down Computers
• Email
• Browsers
• Wi-Fi
• Social Media
• Mobile Devices
Let’s Review
• Use Good Passwords
• Use a Password Manager
• Never Reuse
• Use Second Factor Authentication
• Don’t Trust Links / Attachments
• Have A Really Secure Browser
• Use Routine Backups
• Limit Social Networks
• Keep Everything Patched / Updated
Do something to make the bad guys job harder
Week One: Intro
Who and How and What
Privacy & Security in general
Why this is all important
5 Basic Things
Week Two: Outrunning The Bear
Privacy
Passwords
Securing Your Devices
Web Browsers
Email
Staying Safe On-line
Week Three: Outrunning The Bear @ Your Library
Training: Thinking & Behavior
Threat Modeling
Hardware & Networks
Week Four: The Web – Sites & Servers
How websites get hacked
Web Servers and Networks
Servers in general
IT Security For Librarians:
Outrunning The Bear
blake.carver@lyrasis.org
Blake Carver
LYRASIS Systems Administrator

More Related Content

What's hot

Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Network security basics
Network security basicsNetwork security basics
Network security basicsSkillspire LLC
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Deepak Khari
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networksjaymemcree
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSECSean Whalen
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSecureState
 
LonestarPHP 2014 Security Keynote
LonestarPHP 2014 Security KeynoteLonestarPHP 2014 Security Keynote
LonestarPHP 2014 Security KeynoteAlison Gianotto
 
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Andrew Morris
 
OSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersOSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersMegan DeBlois
 

What's hot (20)

Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Network security basics
Network security basicsNetwork security basics
Network security basics
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
Information Security Engineering
Information Security EngineeringInformation Security Engineering
Information Security Engineering
 
Hacking
HackingHacking
Hacking
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
LonestarPHP 2014 Security Keynote
LonestarPHP 2014 Security KeynoteLonestarPHP 2014 Security Keynote
LonestarPHP 2014 Security Keynote
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
 
Cyber security
Cyber securityCyber security
Cyber security
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
OSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersOSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and Practitioners
 

Similar to An Introduction To IT Security And Privacy In Libraries & Anywhere

Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcareNicholas Davis
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and ConcernsPINT Inc
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
Phish training final
Phish training finalPhish training final
Phish training finalJen Ruhman
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyGabor Szathmari
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology reportMarq2014
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 

Similar to An Introduction To IT Security And Privacy In Libraries & Anywhere (20)

Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and Concerns
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
 
Phish training final
Phish training finalPhish training final
Phish training final
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology report
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

An Introduction To IT Security And Privacy In Libraries & Anywhere

  • 1. IT Security For Librarians: Outrunning The Bear Blake Carver LYRASIS Systems Administrator
  • 2. Week One: Intro Who and How and What Privacy & Security in general Why this is all important 5 Basic Things Week Two: Outrunning The Bear Privacy Passwords Securing Your Devices Web Browsers Email Staying Safe On-line Week Three: Outrunning The Bear @ Your Library Training: Thinking & Behavior Threat Modeling Hardware & Networks Week Four: The Web – Sites & Servers How websites get hacked Web Servers and Networks Servers in general
  • 3. Everything You Need To Know • Passwords: L E N G T H • Paranoia: Think Before You Click • BackuPs: Frequent and Automatic • Patches: Set to Auto • Ponder Before Posting Intro
  • 4. Quick Review All software can be exploited. Obscurity is not always security. Everything is worth something. Worry about likely attacks. Security isn’t Either / Or. Being a bad guy is a full time job. Surveillance Is The Business Model Of The Internet.
  • 6. Surveillance Is The Business Model Of The Internet Privacy
  • 7. 'Silent Listeners' “They” are out there collecting shared personal information that oftentimes, users are completely unaware they’re sharing. Privacy
  • 8. This Data Is Power & Money Privacy
  • 9. When it comes to Privacy... Librarians are different. Privacy
  • 10. Good Security Means Better Privacy Don’t be the place that gave away your patrons personal information. Once it’s out there you can’t get it back. Privacy
  • 11. There Is Value To Privacy Privacy Troubles Are Small & Incremental Privacy
  • 12. The Data We Leave Behind Is Our Digital Foot Prints Privacy
  • 13. "Getting your privacy back is like getting your virginity back,"Jim Reavis, Executive Director of the non-profit Cloud Security Alliance Privacy
  • 14. • We don’t know how our information is used, stored or shared and for how long • We don’t know who has access • We don’t know if it’s safe Privacy
  • 15. On the InterWebs, the companies entrusted to keep our personal data safe are invariably the ones who have the most to gain from not doing so. Robert X. Cringely Privacy
  • 16. Nearly every privacy policy on the Web starts with the phrase "we value your privacy," but almost none of them actually mean it. Robert X. Cringely Privacy
  • 17. We value your data Privacy
  • 18. “Not having a [company name] account does not mean that they have no information about you. It’s more like you don’t have a password to access your data.” https://www.martinruenz.de/article/data-privacy/2016/02/14/the-dark-side-of-big-data.html
  • 19. What About Your ISP? So Many Footprints All HTTP Traffic All HTTPS Domains/Sites Via DNS All Those "Things" Phone Carriers & Apps?
  • 20. What Can We Do? Awareness & Education Decentralize FOSS and Self Hosting
  • 21. • Are there new social norms now? • Are people okay with less privacy? • Should this make any difference to your library policies? Privacy
  • 23. Here’s a hint for someone trying to get passwords from any library…
  • 24.
  • 25. It's Easy to Create Long Crazy Unique and Confusing Passwords. The Downside? Remembering Them
  • 26. Any decent password is either nearly impossible to remember or too long to deal with. Passwords
  • 27. How Did They Get Me? Guessed Password Reset Stolen Mobile Device Phishing Trojans API Exploitation Third Party App Exploitation Website Breach
  • 28. What Have We Learned From Breaches? • Passwords Are Reused • Passwords Are Weak Passwords
  • 30. These and ALL the tools and attacks only ever get bigger better faster stronger cheaper easier and more common.
  • 31. Attackers can steal more than the current passwords of the given users; they can also lift the password histories… Passwords
  • 32. Password Policy • Be at least 15 characters in length. • Contain at least 3 of the following 4 character types: – Uppercase letters (ABCDEFGHIJKLMNOPQRSTUVWXYZ) – Lowercase letters (abcdefghijklmnopqrstuvwxyz) – Symbols (,./’~<?;:”[]{}|!@#$%^&*()_=-+) – Numbers (0123456789) • Not be similar to or contain any portion of your name or login name • Not contain English words that are longer than 4 letters • Not begin or end with a number • Not be the same as any of the previous 24 passwords in the password history • Be changed at least once every 60 days • NOT Use a sequence of keys on the keyboard, such as QWERTY or 12345 • NOT Use information about yourself, family members, friends or pets. This includes (in whole or in part) names, birthdates, nicknames, addresses, phone numbers • NOT Use words associated with your occupation or hobbies • NOT Use words associated with popular culture, such as song titles, names of sports teams, etc. • NOT Be reused for multiple accounts • Must not repeat any of your last ten passwords. • Must not have been your password in during the last ten days. • Must not be a word in a language, slang, dialect, or jargon. • Must not be related to personal identity, history, environment, or other personal associations. • Must not be shared or displayed in plain view. Passwords
  • 34. people respond to policies, perversely ZAQ!@#$ Passwords
  • 35. Kill your P@55W0RD policies "Much of the extra strength demanded by the more restrictive policies is superfluous: it causes considerable inconvenience for negligible security improvement." Passwords
  • 36. All passwords must be at least 20 characters Passwords
  • 37. Simple Things Make a Strong Password • DO Make it as _l o n g_ as you can • Do not reuse it on multiple sites • Do not use numb3r5 1n pl@c3 of letterz • Some Letters – UPPER and lower case • Use some numbers • Maybe a something else (*%$@!-+=) Passwords
  • 38. Should You Change Your Passwords Every X # of Months? • Email? • Bank Account? • Network? • Server? • Router? • Facebook & Twitter? • Library Web Site? • LISNews? Passwords
  • 39. Don’t Test Your Memory Anything dependent on memory doesn’t scale • Use a password manager – LastPass, KeePass[X], 1Password, Dashlane.. • Use A Pass Phrase • Nobody – nobody – is immune from getting hacked Passwords
  • 40. Assume Your Password Will Be Stolen Passwords
  • 41. Not A Case Of If, But When Passwords
  • 42. Have your accounts been compromised? https://haveibeenpwned.com/ Passwords
  • 43. Passwords aren’t the only insecure part of logging in End of Passwords – Next - Staying Safe Online
  • 44. Are You Using Strong Usernames / E-mail Addresses? These are like your passwords. They should be properly handled and secured!
  • 46. It ain’t about what’s most secure… its about what the bad guys focus on Staying Safe Online
  • 47. How Do You Know If You Are Infected? • Fans Spinning Wildly • Programs start unexpectedly • Your firewall yells at you • Odd emails FROM you • Freezes • Your browser behaves funny • Sudden slowness • Change in behavior • Odd sounds or beeps • Random Popups • Unwelcome images • Disappearing files • Random error messages Staying Safe Online You Don’t
  • 48. Malware's chief weapon is invisibility and surprise… and fear…
  • 50.
  • 51. Your antivirus software is a seat belt – not a force field. - Alfred Huger Staying Safe Online
  • 52. Research: 80% of Carberp infected computers had antivirus software installed
  • 53. Which of your accounts is most valuable? • Email • Bank • Social Network • Shopping • Gaming • Blogs
  • 54. Own the Email, Own the Person
  • 55.
  • 56. Use a second factor of authentication
  • 57. Email • Don’t trust anything • Don’t leave yourself logged in • 2 Factor Authentication • Passwords Staying Safe Online
  • 58.
  • 60. 90% of fully undetected malware was delivered via web-browsing. It took antivirus vendors 4x as long to detect malware from web-based applications as opposed to email (20 days for web, 5 days for email). paloaltonetworks.com
  • 61. The majority of encounters happen in the places that online users visit the most—and think are safe. 2013 Cisco Annual Security Report
  • 62. Browsers • Use Two & Keep Updated • Know Your Settings –Phishing & Malware Detection - Turned ON –Software Security & Auto / Silent Patching - Turned ON • A Few Recommended Plugins: –Something to Limit JavaScript –Something to Force HTTPS –Something to stop trackers –Something to Block Ads Staying Safe Online
  • 63. Privacy Badger uBlock Origin Disconnect
  • 64. But The Internet Is Free Because Of Ads... • Malicious content is 27 times more likely to be encountered via search engines than counterfeit software • Online ads were 182 times more likely to deliver malware than an adult site Cisco’s 2012 Annual Security Report
  • 65. According to a just-published post from Malwarebytes, a flurry of malvertising appeared over the weekend, almost out of the blue. It hit some of the biggest publishers in the business, including msn.com, nytimes.com, bbc.com, aol.com, my.xfinity.com, nfl.com, realtor.com, theweathernetwork.com, thehill.com, and newsweek.com. Affected networks included those owned by Google, AppNexis, AOL, and Rubicon. The attacks are flowing from two suspicious domains...
  • 66. Why Block Ads? You’re given the ability to block 3rd Party Requests and JA and selectively block other things All this stuff is downloaded onto you computer. When you’re not running blockers you’re letting in a TON of random and unseen things. Saves bandwidth – Especially on Mobile Speeds up pages and load times Cookies and other persistent trackers that follow you around Your searches, sites, history and other data builds a profile, your preferences are bought and sold Malvertising through evil and hacked sites Ads slow down performance and eat up resources Ads Add in distractions - noises, colors, flashes blinking and beeping and flashing
  • 67. Never Trust Public Wi-Fi Use A VPN Staying Safe Online
  • 68. Social Media • Understand and adjust your privacy settings • Be skeptical of everything –especially ANYONE asking you for money Staying Safe Online
  • 69. Watch Your Apps “Privacy Protection for Social Networking Platforms“ A Felt and D Evans, Web 2.0 Security & Privacy (W2SP), 2008. Felt and Evans studied the top 150 Facebook applications and found that 90% of them didn’t need any of the user data which they were able to access while the other 10% were largely using personal information for trivial things such as displaying it to the user or choosing a horoscope. Of the 14 applications with non-trivial data use, four were contravening Facebook’s Terms of Service.
  • 71. “...if you're not the customer you're the product being sold” metafilter.com/95152 Staying Safe Online Free Services Are Expensive
  • 72. Mobile Devices - Threats • Trojans, Viruses & Malware • Lost and/or Stolen • Opaque Apps Permissions  Access To Everything • Open Wi-Fi Networks and Public Hotspots Staying Safe Online
  • 73.
  • 74. If I took your portable right now.... What would I have access to? Staying Safe Online
  • 75. Mobile Devices 1. Encrypt it 2. Password it 3. Backup it 4. Case it 5. It is not forever Staying Safe Online
  • 76. Carry A Safe Not A Suitcase Staying Safe Online – Next - Libraries
  • 77. IoT – The Internet of Things Small easy to forget Small easy to multiply Full of Vulnerabilities Security is an afterthought Sold and forgotten Security degrades rapidly Hidden accounts Insecure defaults Patching complicated Updates never Who's responsible: manufacturer or consumer?
  • 78. I bought some awful light bulbs so you don't have to So, in summary: it's a device that infringes my copyright, gives you root access in response to trivial credentials, has access control that depends entirely on nobody ever looking at the packets, is sufficiently poorly implemented that you can crash both it and the bulbs, has a cloud access protocol that has no security whatsoever and also acts as an easy mechanism for people to circumvent your network security. This may be the single worst device I've ever bought. https://mjg59.dreamwidth.org/40397.html
  • 79. I stayed in a hotel with Android lightswitches and it was just as bad as you'd imagine It's basically as bad as it could be - once I'd figured out the gateway, I could access the control systems on every floor and query other rooms to figure out whether the lights were on or not, which strongly implies that I could control them as well. ... hotels are happily deploying systems with no meaningful security, and the outcome of sending a constant stream of "Set room lights to full" and "Open curtain" commands at 3AM seems fairly predictable. We're doomed. https://mjg59.dreamwidth.org/40505.htm l
  • 80. Shodan https://www.shodan.io/ Shodan is the world's first search engine for Internet-connected devices.
  • 82. Let’s Review • We all have something worth stealing • Surveillance Is The Business Model Of The Internet • Passwords • Locking Down Computers • Email • Browsers • Wi-Fi • Social Media • Mobile Devices
  • 83. Let’s Review • Use Good Passwords • Use a Password Manager • Never Reuse • Use Second Factor Authentication • Don’t Trust Links / Attachments • Have A Really Secure Browser • Use Routine Backups • Limit Social Networks • Keep Everything Patched / Updated
  • 84. Do something to make the bad guys job harder
  • 85. Week One: Intro Who and How and What Privacy & Security in general Why this is all important 5 Basic Things Week Two: Outrunning The Bear Privacy Passwords Securing Your Devices Web Browsers Email Staying Safe On-line Week Three: Outrunning The Bear @ Your Library Training: Thinking & Behavior Threat Modeling Hardware & Networks Week Four: The Web – Sites & Servers How websites get hacked Web Servers and Networks Servers in general
  • 86. IT Security For Librarians: Outrunning The Bear blake.carver@lyrasis.org Blake Carver LYRASIS Systems Administrator

Editor's Notes

  1. http://www.securityweek.com/surveillance-business-model-internet-bruce-schneier I sure quote Schnier often 
  2. http://www.infoworld.com/article/2619516/cringely/google-doesn-t-need-your-stinking-privacy-rules.html?page=2
  3. http://blog.hotspotshield.com/2015/05/10/isps-know-take-advantage-info/
  4. If you library’s password has the word book or library or anything close, change it. If your library has A password, CHANGE IT
  5. http://hashcat.net/oclhashcat/
  6. This is my proposal for a perfect password policy. Fun to discuss.
  7. It helps to do the funny Monty Python accents here.
  8. Every single slide deck must have at least 1 XKCD comic.
  9. Scary email sent to Publib years ago.
  10. The Original Surfing the Web mouse pad! Did you know that term was coined by a librarian?
  11. https://www.eff.org/privacybadger https://github.com/gorhill/uBlock https://disconnect.me/ https://www.ghostery.com/ https://www.eff.org/https-everywhere https://www.torproject.org/projects/torbrowser.html.en
  12. Careful! Make sure you have a great phone case