SlideShare a Scribd company logo
1 of 77
Download to read offline
Be Cyber Smart!
David L. Herrington
Cybersecurity Champion
October 25, 2019
National Cybersecurity Awareness Month
NCSAM is a collaborative effort between the Cybersecurity
and Infrastructure Security Agency (CISA) and its public and
private partners — including the National Cyber Security
Alliance (NCSA) — to ensure every American has the resources
they need to stay safe and secure online while increasing the
resilience of the Nation against cyber threats.
This presentation has been adapted and expanded from the
topics presented at: https://www.dhs.gov/be-cyber-smart/
What we will cover today
1. Use strong passwords
2. Use a password manager
3. Enable two-factor authentication
4. Don’t fall for phishing attacks
5. Don’t over-share on social media
6. Use public Wi-Fi safely
7. Secure your computer and data
1. Use strong passwords
Video: How not to defend the planet
Setup: The evil Darth Helmet has kidnapped princess Vespa and is
threatening to surgically reverse her nose job if the King does not give
him the combination to the planetary defense system. He gives in.
What do you suppose the combination is?
View YouTube video
Credits: Spaceballs, 1987 MGM.
What is right and wrong about that scene?
Right
12345 is a terribly bad password!
Wrong
In real life an attacker would have
already tried that password and
hundreds of thousands of other
common ones in a matter of
seconds.
11.7M Ashley Madison passwords revealed
password number of users
123456 121,000
12345 48,000
password 39,000
DEFAULT 34,000
123456789 27,000
qwerty 21,000
12345678 14,000
abc123 11,000
In the 2015 hacking of
the online site Ashley
Madison, attackers
broke in, stole their
password file, and
posted it online.
Others then set about
decrypting the
passwords, which were
stored insecurely.
These are the top eight
passwords used.
Password strength
• For numeric-only passwords the number of combinations depends on
the number of digits.
• 3 digits: 10 x 10 x 10 = 1,000 combinations
(000 to 999)
• 5 digits: 10 x 10 x 10 x 10 x 10 = 100,000 combinations
(00000 to 99999)
• In general for n digits we have 10n combinations
Password complexity
• Digits- 0123456789 (10)
• Uppercase letters- ABCDEFGHIJKLMNOPQRSTUVWXYZ (26)
• Lowercase letters- abcdefghijklmnopqrstuvwxyz (26)
• Special characters- !"#$%&'()*+,-./:;<=>?@[]^_`{|}~
(33 including space)
• 10 + 26 + 26 + 33 = 95 different possibilities
• Passwords having all these character types are called “complex.”
Comparative number of combinations
• Suppose we have a password that is 12 characters long…
• Digits only: 1012 = 1,000,000,000,000 = 1.00E12 combinations.
• Complex: 9512 = 5.40E23 combinations.
• Using a complex password makes it exponentially harder for an
attacker to guess it via brute force.
Comparative brute force times
• The time it takes to crack an all-numeric 12-character password by
brute force is measured in hours.
• The time it takes to crack a complex 12-character password by brute
force is measured in thousands of years.
• Passwords weaken over time as available computing power available
to attackers increases.
• Quantum computing will change everything!
Password best practices
• Passwords should be at least 12 characters long
• Passwords should be “complex” meaning they should include digits,
upper and lowercase letters, and special characters. E.g.,
“A16t0u9E@DIZ”
• Instead of a ”password” consider a “passphrase” which is at least 16
characters long. E.g., “Orange Zebra wins in 2020!”
• Make your passphrase unique!
• Or create a shorthand complex version of your passphrase. E.g.
“[{OZwi2020!}]” -- just make sure it is at least 12 chars long.
Comparative strength of complex passwords
vs passphrases
• 12 character complex password
• 9512 = 5.40E23 combinations
• 16 character passphrase consisting of upper/lowercase letters and
spaces
• 5316 = 3.88E27 combinations
Bart in detention
2. Use a password manager
Why do I need a password manager?
• Having a unique strong password for each website gives you added
protection.
• Even if a password is strong, there are still ways it can be obtained by
an attacker.
• Data breach and/or mishandling by website owner
• You putting it on a sticky note near your computer
• Your computer becomes infected with keylogger malware
• You are the victim of a shoulder surfing attack
Diagram showing reason for unique
passwords
eBay Amazon
Medical
Banking
email
An attacker has
discovered your eBay
password, but because
your passwords are
different all other
accounts are safe!
'Tis the part of a wise man to
keep himself today for
tomorrow, and not venture all
his eggs in one basket.
Cervantes, Don Quixote, 1605.
Password manager features
• Import passwords from web browsers
• Autofill web login forms
• Multiple form filling identities
• Password strength report
• Auto-generation of new passwords
• Secure sharing
• Support for two-factor authentication
Password manager usage
Free password managers
Wirecutter’s recommendations
• LastPass Free
• 1Password
LastPass demo 1
LastPass demo 2
LastPass demo 3
LastPass demo 4
LastPass demo 5
3.Enable two-factor authentication
Two-factor authentication
• Provides better security than a strong unique password
• When logging in you need both your user id, password, and a one-
time password that is generated for that login.
• OTP can be delivered to you by:
• SMS message (least secure)
• Software application
• Hardware token
2FA overall diagram
Installing new 2FA site in software application
Lastpass authenticator
Common 2FA apps for your mobile devices
• Duo
• Google Authenticator
• LastPass Authenticator
Cybersecurity best practice
• Enable 2FA on all your key accounts that could be involved in an
identify theft crime.
• Include:
• Banking and investment
• Email
• Social media
• Amazon
Some service providers offering 2FA
• Banking
• Bank of America
• Capital One
• Citibank
• Wells Fargo
• Email
• Gmail
• AOL mail
• Personal finance
• Turbo Tax
• QuickBooks Online
• Shopping
• Amazon
• Apple
• eBay
• Etsy
• Social media
• Facebook
• Instagram
• Twitter
And many more…
4. Don’t fall for phishing
What is phishing?
• Phishing is a social engineering attack involving email you receive
from an attacker.
• The email pretends to be something it is not.
• Similar attacks can also be conducted via SMS text messages
(smishing) or by phone (vishing).
What is the goal of phishing?
• To get you to click a link, open a file attachment, or perform an action
• Clicking the link or opening the attachment could:
• Install malware on your computer, such as a virus, keylogger, remote access
trojan, or ransomware
• Conscript your computer to be part of a botnet
• Performing an action usually involves giving privileged or personal
information (or money) to the attacker.
Common features of phishing emails
• Offers that are too good to be true
• A sense of urgency
• Hyperlinks embedded in the email that go to web addresses not
associated with the supposed sender
• File attachments
• Unusual or unknown sender
• Message sent at unusual time of day
• One or more errors in English grammar or awkward phrasing
Can you spot the Phishing email?
• https://phishingquiz.withgoogle.com./
If you accidentally click on a phishing link
Immediately:
• Disconnect your device from the internet
• Back up your files
• Scan your system
• Change your passwords
• Banking/investment
• Email
• Social media
Don’t take the bait!
5. Don’t over-share on social media
Video: Social media privacy
View video on YouTube
Credits: Social Media Privacy by Habitu8, The Security Awareness Video Company
Scenario #1: Real world theft
• Criminals targeting you for real world theft can use geo-tagged photos
you post on social media to find out where you live.
• In real-time they can see that you just posted a photo on Facebook
showing what a great vacation you and your family are having 1000
miles away, and correctly infer you are NOT AT HOME and cannot
return soon.
• This makes you a target for theft of your physical possessions.
Scenario #2: Cybercrime and identity theft
• Attackers will gather as much “open source” intelligence as they can
on potential victims.
• Primary email address
• Cell phone number
• Home address
• Names of children, grandchildren, pets
• Date of birth
• Previous name(s)
• This open-source intelligence is provided by you on social media.
Some tips for staying safe on social media
• Dial down your privacy settings
• Only accept friend requests from people you know in the real world.
• Never post details about your home, school, or work addresses
online.
Social media privacy settings
• Adjust your default settings so that posts only go to friends.
• Turn off the ability of the general public to see your contact
information.
• Only share your birthday with friends (maybe) and never share the
year.
Turning off geo-tagging in photos
• Not a FaceBook setting
• Must turn off location services to photo app on mobile devices
• (See articles in reference section at end of this presentation)
Remember!
• Your personal privacy and well being is not the primary concern of
social media companies – it is YOUR primary concern!
• Always use caution and common sense when posting to social media.
• Once you publish personal information on social media it may be
difficult or impossible to undo it if you change your mind later.
Social media dangers graphic
6. Use public Wi-Fi safely
Free public Wi-Fi
• A great convenience to travelers running low on wireless quota
• Businesses may offer free Wi-Fi to attract customers…
• …or they may offer free Wi-Fi because their competition has it.
• Most small businesses probably do not monitor closely what is
happening on their Wi-Fi networks.
• What could possibly go wrong?
The Evil
Twin attack
Anatomy of an
Evil Twin attack
1. Attacker shows up at
Wi-Fi hotspot with fake
AP.
2. Attacker launches a
disassociation attack,
causing Wi-Fi users to
lose their connection.
3. They reconnect to the
Evil Twin AP because it
has a stronger signal.
4. Attacker can now
inspect unencrypted
traffic over Wi-Fi
network and
impersonate popular
websites in order to
harvest user names
and passwords.
Tips for safely using free public Wi-Fi
• Always check to make sure the site
you are browsing is using HTTPS
and is showing a lock icon next to
the web address.
• Don’t visit banking or investment
websites.
• If you get an HTTPS warning screen
do not override it!
• For best protection use Virtual
Private Network (VPN) software on
your mobile device.
Warning!
• Do not proceed if you a screen like either of these while using public
Wi-Fi
HTTPS warning
Certificate error
Virtual Private Network (VPN)
• Creates a secure encrypted connection (tunnel) between you and the
VPN server
• Buy a reputable VPN service that guarantees your browsing data will
remain private. (Avoid “free” VPN services)
• Recommended VPN services
• Nord VPN
• Tunnel Bear
VPN server
Website
You
Secure tunnel
Wi-Fi hotspot and internet
How VPN
works
7. Secure your computer and data
Keep your software up-to-date
• Desktop/laptop operating systems
• Web browsers
• Applications such as Microsoft Office
• Mobile device operating systems and apps
• Antivirus software…
Antivirus software
• AV software needs to protect against multiple malware types
• Viruses
• Worms
• Trojans
• Keylogger
• Adware
• Spyware
• Ransomware
• Bots and botnets
Signature-based AV software
• Recognizes malware based on patterns in malware files
• Compares it against a database of known malware
• This database MUST be updated frequently to keep up with latest
malware
Problems with signature-based AV software
• Polymorphic viruses constantly modify themselves and can slip by
signature-based AV software.
• In some circumstances malware signatures may be hidden by
encryption
• Not effective against zero-day attacks (exploits so new they are
currently unknown)
Heuristic/behavioral detection AV software
• Detects malware based on its behavior rather than appearance
• Does not use malware signatures
• Can defend against zero-day attacks
• Wirecutter’s recommendation: Malware Bytes Premium
Back up your computer’s data
• You need to back up your personal data only. Don’t worry about apps.
You can reinstall them from the original source.
• Having your data backups in multiple locations provides the best
protection against natural disasters or theft.
• Recommendation
• Buy a 1 or 2 TB USB hard drive and configure it to backup changes daily
AND
• Use a cloud backup service to store a copy of your personal data in the cloud
Cloud backup services
• Microsoft
• OneDrive (backup only; 100 GB or 200 GB)
• Office 365 Personal (includes MS Office plus 1 TB of OneDrive space)
• Google
• Google Drive
• Apple
• iCloud Storage
Encrypt your notebook computer’s hard drive
• Notebook computers are easily lost or stolen.
• Full disk encryption adds an additional layer of security over your data and
is not noticeable during normal operation of computer.
• Anyone in possession of your notebook will not be able to view your
personal information without your login password (which of course is
strong and secure)
• Windows
• Windows 10 Pro or Enterprise: BitLocker
• Others: VeraCrypt ($99)
• Apple Mac OSX
• FileVault
When selling or recycling your computer
• Make sure you have copied all your personal data to your new
computer.
• Remove all your personal data from the hard drive of your old
computer.
• If selling or donating to charity
• Run a disk wipe utility to securely erase your personal data
• If scrapping it
• Remove the hard drive and keep it, or break it permanently
References
Use strong passwords
• Password Do’s and Don’ts (KrebsOnSecurity)
Use a password manager
• Why You Need a Password Manager. Yes, You (New York Times)
Enable two-factor authentication
• Protecting Your Internet Accounts Keeps Getting Easier (New York Times)
• twofactorauth.org (List of 2FA enabled websites)
Don’t fall for phishing attacks
• What is Phishing?
References
Don’t over-share on social media
• The Dangers of Oversharing on Social Media (Pure Moderation)
• How to Turn OFF Geotagging For Photos On iPhone and iPad
• How To Turn Off Geotagging On Android Devices
Use public Wi-Fi safely
• What Is a VPN and What Can (and Can’t) It Do? (Wirecutter)
• The Best VPN Services for 2019 (PC Magazine)
Secure your computer and data
• The Best Antivirus Is Not Traditional Antivirus (Wirecutter)
• What’s the Best Way to Back Up My Computer? (How-To Geek)
About the presenter
Dave Herrington is a retired IT
professional with 44 years of
experience in educational
computing at Princeton
University. He recently
completed his Security+
certification and created this
lecture on personal cybersecurity
in order to raise public
awareness of the dangers of
today’s internet and current best
practices for safe computing.
https://linkedin.com/in/dlherrin/
Contact information
Email dlherrin@gmail.com
Phone (609) 375-8588

More Related Content

What's hot

Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNetLockSmith
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsConnectSafely
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc SecurityMallTake
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHabFg
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A DiscussionKaushik Patra
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereBlake Carver
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationJeff Zahn
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08DallasHaselhorst
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTsIT Tech
 
Ncsam 2019-cybersecurity-awareness-trivia final-508
Ncsam 2019-cybersecurity-awareness-trivia final-508Ncsam 2019-cybersecurity-awareness-trivia final-508
Ncsam 2019-cybersecurity-awareness-trivia final-508Vishwan Aranha
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In LibrariesBlake Carver
 

What's hot (20)

Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Eset cybersecurity awareness (laxman giri)
Eset cybersecurity awareness (laxman giri)Eset cybersecurity awareness (laxman giri)
Eset cybersecurity awareness (laxman giri)
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Cyber security
Cyber securityCyber security
Cyber security
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTs
 
Ncsam 2019-cybersecurity-awareness-trivia final-508
Ncsam 2019-cybersecurity-awareness-trivia final-508Ncsam 2019-cybersecurity-awareness-trivia final-508
Ncsam 2019-cybersecurity-awareness-trivia final-508
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
New internet security
New internet securityNew internet security
New internet security
 

Similar to Be Cyber Smart! (DLH 10/25/2019)

Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Digital security for Sri Lankan activists
Digital security for Sri Lankan activistsDigital security for Sri Lankan activists
Digital security for Sri Lankan activistsSanjana Hattotuwa
 
How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!AVG Technologies AU
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptxRajuSingh730938
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxBilmyRikas
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxsumita02
 

Similar to Be Cyber Smart! (DLH 10/25/2019) (20)

Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Digital security for Sri Lankan activists
Digital security for Sri Lankan activistsDigital security for Sri Lankan activists
Digital security for Sri Lankan activists
 
How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Avoid the Hack
Avoid the HackAvoid the Hack
Avoid the Hack
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 

Recently uploaded

定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 

Recently uploaded (20)

Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 

Be Cyber Smart! (DLH 10/25/2019)

  • 1. Be Cyber Smart! David L. Herrington Cybersecurity Champion October 25, 2019
  • 2. National Cybersecurity Awareness Month NCSAM is a collaborative effort between the Cybersecurity and Infrastructure Security Agency (CISA) and its public and private partners — including the National Cyber Security Alliance (NCSA) — to ensure every American has the resources they need to stay safe and secure online while increasing the resilience of the Nation against cyber threats. This presentation has been adapted and expanded from the topics presented at: https://www.dhs.gov/be-cyber-smart/
  • 3. What we will cover today 1. Use strong passwords 2. Use a password manager 3. Enable two-factor authentication 4. Don’t fall for phishing attacks 5. Don’t over-share on social media 6. Use public Wi-Fi safely 7. Secure your computer and data
  • 4. 1. Use strong passwords
  • 5. Video: How not to defend the planet Setup: The evil Darth Helmet has kidnapped princess Vespa and is threatening to surgically reverse her nose job if the King does not give him the combination to the planetary defense system. He gives in. What do you suppose the combination is? View YouTube video Credits: Spaceballs, 1987 MGM.
  • 6. What is right and wrong about that scene? Right 12345 is a terribly bad password! Wrong In real life an attacker would have already tried that password and hundreds of thousands of other common ones in a matter of seconds.
  • 7. 11.7M Ashley Madison passwords revealed password number of users 123456 121,000 12345 48,000 password 39,000 DEFAULT 34,000 123456789 27,000 qwerty 21,000 12345678 14,000 abc123 11,000 In the 2015 hacking of the online site Ashley Madison, attackers broke in, stole their password file, and posted it online. Others then set about decrypting the passwords, which were stored insecurely. These are the top eight passwords used.
  • 8. Password strength • For numeric-only passwords the number of combinations depends on the number of digits. • 3 digits: 10 x 10 x 10 = 1,000 combinations (000 to 999) • 5 digits: 10 x 10 x 10 x 10 x 10 = 100,000 combinations (00000 to 99999) • In general for n digits we have 10n combinations
  • 9. Password complexity • Digits- 0123456789 (10) • Uppercase letters- ABCDEFGHIJKLMNOPQRSTUVWXYZ (26) • Lowercase letters- abcdefghijklmnopqrstuvwxyz (26) • Special characters- !"#$%&'()*+,-./:;<=>?@[]^_`{|}~ (33 including space) • 10 + 26 + 26 + 33 = 95 different possibilities • Passwords having all these character types are called “complex.”
  • 10. Comparative number of combinations • Suppose we have a password that is 12 characters long… • Digits only: 1012 = 1,000,000,000,000 = 1.00E12 combinations. • Complex: 9512 = 5.40E23 combinations. • Using a complex password makes it exponentially harder for an attacker to guess it via brute force.
  • 11. Comparative brute force times • The time it takes to crack an all-numeric 12-character password by brute force is measured in hours. • The time it takes to crack a complex 12-character password by brute force is measured in thousands of years. • Passwords weaken over time as available computing power available to attackers increases. • Quantum computing will change everything!
  • 12. Password best practices • Passwords should be at least 12 characters long • Passwords should be “complex” meaning they should include digits, upper and lowercase letters, and special characters. E.g., “A16t0u9E@DIZ” • Instead of a ”password” consider a “passphrase” which is at least 16 characters long. E.g., “Orange Zebra wins in 2020!” • Make your passphrase unique! • Or create a shorthand complex version of your passphrase. E.g. “[{OZwi2020!}]” -- just make sure it is at least 12 chars long.
  • 13. Comparative strength of complex passwords vs passphrases • 12 character complex password • 9512 = 5.40E23 combinations • 16 character passphrase consisting of upper/lowercase letters and spaces • 5316 = 3.88E27 combinations
  • 15. 2. Use a password manager
  • 16. Why do I need a password manager? • Having a unique strong password for each website gives you added protection. • Even if a password is strong, there are still ways it can be obtained by an attacker. • Data breach and/or mishandling by website owner • You putting it on a sticky note near your computer • Your computer becomes infected with keylogger malware • You are the victim of a shoulder surfing attack
  • 17. Diagram showing reason for unique passwords eBay Amazon Medical Banking email An attacker has discovered your eBay password, but because your passwords are different all other accounts are safe! 'Tis the part of a wise man to keep himself today for tomorrow, and not venture all his eggs in one basket. Cervantes, Don Quixote, 1605.
  • 18. Password manager features • Import passwords from web browsers • Autofill web login forms • Multiple form filling identities • Password strength report • Auto-generation of new passwords • Secure sharing • Support for two-factor authentication
  • 20. Free password managers Wirecutter’s recommendations • LastPass Free • 1Password
  • 27. Two-factor authentication • Provides better security than a strong unique password • When logging in you need both your user id, password, and a one- time password that is generated for that login. • OTP can be delivered to you by: • SMS message (least secure) • Software application • Hardware token
  • 29. Installing new 2FA site in software application
  • 31. Common 2FA apps for your mobile devices • Duo • Google Authenticator • LastPass Authenticator
  • 32. Cybersecurity best practice • Enable 2FA on all your key accounts that could be involved in an identify theft crime. • Include: • Banking and investment • Email • Social media • Amazon
  • 33. Some service providers offering 2FA • Banking • Bank of America • Capital One • Citibank • Wells Fargo • Email • Gmail • AOL mail • Personal finance • Turbo Tax • QuickBooks Online • Shopping • Amazon • Apple • eBay • Etsy • Social media • Facebook • Instagram • Twitter And many more…
  • 34. 4. Don’t fall for phishing
  • 35. What is phishing? • Phishing is a social engineering attack involving email you receive from an attacker. • The email pretends to be something it is not. • Similar attacks can also be conducted via SMS text messages (smishing) or by phone (vishing).
  • 36. What is the goal of phishing? • To get you to click a link, open a file attachment, or perform an action • Clicking the link or opening the attachment could: • Install malware on your computer, such as a virus, keylogger, remote access trojan, or ransomware • Conscript your computer to be part of a botnet • Performing an action usually involves giving privileged or personal information (or money) to the attacker.
  • 37. Common features of phishing emails • Offers that are too good to be true • A sense of urgency • Hyperlinks embedded in the email that go to web addresses not associated with the supposed sender • File attachments • Unusual or unknown sender • Message sent at unusual time of day • One or more errors in English grammar or awkward phrasing
  • 38. Can you spot the Phishing email? • https://phishingquiz.withgoogle.com./
  • 39. If you accidentally click on a phishing link Immediately: • Disconnect your device from the internet • Back up your files • Scan your system • Change your passwords • Banking/investment • Email • Social media
  • 41. 5. Don’t over-share on social media
  • 42. Video: Social media privacy View video on YouTube Credits: Social Media Privacy by Habitu8, The Security Awareness Video Company
  • 43. Scenario #1: Real world theft • Criminals targeting you for real world theft can use geo-tagged photos you post on social media to find out where you live. • In real-time they can see that you just posted a photo on Facebook showing what a great vacation you and your family are having 1000 miles away, and correctly infer you are NOT AT HOME and cannot return soon. • This makes you a target for theft of your physical possessions.
  • 44. Scenario #2: Cybercrime and identity theft • Attackers will gather as much “open source” intelligence as they can on potential victims. • Primary email address • Cell phone number • Home address • Names of children, grandchildren, pets • Date of birth • Previous name(s) • This open-source intelligence is provided by you on social media.
  • 45. Some tips for staying safe on social media • Dial down your privacy settings • Only accept friend requests from people you know in the real world. • Never post details about your home, school, or work addresses online.
  • 46. Social media privacy settings • Adjust your default settings so that posts only go to friends. • Turn off the ability of the general public to see your contact information. • Only share your birthday with friends (maybe) and never share the year.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52. Turning off geo-tagging in photos • Not a FaceBook setting • Must turn off location services to photo app on mobile devices • (See articles in reference section at end of this presentation)
  • 53. Remember! • Your personal privacy and well being is not the primary concern of social media companies – it is YOUR primary concern! • Always use caution and common sense when posting to social media. • Once you publish personal information on social media it may be difficult or impossible to undo it if you change your mind later.
  • 55. 6. Use public Wi-Fi safely
  • 56. Free public Wi-Fi • A great convenience to travelers running low on wireless quota • Businesses may offer free Wi-Fi to attract customers… • …or they may offer free Wi-Fi because their competition has it. • Most small businesses probably do not monitor closely what is happening on their Wi-Fi networks. • What could possibly go wrong?
  • 58. Anatomy of an Evil Twin attack 1. Attacker shows up at Wi-Fi hotspot with fake AP. 2. Attacker launches a disassociation attack, causing Wi-Fi users to lose their connection. 3. They reconnect to the Evil Twin AP because it has a stronger signal. 4. Attacker can now inspect unencrypted traffic over Wi-Fi network and impersonate popular websites in order to harvest user names and passwords.
  • 59. Tips for safely using free public Wi-Fi • Always check to make sure the site you are browsing is using HTTPS and is showing a lock icon next to the web address. • Don’t visit banking or investment websites. • If you get an HTTPS warning screen do not override it! • For best protection use Virtual Private Network (VPN) software on your mobile device.
  • 60. Warning! • Do not proceed if you a screen like either of these while using public Wi-Fi
  • 63. Virtual Private Network (VPN) • Creates a secure encrypted connection (tunnel) between you and the VPN server • Buy a reputable VPN service that guarantees your browsing data will remain private. (Avoid “free” VPN services) • Recommended VPN services • Nord VPN • Tunnel Bear
  • 64. VPN server Website You Secure tunnel Wi-Fi hotspot and internet How VPN works
  • 65. 7. Secure your computer and data
  • 66. Keep your software up-to-date • Desktop/laptop operating systems • Web browsers • Applications such as Microsoft Office • Mobile device operating systems and apps • Antivirus software…
  • 67. Antivirus software • AV software needs to protect against multiple malware types • Viruses • Worms • Trojans • Keylogger • Adware • Spyware • Ransomware • Bots and botnets
  • 68. Signature-based AV software • Recognizes malware based on patterns in malware files • Compares it against a database of known malware • This database MUST be updated frequently to keep up with latest malware
  • 69. Problems with signature-based AV software • Polymorphic viruses constantly modify themselves and can slip by signature-based AV software. • In some circumstances malware signatures may be hidden by encryption • Not effective against zero-day attacks (exploits so new they are currently unknown)
  • 70. Heuristic/behavioral detection AV software • Detects malware based on its behavior rather than appearance • Does not use malware signatures • Can defend against zero-day attacks • Wirecutter’s recommendation: Malware Bytes Premium
  • 71. Back up your computer’s data • You need to back up your personal data only. Don’t worry about apps. You can reinstall them from the original source. • Having your data backups in multiple locations provides the best protection against natural disasters or theft. • Recommendation • Buy a 1 or 2 TB USB hard drive and configure it to backup changes daily AND • Use a cloud backup service to store a copy of your personal data in the cloud
  • 72. Cloud backup services • Microsoft • OneDrive (backup only; 100 GB or 200 GB) • Office 365 Personal (includes MS Office plus 1 TB of OneDrive space) • Google • Google Drive • Apple • iCloud Storage
  • 73. Encrypt your notebook computer’s hard drive • Notebook computers are easily lost or stolen. • Full disk encryption adds an additional layer of security over your data and is not noticeable during normal operation of computer. • Anyone in possession of your notebook will not be able to view your personal information without your login password (which of course is strong and secure) • Windows • Windows 10 Pro or Enterprise: BitLocker • Others: VeraCrypt ($99) • Apple Mac OSX • FileVault
  • 74. When selling or recycling your computer • Make sure you have copied all your personal data to your new computer. • Remove all your personal data from the hard drive of your old computer. • If selling or donating to charity • Run a disk wipe utility to securely erase your personal data • If scrapping it • Remove the hard drive and keep it, or break it permanently
  • 75. References Use strong passwords • Password Do’s and Don’ts (KrebsOnSecurity) Use a password manager • Why You Need a Password Manager. Yes, You (New York Times) Enable two-factor authentication • Protecting Your Internet Accounts Keeps Getting Easier (New York Times) • twofactorauth.org (List of 2FA enabled websites) Don’t fall for phishing attacks • What is Phishing?
  • 76. References Don’t over-share on social media • The Dangers of Oversharing on Social Media (Pure Moderation) • How to Turn OFF Geotagging For Photos On iPhone and iPad • How To Turn Off Geotagging On Android Devices Use public Wi-Fi safely • What Is a VPN and What Can (and Can’t) It Do? (Wirecutter) • The Best VPN Services for 2019 (PC Magazine) Secure your computer and data • The Best Antivirus Is Not Traditional Antivirus (Wirecutter) • What’s the Best Way to Back Up My Computer? (How-To Geek)
  • 77. About the presenter Dave Herrington is a retired IT professional with 44 years of experience in educational computing at Princeton University. He recently completed his Security+ certification and created this lecture on personal cybersecurity in order to raise public awareness of the dangers of today’s internet and current best practices for safe computing. https://linkedin.com/in/dlherrin/ Contact information Email dlherrin@gmail.com Phone (609) 375-8588