SlideShare a Scribd company logo
1 of 26
Download to read offline
Protecting Your Privacy
CYBERSPACE SECURITY, REAL WORLD SAFETY
Presented by
Seminar Agenda
Session 1
45 Minutes
 Introduction
 Who we are
 How we can help
 Agenda/Session Goals
 PowerPoint Preso (Main Focus)
 Tools & Example
Break
10 Minutes
Session 2
15 Minutes
 Beyond physical / local proximity
to deeper into Cyber
 Groups
 Trends
 Q&A
TBD
5 Minutes
Session 3
15 Minutes
 Closing/Next steps
 Help with residual audience
installation of Browser / Add-Ons
/ Extensions
 1:1 Q&A
Carpe Diem Strategic Services
(CDSS), a veteran owned service-
disabled business that offers
education and training which
addresses threats to digital
communications and online privacy.
Our mission is to assist individuals,
families, and small businesses to
understand, identify, and reduce
threats and vulnerabilities that expose
their business, financial, intellectual
property, and sensitive personal data
to potential exploitation and risk.
We provide easy-to-understand tips,
tools, and techniques that modify
potentially unwitting risky behavior.
Our Goals to Help You Protect Your Privacy
Knowledge transfer
 Reviewing the evolving vulnerability landscape and your mitigation steps
Identify your vulnerabilities
 Cyber Peeping Toms; Information Snoops, CPU Thieves
Adapt to your exposures
 Flood lights, Curtains, Controls, Behaviors
Secure your electronic devices, cards & personas
 Understanding what your device is doing - - being proactively curious
Coaching on how to educate family, friends, and
colleagues about cybersecurity
 Understanding how their behaviors impact you, family, employment
 Visual proof of Peepers
 Quick Fixes to Moderate to Increased Thoroughness
 Behaviors more important than tools
Scope of Services:
The More You Look, The More You See
RISK MITIGATION
Home or car alarms won’t
necessarily prevent attackers from
breaking into your house or vehicle.
However, improving your ability to
detect your exposures can help to
mitigate risks, loss of assets &
reduce future attacks.
Cyber
Peeping
Toms
CPU
Thieves
Info
Snoops
On-line
Family
Diary
What Aspect of Your Life Is Not
Accessible by the Internet?
What’s Your Digital Persona?
What aspect of your life is not online?
Assessing Your Risk Profile
 Introduction
 Are you a target?
 Where are your vulnerabilities?
 Who are your adversaries?
 What do they want?
 How will they go about getting what they want?
 What strategies will you use to protect your:
 Image/Reputation
 Family
 Career
 Finances
 Assets
Lost assets are much
easier to recover
than your reputation
Assessing Your Risk Profile - Demo
 Introduction Network Monitoring
 Wireless Monitoring
Getting Your Data to the Safety Zone
Banking/Financial
Personal Data
Buying Habits
GPS Breadcrumbs
Encrypted Hard Drive
Encrypted Email
Anti-Virus Protection
Strong Password(s)
What security measures have you implemented?
What’s at stake?
 Introduction Identity fraud
 Loss of money/finances
 Higher interest rates, credit ineligibility, or bankruptcy
 Time/Expense of resolving identity theft
 Loss of privacy
 Broken relationships
 Damaged image/reputation
 Personal safety/Kidnapping target
 Decline in employability/healthcare
 Quality vs. “Target Marketing” Advertisements
 Is someone making your system obsolete?*
*System can be defined as
desktop/laptop computers,
smartphones, tablets, and
other Internet-ready devices
Did You Know?
According to the IC3* 2012 Internet Crime Report:
 There were 289,874 complaints received with an
adjusted dollar loss of over $525 million
 U.S. males slightly outnumbered females in complaints
filed
 The highest percentage of complaints are between
40-59 years of age
And those
statistics just
account for
the reported
cases!
*The Internet Crime
Complaint Center (IC3) is
a partnership between
the FBI and the NW3C.
Empower Yourself
 Introduction
Detect
RespondAdapt
Prevent
Knowledge
Power
You Can Find Articles & Statistics…
Agenda
DEMONSTRATIONS
Live Demonstrations
 Ghostery
 Calomel SSL Validation
 Open PGP
 NoScript
 Truecrypt
 Google Images (http://images.google.com/)
Always assess how tools are supported
Agenda
TOOLS/RESOURCES
Ghostery
Ghostery® shows you the invisible
web – cookies, tags, web bugs, pixels
and beacons--and gives you a roll-
call of over 1,700 ad networks,
behavioral data providers, web
publishers and other companies
interested in your activity.
Then we help you learn about those
companies, so you can make
informed decisions about what you
are/aren’t willing to share, and
control your online privacy.
Ghostery is available for nearly every device and browser: Firefox,
IE, Safari, Chrome, Opera, iOS and Android via the Firefox Browser.
Calomel SSL Validation
This add-on was designed to more easily show
the true security state of the connection so
everyone can learn more about ciphers and
encryption using SSL. Firefox currently shows a
green URL tag for an extended validation (EV)
or a blue URL tag for a domain validation (DV)
certificate and a lock icon if the connection is
SSL encrypted.
We did not think this was enough information to
decide if the connection to the site was truly
secure. This is why the "Calomel SSL Validation"
add-on was developed. We score the
connection on the following items: if the
certificate was valid, if the fully qualified host
name is equal to the common name the
certificate was registered for and the strength
of the cipher and cipher key length.
NoScript
 Introduction
The NoScript Firefox extension provides
extra protection for Firefox, Seamonkey
and other mozilla-based browsers: this
free, open source add-on allows
JavaScript, Java, Flash and other plugins
to be executed only by trusted web sites
of your choice (e.g. your online bank).
NoScript's unique whitelist based pre-
emptive script blocking approach
prevents exploitation of security
vulnerabilities (known and even not
known yet!) with no loss of functionality...
Open PGP
 Introduction
OpenPGP is a non-proprietary protocol for encrypting
email using public key cryptography. It is based on PGP as
originally developed by Phil Zimmermann. The OpenPGP
protocol defines standard formats for encrypted messages,
signatures, and certificates for exchanging public keys.
Disk Encryption
 Introduction
Creates a virtual encrypted disk within a file and mounts it as a real disk.
Encrypts an entire partition or storage device such as USB flash drive or hard
drive.
Encrypts a partition or drive where Windows is installed (pre-boot
authentication).
Encryption is automatic, real-time (on-the-fly) and transparent.
Comments We’ve Received
 Not sure I know how to confirm deletion of my Blue-toothed
contacts at vehicle lease end.
 Response to commercial trackers “ughh”, “wow”, “...is that
legal for them to do?”
 Is it safe to control my home security controls over the
Internet?
 How do I know what my neighbors can see on my network?
 Tried encrypted mail before but was too difficult and no
one to communicate with.
 Disgusting
 Had uneasy feeling that I was being tracked but didn't
know how or what to do.
 Yeah, employees probably are putting things onto external
clouds (e.g. Google Docs, etc.) for convenience.
 What can you do (sigh)?
Some Best Practices
 Do not post too much personal information online
 If it’s free, you are probably the payment…
 Use special characters when creating passwords
 Be curious about your Smart Device … look around
 Do not store passwords online or on your computer
 Update your anti-virus software often
 Don’t store cookies
 Looks for sites using https://
 Encrypt hard drives to protect your personal data
 Be wary of public Wi-Fi: Secure vs. Unsecure Networks
 Turn off Blue Tooth if not being actively used
 Understanding what others can see about you, your network
 Learn privacy implication of features and new technology
 Do not post too much personal information online
Additional Reading
Baby Monitor Vulnerability
http://arstechnica.com/security/2013/10/hack-turns-belkin-baby-monitor-into-iphone-
controlled-bugging-device/
LG SmartTV
http://arstechnica.com/security/2013/11/lg-smart-tv-snooping-extends-to-home-
networks-second-blogger-says/
Electronic Frontier Organization Suggestions on Surveillance Security (draft)
https://ssd.eff.org/
Discussions (technical crowd) on Privacy
http://slashdot.org/tags.pl?tagname=privacy
FBI Cyber Most Wanted
http://www.fbi.gov/wanted/cyber
Logged Wi-Fi Networks
https://wigle.net/
Privacy Topics
https://en.wikipedia.org/wiki/Online_privacy
Monthly Newsletter (Coming Soon!)
Newsletter Title
TBD
CYBERSPACE SECURITY, REAL WORLD SAFETY
Next Steps
Want to stay current with the latest news, trends & tips
on protecting your privacy? Subscribe to our blog by
sending us an email at info@carpediemsvcs.com

More Related Content

What's hot

Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Edureka!
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 
15 digital security issues
 15 digital security issues 15 digital security issues
15 digital security issuesssusere50573
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - KloudlearnKloudLearn
 
Resources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationResources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationOregon Law Practice Management
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
IT Security booklet
IT Security bookletIT Security booklet
IT Security bookletiteclearners
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Onlinepcsafe
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 

What's hot (20)

Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
15 digital security issues
 15 digital security issues 15 digital security issues
15 digital security issues
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
internet security
internet securityinternet security
internet security
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Wireless security
Wireless securityWireless security
Wireless security
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Resources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationResources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client Information
 
Portfolio 7
Portfolio 7Portfolio 7
Portfolio 7
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
IT Security booklet
IT Security bookletIT Security booklet
IT Security booklet
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 

Similar to Protecting Your Privacy: Cyberspace Security, Real World Safety

A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for ActivistsGreg Stromire
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalistsantoniokisembo
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Anwar CHFI, SSCP, ITIL
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyersrtrautz
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcriptionService2Media
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Out in the open protecting your privacy in the digital age
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital agecomplianceonline123
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats07Deeps
 

Similar to Protecting Your Privacy: Cyberspace Security, Real World Safety (20)

Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Data Loss Detection
Data Loss DetectionData Loss Detection
Data Loss Detection
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for Activists
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalists
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyers
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
How To Secure Online Activities
How To Secure Online ActivitiesHow To Secure Online Activities
How To Secure Online Activities
 
INTERNET PRIVACY
INTERNET PRIVACYINTERNET PRIVACY
INTERNET PRIVACY
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Out in the open protecting your privacy in the digital age
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital age
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Protecting Your Privacy: Cyberspace Security, Real World Safety

  • 1. Protecting Your Privacy CYBERSPACE SECURITY, REAL WORLD SAFETY Presented by
  • 2. Seminar Agenda Session 1 45 Minutes  Introduction  Who we are  How we can help  Agenda/Session Goals  PowerPoint Preso (Main Focus)  Tools & Example Break 10 Minutes Session 2 15 Minutes  Beyond physical / local proximity to deeper into Cyber  Groups  Trends  Q&A TBD 5 Minutes Session 3 15 Minutes  Closing/Next steps  Help with residual audience installation of Browser / Add-Ons / Extensions  1:1 Q&A Carpe Diem Strategic Services (CDSS), a veteran owned service- disabled business that offers education and training which addresses threats to digital communications and online privacy. Our mission is to assist individuals, families, and small businesses to understand, identify, and reduce threats and vulnerabilities that expose their business, financial, intellectual property, and sensitive personal data to potential exploitation and risk. We provide easy-to-understand tips, tools, and techniques that modify potentially unwitting risky behavior.
  • 3. Our Goals to Help You Protect Your Privacy Knowledge transfer  Reviewing the evolving vulnerability landscape and your mitigation steps Identify your vulnerabilities  Cyber Peeping Toms; Information Snoops, CPU Thieves Adapt to your exposures  Flood lights, Curtains, Controls, Behaviors Secure your electronic devices, cards & personas  Understanding what your device is doing - - being proactively curious Coaching on how to educate family, friends, and colleagues about cybersecurity  Understanding how their behaviors impact you, family, employment  Visual proof of Peepers  Quick Fixes to Moderate to Increased Thoroughness  Behaviors more important than tools
  • 4. Scope of Services: The More You Look, The More You See RISK MITIGATION Home or car alarms won’t necessarily prevent attackers from breaking into your house or vehicle. However, improving your ability to detect your exposures can help to mitigate risks, loss of assets & reduce future attacks. Cyber Peeping Toms CPU Thieves Info Snoops On-line Family Diary
  • 5. What Aspect of Your Life Is Not Accessible by the Internet?
  • 6. What’s Your Digital Persona? What aspect of your life is not online?
  • 7. Assessing Your Risk Profile  Introduction  Are you a target?  Where are your vulnerabilities?  Who are your adversaries?  What do they want?  How will they go about getting what they want?  What strategies will you use to protect your:  Image/Reputation  Family  Career  Finances  Assets Lost assets are much easier to recover than your reputation
  • 8. Assessing Your Risk Profile - Demo  Introduction Network Monitoring  Wireless Monitoring
  • 9. Getting Your Data to the Safety Zone Banking/Financial Personal Data Buying Habits GPS Breadcrumbs Encrypted Hard Drive Encrypted Email Anti-Virus Protection Strong Password(s) What security measures have you implemented?
  • 10. What’s at stake?  Introduction Identity fraud  Loss of money/finances  Higher interest rates, credit ineligibility, or bankruptcy  Time/Expense of resolving identity theft  Loss of privacy  Broken relationships  Damaged image/reputation  Personal safety/Kidnapping target  Decline in employability/healthcare  Quality vs. “Target Marketing” Advertisements  Is someone making your system obsolete?* *System can be defined as desktop/laptop computers, smartphones, tablets, and other Internet-ready devices
  • 11. Did You Know? According to the IC3* 2012 Internet Crime Report:  There were 289,874 complaints received with an adjusted dollar loss of over $525 million  U.S. males slightly outnumbered females in complaints filed  The highest percentage of complaints are between 40-59 years of age And those statistics just account for the reported cases! *The Internet Crime Complaint Center (IC3) is a partnership between the FBI and the NW3C.
  • 13. You Can Find Articles & Statistics…
  • 15. Live Demonstrations  Ghostery  Calomel SSL Validation  Open PGP  NoScript  Truecrypt  Google Images (http://images.google.com/) Always assess how tools are supported
  • 17. Ghostery Ghostery® shows you the invisible web – cookies, tags, web bugs, pixels and beacons--and gives you a roll- call of over 1,700 ad networks, behavioral data providers, web publishers and other companies interested in your activity. Then we help you learn about those companies, so you can make informed decisions about what you are/aren’t willing to share, and control your online privacy. Ghostery is available for nearly every device and browser: Firefox, IE, Safari, Chrome, Opera, iOS and Android via the Firefox Browser.
  • 18. Calomel SSL Validation This add-on was designed to more easily show the true security state of the connection so everyone can learn more about ciphers and encryption using SSL. Firefox currently shows a green URL tag for an extended validation (EV) or a blue URL tag for a domain validation (DV) certificate and a lock icon if the connection is SSL encrypted. We did not think this was enough information to decide if the connection to the site was truly secure. This is why the "Calomel SSL Validation" add-on was developed. We score the connection on the following items: if the certificate was valid, if the fully qualified host name is equal to the common name the certificate was registered for and the strength of the cipher and cipher key length.
  • 19. NoScript  Introduction The NoScript Firefox extension provides extra protection for Firefox, Seamonkey and other mozilla-based browsers: this free, open source add-on allows JavaScript, Java, Flash and other plugins to be executed only by trusted web sites of your choice (e.g. your online bank). NoScript's unique whitelist based pre- emptive script blocking approach prevents exploitation of security vulnerabilities (known and even not known yet!) with no loss of functionality...
  • 20. Open PGP  Introduction OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil Zimmermann. The OpenPGP protocol defines standard formats for encrypted messages, signatures, and certificates for exchanging public keys.
  • 21. Disk Encryption  Introduction Creates a virtual encrypted disk within a file and mounts it as a real disk. Encrypts an entire partition or storage device such as USB flash drive or hard drive. Encrypts a partition or drive where Windows is installed (pre-boot authentication). Encryption is automatic, real-time (on-the-fly) and transparent.
  • 22. Comments We’ve Received  Not sure I know how to confirm deletion of my Blue-toothed contacts at vehicle lease end.  Response to commercial trackers “ughh”, “wow”, “...is that legal for them to do?”  Is it safe to control my home security controls over the Internet?  How do I know what my neighbors can see on my network?  Tried encrypted mail before but was too difficult and no one to communicate with.  Disgusting  Had uneasy feeling that I was being tracked but didn't know how or what to do.  Yeah, employees probably are putting things onto external clouds (e.g. Google Docs, etc.) for convenience.  What can you do (sigh)?
  • 23. Some Best Practices  Do not post too much personal information online  If it’s free, you are probably the payment…  Use special characters when creating passwords  Be curious about your Smart Device … look around  Do not store passwords online or on your computer  Update your anti-virus software often  Don’t store cookies  Looks for sites using https://  Encrypt hard drives to protect your personal data  Be wary of public Wi-Fi: Secure vs. Unsecure Networks  Turn off Blue Tooth if not being actively used  Understanding what others can see about you, your network  Learn privacy implication of features and new technology  Do not post too much personal information online
  • 24. Additional Reading Baby Monitor Vulnerability http://arstechnica.com/security/2013/10/hack-turns-belkin-baby-monitor-into-iphone- controlled-bugging-device/ LG SmartTV http://arstechnica.com/security/2013/11/lg-smart-tv-snooping-extends-to-home- networks-second-blogger-says/ Electronic Frontier Organization Suggestions on Surveillance Security (draft) https://ssd.eff.org/ Discussions (technical crowd) on Privacy http://slashdot.org/tags.pl?tagname=privacy FBI Cyber Most Wanted http://www.fbi.gov/wanted/cyber Logged Wi-Fi Networks https://wigle.net/ Privacy Topics https://en.wikipedia.org/wiki/Online_privacy
  • 25. Monthly Newsletter (Coming Soon!) Newsletter Title TBD CYBERSPACE SECURITY, REAL WORLD SAFETY
  • 26. Next Steps Want to stay current with the latest news, trends & tips on protecting your privacy? Subscribe to our blog by sending us an email at info@carpediemsvcs.com