SlideShare a Scribd company logo
Travis Good
Introduction
 This session will provide you with
suggestions on how to protect your
personal information and devices and
what you need protection from
 Topics:
 What is Cyber Security?
 Threats
 Best Practices & Protecting your identity
 What to look for and what to do if something
goes terribly wrong
What is Cyber Security?
 Cyber = Digital
 Protection of information systems from
theft or damage to the hardware, the
software, and the information on them
 Includes disruption or misdirection of the
services they provide
What is a Cyber Crime?
 Illegal access
 Illegal Interception
 System Interference
 Data Interference
 Misuse of devices
 Fraud
Threats
 Malware
 Hackers
 Social Engineering
 Espionage
Malware
 Any software used to disrupt, gather
information, gain access, extort money,
or display advertising
 Viruses, Trojans, Spyware, Worms
 Often disguised as normal files
 Affects all systems – Windows, OS X,
Android, iOS
Malware - CryptoLocker
Hackers
 “Trespass” into computers or systems
 Use compromised computers to:
 Send spam or viruses
 Gather data
○ Credit Cards, SSNs
 Gather credentials
 Sell access (botnets)
Hackers – BotNets
 BotNets are groups of
compromised computers
 Sold on black markets
 Often used in DDoS
attacks
 Average cost is $67
for 24 hours
Hackers - BotNets
 Distributed Denial of Service Attacks
disrupt services
Social Engineering
 Attacks that rely on human interaction
 Usually revolve around tricking people
into performing actions or divulging
information
 Most common attacks:
 Baiting – real-world Trojan Horse
 Vishing – calls about a “virus”
 Phishing
Phishing
 Emails disguised as an official
notification
 Usually attempt to create a sense of
urgency
 Generally in search of credentials
Phishing
Espionage
 Governments
 Classified documents & archives
 Strategic plans
 Corruption
 Corporations
 Trade secrets
 R&D of new technology
 Financial data
Espionage
 Norse Attack Map
 http://map.norsecorp.com/#/
High Profile Attacks
 Target
 Celebrity iCloud
 Ashley Madison
 Sony
 Stuxnet
Target Breach – 2013
 Gained credentials via a Phishing
campaign on 3rd party HVAC firm
 Installed malware on thousands of POS
systems for 2 months
 40 million credit and debit cards
 70 million customer records
 50% profit drop that quarter
 CEO and CIO resigned
Celebrity iCloud Breach - 2014
 Weakness in iCloud’s API allowed
attackers to make unlimited login
attempts
 Brute-force tools were successful
 Attackers were able to download entire
backups without ever accessing victims’
iPhones
 Backups included documents, contacts,
texts, and pictures
Ashley Madison Breach - 2014
 Hacktivists “Impact Team” attacked
because of moral/ethical reasons
 Believed to have gained entry from
former employee
 32 million users’ account details dumped
online
 New websites built specifically to search
through data dump
Sony Breach - 2014
 Attackers gained credentials from fake
Apple ID phishing emails
 Many high-level executives used same
passwords
 Once in, attackers spread across
network with new “Wiper” malware
 Attackers had access for more than a
year, stole 100 terabytes of data
 Connected to North Korean government
Stuxnet - 2009
 Believed to be world’s first
“cyberweapon” with physical fallout
 Developed by US & Israeli governments
 Specialized worm developed to
sabotage Iranian nuclear program
 Targeted computer systems controlling
uranium centrifuges
 Destroyed over 1,000 centrifuges, set
back program by 2 years
Best Practices
 Install OS/Software Updates
 Run Anti-Virus Software
 Practice Good Password Management
 Turn On Personal Firewalls
 Know How To Spot a Phish
Install Updates
 80% of exploit instances are crimes of
opportunity
 70% of last year’s breaches exploited a
known vulnerability at least 1 year old
 Always Update Windows and OS X
 Commonly exploited programs:
 Java
 Adobe Flash Player
 IE & Safari
Automatic Updates -
Windows
Automatic Updates – OS X
Run Anti-Virus Software
 Over 100,000 known variants of
malware across all operating systems
 Antivirus Firms give each variant a
unique identifier called a “signature”
 Antivirus programs detect programs
based on these signatures
 Remove viruses
 Quarantine infected files
 Prevents future infections
Antivirus Programs
 Avira
 Mac and PC
 Sophos
 Multiple computers from a single interface
 Malwarebytes Anti-Malware
 Good second line of defense
Password Don’ts
 Never use your name
 Don’t use information about you
 Birthday
 Phone Number
 Location
 Never give your password to anyone at
any time
 Don’t use the same password for
multiple services
Password Do’s
 Long password that is easy to
remember
 Length generally the most important factor
 Use upper and lower case
 Use a symbol or a number
 Best method: use a short phrase or
sentence
 Include spaces and punctuation
Breaking Passwords
 Brute Force Attack
 aaaaaa, aaaaab, etc.
 Thousands of tries per second
 Dictionary Attack
 Word lists
 Hybrid Attack
 Dictionary + Brute Force
Password Strength
 “Buffalo!”
 8 characters
 Upper & Lower case
 Special Character
 Easy to remember
 Strong password?
 Let’s check
○ https://howsecureismypassword.net/
Password Strength
 “Buffalo!”
Password Strength
 “I love cold beer.”
 17 characters
 Upper & Lower case
 4 special characters
 Easy to remember
 Strong password?
Password Strength
 “I love cold beer.”
Further Protection
 Two-Factor Authentication
 Combination of 2 forms of identification from
separate categories
 Most common method uses SMS codes
Two-Factor Authentication
 Most major sites now offer it as an
optional setting
 Facebook
 Gmail, Yahoo, Microsoft
 Twitter
 Instagram
 Tumblr
 Most Banks
Turn On Personal Firewalls
 Protective barriers between computers
and the internet
 Hackers search the internet by sending
out pings and waiting for responses
 Stop your system from replying
Enabling Firewall - Windows
Enabling Firewall – OS X
What To Look For
 Know the signs of being compromised
 If you get an official notice of
compromise, take it seriously
 Pay attention to media reports
 Listen to your gut
 Know how systems and apps run
normally, take notice when they don’t
Know How to Spot a Phish
Did I Get Owned?
 Signs of compromise:
 Computers
○ Sudden appearance of popups
○ System running very slow
○ Browsers redirecting to weird pages
○ Files corrupt, or simply won’t open
○ Antivirus suddenly disappears or stops
working
Did I Get Owned?
 Signs of compromise:
 Accounts
○ Loss of access
○ Strange activity
 Unfamiliar sent items
 Messages disappearing
 Random transactions
- Can be many small purchases or a few large
transfers
Okay, I Got Owned.
 What to do if compromised:
 Computer
○ Disconnect from the internet immediately
○ Run anti-virus scans with multiple products
 Use another computer or recruit a friend
○ If the scans find anything, clean and reboot
○ If the scans don’t find anything, backup
personal files and restore to a previous OS
version
System Restore - Windows
Time Machine – OS X
Okay, I Got Owned.
 What to do if compromised:
 Accounts
○ Reset passwords immediately
 Start with email
 If email is compromised, reset all accounts
associated with it
○ Regain access to hacked accounts
 Most sites have means of reclaiming
○ If account is banking related, contact bank
ASAP
Okay, I Got Owned.
 What to do if compromised:
 Identity
○ Contact all 3 major credit bureaus: Equifax,
Experian, and TransUnion
 Order credit reports
 File initial fraud alert
○ Contact local police and report identity theft
○ Request all new banking cards
○ Closely monitor future monthly statements
and credit
To Summarize
 Cyber Security is critical
 Reliance on technology will continue to
increase
 As security measures become more
effective, so will the threats
○ APTs
 Information is a commodity
To Summarize
 Protecting yourself is your responsibility
 Stay up to date
 Practice good password management
 Keep your eye out for strange activity
 If unsure, ask!
○ Google is your friend
○ So am I
 If compromised, act quickly
Questions?
 Email me any time!
 tggood@wtamu.edu

More Related Content

What's hot

Computer virus
Computer virusComputer virus
Computer virus
sajeena81
 
Netiquette
NetiquetteNetiquette
Netiquette
sajeena81
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra22
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
Harsh Tekriwal
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
Mo Han
 
What-is-computer-security
What-is-computer-securityWhat-is-computer-security
What-is-computer-security
iamvishal2
 
Internet security
Internet securityInternet security
Internet security
Mohamed El-malki
 
What is Phishing - Kloudlearn
What is Phishing - KloudlearnWhat is Phishing - Kloudlearn
What is Phishing - Kloudlearn
KloudLearn
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Sanjeev Kumar Jaiswal
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Rameesha1
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
sharmaakash1881
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Jacqueline Fick
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N GHafizra Mas
 

What's hot (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Phishing
PhishingPhishing
Phishing
 
Netiquette
NetiquetteNetiquette
Netiquette
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
internet security
internet securityinternet security
internet security
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
What-is-computer-security
What-is-computer-securityWhat-is-computer-security
What-is-computer-security
 
Internet security
Internet securityInternet security
Internet security
 
What is Phishing - Kloudlearn
What is Phishing - KloudlearnWhat is Phishing - Kloudlearn
What is Phishing - Kloudlearn
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 

Viewers also liked

The Pivotality of Web 2.0 in social lives
The Pivotality of Web 2.0 in social livesThe Pivotality of Web 2.0 in social lives
The Pivotality of Web 2.0 in social livesDr Mariann Hardey
 
Meet Senior Healthcare And Education Facility Executives With Purchasing Auth...
Meet Senior Healthcare And Education Facility Executives With Purchasing Auth...Meet Senior Healthcare And Education Facility Executives With Purchasing Auth...
Meet Senior Healthcare And Education Facility Executives With Purchasing Auth...
kestervanfleet
 
Galardón Corazón de León. Discurso Alberto Galarza a Carmen Aristegui
Galardón Corazón de León. Discurso Alberto Galarza a Carmen AristeguiGalardón Corazón de León. Discurso Alberto Galarza a Carmen Aristegui
Galardón Corazón de León. Discurso Alberto Galarza a Carmen Aristegui
Federación de Estudiantes Universitarios
 
VITAMINAS
VITAMINASVITAMINAS
Produksyon
ProduksyonProduksyon
Produksyon
Janelyn Dimaranan
 
Contents pages
Contents pagesContents pages
Contents pages
meghanseery
 
акижаева адина+аптека+решение
акижаева адина+аптека+решениеакижаева адина+аптека+решение
акижаева адина+аптека+решение
Адина Акижаева
 
Ilustrasi perhitungan omset
Ilustrasi perhitungan omsetIlustrasi perhitungan omset
Ilustrasi perhitungan omset
Car Link
 
Technologies Available
Technologies  AvailableTechnologies  Available
Technologies AvailableIshra Y
 
Realizing Late Phase Value Through Strategic Partnerships with CROs by Joshua...
Realizing Late Phase Value Through Strategic Partnerships with CROs by Joshua...Realizing Late Phase Value Through Strategic Partnerships with CROs by Joshua...
Realizing Late Phase Value Through Strategic Partnerships with CROs by Joshua...
PAREXEL International
 
Warriors SS Bible Study March 26 2016
Warriors SS Bible Study March 26 2016Warriors SS Bible Study March 26 2016
Warriors SS Bible Study March 26 2016
Thurston Norris
 
Organization Development Implemented in Starbucks
Organization Development Implemented in StarbucksOrganization Development Implemented in Starbucks
Organization Development Implemented in Starbucks
Indiran K
 
El academicismo
El academicismoEl academicismo

Viewers also liked (20)

Quantas Vezes
Quantas VezesQuantas Vezes
Quantas Vezes
 
11863
1186311863
11863
 
Emotional Intelligence
Emotional IntelligenceEmotional Intelligence
Emotional Intelligence
 
The Pivotality of Web 2.0 in social lives
The Pivotality of Web 2.0 in social livesThe Pivotality of Web 2.0 in social lives
The Pivotality of Web 2.0 in social lives
 
Meet Senior Healthcare And Education Facility Executives With Purchasing Auth...
Meet Senior Healthcare And Education Facility Executives With Purchasing Auth...Meet Senior Healthcare And Education Facility Executives With Purchasing Auth...
Meet Senior Healthcare And Education Facility Executives With Purchasing Auth...
 
Galardón Corazón de León. Discurso Alberto Galarza a Carmen Aristegui
Galardón Corazón de León. Discurso Alberto Galarza a Carmen AristeguiGalardón Corazón de León. Discurso Alberto Galarza a Carmen Aristegui
Galardón Corazón de León. Discurso Alberto Galarza a Carmen Aristegui
 
VITAMINAS
VITAMINASVITAMINAS
VITAMINAS
 
Produksyon
ProduksyonProduksyon
Produksyon
 
Contents pages
Contents pagesContents pages
Contents pages
 
Ingham Customer sat
Ingham Customer satIngham Customer sat
Ingham Customer sat
 
акижаева адина+аптека+решение
акижаева адина+аптека+решениеакижаева адина+аптека+решение
акижаева адина+аптека+решение
 
Ilustrasi perhitungan omset
Ilustrasi perhitungan omsetIlustrasi perhitungan omset
Ilustrasi perhitungan omset
 
Technologies Available
Technologies  AvailableTechnologies  Available
Technologies Available
 
Son of-fatherland.1825.103
Son of-fatherland.1825.103Son of-fatherland.1825.103
Son of-fatherland.1825.103
 
Goal Attainment
Goal AttainmentGoal Attainment
Goal Attainment
 
Realizing Late Phase Value Through Strategic Partnerships with CROs by Joshua...
Realizing Late Phase Value Through Strategic Partnerships with CROs by Joshua...Realizing Late Phase Value Through Strategic Partnerships with CROs by Joshua...
Realizing Late Phase Value Through Strategic Partnerships with CROs by Joshua...
 
Warriors SS Bible Study March 26 2016
Warriors SS Bible Study March 26 2016Warriors SS Bible Study March 26 2016
Warriors SS Bible Study March 26 2016
 
Organization Development Implemented in Starbucks
Organization Development Implemented in StarbucksOrganization Development Implemented in Starbucks
Organization Development Implemented in Starbucks
 
AIIB PPT
AIIB PPTAIIB PPT
AIIB PPT
 
El academicismo
El academicismoEl academicismo
El academicismo
 

Similar to Cyber security 101

End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
Kanishk Raj
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
dkp205
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
Symptai Consulting Limited
 
IT security awareness
IT security awarenessIT security awareness
IT security awareness
Dr. Ramkumar Lakshminarayanan
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
DiveshK4
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information Security
WorldTrade3
 
User security awareness
User security awarenessUser security awareness
User security awareness
K. A. M Lutfullah
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
Dinesh582831
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
UmaraZahidLecturer
 
Hiroshima University Information Security & Compliance 2017
Hiroshima University Information Security & Compliance 2017Hiroshima University Information Security & Compliance 2017
Hiroshima University Information Security & Compliance 2017
imc-isec-comp
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
Phishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information Highway
Kevin Lim
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
Anindita Ghatak
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
maryrowling
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Salma Zafar
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
tapan_sengupta
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
lowlesh1
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
lowlesh1
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
Brian Pichman
 

Similar to Cyber security 101 (20)

End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information Security
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Hiroshima University Information Security & Compliance 2017
Hiroshima University Information Security & Compliance 2017Hiroshima University Information Security & Compliance 2017
Hiroshima University Information Security & Compliance 2017
 
Computer security
Computer securityComputer security
Computer security
 
Phishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information Highway
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 

Cyber security 101

  • 2. Introduction  This session will provide you with suggestions on how to protect your personal information and devices and what you need protection from  Topics:  What is Cyber Security?  Threats  Best Practices & Protecting your identity  What to look for and what to do if something goes terribly wrong
  • 3. What is Cyber Security?  Cyber = Digital  Protection of information systems from theft or damage to the hardware, the software, and the information on them  Includes disruption or misdirection of the services they provide
  • 4. What is a Cyber Crime?  Illegal access  Illegal Interception  System Interference  Data Interference  Misuse of devices  Fraud
  • 5. Threats  Malware  Hackers  Social Engineering  Espionage
  • 6. Malware  Any software used to disrupt, gather information, gain access, extort money, or display advertising  Viruses, Trojans, Spyware, Worms  Often disguised as normal files  Affects all systems – Windows, OS X, Android, iOS
  • 8. Hackers  “Trespass” into computers or systems  Use compromised computers to:  Send spam or viruses  Gather data ○ Credit Cards, SSNs  Gather credentials  Sell access (botnets)
  • 9. Hackers – BotNets  BotNets are groups of compromised computers  Sold on black markets  Often used in DDoS attacks  Average cost is $67 for 24 hours
  • 10. Hackers - BotNets  Distributed Denial of Service Attacks disrupt services
  • 11. Social Engineering  Attacks that rely on human interaction  Usually revolve around tricking people into performing actions or divulging information  Most common attacks:  Baiting – real-world Trojan Horse  Vishing – calls about a “virus”  Phishing
  • 12. Phishing  Emails disguised as an official notification  Usually attempt to create a sense of urgency  Generally in search of credentials
  • 14. Espionage  Governments  Classified documents & archives  Strategic plans  Corruption  Corporations  Trade secrets  R&D of new technology  Financial data
  • 15. Espionage  Norse Attack Map  http://map.norsecorp.com/#/
  • 16. High Profile Attacks  Target  Celebrity iCloud  Ashley Madison  Sony  Stuxnet
  • 17. Target Breach – 2013  Gained credentials via a Phishing campaign on 3rd party HVAC firm  Installed malware on thousands of POS systems for 2 months  40 million credit and debit cards  70 million customer records  50% profit drop that quarter  CEO and CIO resigned
  • 18. Celebrity iCloud Breach - 2014  Weakness in iCloud’s API allowed attackers to make unlimited login attempts  Brute-force tools were successful  Attackers were able to download entire backups without ever accessing victims’ iPhones  Backups included documents, contacts, texts, and pictures
  • 19. Ashley Madison Breach - 2014  Hacktivists “Impact Team” attacked because of moral/ethical reasons  Believed to have gained entry from former employee  32 million users’ account details dumped online  New websites built specifically to search through data dump
  • 20. Sony Breach - 2014  Attackers gained credentials from fake Apple ID phishing emails  Many high-level executives used same passwords  Once in, attackers spread across network with new “Wiper” malware  Attackers had access for more than a year, stole 100 terabytes of data  Connected to North Korean government
  • 21. Stuxnet - 2009  Believed to be world’s first “cyberweapon” with physical fallout  Developed by US & Israeli governments  Specialized worm developed to sabotage Iranian nuclear program  Targeted computer systems controlling uranium centrifuges  Destroyed over 1,000 centrifuges, set back program by 2 years
  • 22. Best Practices  Install OS/Software Updates  Run Anti-Virus Software  Practice Good Password Management  Turn On Personal Firewalls  Know How To Spot a Phish
  • 23. Install Updates  80% of exploit instances are crimes of opportunity  70% of last year’s breaches exploited a known vulnerability at least 1 year old  Always Update Windows and OS X  Commonly exploited programs:  Java  Adobe Flash Player  IE & Safari
  • 26. Run Anti-Virus Software  Over 100,000 known variants of malware across all operating systems  Antivirus Firms give each variant a unique identifier called a “signature”  Antivirus programs detect programs based on these signatures  Remove viruses  Quarantine infected files  Prevents future infections
  • 27. Antivirus Programs  Avira  Mac and PC  Sophos  Multiple computers from a single interface  Malwarebytes Anti-Malware  Good second line of defense
  • 28. Password Don’ts  Never use your name  Don’t use information about you  Birthday  Phone Number  Location  Never give your password to anyone at any time  Don’t use the same password for multiple services
  • 29. Password Do’s  Long password that is easy to remember  Length generally the most important factor  Use upper and lower case  Use a symbol or a number  Best method: use a short phrase or sentence  Include spaces and punctuation
  • 30. Breaking Passwords  Brute Force Attack  aaaaaa, aaaaab, etc.  Thousands of tries per second  Dictionary Attack  Word lists  Hybrid Attack  Dictionary + Brute Force
  • 31. Password Strength  “Buffalo!”  8 characters  Upper & Lower case  Special Character  Easy to remember  Strong password?  Let’s check ○ https://howsecureismypassword.net/
  • 33. Password Strength  “I love cold beer.”  17 characters  Upper & Lower case  4 special characters  Easy to remember  Strong password?
  • 34. Password Strength  “I love cold beer.”
  • 35. Further Protection  Two-Factor Authentication  Combination of 2 forms of identification from separate categories  Most common method uses SMS codes
  • 36. Two-Factor Authentication  Most major sites now offer it as an optional setting  Facebook  Gmail, Yahoo, Microsoft  Twitter  Instagram  Tumblr  Most Banks
  • 37. Turn On Personal Firewalls  Protective barriers between computers and the internet  Hackers search the internet by sending out pings and waiting for responses  Stop your system from replying
  • 40. What To Look For  Know the signs of being compromised  If you get an official notice of compromise, take it seriously  Pay attention to media reports  Listen to your gut  Know how systems and apps run normally, take notice when they don’t
  • 41. Know How to Spot a Phish
  • 42. Did I Get Owned?  Signs of compromise:  Computers ○ Sudden appearance of popups ○ System running very slow ○ Browsers redirecting to weird pages ○ Files corrupt, or simply won’t open ○ Antivirus suddenly disappears or stops working
  • 43. Did I Get Owned?  Signs of compromise:  Accounts ○ Loss of access ○ Strange activity  Unfamiliar sent items  Messages disappearing  Random transactions - Can be many small purchases or a few large transfers
  • 44. Okay, I Got Owned.  What to do if compromised:  Computer ○ Disconnect from the internet immediately ○ Run anti-virus scans with multiple products  Use another computer or recruit a friend ○ If the scans find anything, clean and reboot ○ If the scans don’t find anything, backup personal files and restore to a previous OS version
  • 45. System Restore - Windows
  • 47. Okay, I Got Owned.  What to do if compromised:  Accounts ○ Reset passwords immediately  Start with email  If email is compromised, reset all accounts associated with it ○ Regain access to hacked accounts  Most sites have means of reclaiming ○ If account is banking related, contact bank ASAP
  • 48. Okay, I Got Owned.  What to do if compromised:  Identity ○ Contact all 3 major credit bureaus: Equifax, Experian, and TransUnion  Order credit reports  File initial fraud alert ○ Contact local police and report identity theft ○ Request all new banking cards ○ Closely monitor future monthly statements and credit
  • 49. To Summarize  Cyber Security is critical  Reliance on technology will continue to increase  As security measures become more effective, so will the threats ○ APTs  Information is a commodity
  • 50. To Summarize  Protecting yourself is your responsibility  Stay up to date  Practice good password management  Keep your eye out for strange activity  If unsure, ask! ○ Google is your friend ○ So am I  If compromised, act quickly
  • 51. Questions?  Email me any time!  tggood@wtamu.edu