Steven Mandzik   Web 2.0 Security
Danah Boyd
    Privacy = Control
Anil Dash
One of the biggest benefits of that reality is that I now have control.
The information I choose to reveal...

Granted, I'll never have total control. But look at most people who are
concerned with privacy. They're fighting a losing battle, trying to
prevent their personal information from being available on the web at
all.

If you recognize that it's going to happen, your best bet is to choose
how, when, and where it shows up.
Social Engineering
Facts
★ 50% of security breaches have come from federal/state
  government (since 2005)

★ Spear Phishing US Government email resulted 74,000
  compromised computers

★ State actors -- Google v China -- East Europe Mafia
Top Problems
★ Social Engineering

★ Spear Phishing

★ Updates

★ Passwords

★ Identity Theft
OBE -- (not top problems)
★ Anti-Virus

★ Identity Theft

★ Passwords (kinda)
Solutions
Simple
Simplify
★ Financial

★ Social

★ News
Financial
E*Trade
Amex
Social
News
Passwords
             Strong Password Definition, Requirements and Guidelines


•A strong password is a password that meets the following guidelines:
•Be 7 or 14 characters long.
•Contain both uppercase and lowercase letters.
•Contain numbers.
•Contain symbols, such as ` ! " ? $ ? % ^ & * ( ) _ - + = { [ } ] : ; @ ' ~ # |  < , > . ? /
•Contain a symbol in the second, third, fourth, fifth or sixth position (due to the way in which encryption
works).
•Not resemble any of your previous passwords.
•Not be your name, your friend's or family member's name, or your login.
•Not be a dictionary word or common name.
OAuth




        Facebook Connect
Finally!
Upgrade, Upgrade
Upgra
Steven Mandzik
Director of Green IT, Navstar Inc.

Steve@acleanlife.org

twitter: robotchampion

www.acleanlife.org --- www.stevenmandzik.com

Web20security

  • 2.
    Steven Mandzik Web 2.0 Security
  • 3.
    Danah Boyd Privacy = Control
  • 4.
    Anil Dash One ofthe biggest benefits of that reality is that I now have control. The information I choose to reveal... Granted, I'll never have total control. But look at most people who are concerned with privacy. They're fighting a losing battle, trying to prevent their personal information from being available on the web at all. If you recognize that it's going to happen, your best bet is to choose how, when, and where it shows up.
  • 5.
  • 9.
    Facts ★ 50% ofsecurity breaches have come from federal/state government (since 2005) ★ Spear Phishing US Government email resulted 74,000 compromised computers ★ State actors -- Google v China -- East Europe Mafia
  • 10.
    Top Problems ★ SocialEngineering ★ Spear Phishing ★ Updates ★ Passwords ★ Identity Theft
  • 11.
    OBE -- (nottop problems) ★ Anti-Virus ★ Identity Theft ★ Passwords (kinda)
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
    Passwords Strong Password Definition, Requirements and Guidelines •A strong password is a password that meets the following guidelines: •Be 7 or 14 characters long. •Contain both uppercase and lowercase letters. •Contain numbers. •Contain symbols, such as ` ! " ? $ ? % ^ & * ( ) _ - + = { [ } ] : ; @ ' ~ # | < , > . ? / •Contain a symbol in the second, third, fourth, fifth or sixth position (due to the way in which encryption works). •Not resemble any of your previous passwords. •Not be your name, your friend's or family member's name, or your login. •Not be a dictionary word or common name.
  • 21.
    OAuth Facebook Connect
  • 22.
  • 23.
  • 24.
    Steven Mandzik Director ofGreen IT, Navstar Inc. Steve@acleanlife.org twitter: robotchampion www.acleanlife.org --- www.stevenmandzik.com