SlideShare a Scribd company logo
1 of 105
4/1/11 Barry Wilson/Scott McNulty – Wharton Computing 4/1/11 Techfast: Security – Not just for banks
Who Are We?And what do we do? 2 Wharton Computing
Two quotes from experts 3 As head of security it is my duty to be... concerned. - Worf, USS Enterprise By failing to prepare, you are preparing to fail. 	 - B. Franklin, local celebrity Wharton Computing 4/1/11
The Internet is out to get you (only a little) 4 Wharton Computing 4/1/11
Password Rules of Thumb WHARTON COMPUTING 5
No sharing passwords between accounts 4/1/11 WHARTON COMPUTING 6
One password to spoil them all 7 Wharton Computing 4/1/11
No short passwords 4/1/11 Wharton Computing 8
No Dictionary Words 4/1/11 WHARTON COMPUTING 9
No personal information 4/1/11 WHARTON COMPUTING 10
Passphrases: exception to the rules 11 Wharton Computing 4/1/11 Very long Easy to remember Hard to crack
Example passphrase My, aren’t members of Wharton Computing good looking?  4/1/11 WHARTON COMPUTING 12
How Secure is your password? 4/1/11 13 http://howsecureismypassword.net Wharton Computing
How long will it take to crack these passwords: 14 Wharton Computing 4/1/11
password 15 Wharton Computing
Instantly 4/1/11 16 Wharton Computing
Other common passwords 4/1/11 Wharton Computing 17
Password Cracking 101 WHARTON COMPUTING 18
Dictionary Attacks 4/1/11 Wharton Computing 19 http://mtyourmind.10001mb.com/2009/0127/
Rainbow Table 4/1/11 WHARTON COMPUTING 20 http://www.elsingadesign.com/
Brute Force attacks 4/1/11 Wharton Computing 21 http://ryan.skow.org/siege/Fields2002/SaturdayBattleReport.html
Social engineering 4/1/11 WHARTON COMPUTING 22 http://news.bbc.co.uk/2/hi/technology/3639679.stm
Password Tip 1 o = 0 4/1/11 Wharton Computing 23
Password Tip 2 cAmelCaSe 4/1/11 Wharton Computing 24
passW0rd 25 Wharton Computing
10 Days 4/1/11 26 Wharton Computing
Password Tip 3 $pec!@l Ch@r@cter$ 4/1/11 WHARTON coMPUTING 27
p055W0rD! 28 Wharton Computing
9 Years 4/1/11 29 Wharton Computing
My, aren’t members of Wharton Computing good looking?  30 Wharton Computing
560 tresvigintillion years 4/1/11 31 Wharton Computing
Managing your passwords the old way 32 Wharton Computing 4/1/11
169 days 4/1/11 33 Wharton Computing
Managing your passwords the old way 34 Wharton Computing 4/1/11
Managing your passwords the secure way 35 Password Safe http://passwordsafe.sourceforge.net/ 1Password http://agilewebsolutions.com/onepassword/ Wharton Computing 4/1/11
Phishing 36 Wharton Computing
As defined by the OED 4/1/11 WHARTON COMPUTING 37
Tips for identifying a phishing email 38 Wharton Computing 4/1/11
Phishing - browser address bar 39 Wharton Computing 4/1/11
Phishing - browser address bar 40 Wharton Computing 4/1/11
Phishing - browser address bar - SSL 41 Wharton Computing 4/1/11
Phishing - browser address bar - SSL 42 Wharton Computing 4/1/11
Phishing – Poor wording 43 Wharton Computing 4/1/11
Phishing – Check the sender 44 From: Usman Bagudu <Usman.Bagudu@pet.hw.ac.uk> Wharton Computing 4/1/11
Phishing – asks for your password 4/1/11 WHARTON COMPUTING 45
Phishing email or not? 4/1/11 WHARTON COMPUTING 46
Phishing email or not? 4/1/11 WHARTON COMPUTING 47 Undisclosed recipients PHISHING! Not a Penn Web site. Not a real group @ Penn
When in doubt: ask 4/1/11 WHARTON COMPUTING 48
Defending against Phishing 4/1/11 WHARTON COMPUTING 49
Defending against Phishing 4/1/11 WHARTON COMPUTING 50
Defending against Phishing 4/1/11 WHARTON COMPUTING 51
What to do if you respond to a phishing email 52 http://mantia.me/wallpaper/dont-panic/ Wharton Computing 4/1/11
Tell Someone 53 Wharton Computing 4/1/11
Change your passwords 54 Wharton Computing 4/1/11
Review Statements 55 Wharton Computing 4/1/11
Contact the authorities Wharton: security@wharton.upenn.edu FTC: 1-877-ID-THEFT or  https://www.ftccomplaintassistant.gov/ Police Credit Card issuers: Setup a fraud alert 56 Wharton Computing 4/1/11
Home Computers 57 Wharton Computing
Avoid: no-name anti-virus 58 Image credit: Complete Computer Repair of CT (http://tinyurl.com/272uvla) Wharton Computing 4/1/11
Avoid: downloading © material 59 Wharton Computing 4/1/11
Forewarned is Forearmed. 60 Wharton Computing
Automatic Software Updates 61 Wharton Computing 4/1/11
Software Updates – 3rd Party Software 62 Wharton Computing 4/1/11
Install Antivirus software 63 http://www.upenn.edu/computing/virus/ Wharton Computing 4/1/11
Install Antivirus software 64 Wharton Computing 4/1/11
Firewall 65 Credit: Stuck in Customs http://www.flickr.com/photos/stuckincustoms/1194563275/in/photostream/ Wharton Computing 4/1/11
Firewall – Windows 7 4/1/11 WHARTON COMPUTING 66
Firewall – Windows 7 4/1/11 WHARTON COMPUTING 67
Firewall – Windows 7 4/1/11 WHARTON COMPUTING 68
Firewall – OS X 4/1/11 WHARTON COMPUTING 69
Firewall – OS X 4/1/11 WHARTON COMPUTING 70
Firewall – OS X 4/1/11 WHARTON COMPUTING 71
Home computers: Ideal vs. Reality 72 Wharton Computing 4/1/11
Home computers: Ideal Dedicated computer: Only you use your computer. Password protected. 73 Wharton Computing 4/1/11
Home computers: Practical Multiple accounts: Each user has their own individual account. VPN. Don’t store work files on home computer. 74 Wharton Computing 4/1/11
Mobile devices 75 Wharton Computing 4/1/11
Mobile devices: set a password 76 Wharton Computing 4/1/11
Mobile devices: remote wipe 77 Wharton Computing 4/1/11
Mobile devices: encryption 78 Wharton Computing 4/1/11
IPAD DEMO Wharton Computing 79
Confidential Data WHARTON COMPUTING 80
Nobody wants this 81 Wharton Computing 4/1/11
Or this… 82 Wharton Computing 4/1/11
Or this! 4/1/11 WHARTON COMPUTING 83
Confidential Data – What is it? 84 Wharton Computing 4/1/11
Legally Protected As defined by the government. SSNs Credit Card Data Bank Account information Medical data Student enrollment data (anything defined in FERPA) 85 Wharton Computing 4/1/11
University Protected As defined by the University All the legally protected info + Salary information Tax and payroll information Data we have agreed to keep confidential:  ,[object Object],86 Wharton Computing 4/1/11
University Policy “This policy establishes expectations around the use of SSNs - sensitive data whose misuse poses privacy risks to individuals, and compliance and reputational risks to the University. It calls on staff, faculty, contractors, and agents of the above to inventory their online and offline SSNs and reduce the above risks by, in priority order: (1) eliminating this data altogether, (2) converting it to PennID, (3) truncating the data to capture and display only the last four digits, (4) when the complete SSN is clearly necessary, ensuring strict security controls to protect the full data.” 87 Wharton Computing 4/1/11
University Policy - Summary Four easy things to do: Eliminate Convert (to PennID) Truncate Secure 88 Wharton Computing 4/1/11
Identity Finder 4/1/11 WHARTON COMPUTING 89
Why Identity Finder? Cross platform Centrally managed Best in class software 4/1/11 WHARTON COMPUTING 90
Identity Finder 91 Wharton Computing 4/1/11
Shredding files 4/1/11 WHARTON COMPUTING 92
Identity Finder Management Console 4/1/11 WHARTON COMPUTING 93
Identity Finder Management Console 4/1/11 WHARTON COMPUTING 94
IMPORTANT None of your data is transmitted/stored on the Identity Finder Management server Only location/general type of found data is transmitted (securely) No data will be deleted from your computer by Wharton Computing without your consent 4/1/11 WHARTON COMPUTING 95
How “dangerous” is your confidential data? 3 questions to help gauge your risk How much do you have? Who does it include? What else is stored with it? 96 Wharton Computing 4/1/11
How do youmanageit? Know what you have Keep it separated Make sure it is secure 97 Wharton Computing 4/1/11
Securingyourconfidential data Store it on a central server Back it up Encrypt it 98 Wharton Computing 4/1/11
Securingyourconfidential data Never let anyone log in as you. Don’t allow workstudies to use a computer that contains confidential data 99 Wharton Computing 4/1/11
Hacking happens WHARTON COMPUTING 100
The Process 101 Wharton Computing 4/1/11
Questions? 102 Wharton Computing
http://beacon.wharton.upenn.edu/security/techfast WHARTON COMPUTING 103 4/1/11
Contact us 104 Barry Wilson Chief Security Officer wilsonbf@wharton.upenn.edu Scott McNulty	 Sr. IT Project Leader smcnulty@wharton.upenn.edu security@wharton.upenn.edu http://beacon.wharton.upenn.edu/security Wharton Computing 4/1/11
Tell us what you think! Tech-fast@wharton.upenn.edu 4/1/11 WHARTON COMPUTING 105

More Related Content

Similar to Wharton Computing Techfast: Security

5 things it should be doing (but isn't!)
5 things it should be doing (but isn't!)5 things it should be doing (but isn't!)
5 things it should be doing (but isn't!)Mike Egli
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxmccormicknadine86
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxsleeperharwell
 
Blueprint for Security Architecture & Strategy.pdf
Blueprint for Security Architecture & Strategy.pdfBlueprint for Security Architecture & Strategy.pdf
Blueprint for Security Architecture & Strategy.pdfFetri Miftach
 
How to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorHow to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorJeremiah Grossman
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018Fizaril Amzari Omar
 

Similar to Wharton Computing Techfast: Security (9)

5 things it should be doing (but isn't!)
5 things it should be doing (but isn't!)5 things it should be doing (but isn't!)
5 things it should be doing (but isn't!)
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
Blueprint for Security Architecture & Strategy.pdf
Blueprint for Security Architecture & Strategy.pdfBlueprint for Security Architecture & Strategy.pdf
Blueprint for Security Architecture & Strategy.pdf
 
How to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorHow to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare Sector
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
 
E-Notice and E-Filing Tips
E-Notice and E-Filing TipsE-Notice and E-Filing Tips
E-Notice and E-Filing Tips
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Wharton Computing Techfast: Security

Editor's Notes

  1. phishing |ˈfi sh i ng |nounthe activity of defrauding an online account holder of financial information by posing as a legitimate company
  2. VPN: Sentinal.wharton.upenn.edu