cyber security awareness month security.nsu

25
Cyber Cyber Security Security Awareness Awareness Month Month http://security.nsu.edu

Upload: urbano

Post on 10-Jan-2016

71 views

Category:

Documents


1 download

DESCRIPTION

Cyber Security Awareness Month http://security.nsu.edu. Cyber Security Awareness: Updates. Update your OS Operating Systems are not perfect. As they get older, vulnerabilities and errors are found and exploited. Updates are intended to fix these. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Cyber Security Awareness Month security.nsu

Cyber Security Cyber Security Awareness MonthAwareness Month

http://security.nsu.edu

Page 2: Cyber Security Awareness Month security.nsu

Cyber Security Awareness:Cyber Security Awareness:UpdatesUpdates

Update your OSOperating Systems are not perfect. As they get older, vulnerabilities and errors are found and exploited.Updates are intended to fix these.Windows has a built in feature called Automatic Updates. Enabling it will ensure your system stays up to date.http://windowsupdate.microsoft.com

Update all other SoftwareMicrosoft Office can be updated online.Most other third party applications contain a way to update them. Many are automated.

Page 3: Cyber Security Awareness Month security.nsu

Cyber Security Awareness:Cyber Security Awareness:FirewallFirewall

Windows has a built in Firewall.Firewalls prevent unauthorized traffic from entering the computer

Example: PCs can be remotely controlled. A firewall can prevent remote users from doing this

Verify the Windows Firewall is enabledEnabled by default in service pack 2 and above

There are third party firewalls availableZoneAlarm

Free for personal usehttp://www.zonelabs.com

Hardware based firewalls can be incorporated into routersUsed predominantly with home networks

Only use one OS Firewall at a time

Page 4: Cyber Security Awareness Month security.nsu

Cyber Security Awareness:Cyber Security Awareness:Anti-VirusAnti-Virus

Virus is a term that is used to refer to malicious software. In reality, it is one of many types of software that has malicious intent (malware).

VirusesWormsTrojan HorsesKey-loggersetc…

CanDestroy dataCause hardware failuresend sensitive information to othersetc…

Page 5: Cyber Security Awareness Month security.nsu

Cyber Security Awareness:Cyber Security Awareness:Anti-VirusAnti-Virus

Protect your PC by installing an Anti-Virus programUpdate it daily, automatically if possible.Scan your PC on a regular basis. If possible, setup automatic scanning.Although it is possible, it is not recommended to use multiple AV programs on the same PC at the same time.Some Manufacturers will include AV software in a suite that provides other protection

Example: Norton’s Internet Security includes:FirewallSpam filterParental Controls

Page 6: Cyber Security Awareness Month security.nsu

Cyber Security Awareness:Cyber Security Awareness:Anti-VirusAnti-Virus

AvailableFree

AVGFree for personal usehttp://free.grisoft.com

AvastFree for Personal usehttp://www.avast.com

Nominal FeeMcAfee

Can be purchased as part of a security suite Http://www.mcafee.com

NortonCan be purchased as part of a security suitehttp://www.symantec.com

Page 7: Cyber Security Awareness Month security.nsu

Cyber Security Awareness:Cyber Security Awareness:Anti-SpywareAnti-Spyware

Spyware is another type of Malware. The main purpose behind Spyware is to monitor your activities and transmit them to a third party, usually, without your consent.

Example: Popup Ads

Spyware is generally installed via malicious or hacked web sites, but, it is possible to get spyware the same way as a virus.

Example: Cool Web Search Toolbar

Page 8: Cyber Security Awareness Month security.nsu

Cyber Security Awareness:Cyber Security Awareness:Anti-SpywareAnti-Spyware

Install an Anti-Spyware Program.In most cases, more than one can be used.Keep it up to date. Automatic updating is available in some.Scan your PC on a regular basis. If possible, setup automatic scanning.Micorsoft provides an Anti-Spyware program called Windows Defender. It is currently in Beta, which means it is still being tested, but available to general public without warranty.

Updated via Automatic Updateshttp://www.microsoft.com/athome/security/spyware/software/default.mspx

Page 9: Cyber Security Awareness Month security.nsu

Cyber Security Awareness:Cyber Security Awareness:Anti-SpywareAnti-Spyware

There are many free third party Anti-Spyware programs available. (Be careful though, some spyware programs are actually spyware.)

Spybot Search and DestroyFreehttp://www.safer-networking.org/

Lavasoft’s Ad-AwareFree for Personal Usehttp://www.lavasoft.com

SpywareBlasterFreePrevents Spyware from being installed.http://www.javacoolsoftware.com/spywareblaster.html

Page 10: Cyber Security Awareness Month security.nsu

Cyber Security Awareness:Cyber Security Awareness:PasswordsPasswords

Passwords:Minimum of 8 characters (more like 17)

Combination at least three of upper and lower case letters, numbers, and symbols

P@55w0r|) spells “Password” (Example only!)

Use of Passphrase

Do not write it down

Do not use personal information

Do not use the same password for everything

Don’t use the same password with a minor change

Page 11: Cyber Security Awareness Month security.nsu

Cyber Security Awareness: Cyber Security Awareness: Lock-it or LogoutLock-it or Logout

When leaving your computer:Lock your PC when you leave it

CTRL+ALT+DEL, then click “Lock Computer”

Quick lock with Windows+L keys

Set a screensaver with password protection

Logout

Shutdown

Page 12: Cyber Security Awareness Month security.nsu

Cyber Security Awareness: Cyber Security Awareness: Lock-it or Logout: Windows KeyLock-it or Logout: Windows Key

Page 13: Cyber Security Awareness Month security.nsu

Cyber Security Awareness:Cyber Security Awareness:AccountsAccounts

Windows has two administrator accounts for users when installed.

Set strong passwords for bothOnly use admin accounts for admin tasks like installing software or making operating system changes

Create user accounts for all usersThis adds privacy and security to individual’s dataPrevents unauthorized users from installing software or changing the operating system

When online, some sites will attempt to install software, some of it is malicious in nature

Disable the Guest accountThis is the default state for newer operating system, so verify

Page 14: Cyber Security Awareness Month security.nsu

Cyber Security Awareness: Cyber Security Awareness: BrowsingBrowsing

Use care!!!!

Don’t Misspell or mistype

Watch for RedirectionCheck location or address bar

Enter URL manually

Disable/block pop-ups.

Page 15: Cyber Security Awareness Month security.nsu

Cyber Security Awareness: Cyber Security Awareness: EmailEmail

Don’t Get PhishedIgnore Unknown authors

Use caution with attachments

Avoid sending personal info

Do not click links for banking institutions

Contact them in person or by telephone using a published #

Page 16: Cyber Security Awareness Month security.nsu

Cyber Security Awareness: Cyber Security Awareness: EmailEmail

Don’t Get Phishedhttp://security.nsu.edu/antiphishing/index.html

Take the

Anti-Phishing

Phil

Challenge

Page 17: Cyber Security Awareness Month security.nsu

Cyber Security Awareness: Cyber Security Awareness: Social EngineeringSocial Engineering

People are the weakest link We want to help, trust, fear of doing wrong

The most predominant way data is compromised

Ever get the 6th sense? Or rather, ever listened to it?

Watch out for phishing, dumpster divers, people that impersonate others.

For more information on what to look for and how to protect yourself, go to http://security.nsu.edu

Page 18: Cyber Security Awareness Month security.nsu

Cyber Security Awareness: Cyber Security Awareness: WirelessWireless

Wireless homeUse encryption:

Changes the format of the data between the access point and your PCWEP: Wired Equivalent Privacy (insecure)WPA: Wi-Fi Protected Access

Uses a passphrase/pre-shared keyWPA2

Use preferred networksThose that you setup or know who owns them (NSUWIFI)

Use access points, not PC to PC communication (ad hoc)Public access points allow anyone to connect, which means anyone can see what you are sendingDisable your wireless network adapter when not in useUsing another persons access point without their consent is illegal

Page 19: Cyber Security Awareness Month security.nsu

Cyber Security Awareness: Cyber Security Awareness: WirelessWireless

BluetoothDesigned for short wireless communications over short distancesBluesnarfing:

Acquiring phonebooks, pictures, calendarParis Hilton’s phone was cracked

Bluetracking:Tracking your movement based on the unique address of the device

Bluebugging:Send commands to a bluetooth deviceMake it call you which means an attacker could be listening

Bluetooth sniper rifleHow To: Building a BlueSniper Rifle

Page 20: Cyber Security Awareness Month security.nsu

Cyber Security Awareness: Cyber Security Awareness: WirelessWireless

Page 21: Cyber Security Awareness Month security.nsu

Cyber Security Awareness: Cyber Security Awareness: Parental ControlsParental Controls

Parental Controls allow parents to control what their children do online.

Block web sites, chat, pop-upsAllows you to monitor activity

Web sites visitedKeyloggers

A few that get decent ratings and are a nominal fee:CyberPatrol (Appears to be the highest rated overall)

http://www.cyberpatrol.com/CYBERsitter

http://www.cybersitter.com/NetNanny

http://www.netnanny.com

Page 22: Cyber Security Awareness Month security.nsu

Cyber Security Awareness: Cyber Security Awareness: Added-OnsAdded-Ons

Many Web sites or files require additional software to be installed in order to view.

These viewers are usually free and easily accessible.Adobe Acrobat Reader is needed to view PDF documents.Windows Media Player or QuickTime may be required to watch certain videos or listen to music

Other sites may have programs that will improve your computing experienceFirefox is another popular web browserGoogle Toolbar will prevent pop-ups in Internet Explorer while providing a quick way to search the internet.

To get these, go directly to the manufacturer’s site.Acrobat Reader is available from AdobeThe latest version of Windows Media Player is available through MicrosoftQuickTime is available through Apple

If not sure, research the program. If still not sure, don’t install.

Page 23: Cyber Security Awareness Month security.nsu

Cyber Security Awareness: Cyber Security Awareness: BackupBackup

Backup your data regularlyWindows has a built in backup utility.

Backup programs with automation are available.

Simple methods include:Burning specific files to CD.

Copying them to flash (USB) drives or memory cards.

Copy the data to another computer

Fee based subscriptions are available online.

Floppy Disks are too small for most data.

Page 24: Cyber Security Awareness Month security.nsu

Cyber Security Awareness: Cyber Security Awareness: Further InfoFurther Info

See http://security.nsu.edu for links:Credit report info

Symantec Security Check

National organizations’ guides and standards

National Do Not Call Registry

Other very useful information

Page 25: Cyber Security Awareness Month security.nsu

Cyber Security Awareness: Cyber Security Awareness: Your Security TeamYour Security Team

Andrea Di FabioInformation Security Officer

[email protected]

Ronald KingSecurity [email protected]