cyber security. security – it’s about layers there’s no one stop solution to protection each...

21
Cyber Security

Upload: jade-moody

Post on 29-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

Cyber Security

Security – It’s About Layers

• There’s no one stop solution to protection

• Each layer you add, an additional tool will be needed to pierce the layer

• We’ll show you some common vulnerabilities and the tools to layer up with

Wi-Fi Vulnerability

• 3 Main Tips for securing Wi-Fi at home

– Hide Your Network SSID

– Strong Password

– Device Filtering

Wifi Tip 1 – Ninja Mode ON

• Why should you hide your network name?

• How do you hide your network name?

• How will you connect to it if you can’t see it?

Wifi Tip 2 – A Herculean Password

• Why are complex passwords important?

• How do I go about creating a strong, complex password?

• How can you remember these easily and have different ones for each website you use?

• https://www.microsoft.com/security/pc-security/password-checker.aspx

Wifi Tip 3 – Ask for ID

• Why should you limit the devices allowed on your network?

• How can you set this up at home?

• Where will I find the “MAC” address for a device?

Hardware & Software Firewalls

• What is a firewall, and why use one?

• What’s a hardware firewall?

• What’s a software firewall?

Types of Threats

In the News

• Maybe current events that can catch their attention???

• http://www.insideedition.com/videos/1693-miss-teen-usa-reacts-to-cyber-crime

Why is Cyber Security important?

• Direct Observation

• Interception of Data Transmission

• Electromagnetic Interception

Direct Observation-

• Requires that an individual be close enough to the information to breach confidentiality.

Such as Shoulder Surfing

Interception of Data Transmission

• Attackers can access the media transmitting the data, they needn’t be anywhere near the source of the information.

Such as Sniffers or tapping into your wireless network and keylogging

Electromagnetic Interception

• Electricity moving through cables emits electromagnetic signals ( EM).

• It is possible to eavesdrop on these signals and therefore determine the data carried on the cables without actually tapping into them.

For example, Scientists have determined that certain devices with LED displays actually emit information encoded in the light that pulses in these LEDs.

Securing Mobile Devices

• Don’t leave a laptop in an unlocked vehicle, even if the vehicle is in your driveway or garage, and never leave it in plain sight, even if the vehicle is locked— that’s just invit-ing trouble. If you must leave your laptop in a vehicle, the best place is in a locked trunk. If you don’t have a trunk, cover it up and lock the doors.

Securing Mobile Devices

• Parking garages are likely areas for thefts from vehicles, as they provide numerous choices and cover for thieves. Again, never leave your laptop in plain sight; cover it or put it in the trunk.

• Do be aware of the damage extreme temperatures can cause to computers.

Securing Mobile Devices

• Carry your laptop in a nondescript carrying case, briefcase, or bag when moving about. Placing it in a case designed for computers is an immediate alert to thieves that you have a laptop.

• Never leave your mobile device unattended.

Securing Mobile Devices

• Apply distinctive paint markings to make your laptop unique and easily identifiable. Liquid white- out is a good substance to apply.

• Be aware that if your computer is stolen, automatic logins can make it easy for a thief to send inappropriate messages with your account.

Securing Mobile Devices

• Consider purchasing one of the new theft alarm systems specially made for laptops.

• Back up your information on disks today, and store the disks at home or the office.

• Install and update antivirus and firewall software.

• Password protect your screensaver • Make sure your laptop is up to date with

patches

Securing Mobile Devices

•Disable auto complete and password memory. •Disable sharing of laptop services. •Disable guest account and rename the administrator account.

Stop tags are small devices that are placed on the back of the LCD screen of your laptop. If this device is ever removed, it releases a chemical that will render the LCD unusable. It will also acid etch the words “Stolen Property” into the back plastics of the laptop. For more information visit: http://www.stoptheft.com.

Computrace is a radio frequency beacon that is placed internally within you laptop. If the laptop is stolen the company can remotely turn on this beacon. If the laptop is connected to any network for a given period of time the company is then able to track your laptop and help you recover it. If the laptop can not be found the company will refund you up to $1,000 for your loss.