securing your cyberspace_watson
DESCRIPTION
National Cyber Security Awareness MonthTRANSCRIPT
![Page 1: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/1.jpg)
Securing Your
Cyberspace
Patricia Watson
National Cyber Security Awareness Month
10.2013
![Page 2: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/2.jpg)
What we will cover… • In cyberspace…ignorance is NOT bliss!
• Welcome to the new era of “involuntary transparency”
• Do you manage your internet footprint?
• Do you know what your kids are browsing?
• Appendix - Resources
National
Cyber
Security
Awareness
Month
![Page 3: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/3.jpg)
Ignorance is NOT bliss!
• Myth…
– I don’t have anything to hide
– I don’t have anything of value
– Hackers are not interested in hacking my home PC
![Page 4: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/4.jpg)
• Cyber adversaries are looking for the easy targets!
• They are not necessarily targeting YOU – they mostly want financial and PII (in masses)
• And free WIFI, hardware and bandwidth (zombies)
The fact is…
![Page 5: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/5.jpg)
Level 3
Maturing & Refining
Level 1
Flawed Integration
Cyber Security Levels
Level 4
Continuously
Verified
Level 2
Inconsistent
Practices
Risk = High Risk = Low
Default
settings,
dated
systems,
no
firewall,
weak
passwords
Use of
firewall,
some
patching,
strong
passwords
Firewalls
strong
passwords
security
patches &
AV scans
Firewalls,
separate
networks &
accounts,
automated
security
patches & AV
scans,
awareness!
![Page 6: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/6.jpg)
• Use a firewall – software/hardware.
• Password protect your WIFI, never use the default credentials.
• Check the default security settings on your devices.
• Automate security patches.
• Automate signature updates for anti-virus software.
• Plug & Scan: all USB devices, email attachments and downloadable files should be checked for viruses.
• Be diligent – Stop.Think.Connect!
Don’t be a gummy bear!
![Page 7: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/7.jpg)
• When you are connected to the internet, the internet is connected to YOU!
• What is the internet saying about YOU?
• Is your mobile device tracking your every move?
• Is your browser broadcasting your interests?
• Are your “friends” over-sharing your information?
Welcome to the new era of
involuntary transparency!
![Page 8: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/8.jpg)
Social Media Etiquette…
![Page 9: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/9.jpg)
Do you manage your
Internet footprint?
• Everything you post on the internet is
PUBLIC…there is NO privacy in cyberspace!
• Once you hit the upload, share, tweet or
send button, you have no control regarding
the destiny of that “post“
• The Internet is not the place to broadcast
your grievances about your friends or foes
• Don’t post embarrassing information that
would be awkward to explain to relatives,
friends and current/future employers
![Page 10: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/10.jpg)
• Take the time to manage the privacy settings for your accounts?
• Don’t advertise your travel plans on Facebook or other social media
• Remove all metadata from files BEFORE sharing
• Never use the same user name & password for all accounts
OMG R U #sharing TMI?
![Page 11: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/11.jpg)
• Do you know your “friends”?
• Don’t feel obligated to “Like”,
“Friend” or “Follow” profiles
of people you don’t actually
know!
• What is the purpose of your
social media account?
– Work
– Family & Friends
– News & Trends
Do you manage your
Internet footprint?
![Page 12: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/12.jpg)
![Page 13: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/13.jpg)
• Use separate login accounts for each user – apply concept of least privilege.
• Manage internet access on all devices!
• If your kids use social media, be sure to “friend” &/or “follow” them.
• Take off your technology blinders - stay stay current with the latest cyber trends & threats…awareness is key!
Do you Know what your
kids are browsing?
![Page 14: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/14.jpg)
“…the upside of painful
knowledge is so much greater
than the downside of blissful
ignorance” (Sheryl Sandberg)
![Page 15: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/15.jpg)
Questions?
National
Cyber
Security
Awareness
Month
![Page 16: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/16.jpg)
• Firewalls
• Social media tips
• Location Service GPS settings
• Separate user accounts
• For your viewing enjoyment…
Appendix: Resources
![Page 17: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/17.jpg)
Firewall - a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
• Hardware Firewall – Apple AirPort Extreme: http://www.apple.com/airport-extreme/specs/
– Short Video – How to set up the new AirPort Extreme: http://sharepoint.bc.com/sites/Corp/ComputerSecurity/Whitepapersandreferencematerial/Forms/AllItems.aspx
– Anti Virus Software – Intego VirusBarrier (Windows friendly): http://www.intego.com/virusbarrier
• Software Firewall (it’s free) – ZoneAlarm: http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm
– Configuring ZoneAlarm at home: http://hdc.tamu.edu/Security/Firewalls/Personal_Firewalls/Configuring_ZoneAlarm_Firewall__Free_Version_.php
Firewalls
![Page 18: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/18.jpg)
• Depending on the purpose of your social media
account, you don’t need to provide all your personal information – tailor the account to your needs, including privacy settings.
• Remove all metadata from pictures before sharing, especially if you are posting while traveling.
• There’s an App for that! Yes, most social media providers have an App for mobile phones and tablets. Be sure to manage the privacy, notifications and location services settings to avoid oversharing.
• Remember, posts on social media are intended to be a “short status” not a detailed diary, keep it short, sweet and to the point.
• If you want to share links to other websites via your social media account, use a reputable URL shortening service such as Bitly.
• Stop.Think.Post – Remember, once you hit the upload, share, tweet or send button, you have no control regarding the destiny of that “post“!
Social Media Tips
![Page 19: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/19.jpg)
Location Services allows location-based apps and websites (including Maps, Camera, Safari, and other Apple and third-party apps) to use information from cellular, WIFI, Global Positioning System (GPS)2 networks, and iBeacons3 to determine your approximate location.
While this tool serves a good purpose, unfortunately it has unintended consequences:
• Adversaries can use it to track your every move
• Companies use it to craft their marketing campaigns based on your whereabouts
• Not to mention, big brother is always watching/tracking!
Be sure to take the time to manage your security settings on your mobile device.
Location Services
![Page 20: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/20.jpg)
Given that almost every action we take in cyberspace is tracked, interconnected, or transmitted, it is good practice to keep separate user and login accounts (based on purpose or ownership):
• Create separate user accounts (user name & password) if you share devices that connect to the internet with other members of your household
• Create separate login accounts (user name & password) for browsers (Mozilla, Chrome, IE) and applications (iTunes, Facebook, etc.)
• Apply the principle of least privilege to all accounts and keep them separate from your Administrator account!
• NEVER use the same password for multiple accounts & change your password often!
User Accounts
![Page 21: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/21.jpg)
• Short Film – The Dawn of the Net: http://www.youtube.com/watch?v=RhvKm0RdUY0&feature=youtu.be
• Video – 10 top time-saving tech tips by David Pogue: https://www.youtube.com/watch?v=QoT0-2vu9m4&feature=youtu.be
• Video – History of computer viruses: http://www.youtube.com/watch?v=1g1yZVWrbtE#!
• Video – Cracking Stuxnet, a 21st Century Cyber Weapon: http://www.ted.com/talks/ralph_langner_cracking_stuxnet_a_21st_century_cyberweapon.html
• Funny Video - #Hashtag with Jimmy Fallon & Justin Timberlake: https://www.youtube.com/watch?v=57dzaMaouXA
For your viewing enjoyment…
![Page 22: Securing your cyberspace_Watson](https://reader034.vdocuments.mx/reader034/viewer/2022051817/547bb1a0b4af9fc9158b4f2d/html5/thumbnails/22.jpg)
Geek humor :)