Better Safe Than Sorry
|
|
- Muriel Parks
- 8 years ago
- Views:
Transcription
1 Better Safe Than Sorry Security and OS X patrik@jerneheim.se
2 SECURITY An Unexpectedly long Journey
3 Agenda Threats Protection Configurations Best Practices?
4 Let s talk security
5 Distrust and causion are the parents of security Benjamin Franklin
6 Then No viruses No malware Secure by design and of course very cool
7 Once the market share starts growing, then There are definitively viruses for Mac out there Well, don t be stupid Windows users are more aware of security, i.e. more secure I have friends who knows how it s done You absolutely need anti-virus protection on Mac
8 Now Gatekeeper Application Sandboxing Malware Detection Full Disk Encryption
9 Apple Security Device Security Platform Security Data Security Network Security
10 Apple Security Philosophy Ease of use Guide the users Secure defaults Freedom to choose
11 In the Hacker Toolbox the quieter you become, the more you are able to hear
12 A hacker to me is someone creative who does wonderful things Sir Tim Berners-Lee
13 Who s the Hacker? Hacking for fun Hacking for profit Governments
14 Tools of the trade nmap Wireshark Cain & Able John the Ripper Metasploit metasploit
15 Demo Playing with fire
16 Device Security Securing the box
17 Amateurs hack systems, professionals hack people Bruce Schneier
18 Device Security EFI firmware password icloud locking Configuration profiles Policy management
19 Firmware Password UI tool on the Recovery HD
20 Firmware Password UI tool on the Recovery HD Prevents modifier keys setregproptool -m full What if you forget it?!
21 icloud Locking icloud / Find My iphone Can only use 4 digit code Survives reboot / reset pram
22 icloud Locking icloud / Find My iphone Can only use 4 digit code Survives reboot / reset pram but is it secure?
23 Demo Setting a Firmware Password
24 Platform Security Securing the processes
25 People who are serious bout software should make their own hardware Alan Kay
26
27 Platform Security Application Sandboxing Code Signing Gatekeeper XProtect & Quarantine
28 Mandatory Access Control Application Sandboxing Entitlements sandbox-exec -n
29 openbsm Audit Logging above and beyond system events and user events praudit for reading audit trails
30 Demo Roll your own IDS
31 Data Security Securing the information
32 There is no castle so strong that it cannot be overthrown by money Cicero
33 Data Security Full Disk Encryption Keychain Access / icloud Keychain Encrypted Containers Secure Erase
34 FileVault 2 Rich Trouton has the full story derflounder.com
35 FileVault 2 Rich Trouton has the full story derflounder.com What about performance?! before
36 FileVault 2 Rich Trouton has the full story derflounder.com What about performance?! after
37 Encrypted Container Disk Utility or hdiutil 128 or 256-bit encryption Password in a keychain Password in an external keychain
38 Demo A poor mans 2-factor authentication
39 Network Security Securing the traffic
40 Users will take dancing pigs over security everytime Bruce Schneier
41
42 Network Security Encrypted traffic Encrypted authentication Firewalls
43 Firewalls Application Layer Simple UI setup Packet based IPv4 & IPv6 CLI or IceFloor 2
44 Demo Computer Lockdown, extraordinaire
45 Encryption Primer Talk is cheap, if unencrypted
46 Meet our friends Eve Alice Bob
47 Yes, it s apple123 Do you have the password? Clear text is not a secure way of transmitting secrets on a network
48 Yes, it s apple123 pwnd! Thank you! Clear text is not a secure way of transmitting secrets on a network
49 Yes, it s ******** Do you have the password? We really need to encrypt any secret information before it is sent
50 Yes, it s ********?? We really need to encrypt any secret information before it is sent
51 Yes, it s ********?? but, how do we share encryption keys without everyone on the network getting them?
52 Let s do DHX Do you have the password? Diffie Hellman Exchange
53 Here s (x1) Diffie Hellman Exchange Secret * p1 = x1!!
54 Here s (x1) OK, here s (x2) Diffie Hellman Exchange! Secret * p1 = x1 x1 * p2 =! x2!!
55 OK, here s x3 OK, here s (x2) Diffie Hellman Exchange! Secret * p1 = x1 x1! * p2 =! x2! x2 / p1 =! x3
56 OK, here s x3 $#*! Thanx! Diffie Hellman Exchange! Secret * p1 = x1 x1! * p2 =! x2 x2! / p1 =! x3 x3 / p2 = Secret
57 Crack the Code What is the password on the encrypted USB-stick?
58 Diffie Hellman Exchange lite Alice first send x1 = to Bob Bob send x2 = back to Alice Alice then send x3 = back to Bob x1 = secret * p1 x2 = x1 * p2 x3 = x2 / p1 x3 / p2 = secret
59 It can only be attributable to human error HAL 9000
60 Practice what you learn
61
62 Can you hack it? Setup with security in focus
63 Can you read the content in the PDF in the Shared folder?
64 Security Setup Firmware Password - setregproptool -m full FileVault2 Encrypted Secure Container bit encrypted Password stored in external keychain Encrypted PDF All passwords 22 characters
65 Dave, this conversation can serve no purpose anymore
66 Goodbye
Take Your Mac OS X Security to NSA Standards June 19, 2014 by Larry Chafin
Take Your Mac OS X Security to NSA Standards June 19, 2014 by Larry Chafin Forword While doing research for another article, I came across NSA s security setup for Mac OS X. No, the information gained
More informationGuidance End User Devices Security Guidance: Apple OS X 10.9
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform
More informationEnd User Devices Security Guidance: Apple OS X 10.10
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best
More informationAdministering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012
Administering FileVault 2 on OS X Lion with the Casper Suite Technical Paper July 2012 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that
More informationSecurely Yours LLC We secure your information world. www. SecurelyYoursllc.com
We secure your information world www. Mobile Security Features What are the new security features in Android KitKat 4.4 and IOS 7?. IOS Feature 1 Single Sign-on Previously available for multiple apps developed
More informationSecurely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
More informationOS X 10.6 SNOW LEOPARD: KEYCHAIN ACCESS MANAGING & UNDERSTANDING KEYCHAIN
OS X 10.6 SNOW LEOPARD: KEYCHAIN ACCESS MANAGING & UNDERSTANDING KEYCHAIN MANAGING KEYCHAINS Mac OS X features a sophisticated system that automatically protects all your authentication assets in encrypted
More informationUsing Mac OS X 10.7 Filevault with Centrify DirectControl
Using Mac OS X 10.7 Filevault with Centrify DirectControl August 2011, Revision 2 OS X 10.7's Filevault has the ability to encrypt the entire disk. Full Disk Encryption is compatible with Centrify Active
More informationCRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
More informationHow to Password Protect Files & Folders in Mac OS X with Disk Images
The best way to secure sensitive information from malware is to encrypt it. Encryption works by using a complex formula to securely scramble (or encrypt) individual files and folders, entire disks and
More informationMac Integration Basics 10.10 Adding a Mac to a Network That Uses Windows or Other Standards
Mac Integration Basics 10.10 Adding a Mac to a Network That Uses Windows or Other Standards COPYRIGHT Apple Inc. 2014 Apple Inc. All rights reserved. The Apple logo is a trademark of Apple Inc., registered
More informationHow To Harden Ancient Mac Xp On Mac Moonlight 2.5.2 (Mac) On A Macbook V.Xo (Apple) With A Hardening Mode On A Windows Xp 2.4.2.2 On A
OS X Hardening Mountain Lion 10.8 Version: 1.00 Date: 8/2/2013 Classification: Author(s): Public Florian Grunow, Matthias Luft, Michael Thumann, Michael Schaefer TABLE OF CONTENT 1 INTRODUCTION... 4 2
More informationSetup and Configuration Setup Assistant Migration Assistant System Preferences Configuration Profiles System Information
Yosemite 101+201: Apple Certified Technical Coordinator v10.10 Bootcamp (5 Days) Install OS X Yosemite About OS X Yosemite Installation Choices Before Upgrading a Previous System Preparing the System Disk
More informationWhy you need. McAfee. Multi Acess PARTNER SERVICES
Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices
More informationThe safer, easier way to help you pass any IT exams. Exam : 9L0-518. OS X Server Essentials 10.8 Exam. Title : Version : Demo 1 / 6
Exam : 9L0-518 Title : OS X Server Essentials 10.8 Exam Version : Demo 1 / 6 1.In Server app, which procedure will configure OS X Server to let members of a specific group use the Messages service? A.
More informationSecurity for Mac Computers in the Enterprise
Security for Mac Computers in the Enterprise October, 2012 Mountain Lion 10.8 Contents Introduction 3 Service and App Protection 4 Gatekeeper 4 Digital Signatures and Developer IDs 4 App Sandboxing 5 Mandatory
More informationA Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
More informationCOURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
More informationCertified Secure Computer User
Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the
More informationFrequently Asked Questions
Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous
More informationMac Integration Basics 10.9 Adding a Mac to a Windows or Other Standards-Based Network
Mac Integration Basics 10.9 Adding a Mac to a Windows or Other Standards-Based Network COPYRIGHT Apple Inc. 2013 Apple Inc. All rights reserved. The Apple logo is a trademark of Apple Inc., registered
More informationCSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security
Security+ Supported Labs - V1 Lab 1 Network Devices and Technologies - Capturing Network Using tcpdump to Capture Network with Wireshark with Network Miner 2 Secure Network Administration Principles -
More informationChapter 37. Secure Networks
Chapter 37 Network Security (Access Control, Encryption, Firewalls) Secure Networks Secure network is not an absolute term Need to define security policy for organization Network security policy cannot
More informationModern Trends in Apple Management. How I learned to stop worrying and love the App Store.
Modern Trends in Apple Management How I learned to stop worrying and love the App Store. Tycho's Bright Idea "... what and why to manage." Terms and Conditions THIS LEGAL AGREEMENT BETWEEN YOU AND KEVIN
More informationITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
More informationConfiguring Your Network s Security
Configuring Your Network s Security Security is an important issue when using a wireless home network. Because radio waves are used to transfer information between your networked computers, it's possible
More informationMac OS X Security Checklist:
Mac OS X Security Checklist: Implementing the Center for Internet Security Benchmark for OS X Recommendations for securing Mac OS X The Center for Internet Security (CIS) benchmark for OS X is widely regarded
More informationPCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00
PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)
More informationAdministering FileVault 2 on OS X Mavericks with the Casper Suite v9.2 or Later. Technical Paper October 2013
Administering FileVault 2 on OS X Mavericks with the Casper Suite v9.2 or Later Technical Paper October 2013 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all
More informationCompliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme
Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme avecto.com Contents Introduction to the scheme 2 Boundary firewalls and internet gateways 3 Secure configuration
More informationQuick Start Guide to Logging in to Online Banking
Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s
More informationMac OS VPN Set Up Guide
Mac OS VPN Set Up Guide If internet traffic is not being sent over the VPN then go to System Preferences- >Network and click on your VPN connection. Click the "Advanced..." button, and in the "Options"
More information10 steps to better secure your Mac laptop from physical data theft
10 steps to better secure your Mac laptop from physical data theft Executive summary: This paper describes changes Mac users can make to improve the physical security of their laptops, discussing the context
More informationCyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
More informationCHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
More informationSimple defence for your business
Simple defence for your business SECURITY Canon (UK) Ltd Woodhatch, Reigate Surrey RH2 8BF Telephone No: 08000 353535 Facsimile No: 01737 220022 www.canon.co.uk Canon Ireland Arena Road, Sandyford Industrial
More informationEnd User Devices Security Guidance: Apple ios 8
GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy
More informationMobile Device Security and Encryption Standard and Guidelines
Mobile Device Security and Encryption Standard and Guidelines University Mobile Computing and Device best practices are currently defined as follows: 1) The use of any sensitive or private data on mobile
More informationCertified Secure Computer User
Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The
More informationUsing TS-ACCESS for Remote Desktop Access
Using TS-ACCESS for Remote Desktop Access Introduction TS-ACCESS is a remote desktop access feature available to CUA faculty and staff who need to access administrative systems or other computing resources
More informationUse of EASE Code of Practice. This code of practice is also qualified by The University of Edinburgh computing regulations, found at:
Use of EASE Code of Practice Introduction This code of practice is intended to support the Information Security Policy of the University and should be read in conjunction with this document. http://www.ed.ac.uk/schools-departments/information-services/about/policiesandregulations/security-policies/security-policy
More informationONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS
$ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security
More informationGlobal VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
More informationHow to configure Mac OS X Server
How to configure Mac OS X Server By Rob Buckley In the previous article in this series, we showed you how to secure a Mac using the functions built into its operating system, OS X. See photo story here
More informationReboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive This guide explains how to create and use a Rescue USB flash drive to reinstall and recover the ExtraHop system. When booting
More informationABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
More informationReferences NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
More informationAdministrator's Guide
Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Restricting Features Available for Users...
More informationSection 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
More informationCyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
More informationensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
More informationUSER MANUAL DataLocker Enterprise
USER MANUAL DataLocker Enterprise ------------------------ March 2014 ------------------------ 1 Contents At a Glance Advanced 3 Introduction 17 Special features 5 About the Enterprise 19 Master admin
More informationCatapult PCI Compliance
Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult
More informationSTRONGER ONLINE SECURITY
STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial
More informationApplication Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
More informationOffice 365 Windows Intune Administration Guide
Chapter 7 Office 365 Windows Intune Administration Guide Office 365 is a suite of technologies delivered as a Software as a Service (SaaS) offering. Office 365 reduces the IT costs for businesses of any
More informationConfiguring the WT-4 for ftp (Ad-hoc Mode)
En Configuring the WT-4 for ftp (Ad-hoc Mode) Mac OS X Introduction This document provides basic instructions on configuring the WT-4 wireless transmitter and a Mac OS X (10.5.2) ftp server for transmission
More informationCreated By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
More informationEnterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationOS X Support Essentials 10.10 Exam Preparation Guide
OS X Support Essentials 10.10 Exam Preparation Guide Updated January 2015 1 Contents About This Guide... 3 Exam Details... 4 Recommended Exam Preparation... 4 Part One: Installation and Configuration...
More information2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
More informationFAQ - Frequently Asked Questions Sections of Questions
FAQ - Frequently Asked Questions Sections of Questions Bell Business Backup Service Installation & Setup Firewall Settings Connections & Backups Account Information Restoring Files Uninstalling the Bell
More informationNETWORK AND INTERNET SECURITY POLICY STATEMENT
TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB NETWORK AND INTERNET SECURITY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004
More informationUSER GUIDE: MaaS360 Services
USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document
More informationChapter 8: Security Measures Test your knowledge
Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such
More informationINFORMATION SECURITY FOR YOUR AGENCY
INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection
More informationHow To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The
1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...
More informationInstalling Ubuntu 12.04.1 LTS with full disk encryption
Installing Ubuntu 12.04.1 LTS with full disk encryption Intro: This is a simple step by step tutorial showing you how to install Ubuntu 12.04.1 LTS with enabled full disk encryption. If you don't know
More informationUsing Time Machine to Backup Multiple Mac Clients to SNC NAS and 1000
Using Time Machine to Backup Multiple Mac Clients to SNC NAS and 1000 Application Note Abstract This application note describes how to use Time Machine to backup multiple Mac clients to SNC NAS and 1000.
More informationUnited States Trustee Program s Wireless LAN Security Checklist
United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following
More informationVPN Configuration Guide. Dell SonicWALL
VPN Configuration Guide Dell SonicWALL 2013 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this manual may not be copied, in whole or in part, without the written consent of
More informationAnalyzing the Security Schemes of Various Cloud Storage Services
Analyzing the Security Schemes of Various Cloud Storage Services ECE 646 Project Presentation Fall 2014 12/09/2014 Team Members Ankita Pandey Gagandeep Singh Bamrah Pros and Cons of Cloud Storage Services
More informationSymantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationMcAfee.com Personal Firewall
McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...
More informationSophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7
Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3
More informationCyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security
Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security The IT Security Office (ITSO) What We Do? Risk Assessment Network and System Security Monitoring Vulnerability Scanning
More informationOffice of Information Technology Desktop Security and Best Practices
2013.06 All computer operating systems have vulnerabilities that are targeted by are subject to security risks. In a networked environment, such as a college campus, a compromised computer can affect other
More informationios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%
More informationPCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core
PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page
More informationADM:49 DPS POLICY MANUAL Page 1 of 5
DEPARTMENT OF PUBLIC SAFETY POLICIES & PROCEDURES SUBJECT: IT OPERATIONS MANAGEMENT POLICY NUMBER EFFECTIVE DATE: 09/09/2008 ADM: 49 REVISION NO: ORIGINAL ORIGINAL ISSUED ON: 09/09/2008 1.0 PURPOSE The
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationSecurity Considerations White Paper for Cisco Smart Storage 1
Security Considerations White Paper for Cisco Smart Storage An open network is like a bank s vault with windows Bill Thomson Network-Attached Storage (NAS) is a relatively simple and inexpensive way to
More informationCharter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
More informationE-Mail: SupportCenter@uhcl.edu Phone: 281-283-2828 Fax: 281-283-2969 Box: 230 http://www.uhcl.edu/uct
A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources
More informationMulti-Factor Authentication (FMA) A new security feature for Home Banking. Frequently Asked Questions 8/17/2006
Multi-Factor Authentication (FMA) A new security feature for Home Banking Frequently Asked Questions 8/17/2006 1. Why is MFA being added? We take our obligation to protect our members seriously. To make
More informationDid you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
More informationFileVault 2 Decoded. Rich Trouton Howard Hughes Medical Institute, Janelia Farm Research Campus
FileVault 2 Decoded Rich Trouton Howard Hughes Medical Institute, Janelia Farm Research Campus Before we get started, there s two things I d like to mention. The first is that, all of the sides, speakers
More informationK7 Business Lite User Manual
K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the
More informationAbsolute Manage MDM. John Wu Systems Engineer jcwu@absolute.com
Absolute Manage MDM John Wu Systems Engineer jcwu@absolute.com Saving Time and Money Comprehensive IT Automation Patch Management Software Distribution Software License Management Power Management Asset
More informationAddressing document imaging security issues
Addressing document imaging security issues Document imaging makes it possible to integrate paper documents with existing workflow processes and business applications, e.g., e-mail, fax, and electronic
More information2015 NTX-ISSA Cyber Security Conference (Spring) Kid Proofing the Internet of Things
2015 NTX-ISSA Cyber Security Conference (Spring) Kid Proofing the Internet of Things April 24-25, 2015 Copyright 2015 NTX-ISSA 2015 Raytheon Cyber Security Company. Conference All rights (Spring) reserved.
More informationActivity 1: Scanning with Windows Defender
Activity 1: Scanning with Windows Defender 1. Click on Start > All Programs > Windows Defender 2. Click on the arrow next to Scan 3. Choose Custom Scan Page 1 4. Choose Scan selected drives and folders
More informationPassware Kit User Guide
Passware Kit User Guide www.lostpassword.com Overview of the Passware Kit You can use the Passware Kit to recover lost file, e-mail, and Internet passwords, as well as search for password-protected files.
More informationios How to Back Up from icloud
ios How to Back Up from icloud How to back up from icloud icloud automatically backs up the most important data on your device using ios 5 or later. After you have enabled Backup on your iphone, ipad,
More informationMulti-Factor Authentication
Making the Most of Multi-Factor Authentication Introduction The news stories are commonplace: Hackers steal or break passwords and gain access to a company s data, often causing huge financial losses to
More informationSmartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices
Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices Daniel V. Hoffman, CISSP, CEH, CHFI Chief Technology Officer Page 1 Global Threat Center Exploit Research and Development
More informationConfiguring Your Network s Security
Configuring Your Network s Security Security is an important issue when using a wireless home network. Because radio waves are used to transfer information between your networked computers, it's possible
More informationSecure USB Flash Drive. Biometric & Professional Drives
Secure USB Flash Drive Biometric & Professional Drives I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE FLASH DRIVE... 3 DESCRIPTION... 3 IV. MODULES OF SECURE
More informationGetting the most from Apple Mail
Getting the most from Apple Mail Larry Kerschberg, Roy Wagner, Jonathan Bernstein and Friends February 28, 2015 1 Topics Mail on Macs and ios devices Configuring your accounts IMAP Folders VIP Contacts,
More information