COMPUTER SECURITY PRINCIPLES AND PRACTICES BY

Size: px
Start display at page:

Download "COMPUTER SECURITY PRINCIPLES AND PRACTICES BY COREY@MARK5MINISTRIES.ORG"

Transcription

1 COMPUTER SECURITY PRINCIPLES AND PRACTICES BY

2 INTRODUCTION My Background Some questions for you Why computer security? Principle of Incarnation What this presentation covers (and does not cover) * Computers end user, not corporate office * Smartphones (tomorrow?) Not communication principles Not Social Media security assume there is NONE! (e.g. facial recognition) Not Physical security of electronic devices. (Airports; Don t set down smartphone when traveling; Keep devices locked to desk; Hotel Rooms)

3 SERVICE ANNOUNCEMENT DON T USE OUT-OF-DATE SOFTWARE Win XP is dead So is MS Office 2003 (And IE 6)

4 SECURITY PRINCIPLES 1) GET RIL Get RIL (Risk = Impact * Likelihood) i.e. Assess your Risk of incursion Nothing 100% Secure Understand the threat source Random target (opportunistic) Targeted: e.g. from APT Advanced Persistent Threat The key is to prioritize your efforts

5 SECURITY PRINCIPLES 2) LAYERED DEFENSE Layered Defense If hacker breaks through one layer, they will still not have full access to information E.g. Use strong password and have VPN enabled, and 2-factor authentication for bank account

6 SECURITY PRINCIPLES 3) BE PRACTICAL Be Practical Security measures are in direct inverse correlation to ease-of-use "Know Thyself" - If too difficult, you will bypass Good security applied consistently is BETTER than strong security used sporadically Weakest Link

7 DATA AT REST - #1 1) Backup your important data!! No excuses! 2) Keep Computer free from malware a) Keep OS Updated a) Don t use illegal, pirated software - otherwise will not be updated b) Update 3 rd party applications (Java, Adobe, etc.) c) Run up-to-date Antivirus 3) Software-level firewall turned on 4) Home Office use "home router" in addition to modem

8 DATA AT REST - #2 5) Data Encryption (A)Full Disk: Why? Why not? Win7 (TrueCrypt); Win8 (BitLocker), Mac (FileVault) (B) Encrypted Volume (Hidden?) (C)Encrypted in the Cloud (eg Wuala) (D)Encrypt flash drives (TrueCrypt) (E) Make sure backups are encrypted

9 DATA IN TRANSIT - #1 VPN 1) Virtual Private Network (VPN) a) Creates encrypted "tunnel" for all network traffic How a Personal VPN Works (non-corporate VPN) 1. Encrypted from computer to Tunnel Endpoint (Provider); 2. Then unencrypted to final destination 3. IP Address shows you location at your Provider s place

10 DATA IN TRANSIT - #1 VPN - CONTINUED 2) When to use a VPN? a) On public network (wired or wifi) b) When concerned about unsecured traffic being read (by gov t) c) Part of your Layered Defense 3) Different levels of VPN security (based on protocol and provider) a) Protocols: Best: IPSec, OpenVPN. Good: L2TP. Worst: PPTP. b) Providers: GSEA, StormWind, ConnectMyWorld, DarkWireVPN - OR - Private Internet Access, Witopia, ExpressVPN (China)

11 DATA IN TRANSIT - #2 SECURE 2) Secure - A misnomer/oxymoron? a) Typically Defined: Encrypted from you to provider and between mail servers. b) You may use Secure Provider but is other end secured? First Picture: only your is encrypted Second Picture: both sender and receiver encrypted

12 DATA IN TRANSIT - #2 SECURE - CONTINUED a) Some Considerations and Providers i. *Not* Yahoo!, Hotmail, - question about Google (index messages, gov t access) free product means YOU are the product! ii. iii. Some Providers: GSEA, fastmail.fm, generalmail.com, hetzner.de, neomailbox.com, xc.org, etc. (many allow your own domain name) Also use VPN? (Layered Defense) b) Think about At Rest - What if computer is accessed? If sensitive , read in web browser or install client on encrypted disk c) PGP (GPG) is best, but too difficult for most to understand or implement (encrypted from mail client to mail client)

13 DATA IN TRANSIT - #3 3) Personal WiFi a) Turn on encryption (WPA2) b) Administrative password on hardware device (router or Access Point) 4) Public WiFi a) Traffic can be read; turn on VPN b) Especially be wary at airports and highly trafficked locations a) Only connect to legitimate airport-provided wifi i. E.g. Don t connect to wifi named: Free WiFi - except in Helsinki? b) At airport, assume all info being sent/received can be read

14 PRINCIPLES FOR PASSWORD USE 1) Don t use the same password for all accounts!!! 2) Use Strong Passwords for accounts that matter - PASSPHRASE 1) E.g. 1) first letters of words in sentence/verse, w/changes; 2) primary passphrase w/changes 2) No personal info within password/passphrase 3) Keep passwords in encrypted "password vault" program a) E.g. Roboform, LastPass, Dashlane (synced across devices for pay) - KeePass (free - local only) - 1Password (Mac) b) Do *not* let web-browser remember your passwords! (Not a vault, but advertisement )

15 PRINCIPLES FOR PASSWORD USE - CONTINUED 4) Use two-factor authentication where possible e.g. Bank, Gmail, Facebook, Dropbox, Evernote, etc. 5)Beware of the "password recovery" questions. -- Lie! :-) But make sure you record your answers in your password vault program

16 CONFIGURATION EXAMPLES Consider the following examples: What fits for you? 1) Encrypt Entire Hard Drive why or why not? Even program (e.g. Outlook) would be encrypted. 2) Minimalist/Travel Machine: Take no data. Carry clean device; access all data from *encrypted* cloud provider (like Wuala) - or on local hidden, encrypted volume. 3) Secure application: on hidden, encrypted volume. Portable application. Secure provider. Requires VPN to be accessed. 4) not stored locally: Read via web-browser.

17 OTHER RESOURCES TOOLS AND PROVIDERS 1) Educate yourself; YOU are your worst enemy. A. Online Training Class on Computer Security Essentials & You - Cost: 5 Euro via PayPal B. Essential Security Measures for Home Computers at

18 QUESTIONS? TOMORROW WE WILL TALK ABOUT SMARTPHONE SECURITY

Northwestern IT Tech Talk

Northwestern IT Tech Talk Northwestern IT Tech Talk Top 5 Tools for Securing Your Devices Mary Carp Data Security Analyst Northwestern Information Technology Information and Systems Security/Compliance May 19, 2016 Antimalware

More information

Small Business Server Part 2

Small Business Server Part 2 Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP director@ciaops.com Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS

More information

Protect Yourself from Cyber Risks

Protect Yourself from Cyber Risks Protect Yourself from Cyber Risks 2012 SEAS Cybersecurity Awareness Day 10/17/12 Jay Carter, CISSP CISA Agenda Overview Notable Targets of Hackers What You Can Do to Protect Yourself Identity Theft Questions

More information

Security Awareness. Wireless Network Security

Security Awareness. Wireless Network Security Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition

More information

Safe-Guarding Client Information Basic Data Security Training for Lawyers

Safe-Guarding Client Information Basic Data Security Training for Lawyers Safe-Guarding Client Information Basic Data Security Training for Lawyers Sponsored by the Law Practice Management Committee of The New York State Bar Association John R. McCarron Jr, Esq. Partner, Montes

More information

10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group

10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group 10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group Presented by: Michael Flavin and Stan Stahl Saalex Information Technology Overview Saalex Information

More information

Parent$Coffee$Presents:$ The$Security$Geek s$guide$to$your$personal$ Security$

Parent$Coffee$Presents:$ The$Security$Geek s$guide$to$your$personal$ Security$ Parent$Coffee$Presents:$ The$Security$Geek s$guide$to$your$personal$ Security$ Look$inside$the$mind$of$a$hacker$ h=ps://www.youtube.com/embed/f7pyhn9ic91$ Introducing$our$speaker$ Understanding$risk$ Measuring$Threats$

More information

CyberSecurity & Keeping your data safe. October 20, 2015

CyberSecurity & Keeping your data safe. October 20, 2015 CyberSecurity & Keeping your data safe Medway Business Council John Haddad, Bisinet Technologies October 20, 2015 We are under attack!!! 2013 110 million records compromised 2014 56 million payment cards

More information

Basic Computer Security Part 2

Basic Computer Security Part 2 Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome

More information

Stable and Secure Network Infrastructure Benchmarks

Stable and Secure Network Infrastructure Benchmarks Last updated: March 4, 2014 Stable and Secure Network Infrastructure Benchmarks 501 Commons has developed a list of key benchmarks for maintaining a stable and secure IT Infrastructure for conducting day-to-day

More information

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect

More information

Security Awareness. ITS Security Training. Fall 2015

Security Awareness. ITS Security Training. Fall 2015 Security Awareness ITS Security Training Fall 2015 Why am I here? Isn t security an IT problem? Technology can address only a fraction of security risks. You are a primary target, or rather, your data

More information

Security. TestOut Modules 12.6 12.10

Security. TestOut Modules 12.6 12.10 Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card

More information

EndUser Protection. Peter Skondro. Sophos

EndUser Protection. Peter Skondro. Sophos EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application

More information

HWS Virtual Private Network Configuration and Setup Mac OS X 12/19/2006

HWS Virtual Private Network Configuration and Setup Mac OS X 12/19/2006 The VPN connection supports mainly access to the HWS network drives, not streaming audio/video or downloading large amounts of data. Contents Before Connecting via VPN Before setting up a Virtual Private

More information

Best Practices for Keeping Your Home Network Secure

Best Practices for Keeping Your Home Network Secure Best Practices for Keeping Your Home Network Secure As a user with access to sensitive corporate or government information at work, you are at risk at home. In order to gain access to information typically

More information

How To Use Truecrypt For Free On A Pc Or Mac Or Mac (For A Laptop) For A Long Time (For Free) For Your Computer Or Ipad Or Ipa (For Mac) For Free (For Your Computer) For Long

How To Use Truecrypt For Free On A Pc Or Mac Or Mac (For A Laptop) For A Long Time (For Free) For Your Computer Or Ipad Or Ipa (For Mac) For Free (For Your Computer) For Long Advanced Open-Source /Free Solutions for Home and Small Business Owners Robert Baldi, CISSP- ISSEP TOPICS Encryption Backups Audits Wireless Security Network Security Open Source Goodness ENCRYPTION Encryption

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

CSIS Academy Be Better

CSIS Academy Be Better CSIS Academy Be Better CSIS Security Officer March 2014 Copyright 2014 - CSIS Security Group A/S. All rights reserved Page 2 / 7 Content 1 About CSIS... 3 2 The Course: CSIS Security Officer... 3 2.1.1

More information

[TITLE: WINDOWS OS HOST-BASED RECOMMENDATIONS] UNCLASSIFIED//FOR OFFICIAL USE ONLY 2 UNCLASSIFIED//FOR OFFICIAL USE ONLY

[TITLE: WINDOWS OS HOST-BASED RECOMMENDATIONS] UNCLASSIFIED//FOR OFFICIAL USE ONLY 2 UNCLASSIFIED//FOR OFFICIAL USE ONLY Best Practices for Keeping Your Home Network Narrator: The Internet is a great tool that many households use daily in today's society. It gives us the capability to instantly send emails to friends and

More information

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story Healthcare organizations planning to protect themselves from breach notification should implement data encryption in their

More information

To narrow your results select from the topics to the left. - To search on this page use the 'Find on this Page' feature in your browser.

To narrow your results select from the topics to the left. - To search on this page use the 'Find on this Page' feature in your browser. AskIT: (205) 996-5555 UAB IT Quicklinks UAB Quicklinks UAB IT Home Research & Scholarship Faculty Students Employees Technology Solutions About UAB IT FAQs & Help Articles Blackboard Support BlazerID Directory/Phonebook

More information

In the Cloud. Scoville Memorial Library February, 2013 ccayne@biblio.org

In the Cloud. Scoville Memorial Library February, 2013 ccayne@biblio.org In the Cloud Scoville Memorial Library February, 2013 ccayne@biblio.org What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the

More information

EndPoint Device Secures Files Transferring and Sharing

EndPoint Device Secures Files Transferring and Sharing EndPoint Device Secures Files Transferring and Sharing 1/24/2014 Rev 2.10 LucidPort Technology, Inc. www.lucidport.com Seminar series: Files transferring and Sharing Increasing Need for Data Protection

More information

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable

More information

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,

More information

Data Security in a Mobile, Cloud-Based World

Data Security in a Mobile, Cloud-Based World Data Security in a Mobile, Cloud-Based World Jacob Buckley-Fortin CEO ehana What we ll cover Trends Risks Recommendations 1 Trends Mobile Has Taken Over Trend #1 2 3 450 million users worldwide Adopted

More information

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert Contents: 1.0 Introduction p2 1.1 Ok, what is the problem? p2 1.2 Port Forwarding and Edge based Solutions p2 1.3 What is a VPN? p2 1.4

More information

Setting Up Email on Your Palm. Treo 700wx Smartphone

Setting Up Email on Your Palm. Treo 700wx Smartphone Setting Up Email on Your Palm Treo 700wx Smartphone Intellectual property notices 2006 Palm, Inc. All rights reserved. Trademark, copyright, patent, and other intellectual property notices are set forth

More information

SSL Web Proxy. Generally to access an internal web server which is behind a NAT router, you have the following two methods:

SSL Web Proxy. Generally to access an internal web server which is behind a NAT router, you have the following two methods: SSL Web Proxy Vigor2930, Vigor2950 and VigorPro 5500/5510 series router support SSL Web Proxy function to let user access lots of servers in security via Internet environment. We provide a general user

More information

iphone in Business How-To Setup Guide for Users

iphone in Business How-To Setup Guide for Users iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over

More information

Computer and Information Security End User Questionnaire

Computer and Information Security End User Questionnaire Computer and Information Security End User Questionnaire Human Factors Issues in Computer and Information Security Funded by the National Science Foundation: EIA-0120092 Project http://cis.engr.wisc.edu/

More information

BUSINESS COMPUTER SECURITY. aaa BUSINESS SECURITY SECURITY FOR LIFE

BUSINESS COMPUTER SECURITY. aaa BUSINESS SECURITY SECURITY FOR LIFE aaa BUSINESS SECURITY SECURITY FOR LIFE CHAPTER 1: WHY COMPUTER SECURITY IS IMPORTANT FOR YOUR BUSINESS No matter how big or small your business is, it s highly likely that you have some information stored

More information

Been in technology for 22 years Westinghouse Senior Manager at Clifton Gunderson-7th largest CPA and consulting firm in the U. S. Partner / Director

Been in technology for 22 years Westinghouse Senior Manager at Clifton Gunderson-7th largest CPA and consulting firm in the U. S. Partner / Director Been in technology for 22 years Westinghouse Senior Manager at Clifton Gunderson-7th largest CPA and consulting firm in the U. S. Partner / Director in Kenneally and Company s technology consulting practice

More information

iphone in Business Security Overview

iphone in Business Security Overview iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods

More information

Who s Endian? www.cloudrouter.dk

Who s Endian? www.cloudrouter.dk Who s Endian? Endian was founded in 2003 at Appiano, Italy, by a team of experienced network specialists and Linux enthusiasts. Endian s goal and path of development are immediately clear: creating sophisticated

More information

Keep Hackers Guessing: Protecting Corporate Information While On The Go

Keep Hackers Guessing: Protecting Corporate Information While On The Go Keep Hackers Guessing: Protecting Corporate Information While On The Go Proactive tips for wireless information security for traveling professionals. In today s world where WiFi hotspots are available

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

High Speed Internet, Welcome Kit. If your apartment is served by Ethernet: How do I connect to the network if not using a router?:

High Speed Internet, Welcome Kit. If your apartment is served by Ethernet: How do I connect to the network if not using a router?: High Speed Internet, Welcome Kit We provide a WIRED High Speed Internet connection to your apartment. Your apartment will be served by a DSL modem or Ethernet jack. If you have multiple users in your apartment

More information

ORU IT 2014-15. Oral Roberts University Information Technology Student Guide

ORU IT 2014-15. Oral Roberts University Information Technology Student Guide ORU IT 2014-15 Oral Roberts University Information Technology Student Guide August 2014 Contents Contacting ORU IT... 2 Accessing ORU-Student Wireless on Campus... 2 How to Log into the ORU Web Apps...

More information

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single

More information

Deploying iphone and ipad Virtual Private Networks

Deploying iphone and ipad Virtual Private Networks Deploying iphone and ipad Virtual Private Networks Secure access to private corporate networks is available on iphone and ipad using established industry-standard virtual private network (VPN) protocols.

More information

Web Request Routing. Technical Brief. What s the best option for your web security deployment?

Web Request Routing. Technical Brief. What s the best option for your web security deployment? Web Request Routing and Redirection What s the best option for your web security deployment? Choosing the right method for redirecting traffic to your secure web gateway is absolutely essential to maximize

More information

Wireless Security for Hotspots & Home PCCW Feb, 2009

Wireless Security for Hotspots & Home PCCW Feb, 2009 Wireless Security for Hotspots & Home PCCW Feb, 2009 Ubiquitous Wireless Indoor & Outdoor Wireless Security for Home Provides all-in-one DSL modem with Wi-Fi capability to residential customers Simplify

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

10 Simple Computer Maintenance Tips For The Laptop

10 Simple Computer Maintenance Tips For The Laptop Greenspring Computer Club April 2015 No matter how savvy you are, there are certain things every one of us has to deal with when using a computer and we don t always deal with them in the most efficient

More information

How To Manage A Network Safely

How To Manage A Network Safely ICANWK303A Configure and administer a network operating system Release: 1 ICANWK303A Configure and administer a network operating system Modification History Release Release 1 Comments This Unit first

More information

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan LAW OFFICE SECURITY for Small Firms and Sole Practitioners Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan 1. Introduction CONTENTS 2. Security Consciousness Having a Firm Security

More information

Cloud Security Best Practices

Cloud Security Best Practices Cloud Security Best Practices Cohesive Networks - your applications secured VNS3 security and connectivity solutions protect cloud-based applications from exploitation by hackers, criminal gangs, and foreign

More information

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: aparnagulhane@gmail.com Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of

More information

Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice

Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice Don t Click That Link and other security tips Laura Perry Jennifer Speegle Mike Trice About Us Laura Perry Information Security Jennifer Speegle Firewall Administrator Mike Trice Network Engineer Mail

More information

IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner johannes.feichtner@iaik.tugraz.at IAIK

IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner johannes.feichtner@iaik.tugraz.at IAIK Motivation 2 Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at What you have heard last time Mobile devices: Short history, features Technical evolution, major OS,

More information

Personal Security in the Cloud The Basics. Dr. David A. Cook Stephen F. Austin State University cookda@sfasu.edu 1

Personal Security in the Cloud The Basics. Dr. David A. Cook Stephen F. Austin State University cookda@sfasu.edu 1 The Basics Dr. Eugene W.P. Bingue U. S. Navy dr.bingue@gmail.com Dr. David A. Cook Stephen F. Austin State University cookda@sfasu.edu 1 Caveat Emptor [Latin: Let the buyer beware.] Quidquid latine dictum

More information

MS 20687 Configuring Windows 8.1

MS 20687 Configuring Windows 8.1 P a g e 1 of 12 MS 20687 Configuring Windows 8.1 About this Course Get expert instruction and hands-on practice administering and configuring Windows 8.1 in this 5-day Microsoft Official Course. This course

More information

Mac OS VPN Set Up Guide

Mac OS VPN Set Up Guide Mac OS VPN Set Up Guide If internet traffic is not being sent over the VPN then go to System Preferences- >Network and click on your VPN connection. Click the "Advanced..." button, and in the "Options"

More information

ipad in Business Security

ipad in Business Security ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security

More information

Data Storage for Research. Michael Pinch

Data Storage for Research. Michael Pinch Data Storage for Research Michael Pinch Intro Data storage is a world full of tradeoffs Read vs Write Speed Availability vs Security Cost vs Speed This presentation is to talk about the different types

More information

NAS 322 Connecting Your NAS to a VPN

NAS 322 Connecting Your NAS to a VPN NAS 322 Connecting Your NAS to a VPN Connect your ASUSTOR NAS to a VPN network A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Have a basic understanding

More information

iphone in Business How-To Setup Guide for Users

iphone in Business How-To Setup Guide for Users iphone in Business How-To Setup Guide for Users iphone 3G is ready for business. It supports Microsoft Exchange ActiveSync, delivering push email, calendars, and contacts. And it gives mobile users secure

More information

Internet Privacy Options

Internet Privacy Options 2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms

More information

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015 Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015 What are You Trying to Protect? If someone got into your email, what

More information

Set Up Your Email. HTC Touch Pro. www.sprint.com

Set Up Your Email. HTC Touch Pro. www.sprint.com Set Up Your Email HTC Touch Pro www.sprint.com 2008 Sprint. Sprint and the logo are trademarks of Sprint. Other marks are the property of their respective owners. Intellectual Property Notices Copyright

More information

Getting Started with a Mac For businesses with a Windows Server

Getting Started with a Mac For businesses with a Windows Server Getting Started with a Mac For businesses with a Windows Server This document, a quick guide designed to help you integrate a Mac into your environment, is geared toward businesses with a Microsoft server

More information

(this is being worked on)

(this is being worked on) Sault College VPN Access for MAC OS X Introduction This document will describe how to obtain, install and configure the Cisco VPN Client software for MAC OS X. The Cisco CVN Client software will enable

More information

Current News & Events

Current News & Events ISSUE 2 Current News & Events Microsoft is releasing a version of its OneNote note-taking software for Macs with added new features and a free tier for all the software s users. The free version of One-

More information

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview

More information

Instructions for use the VPN at the Warsaw School of Economics

Instructions for use the VPN at the Warsaw School of Economics Instructions for use the VPN at the Warsaw School of Economics Dariusz Jaruga. ver. 1.1 (19-01-2011) Introduction VPN is the abbreviation for Virtual Personal Network which allows you to connect your computer

More information

Data Security Basics: Helping You Protect You

Data Security Basics: Helping You Protect You Data Security Basics: Helping You Protect You Why the Focus on Data Security? Because ignoring it can get you: Fined Fired Criminally Prosecuted It can also impact your ability to get future funding, and

More information

Setting Up Email. on Your Touch by HTC

Setting Up Email. on Your Touch by HTC Setting Up Email on Your Touch by HTC Intellectual Property Notices 2007 Sprint Nextel. All rights reserved. No reproduction in whole or in part without prior written approval. SPRINT and other trademarks

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

Encryption: Ensuring Information Security

Encryption: Ensuring Information Security Encryption: Ensuring Information Security Colin Chisholm CISSP, GCIH Information Security Analyst Associate Information Security & Systems / Compliance cchisholm@northwestern.edu Agenda Encryption - Explanation

More information

Link Layer and Network Layer Security for Wireless Networks

Link Layer and Network Layer Security for Wireless Networks Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.

More information

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection: Table of Content I. What is VPN?... 2 II. Types of VPN connection... 2 III. Types of VPN Protocol... 3 IV. Remote Access VPN configuration... 4 a. PPTP protocol configuration... 4 Network Topology... 4

More information

Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer

Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer Corporate VPN Using Mikrotik Cloud Feature By SOUMIL GUPTA BHAYA Mikortik Certified Trainer What is a VPN? A virtual private network (VPN) is a method for the extension of a private network across a public

More information

Shared IP server addresses.

Shared IP server addresses. Thank you for purchasing a Lamnia VPN connection. In this handbook you will find more details on how to set up, common connection problems and fixes as well as the complete list of servers for manual connections.

More information

Securing Your Technology Infrastructure Five security areas of focus for small to medium businesses.

Securing Your Technology Infrastructure Five security areas of focus for small to medium businesses. Securing Your Technology Infrastructure Five security areas of focus for small to medium businesses. Anthony Suda Network Manager marketing + technology 701.235.5525 888.9.sundog fax: 701.235.8941 2000

More information

Use Bring-Your-Own-Device Programs Securely

Use Bring-Your-Own-Device Programs Securely Use Bring-Your-Own-Device Programs Securely By Dale Gonzalez December 2012 Bring-your-own-device (BYOD) programs, which allow employees to use their personal smartphones, tablets and laptops in and out

More information

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance NERC CIP Whitepaper How Endian Solutions Can Help With Compliance Introduction Critical infrastructure is the backbone of any nations fundamental economic and societal well being. Like any business, in

More information

Virtual Private Networks

Virtual Private Networks Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication

More information

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device Technical FAQ McAfee Enterprise Mobility Management (McAfee EMM ) 12.0 Frequently Asked Questions Q. What types of mobile devices does McAfee Enterprise Mobility Management (McAfee EMM ) support? A. McAfee

More information

Encryption Made Simple for Lawyers

Encryption Made Simple for Lawyers Encryption Made Simple for Lawyers By David G. Ries, Esq. and John W. Simek Encryption is a topic that most attorneys don t want to touch with a 10-foot pole, but it is becoming a more and more important

More information

The Hidden Dangers of Public WiFi

The Hidden Dangers of Public WiFi WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect

More information

CYBER SECURITY CHALLENGES AND SOLUTIONS AN EXECUTIVE BRIEFING

CYBER SECURITY CHALLENGES AND SOLUTIONS AN EXECUTIVE BRIEFING Providing Information Peace of Mind to Business and the Notfor-Profit Community CYBER SECURITY CHALLENGES AND SOLUTIONS AN EXECUTIVE BRIEFING Long Beach CalCPA Discussion Group December 21, 2011 Stan Stahl,

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com

More information

BYOD: End-to-End Security

BYOD: End-to-End Security BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

Storage, backup, transfer, encryption of data

Storage, backup, transfer, encryption of data Storage, backup, transfer, encryption of data Veerle Van den Eynden UK Data Archive Looking after your research data: practical data management for research projects 5 May 2015 Overview Looking after research

More information

Q. I use a MAC How do I change my password so I can send and receive my email?

Q. I use a MAC How do I change my password so I can send and receive my email? Password Change FAQ Q. I use a MAC How do I change my password so I can send and receive my email? A. First point a browser to http://www.redlands.edu/passwordmanager and change your password. Afterward,

More information

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 BACKUP SECURITY AND THE CLOUD BACK UP ALWAYS BACK UP TO AN EXTERNAL DEVICE OR REMOVAL MEDIA- NEVER DIRECTLY ON TO YOUR COMPUTER IF

More information

Data Managers Interest Group. Research. April 17, 2012

Data Managers Interest Group. Research. April 17, 2012 Data Managers Interest Group Institute of Clinical and Translational Research April 17, 2012 Privacy & Security Contacts hipaa@jhmi.edu network.security@jhmi.edu IT Help Desk 410.735.4357 3 Or you can

More information

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access MCTS Guide to Microsoft Windows 7 Chapter 14 Remote Access Objectives Understand remote access and remote control features in Windows 7 Understand virtual private networking features in Windows 7 Describe

More information

www.dowsemurray.co.nz

www.dowsemurray.co.nz What we are covering Best practices The cloud Email and document storage Phones and faxes Home office suggestions Small business suggestions Where to buy Where to get support Fun stuff What (I hope) you

More information

Best Practices For Department Server and Enterprise System Checklist

Best Practices For Department Server and Enterprise System Checklist Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

Access Control in Home Networking

Access Control in Home Networking Access Control in Home Networking Jukka Tornberg Helsinki University of Technology jstornbe@cc.hut.fi Abstract The Home Networking is coming more and more popular all the time. In the past, a home network

More information

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6 WL/IP-8000VPN VPN Setup Guide Version 0.6 Document Revision Version Date Note 0.1 11/10/2005 First version with four VPN examples 0.2 11/15/2005 1. Added example 5: dynamic VPN using TheGreenBow VPN client

More information

Secure Your Information and Communication Technology Devices

Secure Your Information and Communication Technology Devices You should pay attention to the following items bef the Internet: Secure Your Information and Communication Technology Devices Install proper anti-virus software P.3 Log on as a user and not as an administrator

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information