COMPUTER SECURITY PRINCIPLES AND PRACTICES BY COREY@MARK5MINISTRIES.ORG



Similar documents
Northwestern IT Tech Talk

Small Business Server Part 2

Protect Yourself from Cyber Risks

Security Awareness. Wireless Network Security

10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group

Basic Computer Security Part 2

Stable and Secure Network Infrastructure Benchmarks

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

Security. TestOut Modules

EndUser Protection. Peter Skondro. Sophos

HWS Virtual Private Network Configuration and Setup Mac OS X 12/19/2006

Best Practices for Keeping Your Home Network Secure

Certified Secure Computer User

To narrow your results select from the topics to the left. - To search on this page use the 'Find on this Page' feature in your browser.

In the Cloud. Scoville Memorial Library February, 2013

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Information Security It s Everyone s Responsibility

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert

Setting Up on Your Palm. Treo 700wx Smartphone

SSL Web Proxy. Generally to access an internal web server which is behind a NAT router, you have the following two methods:

iphone in Business How-To Setup Guide for Users

Computer and Information Security End User Questionnaire

iphone in Business Security Overview

Who s Endian?

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

High Speed Internet, Welcome Kit. If your apartment is served by Ethernet: How do I connect to the network if not using a router?:

ORU IT Oral Roberts University Information Technology Student Guide

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Deploying iphone and ipad Virtual Private Networks

Web Request Routing. Technical Brief. What s the best option for your web security deployment?

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

10 Simple Computer Maintenance Tips For The Laptop

How To Manage A Network Safely

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan

Cloud Security Best Practices

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice

IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner IAIK

MS Configuring Windows 8.1

Mac OS VPN Set Up Guide

ipad in Business Security

Data Storage for Research. Michael Pinch

NAS 322 Connecting Your NAS to a VPN

iphone in Business How-To Setup Guide for Users

Internet Privacy Options

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015

Set Up Your . HTC Touch Pro.

(this is being worked on)

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Instructions for use the VPN at the Warsaw School of Economics

Setting Up . on Your Touch by HTC

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Link Layer and Network Layer Security for Wireless Networks

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

Virtual Private Networks

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

Encryption Made Simple for Lawyers

The Hidden Dangers of Public WiFi

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

BYOD: End-to-End Security

Get Started Guide - PC Tools Internet Security

Storage, backup, transfer, encryption of data

Q. I use a MAC How do I change my password so I can send and receive my ?

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access


Best Practices For Department Server and Enterprise System Checklist

Chapter 9 Firewalls and Intrusion Prevention Systems

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

Secure Your Information and Communication Technology Devices

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Transcription:

COMPUTER SECURITY PRINCIPLES AND PRACTICES BY COREY@MARK5MINISTRIES.ORG

INTRODUCTION My Background Some questions for you Why computer security? Principle of Incarnation What this presentation covers (and does not cover) * Computers end user, not corporate office * Smartphones (tomorrow?) Not communication principles Not Social Media security assume there is NONE! (e.g. facial recognition) Not Physical security of electronic devices. (Airports; Don t set down smartphone when traveling; Keep devices locked to desk; Hotel Rooms)

SERVICE ANNOUNCEMENT DON T USE OUT-OF-DATE SOFTWARE Win XP is dead So is MS Office 2003 (And IE 6)

SECURITY PRINCIPLES 1) GET RIL Get RIL (Risk = Impact * Likelihood) i.e. Assess your Risk of incursion Nothing 100% Secure Understand the threat source Random target (opportunistic) Targeted: e.g. from APT Advanced Persistent Threat The key is to prioritize your efforts

SECURITY PRINCIPLES 2) LAYERED DEFENSE Layered Defense If hacker breaks through one layer, they will still not have full access to information E.g. Use strong password and have VPN enabled, and 2-factor authentication for bank account

SECURITY PRINCIPLES 3) BE PRACTICAL Be Practical Security measures are in direct inverse correlation to ease-of-use "Know Thyself" - If too difficult, you will bypass Good security applied consistently is BETTER than strong security used sporadically Weakest Link

DATA AT REST - #1 1) Backup your important data!! No excuses! 2) Keep Computer free from malware a) Keep OS Updated a) Don t use illegal, pirated software - otherwise will not be updated b) Update 3 rd party applications (Java, Adobe, etc.) c) Run up-to-date Antivirus 3) Software-level firewall turned on 4) Home Office use "home router" in addition to modem

DATA AT REST - #2 5) Data Encryption (A)Full Disk: Why? Why not? Win7 (TrueCrypt); Win8 (BitLocker), Mac (FileVault) (B) Encrypted Volume (Hidden?) (C)Encrypted in the Cloud (eg Wuala) (D)Encrypt flash drives (TrueCrypt) (E) Make sure backups are encrypted

DATA IN TRANSIT - #1 VPN 1) Virtual Private Network (VPN) a) Creates encrypted "tunnel" for all network traffic How a Personal VPN Works (non-corporate VPN) 1. Encrypted from computer to Tunnel Endpoint (Provider); 2. Then unencrypted to final destination 3. IP Address shows you location at your Provider s place

DATA IN TRANSIT - #1 VPN - CONTINUED 2) When to use a VPN? a) On public network (wired or wifi) b) When concerned about unsecured traffic being read (by gov t) c) Part of your Layered Defense 3) Different levels of VPN security (based on protocol and provider) a) Protocols: Best: IPSec, OpenVPN. Good: L2TP. Worst: PPTP. b) Providers: GSEA, StormWind, ConnectMyWorld, DarkWireVPN - OR - Private Internet Access, Witopia, ExpressVPN (China)

DATA IN TRANSIT - #2 SECURE EMAIL 2) Secure Email - A misnomer/oxymoron? a) Typically Defined: Encrypted from you to provider and between mail servers. b) You may use Secure Provider but is other end secured? First Picture: only your email is encrypted Second Picture: both sender and receiver encrypted

DATA IN TRANSIT - #2 SECURE EMAIL - CONTINUED a) Some Email Considerations and Providers i. *Not* Yahoo!, Hotmail, - question about Google (index messages, gov t access) free product means YOU are the product! ii. iii. Some Providers: GSEA, fastmail.fm, generalmail.com, hetzner.de, neomailbox.com, xc.org, etc. (many allow your own domain name) Also use VPN? (Layered Defense) b) Think about Email At Rest - What if computer is accessed? If sensitive email, read in web browser or install email client on encrypted disk c) PGP (GPG) is best, but too difficult for most to understand or implement (encrypted from mail client to mail client)

DATA IN TRANSIT - #3 3) Personal WiFi a) Turn on encryption (WPA2) b) Administrative password on hardware device (router or Access Point) 4) Public WiFi a) Traffic can be read; turn on VPN b) Especially be wary at airports and highly trafficked locations a) Only connect to legitimate airport-provided wifi i. E.g. Don t connect to wifi named: Free WiFi - except in Helsinki? b) At airport, assume all info being sent/received can be read

PRINCIPLES FOR PASSWORD USE 1) Don t use the same password for all accounts!!! 2) Use Strong Passwords for accounts that matter - PASSPHRASE 1) E.g. 1) first letters of words in sentence/verse, w/changes; 2) primary passphrase w/changes 2) No personal info within password/passphrase 3) Keep passwords in encrypted "password vault" program a) E.g. Roboform, LastPass, Dashlane (synced across devices for pay) - KeePass (free - local only) - 1Password (Mac) b) Do *not* let web-browser remember your passwords! (Not a vault, but advertisement )

PRINCIPLES FOR PASSWORD USE - CONTINUED 4) Use two-factor authentication where possible e.g. Bank, Gmail, Facebook, Dropbox, Evernote, etc. 5)Beware of the "password recovery" questions. -- Lie! :-) But make sure you record your answers in your password vault program

CONFIGURATION EXAMPLES Consider the following examples: What fits for you? 1) Encrypt Entire Hard Drive why or why not? Even email program (e.g. Outlook) would be encrypted. 2) Minimalist/Travel Machine: Take no data. Carry clean device; access all data from *encrypted* cloud provider (like Wuala) - or on local hidden, encrypted volume. 3) Secure email application: on hidden, encrypted volume. Portable application. Secure provider. Requires VPN to be accessed. 4) Email not stored locally: Read email via web-browser.

OTHER RESOURCES TOOLS AND PROVIDERS 1) Educate yourself; YOU are your worst enemy. A. Online Training Class on Computer Security Essentials & You www.equiphispeople.com - Cost: 5 Euro via PayPal B. Essential Security Measures for Home Computers at www.computersecuritynw.com

QUESTIONS? TOMORROW WE WILL TALK ABOUT SMARTPHONE SECURITY