Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security



Similar documents
PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Common Cyber Threats. Common cyber threats include:

PC Security and Maintenance

Basic Security Considerations for and Web Browsing

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Why The Security You Bought Yesterday, Won t Save You Today

Quick Start Guide to Logging in to Online Banking

Sophistication of attacks will keep improving, especially APT and zero-day exploits

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

Certified Secure Computer User

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

National Cyber Security Month 2015: Daily Security Awareness Tips

Secure Recipient Guide

isupplier PORTAL ACCESS SYSTEM REQUIREMENTS

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

I N R O A D S, I N C. T R A I N I N G A N D D E V E L O P M E N T

OKPAY guides. Security Guide

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Student Tech Security Training. ITS Security Office

Unity web- player issues in browsers & in client system

MetroHealth Information Services

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

High Speed Internet - User Guide. Welcome to. your world.

Adobe Reader Settings

How to use

FERPA: Data & Transport Security Best Practices

INDUSTRY OVERVIEW: FINANCIAL

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Computer Security Maintenance Information and Self-Check Activities

Optum ID Migration for Provider Express Users

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Student ANGEL FAQs. General Issues: System Requirements:

An Introduction on How to Better Protect Your Computer and Sensitive Data

How to File the FBAR Electronically. The following steps describe the process of filing an FBAR electronically with our system.

Sophos Endpoint Security and Control Help

Protecting Your Organisation from Targeted Cyber Intrusion

Windows Operating Systems. Basic Security

Secure Mail Registration and Viewing Procedures

Citrix Introduction and FAQs

CYCLOPE let s talk productivity

Protecting Yourself from Identity Theft

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Windows and MAC User Handbook Remote and Secure Connection Version /19/2013. User Handbook

Five Tips to Reduce Risk From Modern Web Threats

The Key to Secure Online Financial Transactions

Mirtrak 6 Powered by Cyclope

Kaspersky Small Office Security User Guide

Kaspersky Internet Security User Guide

Keeping Data Safe. Patients, Research Subjects, and You

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

3 day Workshop on Cyber Security & Ethical Hacking

1. Scope of Service. 1.1 About Boxcryptor Classic

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

PLATO Learning Environment System and Configuration Requirements for workstations. October 27th, 2008

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Important Notes for WinConnect Server VS Software Installation:

STRONGER ONLINE SECURITY

Don t Fall Victim to Cybercrime:

Business ebanking Fraud Prevention Best Practices

LSGMI REMOTE DESKTOP SERVICES.

Anti-exploit tools: The next wave of enterprise security

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan

Java version 7 update 45 (7u45)

Kaspersky Internet Security

Web Conferencing Version 8.3 Troubleshooting Guide

Infocomm Sec rity is incomplete without U Be aware,

Trend Micro OfficeScan Best Practice Guide for Malware

DigiDelivery Client Quick Start

Shakambaree Technologies Pvt. Ltd.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Outlook Web Access 2003 Remote User Guide

U.S. Cellular Mobile Data Security. User Guide Version 00.01

In order to get the most out of your Bert Rodgers courses, it is important to ensure that your computer meets some minimum system requirements.

Sophos Anti-Virus for Mac OS X Help

GlobalSign Malware Monitoring

What Do You Mean My Cloud Data Isn t Secure?

How To Sync Google Drive On A Mac Computer With A Gmail Account On A Gcd (For A Student) On A Pc Or Mac Or Mac (For An Older Person) On An Ipad Or Ipad (For Older People) On

User Guide for the Identity Shield

REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access

8x8 Click2Pop User Guide

Citrix : Remediation - MAC

Sophos for Microsoft SharePoint startup guide

Transcription:

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

The IT Security Office (ITSO) What We Do? Risk Assessment Network and System Security Monitoring Vulnerability Scanning and Penetration Testing Enterprise Encryption Solution Computer Incident Response Computing, Network and Data Policy Compliance Awareness Training

What Is The Threat Who are the Hackers Sophisticated criminal organizations in China, Eastern Europe, Russia, Asia and elsewhere. State Sponsored Industrial or governmental espionage China, Russia, Iran, North Korea, Etc. Someone who has taken a personal interest in you Property thieves What Motivates Hackers Financial gain from using or selling your data Using your PC to attack others Industrial or governmental espionage Occasionally the motivation is personal For physical theft the motivation can be data theft and resale of hardware

How and Why How Do They Do It Exploiting Human Behavior Exploiting System Vulnerability For Mobile Devices - Physical Theft What are They After Data: CC#s, SSN#s, ID Theft, Banking Info, Contact Lists Access: Your work, financial, social, cloud storage accounts Malicious use of your computer: To target someone else. The Hardware: For it s resale value.

Sta9s9cs About 63% involve exploits of user account http://www.channelbiz.co.uk/2012/06/12/internal- security- breaches- cause- businesses- most- concern/ Worldwide about 23% of people will respond to spear- phishing attacks, with 70% of people responding to directed phishing attacks http://www.scmagazine.com/infosec- 23- percent- of- users- fall- for- spear- phishing/article/128480/

More Sta9s9cs 96% of all data breaches were not technically difficult 97% were avoidable through simple or intermediate controls 69% incorporated malware 81% of incidents used a form of hacking (through phishing, drive- by downloads, etc) 79% of victims were targets of opportunity From( http://www.verizonbusiness.com/about/events/ 2012dbir/) :

Something Old.. Zeus Steals confidential information Online credentials Banking data Can be customized for specific data targets Malware package is generated via a tool kit that sold in markets for online criminals Typically distributed via an email with a link to malicious website for distribution Bot controlled and is waiting for the next command.

Something new.crypto Locker

Foreign AGacks- Week of 7/14

Protec9ng Highly Sensi9ve Data Do not store HSD on your PC unless you have requested to do so and its been approved by Chief Data Steward. Understand how to securely delete data Do not transmit highly sensitive data unencrypted. (HTTP, Email, FTP. Removable media) Be aware of legacy data and do regular housekeeping Read and understand the Data Stewardship policy #1114(http://universitypolicy.gmu.edu/policies/data- stewardship/)

Highly Sensi9ve Data Identity Theft Social Security number Driver s license Background checks Health Data (HIPAA) Date of birth Visa information Passport Bank Account Data

Other Highly Sensi9ve Data Access Control & Technology Information Passwords/PINs Network/System Info Encryption Keys Security Configuration Info Financial data Credit Card Numbers Financial aid/scholarship info Bank Account Info Personal Tax return data

Mi9ga9ng Risk: What Can You Do Use Current OS - Window 7 or latest Mac OSX build 64 bit is better Install a comprehensive Host- Based Security Suite Firewall, Host Intrusion Prevent, and Antivirus Configure Web Browsers for Safe Browsing No Scripts, Manage plugins Keep everything updated Manage your passwords

More Security Tips Don t store highly sensitive data on your computer. Store offline and locked up and/or encrypted Limit Use of the Administrator Account- Create a standard user account and use it for most of what you do. Become sophisticated about web browsing and email security For your mobile devices pay attention to physical security.

Password Management Use a secure password Length first, then complexity At least 10 characters, consider pass phrases Mixed alphanumeric, upper/lower and special characters Periodically change your passwords Use a password safe to store your passwords Use different passwords for different accounts Mitigates threat of chained attacks

Understand Phishing What is phishing? Phishing is a form of social engineering that uses e- mail or malicious websites to solicit personal information by posing as a trustworthy organization. What does a phishing email look like? False Sense Of Urgency Suspicious- Looking Links Not personalized Misspeld or Pooooorly Written Sender not known

Phishing (cont d)

Phishing (cont d) What can happen? Phishing Attacks Lead to Identity Theft - When users respond with the requested information, attackers can use it to: Empty your bank account Open new credit cards Gain employment Specific to Mason, Malicious access to: Patriotweb/Internet Native Banner Student/Employee Personal information Financial information Mason Money MyMason

Web Browser Security Understand what risky behavior is What is an untrusted web site Don t click that button - FakeAV Downloading plugins and add- ons without consideration. Learn how to secure your internet browser Disable/Uninstall unused plugins Keep necessary plugins patched 40 % of drive- by- downloads exploit unpatched vulnerabilities in Adobe Flash and PDF reader Disable Java, JavaScript and ActiveX Or, for browsers that support it, enable for web sites that you trust

FireFox Security SeYngs Select Tools Then, Select Add- ons.

FireFox Managing Exten9ons Select Extensions. Then, Search for NOSCRIPT.

Firefox- Installing NoScript Select Install for NoScript.

Firefox- NoScript Install Confirmed Restart Firefox and it s installed!

FireFox What Success Looks like Success!

Options for controlling scripts

Internet Explorer Select Tools Select Internet Options

Trusted Sites Internet Medium Setting High Setting

Unpredictable Behavior Site was in Trusted list. Imbedded content was from another site

IE Privacy SeYngs Settings Level Privacy Access For individual Sites

Other IE Security SeYngs ActiveX, SmartScreen and other controls Access Configuration Select Safety

Chrome Security SeYngs 3. Choose Extensions 1. Access Controls 2. Select Tools

Chrome - Managing Extensions Select get more extensions

Chrome - Installing NotScripts Search for NotScripts Select Add to Chrome for NotScripts for Crome OS

Chrome- NotScripts: Instruc4ons to Set Password SeYng your NotScripts password is simple?. Simply follow these steps: Step 1: Navigate to the NotScripts Folder Open the NotScripts Google Chrome extension folder. The location of this folder is shown below. You can go there by directly copying and pasting the appropriate address below into the location bar of a folder: Windows XP: %userprofile%\local Settings\Application Data\Google\Chrome\User Data \Default\Extensions\odjhifogjcknibkahlpidmdajjpkkcfn Windows Vista or 7: %userprofile%\appdata\local\google\chrome\user Data\Default \Extensions\odjhifogjcknibkahlpidmdajjpkkcfn Mac OS X: ~/Library/Application Support/Google/Chrome/Default/Extensions/ odjhifogjcknibkahlpidmdajjpkkcfn Linux: ~/.config/google- chrome/default/extensions/odjhifogjcknibkahlpidmdajjpkkcfn Note: For Windows users, change YOUR_USER_NAME to the user name to you are logged onto under Windows. If you're using Windows Explorer to navigate to the folder, you might need to set Show hidden files and folders in Tools > Folder Options... > View. For convenience, it is recommended that you make a shortcut to this folder on your desktop or somewhere handy so that you can quickly reset the NotScripts password after an update.

Chrome NotScripts Install Simple Steps? Con9nued Step 2: Open the NotScripts Password File Open the file CHANGE PASSWORD HERE.js for editing. For Windows users, do this by right- clicking on the file and selecting Edit from the right- click menu. This will open up the file in NotePad for you to enter your NotScripts password. Step 3: Set the NotScripts Password Choose a password for NotScripts with the following restrictions: Length: 20 minimum, 100 maximum Allowed Characters: abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz_1234567890 Spaces: Allowed Put the password in between the quotes of the line that reads: const ENCRYPTION_PASSWORD = ""; Example: FNqzJmJBA1GQFhuXBmEq20MqEqbn55w3MtT It should look like this after (except with your own password): const ENCRYPTION_PASSWORD = "FNqzJmJBA1GQFhuXBmEq20MqEqbn55w3MtT"; Save the file and close it when finished. Step 4: Restart Google Chrome Close and restart Google Chrome for the new password to take effect in NotScripts. You are done!

Chrome- What Success Looks Like Success! Manage scripts for each site

Safari Security SeYngs

Managing User Accounts Consider creating and using an account with limited privileges instead of an 'administrator' or 'root' level account for everyday tasks. Depending on the operating system, administrator level access is only needed when installing new software, changing system configurations, etc. Malware (e.g., viruses, Trojan horses) is executed with the privileges of the user that runs them making it far more risky to be logged in as an administrator all the time. A default user account does not have the permissions to install malware or make system changes.

Managing your Windows PC Find Computer Find Computer Select Manage

Managing Users and Groups Find Local Users and Groups

Adding a New User Right Click on Users and Select New User

Account Crea9on Fill it out. Use a strong password Select Create

Select Create New User in users group

Eleva9ng Your Permissions When logged on on as NewUser as NewUser select an select applicaton, applicaton, right click right and click choose and choose Run Run as as administrator