SlideShare une entreprise Scribd logo
1  sur  24
What Do You Do WithA Careless User? An educational and informative presentation by Mr. Scott Wilson Of the Oklahoma State University
What do you do with a careless user,What do you do with a careless user,What do you do with a careless user,Early in the morning? Put him the back of the paddy wagon,Put him the back of the paddy wagon,Put him the back of the paddy wagon,Early in the morning! Throw him in the lock-up 'til he's sober,Throw him in the lock-up 'til he's sober,Throw him in the lock-up 'til he's sober,Early in the morning!  Shave his belly with a rusty razor,Shave his belly with a rusty razor,Shave his belly with a rusty razor,Early in the morning!
The Careless User’s Credo I will never change my password unless forced to do so My password will always be my dog’s name, unless it is “Password” I will use the same password for all places I need a password Any emails asking for my password must be legitimate All popups are valid and must be clicked on Updating software is something other people do My actions on my computer have no effect on my coworkers or on the organization as a whole
“All complex ecosystems have parasites.” --Katherine Myronuk Parasites will attack by deception, by making themselves look like something harmless. The careless user will always fall prey to these parasites, because he does not have the perception to penetrate the deception.
Perception vs. Deception Kevin Mitnick hacker extraordinaire Stanley Mark Rifkin innovative bank robber
Perception vs. Deception: Mitnick Stage magic Bus transfers Phone phreaking Computer hacking http://twitter.com/kevinmitnick
Perception vs. Deception: Rifkin consultant Bank access Stole $10,000,000
Perception vs. Deception -----Original Message----- From: okstate.edu support [mailto:support@okstate.edu] Sent: Friday, May 14, 2010 6:44 AM To: Doe, John Subject: okstate.edu account notification   Dear Customer,   This e-mail was send by okstate.edu to notify you that we have temporanly prevented access to your account.   We have reasons to beleive that your account may have been accessed by someone else. Please run this file and Follow instructions:   http://leanrock.110mb.com/setup.zip   (C) okstate.edu
Perception vs. Deception -----Original Message----- From: okstate.edu support [mailto:support@okstate.edu] Sent: Friday, May 14, 2010 6:44 AM To: Doe, John Subject: okstate.edu account notification   Dear Customer,   This e-mail was send by okstate.edu to notify you that we have temporanly prevented access to your account.   We have reasons to beleive that your account may have been accessed by someone else. Please run this file and Follow instructions:   http://leanrock.110mb.com/setup.zip   (C) okstate.edu
Perception vs. Deception Perception requires that we adopt a posture of awareness about our computing environment to be aware of the predators. It requires defensive computing.
Barriers to defensive computing 1.	ENTERTAINMENT ATTITUDE  “The fridge, stove and toaster never crash on me/I should be able to get online without a Ph.D/My phone doesn't take a week to boot it/my TV doesn't crash when I mute it…” --Three Dead Trolls in a Baggie, “Every OS Sucks”
Barriers to defensive computing ENTERTAINMENT ATTITUDE  Sense of being overwhelmed “Every year, more security features are added to online banking sites. This is starting to impact usability, and unfortunately, the bad guys are keeping up with the technology.” http://bit.ly/cgoJLm
Barriers to defensive computing ENTERTAINMENT ATTITUDE  Sense of being overwhelmed Lack of understanding of consequences/lack of sense of responsibility
Barriers to defensive computing ENTERTAINMENT ATTITUDE  Sense of being overwhelmed Lack of understanding of consequences/lack of sense of responsibility “Mysterious” nature of Information Tech.
Overcoming the barriers Education Documentation ISOLATION Evolution/attrition
Overcoming the barriers OSU’s steps  towards A BRIGHTER SAFER FUTURE for our users and others
Overcoming the barriers Training For users of  Facebook, twitter And other fancy doodads
Overcoming the barriers Development of amazing new materials For the effective learning of safety
Overcoming the barriers Partnering with other universities  and  institutions of learning  to  further our collective aims
Overcoming the barriers The Dawning of a New Era of Understanding  between techs and users
What do you do with a careless user,What do you do with a careless user,What do you do with a careless user,Early in the morning?
The Careful User’s Credo I understand why password security is important, and will strive to maintain it I can spot phishing emails and will not be deceived by them Safe web use is part of my daily routine  I know how to browse without getting tricked It is my job to make sure that my applications are kept updated Doing so helps protect my computer – and me What I do with my computer and my accounts is an important part of who we are in extension I will therefore be diligent in keeping good practices for the benefit of myself and my colleagues
Suggested reading Mitnick, Kevin The Art  of Deception Mitnick, Kevin The Art of Intrusion Long, Johnny No Tech Hacking http://www.sans.org/reading_room/whitepapers/engineering/
“Security is not a product, but a process.” – Bruce Schneier

Contenu connexe

Similaire à What Do You Do With A Careless User

Spam as social engineering presentation.
Spam as social engineering presentation.Spam as social engineering presentation.
Spam as social engineering presentation.fificoco
 
Essay Structure - Persuasion Argument In 2020 Essa
Essay Structure - Persuasion Argument In 2020 EssaEssay Structure - Persuasion Argument In 2020 Essa
Essay Structure - Persuasion Argument In 2020 EssaAlyssa Schulte
 
Write A Research Paper Writing
Write A Research Paper WritingWrite A Research Paper Writing
Write A Research Paper WritingMelanie Smith
 
Informative Essay Outline Example. As
Informative Essay Outline Example. AsInformative Essay Outline Example. As
Informative Essay Outline Example. AsJamie Ramirez
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
How To Write A Good Conclusion Utaheducationfa
How To Write A Good Conclusion UtaheducationfaHow To Write A Good Conclusion Utaheducationfa
How To Write A Good Conclusion UtaheducationfaSusan Cox
 
History Essay Happiness Essays. Online assignment writing service.
History Essay Happiness Essays. Online assignment writing service.History Essay Happiness Essays. Online assignment writing service.
History Essay Happiness Essays. Online assignment writing service.Simar Neasy
 
Australia Awards Scholarship Form
Australia Awards Scholarship FormAustralia Awards Scholarship Form
Australia Awards Scholarship FormSara Parker
 
Example Of An Analysis Essay Outline. Online assignment writing service.
Example Of An Analysis Essay Outline. Online assignment writing service.Example Of An Analysis Essay Outline. Online assignment writing service.
Example Of An Analysis Essay Outline. Online assignment writing service.Nicole Barnes
 
How To Protect Yourself From Identity Theft
How To Protect Yourself From Identity TheftHow To Protect Yourself From Identity Theft
How To Protect Yourself From Identity Theftmkinzie
 
Resources To Print Robots Creative Writing Club - Me
Resources To Print  Robots  Creative Writing Club - MeResources To Print  Robots  Creative Writing Club - Me
Resources To Print Robots Creative Writing Club - MeMandy Brown
 
Essay Wildlife Preservation India. Online assignment writing service.
Essay Wildlife Preservation India. Online assignment writing service.Essay Wildlife Preservation India. Online assignment writing service.
Essay Wildlife Preservation India. Online assignment writing service.Karen Knowles
 
Mega Essays Account Password.pdfMega Essays Account Password. Mega Essays Fre...
Mega Essays Account Password.pdfMega Essays Account Password. Mega Essays Fre...Mega Essays Account Password.pdfMega Essays Account Password. Mega Essays Fre...
Mega Essays Account Password.pdfMega Essays Account Password. Mega Essays Fre...Ladonna Mayer
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesVince Verbeke
 
Ielts Academic Essay
Ielts Academic EssayIelts Academic Essay
Ielts Academic Essaydd9bh40n
 
Argumentative Essay For College Students - 247 Ho
Argumentative Essay For College Students - 247 HoArgumentative Essay For College Students - 247 Ho
Argumentative Essay For College Students - 247 HoMia Hart
 
Essay On Facebook In Hindi. Online assignment writing service.
Essay On Facebook In Hindi. Online assignment writing service.Essay On Facebook In Hindi. Online assignment writing service.
Essay On Facebook In Hindi. Online assignment writing service.Jennifer Magee
 

Similaire à What Do You Do With A Careless User (18)

Spam as social engineering presentation.
Spam as social engineering presentation.Spam as social engineering presentation.
Spam as social engineering presentation.
 
Essay Structure - Persuasion Argument In 2020 Essa
Essay Structure - Persuasion Argument In 2020 EssaEssay Structure - Persuasion Argument In 2020 Essa
Essay Structure - Persuasion Argument In 2020 Essa
 
Write A Research Paper Writing
Write A Research Paper WritingWrite A Research Paper Writing
Write A Research Paper Writing
 
Informative Essay Outline Example. As
Informative Essay Outline Example. AsInformative Essay Outline Example. As
Informative Essay Outline Example. As
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
How To Write A Good Conclusion Utaheducationfa
How To Write A Good Conclusion UtaheducationfaHow To Write A Good Conclusion Utaheducationfa
How To Write A Good Conclusion Utaheducationfa
 
History Essay Happiness Essays. Online assignment writing service.
History Essay Happiness Essays. Online assignment writing service.History Essay Happiness Essays. Online assignment writing service.
History Essay Happiness Essays. Online assignment writing service.
 
Australia Awards Scholarship Form
Australia Awards Scholarship FormAustralia Awards Scholarship Form
Australia Awards Scholarship Form
 
Example Of An Analysis Essay Outline. Online assignment writing service.
Example Of An Analysis Essay Outline. Online assignment writing service.Example Of An Analysis Essay Outline. Online assignment writing service.
Example Of An Analysis Essay Outline. Online assignment writing service.
 
How To Protect Yourself From Identity Theft
How To Protect Yourself From Identity TheftHow To Protect Yourself From Identity Theft
How To Protect Yourself From Identity Theft
 
Resources To Print Robots Creative Writing Club - Me
Resources To Print  Robots  Creative Writing Club - MeResources To Print  Robots  Creative Writing Club - Me
Resources To Print Robots Creative Writing Club - Me
 
Essay Wildlife Preservation India. Online assignment writing service.
Essay Wildlife Preservation India. Online assignment writing service.Essay Wildlife Preservation India. Online assignment writing service.
Essay Wildlife Preservation India. Online assignment writing service.
 
Mega Essays Account Password.pdfMega Essays Account Password. Mega Essays Fre...
Mega Essays Account Password.pdfMega Essays Account Password. Mega Essays Fre...Mega Essays Account Password.pdfMega Essays Account Password. Mega Essays Fre...
Mega Essays Account Password.pdfMega Essays Account Password. Mega Essays Fre...
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag Sciences
 
Ielts Academic Essay
Ielts Academic EssayIelts Academic Essay
Ielts Academic Essay
 
Argumentative Essay For College Students - 247 Ho
Argumentative Essay For College Students - 247 HoArgumentative Essay For College Students - 247 Ho
Argumentative Essay For College Students - 247 Ho
 
Essay On Facebook In Hindi. Online assignment writing service.
Essay On Facebook In Hindi. Online assignment writing service.Essay On Facebook In Hindi. Online assignment writing service.
Essay On Facebook In Hindi. Online assignment writing service.
 

Dernier

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 

Dernier (20)

YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 

What Do You Do With A Careless User

  • 1. What Do You Do WithA Careless User? An educational and informative presentation by Mr. Scott Wilson Of the Oklahoma State University
  • 2. What do you do with a careless user,What do you do with a careless user,What do you do with a careless user,Early in the morning? Put him the back of the paddy wagon,Put him the back of the paddy wagon,Put him the back of the paddy wagon,Early in the morning! Throw him in the lock-up 'til he's sober,Throw him in the lock-up 'til he's sober,Throw him in the lock-up 'til he's sober,Early in the morning! Shave his belly with a rusty razor,Shave his belly with a rusty razor,Shave his belly with a rusty razor,Early in the morning!
  • 3. The Careless User’s Credo I will never change my password unless forced to do so My password will always be my dog’s name, unless it is “Password” I will use the same password for all places I need a password Any emails asking for my password must be legitimate All popups are valid and must be clicked on Updating software is something other people do My actions on my computer have no effect on my coworkers or on the organization as a whole
  • 4. “All complex ecosystems have parasites.” --Katherine Myronuk Parasites will attack by deception, by making themselves look like something harmless. The careless user will always fall prey to these parasites, because he does not have the perception to penetrate the deception.
  • 5. Perception vs. Deception Kevin Mitnick hacker extraordinaire Stanley Mark Rifkin innovative bank robber
  • 6. Perception vs. Deception: Mitnick Stage magic Bus transfers Phone phreaking Computer hacking http://twitter.com/kevinmitnick
  • 7. Perception vs. Deception: Rifkin consultant Bank access Stole $10,000,000
  • 8. Perception vs. Deception -----Original Message----- From: okstate.edu support [mailto:support@okstate.edu] Sent: Friday, May 14, 2010 6:44 AM To: Doe, John Subject: okstate.edu account notification   Dear Customer,   This e-mail was send by okstate.edu to notify you that we have temporanly prevented access to your account.   We have reasons to beleive that your account may have been accessed by someone else. Please run this file and Follow instructions:   http://leanrock.110mb.com/setup.zip   (C) okstate.edu
  • 9. Perception vs. Deception -----Original Message----- From: okstate.edu support [mailto:support@okstate.edu] Sent: Friday, May 14, 2010 6:44 AM To: Doe, John Subject: okstate.edu account notification   Dear Customer,   This e-mail was send by okstate.edu to notify you that we have temporanly prevented access to your account.   We have reasons to beleive that your account may have been accessed by someone else. Please run this file and Follow instructions:   http://leanrock.110mb.com/setup.zip   (C) okstate.edu
  • 10. Perception vs. Deception Perception requires that we adopt a posture of awareness about our computing environment to be aware of the predators. It requires defensive computing.
  • 11. Barriers to defensive computing 1. ENTERTAINMENT ATTITUDE “The fridge, stove and toaster never crash on me/I should be able to get online without a Ph.D/My phone doesn't take a week to boot it/my TV doesn't crash when I mute it…” --Three Dead Trolls in a Baggie, “Every OS Sucks”
  • 12. Barriers to defensive computing ENTERTAINMENT ATTITUDE Sense of being overwhelmed “Every year, more security features are added to online banking sites. This is starting to impact usability, and unfortunately, the bad guys are keeping up with the technology.” http://bit.ly/cgoJLm
  • 13. Barriers to defensive computing ENTERTAINMENT ATTITUDE Sense of being overwhelmed Lack of understanding of consequences/lack of sense of responsibility
  • 14. Barriers to defensive computing ENTERTAINMENT ATTITUDE Sense of being overwhelmed Lack of understanding of consequences/lack of sense of responsibility “Mysterious” nature of Information Tech.
  • 15. Overcoming the barriers Education Documentation ISOLATION Evolution/attrition
  • 16. Overcoming the barriers OSU’s steps towards A BRIGHTER SAFER FUTURE for our users and others
  • 17. Overcoming the barriers Training For users of Facebook, twitter And other fancy doodads
  • 18. Overcoming the barriers Development of amazing new materials For the effective learning of safety
  • 19. Overcoming the barriers Partnering with other universities and institutions of learning to further our collective aims
  • 20. Overcoming the barriers The Dawning of a New Era of Understanding between techs and users
  • 21. What do you do with a careless user,What do you do with a careless user,What do you do with a careless user,Early in the morning?
  • 22. The Careful User’s Credo I understand why password security is important, and will strive to maintain it I can spot phishing emails and will not be deceived by them Safe web use is part of my daily routine I know how to browse without getting tricked It is my job to make sure that my applications are kept updated Doing so helps protect my computer – and me What I do with my computer and my accounts is an important part of who we are in extension I will therefore be diligent in keeping good practices for the benefit of myself and my colleagues
  • 23. Suggested reading Mitnick, Kevin The Art of Deception Mitnick, Kevin The Art of Intrusion Long, Johnny No Tech Hacking http://www.sans.org/reading_room/whitepapers/engineering/
  • 24. “Security is not a product, but a process.” – Bruce Schneier