SlideShare une entreprise Scribd logo
1  sur  24
An educational and informative presentation by Mr. Scott Wilson Of the Oklahoma State University
What do you do with a careless user, What do you do with a careless user, What do you do with a careless user, Early in the morning? Put him the back of the paddy wagon, Put him the back of the paddy wagon, Put him the back of the paddy wagon, Early in the morning! Throw him in the lock-up 'til he's sober, Throw him in the lock-up 'til he's sober, Throw him in the lock-up 'til he's sober, Early in the morning!  Shave his belly with a rusty razor, Shave his belly with a rusty razor, Shave his belly with a rusty razor, Early in the morning!
The Careless User’s Credo I will never change my password unless forced to do so My password will always be my dog’s name, unless it is “Password” I will use the same password for all places I need a password Any emails asking for my password must be legitimate All popups are valid and must be clicked on Updating software is something other people do My actions on my computer have no effect on my coworkers or on the organization as a whole
“ All complex ecosystems have parasites.” --Katherine Myronuk Parasites will attack by deception, by making themselves look like something harmless. The careless user will always fall prey to these parasites, because he does not have the perception to penetrate the deception.
Perception vs. Deception ,[object Object],[object Object],[object Object],[object Object]
Perception vs. Deception: Mitnick ,[object Object],[object Object],[object Object],[object Object],[object Object]
Perception vs. Deception: Rifkin ,[object Object],[object Object],[object Object]
Perception vs. Deception ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Perception vs. Deception ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Perception vs. Deception ,[object Object],[object Object]
Barriers to defensive computing ,[object Object],[object Object],[object Object]
Barriers to defensive computing ,[object Object],[object Object],[object Object],[object Object]
Barriers to defensive computing ,[object Object],[object Object],[object Object]
Barriers to defensive computing ,[object Object],[object Object],[object Object],[object Object]
Overcoming the barriers ,[object Object],[object Object],[object Object],[object Object]
Overcoming the barriers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Overcoming the barriers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Overcoming the barriers ,[object Object],[object Object],[object Object]
Overcoming the barriers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Overcoming the barriers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What do you do with a careless user, What do you do with a careless user, What do you do with a careless user, Early in the morning?
The Careful User’s Credo I understand why password security is important, and will strive to maintain it I can spot phishing emails and will not be deceived by them Safe web use is part of my daily routine I know how to browse without getting tricked It is my job to make sure that my applications are kept updated Doing so helps protect my computer – and me What I do with my computer and my accounts is an important part of who we are in extension I will therefore be diligent in keeping good practices for the benefit of myself and my colleagues
Suggested reading ,[object Object],[object Object],[object Object],[object Object]
“ Security is not a product, but a process.” – Bruce Schneier

Contenu connexe

Tendances

Safe Internet Usage
Safe Internet UsageSafe Internet Usage
Safe Internet Usageaazim javed
 
Simulating Real World Attack
Simulating Real World AttackSimulating Real World Attack
Simulating Real World Attacktmacuk
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your usersSimpliv LLC
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship projectabroadhead
 
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NETCP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NETcpsoncanals
 
Junior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 previewJunior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 previewLeonie Smith
 
Safety in cyberspace
Safety in cyberspaceSafety in cyberspace
Safety in cyberspaceJanealW
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshiptakahe2
 
UX Sofia 2011 - Conrad Albrecht-Buehler
UX Sofia 2011 - Conrad Albrecht-BuehlerUX Sofia 2011 - Conrad Albrecht-Buehler
UX Sofia 2011 - Conrad Albrecht-BuehlerLucrat
 

Tendances (17)

VPNs
VPNsVPNs
VPNs
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Safe Internet Usage
Safe Internet UsageSafe Internet Usage
Safe Internet Usage
 
Simulating Real World Attack
Simulating Real World AttackSimulating Real World Attack
Simulating Real World Attack
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Digital citizenship project
Digital citizenship projectDigital citizenship project
Digital citizenship project
 
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NETCP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
 
Cyber saftey for parents
Cyber saftey for parentsCyber saftey for parents
Cyber saftey for parents
 
Internet security
Internet securityInternet security
Internet security
 
Junior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 previewJunior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 preview
 
Safety in cyberspace
Safety in cyberspaceSafety in cyberspace
Safety in cyberspace
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Lotrecchiano grace
Lotrecchiano graceLotrecchiano grace
Lotrecchiano grace
 
UX Sofia 2011 - Conrad Albrecht-Buehler
UX Sofia 2011 - Conrad Albrecht-BuehlerUX Sofia 2011 - Conrad Albrecht-Buehler
UX Sofia 2011 - Conrad Albrecht-Buehler
 

En vedette

En vedette (6)

Class #14
Class #14Class #14
Class #14
 
cartilha_do_pai
cartilha_do_paicartilha_do_pai
cartilha_do_pai
 
Class #23
Class #23Class #23
Class #23
 
Cmgt 410 week 4 individual assignment project controls
Cmgt 410 week 4 individual assignment project controlsCmgt 410 week 4 individual assignment project controls
Cmgt 410 week 4 individual assignment project controls
 
LatinVocab
LatinVocabLatinVocab
LatinVocab
 
Google Books
Google BooksGoogle Books
Google Books
 

Similaire à What do you do with a careless user (legacy)

Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
ClientConnection2015-08
ClientConnection2015-08ClientConnection2015-08
ClientConnection2015-08Vic Hemard
 
ClientConnection2015-08
ClientConnection2015-08ClientConnection2015-08
ClientConnection2015-08Vic Hemard
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying Saskia1234
 
Maintaining safety of data and personal information in [autosaved]
Maintaining safety of data and personal information in [autosaved]Maintaining safety of data and personal information in [autosaved]
Maintaining safety of data and personal information in [autosaved]tjwatt
 
Write A Research Paper Writing
Write A Research Paper WritingWrite A Research Paper Writing
Write A Research Paper WritingMelanie Smith
 
Spam as social engineering presentation.
Spam as social engineering presentation.Spam as social engineering presentation.
Spam as social engineering presentation.fificoco
 
The internet and safety
The internet and safetyThe internet and safety
The internet and safetyPatricia bb
 
Error correction exercise identity theft cae
Error correction exercise identity theft caeError correction exercise identity theft cae
Error correction exercise identity theft caejeanphilippeguy
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdfMILANOP1
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 

Similaire à What do you do with a careless user (legacy) (20)

Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Internetsecurity
InternetsecurityInternetsecurity
Internetsecurity
 
cybersecurity-101_4
cybersecurity-101_4cybersecurity-101_4
cybersecurity-101_4
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
ClientConnection2015-08
ClientConnection2015-08ClientConnection2015-08
ClientConnection2015-08
 
ClientConnection2015-08
ClientConnection2015-08ClientConnection2015-08
ClientConnection2015-08
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Maintaining safety of data and personal information in [autosaved]
Maintaining safety of data and personal information in [autosaved]Maintaining safety of data and personal information in [autosaved]
Maintaining safety of data and personal information in [autosaved]
 
Write A Research Paper Writing
Write A Research Paper WritingWrite A Research Paper Writing
Write A Research Paper Writing
 
Spam as social engineering presentation.
Spam as social engineering presentation.Spam as social engineering presentation.
Spam as social engineering presentation.
 
500
500500
500
 
The internet and safety
The internet and safetyThe internet and safety
The internet and safety
 
Error correction exercise identity theft cae
Error correction exercise identity theft caeError correction exercise identity theft cae
Error correction exercise identity theft cae
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Security
SecuritySecurity
Security
 
Internet safety
Internet safetyInternet safety
Internet safety
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 

What do you do with a careless user (legacy)

  • 1. An educational and informative presentation by Mr. Scott Wilson Of the Oklahoma State University
  • 2. What do you do with a careless user, What do you do with a careless user, What do you do with a careless user, Early in the morning? Put him the back of the paddy wagon, Put him the back of the paddy wagon, Put him the back of the paddy wagon, Early in the morning! Throw him in the lock-up 'til he's sober, Throw him in the lock-up 'til he's sober, Throw him in the lock-up 'til he's sober, Early in the morning! Shave his belly with a rusty razor, Shave his belly with a rusty razor, Shave his belly with a rusty razor, Early in the morning!
  • 3. The Careless User’s Credo I will never change my password unless forced to do so My password will always be my dog’s name, unless it is “Password” I will use the same password for all places I need a password Any emails asking for my password must be legitimate All popups are valid and must be clicked on Updating software is something other people do My actions on my computer have no effect on my coworkers or on the organization as a whole
  • 4. “ All complex ecosystems have parasites.” --Katherine Myronuk Parasites will attack by deception, by making themselves look like something harmless. The careless user will always fall prey to these parasites, because he does not have the perception to penetrate the deception.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. What do you do with a careless user, What do you do with a careless user, What do you do with a careless user, Early in the morning?
  • 22. The Careful User’s Credo I understand why password security is important, and will strive to maintain it I can spot phishing emails and will not be deceived by them Safe web use is part of my daily routine I know how to browse without getting tricked It is my job to make sure that my applications are kept updated Doing so helps protect my computer – and me What I do with my computer and my accounts is an important part of who we are in extension I will therefore be diligent in keeping good practices for the benefit of myself and my colleagues
  • 23.
  • 24. “ Security is not a product, but a process.” – Bruce Schneier