SlideShare a Scribd company logo
1 of 105
4/1/11 Barry Wilson/Scott McNulty – Wharton Computing 4/1/11 Techfast: Security – Not just for banks
Who Are We?And what do we do? 2 Wharton Computing
Two quotes from experts 3 As head of security it is my duty to be... concerned. - Worf, USS Enterprise By failing to prepare, you are preparing to fail. 	 - B. Franklin, local celebrity Wharton Computing 4/1/11
The Internet is out to get you (only a little) 4 Wharton Computing 4/1/11
Password Rules of Thumb WHARTON COMPUTING 5
No sharing passwords between accounts 4/1/11 WHARTON COMPUTING 6
One password to spoil them all 7 Wharton Computing 4/1/11
No short passwords 4/1/11 Wharton Computing 8
No Dictionary Words 4/1/11 WHARTON COMPUTING 9
No personal information 4/1/11 WHARTON COMPUTING 10
Passphrases: exception to the rules 11 Wharton Computing 4/1/11 Very long Easy to remember Hard to crack
Example passphrase My, aren’t members of Wharton Computing good looking?  4/1/11 WHARTON COMPUTING 12
How Secure is your password? 4/1/11 13 http://howsecureismypassword.net Wharton Computing
How long will it take to crack these passwords: 14 Wharton Computing 4/1/11
password 15 Wharton Computing
Instantly 4/1/11 16 Wharton Computing
Other common passwords 4/1/11 Wharton Computing 17
Password Cracking 101 WHARTON COMPUTING 18
Dictionary Attacks 4/1/11 Wharton Computing 19 http://mtyourmind.10001mb.com/2009/0127/
Rainbow Table 4/1/11 WHARTON COMPUTING 20 http://www.elsingadesign.com/
Brute Force attacks 4/1/11 Wharton Computing 21 http://ryan.skow.org/siege/Fields2002/SaturdayBattleReport.html
Social engineering 4/1/11 WHARTON COMPUTING 22 http://news.bbc.co.uk/2/hi/technology/3639679.stm
Password Tip 1 o = 0 4/1/11 Wharton Computing 23
Password Tip 2 cAmelCaSe 4/1/11 Wharton Computing 24
passW0rd 25 Wharton Computing
10 Days 4/1/11 26 Wharton Computing
Password Tip 3 $pec!@l Ch@r@cter$ 4/1/11 WHARTON coMPUTING 27
p055W0rD! 28 Wharton Computing
9 Years 4/1/11 29 Wharton Computing
My, aren’t members of Wharton Computing good looking?  30 Wharton Computing
560 tresvigintillion years 4/1/11 31 Wharton Computing
Managing your passwords the old way 32 Wharton Computing 4/1/11
169 days 4/1/11 33 Wharton Computing
Managing your passwords the old way 34 Wharton Computing 4/1/11
Managing your passwords the secure way 35 Password Safe http://passwordsafe.sourceforge.net/ 1Password http://agilewebsolutions.com/onepassword/ Wharton Computing 4/1/11
Phishing 36 Wharton Computing
As defined by the OED 4/1/11 WHARTON COMPUTING 37
Tips for identifying a phishing email 38 Wharton Computing 4/1/11
Phishing - browser address bar 39 Wharton Computing 4/1/11
Phishing - browser address bar 40 Wharton Computing 4/1/11
Phishing - browser address bar - SSL 41 Wharton Computing 4/1/11
Phishing - browser address bar - SSL 42 Wharton Computing 4/1/11
Phishing – Poor wording 43 Wharton Computing 4/1/11
Phishing – Check the sender 44 From: Usman Bagudu <Usman.Bagudu@pet.hw.ac.uk> Wharton Computing 4/1/11
Phishing – asks for your password 4/1/11 WHARTON COMPUTING 45
Phishing email or not? 4/1/11 WHARTON COMPUTING 46
Phishing email or not? 4/1/11 WHARTON COMPUTING 47 Undisclosed recipients PHISHING! Not a Penn Web site. Not a real group @ Penn
When in doubt: ask 4/1/11 WHARTON COMPUTING 48
Defending against Phishing 4/1/11 WHARTON COMPUTING 49
Defending against Phishing 4/1/11 WHARTON COMPUTING 50
Defending against Phishing 4/1/11 WHARTON COMPUTING 51
What to do if you respond to a phishing email 52 http://mantia.me/wallpaper/dont-panic/ Wharton Computing 4/1/11
Tell Someone 53 Wharton Computing 4/1/11
Change your passwords 54 Wharton Computing 4/1/11
Review Statements 55 Wharton Computing 4/1/11
Contact the authorities Wharton: security@wharton.upenn.edu FTC: 1-877-ID-THEFT or  https://www.ftccomplaintassistant.gov/ Police Credit Card issuers: Setup a fraud alert 56 Wharton Computing 4/1/11
Home Computers 57 Wharton Computing
Avoid: no-name anti-virus 58 Image credit: Complete Computer Repair of CT (http://tinyurl.com/272uvla) Wharton Computing 4/1/11
Avoid: downloading © material 59 Wharton Computing 4/1/11
Forewarned is Forearmed. 60 Wharton Computing
Automatic Software Updates 61 Wharton Computing 4/1/11
Software Updates – 3rd Party Software 62 Wharton Computing 4/1/11
Install Antivirus software 63 http://www.upenn.edu/computing/virus/ Wharton Computing 4/1/11
Install Antivirus software 64 Wharton Computing 4/1/11
Firewall 65 Credit: Stuck in Customs http://www.flickr.com/photos/stuckincustoms/1194563275/in/photostream/ Wharton Computing 4/1/11
Firewall – Windows 7 4/1/11 WHARTON COMPUTING 66
Firewall – Windows 7 4/1/11 WHARTON COMPUTING 67
Firewall – Windows 7 4/1/11 WHARTON COMPUTING 68
Firewall – OS X 4/1/11 WHARTON COMPUTING 69
Firewall – OS X 4/1/11 WHARTON COMPUTING 70
Firewall – OS X 4/1/11 WHARTON COMPUTING 71
Home computers: Ideal vs. Reality 72 Wharton Computing 4/1/11
Home computers: Ideal Dedicated computer: Only you use your computer. Password protected. 73 Wharton Computing 4/1/11
Home computers: Practical Multiple accounts: Each user has their own individual account. VPN. Don’t store work files on home computer. 74 Wharton Computing 4/1/11
Mobile devices 75 Wharton Computing 4/1/11
Mobile devices: set a password 76 Wharton Computing 4/1/11
Mobile devices: remote wipe 77 Wharton Computing 4/1/11
Mobile devices: encryption 78 Wharton Computing 4/1/11
IPAD DEMO Wharton Computing 79
Confidential Data WHARTON COMPUTING 80
Nobody wants this 81 Wharton Computing 4/1/11
Or this… 82 Wharton Computing 4/1/11
Or this! 4/1/11 WHARTON COMPUTING 83
Confidential Data – What is it? 84 Wharton Computing 4/1/11
Legally Protected As defined by the government. SSNs Credit Card Data Bank Account information Medical data Student enrollment data (anything defined in FERPA) 85 Wharton Computing 4/1/11
University Protected As defined by the University All the legally protected info + Salary information Tax and payroll information Data we have agreed to keep confidential:  ,[object Object],86 Wharton Computing 4/1/11
University Policy “This policy establishes expectations around the use of SSNs - sensitive data whose misuse poses privacy risks to individuals, and compliance and reputational risks to the University. It calls on staff, faculty, contractors, and agents of the above to inventory their online and offline SSNs and reduce the above risks by, in priority order: (1) eliminating this data altogether, (2) converting it to PennID, (3) truncating the data to capture and display only the last four digits, (4) when the complete SSN is clearly necessary, ensuring strict security controls to protect the full data.” 87 Wharton Computing 4/1/11
University Policy - Summary Four easy things to do: Eliminate Convert (to PennID) Truncate Secure 88 Wharton Computing 4/1/11
Identity Finder 4/1/11 WHARTON COMPUTING 89
Why Identity Finder? Cross platform Centrally managed Best in class software 4/1/11 WHARTON COMPUTING 90
Identity Finder 91 Wharton Computing 4/1/11
Shredding files 4/1/11 WHARTON COMPUTING 92
Identity Finder Management Console 4/1/11 WHARTON COMPUTING 93
Identity Finder Management Console 4/1/11 WHARTON COMPUTING 94
IMPORTANT None of your data is transmitted/stored on the Identity Finder Management server Only location/general type of found data is transmitted (securely) No data will be deleted from your computer by Wharton Computing without your consent 4/1/11 WHARTON COMPUTING 95
How “dangerous” is your confidential data? 3 questions to help gauge your risk How much do you have? Who does it include? What else is stored with it? 96 Wharton Computing 4/1/11
How do youmanageit? Know what you have Keep it separated Make sure it is secure 97 Wharton Computing 4/1/11
Securingyourconfidential data Store it on a central server Back it up Encrypt it 98 Wharton Computing 4/1/11
Securingyourconfidential data Never let anyone log in as you. Don’t allow workstudies to use a computer that contains confidential data 99 Wharton Computing 4/1/11
Hacking happens WHARTON COMPUTING 100
The Process 101 Wharton Computing 4/1/11
Questions? 102 Wharton Computing
http://beacon.wharton.upenn.edu/security/techfast WHARTON COMPUTING 103 4/1/11
Contact us 104 Barry Wilson Chief Security Officer wilsonbf@wharton.upenn.edu Scott McNulty	 Sr. IT Project Leader smcnulty@wharton.upenn.edu security@wharton.upenn.edu http://beacon.wharton.upenn.edu/security Wharton Computing 4/1/11
Tell us what you think! Tech-fast@wharton.upenn.edu 4/1/11 WHARTON COMPUTING 105

More Related Content

Similar to Wharton Computing Techfast: Security

5 things it should be doing (but isn't!)
5 things it should be doing (but isn't!)5 things it should be doing (but isn't!)
5 things it should be doing (but isn't!)Mike Egli
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxmccormicknadine86
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxsleeperharwell
 
Blueprint for Security Architecture & Strategy.pdf
Blueprint for Security Architecture & Strategy.pdfBlueprint for Security Architecture & Strategy.pdf
Blueprint for Security Architecture & Strategy.pdfFetri Miftach
 
How to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorHow to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorJeremiah Grossman
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018Fizaril Amzari Omar
 

Similar to Wharton Computing Techfast: Security (9)

5 things it should be doing (but isn't!)
5 things it should be doing (but isn't!)5 things it should be doing (but isn't!)
5 things it should be doing (but isn't!)
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
Blueprint for Security Architecture & Strategy.pdf
Blueprint for Security Architecture & Strategy.pdfBlueprint for Security Architecture & Strategy.pdf
Blueprint for Security Architecture & Strategy.pdf
 
How to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorHow to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare Sector
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
 
E-Notice and E-Filing Tips
E-Notice and E-Filing TipsE-Notice and E-Filing Tips
E-Notice and E-Filing Tips
 

Recently uploaded

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 

Recently uploaded (20)

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

Wharton Computing Techfast: Security

Editor's Notes

  1. phishing |ˈfi sh i ng |nounthe activity of defrauding an online account holder of financial information by posing as a legitimate company
  2. VPN: Sentinal.wharton.upenn.edu