3. Goals
• Promote cyber security awareness
• Offer self-protection techniques
• Discuss methods to secure personal information
• Provide examples of protection software
5. 0%
2%
4%
6%
8%
10%
12%
14%
Concerns
● Symantec blocked 5.5 billion malware attacks last year
– 81% increase over the previous year (computerworld.com)
● Kaspersky detecting 200,000 new/variant malwares per day (kaspersky.com)
Position Industry Rate
1 Education 146%
2 Retail & wholesale 104%
3 Health Care 100%
4 Banking & Finance 69%
5 Food & Beverage 58%
6 Government 46%
January Malware Encounters
Source:Cisco
Ratesabove100%reflecthigherthan
medianrateofencounter
United States 11.52%
Japan 3.47%
Colombia 2.53%
Source:Fortinet
France 1.87%
Canada 1.74%
Received Spam (Top 5 Regions)
13. Security Threats
• Phishing
From: MICHELLE REILLY [mailto:mreilly@westfieldnjk12.org]
Sent: Monday, January 28, 2013 11:21 PM
To: employee-web@webmaster.org
Subject: Important Technical Web Notice!
Important Technical Web Notice!
Your mailbox has exceeded one or more size limits set by the
administrator. You may not be able to send or receive new messages
until the mailbox size is reduced. For more space, please CLICK HERE
<http://systemcheck-res.ucoz.com/index1.htm> to upgrade your web
mail account.
The new secure feature upgrades your inbox to a clean, modern look
while maintaining your contacts, passwords, aliases and more. It's fast.
It's intuitive. It's email at its best.
Thank you for your cooperation.
Information and Technology DESK
THE MAIL TEAM.
23. Communication Security
• Anonymization
• Hides the true Internet address
• Masks the geographical location
• Circumvents online tracking technologies
• Software
• Tor
• Bounces on a network of relays
24. Communication Security
• HTTP vs HTTPS
• Encryption
• HTTPS
• Designed to withstand eavesdropping
• Subject to decryption by SSL stripping tools
• Wireshark with SSL decryption support
• HTTPS Everywhere
• FireFox plugin
• Chrome plugin
27. Mobile Security
Android; 69%
iOS; 19%
Blackberry; 5%
Symbian; 3%
Windows; 3% Others; 2%
Android iOS Blackberry Symbian Windows Others
Source: IDC Worldwide Mobile Phone Tracker, February 14, 2013
28. Mobile Defense
• Lock passwords
• Device encryption
• Tracking software
• Disable WiFi & Bluetooth when not in use
• Antivirus software
• Remote wipe