SlideShare une entreprise Scribd logo
1  sur  23
Librarians in the Wild

Thinking About Security, Privacy, and
         Digital Information
Lance Hayden
 Six years with the C.I.A.
 Master’s from UT iSchool, 1997
 Cisco Systems since 1998
 Ph.D. from UT iSchool, 2009
 Lecturer in UT iSchool since 1999
   Security Informatics
   We Like to Watch: Surveillance and Society
The Wild
 Term of art in computer security
   The “real world” (as opposed to the lab)


 A metaphor for where we live in a digital society
   Complexity, uncertainty, risk, and threat
   The technology landscape
   The changing environment in which we create and
   deploy digital information infrastructures (and the
   infrastructures themselves, sometimes)
Cities in the Jungle
 We build houses, shelters, and entire
 communities in cyberspace

 Civilization (security of our resources) summed
 up as:
   Confidentiality
   Integrity
   Availability


 We often behave in our communities in ways that
 would give us pause in the physical world
Expansion and Exposure
Four Axioms of Wilderness Life

 Large herds attract big predators


 Structures decay quickly in the wild


 Protective spells are treacherous


 Knowledge is the best survival trait
From Attrition: www.attrition.org/mirror/attritio
From Attrition: www.attrition.org/mirror/attritio
A Brief Survey
 What is your risk tolerance?


 Is your Internet-facing perimeter secure? Your
 wireless?

 Are your systems and applications patched and
 up to date?

 Do your employees and users choose strong
 passwords?

 Do you have a disaster recovery and business
Top Ten Passwords (RockYou
Hack)

1. 123456      6. princess
2. 12345       7. rockyou
3. 123456789   8. 1234567
4. Password    9. 12345678
5. iloveyou    10.abc123
Death by USB
Security & Privacy Norms
Security Resources
 ISO 27000 standards
  Plan-Do-Check-Act
  Security Controls
 Online Resources
  SANS – www.sans.org
  ISSA – www.issa.org
  ISACA – www.isaca.org
  www.insecure.org
  www.securityfocus.com
  www.cert.org
Questions?

Contenu connexe

Tendances

Security and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systemsSecurity and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systems
Marce Torres
 
SafetyNet_Advert
SafetyNet_AdvertSafetyNet_Advert
SafetyNet_Advert
Jason Clark
 

Tendances (19)

IT Security
IT SecurityIT Security
IT Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Security and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systemsSecurity and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systems
 
Network security
Network security Network security
Network security
 
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, HamonsSecurity workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
 
IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
 
SafetyNet_Advert
SafetyNet_AdvertSafetyNet_Advert
SafetyNet_Advert
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Cyber security Guide
Cyber security GuideCyber security Guide
Cyber security Guide
 
Defense in Depth
Defense in DepthDefense in Depth
Defense in Depth
 
Maleeff university of toronto 11 july 2019
Maleeff university of toronto 11 july 2019Maleeff university of toronto 11 july 2019
Maleeff university of toronto 11 july 2019
 
eScan Version 14 With Cloud Security.
eScan Version 14 With Cloud Security.eScan Version 14 With Cloud Security.
eScan Version 14 With Cloud Security.
 
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 

En vedette

En vedette (6)

Library as Publisher - handout
Library as Publisher - handoutLibrary as Publisher - handout
Library as Publisher - handout
 
Collaborating with IT to Deliver E-Reserves Using Drupal and Zotero
Collaborating with IT to Deliver E-Reserves Using Drupal and ZoteroCollaborating with IT to Deliver E-Reserves Using Drupal and Zotero
Collaborating with IT to Deliver E-Reserves Using Drupal and Zotero
 
Digging for Buried Treasure: Strategies for Promoting Institutional Repository
Digging for Buried Treasure: Strategies for Promoting Institutional RepositoryDigging for Buried Treasure: Strategies for Promoting Institutional Repository
Digging for Buried Treasure: Strategies for Promoting Institutional Repository
 
Can We Build It? Yes We Can! Building an ERM Solution at the University of No...
Can We Build It? Yes We Can! Building an ERM Solution at the University of No...Can We Build It? Yes We Can! Building an ERM Solution at the University of No...
Can We Build It? Yes We Can! Building an ERM Solution at the University of No...
 
Innovative Tools for Access: Enhancing Digital Collections with Emerging Tech...
Innovative Tools for Access: Enhancing Digital Collections with Emerging Tech...Innovative Tools for Access: Enhancing Digital Collections with Emerging Tech...
Innovative Tools for Access: Enhancing Digital Collections with Emerging Tech...
 
Promoting Use of EResources in Bangladesh: A Developing Country Perspective -...
Promoting Use of EResources in Bangladesh: A Developing Country Perspective -...Promoting Use of EResources in Bangladesh: A Developing Country Perspective -...
Promoting Use of EResources in Bangladesh: A Developing Country Perspective -...
 

Similaire à Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, and Digital Information - Lance Hayden

The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
laurieannwilliams
 
The nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurityThe nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurity
Sherry Jones
 
The nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurityThe nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurity
Sherry Jones
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
dr_edw777
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
hm5314581
 
Craig wilson
Craig wilsonCraig wilson
Craig wilson
IPPAI
 

Similaire à Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, and Digital Information - Lance Hayden (20)

The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
 
The nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurityThe nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurity
 
The nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurityThe nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurity
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
Dr. Alan Shark
Dr. Alan SharkDr. Alan Shark
Dr. Alan Shark
 
Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano Zanero
 
Mirror mirrror
Mirror mirrrorMirror mirrror
Mirror mirrror
 
Cyber security
Cyber security Cyber security
Cyber security
 
Windows of Opportunity in Hallways of Distractions: the race between threats,...
Windows of Opportunity in Hallways of Distractions: the race between threats,...Windows of Opportunity in Hallways of Distractions: the race between threats,...
Windows of Opportunity in Hallways of Distractions: the race between threats,...
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPT
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Introduction to the concept of it security
Introduction to the concept of it securityIntroduction to the concept of it security
Introduction to the concept of it security
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
 
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
 
Craig wilson
Craig wilsonCraig wilson
Craig wilson
 
Most Viewed Article in the Current Issue - International Journal of Distribut...
Most Viewed Article in the Current Issue - International Journal of Distribut...Most Viewed Article in the Current Issue - International Journal of Distribut...
Most Viewed Article in the Current Issue - International Journal of Distribut...
 
New Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecurityNew Paradigms for the Next Era of Security
New Paradigms for the Next Era of Security
 
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 

Plus de Electronic Resources & Libraries

Evaluating and Marketing Electronic Resources - Kennedy supplement material
Evaluating and Marketing Electronic Resources - Kennedy supplement materialEvaluating and Marketing Electronic Resources - Kennedy supplement material
Evaluating and Marketing Electronic Resources - Kennedy supplement material
Electronic Resources & Libraries
 

Plus de Electronic Resources & Libraries (20)

Electronic Resources and Libraries Workshop at INFO 2012, Tel Aviv
Electronic Resources and Libraries Workshop at INFO 2012, Tel AvivElectronic Resources and Libraries Workshop at INFO 2012, Tel Aviv
Electronic Resources and Libraries Workshop at INFO 2012, Tel Aviv
 
Evaluating and Marketing Electronic Resources: What are You “Really” Doing to...
Evaluating and Marketing Electronic Resources: What are You “Really” Doing to...Evaluating and Marketing Electronic Resources: What are You “Really” Doing to...
Evaluating and Marketing Electronic Resources: What are You “Really” Doing to...
 
Wednesday Closing speakers: Where are we headed? Tools & Technologies for the...
Wednesday Closing speakers: Where are we headed? Tools & Technologies for the...Wednesday Closing speakers: Where are we headed? Tools & Technologies for the...
Wednesday Closing speakers: Where are we headed? Tools & Technologies for the...
 
Recommendation and the Library
Recommendation and the LibraryRecommendation and the Library
Recommendation and the Library
 
Harvesting From Many Silos at Web-scale Makes E-content Truly Discoverable
Harvesting From Many Silos at Web-scale Makes E-content Truly  DiscoverableHarvesting From Many Silos at Web-scale Makes E-content Truly  Discoverable
Harvesting From Many Silos at Web-scale Makes E-content Truly Discoverable
 
E-Book on the Roll @ The University Alabama Libraries
E-Book on the Roll @ The University Alabama LibrariesE-Book on the Roll @ The University Alabama Libraries
E-Book on the Roll @ The University Alabama Libraries
 
Evaluating and Marketing Electronic Resources - Kennedy supplement material
Evaluating and Marketing Electronic Resources - Kennedy supplement materialEvaluating and Marketing Electronic Resources - Kennedy supplement material
Evaluating and Marketing Electronic Resources - Kennedy supplement material
 
Evaluating and Marketing Electronic Resources: What are You “Really” Doing to...
Evaluating and Marketing Electronic Resources: What are You “Really” Doing to...Evaluating and Marketing Electronic Resources: What are You “Really” Doing to...
Evaluating and Marketing Electronic Resources: What are You “Really” Doing to...
 
Developing a Methodology for Evaluating the Cost-effectiveness of Journal Pac...
Developing a Methodology for Evaluating the Cost-effectiveness of Journal Pac...Developing a Methodology for Evaluating the Cost-effectiveness of Journal Pac...
Developing a Methodology for Evaluating the Cost-effectiveness of Journal Pac...
 
Developing a Methodology for Evaluating the Cost-effectiveness of Journal Pac...
Developing a Methodology for Evaluating the Cost-effectiveness of Journal Pac...Developing a Methodology for Evaluating the Cost-effectiveness of Journal Pac...
Developing a Methodology for Evaluating the Cost-effectiveness of Journal Pac...
 
Living on the Bleeding Edge of Collection Development
Living on the Bleeding Edge of Collection DevelopmentLiving on the Bleeding Edge of Collection Development
Living on the Bleeding Edge of Collection Development
 
Where have all the print journals gone? Adapting Print Collections to an E-ce...
Where have all the print journals gone? Adapting Print Collections to an E-ce...Where have all the print journals gone? Adapting Print Collections to an E-ce...
Where have all the print journals gone? Adapting Print Collections to an E-ce...
 
E-Book Management — It Sounds Serial!
E-Book Management — It Sounds Serial!E-Book Management — It Sounds Serial!
E-Book Management — It Sounds Serial!
 
Collaborating with IT to Deliver E-Reserves Using Drupal and Zotero
Collaborating with IT to Deliver E-Reserves Using Drupal and ZoteroCollaborating with IT to Deliver E-Reserves Using Drupal and Zotero
Collaborating with IT to Deliver E-Reserves Using Drupal and Zotero
 
Serials Assessment Comes of Age - Valuing the Bundles Jewell
Serials Assessment Comes of Age - Valuing the Bundles JewellSerials Assessment Comes of Age - Valuing the Bundles Jewell
Serials Assessment Comes of Age - Valuing the Bundles Jewell
 
Serials Assessment Comes of Age - Caroll
Serials Assessment Comes of Age - CarollSerials Assessment Comes of Age - Caroll
Serials Assessment Comes of Age - Caroll
 
Patron- Driven Selection of eBooks - Safley
Patron- Driven Selection of eBooks - SafleyPatron- Driven Selection of eBooks - Safley
Patron- Driven Selection of eBooks - Safley
 
Patron- Driven Selection of eBooks - Hisle
Patron- Driven Selection of eBooks - HislePatron- Driven Selection of eBooks - Hisle
Patron- Driven Selection of eBooks - Hisle
 
Library as Publisher
Library as PublisherLibrary as Publisher
Library as Publisher
 
Fostering Learning and Technology Development in Technical Services
Fostering Learning and Technology Development in Technical ServicesFostering Learning and Technology Development in Technical Services
Fostering Learning and Technology Development in Technical Services
 

Dernier

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Dernier (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 

Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, and Digital Information - Lance Hayden

  • 1. Librarians in the Wild Thinking About Security, Privacy, and Digital Information
  • 2. Lance Hayden  Six years with the C.I.A.  Master’s from UT iSchool, 1997  Cisco Systems since 1998  Ph.D. from UT iSchool, 2009  Lecturer in UT iSchool since 1999  Security Informatics  We Like to Watch: Surveillance and Society
  • 3. The Wild  Term of art in computer security  The “real world” (as opposed to the lab)  A metaphor for where we live in a digital society  Complexity, uncertainty, risk, and threat  The technology landscape  The changing environment in which we create and deploy digital information infrastructures (and the infrastructures themselves, sometimes)
  • 4. Cities in the Jungle  We build houses, shelters, and entire communities in cyberspace  Civilization (security of our resources) summed up as:  Confidentiality  Integrity  Availability  We often behave in our communities in ways that would give us pause in the physical world
  • 6. Four Axioms of Wilderness Life  Large herds attract big predators  Structures decay quickly in the wild  Protective spells are treacherous  Knowledge is the best survival trait
  • 7.
  • 8.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. A Brief Survey  What is your risk tolerance?  Is your Internet-facing perimeter secure? Your wireless?  Are your systems and applications patched and up to date?  Do your employees and users choose strong passwords?  Do you have a disaster recovery and business
  • 19. Top Ten Passwords (RockYou Hack) 1. 123456 6. princess 2. 12345 7. rockyou 3. 123456789 8. 1234567 4. Password 9. 12345678 5. iloveyou 10.abc123
  • 22. Security Resources  ISO 27000 standards  Plan-Do-Check-Act  Security Controls  Online Resources  SANS – www.sans.org  ISSA – www.issa.org  ISACA – www.isaca.org  www.insecure.org  www.securityfocus.com  www.cert.org

Notes de l'éditeur

  1. Get over the distinction between wilderness and civilization – in cyberspace they are co-located.Rather than encroach on the wilderness, it increases as more people build things in it.
  2. Not being an alarmist – simply giving benefit of 20 years of experience at how easy it is to violate trust, take advantage of weakness, and inflict damage on the unsuspecting
  3. Think of each house as an application or a new system or serverEach new addition is filled with things that may be valuable – we build to hold our data, our applications, our processes, etc.Each new addition has doors, windows, chimneys and other ways in which to get inside. Some we know about, some we do not.
  4. Morris Worm was a mistake – stupid kid sets forest on fireHackers and vandals – digital cow tippingCrackers, punks, and lone gunmen – Eastwood in cyberspace, the wild westWar, terror, and crime – it’s now botnets and nation states
  5. The digital matchbookDumb kid sets woods on fire
  6. Hackers and vandals – digital cow tipping
  7. KevinMitnick
  8. Our cities and buildings are built of software, code, and metal boxes.As we add more systems and functions and apps we add more rooms, doors, and windowsThe environment is hostile – materials degrade and cracks form while predators keep looking for ways in (new hacks, new software) Confidentiality Integrity AvailabilityMaintaining integrity is a constant job and most of us allow our structures to fall into disrepair
  9. Security is like the wizard’s protective circle, drawn around our homes and offices – firewall code and malware signaturesSay the words incorrectly, out of order, or leave out an incantation, or fail to draw the circle exactly right, and the circle can be breached
  10. Using trojanUSBs as a social engineering attack
  11. Mark Zuckerberg – Privacy is no longer a social normEric Schmidt, Sergey Brin, Larry Page – Google in China