SlideShare une entreprise Scribd logo
1  sur  47
Online
       Self-Defense
Don’t Let Bad Stuff Happen To You
                    Barry Caplin
         Chief Information Security Officer
      Minnesota Department of Human Services
             barry.caplin@state.mn.us

               Slides on InfoLink
Happy
  CyberSecurity
    Month!
(and belated Happy National Coffee day!)
2 Main Issues

• Passwords
• Clicking on Links
Passwords

Why Are They A Problem?
•Hard to remember
•Hard to enter
•Need too many
•Inconsistent Rules
•Changes
How Passwords Work
• Site saves encrypted pw
• At login – enter pw – it’s encrypted
  and compared to stored value
• Some sites:
  – Don’t encrypt well
  – Don’t encrypt at all!
Password Hacks in the News

It was a busy year
How Passwords Get Hacked
• Site attacked – many methods
• Encrypted pw file downloaded
  (should be more difficult!)
• Over time, hackers crack the file

• What does that get them?
Passwords
• Avg. web user has:
  – 25 separate accounts but
  – 6.5 unique passwords
     password reuse – not good

• So…
Password Self-Defense

1.   Don’t reuse passwords
2.   Only enter on secure sites
3.   Login notifications
4.   Choose good (long) passwords
Password Self-Defense

5.   Vault it
6.   Care with “secret” questions
7.   Care with linking accounts
8.   2-step authentication
9.   Use separate email addresses
Password Self-Defense

Handouts
• Password Self-Defense tips
  and resources
Safe Computer Use
      and Web Surfing
Don’t Click!
How Your Computer Gets Sick
• Attachments
• Downloads
  – Intentional
    • Clicks
    • URL shortening
  – Unintentional - Website Visits/Drive-
    By
Attachments
•   File sent via email
•   Can execute when clicked
•   doc, xls, pdf, jpg (and other images), etc.
•   Even zip files can cause problems

• Only open expected attachments
• Don’t open chain emails
• Watch holiday emails
Downloads
• Intentional – Clicking on link downloads
  page or file
Click here to download




                     http://www.download.com/filename
Downloads
• Only some executables ask permission
  – Dialog boxes often ignored
URL shortening
• http://ht.cdn.turner.com/si/danpatrick/aud
  io/2009/11/03/DP-Hr3_11-03-
  2009_stream.mp3 or…
• http://bit.ly/2d5LUP

• bit.ly, tinyurl.com, others

• Some browsers support URL lengthening
  – Long URL Please
URL lengthening
Safe Surfing Tips
•   Look before you click
•   Use Link Rating
•   Consider the source (subjective)
•   Beware – file sharing, gaming, gambling,
    questionable legality
Safe Surfing Tips
• Use Care – Social Networking (limit
  apps), ads, pop-ups, banners
• https and lock for shopping, banking, etc.
• Limit – open/public networks, scripts
• Protect web pw’s
Safe Surfing Tips


Handouts
• PC Protection Tips/Tools
• Safe Surfing Tips
Phishing
Phishing

Looks real, but rarely is
From a familiar business (not)
May threaten to close account, warn of fraud or
  virus
Legitimate businesses will not ask for private
  info via email

http://192.160.201.5/trusted.bank/index.htm
Phishing on Social Networks
Scams seem real when they come from a
  “friend”
Malicious links/apps
Spread quickly when posted or “liked”
“Just say no” to apps
• Installs app
• Grabs info
• Posts on your wall
• Click-fraud
Phone Phishing
At work: gain access/info,
 supplement intel
  Impersonate user/exec/vendor
  Ask probing questions or for
    access
At home: get personal/financial
 info
  Verify cc, ssn, etc.
  Use fear of theft or fraud to
   commit theft or fraud!
Tips to Avoid Phishing
Look before you Click - Don’t click links
 asking for personal info
Never enter personal info in a pop-up
Use spam filters, anti-virus/spyware, and keep
 updated
Only open email attachments you’re expecting
Don’t give out personal info over the phone
 unless you initiated the call
Tips to Avoid Phishing
Know what you’ve posted about yourself on
  social networks
Know who your “friends” are
Use care with apps
Recheck your social network privacy settings
Verify callers asking for “too much” info
Initiate calls to known numbers for banks, etc.
Act immediately if you’ve been hooked
Tips for Avoiding Phishing

Handouts
• Top Tips to Help Avoid
  Phishing Scams
• 10 Tips for Social
  Networking Safety
Mobile Devices
Computer is always with you
•Device theft
•Data theft
•Wireless networks
•Malicious software
•Geolocation
Device Theft
• How to protect
  your devices
  when you’re
  mobile?

• Keep it with
  you, or
• Lock it up –
  out of sight
Data Theft
• Most people have a device: smartphone,
  tablet, netbook, laptop
• Do you know your surroundings?
• What network are you using?
Data Theft
Shoulder surfing…
Data Theft
• USB devices
• “evil maid”




• Be aware of
  your
  surroundings
Wireless Networks
• Open Wi-Fi
• “evil twin”
• firesheep
Wireless Networks
• Use Wi-fi with WPA2
• Verify your connection (ask the provider)
• 3G/4G relatively safer… for now
Malicious Software
• There’s an app
  for that!

• Use official
  app markets
• Use anti-
  malware
Geolocation


The world knows
• Where you are
• Where you are not
Tips for Mobile Devices
• Use official app markets
• Use anti-malware
• Keep your device close or locked-up out of
  sight
• Watch your surroundings
• Be stingy with your personal data
Tips for Mobile Devices
• No government data on personal devices
• Use only DHS-managed connections
  
Tips for Mobile Devices

Handouts
• 10 Tips for Securing Your
  Mobile Device
Let’s Be Careful Out There
Discussion?

Contenu connexe

Tendances

Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
stephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
stephensc
 
Online reputation
Online reputationOnline reputation
Online reputation
esl2m
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
stephensc
 

Tendances (17)

An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
An Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And MoreAn Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And More
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Internet safety presentation sv
Internet safety presentation svInternet safety presentation sv
Internet safety presentation sv
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 

En vedette

Self defence workshops for women - part i
Self defence workshops for women - part iSelf defence workshops for women - part i
Self defence workshops for women - part i
Kravmaga Sreeram
 
Self Defence, Defence of Another and Prevention of a Crime Lecture
Self Defence, Defence of Another and Prevention of a Crime LectureSelf Defence, Defence of Another and Prevention of a Crime Lecture
Self Defence, Defence of Another and Prevention of a Crime Lecture
shummi
 
Self defence
Self defenceSelf defence
Self defence
Miss Hart
 
Self defense 2
Self defense 2Self defense 2
Self defense 2
107750
 

En vedette (16)

Strategic Self Defense
Strategic Self DefenseStrategic Self Defense
Strategic Self Defense
 
Six Principle Of Self Defense
Six Principle Of Self DefenseSix Principle Of Self Defense
Six Principle Of Self Defense
 
Self Defense Tactics Don't Always Have to Involve Violence
Self Defense Tactics Don't Always Have to Involve ViolenceSelf Defense Tactics Don't Always Have to Involve Violence
Self Defense Tactics Don't Always Have to Involve Violence
 
Karate self defense
Karate self defenseKarate self defense
Karate self defense
 
4 self defence techniques
4 self defence techniques4 self defence techniques
4 self defence techniques
 
The Gentle Art of Verbal Self Defense Working with Difficult People And Impro...
The Gentle Art of Verbal Self Defense Working with Difficult People And Impro...The Gentle Art of Verbal Self Defense Working with Difficult People And Impro...
The Gentle Art of Verbal Self Defense Working with Difficult People And Impro...
 
MARTIAL ARTS : The Art of Self-Defence
MARTIAL ARTS : The Art of Self-DefenceMARTIAL ARTS : The Art of Self-Defence
MARTIAL ARTS : The Art of Self-Defence
 
Self defence workshops for women - part i
Self defence workshops for women - part iSelf defence workshops for women - part i
Self defence workshops for women - part i
 
Female Self Defense
Female Self DefenseFemale Self Defense
Female Self Defense
 
Self Defence, Defence of Another and Prevention of a Crime Lecture
Self Defence, Defence of Another and Prevention of a Crime LectureSelf Defence, Defence of Another and Prevention of a Crime Lecture
Self Defence, Defence of Another and Prevention of a Crime Lecture
 
Self defence
Self defenceSelf defence
Self defence
 
Self Defence For Women
Self Defence For WomenSelf Defence For Women
Self Defence For Women
 
Self defense 2
Self defense 2Self defense 2
Self defense 2
 
Verbal self defense
Verbal self defenseVerbal self defense
Verbal self defense
 
Self defense power point by giri bdr. sunar
Self defense power point by giri bdr. sunarSelf defense power point by giri bdr. sunar
Self defense power point by giri bdr. sunar
 
15 common defense mechanisms
15 common defense mechanisms15 common defense mechanisms
15 common defense mechanisms
 

Similaire à Online Self Defense

Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 

Similaire à Online Self Defense (20)

Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Lesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internetLesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internet
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Online reputation
Online reputationOnline reputation
Online reputation
 
security.ppt
security.pptsecurity.ppt
security.ppt
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Cybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22.pptxCybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22.pptx
 
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptxCybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx
 

Plus de Barry Caplin

Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
Barry Caplin
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
Barry Caplin
 

Plus de Barry Caplin (20)

Healing healthcare security
Healing healthcare securityHealing healthcare security
Healing healthcare security
 
It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503
 
Dreaded Embedded sec360 5-17-16
Dreaded Embedded   sec360 5-17-16Dreaded Embedded   sec360 5-17-16
Dreaded Embedded sec360 5-17-16
 
It’s not if but when 20160503
It’s not if but when 20160503It’s not if but when 20160503
It’s not if but when 20160503
 
Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!
 
CISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusCISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from Venus
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and Cyberbullying
 
3 factors of fail sec360 5-15-13
3 factors of fail   sec360 5-15-133 factors of fail   sec360 5-15-13
3 factors of fail sec360 5-15-13
 
Tech smart preschool parent 2 13
Tech smart preschool parent 2 13Tech smart preschool parent 2 13
Tech smart preschool parent 2 13
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG Security
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso says
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental Insider
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social Networks
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refs
 

Dernier

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Online Self Defense

  • 1. Online Self-Defense Don’t Let Bad Stuff Happen To You Barry Caplin Chief Information Security Officer Minnesota Department of Human Services barry.caplin@state.mn.us Slides on InfoLink
  • 2. Happy CyberSecurity Month! (and belated Happy National Coffee day!)
  • 3.
  • 4. 2 Main Issues • Passwords • Clicking on Links
  • 5. Passwords Why Are They A Problem? •Hard to remember •Hard to enter •Need too many •Inconsistent Rules •Changes
  • 6. How Passwords Work • Site saves encrypted pw • At login – enter pw – it’s encrypted and compared to stored value • Some sites: – Don’t encrypt well – Don’t encrypt at all!
  • 7. Password Hacks in the News It was a busy year
  • 8. How Passwords Get Hacked • Site attacked – many methods • Encrypted pw file downloaded (should be more difficult!) • Over time, hackers crack the file • What does that get them?
  • 9. Passwords • Avg. web user has: – 25 separate accounts but – 6.5 unique passwords  password reuse – not good • So…
  • 10. Password Self-Defense 1. Don’t reuse passwords 2. Only enter on secure sites 3. Login notifications 4. Choose good (long) passwords
  • 11. Password Self-Defense 5. Vault it 6. Care with “secret” questions 7. Care with linking accounts 8. 2-step authentication 9. Use separate email addresses
  • 12. Password Self-Defense Handouts • Password Self-Defense tips and resources
  • 13. Safe Computer Use and Web Surfing
  • 15. How Your Computer Gets Sick • Attachments • Downloads – Intentional • Clicks • URL shortening – Unintentional - Website Visits/Drive- By
  • 16. Attachments • File sent via email • Can execute when clicked • doc, xls, pdf, jpg (and other images), etc. • Even zip files can cause problems • Only open expected attachments • Don’t open chain emails • Watch holiday emails
  • 17. Downloads • Intentional – Clicking on link downloads page or file Click here to download http://www.download.com/filename
  • 18. Downloads • Only some executables ask permission – Dialog boxes often ignored
  • 19. URL shortening • http://ht.cdn.turner.com/si/danpatrick/aud io/2009/11/03/DP-Hr3_11-03- 2009_stream.mp3 or… • http://bit.ly/2d5LUP • bit.ly, tinyurl.com, others • Some browsers support URL lengthening – Long URL Please
  • 21. Safe Surfing Tips • Look before you click • Use Link Rating • Consider the source (subjective) • Beware – file sharing, gaming, gambling, questionable legality
  • 22. Safe Surfing Tips • Use Care – Social Networking (limit apps), ads, pop-ups, banners • https and lock for shopping, banking, etc. • Limit – open/public networks, scripts • Protect web pw’s
  • 23. Safe Surfing Tips Handouts • PC Protection Tips/Tools • Safe Surfing Tips
  • 25. Phishing Looks real, but rarely is From a familiar business (not) May threaten to close account, warn of fraud or virus Legitimate businesses will not ask for private info via email
  • 27. Phishing on Social Networks Scams seem real when they come from a “friend” Malicious links/apps Spread quickly when posted or “liked” “Just say no” to apps
  • 28. • Installs app • Grabs info • Posts on your wall • Click-fraud
  • 29. Phone Phishing At work: gain access/info, supplement intel Impersonate user/exec/vendor Ask probing questions or for access At home: get personal/financial info Verify cc, ssn, etc. Use fear of theft or fraud to commit theft or fraud!
  • 30. Tips to Avoid Phishing Look before you Click - Don’t click links asking for personal info Never enter personal info in a pop-up Use spam filters, anti-virus/spyware, and keep updated Only open email attachments you’re expecting Don’t give out personal info over the phone unless you initiated the call
  • 31. Tips to Avoid Phishing Know what you’ve posted about yourself on social networks Know who your “friends” are Use care with apps Recheck your social network privacy settings Verify callers asking for “too much” info Initiate calls to known numbers for banks, etc. Act immediately if you’ve been hooked
  • 32. Tips for Avoiding Phishing Handouts • Top Tips to Help Avoid Phishing Scams • 10 Tips for Social Networking Safety
  • 33. Mobile Devices Computer is always with you •Device theft •Data theft •Wireless networks •Malicious software •Geolocation
  • 34. Device Theft • How to protect your devices when you’re mobile? • Keep it with you, or • Lock it up – out of sight
  • 35. Data Theft • Most people have a device: smartphone, tablet, netbook, laptop • Do you know your surroundings? • What network are you using?
  • 37. Data Theft • USB devices • “evil maid” • Be aware of your surroundings
  • 38.
  • 39. Wireless Networks • Open Wi-Fi • “evil twin” • firesheep
  • 40. Wireless Networks • Use Wi-fi with WPA2 • Verify your connection (ask the provider) • 3G/4G relatively safer… for now
  • 41. Malicious Software • There’s an app for that! • Use official app markets • Use anti- malware
  • 42. Geolocation The world knows • Where you are • Where you are not
  • 43. Tips for Mobile Devices • Use official app markets • Use anti-malware • Keep your device close or locked-up out of sight • Watch your surroundings • Be stingy with your personal data
  • 44. Tips for Mobile Devices • No government data on personal devices • Use only DHS-managed connections 
  • 45. Tips for Mobile Devices Handouts • 10 Tips for Securing Your Mobile Device
  • 46. Let’s Be Careful Out There

Notes de l'éditeur

  1. Foursquare, google latitude, pleaserobme