SlideShare une entreprise Scribd logo
1  sur  17
MAKING SECURE CHOICES
      Charles Garrett
        ISSA:MSC
OBJECTIVES
•   Show how much information can be found on the internet
•   Provide best practices when it comes to information sharing.
•   Learn how to develop strong passwords
•   Learn how to use mobile devices securely.




                                                                   2
PROFESSIONAL WEBSITE




                       3
PROFESSIONAL WEBSITE




                       4
PERSONAL INFORMATION
•   Full Name
•   Date of Birth or Age
•   Phone number
•   Location
•   Financial Information
•   Schedule (What you do and where you go.) (Ex. Checking in on social media)




                                                                                 5
WEB PAGES/IDENTIFIERS
•   Profiles
•   Newsgroup Postings
•   Social Networking profiles
•   Personal or Business Websites
•   Newspapers
•   Ebay
•   General Web Presence
•   Screen Names or Email Addresses




                                      6
INFORMATION GIVEN UP
•   Screen names and email addresses shouldn’t tell anything about you.
•   Poor Ex.
1. John12343
2. GADAWGSLUVA
3. Lucy_Waycross12343




                                                                          7
BETTER SCREEN NAMES
•   B!@ck&Ye1L0W
•   Keychains101
•   PepperSpray




                      8
ACTIVITY: INFORMATION GATHERING
•   HINTS:
1. Use whole name (can include initials)
2. Use quotes
3. Search with name forward/backward
4. Use quotes spaces with phone numbers and addresses




                                                        9
PASSWORD DEVELOPMENT
•   Bad examples:
•   Password
•   Qwerty
•   123456
•   Any word in the dictionary


•   Good Examples. Hint Passphrase
•   b!@ck&yE1L0w
•   q@w4dgf*542




                                     10
PASSWORD DEVELOPMENT
•   Basic Concepts
•   Length of Password (8 char min. 10+ < Preferable)
•   Complexity of Password (As random as possible)
•   Use lowercase, uppercase, numbers, and symbols in a random sequence.




                                                                           11
PASSWORD TIPS
•   Create a unique password for each account.
•   Never share or write down your password.
•   Use a passphrase so it is easy to remember.
•   Change passwords if your email or system has a virus.




                                                            12
WORKING REMOTELY
• Working remotely provides many professionals with the freedom to complete
  work related tasks from almost any location.


• The challenge is that many are unaware of the security vulnerabilities and
  regular maintenance required to protect their devices.




                                                                               13
BEST PRACTICES: SOFTWARE
•   Ensure virus protection is installed, enabled, and up to date.
•   Ensure Windows Firewall is turned ON.
•   Ensure all software applications like Java and Flash are up to date.
•   NEVER install software that is not necessary for work related tasks.
•   NEVER allow non-BBBS employees to use installed software.




                                                                           14
BEST PRACTICES: PASSWORDS
•   Protect passwords that are used to access BBBS information.
•   Ensure your machine have STRONG passwords.
•   Ensure that passwords are changed a MINIMUM of 6 months.
•   Ensure all mobile devices have a timeout function that lock the screen.
•   NEVER use the “Remember this password” function in an internet browser.
•   Use software like LastPass to properly secure passwords.




                                                                              15
BEST PRACTICES: INFORMATION MANAGEMENT
•   Invest in a backup solution and back it up once every two weeks. (flash drive, external
    HD, etc.)
•   Protect devices by enabling a lock and wipe function on mobile devices such as tablets
    and smartphones.
•   ALWAYS ensure that all BBBS information is encrypted.
•   Remove unnecessary information when it is no longer needed on the machine.
•   Ensure that when you work remotely that you do not leave your computer unattended for
    any period of time.




                                                                                              16
SOURCES
•   GBI Cyber Security Awareness




                                   17

Contenu connexe

Tendances

The deep web
The deep webThe deep web
The deep webAGDNello
 
Tablet pc by jangid
Tablet pc  by jangidTablet pc  by jangid
Tablet pc by jangidJANGID_ML
 
Prism break: Minimize surveillance and protect your privacy
Prism break: Minimize surveillance and protect your privacyPrism break: Minimize surveillance and protect your privacy
Prism break: Minimize surveillance and protect your privacydjtennant
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Andrew Schwabe
 
Level 3 Mobile Learning Synthesis Project
Level 3 Mobile Learning Synthesis ProjectLevel 3 Mobile Learning Synthesis Project
Level 3 Mobile Learning Synthesis Projectclaw147
 
So you want to be a wireless hacker
So you want to be a wireless hackerSo you want to be a wireless hacker
So you want to be a wireless hackerCasey Dunham
 

Tendances (7)

The deep web
The deep webThe deep web
The deep web
 
Sunclock
SunclockSunclock
Sunclock
 
Tablet pc by jangid
Tablet pc  by jangidTablet pc  by jangid
Tablet pc by jangid
 
Prism break: Minimize surveillance and protect your privacy
Prism break: Minimize surveillance and protect your privacyPrism break: Minimize surveillance and protect your privacy
Prism break: Minimize surveillance and protect your privacy
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
 
Level 3 Mobile Learning Synthesis Project
Level 3 Mobile Learning Synthesis ProjectLevel 3 Mobile Learning Synthesis Project
Level 3 Mobile Learning Synthesis Project
 
So you want to be a wireless hacker
So you want to be a wireless hackerSo you want to be a wireless hacker
So you want to be a wireless hacker
 

Similaire à Making Secure Choices

eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeAVG Technologies AU
 
Aegis Personal Cybersecurity 101
Aegis Personal Cybersecurity 101Aegis Personal Cybersecurity 101
Aegis Personal Cybersecurity 101Nick Powers
 
Information Security Awareness Orientation
Information Security Awareness OrientationInformation Security Awareness Orientation
Information Security Awareness Orientationmohannadalhanahnah
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacycdunk12
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Security and Privacy Brown Bag
Security and Privacy Brown BagSecurity and Privacy Brown Bag
Security and Privacy Brown Bag501 Commons
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Deepak Khari
 
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16TechSoup
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidErnest Staats
 
EEAS - Cultivate your data protection
EEAS - Cultivate your data protectionEEAS - Cultivate your data protection
EEAS - Cultivate your data protectionTommy Vandepitte
 
Digital security for Sri Lankan activists
Digital security for Sri Lankan activistsDigital security for Sri Lankan activists
Digital security for Sri Lankan activistsSanjana Hattotuwa
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Innovation
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular usersGeoffrey Vaughan
 

Similaire à Making Secure Choices (20)

eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers Safe
 
Aegis Personal Cybersecurity 101
Aegis Personal Cybersecurity 101Aegis Personal Cybersecurity 101
Aegis Personal Cybersecurity 101
 
10 things to teach end users
10 things to teach end users10 things to teach end users
10 things to teach end users
 
Information Security Awareness Orientation
Information Security Awareness OrientationInformation Security Awareness Orientation
Information Security Awareness Orientation
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Security and Privacy Brown Bag
Security and Privacy Brown BagSecurity and Privacy Brown Bag
Security and Privacy Brown Bag
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Computer / Internet Security WHPL
Computer / Internet Security WHPLComputer / Internet Security WHPL
Computer / Internet Security WHPL
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
EEAS - Cultivate your data protection
EEAS - Cultivate your data protectionEEAS - Cultivate your data protection
EEAS - Cultivate your data protection
 
Computers for Beginners
Computers for Beginners Computers for Beginners
Computers for Beginners
 
Digital security for Sri Lankan activists
Digital security for Sri Lankan activistsDigital security for Sri Lankan activists
Digital security for Sri Lankan activists
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Data security
Data securityData security
Data security
 

Making Secure Choices

  • 1. MAKING SECURE CHOICES Charles Garrett ISSA:MSC
  • 2. OBJECTIVES • Show how much information can be found on the internet • Provide best practices when it comes to information sharing. • Learn how to develop strong passwords • Learn how to use mobile devices securely. 2
  • 5. PERSONAL INFORMATION • Full Name • Date of Birth or Age • Phone number • Location • Financial Information • Schedule (What you do and where you go.) (Ex. Checking in on social media) 5
  • 6. WEB PAGES/IDENTIFIERS • Profiles • Newsgroup Postings • Social Networking profiles • Personal or Business Websites • Newspapers • Ebay • General Web Presence • Screen Names or Email Addresses 6
  • 7. INFORMATION GIVEN UP • Screen names and email addresses shouldn’t tell anything about you. • Poor Ex. 1. John12343 2. GADAWGSLUVA 3. Lucy_Waycross12343 7
  • 8. BETTER SCREEN NAMES • B!@ck&Ye1L0W • Keychains101 • PepperSpray 8
  • 9. ACTIVITY: INFORMATION GATHERING • HINTS: 1. Use whole name (can include initials) 2. Use quotes 3. Search with name forward/backward 4. Use quotes spaces with phone numbers and addresses 9
  • 10. PASSWORD DEVELOPMENT • Bad examples: • Password • Qwerty • 123456 • Any word in the dictionary • Good Examples. Hint Passphrase • b!@ck&yE1L0w • q@w4dgf*542 10
  • 11. PASSWORD DEVELOPMENT • Basic Concepts • Length of Password (8 char min. 10+ < Preferable) • Complexity of Password (As random as possible) • Use lowercase, uppercase, numbers, and symbols in a random sequence. 11
  • 12. PASSWORD TIPS • Create a unique password for each account. • Never share or write down your password. • Use a passphrase so it is easy to remember. • Change passwords if your email or system has a virus. 12
  • 13. WORKING REMOTELY • Working remotely provides many professionals with the freedom to complete work related tasks from almost any location. • The challenge is that many are unaware of the security vulnerabilities and regular maintenance required to protect their devices. 13
  • 14. BEST PRACTICES: SOFTWARE • Ensure virus protection is installed, enabled, and up to date. • Ensure Windows Firewall is turned ON. • Ensure all software applications like Java and Flash are up to date. • NEVER install software that is not necessary for work related tasks. • NEVER allow non-BBBS employees to use installed software. 14
  • 15. BEST PRACTICES: PASSWORDS • Protect passwords that are used to access BBBS information. • Ensure your machine have STRONG passwords. • Ensure that passwords are changed a MINIMUM of 6 months. • Ensure all mobile devices have a timeout function that lock the screen. • NEVER use the “Remember this password” function in an internet browser. • Use software like LastPass to properly secure passwords. 15
  • 16. BEST PRACTICES: INFORMATION MANAGEMENT • Invest in a backup solution and back it up once every two weeks. (flash drive, external HD, etc.) • Protect devices by enabling a lock and wipe function on mobile devices such as tablets and smartphones. • ALWAYS ensure that all BBBS information is encrypted. • Remove unnecessary information when it is no longer needed on the machine. • Ensure that when you work remotely that you do not leave your computer unattended for any period of time. 16
  • 17. SOURCES • GBI Cyber Security Awareness 17