SlideShare a Scribd company logo
1 of 61
Download to read offline
Online Safety & Security
April-May 2014
Epiphany Technology Committee
Jeff Squyres, Jim Cabral
Clickable links to additional
information are included at the end
of this presentation
Agenda
● Why Should I Care About Security?
● Who Is Attacking Me?
● What Do I Need to Protect?
● What Can Happen?
● What Increases My Risk?
● How Can I Protect Myself?
● What If I Get Hacked?
Disclaimer
● We’re Just Trying to Help
● Don’t blame us if things go bad
● We’re volunteers (with day jobs)
Why Should I Care About Security?
“Just like any other public environment, the Internet
requires awareness and caution. Just as you use
locks to keep criminals out of your home, you also
need safeguards to secure your computer. Many of
the crimes that occur in real life are now done - or
at least facilitated - through the Internet. Theft,
abuse, and more can be and are being done online.
Many scammers target older Americans via emails
and websites for charitable donations, dating
services, auctions, health care, and prescription
medications.”
US Department of Homeland Security.
The “Heartbleed” bug
The “Heartbleed” bug: Fun facts
● Only 38% of users have
changed their passwords
○ 6% have changed all
○ 16% changed “some”
○ 16% changed “a few”
The “Heartbleed” bug
● The Internet depends on encryption
○ “https” → S = secure (encryption)
○ Encryption between computers
Encrypted connection
The “Heartbleed” bug
● This encryption is known as “SSL”
○ “Secure Sockets Layer”
SSL encrypted connection
The “Heartbleed” bug
● ⅔ of web sites use the same software for SSL
○ OpenSSL
SSL encrypted connection
Open
SSL
● Software bug in OpenSSL since March 2012
The “Heartbleed” bug
Open
SSL
● Software bug in OpenSSL since March 2012
The “Heartbleed” bug
Open
SSL
The “Heartbleed” bug
It’s like walking through a
crowded restaurant with a
video camera.
Joe Smith:
your total is
$98.17Here’s my
credit card
Please log me in;
my username is
“bobcat371”, my
password is
“LouCardsRule”
You catch snippets of
conversations and images.
Most aren’t important.
But some are.
● Most web sites have fixed the problem
○ It is now safe to go change all your
passwords
● You can’t know if your password was
stolen
○ (there was no way to track the guy
with the video camera)
The “Heartbleed” bug
Who Is Attacking Me?
Albert Gonzales: stole 170M
credit / ATM cards from TJ Maxx
Who Is Attacking Me?
Nigerian (“419”) scammers
Also related:
● Guaranteed loan/credit scams
● Lottery scams
● Overpayment / refund scams
● Disaster relief scams
● Travel scams
● Tech/computer help scams
Who Is Attacking Me?
Dating, foreign
bride, sex scams
Who Is Attacking Me?
State-sponsored
“I’m not important”
● “No one cares
about my Facebook
account…”
● Wrong
○ They care a lot
“I’m not important”
● They’ll use the
same username /
password to login
elsewhere
● They’ll impersonate
you
What Do I Need to Protect?
What Can Happen?
Identity and Data Theft
Surveillance/Spying
Inappropriate Content
Your
child
What Increases My Risk?
Poor Passwords
● Simple passwords
● Old or reused
passwords
● Lack of 2-factor
authentication
“Do I really need a different password on
every web site?”
Yes
(sorry)
“But I can’t remember all those passwords!”
● Use a password-keeper program
● Two good ones:
○ LastPass
○ DashLane
● Both are
“Freemium”
Sidenote: What is 2-factor authentication?
1. Something you know
○ Your password
2. Something you have
○ Your cell phone
Sidenote: What is 2-factor authentication?
Login: bobcat371, LouCardsRule
Sidenote: What is 2-factor authentication?
Text bobcat371’s phone: code is 998321
This code changes every time
Sidenote: What is 2-factor authentication?
Text bobcat371’s phone: code is 998321
This code changes every time
What’s the code?
Sidenote: What is 2-factor authentication?
Text bobcat371’s phone: code is 998321
bobcat371, code is 998321
This code changes every time
Sidenote: What is 2-factor authentication?
You’re logged in!
Why is that useful?
Text bobcat371’s phone:
code is 796537
Login: bobcat371,
LouCardsRule
Why is that useful?
Text bobcat371’s phone:
code is 796537
What’s the code?
Why is that useful?
Text bobcat371’s phone:
code is 796537
Uh...
Why is that useful?
Text bobcat371’s phone:
code is 796537
Uh...
Who supports 2-factor?
Who supports 2-factor?
These are only a few
Many more support 2-factor
authentication
Check your favorite web sites to see if
they support 2-factor authentication
Back to:
What Increases My Risk?
Unpatched Software
● Windows and MacOS
● Applications (PDF, Office)
● Mobile phones, tablets
● Web Servers
(Heartbleed)
● Others (Java)
Insecure Configurations
● Software not set to auto-
update
● Open home WiFi
“I’m not important”
● “No one cares about my
home wifi network”
● Wrong
They care a lot
Wifi reaches outside of your home
With protected wifi
Your home / wifi
Bad guy
can’t get in your
network
With protected wifi
Your home / wifi
Bad guy connects
from the street -- he’s
in your network!
Unprotected wifi
“Unprotected wifi is not
only like leaving your
front door unlocked; it’s
like leaving it wide open
with a ‘Welcome’ mat out
front.”
How Can I Protect Myself?
Use Safe Online Behaviors
● Change ALL your passwords now
○ Use complex, unique
passwords for each site
● Avoid suspicious emails,
messages, websites and public
WiFi
○ If it’s too good to be true, it
probably is
● Monitor your credit cards
Get Help to Setup Security
● Set phones, tablets
and computers to
auto update
● Back up critical
information
● Encrypt your home
WiFi (use WPA2)
Get Help to Setup Security
Get Help to Setup Security
Everyone’s
setup is
different; we
can’t help
you in this
seminar
Get personal
or
professional
help
What If I Get Hacked?
Good Response Better Response
Recap
● The internet is a
dangerous place
○ BUT IT IS
MANAGEABLE!
○ Be sensible, be safe
○ Stop. Think. Connect.
Recap
● You can take actions NOW to protect yourself
○ Change ALL your passwords
■ Use good passwords
■ Get a password keeper
■ Setup 2-factor where possible
○ Ensure your firewall / anti-virus is up to date
○ Upgrade away from Windows XP
○ Set all your software to auto-update
○ Protect your home wifi
○ Setup off-site backups
Questions?
Helpful links
● STOP. THINK. CONNECT.: From the Dept. of Homeland Security
○ http://stopthinkconnect.org
● Malwarebytes: Handy PC software to remove viruses
○ A good second line of defense
○ https://www.malwarebytes.org/
● Lastpass: Password keeper
○ https://lastpass.com/
○ They also run a Hearbleed checker: https://lastpass.com/heartbleed
● Free annual credit report: From the US government
○ https://www.annualcreditreport.com/
● XKCD: Simple cartoon showing how Heartbleed works
○ http://imgs.xkcd.com/comics/heartbleed_explanation.png
Helpful links
● OpenDNS: Parental controls for filtering web sites at home
○ http://www.opendns.com/
● Microsoft Family Safety:
○ https://familysafety.live.com/
● Reporting Computer Crime:
○ http://www.justice.gov/criminal/cybercrime/reporting.html
Thank you!

More Related Content

Viewers also liked

Object Orinted Programing(OOP) concepts \
Object Orinted Programing(OOP) concepts \Object Orinted Programing(OOP) concepts \
Object Orinted Programing(OOP) concepts \Pritom Chaki
 
Quality Function Deployment (QFD) Seminar Presentation
Quality Function Deployment (QFD) Seminar PresentationQuality Function Deployment (QFD) Seminar Presentation
Quality Function Deployment (QFD) Seminar PresentationOrange Slides
 
Basics of ups seminar presentation
Basics of ups   seminar presentationBasics of ups   seminar presentation
Basics of ups seminar presentationMurali Krishnan
 
Rapid Prototyping and its Applications
Rapid Prototyping and its ApplicationsRapid Prototyping and its Applications
Rapid Prototyping and its Applicationsmalikusman
 
Product and service design
Product and service designProduct and service design
Product and service designGrace Falcis
 
Classroom Management Techniques
Classroom Management TechniquesClassroom Management Techniques
Classroom Management TechniquesBaita Sapad
 
Basics of c++ Programming Language
Basics of c++ Programming LanguageBasics of c++ Programming Language
Basics of c++ Programming LanguageAhmad Idrees
 

Viewers also liked (9)

Object Orinted Programing(OOP) concepts \
Object Orinted Programing(OOP) concepts \Object Orinted Programing(OOP) concepts \
Object Orinted Programing(OOP) concepts \
 
Seminar presentation on 5G
Seminar presentation on 5GSeminar presentation on 5G
Seminar presentation on 5G
 
Quality Function Deployment (QFD) Seminar Presentation
Quality Function Deployment (QFD) Seminar PresentationQuality Function Deployment (QFD) Seminar Presentation
Quality Function Deployment (QFD) Seminar Presentation
 
Basics of ups seminar presentation
Basics of ups   seminar presentationBasics of ups   seminar presentation
Basics of ups seminar presentation
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprinting
 
Rapid Prototyping and its Applications
Rapid Prototyping and its ApplicationsRapid Prototyping and its Applications
Rapid Prototyping and its Applications
 
Product and service design
Product and service designProduct and service design
Product and service design
 
Classroom Management Techniques
Classroom Management TechniquesClassroom Management Techniques
Classroom Management Techniques
 
Basics of c++ Programming Language
Basics of c++ Programming LanguageBasics of c++ Programming Language
Basics of c++ Programming Language
 

Similar to Computer Security Seminar: Protect your internet account information

Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Kit O'Connell
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1DallasHaselhorst
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2DallasHaselhorst
 
DSRY_Cybersecurity Awareness Presentation
DSRY_Cybersecurity Awareness PresentationDSRY_Cybersecurity Awareness Presentation
DSRY_Cybersecurity Awareness PresentationMohammedFarouk38
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and securityDjTechs
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08DallasHaselhorst
 
Remote Office Tech Support
Remote Office Tech SupportRemote Office Tech Support
Remote Office Tech SupportHoward Page
 
IESBGA 2014 Cybercrime Seminar by John Bambenek
IESBGA 2014 Cybercrime Seminar by John BambenekIESBGA 2014 Cybercrime Seminar by John Bambenek
IESBGA 2014 Cybercrime Seminar by John BambenekJohn Bambenek
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developerSteve Poole
 
Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)Kit O'Connell
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdfhmooodes115
 
Webinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasWebinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasAbilityNet
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital SecurityUjjwal Acharya
 

Similar to Computer Security Seminar: Protect your internet account information (20)

Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2
 
DSRY_Cybersecurity Awareness Presentation
DSRY_Cybersecurity Awareness PresentationDSRY_Cybersecurity Awareness Presentation
DSRY_Cybersecurity Awareness Presentation
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 
Remote Office Tech Support
Remote Office Tech SupportRemote Office Tech Support
Remote Office Tech Support
 
IESBGA 2014 Cybercrime Seminar by John Bambenek
IESBGA 2014 Cybercrime Seminar by John BambenekIESBGA 2014 Cybercrime Seminar by John Bambenek
IESBGA 2014 Cybercrime Seminar by John Bambenek
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdf
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Webinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasWebinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of Christmas
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 

Recently uploaded

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Computer Security Seminar: Protect your internet account information

  • 1. Online Safety & Security April-May 2014 Epiphany Technology Committee Jeff Squyres, Jim Cabral
  • 2. Clickable links to additional information are included at the end of this presentation
  • 3. Agenda ● Why Should I Care About Security? ● Who Is Attacking Me? ● What Do I Need to Protect? ● What Can Happen? ● What Increases My Risk? ● How Can I Protect Myself? ● What If I Get Hacked?
  • 4. Disclaimer ● We’re Just Trying to Help ● Don’t blame us if things go bad ● We’re volunteers (with day jobs)
  • 5. Why Should I Care About Security? “Just like any other public environment, the Internet requires awareness and caution. Just as you use locks to keep criminals out of your home, you also need safeguards to secure your computer. Many of the crimes that occur in real life are now done - or at least facilitated - through the Internet. Theft, abuse, and more can be and are being done online. Many scammers target older Americans via emails and websites for charitable donations, dating services, auctions, health care, and prescription medications.” US Department of Homeland Security.
  • 7. The “Heartbleed” bug: Fun facts ● Only 38% of users have changed their passwords ○ 6% have changed all ○ 16% changed “some” ○ 16% changed “a few”
  • 8. The “Heartbleed” bug ● The Internet depends on encryption ○ “https” → S = secure (encryption) ○ Encryption between computers Encrypted connection
  • 9. The “Heartbleed” bug ● This encryption is known as “SSL” ○ “Secure Sockets Layer” SSL encrypted connection
  • 10. The “Heartbleed” bug ● ⅔ of web sites use the same software for SSL ○ OpenSSL SSL encrypted connection Open SSL
  • 11. ● Software bug in OpenSSL since March 2012 The “Heartbleed” bug Open SSL
  • 12. ● Software bug in OpenSSL since March 2012 The “Heartbleed” bug Open SSL
  • 13. The “Heartbleed” bug It’s like walking through a crowded restaurant with a video camera. Joe Smith: your total is $98.17Here’s my credit card Please log me in; my username is “bobcat371”, my password is “LouCardsRule” You catch snippets of conversations and images. Most aren’t important. But some are.
  • 14. ● Most web sites have fixed the problem ○ It is now safe to go change all your passwords ● You can’t know if your password was stolen ○ (there was no way to track the guy with the video camera) The “Heartbleed” bug
  • 15. Who Is Attacking Me? Albert Gonzales: stole 170M credit / ATM cards from TJ Maxx
  • 16. Who Is Attacking Me? Nigerian (“419”) scammers Also related: ● Guaranteed loan/credit scams ● Lottery scams ● Overpayment / refund scams ● Disaster relief scams ● Travel scams ● Tech/computer help scams
  • 17. Who Is Attacking Me? Dating, foreign bride, sex scams
  • 18. Who Is Attacking Me? State-sponsored
  • 19. “I’m not important” ● “No one cares about my Facebook account…” ● Wrong ○ They care a lot
  • 20. “I’m not important” ● They’ll use the same username / password to login elsewhere ● They’ll impersonate you
  • 21. What Do I Need to Protect?
  • 27. Poor Passwords ● Simple passwords ● Old or reused passwords ● Lack of 2-factor authentication
  • 28. “Do I really need a different password on every web site?” Yes (sorry)
  • 29. “But I can’t remember all those passwords!” ● Use a password-keeper program ● Two good ones: ○ LastPass ○ DashLane ● Both are “Freemium”
  • 30. Sidenote: What is 2-factor authentication? 1. Something you know ○ Your password 2. Something you have ○ Your cell phone
  • 31. Sidenote: What is 2-factor authentication? Login: bobcat371, LouCardsRule
  • 32. Sidenote: What is 2-factor authentication? Text bobcat371’s phone: code is 998321 This code changes every time
  • 33. Sidenote: What is 2-factor authentication? Text bobcat371’s phone: code is 998321 This code changes every time What’s the code?
  • 34. Sidenote: What is 2-factor authentication? Text bobcat371’s phone: code is 998321 bobcat371, code is 998321 This code changes every time
  • 35. Sidenote: What is 2-factor authentication? You’re logged in!
  • 36. Why is that useful? Text bobcat371’s phone: code is 796537 Login: bobcat371, LouCardsRule
  • 37. Why is that useful? Text bobcat371’s phone: code is 796537 What’s the code?
  • 38. Why is that useful? Text bobcat371’s phone: code is 796537 Uh...
  • 39. Why is that useful? Text bobcat371’s phone: code is 796537 Uh...
  • 41. Who supports 2-factor? These are only a few Many more support 2-factor authentication Check your favorite web sites to see if they support 2-factor authentication
  • 43. Unpatched Software ● Windows and MacOS ● Applications (PDF, Office) ● Mobile phones, tablets ● Web Servers (Heartbleed) ● Others (Java)
  • 44. Insecure Configurations ● Software not set to auto- update ● Open home WiFi
  • 45. “I’m not important” ● “No one cares about my home wifi network” ● Wrong They care a lot
  • 46. Wifi reaches outside of your home
  • 47. With protected wifi Your home / wifi Bad guy can’t get in your network
  • 48. With protected wifi Your home / wifi Bad guy connects from the street -- he’s in your network!
  • 49. Unprotected wifi “Unprotected wifi is not only like leaving your front door unlocked; it’s like leaving it wide open with a ‘Welcome’ mat out front.”
  • 50. How Can I Protect Myself?
  • 51. Use Safe Online Behaviors ● Change ALL your passwords now ○ Use complex, unique passwords for each site ● Avoid suspicious emails, messages, websites and public WiFi ○ If it’s too good to be true, it probably is ● Monitor your credit cards
  • 52. Get Help to Setup Security ● Set phones, tablets and computers to auto update ● Back up critical information ● Encrypt your home WiFi (use WPA2)
  • 53. Get Help to Setup Security
  • 54. Get Help to Setup Security Everyone’s setup is different; we can’t help you in this seminar Get personal or professional help
  • 55. What If I Get Hacked? Good Response Better Response
  • 56. Recap ● The internet is a dangerous place ○ BUT IT IS MANAGEABLE! ○ Be sensible, be safe ○ Stop. Think. Connect.
  • 57. Recap ● You can take actions NOW to protect yourself ○ Change ALL your passwords ■ Use good passwords ■ Get a password keeper ■ Setup 2-factor where possible ○ Ensure your firewall / anti-virus is up to date ○ Upgrade away from Windows XP ○ Set all your software to auto-update ○ Protect your home wifi ○ Setup off-site backups
  • 59. Helpful links ● STOP. THINK. CONNECT.: From the Dept. of Homeland Security ○ http://stopthinkconnect.org ● Malwarebytes: Handy PC software to remove viruses ○ A good second line of defense ○ https://www.malwarebytes.org/ ● Lastpass: Password keeper ○ https://lastpass.com/ ○ They also run a Hearbleed checker: https://lastpass.com/heartbleed ● Free annual credit report: From the US government ○ https://www.annualcreditreport.com/ ● XKCD: Simple cartoon showing how Heartbleed works ○ http://imgs.xkcd.com/comics/heartbleed_explanation.png
  • 60. Helpful links ● OpenDNS: Parental controls for filtering web sites at home ○ http://www.opendns.com/ ● Microsoft Family Safety: ○ https://familysafety.live.com/ ● Reporting Computer Crime: ○ http://www.justice.gov/criminal/cybercrime/reporting.html