Secure Email and Web Browsing Sébastien Dellabella – Computer Security Team.

Slides:



Advertisements
Similar presentations
1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Advertisements

1 Copyright © 2002 Pearson Education, Inc.. 2 Chapter 2 Getting Started.
Slide 1 FastFacts Feature Presentation October 24, 2013 To dial in, use this phone number and participant code… Phone number: Participant.
Slide 1 FastFacts Feature Presentation September 21, 2010 We are using audio during this session, so please dial in to our conference line… Phone number:
Online Privacy A Module of the CYC Course – Personal Security
1 Advanced with GMail A CYC Electives Module
DISTRICT AND SCHOOL ASSESSMENT & TECHNOLOGY COORDINATOR ONLINE TESTING WEBINAR FEBRUARY 7 AND 9, 2012 Washington Online Testi ng OSPI Office of Superintendent.
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
4 th Control System Cyber-Security Workshop Exchanging ideas on HEP security Dr. Stefan Lüders (CERN Computer Security Officer) 4 th (CS) 2 /HEP Workshop,
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Services Course Office Web Apps Participant Guide.
Computer Security: Best Practices for Home Computing Presented by Student Help Desk Merced Community College.
Phishing, what you should know L kout Initiative.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
© John Wallace Mobile and Online Banking Security John Wallace Consultant, Resources Global Professionals.
LFCDS SkyMail & SkyDrive Full Student Orientation
OFFICE OF SUPERINTENDENT OF PUBLIC INSTRUCTION Division of Assessment and Student Information Online MSP Testing Technology & Assessment Coordinator Training.
OFFICE OF SUPERINTENDENT OF PUBLIC INSTRUCTION Division of Assessment and Student Information Online MSP Testing In-Depth Technology Training January 13,
Phishing, what you should know L kout Initiative Office of Information Technology.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Services Course Windows Live SkyDrive Participant Guide.
Internet Safety Learning Disability Partnership Board 15 th October 2010 Veronica Hughes Bromley Adult Education College.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
® Microsoft Office 2010 Browser and Basics.
Services Course Windows Live SkyDrive Participant Guide.
Profile. 1.Open an Internet web browser and type into the web browser address bar. 2.You will see a web page similar to the one on.
LobbyPal Online Visitor Management System by Aquarius Soft
Security Questionnaire Please read each question and then choose one of the possible answers. © Members of the ISSeG Collaboration, See
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
7 Effective Habits when using the Internet Philip O’Kane 1.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
Threats To A Computer Network
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
1 Computer Security: Protect your PC and Protect Yourself.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Security for Seniors SeniorNet Help Desk
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Your Information Valuables in “Cyberspace” Charlie Russell Rappahannock Rotary Club May 30, 2012.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
IT security By Tilly Gerlack.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Specialist communication channel. Sarah-Jane king.
Use of CERN’s Computing Facilities Why is security important? What are the rules? HR Induction Programme.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
XP Browser and Basics COM111 Introduction to Computer Applications.
What is Spam? d min.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
For more information on Rouge, visit:
IT Security Awareness Day October 19, 2016
Risk of the Internet At Home
Implementing Client Security on Windows 2000 and Windows XP Level 150
Presentation transcript:

Secure and Web Browsing Sébastien Dellabella – Computer Security Team

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Computer Security Day slide 2 Overview Main attack types Consequences of a successful attack Survival guide on the wild Internet Understanding the details Examples

Main attacks types

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Computer Security Day slide 4 Main attacks types Social Engineering Someone calls you and asks you for personal information Someone lost an USB Stick and you found it. Password Phishing Forged mail Tabnabbing. NEW! Malicious Program wish to run as admin The program asks you for permission to run…dont allow it! Vulnerability Exploits Visiting a website, opening an attachment, connecting a USB stick, its enough to be exploited. Using a compromised computer You dont know it, but everything you type is recorded. User interaction needed User Interaction NOT needed Understanding the attack makes it ineffective

Consequences of Attacks

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Computer Security Day slide 6 Consequences of Attacks Computer remotely controlled to: Send SPAM Infect other machines on the local network Host illegal or copyrighted data (software, movies, porn, banking data, private data) Relay illegal connections Computer used for criminal purpose: Loss of confidential work Money extortion (private data encryption) Join BotNet to attack other systems on the Internet (DoS)

Survival Guide

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Computer Security Day slide 8 Survival Guide (1/2) User awareness No credentials (login/password) over No same password for different place/software/service (CERN , MSN, private account, banking, Facebook, etc.) No clicking on links sent by your online contacts before confirmation (mail, phone call, etc.) No use of untrusted media (USB stick you found in the street, CD, DVD or hard-drive your friend gave to you) No use of Internet randomly downloaded software (how can you trust them?) No forwarding of unverified information to your contacts. Check [ ] or [ ] Read before you click and If you have any doubt, dont click

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Computer Security Day slide 9 Survival Guide (2/2) Work without Administrator rights Standard on Windows VISTA, Windows 7, MAC, Linux Use NICE Admin on Windows XP Up-to-date OS and software Average survival time of a machine on the Internet is: 4min [ CMF updates at CERN Windows Update at home Antivirus with latest pattern files Install CERN Antivirus at home, its FREE for CERN users ! [

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Computer Security Day slide 10 Why you cant trust messages you receive By By Instant Messenger (MSN, Skype, ICQ, etc.) By contacts on social networking website (Facebook, etc.) What is the URL? URL (Uniform Resource Locator) is an internet address What you see is NOT always what you get! Understanding the details

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Computer Security Day slide 11 Understanding the details What links to ? %2e%31%33%38%2e%31%33%37%2e%31%37%37/p?uh3f223d co_partnerid=2&usage=0&ru=http%3A%2F%2Fwww.ebay.com&rafId=0 &encRafId=default This IS Not EVEN obvious FOR professionals !

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Computer Security Day slide 12 Understanding the details Internet Browser improvements New heuristics & enhanced telemetry Anti-Malware support

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Computer Security Day slide 13 Understanding the details In Private Browsing Available on Internet Explorer 8 and Firefox: lets you control whether or not the browser saves your browsing history, cookies, and other data Internet Explorer: Safety -> In Private Browsing Firefox: Tools -> Start Private Browsing

Examples

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Computer Security Day slide 15 Examples Phishing (1/3)

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Computer Security Day slide 16 Examples Phishing (2/3)

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Computer Security Day slide 17 Examples Phishing (3/3)

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Computer Security Day slide 18 Examples Tabnabbing

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Computer Security Day slide 19 Examples Untrusted software: Scareware

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Computer Security Day slide 20 Summary User awareness No credentials (login/password) over No same password for different place/software/service No clicking on links sent by your contacts before confirmation. No use of untrusted media (USB stick, CD, DVD, Hard-drive) No use of Internet randomly downloaded software No forwarding of unverified information to your contacts Read before you click and If you have any doubt, dont click Up-to-date OS, Antivirus and software Work without Administrator rights Standard on Windows VISTA, Windows 7, Mac OS, Linux Use NICE Admin on XP SEC_RITY is not complete without U ! The Security Team is ready to help you:

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Computer Security Day slide 21 Q&A

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Computer Security Day slide 22 Resources CERN Computer Security web site CERN Antivirus Help Section NICE Services – How to install Antivirus at home? CERN Security – Advice on SPAM NICE Services – Spam fighting configuration

Dr. Stefan Lüders (CERN IT/CO) DESY 20. Februar 2007 Computer Security Day slide 23