Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer May 2, 2008.

Slides:



Advertisements
Similar presentations
Computer Concepts – Illustrated 8th edition
Advertisements

1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Datamax/MCL Off-Line License Activation Method
Follow the instruction to install the PC Suite from the SD card: 1.Go to the settings -> SD Card & phone storage -> Enable the mass storage only mode 2.Connect.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Transfer Content to a Website What is FTP? File Transfer Protocol FTP is a protocol – a set of rules Designed to allow files to be transferred across.
June 2008 Surf Safely with a Clean Computer Roger Thornburn.
Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely.
Laptop 101 Campus Training Mac Version. Introduction Learning Objectives After completing this course the participant will be able to: 1. Successfully.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Cyber Security on the go
IRIS Computing Orientation Lars Rohrbach Instructional and Research Information Systems (IRIS) 1 E LECTRICAL E NGINEERING AND C OMPUTER S CIENCES U NIVERSITY.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
1 2 In a computer system, a file is a collection of information with a single name, such as addresses.doc, or filebackup.ppt, or ftwr.exe, or guidebook.xls.
Troubleshooting Startup Problems
The Office Procedures and Technology
Chapter 1: Introduction to Scaling Networks
Cyber Safety Assessment Review
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Traveling Safely SIRT IT Security Roundtable Harvard Townsend IT Security Officer May 8, 2009.
Spring 2014 RMS/EOC Proctor Caching Training. Agenda 2 Proctor caching overview Downloading & installing Cache test content.
What’s New in Fireware XTM v11.9.1
CY-SWR1100 Dual Band Wireless N Router
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
Services Course Windows Live SkyDrive Participant Guide.
Install Window XP. Begin the Installation 1. Insert the Windows XP CD and restart your computer. 2. If prompted to start from the CD, press SPACEBAR.
Getting Familiar with Web Pages 1 2 The Internet Worldwide collection of interconnected computer networks that enables businesses, organizations, governments,
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Macromedia Dreamweaver MX 2004 – Design Professional Dreamweaver GETTING STARTED WITH.
25 seconds left…...
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Services Course Windows Live SkyDrive Participant Guide.
10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Installing Windows XP Professional Using Attended Installation Slide 1 of 30Session 8 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
This presentation will take a look at to prevent your information from being discovered by and investigator.
Microsoft Windows Vista SIRT Roundtable Discussion January 12, 2007 Harvard Townsend Interim University IT Security Officer College.
Steve Garner Ag Communications Services IT Manager.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
10 Essential Security Measures PA Turnpike Commission.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
September 2007 General Security Basics Your Responsibilities for Safe Computing.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
SLIR Computer Lab: Orientation and Training December 16, 1998.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
Protecting Your Identity: Information Security Basics Presented by:Barbara D. Kissner SVP & CIO International Fidelity Insurance Company March 18, 2014.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Computer Security Sample security policy Dr Alexei Vernitski.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Getting Connected to NGS while on the Road…
TECHNOLOGY GUIDE THREE
Getting Connected to NGS while on the Road…
Presentation transcript:

Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer May 2, 2008

Laptops are risky business… 2

Agenda Physical security Protection while traveling Information security Recording identification information Tracking and Recovery software Wireless security Public WiFi hotspots Home wireless VPN service Useful freeware tools demod throughout USB thumb drive security 3

4 Physical Security – Theft Prevention Never leave unsecured laptop unattended Lock your doors (reshall room, apt., office) Lock it in a cabinet Use a locking security cable Room/office Hotel room Public locations Conferences, training sessions Cost $15-$50, combination or key lock Use strong password on all accounts

5 Traveling Dont let it out of your sight when you travel Be particularly watchful at airport security checkpoints Always take it in your carry-on luggage Never put it in checked luggage Use a nondescript carrying case Be careful when you take a nap in the airport Dont leave it in view in your vehicle Dont trust the trunk - remember the quick release lever inside the vehicle?

6 Information Security DONT store confidential data on mobile devices If you must, encrypt it Whole-disk encryption best File or folder encryption reasonable Demo TrueCrypt (open source, Win/Linux/Mac – ) Beware of managing encryption keys Work with temporary copies on the laptop – keep original file(s) on secure server Backup data regularly Imaging is a lovely tool Diligently manage the security of the device (patches, antivirus software, firewalls, etc.)

Finding Confidential Data Dont assume you dont have any confidential data on your laptop Spider from Cornell useful for finding confidential data Searches files for SSNs and credit card numbers Lots of false-positives but still very useful 7

Preventing Recovery of Deleted Files Deleted files easily recovered Even after you empty the Recycle Bin Eraser freeware tool to securely delete files ( Erase Recycle Bin Erase a file instead of delete it Erase free space on hard drive Erase a USB flash drive Media Sanitization when disposing media 8

Record Identification Information Record make, model, serial number Take pictures of it Label it with ownership and contact info Engrave cover Tamper-proof asset tag Write on it with permanent marker Distinctive symbols, art Record network MAC addresses 9

10 How To Find Your MAC Address In Microsoft Windows XP/Vista Get a Command Prompt window Select Start, then Run, then type cmd.exe In the command prompt window, type ipconfig /all Look for the Physical Address, which is the MAC address For other operating systems, see

11 MAC address

12 Tracking & Recovery Software If stolen, the computer contacts the company who traces it and contacts law enforcement to recover it Computrace LoJack for Laptops from Absolute Software ( is an examplewww.absolute.com Pre-installed in BIOS on many laptops Dell HP Have to buy the license to activate Costs about $30-$50 per year

13 Wireless Safety K-State, home, hotels, public hot spots Rule of thumb – FEAR WIRELESS! K-State information: General wireless security: Wireless terminology:

14 Wireless Safety Use encryption WEP (weak) WPA (strong - coming to campus soon) VPN Dont work with sensitive data in public hot spot

15 Wireless Safety Securing wireless at home Use strongest encryption possible – WPA2 Restrict access to specific computers by MAC address Change default settings Admin password for configuration interface SSID Do not broadcast SSID

16 Default SSID No Encryption

17 Default SSID Strong Encryption Weak Encryption (WEP)

18

19

20 Virtual Private Network (VPN) Encrypts all network traffic between your computer and the K-State border Makes your computer appear to be on campus to get access to restricted resources Does NOT necessarily encrypt everything that goes to the Internet (split tunneling) Also does not encrypt traffic on campus

21

22 Virtual Private Network (VPN) Must install VPN Client software Information and software available at : Cannot use it on campus yet (to secure your wireless, for example); will be able to soon. If can get to Internet but not K-State, modify the Transport configuration: Enable Transparent Tunneling IPSec over TCP

23 Disconnected Connected

USB Flash Drive Security No confidential data! Too easy to lose, easy target of theft Dont use it as a backup device Erase files so they arent recoverable Encrypt files on it with TrueCrypt or - Encrypted USB flash drives Ironkey very popular View demo? 24

25 More Information… K-States Mobile Device Security Guidelines:

Whats on your mind? 26