Information Security and Best Online Practices

Slides:



Advertisements
Similar presentations
WordPress Installation for Beginners Sheila Bergman
Advertisements

Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
CRYPTOGRAPHY PROGRAMMING ON ANDROID Jinsheng Xu Associate Professor North Carolina A&T State University.
Nothing is Safe 1. Overview  Why Passwords?  Current Events  Password Security & Cracking  Tools  Demonstrations Linux GPU Windows  Conclusions.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Confidential - © 2012 StreamWIDE © StreamWIDE
Staying Safe Online Keep your Information Secure.
Dan Johnson. What is a hashing function? Fingerprint for a given piece of data Typically generated by a mathematical algorithm Produces a fixed length.
CIS 450 – Network Security Chapter 8 – Password Security.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
6fb52297e004844aa81be d50cc3545bc Hashing!. Hashing  Group Activity 1:  Take the message you were given, and create your own version of hashing.  You.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
How Your Customers Will Pay Online & by Phone
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Policies and Security for Internet Access
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
1-way String Encryption Rainbows (a.k.a. Spectrums) Public Private Key Encryption HTTPS Encryption.
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
Internet Basics 10/23/2012. What is the Internet? It’s a world-wide network of computer networks. It grows hourly and involves national governments, communities,
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
IT Security Awareness Day October 19, 2016
Outline The basic authentication problem
DATA SECURITY FOR MEDICAL RESEARCH
Security Using Armstrong Numbers and Authentication using Colors
Introduction to Web Safety
How to use the internet safely and How to protect my personal data?
Encryption 1-way String Encryption Rainbows (a.k.a. Spectrums)
Ways to protect yourself against hackers
How to use the internet safely and How to protect my personal data?
Cryptographic Hash Function
Authentication CSE 465 – Information Assurance Fall 2017 Adam Doupé
Password Cracking Lesson 10.
Multifactor Authentication
Passwords.
Crypto 101 & Password Cracking
Cloud Storage Services
Internet Basics.
Fun gym Cambridge Nationals R001.
Web Systems Development (CSC-215)
Fun gym Cambridge Nationals R001.
PHP: Security issues FdSc Module 109 Server side scripting and
An Introduction to Web Application Security
Digital $$ Quiz Test your knowledge.
Staying safe on the internet
Introduction to Computers
K. HAAS, J. HUISMAN, P. KAPOOR, T. SZOCS
Part 3.
Kiran Subramanyam Password Cracking 1.
Authentication CSE 365 – Information Assurance Fall 2018 Adam Doupé
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Exercise: Hashing, Password security, And File Integrity
The Internet: Encryption & Public Keys
Multi-Factor Authentication
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Chapter Goals Define cryptography
Keeping your passwords safe
Authentication CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

Information Security and Best Online Practices

Introductions About Us About the Class (MGMT636) About the MSISA program Cybersecurity Data Analysis Database Management And more The top emplyers for graduates are the National laboratories, the DHS, DOD, and UNM itself.

Google Trends “Cybersecurity” Worldwide Interesting because it runs counter to trends in hack, hackers, cybercrime, security. Encouraged everyone to check out Google Trends. A very useful tool for finding trending information and exploring patterns in the world.

Overview What are we going to talk about? More In-depth, Real Quickly, Encryption, Hashing Tech Demos Real Quickly, Password Creation Password management/protection

Instagram Accounts got HACKED!!! Recently some Russian hackers have hacked several people’s Instagram Account The reason is still unknown. Facebook and Cambridge Analytica too.

HSBC Bank suffers data breach HSBC Bank suffered a data breach in last October 4 and October 14,2018 Fortunately only a small amount of customers were affected, reportedly less than 1%. Important information stolen: full name, mailing address, date of birth, phone number, email address, account numbers etc.

Encryption Video Local Location ../Documents/TrimmedEncryption.mp4 Web Location https://youtu.be/r4HQ8Bp-pfw?t=55

Hashing vs. Encryption Not the same thing. Both result in “jumbled” text. Encryption can be decrypted with a key Hash cannot be un-hashed (one-way)

What is Encryption? Turn data into unreadable character. These unreadable characters can be converted back to the data. (with the right key). Two Types (symmetric key, public key).

Where is Encryption Used? Anywhere and everywhere that information is stored. Anywhere a password is used or communication is used. Internet, Phones, computers, applications, banking, cars, IoT, communication, computer games, etc…

One of first Examples Caesar Cipher The Caesar cipher is named after Julius Caesar, who used it with a shift of three to protect messages of military significance. While Caesar's was the first recorded use of this scheme, other substitution ciphers are known to have been used earlier.

Using A Keyword

What is Hashing? A string or number generated from a string or text. Fixed Length. Varies Widely. (“hello” vs. “Hello”) Best algorithms are designed to be nearly impossible to turn hash back to original string.

When is Hashing Used? Used to store passwords(SQL Database). Strong hashing algorithm with salt = hard to reverse. When user logs in. To make sure a file wasn’t changed.

What is a Salt???? Salt is extra text added to the end. If password was “password” the database can salt it by adding “safe” to the end of it. “passwordsafe” now gets hashed and saved. Protect against dictionary attack and rainbow table.

Salt in The News LinkedIn sued for a data breach (2013) They were deemed negligent for not salting their stored passwords. The database was susceptible to SQL injection attacks.

TECH DEMO!!! Hashing and Encrypting using Terminal (applies to Windows in a similar manner) Comes pre-installed on Mac OSX For windows, https://www.openssl.org/source/ can be downloaded at this link. openssl list-cipher-commands  this command will show you all the types of encryption you can use. openssl des –in filename.txt –out filename.txt.enc  encrypt the file using the DES algorithm emacs filename.txt.enc  (opens the file in emacs) in order to see what encryption text (most text editors will work). openssl des –d –in filename.txt.enc –out filenameOUTPUT.txt openssl aes-256-cbc –a –salt –in filename.txt –out filename.txt.enc  using aes-256-cbc algorithm very powerful, common, widely used. Adding salt makes it even more secure. Basically need a super computer to crack this now. -a makes the encryption use plain text. openssl aes-256-cbc -d –a –salt in filename.txt.enc –out filenameOUTPUT.txt  decrypt previous encryption. Openssl –h  give you all the options available Openssl dgst –h  gives you all Hash functions available. echo –n “testing string” | openssl md5 echo –n “testing string” | openssl sha256 echo –n filename.txt | openssl sha1 The Handout provides examples of the code used.

Types of Authentication

Types of Authentication cont. Knowledge factors: Factors the user must know in order to log in are considered a knowledge factor. This can be anything from a username, password, or pin number

Types of Authentication cont. Possession factors. Anything that the user must have in order to log in is known as a possession factor. One-time password tokens, key fobs, ID cards, and physical tokens are all considered possession factors

Types of Authentication Cont. Inheritance factors. Using a person’s biological characteristics is known as an inheritance factor.

Password Creation

Some Common Password

How long it takes to hack?

Combinatorics How we do calculate the number of possible combinations from a password of 8 – 12 characters? (Password Characters)^(Password Length) Numbers 0-9, letters a-z, A-Z, symbols (!@#$%) 958 +959 +9510 +9511 +9512 = 546,108,599,162,939,437,890,625

Some Interesting Stats 2 out of 5 people have been 'hacked' in the last year 21% use password that are at least 10 years old 47% use passwords that are at least 5 years old 54% use 5 or fewer passwords across their entire online presence On average, only 6 unique passwords are used to guard 24 online accounts

Password Recommendations At least 8 characters long Use mixture of upper case, lower case, digits, symbols Utilize biometrics (Automatic on iPhones) Do not use words listed in the dictionary Do not store in text or word file It should be used and known by one person only

Password Manager Stores different login information and passwords from all sites you want No need to remember them all! Can autofill during login process Password managers are secure

Lastly Why is all this protection of data important? You might not know what data these companies are keeping on you. Why is facebook free? Why is Instagram free? Snapchat…

Why are these Apps free? A staggering $24.1 billion of Google's $27.77 billion revenue for Q3 2018 was from advertising Facebook reported $11.97 billion in revenue and $4.98 billion in profit for the past quarter, with 91 percent of its advertising revenue coming from mobile.

Download Your Information We have passed out a handout that gives you quick easy instructions for requesting and downloading your information from facebook, google, Instagram and snapchat.

References https://securityscorecard.com/blog/worlds-worst-passwords https://swoopnow.com/user-authentication/ https://latesthackingnews.com/2018/11/07/hsbc-bank-suffers-data-breach/ https://www.independent.co.uk/life-style/gadgets-and-tech/news/instagram-hack-accounts-russia-breached-take-over-accounts-how-locked-2018-a8553776.html

References Cont. https://www.cbsnews.com/news/how-easy-is-it-to-hack-your-password-john-pozadzides-tells-all/ https://www.securityinnovationeurope.com/blog/page/whats-the-difference-between-hashing-and-encrypting