Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link
Students asked to do online research, visit websites, send to instructors Business employees conduct research online from home Cost of commercial security software prohibits use by students “Security through obscurity” – attitude of the uninformed Given: Secure Computing Initiative
How do we insure the security of our online experience at home? Problem: Secure Computing Initiative
Build awareness of threats/risks Supply information on free security products Objective:
Threat Landscape WorkHome Threats Communication link
Threat Agents Work Home Threats Communication link Trusted insider Playmates “The Clueless” Consultants Cleaning crew Disgruntled employee
Threat Agents Outsiders Rogue hacker / script kiddies Organized hackers Organized crime State-sponsored hackers Competitor espionage Terrorists “Sickos” - CyberStalkers Work Home Threats Communication link
What’s at Risk? Your identity Your finances Your data Your privacy Your family Work Home Threats Communication link
What could happen? Things you see – New files/folders – Erased files/folders – Changed settings (Registry, browser)
What could happen? Things you don’t see – Malicious cookies – Keystroke loggers – Trojans bearing executable code – Hacker tool kits – Zombie (external control)
What Can We Do? FIRST – “sanitize” your machine NEXT – Apply security software – Change browser settings – Install Antivirus software – Install Firewall – Install secure Instant Messaging software – Apply for personal digital certificate
Secure Computing Initiative Keep software current Continually educate yourself Help someone else Work Home Threats Communication link
Reference Document “Secure Computing Initiative” Download site: Work Home Threats Communication link