THINK BEFORE YOU CLICK! Cyber Security is everybody’s responsibility Don Winaker Network Security Manager

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Challenges In The Morphing Threat Landscape Apr 2011, Arnhem Tamas Rudnai, Websense Security Labs.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
7 Effective Habits when using the Internet Philip O’Kane 1.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
AVG- Protecting those who are vulnerable.  Free Anti-Virus Software ◦ J.R. Smith President of AVG oversees a lineup of antivirus products used by 110.
Threats To A Computer Network
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
LittleOrange Internet Security an Endpoint Security Appliance.
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Quiz Review.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Staying Safe Online Keep your Information Secure.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Security at NCAR David Mitchell February 20th, 2007.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
CCT355H5 F Presentation: Phishing November Jennifer Li.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Topic 5: Basic Security.
What is Spam? d min.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Understand Malware LESSON Security Fundamentals.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
A Quick and Easy Crash Course Internet Safety for Everyone.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
An Introduction to Phishing and Viruses
Executive Director and Endowed Chair
Network Security Fundamentals
Personal spaces.
Instructor Materials Chapter 7 Network Security
Securing Information Systems
Cybersecurity Awareness
Risk of the Internet At Home
Internet Worm propagation
Computer Security.
How to keep the bad guys out and your data safe
Presentation transcript:

THINK BEFORE YOU CLICK! Cyber Security is everybody’s responsibility Don Winaker Network Security Manager

We know what those thieves are after. But Johns Hopkins isn’t a store or a bank. What would people want to steal from us?

Johns Hopkins has technology in place that deflects many attacks 84.2% of all incoming messages are dropped due to SPAM, viruses, phishing, etc. Inbound network connections blocked due to malware* Per Day: 4,000,068 Per Hour: 166,669 Per Second: 46 Per Day: 88,405 Per Hour: 3,684 Per Second: 1 Unauthorized attempts to access our internal networks blocked Per Day: 75,545,460 Per Hour: 3,147,727 Per Second: 874 Outbound network connections blocked due to malware* Per Day: 882,310 Per Hour: 36,763 Per Second: 10

Technology is great and has made our lives and jobs easier, but … Technical Tools Can’t reason or exercise judgment Can only detect broad trends Must quickly sort through more than 2 billion daily events Have to be configured, monitored, and maintained by … people! Technology can provide prevention and detection

Is this enough ? What is Johns Hopkins Network Security doing today ?  Extensive Deployment of Cisco Firewalls  Automated Blacklisting  Nessus Vulnerability scanning  Sourcefire Intrusion Detection and Prevention systems installed  JWatch – Intel Security incident and Event Management  LanCope – network traffic flow monitoring

People are the first and most important line of cyber defense Humans Can make connections between different pieces of information that don’t seem related but indicate a trend Can recognize when seemingly normal behavior just doesn’t look or sound quite right Can adapt quickly to new information and emerging attacks and threats Provide a principal preventive control Technology can’t do it all

People hold the keys to the kingdom What are the most common types of attack? Social Engineering Phishing Malware If you know where to look and have the right level of access, vast amounts of information are available with just one click

How do cyber criminals try to get information from us? SOCIAL ENGINEERING Type of confidence trick or con job Uses psychological manipulation to trick people to bypass normal security procedures Often relies on natural helpfulness of people One step in a more complex fraud scheme From , 48% of large businesses suffered attacks costing between $25,000-$100,000 per incident

How do cyber criminals try to get our login credentials? PHISHINGSPEAR PHISHING Often sent in an Pretends to be from an official source Directs users to enter credentials into a fake web site Warn or threaten of consequences for failure to act Targeted phishing attack Attacker has specific target in mind Uses details about the target to sound more legitimate May present a problem and try to elicit sympathy and get a helpful response

Be skeptical when you read How can you tell if it’s phishing? Asks you to reply to an or go to a web site and enter in personally identifiable information Asks you to click a link to install software (malware) Directs you to a URL that is not a Johns Hopkins address (but might look like one) or starts with an IP address Creates a sense of urgency by warning or threatening that something bad will happen if you don’t comply Is badly written, including misspelled words or poor grammar

Phishing examples Phishing examples

If you never fall for a phishing attack then you are safe, right? MALicious SoftWARE Gets installed on your system and performs unwanted tasks Designed to disrupt, damage, steal information, take control, create bots Many different types: ◦Virus and worm (infectious) ◦Rootkit, Trojan Horse, Backdoor (RAT – remote access tool) ◦Keylogger, Spyware (steal information) ◦Ransomeware (extortion) ◦Dialer, Adware (generate funds) ◦Hybrids and variations

You could usually avoid malware if you were careful with your

But not anymore 90% of malware comes from web browsing today – only 6% comes from The biggest threat to corporate networks is employees clicking on infected web pages A 'drive-by-download' attack is a malware delivery technique that is triggered just because you visited a website. You don’t need to click or accept any software, and the malicious code can download in the background to your device.

Anatomy of the NBC.com Infection Drive-by download attack One of the top 600 most popular web sites on the Internet – Law of Large Numbers Used the RedKit exploit kit to look for vulnerable versions of Adobe Reader, Acrobat, Java Vulnerable computers were infected with malware: ◦Citadel (spyware) targets financial account details ◦ZeroAccess (adware) generates fake pay-per-view revenues for botnet controllers or their clients This version of Citadel was at the time only recognized by 3 out of the 46 antivirus programs on virustotal.com

McAfee Labs catalogs 100,000 new malware samples every day - 69 new pieces of malware a minute!

But I’m safe since I only visit legitimate web sites! Number of unsafe websites detected by Google Google blocks 10,000 per day, and 42,000 new malware sites are detected each week

Mainstream Websites More Likely to Harbor Malware 1. Blogs 19.8% 2. Web hosting 15.6% 3. Business and economy 10% 4. Shopping 7.7% 5. Education and reference 6.9% 6. Technology, computer, Internet 6.9% 7. Entertainment and music 3.8% 8. Automotive 3.8% 9. Health and medicine 2.7% 10. Porn 2.4% Top 10 Infected Web Site Types 80% are legitimate sites 2013 Cisco Annual Security Report

Malware Bottom Line Keep application and operating system patches up-to-date Don’t click on unknown links or attachments Don’t trust sites that ask for your cell phone number or require you to create a login account Keep anti-virus/anti-spyware up to date

The internet is overwhelmingly a power for good It provides cheap and easy access every moment of every day to vast amounts of information and entertainment, and it is transforming the nature of government and commerce. However …

You hold the keys to the kingdom THINK BEFORE YOU CLICK! Cyber Security is everybody’s responsibility

Questions? Don Winaker Network Security Manager