Security Awareness: Security Tips for Protecting Ourselves Online Wednesday, February 10th, 2010 Brian Allen Network Security Analyst,

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
National Service Trust Automation Project Training Materials: Members and Alumni Corporation for National & Community Service (CNCS) National Service Trust.
SECURITY CHECK Protecting Your System and Yourself Source:
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
7 Effective Habits when using the Internet Philip O’Kane 1.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Security for Internet Every Day Use Standard Security Practices and New Threats.
Security Awareness: Security Tips for Protecting Ourselves Online Friday, May 20, 2011 Brian Allen, CISSP Network Security Analyst.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Security Awareness Presenter: Royce Wilkerson.
Security, Privacy, and Ethics Online Computer Crimes.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Staying Safe, Having Fun, And Cruising The ‘Net Daniel Owens IT Security Professional.
Scams Stevie's Scam School videos
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Security 101 Harper P. Johnson Information Technology Services Director of Information Security.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Topics in Internet Security A&D Lunch & Learn Brown Bag Friday, August 19, 2011 Brian Allen, CISSP Network Security Analyst, Washington.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
EDW647: Internet for Educators Dr. Roger Webster Department of Computer Science Millersville University July 23, 2008 Create.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Security Awareness Month: Security Tips for Protecting Ourselves Online Friday, October 30th, 2009 Brian Allen Network Security Analyst,
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Specialist communication channel. Sarah-Jane king.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
INTERNET SAFETY FOR KIDS
Catherine Metcalf | Dec U.S. Department of Education 2015 FSA Training Conference for Financial Aid Professionals The FSA ID – Resources for Assisting.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Protecting Your Assets By Preventing Identity Theft 1.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Computer Security Keeping you and your computer safe in the digital world.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Internet Safety.
Common Methods Used to Commit Computer Crimes
Ways to protect yourself against hackers
Cybersecurity Awareness
Protecting Your Identity:
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Security Awareness: Security Tips for Protecting Ourselves Online Wednesday, February 10th, 2010 Brian Allen Network Security Analyst, Washington University in St. Louis

Let’s Talk About… Zeus (And Other Bots That Steal Money) Home Wireless Router Security: Facebook/Social Network Security: Password Security: AV Products: Laptop Security: Browsing with Firefox Addons: Online Banking:

Three Notable Zeus Attacks in the Past Year Bullitt County, Kentucky: July $415, Western Beaver School District, PA Jan $219,000 Duanesburg Central School District, NY: Jan $3Million

How Zeus Works 1.Hackers send phishing s with a link to download the zeus bot to the victim’s computer 2.The zeus bot has a keylogger which captures the victim’s bank credentials 3.The criminal logs in to bank's website using that information, and transfers money to the "Customer Service Specialist" AKA Money Mule 4.The Mule then receives instructions on how to wire the money internationally, keeping a generation commission (money stolen from someone else's bank account!) for themselves

Zeus Facts 3.6 Million bots in the US as of Sep For Computers with up-to-date AV, 55% still were infected by Zeus Sold on the Underground Economy and Used by Criminal Organizations

What Can Zeus Do? The majority of the time a keylogger is activated Replace the web form on a search page to ask for additional information: card numbers, pin numbers, SSNs, answers to security questions, etc. Real-time screenshots can be taken from infected machines It can “phone home” and update itself

ZEUS Website/Phish Examples

#1 Way To Prevent Infection Do Not Click On Suspicious Links and Attachments In s If there are questions about a particular , ask first.

Tokens Are Not Perfect Zeus can create a direct connection between the infected computer and the attacker’s, allowing the bad guys to log in to the victim's bank account using the victim's own Internet connection. Many online banks will check to see whether the customer's Internet address is coming from a location already associated with the customer's user name and password, or at least from a geographic location that is close to where the customer lives. By connecting through the victim's PC or Internet connection, the bad guys can avoid raising any suspicions.

Requiring Two People is not Perfect - The attackers somehow got the Zeus Trojan on the county treasurer's PC, and used it to steal the username and password the treasurer needed to access and the county's bank account. - The attackers then logged into the county's bank account by tunneling through the treasurer's Internet connection. - Once logged in, the criminals changed the judge's password, as well as address tied to the judge's account, so that any future notifications about one- time passphrases would be sent to an address the attackers controlled. - They then created several fictitious employees of the county (these were the 25 real-life, co-conspirators hired by the attackers to receive the stolen funds), and created a batch of wire transfers to those individuals to be approved. - The crooks then logged into the county's bank account using the judge's credentials and a computer outside of the state of Kentucky. When the bank's security system failed to recognize the profile of the PC, the bank sent an with the challenge passphrase to an address the attackers controlled. - The attackers then retrieved the passphrase from the , and logged in again with the judge's new credentials and the one-time passphrase. Once logged in, the crooks were able to approve the batch of wire transfers.

Note the NY Attack Started on a Fri On Friday, Dec. 18, an unauthorized electronic transfer of $1,862,400 was made from a Duanesburg Central School District NBT Bank account to an overseas bank.

January 5, 2010 Dear Parents and Community Members, The Duanesburg Central School District announced today that it is working closely with the Federal Bureau of Investigation and New York State Police to investigate unauthorized electronic transfers of school district funds from its NBT Bank account. The district first learned of the fraudulent activity on Tuesday, Dec. 22, when contacted by an NBT bank representative, questioning the validity of a request for an electronic transfer of funds to multiple overseas accounts that day. Upon confirming with the district that the transfer was not authorized, the bank immediately cancelled the pending transaction, which totaled approximately $759,000. After further review, it was discovered that an additional $3 million in unauthorized electronic transfers to various overseas banks had already been executed over the previous two business days, between December Both district officials and the bank immediately contacted the FBI, which opened an investigation along with state police. To date, $2.5 million of the stolen funds have been recovered by NBT Bank, working with several overseas financial institutions. Thanks to NBT Bank’s aggressive pursuit of the stolen funds, we are fortunate that the vast majority of the money has been recovered. However, $497,200 of Duanesburg taxpayers’ money is still missing, and we are committed to doing everything in our power to recover the remaining funds. To prevent any district bank accounts from being further compromised, the district closed all of its bank accounts and established new ones with restricted online access. The district is cooperating fully with the ongoing investigation by the FBI and New York State Police. Additional details may be found on the district Web site at As soon as more information becomes available, it will be posted on the Web site. Sincerely, Christine Crowley Superintendent. Letter Sent Out After NY Attack

Questions So Far?

Facebook Privacy Settings

pics1

Twitter Users Are Targets Too

Twitter Phish 1 of 2

Twitter Phish 2 of 2

Password Topics

Parents’ Password Cracked On First Try The Onion News Feb 27, 2002 REDONDO BEACH, CA – Nick Berrigan, 14, successfully hacked into his parents’ AOL account on the first try Tuesday, correctly guessing that “Digby” was their password. “They actually used the dog’s name,” said Berrigan, deactivating the parental controls on his AOL account. Experts advise parents to secure Internet accounts with any password besides the name of a family pet

Free Password Managers 1.Password Safe: – Bruce Schneier’s Project 2.KeePass: keepass.info 3.LastPass: lastpass.com - Firefox Plugin 4.Mac KeyChain: 5.PassPack: –An online password manager

Commercial Password Managers ● 1Password - 1passwd.com ● Keeps track of all web passwords, automates sign-in, guards from identity theft for $39.95 ● Roboform - ● $29.95 for the Professional version

Some Key Threats to Passwords ● Brute force or dictionary attacks ● Keystroke loggers ● Social engineering/Phishing

Three KeePass Features 1.Require two factor authentication to access your keepass database

KeePass – Opening the Database

KeePass – The Main Interface

KeePass – Individual Entry

A Few KeePass Features 1.Require two factor authentication to access your keepass database 2.Drag and drop username and passwords into forms

Drag & Drop

A Few KeePass Features 1.Require two factor authentication to access your keepass database 2.Drag and drop username and passwords into forms 3.Autotype username and passwords into forms – a bit advanced

Some Solutions ● You really need two factor authentication to protect the password database ● Don't trust any machine other than your own to enter a password that protects anything sensitive ● Using a machine you don’t trust? Carry a Live CD of your favorite version of linux and boot off that

Long Password Expirations Can Be Good 1. Prevention of brute force password theft primarily comes from having strong passwords, not from regularly changed passwords 2. Strong passwords are more likely to be remembered if they are not changed often

Extra Long Password Expirations Could Be Bad ● We assume users will share their passwords: ● with Students ● with Staff ● with Friends ● with Family, etc. ● Putting a ceiling on the life of a password will keep these from lasting forever

Antivirus I look for: – the fastest – update themselves automatically – have an easy to use interface Symantec Endpoint AVG = AntiVir = Avast =

Symantec Endpoint (Symantec 11)

From CNET.com Editor Reviews AVG Popularity: * Total downloads 227,792,675 * Downloads last week 1,737,919 AntiVir Popularity: * Total downloads 61,994,231 * Downloads last week 905,902 Avast Popularity: * Total downloads 60,978,532 * Downloads last week 737,028

AVG Interface

AVG Will Check Every

Avira Interface

AVAST Interface

Home Wireless Router Tips Change Default Password Firewall is on by Default WPA2, not WPA or WEP MAC Address Filtering Leave SSID on No personal info in SSID like Smith_Family

Change The Default Password

Firewall Is On By Default

WPA2

MAC Address Filtering

Home Wireless Router Tips Change Default Password Firewall is on by Default WPA2, not WPA or WEP MAC Address Filtering Leave SSID on No personal info in SSID like Smith_Family

Laptop Tracking Software/Encryption

Key Questions to Consider How hard is it to disable or remove the software? Who will have access to the collected data? – A department? – The company? – Individuals? What type of data is collected? How many laptops are lost or stolen every year?

LoJack Pros Very difficult to disable Asset tracking The company, only with the user’s permission can log in to: – Take pictures – Erase the hard drive Will work with police to recover the laptop

LoJack Bios Compatibility Asus Dell Gammatech Getac Gateway General Dynamics HP Fujitsu Lenovo (IBM Thinkpad) Motion Computing Panasonic Toshiba

LoJack Cons Bios compatibility does not include Macintosh – 40% student machines are Macs Most Expensive - $49 per laptop The company can get access into laptops, although it is only to be initiated by the owner after it is reported stolen

Laptop/USB Encryption USB Hardware Encryption – IronKey $$$ Laptop/USB Encryption – TrueCrypt (Free!)

FireFox Addon: AdBlock Plus

The Top Firefox Addon (By Far)

Without AdBlock Plus

With AdBlock Plus

Online Banking Tips Never type your bank url into a browser Or click on a url that looks like your bank Always let Google find it for you – Should be the first link

MINT.COM - Discussion

Trends, Transactions, Etc.

Is It Safe? They Say: – Mint does not require any personally identifiable information – Sensitive numbers are not sent to or stored by Mint.com – Mint provides a strictly “read only” view of your transaction information – VeriSign Security Seal

Thank You! Brian Allen