Topics in Security IS&T All Staff Meeting Tuesday, April 7, 2011 Brian Allen, CISSP Network Security Analyst, Washington University.

Slides:



Advertisements
Similar presentations
Processing Your Loyalty Order Online. Table of Contents Click for direct link to your preferred topic: Process your Loyalty Rewards Order TODAY Edit your.
Advertisements

So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen Network Security Analyst,
Employee Self Service (ESS) Registration
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
MTLE Minnesota Teacher Licensure Exams Reading Teacher, K Test Preparation Hamline University School of Education.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
S tudent B usiness O ffice Presented by Bob Putich Lynn Plancich.
7 Effective Habits when using the Internet Philip O’Kane 1.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Your tool to help you build a list of Subscribers.
Security for Internet Every Day Use Standard Security Practices and New Threats.
Security Awareness: Security Tips for Protecting Ourselves Online Friday, May 20, 2011 Brian Allen, CISSP Network Security Analyst.
Internet Security Awareness Presenter: Royce Wilkerson.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
Miscreant of Social Networks Paper1: Social Honeypots, Making Friends With A Spammer Near You Paper2: Social phishing Kai and Isaac.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Basics Dayton Metro Library Place photo here August 10, 2015.
PROACTIS: Supplier User Guide Contract Management.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Quarterly Reporting System Presented by Sandy Craypo.
Protecting Your Information Valuables in “Cyberspace” Charlie Russell Rappahannock Rotary Club May 30, 2012.
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
SPS Donate Now VT. Donate Now Test Account Please use the following test account when you are conducting a demo of the Donate Now VT with your merchant:
Dropbox is a tool the CSME will set up for its participants upon request so that participants do not have to upload podcasts to CSME servers via FTP (file.
User Account Administration
Topics in Internet Security A&D Lunch & Learn Brown Bag Friday, August 19, 2011 Brian Allen, CISSP Network Security Analyst, Washington.
Scams & Schemes Common Sense Media.
Communicating in the 21 st Century Easy Ways to Use the Internet for Adult Faith Formation Terri Miyamoto Church of St. Clare, Staten Island.
Canada’s Anti Spam Legislation. What is CASL? CASL was intended to combat negative online behaviour  spam  phishing  malware  spyware  It will create.
Encryption Cisco Ironport using Click here to begin Press the ‘F5’ Key to Begin.
How can I access my account over the phone? Please call the BISYS participant inquiry line at The automated system will then prompt you.
My AmeriCorps Portal First Steps Go to Scroll down and click on the link:
Future Soldier Center Future Soldier AKO Account Creation 21 October 2010 * If you require additional assistance during this registration process, please.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Online Activity Module User Account and Contact Us June 5, 2013.
CCT355H5 F Presentation: Phishing November Jennifer Li.
All EN Payments Call June 30, 2015 Operations Support Manager Social Security’s Ticket to Work Program.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Welcome To Back To School Night Jennifer A. Gripton Educ 509 Friday, November 27, 2015Friday, November 27, 2015Friday, November 27, 2015Friday, November.
CONFIDENTIAL. REPORTS Session is designed to help you understand how to locate and obtain Network Reports, and how to print Network Mail. Network Reporting.
April 21, 2010 Sunflower Project Monthly Conversion Meeting – April.
Schneider Electric Automated Lunch and Learn Program Launch November 09, 2015 Presented by: Charlie Matthews, Applied Offer Program Specialist Confidential.
Messages 1. Outline Fields of an Subject line One point per The expected response Be a good correspondent Final tips 2.
On-Line BankCard Center Presentation Cardholder Role During the Presentation click the mouse on this button to move back a slide During the Presentation.
DIGITAL PLATFORM TUTORIAL HOW TO USE THE MERCURE AWARDS WEBSITE.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
ONLINE DETECTION AND PREVENTION PHISHING ATTACKS
First Day of Class Student Registration Guide Linking LaunchPad to Desire2Learn Spring 2016 First Day of Class.
SPS Donate Now VT.
Direct Deposit Phishing Attack
Learn how to protect yourself against common attacks
About Dropbox Dropbox is a tool the CSME will set up for its participants upon request so that participants do not have to upload podcasts to CSME servers.
Supplier Portal Self-Registration
Author Registration Tutorial (post submission) OPUS-Governors State University April 10, 2017.
Norton Antivirus Password Not Working Norton technical support phone number
Norton Antivirus Technical Support Number Norton toll free number
Student Accounts Orientation.
Information Security Session October 24, 2005
NEPSI Online Reporting System
First Step: Go to and click on NUCLEUS
Security Hardening through Awareness August 2018
Week 7 - Wednesday CS363.
Discovering Technology
How to a Document Using Gmail? | GMAIL CUSTOMER SERVICE NUMBER
Presentation transcript:

Topics in Security IS&T All Staff Meeting Tuesday, April 7, 2011 Brian Allen, CISSP Network Security Analyst, Washington University in St. Louis

Security Tip #1 Do not click on links in s

Security Tip #2 See Tip #1 (Thanks Barb!)

Spam Product Supplier Seller 1Seller 2Seller 3 Accountant Spammer3 Spammer2 Spammer1 Spammer2 Spammer3 Spammer1 Spammer2 Spammer3

Where Does Spam Originate? Why Do We Care? Spam = Bots (Large armys of infected machines sending out spam) Bots = Sophisticated Malware Sophisticated Malware = Organized Crime More than 89% of all messages were spam in Symantec

Spam is Big Business Rates for one million addresses: $25 to $ ,000 malware installations: $300–$80 Sending 100 million s per day: $10,000 per month Cutwail’s profit for providing spam services: $1.7 - $4.2 million since June 2009 – Aug 2010 How much do the spammers gross per day? $7000

Underground Economy Spammers also are involved in: – CAPTCHA solving – harvesting – Custom software – Bulletproof hosting – Proxys

Spam Volume From Jul 30 - Aug 25, 2010 security researchers infiltrated the Cutwail spam network and discovered 87.7 billion s were successfully sent

Spam Content Pornography Online pharmacies Phishing Money mule recruitment Malware The malware (Zeus banking Trojan) typically includes: – Greeting card – Resume – Invitation – Mail delivery failure – Receipt for a recent purchase.

Spam Blacklisting Only about 12% of bots are blacklisted after an hour when they come online The rate reaches 90% after a period of about 18 hours

Spam Volume on WUSTL Ironports - Feb 2011

Phishing

Spear Phishing Example

Phishing Example??

Social Security Number 1 From: BOB Sent: Friday, April 01, :54 PM To: ALICE Subject: Registration Request ALICE: Couldn't remember if I had already sent this request or not. Please register CHARLIE ( ) for the session Thank you BOB

Social Security Number 2 From: BOB Subject: FW: University talk To: Date: Monday, April 4, 2011, 12:57 PM Dear Ms. ALICE and CHARLIE, I sent this a couple of weeks, but I haven't heard back from you yet, so I thought that I would send it again. Also, my SSN is and my home address is: 1234 Oak Ave. St. Louis, MO 63130

s, Like Postcards, Are Not Encrypted Contact me to discuss encryption options for storing or sending sensitive information

Thanks!