Purdue University proudly presents www.purdue.edu/securepurdue Doug Couch & Nathan Heck, IT Security Analysts.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
Vijay krishnan Avinesh Dupat  Collection of tools (programs) that enable administrator-level access to a computer or computer network.  The main purpose.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Remote Access. What is the Remote Access Domain? remote access: the ability for an organization’s users to access its non-public computing resources from.
A+ Certification Guide Chapter 10 Mobile Devices.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
New Data Regulation Law 201 CMR TJX Video.
Threats to I.T Internet security By Cameron Mundy.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
eScan Total Security Suite with Cloud Security
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
1 Introduction to Security Chapter 11 Information Technology (IT) Security.
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
Wireless Networking and Security
THREATS TO MOBILE NETWORK SECURITY
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
1.1 System Performance Security Module 1 Version 5.
Phones and fieldTask. Session Objective Be familiar with: – selecting smart phones for a survey, – configuring them – and using them – fieldTask (c) Smap.
IT security By Tilly Gerlack.
Wireless Security: Protect yourself when you’re mobile.
Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Introduction to Firewalls
What is Spam? d min.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Mobile Banking Dangers Denise Butler Rick Hebert & Associates
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Security and Ethics Safeguards and Codes of Conduct.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Cybersecurity Test Review Introduction to Digital Technology.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Personal Data Protection and Security Measures Kelvin Lai IT Services - Information Security Team 12 & 13 April 2016.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Mobile Operating Systems
Overview 1. Phishing Scams
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Network and Internet Security and Privacy
Protecting Your Information Assets
Guide to Computer Forensics and Investigations Fourth Edition
Presentation transcript:

Purdue University proudly presents Doug Couch & Nathan Heck, IT Security Analysts

 Any security devices or software shown during this presentation is for demonstration purposes only. Purdue University does not endorse or support any PDA security device or software solutions at this time.

 BlackBerry Video

 Loss  Biggest threat to PDA’s  In one Chicago cab company in 6 months: ▪ 85,619 mobile phones ▪ 21,460 PDAs/Pocket PCs ▪ 4,425 laptops  80% of all passengers were reunited with phones and 96% with their Pocket PCs/PDAs and laptops  In 2007 about eight million phones were lost  Only about 72% were recovered

 Theft  Next biggest threat to PDAs  Be aware that they are a target  Know how to secure them  Know what to do if they are stolen

 Unauthorized Access  Your device can be under attack at any time  Do: ▪ Enable the built in security ▪ Double check your configuration  Don’t: ▪ Use obvious PIN’s ▪ Write your PIN on your PDA

 Electronic Eavesdropping  “Network sniffing”  Spyware  Wi-Fi hotspot impersonation  Possibly even cellular network vulnerabilities

 Electronic Tracking  Uses either GPS or cellular triangulation  Is available for tracking family or employees  Can be quickly enabled on unattended phones  Some trackers are stealthy  Tracking services may be vulnerable to compromise

 Electronic Tracking

 Spam  Annoying (as always)  Can be costly ▪ SMS spam may be charged per message ▪ spam may include images which take more bandwidth  Can be used for Social Engineering ▪ Can be used to trick users into calling or texting a chargeable number ▪ Used for Phishing to trick users into giving up private info

 Malware  Send mass SMS and MMS messages  Dial premium-rate numbers without your knowledge  Delete or steal your personal information  Disable functions of the phone  Use up the battery much faster than usual  Send infected files to others (via , Wi-Fi, Bluetooth etc.)  Transfer malicious code to a PC during synchronization  30% of cell phone users in the U.S. receive attachments

 Your device  Your personal data  Your business data or trade secrets  Money, due to an increased phone bill from unauthorized calls or data use  Your reputation  Possibly corporate data on servers

 Be Proactive  Configure user authentication and access controls  Apply critical patches and upgrades  Remove or disable unnecessary services or applications  Install additional security software

 Maintain the security of your PDA  Maintain physical control of the device  Reduce exposure of sensitive data  Backup data frequently  Use encryption  Enabling wireless interfaces only when needed  Enable and analyze device log files  Test and apply critical patches in a timely manner  Evaluate device security periodically

 Plan ahead  Use a PDA case  Use a screen protector  Use a surge protector when charging your PDA  Avoid using your PDA near liquids (or in the rain)  Use hands free options while driving  Don’t lend your PDA to someone  Consider device insurance

 Treat a PDA like a credit card:  maintain control at all times and store it securely  Be especially cautious while traveling  Keep a low profile when using your PDA  Record your PDA’s Identifying numbers  Engrave an ID number on it  Remove your data card  Dispose of properly

 Enter your contact information in the owner fields  Set a repeating alarm to go off on a regular interval  Use a security sticker or label  Third party recovery services  IF YOUR PDA IS LOST, YOUR DATA MUST BE ASSUMED TO BE COMPROMISED!

 Enable your built-in security  Configure to lock when inactive  Change any default passwords  Synchronize and backup data frequently  Remove or disable unnecessary services and applications  Don't store data on the SIM card  Use removable storage cards to store data separately

 Password management databases  Intrusion detection  Anti-virus  Anti-spam  Personal firewall  Device content and memory card encryption

 Alternate authentication programs  Remote locking/erasure  Remote tracking  GSM SIM lock  Multimedia Card Security Standard

 Use only secured wireless networks  Verify the SSID  Use a VPN when possible  Disable Wi-Fi ad-hoc mode  Disable Wi-Fi when not in use

 Disable the ‘discover’ mode of your Bluetooth  Always require a password to pair a device with your PDA  Disable Bluetooth when not in use  Keep a list of paired devices  Configure Bluetooth for the lowest power setting

 IR  Disable or block if possible  GPS  Disable when not using, if possible  USB

 VPN Clients  Phone firewall  SSH clients  ActiveSync lock  digital certificates

 Make sure you have the following information:  Serial Number  MAC Address (if Wi-Fi capable)  IMEI for GSM  If stolen, report it to the local law enforcement  Call your cellular provider and report the loss  At Purdue, report the loss to and provide the MAC  Add your PDA's information to the "Stolen Computer Registry"  Disable, lock, track, or erase it remotely  Change your passwords