The best security devices don’t stop cars getting stolen Thieves look for the old cars/alarms Or careless owners…

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
How to protect yourself, your computer, and others on the internet
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Thank you to IT Training at Indiana University Computer Malware.
Modul 7 Preservasi Surat Elektronik Mata Kuliah Preservasi Informasi Digital.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
1 Identity Theft and Phishing: What You Need to Know.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Kevin Mitnick Home Internet Security Course Today, Internet criminals are going after families. They try to guess your passwords and steal your credit.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
COS 420 DAY 25. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Today we will discuss.
Tips and Techniques: How to Protect Yourself and Others Better Jeanne Smythe February 20, 2004.
Bluehat 2014 Looking back and driving forward Chris Betz Senior Director Microsoft Security Response Center.
Incident Response Updated 03/20/2015
Internet Ethics. Internet Ethics Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty.
Technology is a wonderful thing that few of us could see ourselves doing without and when it comes to personal safety it can be of great benefit. However.
Anya Brookman. How to create a new message Unwanted messages Folders Messages you have sent to someone Logging out when you have finished sending.
Tracing Examples Computer Forensics Tracing Examples.
Social impacts of the use of it By: Mohamed Abdalla.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Information Literacy in the workplace: implications for trainers By Dr. Mark Hepworth Department of Information Science Loughborough University.
Seattle Community Network How to use SCN to send and receive . Using the PINE Service Text based .
Intro to Computer Networks Bob Bradley The University of Tennessee at Martin.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Cyber Bullying: Not Something To Be Ignored A Presentation By Tyler Mulford.
Copyright © 2005 janusNET Pty Ltd UNCLASSIFIED Official information in – managing the risk of leakage ● Reduce risk via protective markings ● Simplify.
ESCCO Data Security Training David Dixon September 2014.
s By Mollie.
Scams & Schemes Common Sense Media.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Heba Daraghmeh 27/6/2010 Basic Computer Terminology.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
The Strickland Group Founded in employees Information Technology consulting – Software Development – HelpDesk Support – Network Infrastructure.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Santa’s s By Chloe Warman.
Santa’s s By Brandon. Sending an attachment to Santa I attached the by pressing the attachment button above the recipient box I used.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID.
Influence : Principles of Persuasion By Rina Cao.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
VFM Value for Money OR How not to get screwed and survive in the Downturn.
BASIC ETIQUETTE Use the BCC and CC appropriately. 3.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Library Technology Hub
Web Programming Week 9 Old Dominion University Department of Computer Science CS 418/518 Fall 2010 Martin Klein 10/26/10.
Santa’s s By Chantelle Cogin. Sending an attachment to Santa I made a new message and i pressed the insert button and choose what I wanted.
By Liam Wright Manga comic group Japan SAFETY on your computer.
You. are at risk for the fastest growing crimes crime.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
Technical Awareness on Analysis of Headers.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Computer Security By Duncan Hall.
 Face to face  Oral  Written  Visual  Electronic Communication in Administration 2.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
How to build a good reputation online
Education – Partnership – Solutions
Presentation transcript:

The best security devices don’t stop cars getting stolen Thieves look for the old cars/alarms Or careless owners…

Often it is the person, not the process that is the threat. (“guns don’t kill people, people do”)

“Weapons of Influence” Reciprocity - People have to return a favour ( info scares). Commitment and Consistency - If people commit, orally or in writing, to an idea or goal, they are more likely to honour that commitment. Social Proof - People will do things that they see other people are doing. Authority - People will tend to obey authority figures, even if they are asked to perform objectionable acts. Liking - People are persuaded by other people that they like. Scarcity - Perceived scarcity will generate demand. Presented by Carol Bott, Asst. Director ICT Security Professionalisation, DSD

Also check out “Stumbling on Happiness” The brain tricks us on a second-by-second basis People make regular, invalid assumptions of their future happiness We want our actions to work out well, even in the face of contradictory evidence

So how do those techniques apply to the online world?

Authority… consistency…

Authority… scarcity…

I received this from a reliable family friend this morning. 10/28/01 BIG TROUBLE !!!! DO NOT OPEN "WTC Survivor" It is a virus that will erase your whole "C" drive. It will come to you in the form of an from a familiar person. I repeat a friend sent it to me, but called and warned me before I opened it. He was not so lucky and now he can't even start his computer! Forward this to everyone in your address book. I would rather receive this 25 times than not not all. If you receive an called "WTC Survivor" do not open it. Delete it right away! This virus removes all dynamic link libraries (.dll files) from your computer. This is a serious one. Social proof… reciprocity… liking… authority…

Microsoft Mail Internet Headers Version 2.0 Received: from mail.nntt.gov.au ([ ]) by perdcexch.nntt.gov.au with Microsoft SMTPSVC( ); Wed, 24 Mar :59: X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AggDANIcqUvLCgHyjmdsb2JhbACBQpllFQEBAQEJCwgJEQUfvk+CVYIoBIMc X-IronPort-AV: E=Sophos;i="4.51,298, "; d="scan'208,217";a=" " Received: from outbound-mail01.westnet.com.au ([ ]) by ironport.nntt.gov.au with ESMTP; 24 Mar :59: X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: Aj8GAEodqUvKSLOI/2dsb2JhbACBQplkdL5UglWCKASDHA X-IronPort-AV: E=Sophos;i="4.51,298, "; d="scan'208,217";a=" " Received: from dsl wa.westnet.com.au (HELO remote.rossgriffin.com.au) ([ ]) by outbound-mail01.westnet.com.au with ESMTP/TLS/AES128-SHA; 24 Mar :59: Received: from RGH-FS1.rgh.com.au ([fe80::2064:1a0f:44e0:5d5d]) by RGH-FS1.rgh.com.au ([fe80::2064:1a0f:44e0:5d5d%10]) with mapi; Wed, 24 Mar :59: From: Reception To: "Dart, Martin" Date: Wed, 24 Mar :59: Subject: RE: Car Thread-Topic: Car Thread-Index: AcrK8Rs9/pl5wC0XQou06Ey5nNmsjQADKmaA Message-ID: References: In-Reply-To: Accept-Language: en-US, en-AU Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US, en-AU x-tm-as-product-ver: SMEX x-tm-as-result: No x-tm-as-user-approved-sender: No x-tm-as-user-blocked-sender: No Content-Type: multipart/alternative; boundary="_000_603AE2C1D22F1747A92EA6C9CE375A8057D86724RGHFS1rghcomau_" MIME-Version: 1.0 Return-Path: X-OriginalArrivalTime: 24 Mar :59: (UTC) FILETIME=[04B86DE0:01CACAFE] --_000_603AE2C1D22F1747A92EA6C9CE375A8057D86724RGHFS1rghcomau_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable --_000_603AE2C1D22F1747A92EA6C9CE375A8057D86724RGHFS1rghcomau_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable --_000_603AE2C1D22F1747A92EA6C9CE375A8057D86724RGHFS1rghcomau_--

Dr Ian J Watt AO Secretary of Defence 70% of targeted attacks can be mitigated by following 4 basic strategies Defence is targeted around 200 times each year by organisations seeking to steal specific information. Non-defence agencies are targeted some 220 times. Duncan Lewis AO National Security Advisor DPMC Anonymity & non-attribution the main benefits attacks enjoy. Mining sector a recently expanding battlefield “We must all hang together, or most assuredly, we will hang alone”. (Benjamin Franklin)

Other conference points of note: The PSM needs urgent review in this area, as it’s focus has been on protecting paper Any internet system can be compromised We need to extend beyond the footprint of our technology/systems – security involves the end-to-end transaction 2007 Estonian ‘cyberwar’ noted as a portent or things to come (be that state- sponsored of non-state actors). 75% of attacks utilise targeted socially engineered

Any network can be utilised as a jumping off point for bigger attacks (hence we are a target) Government has not had capacity to date to realise the extent of attacks Boundaries are useless - we must extend systems into the community We needs learning/adaptive systems – no more siege warfare If not patched, you are swiss cheese. Patch within 2 days.

Do this! (at home and work) Automated patching makes your system self-learning How? Easy – Start/search/”update”

Simple tip #1 Choose the right user account… Give everyone a personal account Use unique & complex passwords Change passwords as often as you can tolerate

Simple tip #2 …and put them in the right group! There should only be 1 administrator If your making your life easier, you making it less secure.

Thanks.. Questions?