What is Heartbleed? Heartbleed is a vulnerability in OpenSSL software. OpenSSL is encryption software that accesses websites through a “secure” connection,

Slides:



Advertisements
Similar presentations
WordPress Installation for Beginners Sheila Bergman
Advertisements

How to Use Stowe School District
XProtect® Web Client 1 Product presentation.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to access AUXDATA March If you have not received a Username from your DSO-IS, do not go any further. Send a request to your FSO-IS/SO-IS asking.
Popular Web client and server programs This work is licensed under a Creative Commons Attribution-Noncommercial- Share Alike 3.0 License. Skills: none.
Web browsers It’s a software application for retrieving and presenting information on WWW. An information resource is identified by a Uniform Resource.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
7 Effective Habits when using the Internet Philip O’Kane 1.
Heartbleed Bug. When all the net security people are freaking out, it’s probably an okay time to worry.
Windows 7 Project and Heartbleed Update Sian Shumway Director, IT Customer Service.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
72% of all parents are concerned that other people could locate their child through their mobile phone using location based services.
Signing and Encrypting With the Thawte Web of Trust CSU Professional Development Institute January 8, 2009 Steve Lovaas.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Safer Web Browsing Terry Labach Information Security Services IST.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
1 Mapping a Drive on the USF IIS Server. 2 Mapping a Drive To map a drive to a network file directory in Windows you must be on a Microsoft local area.
The Internet & Web Browsers Business Webpage Design Kelly Seale.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
RFC6520 defines SSL Heartbeats - What are they? 1. SSL Heartbeats are used to keep a connection alive without the need to constantly renegotiate the SSL.
BROWSERS & BROWSING What, Which & Why. WHAT IS A BROWSER? Once you have an Internet connection, some programs access the internet automatically to operate.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
Summer  Session starts at 11:00 am ◦ We’ll be online shortly ◦ Speaker test starts about 10:45  To ask questions, ◦ use the chat window.
Using Technology in Ministry Edward Braithwaite Seminary Student, NOBTS.
Computer Learning Ph.D. Candidate Department of Electrical and Computing Engineering University of Delaware Instructor: Jonghyun Kim 5 (Beginning Level)
Dr. Omar Al Jadaan The Internet. Internet Service Provider (ISP) Content Providers: create and maintained material that can be accessed using the internet.
Serge Borso The Heartbleed Bug Serge Borso
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
The Internet BTEC 149. What is it? Internet: A network of connected computers and computer networks located around the world ◦An international community.
sound-effects-sound-clips-family-feud-download sound-effects-sound-clips-family-feud-download-
Customer Service and Support Sutherland Global Services Consultant Learning Services Microsoft Store.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. WEB.
#5 Useful Reports Training Record Report February
Bao Nguyen. Invention of the Web Browser World Wide Web, : Tim Berners-Lee & Robert Cailliau. Not very popular. Netscape Browser, :
Practising Safer Web Browsing Terry Labach Information Security Services IST February 17, 2012.
September 2015 LCCU Meeting How can you manage the Adobe Flash security risk? How can you keep Flash and other software updated? We’ll answers members’
Zakir Durumeric, James Kasten,David Adrian, J. Alex Halderman, Michael Bailey, Frank Li, Nicholas Weaver, Johanna Amann, Jethro Beekman, Mathias Payer,
Introducing the Internet and The Web Computer Concepts Unit A What Is Internet.
Accessing Extras Portal February 9, Finding Link to Extras Portal -The Extras Portal is accessed via the Expedient Extranet -Via the “Manage Extras”
Setting up and getting going with…. MIT App Inventor.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Technical Orientation Summer Technical Orientation Session starts at 2:00 pm – We’ll be online shortly – Speaker test starts about 1:45 pm To ask.
Presented by Teererai Marange. Background Open SSL Hearbeat extension Heartbleed vulnerability Description of work Methodology Summary of results Vulnerable.
Useful Reports Certifications Report February
Protecting Your Identity: Information Security Basics Presented by:Barbara D. Kissner SVP & CIO International Fidelity Insurance Company March 18, 2014.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
 Computer News  Chromecast  One meeting a month (2 nd Wednesday)  Website &  
MODULE 3 Internet Basics © Paradigm Publishing, Inc.1.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Browser Wars By: Jesse Arredondo
Staying Secure Online How do we buy and sell safely on the Internet?
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
IN THIS LESSON WE WILL REVIEW THE STRUCTURE OF THE INTERNET AND HOW BROWSERS ASSEMBLE WEBSITES BASED ON INSTRUCTIONS THEY RECEIVE FROM SERVERS. Internet.
Internet Advancement Inland Northwest Council Program & Training Conference December 2011 Session Leader: Paul Yelk For Troops/Teams/Crews.
Uniform Resource Locator URL protocol URL host Path to file Every single website on the Internet has its own unique.
Goals Be able to identify the parts of a URL Determine the safeness of a link Know the best places to find the info you need Know how to deal with toolbars.
Can SSL and TOR be intercepted? Secure Socket Layer.
The Internet & Web Browsers Business Webpage Design Created by Kelly Seale Adapted by Jill Einerson.
Bring Your Own Device The Elementary Edition Bring Your Own Device Information for Teachers and Staff.
Understanding FTP File Transfer Protocol. Learning Objectives By the end of this lecture, you should be able to: – Describe the purpose of FTP – Install.
How to fix Netflix Signing In Issues? For More Details Visit Our Website
Norton Internet Security Customer Service Number Why Is Norton Antivirus Blocking Some Extensions From Being Installed On Microsoft Edge? Norton is not.
IT Security Awareness Day October 19, 2016
HEARTBLEED: Technical Description and Fixes
Navigating the Internet
Computer Security Password Management.
Presentation transcript:

What is Heartbleed? Heartbleed is a vulnerability in OpenSSL software. OpenSSL is encryption software that accesses websites through a “secure” connection,

How does it work? To communicate, a client computer and the server send back and forth a short block of data. The block contains a value for the length of the block. The malformed block says its length is 64KB, the maximum possible. The server copies that much data from memory into the response. It may send passwords, encryption keys, etc.

When happened when? OpenSSL releasedMarch 2012 Publicly reported as vulnerable1 April 2014 Patch released21 March 2014 (Some fixes had already been put in place then) First proven attempted exploit8 April 2014 Intentional vulnerability test12 April 2014

How may sites are vulnerable? (After vulnerability was reported publically)

How may sites are vulnerable? A list the top 1,000 most popular web domains and mail servers that remain vulnerable.

What should you do? Change all passwords as soon as you can. Find out which sites are vulnerable On vulnerable sites that have been patched: Old passwords may be compromised On sites not yet patched (ask about current status): New passwords may become compromised, so change them regularly On sites not affected: Was same password used elsewhere?

Which sites are not affected? Almost all financial service sites are OK. Amazon BCPL Dell Ebay Erickson Gcflearnfree Haband MS Live ID Mychart, (Erickson) PayPal US Treasury

Which are common patched sites? Dropbox Facebook Google Netflix Norton Skype Wikipedia Yahoo Site List Search for site lastpass.com/heartbleed /

How do I manage? Use a Password Manager, free - LastPass Use a LastPass account, import your existing passwords or save newly generated ones. A good way to manage passwords in Windows, includes an IE installer. Supports Internet Explorer 8+, Firefox 2.0+, Chrome 18+, Safari 5+, Opera

What does your son/daughter know? Keep a separate, up to date record of your passwords in a safe place. Make sure your designated representative knows where that record is.