PRESENTATION TITLE 1 The Streetwise Security Awareness Non-Trivial Quiz Version 1.0 Compiled by Scott Wright The Streetwise Security Coach Score 10 points for each correct answer…
Creative Commons Licensed by Scott Wright. 2 Identity Theft Who had their Yahoo account hacked in 2008? 1. 1.Osama Bin Laden 2. 2.Stephen Harper 3. 3.Sarah Palin 4. 4.Brittany Spears
Creative Commons Licensed by Scott Wright. 3 Identity Theft Who had their Yahoo account hacked in 2008? 1. 1.Osama Bin Laden 2. 2.Stephen Harper 3. 3.Sarah Palin 4. 4.Brittany Spears Most of the answers to Sarah Palin’s Yahoo password reset questions were available from Wikipedia. The hacker guessed where she met her husband… Wasilla High School, Alaska
Creative Commons Licensed by Scott Wright. 4 Safe Web Browsing You can tell if a browser session is secure if… 1. 1.The URL is prefixed with “secure://” 2. 2.A pop-up dialog says “This is a secure session” 3. 3.“Verified by Visa” appears on the web page 4. 4.A “lock” icon appears beside the URL, or at the bottom of the browser window
Creative Commons Licensed by Scott Wright. 5 Safe Web Browsing You can tell if a browser session is secure if… 1. 1.The URL is prefixed with “secure://” 2. 2.A pop-up dialog says “This is a secure session” 3. 3.“Verified by Visa” appears on the web page 4. 4.A “lock” icon appears beside the URL, or at the bottom of the browser window
Creative Commons Licensed by Scott Wright. 6 Endpoint Security Antivirus programs are only effective when… 1. 1.Viruses are at least 2 weeks old 2. 2.Used together with Firewalls 3. 3.Virus definitions are updated regularly 4. 4.Computers are scanned in Safe Mode
Creative Commons Licensed by Scott Wright. 7 Endpoint Security Antivirus programs are only effective when… 1. 1.Viruses are at least 2 weeks old 2. 2.Used together with Firewalls 3. 3.Virus definitions are updated regularly 4. 4.Computers are scanned in Safe Mode
Creative Commons Licensed by Scott Wright. 8 Information Security Risks What is the most risky Internet application for enterprises? (according to Ponemon Research Study 2008) 1. 1.Limewire 2. 2.Gmail 3. 3.YouTube 4. 4.Hotmail
Creative Commons Licensed by Scott Wright. 9 Information Security Risks What is the most risky Internet application for enterprises? (according to Ponemon Research Study 2008) 1. 1.Limewire 2. 2.Gmail 3. 3.YouTube 4. 4.Hotmail Top 10 risky applications… 1- Limewire 2- YouTube 3- Gmail 4- Hotmail 5- Myspace 6- Facebook 7- Skype 8- Google Desktop Search 9- AIM 10- Google Talk Rated by IT Security Professionals in Enterprises (330 responses)
Creative Commons Licensed by Scott Wright Information Security Risks Use of unauthorized applications causes over half of reported… 1. 1.Lost productivity 2. 2.Identity theft 3. 3.Virus infections on networks 4. 4.Data loss incidents
Creative Commons Licensed by Scott Wright Information Security Risks Use of unauthorized applications causes over half of reported… (according to InsightExpress Study 2008) 1. 1.Lost productivity 2. 2.Identity theft 3. 3.Virus infections on networks 4. 4.Data loss incidents Other causes of Data Loss 1- Misuse of corporate computers 2- Unauthorized physical or network access 3- Remote worker network copying 4- Sharing of passwords, or weak passwords 100 IT professionals and 100 users surveyed.
Creative Commons Licensed by Scott Wright Information Security Threats Phishing is a type of attack where… 1. 1.Hackers probe a network looking for valuable information 2. 2.An employee takes property from work without permission s contain links to forged websites that collect usernames, passwords and other personal information 4. 4.An employee is bribed for inside information
Creative Commons Licensed by Scott Wright Information Security Threats Phishing is a type of attack where… 1. 1.Hackers probe a network looking for valuable information 2. 2.An employee takes property from work without permission s contain links to forged websites that collect usernames, passwords and other personal information 4. 4.An employee is bribed for inside information
Creative Commons Licensed by Scott Wright Join The Streetwise Security Zone Empower yourself and your team through Governance by Graffiti - Collaborating to secure your foundation for future growth Customize this presentation yourself, or get updates from…
Creative Commons Licensed by Scott Wright This work is licensed under a Creative Commons Attribution 2.5 License. Creative Commons Attribution 2.5 License You may use it and change it, but please keep the attributions to the original author.