May 18, 2005 2005 User Forum Lynda McGinley UCAR Security Security Awareness UCAR Security Lynda McGinley 303.497.1821 UCAR Security.

Slides:



Advertisements
Similar presentations
What you will get? Or what you like to know?
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Using Kerberos the fundamentals. Computer/Network Security needs: Authentication Who is requesting access Authorization What user is allowed to do Auditing.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Mercury Payment Systems Dan Osby Director, Technical Services Technical Lead, Incident Response
Data Encryption Overview South Seas Corporation Jared Owensby.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
KerberSim CMPT 495 Fall 2004 Jerry Frederick. Project Goals Become familiar with Kerberos flow Create a simple Kerberos simulation.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Cyber Security – Our Approach James Clement Network Specialist ETS: Communications & Network Services
Guide to Operating System Security Chapter 10 Security.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
1.0 Computer Lab Regulations 1.1 Computer Lab Rules 1.2 User 1.3 Equipment 1.4 Data and User Security.
Leading at Every Turn. 1)Make sure you have your Trusted Sites configured properly in Internet Explorer 2)Store your credentials on your PC so you.
MS systems use one of the following: LanManager Hash (LM) LanManager Hash (LM) NT LanManager (NTLM) NT LanManager (NTLM) Cached passwords Cached passwords.
Your storage on the ground; Your files in the cloud.
Security Awareness Norfolk State University Policies.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Internet Safety Portage Department of Public Safety.
Cyber Patriot Training
National Energy Research Scientific Computing Center (NERSC) Computer Security – The New Threats Stephen Lau NERSC Center Division, LBNL June 24, 2004.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Staying Safe Online Keep your Information Secure.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Best Practices for Protecting Data. Section Overview Mobile Computing Devices Technical Procedures Data Access and Permissions Verbal Communication Paper.
©Holm Publications Security Awareness Presentation.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
SECURITY ENGINEERING 2 April 2013 William W. McMillan.
C HAPTER 4 A UTHENTICATION POLICY C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES © Routledge.
12/01/1999Joe Lewis - Xcert International Inc. Who’s Peeking at Your Files? A Guide to Personal Data Security.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
How to safely use Facebook. Ken Loveday. TIPS FOR PROTECTING PERSONAL INFORMATION FACEBOOK LOGIN  Required Info  Name   Password  Birthday.
Mastering Windows Network Forensics and Investigation Chapter 13: Logon and Account Logon Events.
All Input is Evil (Part 1) Introduction Will not cover everything Healthy level of paranoia Use my DVD Swap Shop application (week 2)
Module 11: Read-Only Domain Controllers. Overview Describe the Read-Only Domain Controllers role Use Read-Only Domain Controllers.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Lieberman Software Random Password Manager & Two-Factor Authentication.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
Module 11: Designing Security for Network Perimeters.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Security Awareness – Essential Part of Security Management Ilze Murane.
Security fundamentals Topic 9 Securing internet messaging.
General Concerns on WWW Security Name: Huaying Chen ID# Instructor: Dr Mort Anvari.
Steps for Symantec PGP Standalone install with Please use the following steps and screenshots to step your way through a standalone install of PGP.
©Richard L. Goldman Public Key Policies for Windows 2000 ©Richard Goldman December 5, 2001.
JLAB Password Security Ian Bird Jefferson Lab HEPiX-SLAC 6 Oct 1999.
E-Commerce & Bank Security By: Mark Reed COSC 480.
BullGuard Identity Protection September Compatible with ANY device and ANY O/S  Identity Protection – allows users to monitor their sensitive personal.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Technological Awareness for Teens and Young Adults.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
PC Manager Meeting February 23, Today Updates Next Meeting Windows Policy Security This Month: Lessons Learned: Building the Symantec Patch (Andy.
Windows XP Professional Not Finish Yet
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Fix yahoo mail error code 4 Call Toll-free Number
Information Security 101 Richard Davis, Rob Laltrello.
Tips on Password Safety Taylor Palmer
Things To Avoid: 1-Never your password to anyone.
Security.
Information Security Awareness
Chapter 3: Protecting Your Data and Privacy
9 ways to avoid viruses and spyware
Security.
Presentation transcript:

May 18, User Forum Lynda McGinley UCAR Security Security Awareness UCAR Security Lynda McGinley UCAR Security Lynda McGinley

May 18, User Forum Lynda McGinley UCAR Security Security Awareness Expectations of a Compromise Notification Communication Forensics Patch or rebuild? Notification Communication Forensics Patch or rebuild?

May 18, User Forum Lynda McGinley UCAR Security Security Awareness Our Expectations Servers OS current? Security patches applied? Unnecessary services turned off? No unused accounts? No telnet or r-services? Dangerous applications patched? Servers OS current? Security patches applied? Unnecessary services turned off? No unused accounts? No telnet or r-services? Dangerous applications patched?

May 18, User Forum Lynda McGinley UCAR Security Security Awareness Our Expectations Clients OS current Security patches Communication applications current no autologins Clients OS current Security patches Communication applications current no autologins

May 18, User Forum Lynda McGinley UCAR Security Security Awareness Protect your workstation/laptop Credentials (pass-phrases, pgp keys, etc.) Set your browser cache to low or zero Disallow pop-up windows Unknown source of CD’s/usbdrives (just say no) Protect your workstation/laptop Credentials (pass-phrases, pgp keys, etc.) Set your browser cache to low or zero Disallow pop-up windows Unknown source of CD’s/usbdrives (just say no)

May 18, User Forum Lynda McGinley UCAR Security Security Awareness User best practices Passwords: 6-14 characters alpha/numeric/punctuation mix no dictionary words no names of children/pets/spouses change every 3 months UCAR has a password policy Do you know it? Passwords: 6-14 characters alpha/numeric/punctuation mix no dictionary words no names of children/pets/spouses change every 3 months UCAR has a password policy Do you know it?

May 18, User Forum Lynda McGinley UCAR Security Security Awareness User best practices Danger ahead Account sharing Unknown applications (md5 checksums) Media you get in the mail viruses Social engineering Danger ahead Account sharing Unknown applications (md5 checksums) Media you get in the mail viruses Social engineering

May 18, User Forum Lynda McGinley UCAR Security Security Awareness User best practices Helpful information: CSAC policies ( Appropriate Use policy Legislation Helpful information: CSAC policies ( Appropriate Use policy Legislation

May 18, User Forum Lynda McGinley UCAR Security Security Awareness What’s next in UCAR security One time passwords for everyone Store and forward gateway Kerberos PGP for ? What’s next in UCAR security One time passwords for everyone Store and forward gateway Kerberos PGP for ?

May 18, User Forum Lynda McGinley UCAR Security Security Awareness Questions?