Presentation is loading. Please wait.

Presentation is loading. Please wait.

Protecting Yourself Keeping Your Secrets Secret November 11, 2004

Similar presentations


Presentation on theme: "Protecting Yourself Keeping Your Secrets Secret November 11, 2004"— Presentation transcript:

1 Protecting Yourself Keeping Your Secrets Secret November 11, 2004
9/20/2018 Protecting Yourself Keeping Your Secrets Secret November 11, 2004 Arlene Yetnikoff Director of Information Security DePaul University NIDS with Snort

2 Information Security at DePaul
Who we are Information Services - Business Continuity and Security Group (BCS) Web Site Addresses for BCS team Bill Eaheart - Eric Pancer – Arlene Yetnikoff – Ed Gregory – Cheryl Barkby - Maybelline Davis - Reporting security incidents 9/20/2018 Information Security

3 Today Provide practical information
9/20/2018 Today Provide practical information General guidelines for protecting yourself and your information on the Internet No Silver Bullet Understanding risks and scams is critical Presentation available at: 9/20/2018 Information Security NIDS with Snort

4 Agenda Viruses Phishing Other scams Spam Cryptography Email Tips
9/20/2018 Agenda Viruses Phishing Other scams Spam Cryptography Tips Questions and Discussion 9/20/2018 Information Security NIDS with Snort

5 Viruses What do they look like? How do they work?
Attachment From someone you don’t know or someone you know very well Usually will have a very impersonal note in it How do they work? Automated Honor system What should you do when you get one? Delete key Stinger - 9/20/2018 Information Security

6 Viruses How can you prevent all viruses?
How can you prevent many viruses? AVG – Symantec security check - Are some files more likely than others to carry viruses? Errrr…..well…..yes But don’t let that make you feel comfortable with other files. 9/20/2018 Information Security

7 Phishing Attempts to get personal information for the objective of identity theft or theft of money What do phishing scams look like? I checked the url in the – it looks okay, can I click? Fun Practice phishing IQ test Unsure? Ask us – 9/20/2018 Information Security

8 Other Scams Nigerian – 419 fraud Foreign lotteries
Postcard drives, name frequency surveys 9/20/2018 Information Security

9 Spam What is Spam? Why do people send Spam?
9/20/2018 Spam What is Spam? Why do people send Spam? How can I tell who it is from? How do ‘spammers’ get my ? If I ‘unsubscribe’ will it stop? What is an open relay? How can I prevent Spam? 9/20/2018 Information Security NIDS with Snort

10 What is Spam? Email Unwanted Inappropriate Unsolicited (UCE) 9/20/2018
Information Security NIDS with Snort

11 Why do people send Spam? Equivalent to junk mail Difference
9/20/2018 Why do people send Spam? Equivalent to junk mail Difference junk mail is a cost for the sender spam is a cost for everyone else Attempting to sell products and services 9/20/2018 Information Security NIDS with Snort

12 How can I tell who it is from?
9/20/2018 How can I tell who it is from? Majority of the time you cannot tell the origin Very sophisticated open mail relays Ethical? Check the headers one time accounts forged headers 9/20/2018 Information Security NIDS with Snort

13 What is an open relay? Open mail relay Problems
9/20/2018 What is an open relay? Open mail relay mail server processes a mail message where neither the sender nor the recipient is a local user Problems In the past, third party mail relaying was a useful tool – remote users Open mail relays pose a significant threat to the usefulness of . Abuse occurs when massive amounts of mail are relayed through an otherwise unrelated server. Costs – storage space, bandwidth, time 9/20/2018 Information Security NIDS with Snort

14 Open Mail Relay 9/20/2018 9/20/2018 Information Security
NIDS with Snort

15 Email Headers Viewing email headers on Groupwise
9/20/2018 Headers Viewing headers on Groupwise Open the offending Choose File > Attachments > View. You can view the message headers by clicking on the attachment ‘Mime.822’ 9/20/2018 Information Security NIDS with Snort

16 Reading Email Headers http://www.stopspam.org/email/headers.html
9/20/2018 Reading Headers Check for more 9/20/2018 Information Security NIDS with Snort

17 How do ‘spammers’ get my email?
9/20/2018 How do ‘spammers’ get my ? Harvesting WebPages Harvesting Newsgroups Guessing Buying lists from other spammers or companies From a mailing list By people themselves Other ways 9/20/2018 Information Security NIDS with Snort

18 If I ‘unsubscribe’ will it stop?
9/20/2018 If I ‘unsubscribe’ will it stop? Do not respond to spam By responding you: Verify that your address is valid. Verify that you actually read the mail, and took the time to reply to it. Show a lack of anti-spam knowledge to the spammer Increase the chances that you will receive more spam 9/20/2018 Information Security NIDS with Snort

19 How can I prevent Spam? May be able to limit spam
9/20/2018 How can I prevent Spam? May be able to limit spam Use a separate address when you post to newsgroups and mailing lists NEVER buy anything from a company that spams. Don't visit their sites or ask for more information. Do not forward chain letters, petitions, mass mailings, or virus warnings Protect your address Filter from your inbox Use a commercial product. Some services may have a spam report feature. 9/20/2018 Information Security NIDS with Snort

20 Filtering Email Researching Possibilities Pro’s Con’s
9/20/2018 Filtering Researching Possibilities Pro’s May limit some spam Con’s Can slow mail delivery May drop legitimate mail Managing filters New ways to deliver 9/20/2018 Information Security NIDS with Snort

21 Cryptography Terms What is PGP? How does it work? Examples Tutorial
9/20/2018 Cryptography Terms What is PGP? How does it work? Examples Tutorial 9/20/2018 Information Security NIDS with Snort

22 Terms Cryptography Encryption Decryption Cipher Text
9/20/2018 Terms Cryptography Mathematical manipulation of data Encryption Process of scrambling information Decryption To undo the encryption process Cipher Text Mangled information Public Key cryptography (asymmetric) Encryption and Decryption are performed with different keys Secret Key cryptography (symmetric) Same key is used for Encryption and Decryption 9/20/2018 Information Security NIDS with Snort

23 What is PGP? PGP – Pretty Good Privacy Strong encryption software
9/20/2018 What is PGP? PGP – Pretty Good Privacy Strong encryption software Authored by Phillip Zimmerman Scrambles s and files 9/20/2018 Information Security NIDS with Snort

24 Why should I use it? Security Privacy
9/20/2018 Why should I use it? Security Privacy Options - Free versions available PGP some licensing restrictions may apply for newer versions GNU Privacy Guard – gpg completely free S/MIME 9/20/2018 Information Security NIDS with Snort

25 Privacy? C:\mailscan2.is.depaul.edu
9/20/2018 Privacy? C:\mailscan2.is.depaul.edu Tracing route to mailscan2.is.depaul.edu [ ] over a maximum of 30 hops: ms ms ms ms ms ms dsl chi1.dsl.speakeasy.net [ ] ms ms ms border5.ge3-2.speakeasy-28.chg.pnap.net [ ] ms ms ms core5.ge3-0-bbnet2.chg.pnap.net [ ] ms ms ms gigabitethernet ipcolo1.Chicago1.Level3.net [ ] ms ms ms gigabitethernet5-2.core2.Chicago1.Level3.net [ ] ms ms ms p5-1.chcgil2-cr2.bbnplanet.net [ ] ms ms ms p0-0.icnet.bbnplanet.net [ ] ms ms ms rtr-cst-bs-int2-a1-0.netequip.depaul.edu [ ] ms ms ms mfc-cst-bs-a-v865.netequip.depaul.edu [ ] ms ms ms mfc-cst-5a-v19.netequip.depaul.edu [ ] ms ms ms smtp.depaul.edu [ ] Trace complete. 9/20/2018 Information Security NIDS with Snort

26 How does it work? 9/20/2018 9/20/2018 Information Security
NIDS with Snort

27 Example Plain text Hello world Encrypt with public key
9/20/2018 Example Plain text Hello world Encrypt with public key Encrypting created Ciphertext -----BEGIN PGP MESSAGE----- Version: PGPfreeware for non-commercial use < qANQR1DBwU4DSTJMC1F2PksQB/0bmezbfmj/1NUYt5qM8TbOOl7uZH8wYNrsVFnF ALv+wwdYFTMhT/DBoSWwnizkY31k0bTei57EjlNjg4z9mqgabm4OCj1s0O3GVQDP tIafYzDmdOrojgZ2jrszExFARL47ygXZA5qnDxoI3W5RiSbn5iQpp66wucJETAey /tWpLjVBtb8vsD+djRm/3OBxj+VXRdJJynk3+HHrqpvBDLkMCK+p2JSnqT2w2jK6 biDVKNtKao7Vq5sQYWZ1UAHXuH53Ph9NZIYuk6NKoNljeomSbYs46lx/SHzotB+M w3+ou7xausaUn0/Q24+YclFPdyVDHbyThEWGSCZvMjCZcLqACAC1sLhpDZUwgW1g cGQ6dTsnySTtmV9uB/tMyAPPnPQ+FP+Hd1bpBP000R+ySteLHjEKjMV752k= =ScLD -----END PGP MESSAGE----- Decrypt with private key Plaintext Hello World 9/20/2018 Information Security NIDS with Snort

28 Email Tips Be smart about your password Keep browsers up-to-date
9/20/2018 Tips Be smart about your password Keep browsers up-to-date Trust your instincts Do not open suspicious attachments Do not respond to spam Log out of your account should not be considered private. Confidential information should not be sent by . Use encryption when possible 9/20/2018 Information Security NIDS with Snort

29 The End! Thank you Any questions http://security.depaul.edu
9/20/2018 The End! Thank you Any questions 9/20/2018 Information Security NIDS with Snort


Download ppt "Protecting Yourself Keeping Your Secrets Secret November 11, 2004"

Similar presentations


Ads by Google