Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance...

27
Protecting Your Online Life

Transcript of Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance...

Page 1: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Protecting Your Online Life

Page 2: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Why We’re Here

• Anderson School of Management

• Information Assurance MBA program

• Community outreach

Page 3: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Before We Begin:Write Down A Password

• Write down a password you’ve used in the past or one you might use.

• Make sure it is a password you can remember.

• Please don’t write a current password.

Page 4: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Survey Results

• Remember the survey?

• It’s a 60/40 split between PCs and smart phones.

• Not many of you use iOS or linux

• Almost everyone uses facebook

• A third of you use torrents

• Half of you IM and have friendships with people you have never met.

Page 5: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Survey Results cont.

• Half of you do things online you don’t want your parents to know about or aren’t sure about

• Half of you are unsure how to check your Antivirus software status

• Half of you have been talked to about online security before.

Page 6: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

The Risk Is Real

• Woman’s life savings (over one million dollars) taken and spent on fast food, gold bars, and expensive computers in December 2011.

• The group was just convicted last month.

www.stockfreeimages.com/

Page 7: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Anyone Can Be Hacked

• Microsoft Executives’ X-Box Live accounts hacked in March

www.freeimages.co.uk/

Page 8: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

What If It Was You?

Real cases:

•Photos of 13 year old girl in her underwear leaked on the internet and quickly became an internet meme. Millions of people saw them.•E-mails or messages sent from your account to everyone you recently sent to, including your teachers, telling them you have a “secret crush” on them.

Page 9: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Jobs Watch Facebook

• What you like on Facebook can reveal potentially embarrassing info.

• Examples: Sexual orientation and past drug use.

• Be careful what you like on Facebook. Be careful hackers don’t post fake likes.

• Jobs get this data. They might not hire you.

Page 10: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

General Safety Tips

• Have your own account on any machine– The next user might accidentally open your e-mail.

• Use a non-administrator account on your machines– Many threats need administrator privileges to infect.

• Keep everything up-to-date.– When vulnerabilities are found they are used. Updates keep you

ahead of the curve.

• Keep browser settings on medium security or higher.

Page 11: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Mobility = Vulnerability• Phones, tablets, and

laptops can be used while you aren’t looking.

• Machines hooked up to a network are vulnerable to attack.

• The more places you connect with people the more risks you take –like with disease.

Photo Credit: Janice CarrContent Providers(s): CDC/ Dr. Ray Butler; Janice Carr

Page 12: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.
Page 13: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Protection For Interconnection

• Phones have anti-virus, such as AVG

• Mobile devices can be encrypted

The simplest place to start is improving your password.

Page 14: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Cracking Passwords

• Easy for anyone with an internet connection.

• Downloadable tools and YouTube instructions

• Better passwords take longer.

• Changing regularly limits how long attackers have to figure out the password.

Page 15: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

What Is A Good Password?

• How do you choose passwords?– What makes that password tough to crack?– What makes that password memorable?

Page 16: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Demo: A Free Cracking Tool

• Bad password: Qt8cF– Random and mixed, but short– Good is 16+ characters

• Bad password: Pineapple-longer, but word found in dictionary

• Bad password: TheBeatles– longer and not a dictionary word, but far too

popular and predictable

• Examples from class-

Page 17: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Password Myth

• Actually, random is not always best.• Memorable passwords are less likely to be

written down and accidentally read by someone else.

• Still should use mix of lowercase, capital letters, numbers, and special characters.

Useful Tricks:– Word inside word: $anpengu1ndwich!– Phrase: Joe8my101mango$ Z0e1sMyf@tCat

X

Page 18: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Password Checklist

• See handout for a checklist for making safer passwords.

• Password testing:

http://www.passwordmeter.com/http://howsecureismypassword.net/

Page 19: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Storing Passwords

• If you store your password safely, you only need to remember one or two passwords and you can access the others anywhere with internet or phone access.

• Spideroak is so secure you can’t reset your password –both a pro and a con.

Spideroak.com www.keepass.info

There are smartphone apps for both.

Page 20: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Strong Password Isn’t Enough

The weakest part of a strong password is going to be you.

Page 21: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Phishing• Phishing: When criminals try to get your personal information

by pretending to be a legitimate agency over the internet.

-Steal your bank account

-Steal your iTunes account

-Steal your gaming points or in-game money

A password is useless if you give your info away.

Page 22: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

What Gets Phished

Page 23: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Real Life Scam

Don’t send money or your social security number. Take your computer to a repair shop.

Page 24: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Real Life ScamIf it it’s not from the antivirus you installed, it isn’t real. Close down your browser right away without clicking on the box anywhere. The whole window could be a yes button.

Windows –Close with Alt F4Mac –Close with Command Q

Page 25: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Spear Phishing

• Spear Phishing: When a phisher targets you using data about your personal tastes to make the attempt to learn more seem more legitimate.

-Can be used to make money, like normal phishing.

-Can also be used by people with an agenda for you in the real world –like stalkers.

Page 26: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Spear Phishing ToolYou can purchase a tool on for the Steam video game sight that can unlock lots of data about Steam group members.

-user names-ID’s-start date-installed games-average play time-last login time-more

Page 27: Protecting Your Online Life. Why We’re Here Anderson School of Management Information Assurance MBA program Community outreach.

Closing

• Use multiword passwords and do regular updates.

• Be suspicious of giving out personal info.

• If you’re not careless, you’ll be ahead of the game.

Questions?