Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link.

13
Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link

Transcript of Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link.

Page 1: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link.

Secure Computing Initiative

Dr. Barbara J. Belon

Work Home

Threats

Communication

link

Page 2: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link.

• Students asked to do online research, visit websites, send email to instructors

• Business employees conduct research online from home

• Cost of commercial security software prohibits use by students

• “Security through obscurity” – attitude of the uninformed

Given:Secure Computing Initiative

Page 3: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link.

• How do we insure the security of our online experience at home?

Problem:

Secure Computing Initiative

Page 4: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link.

Secure Computing Initiative

• Build awareness of threats/risks

• Supply information on free security products

Objective:

Page 5: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link.

Threat Landscape

Work Home

Threats

Communicationlink

Page 6: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link.

Threat Agents

Work Home

Threats

Communication

link

•Trusted insiderPlaymates“The Clueless”ConsultantsCleaning crewDisgruntled employee

Page 7: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link.

Threat Agents

•OutsidersRogue hacker / script kiddiesOrganized hackersOrganized crimeState-sponsored hackersCompetitor espionageTerrorists“Sickos” - CyberStalkers

Work Home

Threats

Communication

link

Page 8: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link.

What’s at Risk?

• Your identity• Your finances• Your data• Your privacy• Your family

Work Home

Threats

Communication

link

Page 9: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link.

What could happen?

• Things you see– New files/folders– Erased files/folders– Changed settings (Registry, browser)

Page 10: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link.

What could happen?

• Things you don’t see– Malicious cookies– Keystroke loggers– Trojans bearing executable code– Hacker tool kits– Zombie (external control)

Page 11: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link.

What Can We Do?

• FIRST – “sanitize” your machine

• NEXT– Apply security software– Change browser settings– Install Antivirus software– Install Firewall – Install secure Instant Messaging software– Apply for personal digital certificate

Page 12: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link.

Secure Computing Initiative

• Keep software current

• Continually educate yourself

• Help someone else

Work Home

Threats

Communication

link

Page 13: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link.

Reference Document

“Secure Computing Initiative”Download site:

http://www.belon-rp.comWork Home

Threats

Communication

link