Tech Blast: Security

44
Tech Blast: Security Michael Sauers Tech Rodeo Doane College 26-28 July 2012 Intro
  • date post

    17-Oct-2014
  • Category

    Technology

  • view

    3.368
  • download

    2

description

Presented at the NLC Tech Rodeo on the campus of Doane College in Crete, NE 26-28 June 2012. http://nlcblogs.nebraska.gov/techrodeo

Transcript of Tech Blast: Security

Page 1: Tech Blast: Security

Tech Blast:Security

Michael SauersTech Rodeo

Doane College26-28 July 2012

Intro

Page 2: Tech Blast: Security
Page 3: Tech Blast: Security

Intro

Who do Ineed to

worryabout?

http://www.flickr.com/photos/12273378@N00/2547546709/

Page 4: Tech Blast: Security

Where?

Intro

http://www.flickr.com/photos/39585662@N00/5331407245/

Page 5: Tech Blast: Security

How?

Intro

Address Bar Spoofing

Advanced Persistent Threats

Adware

Arbitrary Command Execution

Arbitrary File Downloads

Array Integer OverflowsBackdoors

Blended Threats

Buffer Overflows

Code Injections

Cookie Disclosures

Cross Site Request Forgery

Cross Site Scripting

Data Aggregation Attacks

Data Exfiltration

Denial Of Service

Directory Traversals

DNS Changes

DNS Poisoning

File Overwrite

Forced Tweet

Format Strings

Frankenmalware

Heap Overflows

Information Disclosures

Keyloggers

Local File Inclusions

Local Stack Buffer Overflow

Malware

Man In The Browser Attacks

Man In The Middle Attacks

Null Byte Injection

Open Redirection

Privilege Escalations

Remote Code Injection

Remote Code Execution

Remote Command Executions

Remote Stack Buffer Overflow

Rootkits

Scareware

Shell UploadsSpyware

SQL Injections

Stack Pointer Underflow

Tojan-Downloaders

Trojans

Viruses

Worms

Malvertising

Crimevertising

HTTP Parameter Pollution

Page 6: Tech Blast: Security

What?

Intro

Incognito

Blacole

SefnitPhoenix

Eleonore

Bleeding Life

SEO Sploit

CrimePack

Intoxicated

Siberia

IRCBot

Onescan

Hotbar

Zwangi

OpenCandy

GameVance

SideTab

FineTop

ClickPotato CoinMiner

AlureonCycbot

Alureon

Ramnit

SpyEye

Taterf

FakeRean

TaterfConficker

Rimecud

Sality Pdfjsc

Camec

Conedex

Poison

Sirefef

FakeCheck

MSIL

PlayBryte

Dofoil

Citadel

ZeuS

SpyZeus

cutwail

grum

lethic

bobax

fivetoone

darkmailer

maazbenghegsendsafe

s_torpig

RedKit

Page 7: Tech Blast: Security

What Are They After?Intro

Page 8: Tech Blast: Security

Intro

Page 9: Tech Blast: Security

Personal information is the currency of the underground

economy.

Intro

Page 10: Tech Blast: Security

Intro

Steal everything

Sort it out laterhttp://www.flickr.com/photos/36448457@N00/4521285655/

Page 11: Tech Blast: Security

Intro

There’s no such thing as a secure computer!

Page 12: Tech Blast: Security

Passwordshttp://www.flickr.com/photos/61577908@N00/4750110576/

Page 13: Tech Blast: Security

Passwords http://www.flickr.com/photos/7447470@N06/3839085638/

Page 14: Tech Blast: Security

What makes a good password?

Passwordshttp://www.flickr.com/photos/58442690@N00/2297872691/

Page 15: Tech Blast: Security

Size matters!

Page 16: Tech Blast: Security

Keep up-to-date!

http://www.flickr.com/photos/12036191@N00/357072613/

Page 17: Tech Blast: Security

Operating Systems

Page 18: Tech Blast: Security

Browsers

Page 19: Tech Blast: Security

Everything else

Page 20: Tech Blast: Security

Mobile Devices

Page 21: Tech Blast: Security

Anti-virus

Page 22: Tech Blast: Security

How Do You KnowIf You’re Infected?

Page 23: Tech Blast: Security

You don’t!

Page 24: Tech Blast: Security

Your antivirus software is a seat belt, not a force field.-Alfred Huger

Page 25: Tech Blast: Security

Only 1% of all cyberattacks are from

previously unknownthreats.

-Microsoft Report

Page 26: Tech Blast: Security

Wi-Fi

Simple:If it’s yours, secure it!

If it’s not, don’t trust it!

Page 27: Tech Blast: Security

Social Media

Understand and adjust your privacy

settings

Use HTTPS

Be skeptical of everything

• especially ANYONE asking you for money

Staying Safe Online

Page 28: Tech Blast: Security

If I took your laptop/iPadright now....

What would I have access to?

Staying Safe Online

Page 29: Tech Blast: Security

Security In Libraries

Page 30: Tech Blast: Security

But We’re Just A Library…

Page 31: Tech Blast: Security

83% of victims were

targets of opportunity

92% of attacks were

easy

85% of hacks were

found by a 3rd partyVerizon Data Breach Investigations Report – Fall 2011

Page 32: Tech Blast: Security

IT Security For Libraries

Being bad is easy…

Page 33: Tech Blast: Security

…Security is hard

http://www.flickr.com/photos/vrogy/511644410/

Page 34: Tech Blast: Security

The attacker only needs to succeed once...

-Securosis blog

IT Security For Libraries

Page 35: Tech Blast: Security

Common mistakes

http://www.flickr.com/photos/34120957@N04/4199675334/

Page 36: Tech Blast: Security

IT Security For Libraries

Do something…Do anything!

Page 37: Tech Blast: Security

What Does A LibraryNeed To Protect?

http://www.flickr.com/photos/41084935@N00/362929745/

Page 38: Tech Blast: Security

Public Access Computers

Inform your patrons:

• Make Sure You Log Out

• Don’t Access Sensitive Sites

• Beware of the "remember me" option

• Don't send personal or financial information via email

• Don't send personal or financial information over unsecure websites

Page 39: Tech Blast: Security

Training

http://www.flickr.com/photos/21671782@N03/5020082786/

Page 40: Tech Blast: Security

http://www.flickr.com/photos/95877218@N00/516920477/

What do you see?

Page 41: Tech Blast: Security

Server Security

http://www.flickr.com/photos/60723528@N00/476586010/

Page 42: Tech Blast: Security

Staying Current Schneier on Security : http://www.schneier.com/blog/

Naked Security – Sophos : http://nakedsecurity.sophos.com/

Security FAQs : http://www.security-faqs.com/

SANS Reading Room : http://www.sans.org/reading_room/

Security Now Podcast : http://grc.com/securitynow.htm

Page 43: Tech Blast: Security

FinalThoughts

Page 44: Tech Blast: Security

Thank you!

Michael SauersTechnology Innovation LibrarianNebraska Library [email protected]

Special thanks to Blake Carver of LISHost for allowing me to adapt his slides.http://lisnews.org/security/