23
Cybersecurity Awareness Protecting your devices and networks

Cybersecurity Awareness - University of Cincinnati

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cybersecurity Awareness - University of Cincinnati

Cybersecurity AwarenessProtecting your devices and networks

Page 2: Cybersecurity Awareness - University of Cincinnati

Threats and Attacks on Networked Devices

• Threats

• Vulnerabilities

• Misconfigurations

• Lack of Security

• Attacks

• Man-in-the-middle• Eavesdropping

• Replay/Redirection

• Exploitation

Page 3: Cybersecurity Awareness - University of Cincinnati
Page 4: Cybersecurity Awareness - University of Cincinnati
Page 5: Cybersecurity Awareness - University of Cincinnati

ISP

ISP

ISP

ISPISP

ISP

ISP

ISP

ISP

ISP

ISP

ISP

Tier 1 Network

Tier 1 Network

Tier 1 Network

Page 6: Cybersecurity Awareness - University of Cincinnati

Trusted vs. Untrusted Networks

Trusted Network

• Administered by a known person or entity

• Data is usually safe to travel transparently

• Examples:• ISP/Tier 1 Networks

• Work Network

• Home Network

Untrusted Networks

• Unknown by whom or if is administered

• If used, sensitive data must beencrypted

• Examples: • Public/Shared WiFi

• Open WiFi – no password

Page 7: Cybersecurity Awareness - University of Cincinnati

Rouge Networks

• Malicious Wi-Fi Access installed on or near another network

• Designed to fool you into connecting

• May have a similar name/password as legitimate network

• May use common public name to fool your computer into connecting

• Often don’t require a password

Page 8: Cybersecurity Awareness - University of Cincinnati

Encrypted Data

Hello WorldType:Email

To:Alice

From:Bob

Khoor ZruogType:Email

To:Alice

From:Bob

Type:Email

To:Alice

From:Bob

To:VPN

Server

From:VPN

ClientKhoor Zruog

Transport Encryption – Logon information to website

Tunnel Encryption – VPN Connection

Page 9: Cybersecurity Awareness - University of Cincinnati

Untrusted Public WiFi – No Password

Page 10: Cybersecurity Awareness - University of Cincinnati

Untrusted Public WiFi – With Password

To: Gmail.comFrom: BobTo: Fakemail.comFrom: Bob

Page 11: Cybersecurity Awareness - University of Cincinnati

Untrusted Public WiFi – With VPN

Page 12: Cybersecurity Awareness - University of Cincinnati

Virtual Private Networks (VPN)

• Creates Encrypted “Tunnel”

• Prevents Eavesdropping

• Prevents Redirection/ReplayAttacks

• Helps with privacy

• Access secured resources remotely

Page 13: Cybersecurity Awareness - University of Cincinnati

Public Wi-Fi Best Practices

Avoid if possible

Don’t join a network without a password

Verify name and password with staff

Don’t save the Wi-Fi network to your computer

Use a VPN connection for any sensitive data

Page 14: Cybersecurity Awareness - University of Cincinnati

What VPN to Use?

VPN Services

• Fee to use

• Simple and easy setup

• May be included with other security offerings/features

DYI VPN

• Setup free on your home network

• Difficult to setup and manage

• May be a feature of your home router/WiFi

• Access to home network remotely

Work VPN

• Provided by work

• IT support

• Traffic monitoring/limitations for personal use

Page 15: Cybersecurity Awareness - University of Cincinnati

Protecting Your Home Network

Page 16: Cybersecurity Awareness - University of Cincinnati

ISP

ISP

ISP

ISPISP

ISP

ISP

ISP

ISP

ISP

ISP

ISP

Tier 1 Network

Tier 1 Network

Tier 1 Network

Page 17: Cybersecurity Awareness - University of Cincinnati
Page 18: Cybersecurity Awareness - University of Cincinnati

FirewallsA device of software that filters network traffic

Type

Source/Destination

Wi-Fi Router Firewalls

Built into most consumer Wi-Fi Routers

Pre-configured to filter all incoming-traffic

Personal Firewalls

Additional device with more features and functionality

Operating System Firewalls

Only protects one computer

Good extra layer of security

Page 19: Cybersecurity Awareness - University of Cincinnati

Home Wi-Fi Security

PasswordsChange default router password

Set a Wi-Fi Password

• All data is transparent without one

• Only share with trusted individuals

Wi-Fi Security MethodsWEP

• Old security standard

• Easily cracked

WPA\WPA2

• Current standard

Page 20: Cybersecurity Awareness - University of Cincinnati

Protected Your Networked Devices

PCS SMART PHONES INTERNET OF THINGS (IOT)

Page 21: Cybersecurity Awareness - University of Cincinnati

Personal Computers• OS Firewalls

• Protect from incoming attacks• Protect unwanted outgoing

communications

• Updates• Protect from vulnerabilities• Fix bugs• New Features

• Anti-virus• Keep up to date

• Only run trusted applications

• Set up a password and auto lock your computer

Page 22: Cybersecurity Awareness - University of Cincinnati

Smart Phones

• Updates• Protect from vulnerabilities• Fix bugs• New Features

• Anti-virus• Keep up to date

• Only run trusted applications• Only use the app store

• Setup up a password/PIN/etc• Auto lock your device

Page 23: Cybersecurity Awareness - University of Cincinnati

IoT Security

• Change default passwords (if possible)

• Turn off any features you don’tneed

• Only use approved applications to control

• Update device when possible

• Review permissions of devices and limit when possible