28
Dark Alleys of the Internet Part 1 ACE/NETC 2007 June 19, 2007 Albuquerque, NM

Dark Alleys Part1

Embed Size (px)

DESCRIPTION

Internet Security. Tips in how to keep your internet secure.

Citation preview

Page 1: Dark Alleys Part1

Dark Alleys of the InternetPart 1

Dark Alleys of the InternetPart 1

ACE/NETC 2007June 19, 2007

Albuquerque, NM

Page 2: Dark Alleys Part1

SecuritySecurity

» Security is the condition of being protected against danger or loss (http://en.wikipedia.org/wiki/Security)

» Tradeoff between risk to assets & mitigation of risk to those assets

Page 3: Dark Alleys Part1

“But I Have Nothing”“But I Have Nothing”» How Wrong!

• Pass your wallets down the row• Pass your cell phones down the

row• Pass your list of phone numbers

down the row

» Recognize that you have something of value on the computer or network

Page 4: Dark Alleys Part1

Assets?Assets?

Page 5: Dark Alleys Part1

AssetsAssets

» University Financial System» Personally Identifiable

Information (PII)» Clients’ PII» Your account» Credit Cards» Phone Companies

Page 6: Dark Alleys Part1

PasswordsPasswords» A common security solution is

password» No reason to share password

because you can:• Share files/folders• Remote Desktop• E-mail Proxy• Online Resources like Google Docs

Page 7: Dark Alleys Part1

Managing PasswordsManaging Passwords» Trade-offs

• Different passwords for different systems• Require passwords to change

» Password Managers• Password Safe

http://passwordsafe.sourceforge.net• Others

http://www.lifehack.org/articles/technology/10-free-ways-to-track-all-your-passwords.html

» Choosing a good passphrase• “1wbiDCH” (I was born in Dale County Hospital)http://www.aces.edu/extconnections/2006/10/

Page 8: Dark Alleys Part1

Safely Using EmailSafely Using EmailAvoid hoaxes and phishing

attempts

Page 9: Dark Alleys Part1

HoaxesHoaxes» Trickery» Please forward» Usually harmless» Waste time and resources

Page 10: Dark Alleys Part1

Phishing Clues Phishing Clues » Return address appears to be legitimate» Warns of consequences unless urgent action is taken» No personal info or account name/number in message» Name of link doesn’t match destination

• Name of link: https://www.firstnational.com• Destination of link:

http://www.sargonas.con/firstnational/login.htm» Link is not secure (HTTPS)

http://www.aces.edu/extconnections/2006/12http://www.wikipedia.org/wiki/Phishinghttp://jdorner.blogspot.com/2007/03/every-now-and-then-i-come-across.html

Page 11: Dark Alleys Part1

Don’t Become A VictimDon’t Become A Victim

» “Google” a sentence from the message to see if it’s a hoax or phishing attempt

» Never click on web links and be mindful of HTTPS

» Only open attachments which are in expected messages (just because you know the sender doesn’t mean the message is legitimate)

Page 12: Dark Alleys Part1

Protecting You and Your Operating System

Protecting You and Your Operating System

Page 13: Dark Alleys Part1

Ways to Secure MS WindowsWays to Secure MS Windows

» Install virus protection software» Turn on the Windows firewall» Turn on Windows updates» Use spyware/adware prevention

software» Use Windows Security Center» Use limited accounts» Use password for every account

Page 14: Dark Alleys Part1

Virus Protection SoftwareVirus Protection Software» Install & routinely update virus protection

software• McAfee

• Virus Protection Only!• Purchase from any Office Supply Store

• AVG• Free for non-commercial use• Download at www.downloads.com

• Symantec (Norton)• Resource intensive

Page 15: Dark Alleys Part1

Windows FirewallWindows Firewall» Choose

“On”» Only unblock

programs that you trust

Page 16: Dark Alleys Part1

Windows UpdatesWindows Updates

» Select “Automatic (recommended)”

» Select “Everyday”» Choose an

appropriate time» Leave computer

on! (check sleep/ hibernate)

Page 17: Dark Alleys Part1

Spyware/MalwarePrevention Software

Spyware/MalwarePrevention Software

» Preventative—combine w/ Reactive• Windows Defender

http://www.microsoft.com/athome/security/spyware/software/default.mspx

• AVG Anti-Spywarewww.downloads.com

» Reactive (run once a week)• Spybot

www.downloads.com• Adaware

www.downloads.com

Page 18: Dark Alleys Part1

Security CenterSecurity Center

» Ensures:• Firewall is on• Automatic

updates are installed

• Virus protection installed & up-to-date

Page 19: Dark Alleys Part1

Security CenterSecurity Center

You don’t want the RED or Yellow shield

Click on the shield to fix the problem

Page 20: Dark Alleys Part1

Limited AccountsLimited Accounts» Prohibited from installing software

• Prevents installation of malware/viruses• User has access to currently installed

software» Prohibited from accessing Administrator’s

documents & settings• Prevents changes to administrator

password• Prevents access to Administrator’s

Documents, Desktop, etc.» Create/modify system accounts under

“Control Panel/User Accounts”

Page 21: Dark Alleys Part1

Limited AccountsLimited Accounts

» Easily switch between accounts

» Leave programs running while others login (windows-L)

Page 22: Dark Alleys Part1

Home NetworkingHome NetworkingEveryone Needs a Router!

Page 23: Dark Alleys Part1

Home Networking RoutersHome Networking Routers» One internet connection,

multiple computers» Firewall protection» Access restrictions

Page 24: Dark Alleys Part1

One Internet ConnectionOne Internet Connection

Page 25: Dark Alleys Part1

Firewall ProtectionFirewall Protection» One-way valve that lets you out, but doesn’t

let intruders in• Prevents unauthorized access to your

computer(s)• Hides your computer(s) from the internet while

still allowing access to the internet

» Justification: Attacks on AU (week of 5/28-6/02)

• 90,540 blocked• 25,147 suspicious• 3,893 possibly successful

Page 26: Dark Alleys Part1

Access RestrictionsAccess Restrictions

» Control when a computer can access the internet

• Deny/Allow by website or keyword

» Multiple configurations

• Everyday or only on school days etc.

• All the time, or only between 4p.m. & 10p.m, etc.

Page 27: Dark Alleys Part1

Secure WirelessSecure Wireless» Disable wireless, if you’re not using it» Most routers can be configured w/a CD» What can be done manually?

• Change the SSID (wireless network name)• Disable SSID Broadcast (make it invisible)• Require a password to join the wireless

network• Restrict by MAC address

Page 28: Dark Alleys Part1

Questions?Questions?

Thank You!Greg Parmer, Jonas Bowersock,

Scott Snyder, Anne Adrian