Security: More Than a Thumb and a Blanket

Similar documents
IT Security Goal: Make it difficult enough to deter hacking so its not worth their time

SECURING YOUR HOME NETWORK

An introduction to wireless security at home, on the road and on campus. Sherry Callahan and Kyle Crane

Configuring Wireless Security Settings on the RV130W

WPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007)

Introduction to Information Security Dr. Rick Jerz

PRACTICING SAFE COMPUTING AT HOME

GETTING THE MOST OUT OF EVIL TWIN

Upgrading Your Home Network Security

Chapter 11: Networks

Restech. User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS

Vendor: Microsoft. Exam Code: Exam Name: MTA Security Fundamentals Practice Test. Version: Demo

NWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012

Cyber security tips and self-assessment for business

Wireless Security Setup Guide

5 Tips to Fortify your Wireless Network

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

HACKER S DELIGHT DESTROYING THE SYSTEM ONLY MAKES IT STRONGER

The Launch GDS can be updated via a wireless internet connection as well as by USB or cat5 cable.

Wireless Security Setup Guide

How To Make Belkin Wireless Router Password Protected

How Cyber-Criminals Steal and Profit from your Data

JAPAN CYBER-SAVVINESS REPORT 2016 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN JAPAN

What is Eavedropping?

Wireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities

Basic Wireless Settings on the CVR100W VPN Router

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Getting Your Printer Back On Your Network After A Router Or Network Change

How to Build a Culture of Security

Procedure: You can find the problem sheet on the Desktop of the lab PCs.

Education Network Security

How NOT To Get Hacked

Wireless Network Security

iconnect625w Copyright Disclaimer Enabling Basic Wireless Security

Table of Contents. Camera Anatomy... pg 1. Package Contents... pg 2. Camera Assembly... pg 3. Account Login... pg 5. Adding a New Camera...

Exam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo

KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks.

5-899 / Usable Privacy and Security Text Passwords Lecture by Sasha Romanosky Scribe notes by Ponnurangam K March 30, 2006

How to set up your wireless network

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Top 10 Considerations for Securing Private Clouds

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Wireless Security Guide (for Windows XP, Windows Vista, Windows 7, Mac OSx)

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by:

Web Cash Fraud Prevention Best Practices

Wireless Security Guide (for Windows XP, Windows Vista, Windows 7, Mac OSx)

Staying Safe Online. My Best Internet Safety Tips. and the AgeWell Computer Education Center.

Wireless Ethernet: Technologies and Security for the Water Industries

A Model to Restrict Online Password Guessing Attacks

Hacking Encrypted Wireless Network

Table of Contents. Page ii

Chapter 5 Local Area Networks. Computer Concepts 2013

Next Generation Control - Wireless Network

Quick Start Guide for Standalone EAP

User Manual. 300Mbps Long Range Wireless N Ceiling Mount AP

MANUAL FOR CONNECTING TO VIVACOM NET WI-FI NETWORK OPEN WI-FI NETWORK

Radiant Systems Wireless Point-of-Sale Security Requirements

A Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. Access Point WIRELESS WAP54G (EU/LA/UK) Model No.

FAQ: Privacy, Security, and Data Protection at Libraries

Point ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core

Security SSID Selection: Broadcast SSID:

Pass Microsoft Exam

Wireless Security Algorithms

Summary

THE 123 OF WIRELESS SECURITY AT HOME 家居 WIFI 保安 123

Security+ SY0-501 Study Guide Table of Contents

Technology in Action. Technology in Focus: Protecting Your Computer and Backing Up Your Data Prentice-Hall, Inc. 1

Installing Your Printer to Your Network for the First Time

Wireless Printing Updated 10/30/2008 POLICY. The use of Wireless Networking is not permitted at any site for full client/server networking of Taxwise.

1) Are employees required to sign an Acceptable Use Policy (AUP)?

Create strong passwords

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.

CompTIA MB CompTIA Mobility+

Staying Safe on the Internet. Mark Schulman

Comptia.Certkey.SY0-401.v by.SANFORD.362q. Exam Code: SY Exam Name: CompTIA Security+ Certification Exam

Wireless Attacks and Countermeasures

Most Common Security Threats (cont.)

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Ayrstone AyrMesh Router SP Setup

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Personal Cybersecurity

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

Yealink T48S Wireless Settings

Securing Wireless LANs with Certificate Services

Figure 5-25: Setup Wizard s Safe Surfing Screen

LESSON 12: WI FI NETWORKS SECURITY

Cyber Security Guidelines for Public Wi-Fi Networks

Take Control of Your Passwords

COMPUTER PASSWORDS POLICY

RouterCheck Installation and Usage

CompTIA FC0-U51. CompTIA IT Fundamentals.

ipassconnect for Symbian User s Guide

Potential Mitigation Strategies for the Common Vulnerabilities of Control Systems Identified by the NERC Control Systems Security Working Group

Section 4 Cracking Encryption and Authentication

Yealink T46S Wireless Settings

Train employees to avoid inadvertent cyber security breaches

How Breaches Really Happen

Yealink T41S Wireless Settings

USER GUIDE. Wireless-G Broadband Router. Model No: WRT54G2 V1

hidden vulnerabilities

Transcription:

Security: More Than a Thumb and a Blanket

IT Security is one of those things difficult subjects to discuss, like

Or

Or

Or

IT Security Goal: Make it difficult enough to deter hacking so its not worth their time

Live Threat Map Norse (www.norse-corp.com) has a Live Threat map that computes over 1,500 risk factors for millions of IP addresses every day. http://map.ipviking.com

Difficulties of IT Security There are no turnkey solutions. Every situation has to be looked at independently. User Friendly. Balance of complexity and ease of use.

Difficulties of IT Security In other words How far do you want to go with it?

Security is as strong as it s weakest link End users Password strength Security of access points into your network Hardware & software up to date

End users Email scams. Don t automatically open email attachments. Phishing.

End users Phishing From address Link redirection Grammar

End users Phishing From address To address Email log-in portal.

End users Pwned: adj. "dominated, humiliatingly defeated, taken over" https://haveibeenpwned.com/

Passwords

Passwords Everyone hates passwords almost as much as they do being hacked. In order for a password to be useful it has to be complex and difficult to guess.

Passwords Use Strong Passwords: Longer passwords are better. Nonsensical combination of letters. FHriTPloL (hard to remember)

Passwords Use Strong Passwords: First letter of each word of a phrase TOTWHTFIFI ( The only thing we have to fear is fear itself - FDR) Alpha-numeric with combination of upper and lower case. T0TWH2f1f!

Passwords Bad passwords: password PASSWORD Passw0rd Pa$$w0rd

Passwords More bad passwords: qwerty 12345 Dictionary rover

Passwords Dictionary Attack Uses list of words and common passwords Brute Force Attack Tries every possible combination of letters/numbers a - ZZZZZZZZ

Passwords https://howsecureismypassword.net/ password P@$$w0rd T0TWH2f1f!

Passwords

Password Management Who is going to manage your passwords and how are they going to do that? LastPass 1Password RoboForm

Network Access Points How can somebody get onto your network? Physical Access Wireless Access

Network Access Points Physical Access Who has the key? What can they do once they are inside the cabinet?

Network Access Points Physical Access NG-2014 Electronic Cabinet Lock (Nest Guard) Grant/restrict access to designated personnel. Keypad and PROXCARD Reader. Central office software for remote programming.

Network Access Points Physical Access NG-2014 (Nest Guard)

Network Access Points Physical Access Disable unused switch ports?

Network Access Points Physical Access

Network Access Points Physical Access Enable Port Security?

Network Access Points Physical Access

Network Access Points Wireless Access The introduction of wireless to previously only physically accessible networks created additional security concerns.

Network Access Points Wireless Access Change default password!!! Set up wireless security!!!

Network Access Points Wireless Access Standard Meaning Security Level WPA2 Wireless Protected Access v2 Best WPA Personal (aka WPA-PSK) WPA Enterprise WEP Open Network Wireless Protected Access (For home and small office) Wireless Protected Access (For enterprise networks and requires authentication server) Wired Equivalent Privacy (Outdated) Good Good Poor No security

Network Access Points Wireless Access SSIDs: Change default SSID Wireless users cannot easily detect router type. Hide SSID Not really a security feature may help keep unauthorized users off your network.

Network Access Points Wireless Access Xirrus WiFi Inspector http://www.xirrus.com/products/network-management-and- Software/Network-Management/Wi-Fi-Inspector

Security Updates - Hardware Firmware Updates Vendors randomly release updated firmware/software when adding features or vulnerabilities are detected.

Software Updates/Patch Windows Antivirus Web Browser Vendor Software Security Updates - Software

Zero-Day Vulnerability Refers to a hole in a software that is unknown to the vendor and can be exploited by a hacker.

Alter timings Put intersection into flash. Alter Dynamic Messaging Signs. How Bad Could It Get?

Your Online Privacy Court record searches by state Social Phishing https://www.echosec.net/ 12520 Westport Parkway, La Vista, NE People Search www.peekyou.com www.peoplefinders.com www.411.com IP Address location http://www.infosniper.net/

Summary IT Security is a balance of complexity and usability. The level of Security desired is always proportional to cost of implementation and ongoing maintenance as well as how much inconvenience can be tolerated by those affected.

Questions? http://map.ipviking.com https://haveibeenpwned.com/ https://howsecureismypassword.net/ http://www.xirrus.com/products/network-management-and-software https://www.echosec.net/ www.peekyou.com http://www.infosniper.net/