Cyber Security Basics 2013 Home Edition the analogy of fortified castle
The Problem: Misinformed A recent survey of nearly 16,000 users in 11 countries by G Data Software uncovered a startling fact: Users are thinking about security, but what they know is light years out-of-date or completely wrong Source: http://www.gdatasoftware.com/uploads/media/GData_SecuritySurvey_2011_E N_02.pdf
True or False: If my PC is infected, I will notice one way or another (93%) Fact: In actuality, modern malware is stealthy and hard to detect.
True or False: Malware Comes From Email Attachments (54%) Fact: While it's still a problem, the biggest problems nowadays are emails with links to malicious Websites.
True or False: Infected USB Sticks Are Most Prevalent
True or False: Infected USB Sticks Are Most Prevalent (13%) This is no longer the most common method of infection. Websites are.
True or False: Cyber-criminals aren't interested in PC belonging to consumers Fact: Consumers machines contain plenty of valuable personal data and are easier to comprise
True or False: One is more likely to encournter malware at an adult content site than at a horseback riding site Fact: It is easier to hack hobby and leisure sites than to penetrate professionally maintained adult sites
What should I do?
Knight in shining armor to the rescue :)
Seriously, let's use fortified castle as an example Why Fortified Castle? To protect lives & valuable assets: • Queen, Prince & Princess • Personal properties
Seriously, let's use fortified castle as an example How to build Fortified Castle? • Build it on top of strong foundation • Thick wall • Locked windows and doors • Plus, guarded draw bridge, dog and • Courageous Knight in shining armor
Now compare to information security Protect critical information #1: Personal safety for your spouse and kids; #2: financial; #3: medical health information Losing it to the bad guys could harm you and your family Like a fortified castle, protecting critical information requires several layers of defense
What it is at stake? Pleasanton: Missing Fremont 15-year-old girl found alone at Stoneridge Mall with a 30-year-old man Source: http://www.mercurynews.com/ci_23249482/pleasanton-missing- 15-year-old-girl-found-at
Starting with personal safety (click the logo below for safe online surfing overview video designed for 3 – 8 grade rd th students) The FBI has a new tool that can help. The new Safe Online Surfing, or SOS, website helps educate students in grades 3 through 8 about cyber safety. The URL is https://sos.fbi.gov
Continue with physical security • Start by keeping it with you all the times, like your wallet • Make it easy to know when it is missing (left pocketcell phone, right pocketwallet), and do something about it as soon as possible • As soon as you find out the mobile device is lost, try to locate it, or wipe the data out in case it lands on the wrong hand (see Appendix A for instructions) Then locking the information with good strong password
Top 25 most popular (the worst) passwords in 2012 below (compared with 2011): 1. password (Unchanged) 14.sunshine (Up 1) 2. 123456 (Unchanged) 15.master (Down 1) 3. 12345678 (Unchanged) 16.123123 (Up 4) 4. abc123 (Up 1) 17.welcome (New) 5. qwerty (Down 1) 18.shadow (Up 1) 6. monkey (Unchanged) 19.ashley (Down 3) 7. letmein (Up 1) 20.football (Up 5) 8. dragon (Up 2) 21.jesus (New) 9. 111111 (Up 3) 22.michael (Up 2) 10.baseball (Up 1) 23.ninja (New) 11.iloveyou (Up 2) 24.mustang (New) 12.trustno1 (Down 3) 25.password1 (New) 13.1234567 (Down 6)
What is considered good password • Use both upper- and lower-case letters • Incorporate numbers or punctuation marks • Make it at least 8 characters long. • A strong password does NOT, in any way, use your personal information, such as name, phone number, ID number, birth date, address or names of anyone you know. • Come up with something you can remember easily, but would be virtually impossible for anyone else to guess.
Secured communication is essential .
Secure your Yahoo Email, now! 1. Select \"Options/Mail Options\" on your main Yahoo Mail screen 2. Choose \"General\" 3. Select \"Turn On SSL\".
Search
Read the Text Version
- 1 - 33
Pages: