13
Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link

Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link

Embed Size (px)

Citation preview

Page 1: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link

Secure Computing Initiative

Dr. Barbara J. Belon

Work Home

Threats

Communication

link

Page 2: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link

• Students asked to do online research, visit websites, send email to instructors

• Business employees conduct research online from home

• Cost of commercial security software prohibits use by students

• “Security through obscurity” – attitude of the uninformed

Given:Secure Computing Initiative

Page 3: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link

• How do we insure the security of our online experience at home?

Problem:

Secure Computing Initiative

Page 4: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link

Secure Computing Initiative

• Build awareness of threats/risks

• Supply information on free security products

Objective:

Page 5: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link

Threat Landscape

Work Home

Threats

Communicationlink

Page 6: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link

Threat Agents

Work Home

Threats

Communication

link

•Trusted insiderPlaymates“The Clueless”ConsultantsCleaning crewDisgruntled employee

Page 7: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link

Threat Agents

•OutsidersRogue hacker / script kiddiesOrganized hackersOrganized crimeState-sponsored hackersCompetitor espionageTerrorists“Sickos” - CyberStalkers

Work Home

Threats

Communication

link

Page 8: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link

What’s at Risk?

• Your identity• Your finances• Your data• Your privacy• Your family

Work Home

Threats

Communication

link

Page 9: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link

What could happen?

• Things you see– New files/folders– Erased files/folders– Changed settings (Registry, browser)

Page 10: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link

What could happen?

• Things you don’t see– Malicious cookies– Keystroke loggers– Trojans bearing executable code– Hacker tool kits– Zombie (external control)

Page 11: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link

What Can We Do?

• FIRST – “sanitize” your machine

• NEXT– Apply security software– Change browser settings– Install Antivirus software– Install Firewall – Install secure Instant Messaging software– Apply for personal digital certificate

Page 12: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link

Secure Computing Initiative

• Keep software current

• Continually educate yourself

• Help someone else

Work Home

Threats

Communication

link

Page 13: Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link

Reference Document

“Secure Computing Initiative”Download site:

http://www.belon-rp.comWork Home

Threats

Communication

link