Upload
steven-beller
View
218
Download
0
Tags:
Embed Size (px)
Citation preview
Secure Computing Initiative
Dr. Barbara J. Belon
Work Home
Threats
Communication
link
• Students asked to do online research, visit websites, send email to instructors
• Business employees conduct research online from home
• Cost of commercial security software prohibits use by students
• “Security through obscurity” – attitude of the uninformed
Given:Secure Computing Initiative
• How do we insure the security of our online experience at home?
Problem:
Secure Computing Initiative
Secure Computing Initiative
• Build awareness of threats/risks
• Supply information on free security products
Objective:
Threat Landscape
Work Home
Threats
Communicationlink
Threat Agents
Work Home
Threats
Communication
link
•Trusted insiderPlaymates“The Clueless”ConsultantsCleaning crewDisgruntled employee
Threat Agents
•OutsidersRogue hacker / script kiddiesOrganized hackersOrganized crimeState-sponsored hackersCompetitor espionageTerrorists“Sickos” - CyberStalkers
Work Home
Threats
Communication
link
What’s at Risk?
• Your identity• Your finances• Your data• Your privacy• Your family
Work Home
Threats
Communication
link
What could happen?
• Things you see– New files/folders– Erased files/folders– Changed settings (Registry, browser)
What could happen?
• Things you don’t see– Malicious cookies– Keystroke loggers– Trojans bearing executable code– Hacker tool kits– Zombie (external control)
What Can We Do?
• FIRST – “sanitize” your machine
• NEXT– Apply security software– Change browser settings– Install Antivirus software– Install Firewall – Install secure Instant Messaging software– Apply for personal digital certificate
Secure Computing Initiative
• Keep software current
• Continually educate yourself
• Help someone else
Work Home
Threats
Communication
link
Reference Document
“Secure Computing Initiative”Download site:
http://www.belon-rp.comWork Home
Threats
Communication
link