20
Security and Privacy Brown Bag source: https:// xkcd.com/936/

Security and Privacy Brown Bag

Embed Size (px)

Citation preview

Page 1: Security and Privacy Brown Bag

Security and Privacy Brown Bag

source: https://xkcd.com/936/

Page 2: Security and Privacy Brown Bag

Security and Privacy

brown bag for nonprofits

proudly presents the

Page 3: Security and Privacy Brown Bag

Road Map

• Setting the context• Your online identity• Examples of social engineering• Passwords and password management• Your email (the skeleton key)

Page 4: Security and Privacy Brown Bag

NPower Northwest

• Visiono A thriving community with high performing nonprofits.

• Missiono To strengthen the nonprofit sector by catalyzing innovation and

driving adoption of technology solutions.

Page 5: Security and Privacy Brown Bag

Introductions

Stephen EggersHandsOn Tech AmeriCorp VISTAServing at NPower [email protected]

Page 6: Security and Privacy Brown Bag

Setting the context

Privacy

• Managing your online presence• What can people learn about you?• What can people do with that knowledge?

• Best practices• Password management• The skeleton key: your email account

Security

Page 7: Security and Privacy Brown Bag

What do you know about me?

Page 8: Security and Privacy Brown Bag

What do you know about me? 

From my website & blog:• Which cities I have lived in and now live in• Specific clubs that I am in• The names of some of my friends• Some specific events I participated in

From NPower:• Where I work & what I do• Specific projects that I am involved in

Page 9: Security and Privacy Brown Bag

What do you know about me?

Page 10: Security and Privacy Brown Bag

What do you know about me? 

From all search results:• Some YouTube videos from 2004 - 2012• My hobbies based on forum posts• Can determine some items I own based on forum posts• More photos

Name                            Alias/handle/username

Page 11: Security and Privacy Brown Bag

Social engineering (hacking)

"...social engineering was extremely effective in reaching my goals without resorting to using a technical exploit. I would look for the weakest link in the chain that was the least risk and cost to me [...] if an attacker can walk into the server room without much chance of detection, that's all she wrote"

Kevin Mitnick (arrested in 1995)

Page 12: Security and Privacy Brown Bag

Social engineering today

1. Retrieved username and password database through known vulnerability in CMS2. CEO and COO had very short passwords and were recovered3. CEO and COO used same credentials for other services (Twitter, email, LinkedIn)4. Attackers simply asked the Chief Security Specialist through series of emails for a

reminder as to their usernames and passwords5. HBGary's website was defaced, thousands of emails made public, people were fired

and the CEO resigned

HBGary and HBGary Federal are technology security companies that were hacked in February of 2011 

Page 13: Security and Privacy Brown Bag

Social engineering today 

1. Create a "clone" of me on Facebook with public data2. Send friend requests to friends of my friends3. Assume 500 friend requests were made, and 5%

accepted4. We now have an account that can friend request

direct friends, but this time we have many mutual friends in common

At the Silver Bullet security conference in São Paulo, UOLDiveo chief security officer Nelson Novaes Neto demonstrated this in November 2011

Want my friends' phone numbers?

Page 14: Security and Privacy Brown Bag

Social engineering today 

Is your location attached to your tweet, embedded in a photo's metadata, or did you forget to make your Google Maps unlisted?

Page 15: Security and Privacy Brown Bag

What can you do?

Everyone:• Review your privacy settings • Know what you put in the public domain• Be aware of social engineering strategies

IT best practices:• Use unique, strong passwords• Keep systems up to date and patched

Page 16: Security and Privacy Brown Bag

Passwords

Use a long password with a mix of uppercase and lowercase letters and numbers

Ideal: Dw0lGgBeAx0h10EiothF8FnU4G7yk37LtPTIuAcuqqGkdKD8cqIN2eIMtXzriX

Consider using a password management tool

Examples: KeePass, LastPass, Firefox, Chrome

Page 17: Security and Privacy Brown Bag

Passwords - a new model

• Consider 1 or 2 long (10+ digits) alphanumeric master passwords

• Reset all other passwords and store in password locker• All other passwords should be thought of as "disposable"

• Don't bother remembering them• Make them super long• Reset them frequently, whenever you forget them, or

don't have access to your locker storage

Reset a password? To your email it goes!

Page 18: Security and Privacy Brown Bag

Your email account

The skeleton key to your online identity. Protect this!

Google account: google.com/accounts

Outlook / Exchange: 

• Account timeout after multiple failed guesses• Phones accessing exchange should require a screen

password and allow for a remote wipe

Page 19: Security and Privacy Brown Bag

Final PSA

• Do not have to fear online banking and shopping• Use long, unique passwords (and try a password

management tool)• Check your privacy settings on commonly used services• Google yourself and any aliases or "handles"• Protect your email account• Understand that you're more likely to be conned than hacked• For IT admins: keep services patched and up to date

Page 20: Security and Privacy Brown Bag

Any questions?

Is that it?!

photo by http://www.flickr.com/photos/plasticrevolver/164351244/