* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Here are the PowerPoint slides with links - Auto
Proxy server wikipedia , lookup
Outlook.com wikipedia , lookup
Distributed firewall wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Post-quantum cryptography wikipedia , lookup
Information security wikipedia , lookup
Airport security wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Unix security wikipedia , lookup
Wireless security wikipedia , lookup
Cyber-security regulation wikipedia , lookup
Mobile security wikipedia , lookup
Microsoft Security Essentials wikipedia , lookup
Cybercrime countermeasures wikipedia , lookup
Computer security wikipedia , lookup
Information Security Fundamentals David Veksler Who is this talk for? • Non IT experts • Those working with confidential information • Especially in parts of the world with high informational security risks Why should I care about security? • Can’t I just hire someone and/or install software to protect myself? Why should I care about security? • • In most organizations, any IT administrator can read and alter any other employees email without any knowledge or record. Mr Smith was an executive building a new manufacturing plant in China. The support technicians in his IT department have access to the corporate mail server. One of them was hired by a competitor. Before he left, he logged on to the mail server and downloaded the entire mail archive for Mr Smith, including the design plans for the new assembly line. The company did not discover about the leak until the competitor built their own production line and release a competing product on the market. Why should I care about security? • • A tiny device with a build-in cellular modem can act as a Trojan horse to open your network to outsiders. Widget Corp produces software for sale worldwide. A agent for their competitors walked into one of their offices and installed a plugbot (theplugbot.com). The plugbot was able to sniff a domain password and send it over the built-in cellular modem. From there, the attacker established remote access to the corporate data server. A few months later, Widget Corp's suddenly had a new competitor in the market. Why should I care about security? • • "It has become the Wild West on that other side of the globe. There is little or no respect for Intellectual Property. Copyrights and patents are ignored. Accounting issues have recently also come into question for many Chinese companies that have bought U.S. shell corporations to simplify the process of going public in the West. Rough and tumble attitudes must be expected. Any American company doing business in China must anticipate the worst even as it hopes for the best in expanded marketing opportunities." http://www.forbes.com/sites/joanlappin/2011/09/21/americansuperconductor-destroyed-for-a-tiny-bribe/ Why should I care about security? • • "In terms of outright theft of intellectual property, there is growing evidence that China’s intelligence agencies are involved, as attacks spread from hits on large technology companies to the hacking of startups and even law firms. “The government can basically put their hands in and take whatever they want,” says Michael Wessel, who sits on the U.S.-China Economic and Security Review Commission that reports to Congress. “We need to take more actions and protect our intellectual property.” Inside the Chinese Boom in Corporate Espionage (http://www.businessweek.com/articles/2012-03-14/inside-thechinese-boom-in-corporate-espionage) Why should I care about security? • “There have been a large number of corporate spying cases involving China recently… as the toll adds up, political leaders and intelligence officials in the U.S. and Europe are coming to a disturbing conclusion. “It’s the greatest transfer of wealth in history,” General Keith Alexander, director of the National Security Agency, said at a security conference at New York’s Fordham University in January.” Why should I care about security? • “There have been a large number of corporate spying cases involving China recently… as the toll adds up, political leaders and intelligence officials in the U.S. and Europe are coming to a disturbing conclusion. “It’s the greatest transfer of wealth in history,” General Keith Alexander, director of the National Security Agency, said at a security conference at New York’s Fordham University in January.” Contents • • • • Part 1: Secure web browsing Part 2: Secure networks Part 3: Secure email and IM Part 4: Securing operating systems & mobile devices • Part 5: Securing organizations • Conclusion: limitations of security measures Choosing a web browser Why web browsers matter Internet Explorer: upgrade to 9+ or switch to: Chrome: recommended for personal use Get HTTPS Everywhere & AdBlock Firefox as a multi-tool Plugging privacy leaks Keep your browser up to date Disable unused plugins AdBlock: it’s not just for blocking ads Block third party cookies Using Private Mode Cleaning your tracks with CC Cleaner Securing your surfing HTTPS Everywhere OpenDNS/Google DNS DNSCrypt VPN (details later) Advanced: monitoring web traffic Outgoing firewalls: Zone Alarm (Windows) Little Snitch (OS X) Monitoring network traffic with Wireshark Part 2: Secure Networks: Virtual Private Networks VPN options PPTP: simple, supported by mobile devices, only safe for personal use L2TP: best for corporations: supports digital certificates Open VPN: free, open-source Alternative VPN Solutions LogMeIn Hamachi: simple ad-hoc and hub and spoke VPN SSH Tunneling Browser helpers for VPNs Proxy Switchy (Chrome) Foxy Proxy (Firefox) Proxy Scripting – works with Proxy Switchy when configured in Chrome (IE) Advanced: Running your own proxy • Why run a proxy locally? • Optimize, secure, accelerate traffic • Control access to outside network Privoxy (recommended) GlimmerBlocker (OS X) Squid (Unix) Polipo (Unix, Windows, OS X) Part 3: Secure Email and IM: Encryption Tools Symmetric encryption Asymmetric encryption Secure Email Corporate E-mail: Digital Certificates & Signing Get a free cert at http://startssl.com/ PGP: PGP Desktop ,GnuPG Secure Instant Messaging Corporate Instant Messaging: Microsoft: Skype, Lynx, Office Communication Server Personal Instant Messaging Off-The-Record plugin for: Pidgin (Windows), Adium (OS X) Part 4: Securing Operating Systems: OS Hardening Basic OS Hardening • Secure your login mechanism • • Password protect access to your desktop Admin privileges & user level accounts: run as a userlevel account; require password to login • Disable file sharing on the network • Enable automatic updates • Disable unused user accounts Anti-Virus Options • Do you need Anti-Virus software? • Anti-Virus for Individuals • • Windows Defender • Avast • Many free options • F-Secure, Trend Micro Office Scan Tip: Don't use Norton or McAfee! Anti-Malware Options • Do you need Anti-Malware software? • Recommended Anti-Malware: • Microsoft’s Windows Defender • Spybot S&D (Free) • Malware Bytes (Free/Pro) Whole disk encryption • What is it? Do you need it? • True Crypt (multiplatform) • Bitlocker (Windows) • File Vault (Apple) • PGP Whole Disk Encryption • Symantec Endpoint Encryption Advanced: Tips from the Pros • OS Hardening guides from the NSA • Windows: • OS X • Security tips from the NSA for all OS’s Advanced: OS Isolation • Portable (Live) OS • Portable apps • Virtual Machines • Only an “air gap” is safe for mission critical data! OS Specific Considerations • OpenBSD: when security is mission-critical • Linux • Windows Server 2008 • Windows XP • Windows 7 • OS X Securing your smartphone • Notes on locking: • Only protects against casual theft • Cloud storage risks • Remote wipes Part 5: Secure Organizations: physical security, social engineering, and other considerations Physical security • Human factors • Physical security • International travel • Asset management & theft prevention Social Engineering • Inside threats • Social engineering • “Need to access” policies Advanced: Threat discovery • Process Explorer • Rootkit detectors: • Microsoft: Rootkit Revealer • Avast: GMER • RootkitHunter Conclusion: Limitations of Information Security • Limitations of software measures • Limitations of hardware measures • Cost vs. benefit of security measures The End Technologies mentioned in this presentation have links to more information – get a copy of the PowerPoint from me ([email protected]).