identity theft and safe computing keeping yourself you by good habits and good technology

24
Identity Theft Identity Theft and and Safe Computing Safe Computing Keeping yourself Keeping yourself You You by by good habits and good good habits and good technology technology

Post on 22-Dec-2015

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

Identity TheftIdentity Theftandand

Safe ComputingSafe Computing

Keeping yourself Keeping yourself YouYou by good by good habits and good technologyhabits and good technology

Page 2: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

The ThreatsThe Threats

MalwareMalwareAdwareAdwareSpywareSpywareWormsWormsVirusesVirusesTrojan HorsesTrojan HorsesBots/ZombiesBots/Zombies

Page 3: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

The ThreatsThe Threats

Phishing and PharmingPhishing and Pharming

Page 4: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

Safe ComputingSafe Computing

Safe Surfing (safe web, email, IM)Safe Surfing (safe web, email, IM)

Safe PasswordsSafe Passwords

Safe Systems (making your computer help Safe Systems (making your computer help you) you)

Page 5: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

Safe SurfingSafe Surfing

Windows popup or web popup?Windows popup or web popup?

Careful where you clickCareful where you click

URL SpoofingURL SpoofingVulnerabilities (IE/Firefox spoofs)Vulnerabilities (IE/Firefox spoofs)OthersOthers

Page 6: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

Safe SurfingSafe Surfing

URL Spoofing examples:URL Spoofing examples: http://[email protected]://[email protected]

MouseoversMouseoversHEX EncodingHEX EncodingDecimal IP addressDecimal IP addressEmail and webEmail and web

Page 7: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

Safe SurfingSafe Surfing

Under Lock and KeyUnder Lock and KeySSLSSLTerminologyTerminology

CertificateCertificateCertificate AuthorityCertificate Authority

How to Check itHow to Check it

Page 8: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology
Page 9: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

(Shows live phishing sites)

Page 10: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

Safe SurfingSafe Surfing

Safe EmailSafe EmailUnexpected attachmentsUnexpected attachmentsGuilty until proven innocentGuilty until proven innocent

No real securityNo real securityFrom/Reply-to arbitraryFrom/Reply-to arbitrary

Encryption / AuthenticationEncryption / Authentication

Page 11: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

Safe SurfingSafe Surfing

Email SpoofingEmail SpoofingEmbedded formsEmbedded formsURL spoofing in emailURL spoofing in email ‘‘Account Updates’Account Updates’ ‘‘Security Notices’Security Notices’

Page 12: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology
Page 13: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology
Page 14: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

Safe SurfingSafe Surfing

Safe IMSafe IMSimilar to emailSimilar to email

Same defensesSame defenses

Page 15: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

Safe SurfingSafe Surfing

SummarySummaryEmail is untrustworthyEmail is untrustworthy

Watch the URLsWatch the URLs

Common senseCommon sense

Page 16: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

Safe PasswordsSafe Passwords

New Campus PoliciesNew Campus Policieshttp://www.it.ufl.edu/policies/passwords.htmlhttp://www.it.ufl.edu/policies/passwords.html

Why do we have this policy?Why do we have this policy?Single point of failureSingle point of failureTradeoffsTradeoffs

Page 17: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology
Page 18: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

Safe PasswordsSafe Passwords

Making good passwordsMaking good passwordsPhrasesPhrasesLyrics, poems, quotesLyrics, poems, quotesObfuscateObfuscate

Storing your passwordStoring your passwordProtect like a credit cardProtect like a credit cardPassword vaultPassword vaultMulti-factor protectionMulti-factor protection

Page 19: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

Safe SystemsSafe Systems

Check with your local support staffCheck with your local support staff

Anti-virusAnti-virusMcAfee is FREE!McAfee is FREE!

http://www.software.ufl.edu/mcafeehttp://www.software.ufl.edu/mcafee

Necessary, but not enough to be safeNecessary, but not enough to be safe

Page 20: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

Safe SystemsSafe Systems

Anti-spywareAnti-spywareAd-awareAd-aware

http://www.lavasoftusa.com/software/adaware/http://www.lavasoftusa.com/software/adaware/

Spybot Search and DestroySpybot Search and Destroyhttp://www.safer-networking.org/en/index.htmlhttp://www.safer-networking.org/en/index.html

Still not enough!Still not enough!

Page 21: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

Safe SystemsSafe Systems

Automatic UpdatesAutomatic Updateshttp://windowsupdate.microsoft.com/http://windowsupdate.microsoft.com/ http://net-services.ufl.edu/security/public/patches.shtmlhttp://net-services.ufl.edu/security/public/patches.shtml

Most important, and very nearly enoughMost important, and very nearly enough

Page 22: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

Safe SystemsSafe Systems

Alternate BrowsersAlternate Browsers IE vulnerabilitiesIE vulnerabilities

OperaOperahttp://www.opera.com/http://www.opera.com/

Firefox (mozilla)Firefox (mozilla)http://www.mozilla.org/products/firefox/http://www.mozilla.org/products/firefox/

Page 23: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

SummarySummary

Secure your machineSecure your machine

Choose good passwords and protect themChoose good passwords and protect them

Be careful how you surfBe careful how you surf

At Home / At WorkAt Home / At Work

Page 24: Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

Questions?Questions?Jordan WiensJordan WiensSecurity TeamSecurity Team

http://infosec.ufl.edu/http://infosec.ufl.edu/

[email protected]@ufl.edu