PowerPoint file from slides

Download Report

Transcript PowerPoint file from slides

Computer and
Information Security
Protecting yourself and your
clients in the wild and wooly
online world
To protect your computer and
information assets…
…buy a Mac!
The End
Mac Hacked Via Safari Browser
in Pwn-2-Own Contest

A zero-day vulnerability … Macaulay
pwned the Mac by sending it an e-mail
that directed a user to a malicious site.
Upon visiting the site, the user … was
infected with malware, without clicking on
anything within the site.
-- eWeek Security Watch
Vectors for getting “pwned”

Physical access
 Theft
 Seizure
 Attack

of opportunity
Network access
 Browsing
the Web
 Using email
 Using a wireless connection
…
Physical protection
Leave sensitive information at home
 Separate data from hardware
 Use encryption
 Use strong passwords
 Eliminate sensitive information
 Log out when not using

Cracking passwords

Single word found in dictionary: ~ 1 s
 Example:

7 random lowercase letters: ~ 45 m
 Example:

“translator”
“uklahva”
10 random characters: ~ 632,860 years!
 Example:
“4pRte!ai@3”
 (With Moore’s Law: 30 years)
Source: Wikipedia (Password strength)
Network vulnerabilities
Internet & email
Cross-site scripting (XSS)
 Phishing (social engineering)
 Viruses
…

On a network: batten the hatches
Filter
 Block
 Ignore

Internet
Firefox
Safer
 Cross-platform
 Free/Libre
 Add-ins
 All the cool kids are using it!

Vital Firefox Add-ins
Web of Trust
 NoScript

Web of Trust

Warns users about risky
websites that try to scam
visitors, deliver malware, or
send spam.
ginstrom…
warez…
NoScript

Allows JavaScript, Java, Flash
and other plugins to be executed
only by trusted web sites of your
choice.
Scripts from
15 sites!
Safer Email
View email as plain text
 Beware of phishing
 Spam filtering

Example: MS Outlook
SpamBayes

http://spambayes.sourceforge.net/
SpamAssassin

http://spamassassin.apache.org/
Stay Safe!
 http://ginstrom.com/ijet-19/