Top Banner
37

AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

Dec 20, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.
Page 2: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

AgendaAgendaAgendaAgenda

• Examining Use Behaviors• Phishing Quiz • Threats to Information Security• Practicing Avoidance Behavior • Resources

Page 3: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

Examining Use BehaviorsExamining Use Behaviors

Page 4: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

•Spends an hour instant messaging every night

•Clicks “remind me again later” when anti-virus update alerts appear on the screen

•Often downloads games that are available as freeware

Scenario 1Scenario 1Scenario 1Scenario 1

Page 5: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

•Leaves browser open to monitor sales on Ebay

•Downloads *.pdf files while conducting research online

•Has latest versions of security software installed

Scenario 2Scenario 2Scenario 2Scenario 2

Page 6: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

•Uses a neighbor’s wireless network for Internet access at home

•Always deletes old e-mail messages to maintain privacy

•Sometimes provides sensitive information to register with sites

Scenario 3Scenario 3Scenario 3Scenario 3

Page 7: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

What’s New Out There?What’s New Out There?

Page 8: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

Worms and Instant MessagingWorms and Instant MessagingWorms and Instant MessagingWorms and Instant Messaging

Intended Effects:• Clog network traffic• May damage files on your computer• May cause e-mail servers to crash

A worm is a self-replicating program that takes advantage of e-mail or IM contact lists to spread from computer to

computer.

Page 9: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

What is a Bot?What is a Bot?What is a Bot?What is a Bot?

How it works:• Computer is usually compromised by a ‘Trojan’ first• Hacker sends commands to your computer through an

open port, turning it into a ‘bot’• Uses the ‘bot’ to send large amounts of useless information

to target and crash another site

A ‘bot’ is a compromised computer that is controlled remotely and is used to attack other sites or to conduct other

malicious/illegal activities.

Page 10: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

• Weather bug• Stock updates• Free instant messaging (“IM”) software• Downloaded files from untrusted sources• Music• Games• News ticker

What’s on Your ComputerWhat’s on Your ComputerWhat’s on Your ComputerWhat’s on Your Computer

Page 11: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

Good HabitsGood HabitsGood HabitsGood Habits

• Leave fields blank when possible• Give fake information• Don’t give sensitive information or information you want

to keep private– date of birth– cell phone number

• Open a free e-mail account• Use a guest log-in if available• Avoid freeware from untrustworthy sources

Page 12: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

Any information they can get!Any information they can get!

What are they after?What are they after?What are they after?What are they after?

Page 13: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

What is Freeware?What is Freeware?What is Freeware?What is Freeware?

• Ring tones • Screensavers• Imoticons• Wallpapers• Games• Informational programs: weather bug, stock ticker

Software that is ‘free’ to download and install.

Page 14: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

Freeware RealityFreeware RealityFreeware RealityFreeware Reality

• Not really free• May contain adware resulting in annoying and potentially

dangerous pop-ups• Often contains spyware, trojans, cookies, or other

malicious software • May not work if spyware or trojans are removed• Vendor may sell your product registration information

Page 15: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

Good HabitsGood HabitsGood HabitsGood Habits

• Say ‘no’ to attractive packaging• Say ‘no, thanks’ to freeware from friends or family• Start reading ‘Terms and Conditions’ before agreeing• Stop downloading freeware from unknown or untrustworthy

sites• Stop giving sensitive information in product registrations

Page 16: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

What is Malware?What is Malware?What is Malware?What is Malware?

Malicious, self-replicating programs

• Trojans – Gather information or perform commands• Worms – Spread through e-mail and IM links or

attachments• Viruses – Infect executable files (*.exe) and have the

ability to modify other programs • Sniffers – Intercepts routed data, searching for information

(passwords, bank account numbers) transmitted in clear text

Page 17: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

Good HabitsGood HabitsGood HabitsGood Habits

• Avoiding unsecure wireless networks• Avoiding links sent via e-mail or IM• Avoiding ads in the margin of legitimate sites• Avoiding sharing your computer with unsupervised

children/teens• Keeping anti-virus software up-to-date and running• Always scanning attachments before opening

Page 18: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

Who’s Reading Your E-mail?Who’s Reading Your E-mail?

Page 19: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

Who’s Reading Your E-mail?Who’s Reading Your E-mail?Who’s Reading Your E-mail?Who’s Reading Your E-mail?

• E-mail and IM transmissions are not secure • Key-logging software may record what you type• Your address is available for spamming, phishing,

spoofing, and other scams

Page 20: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

Good HabitsGood HabitsGood HabitsGood Habits

• Keep in mind that it could be read• Break-up sensitive communications• Delete old e-mails and scrub your computer if you’re

discarding it• ‘Log-out’ when using a shared computer to check mail• Lock your computer when you’re away• Share your computer wisely

Page 21: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

Phishing QuizPhishing Quiz

Page 22: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

YES•The domains don’t match

•The ‘@’ in the link indicates a fake site

•Check the message header

Is it Phish?Is it Phish?YES

Page 23: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

PracticeSafe Browsing

1. Open a new browser. 2. Use a search engine

to find the legitimate site address.

3. Don’t use third party links.

Is it Phish?Is it Phish?NO

Page 24: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

NO•Account number information is shown

•Do you have an account with this company? If not, it’s phish.

Is it Phish?Is it Phish?

Page 25: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

YES•Most charities don’t solicit donations through e-mail.

•If you want to help, contact the charity directly.

Is it Phish?Is it Phish?

Page 26: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

•Less bad grammar or misspellings•Include legitimate logos•Include authentic looking privacy or copyright information•Mirror the appearance of legitimate sites to gain your confidence

Phishing Gets SmartPhishing Gets Smart

To report phishing or other fraud:http://www.ag.state.il.us/consumers/

Page 27: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

NUIT Bulk E-mail ArchiveNUIT Bulk E-mail Archive

•If you have doubts about an e-mail, go to the source.

•Don’t be afraid to ask questions!

•491-HELP

www.it.northwestern.edu/news/bulkemail/index.html

Page 28: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

Threats to Information SecurityThreats to Information Security

Page 29: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

•According to Microsoft, an unprotected Windows PC will attract an unwelcome advance by a security threat within 23 minutes of connecting to the Internet.

•A 2000% increase in the number of threats detected for IM and peer-to-peer networks was reported between 2004 and 2005.

•Threats increasingly target mobile devices and are increasingly sophisticated.

Threats to Information SecurityThreats to Information SecurityThreats to Information SecurityThreats to Information Security

Page 30: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

Practicing Avoidance BehaviorPracticing Avoidance Behavior

Page 31: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

• Scan incoming attachments no matter who sends them• Visit web sites directly—don’t use third party links• Look for “https” in web addresses to know a page is secure• Surf trusted sites• Use different passwords for different classes of information• Don’t log on to unsecure wireless networks• Don’t disable your firewall for convenience• Close your browser

Keep Your Guard UpKeep Your Guard Up

Page 32: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

• Keep anti-virus software current and install definitions as they become available.

• Scan your computer frequently.

• Automate it and forget it!

Take charge of your computer and your security!

Take charge of your computer and your security!

Page 33: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

Question:• New sites• New services• Unusual ads and pop-ups• Things that seem to good to be true• E-mail with unusual or foreign characters in the heading• Unexpected e-mail or IM

Be a SkepticBe a Skeptic

Call 1-HELP if you have a question!

Page 34: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

Warning SignsWarning Signs

• Unusual requests to transfer information through firewall

• Computer slowness• Changes to your browser homepage• Changes to your computer desktop• Excessive pop-up ads• Any behavior that makes you suspicious or

uncomfortable

Page 35: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

Symantec/Norton Anti-Virus

www.it.northwestern.edu/software/staff/free/antivirus/index.html

Spybot www.it.northwestern.edu/security/spyware/win-

spybot-install.html

Fix It!Fix It!Fix It!Fix It!

Page 36: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

Security Awareness Tip of the Monthwww.it.northwestern.edu/security/tip-of-the-month/index.html

“Get Control” web sitewww.it.northwestern.edu/5stepssteps

E-mail Defense Systemwww.it.northwestern.edu/security/eds/index.html

Computer and Network Securitywww.it.northwestern.edu/security/

NUIT ResourcesNUIT ResourcesNUIT ResourcesNUIT Resources

Page 37: AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.

Next Tech TalkNext Tech Talk

Laying Down the Law Illegal file sharing, copyright laws, and the Internet

Understanding copyrights, software licenses, and more!

Friday, November 11, 2005Same locations, Noon – 1 p.m.

Please register online: www.it.northwestern.eduwww.it.northwestern.edu