Top Banner
Internet Security Internet Security In the 21st Century In the 21st Century Presented by Daniel Mills Presented by Daniel Mills
23

Internet Security In the 21st Century Presented by Daniel Mills.

Dec 24, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Internet Security In the 21st Century Presented by Daniel Mills.

Internet SecurityInternet SecurityIn the 21st CenturyIn the 21st Century

Presented by Daniel MillsPresented by Daniel Mills

Page 2: Internet Security In the 21st Century Presented by Daniel Mills.

Why is security Why is security important?important?

The power of computers is information storage The power of computers is information storage and processingand processing

The power of the Internet is information The power of the Internet is information transmissiontransmission

The problem is protecting information from The problem is protecting information from attacks of theft or corruptionattacks of theft or corruption

Page 3: Internet Security In the 21st Century Presented by Daniel Mills.

Common ThreatsCommon ThreatsTo computersTo computers

Insecure PasswordsInsecure Passwords

Software vulnerabilitiesSoftware vulnerabilities

MalwareMalware

VirusesViruses

SpywareSpyware

AdwareAdware

PhishingPhishing

Page 4: Internet Security In the 21st Century Presented by Daniel Mills.

Common ThreatsCommon ThreatsTo networks and the InternetTo networks and the Internet

Insecure PasswordsInsecure Passwords

Unencrypted InformationUnencrypted Information

Hacking or CrackingHacking or Cracking

SpamSpam

Page 5: Internet Security In the 21st Century Presented by Daniel Mills.

PasswordsPasswordsWhy are they importantWhy are they important

Secure passwords protect both the User and the Secure passwords protect both the User and the Provider. For example if a User’s:Provider. For example if a User’s:

Email password is compromised their account Email password is compromised their account could be used to send spam. This causes the could be used to send spam. This causes the Provider’s mail server to be blacklisted by other Provider’s mail server to be blacklisted by other email providers.email providers.

PPP password is compromised an attacker or PPP password is compromised an attacker or pirate could impersonate the User and cause pirate could impersonate the User and cause legal ramifications for both the User and Provider.legal ramifications for both the User and Provider.

Page 6: Internet Security In the 21st Century Presented by Daniel Mills.

PasswordsPasswords

Password attack typesPassword attack types

Dictionary Attacks take seconds to minutesDictionary Attacks take seconds to minutes

Brute force take hours to daysBrute force take hours to days

The objective is to prevent dictionary attacks The objective is to prevent dictionary attacks and make brute force attacks as difficult as and make brute force attacks as difficult as possiblepossible

Page 7: Internet Security In the 21st Century Presented by Daniel Mills.

PasswordsPasswords

Common RulesCommon Rules

At least 8 charactersAt least 8 characters

AlphanumericAlphanumeric

Not a dictionary word or based on the usernameNot a dictionary word or based on the username

Don’t use the same password everywhereDon’t use the same password everywhere

Other RulesOther Rules

Include special charactersInclude special characters

Completely RandomCompletely Random

Page 8: Internet Security In the 21st Century Presented by Daniel Mills.

PasswordsPasswords

Ten most common passwords according to PC Ten most common passwords according to PC MagazineMagazine

1.1. passwordpassword

2.2. 123456123456

3.3. qwertyqwerty

4.4. abc123abc123

5.5. letmeinletmein

6.6. monkeymonkey

7.7. myspace1myspace1

password1password1

1.1. link182link182

2.2. (your first name)(your first name)

Page 9: Internet Security In the 21st Century Presented by Daniel Mills.

Computer ProtectionComputer ProtectionUpdate SoftwareUpdate Software

One of the most important things Users can do is One of the most important things Users can do is keep their software up to date. Updated keep their software up to date. Updated software provides many benefits including but software provides many benefits including but not limited tonot limited to

Closing security holes and exploitsClosing security holes and exploits

Providing new features that improve experience Providing new features that improve experience and help protect against attacksand help protect against attacks

Faster and more responsiveFaster and more responsive

Page 10: Internet Security In the 21st Century Presented by Daniel Mills.

Computer ProtectionComputer ProtectionSoftware Update ExamplesSoftware Update ExamplesPhishing ProtectionPhishing Protection

Firefox 3.0Firefox 3.0

Internet Internet Explorer 7+Explorer 7+

Page 11: Internet Security In the 21st Century Presented by Daniel Mills.

Computer ProtectionComputer ProtectionSoftware Update ExamplesSoftware Update ExamplesDomain HighlightingDomain Highlighting

Internet Internet Explorer 8Explorer 8

Google Google ChromeChrome

Page 12: Internet Security In the 21st Century Presented by Daniel Mills.

Computer ProtectionComputer ProtectionAnti-MalwareAnti-Malware

The next thing Users need to pay attention to is The next thing Users need to pay attention to is anti-malware. There are two types of malware:anti-malware. There are two types of malware:

VirusesViruses

Spyware or AdwareSpyware or Adware

It is important to have protection from both forms It is important to have protection from both forms of malware by using either a single software suite of malware by using either a single software suite such as McAfee or Trendmicro; or with multiple such as McAfee or Trendmicro; or with multiple programs such as AVG with Ad-Aware.programs such as AVG with Ad-Aware.

Page 13: Internet Security In the 21st Century Presented by Daniel Mills.

Computer ProtectionComputer ProtectionFirewallFirewall

Firewalls protect the computer from active Firewalls protect the computer from active external attack. There are two types of firewalls:external attack. There are two types of firewalls:

Software which run on the the computer they Software which run on the the computer they protect and require extra installation and setupprotect and require extra installation and setup

Hardware which are built in to many home Hardware which are built in to many home routers and do not require extra setuprouters and do not require extra setup

Page 14: Internet Security In the 21st Century Presented by Daniel Mills.

Computer ProtectionComputer ProtectionClean Up TipsClean Up Tips

Don’t scan the computer from it’s native Don’t scan the computer from it’s native environment, instead eitherenvironment, instead either

Remove the hard drive and scan it in another Remove the hard drive and scan it in another computer orcomputer or

Use a Linux LiveCD or LiveUSB diskUse a Linux LiveCD or LiveUSB disk

Consider that if the infection is bad enough you Consider that if the infection is bad enough you may have to back up important documents and may have to back up important documents and start from scratch but make sure scan the start from scratch but make sure scan the backupbackup

Page 15: Internet Security In the 21st Century Presented by Daniel Mills.

Network ProtectionNetwork ProtectionEncyptionEncyption

The best thing Users can do to protect their data The best thing Users can do to protect their data in transmission is to make sure important in transmission is to make sure important information is encrypted. Modern 3DES or AES information is encrypted. Modern 3DES or AES based encryptions take months or years to crack based encryptions take months or years to crack and provides plenty of protection for even the and provides plenty of protection for even the most sensitive data.most sensitive data.

Page 16: Internet Security In the 21st Century Presented by Daniel Mills.

Network ProtectionNetwork ProtectionWireless EncryptionWireless Encryption

Three common types from worst to bestThree common types from worst to best

WEP or Wire Equivelent Privacy, the oldest and WEP or Wire Equivelent Privacy, the oldest and most easily crackedmost easily cracked

WPA or WiFi Protected Access, stopgap to fix WPA or WiFi Protected Access, stopgap to fix WEP problem but still goodWEP problem but still good

WPA2 is the best, it has not yet been cracked WPA2 is the best, it has not yet been cracked and it is required for WiFi Certification on all new and it is required for WiFi Certification on all new devicesdevices

Page 17: Internet Security In the 21st Century Presented by Daniel Mills.

Network ProtectionNetwork ProtectionHTTPS vs HTTPHTTPS vs HTTP

HTTP is the protocol used to view and send data HTTP is the protocol used to view and send data to webpages. HTTPS is the same except it is run to webpages. HTTPS is the same except it is run through a SSL or Secure Socket Layer which through a SSL or Secure Socket Layer which encrypts the information as it passes between encrypts the information as it passes between the User and the web server. the User and the web server.

HTTPS requires a certificate be obtained by the HTTPS requires a certificate be obtained by the web server from a certificate authority which will web server from a certificate authority which will take many steps to verify the authenticity and take many steps to verify the authenticity and identity of the purchaser.identity of the purchaser.

Page 18: Internet Security In the 21st Century Presented by Daniel Mills.

Network ProtectionNetwork ProtectionSpamSpam

Spam is becoming a bigger and bigger problem Spam is becoming a bigger and bigger problem with both internal and external sources. The two with both internal and external sources. The two most common are:most common are:

Foreign servers in countries such as Russia or Foreign servers in countries such as Russia or ChinaChina

Bot Nets consisting of computers infected with Bot Nets consisting of computers infected with viruses such as Confikerviruses such as Confiker

Page 19: Internet Security In the 21st Century Presented by Daniel Mills.

Network ProtectionNetwork ProtectionProvider Level Spam ProtectionProvider Level Spam Protection

Every mail server should have spam protection. Every mail server should have spam protection. There are three common methods of protecting There are three common methods of protecting email at the server levelemail at the server level

Software built into the mail server such as Software built into the mail server such as SpamAssasinSpamAssasin

An appliance such as BarracudaAn appliance such as Barracuda

A third party provider such as PostiniA third party provider such as Postini

Page 20: Internet Security In the 21st Century Presented by Daniel Mills.

Network ProtectionNetwork ProtectionProvider Level Spam ProtectionProvider Level Spam Protection

There are also some technologies that can make it There are also some technologies that can make it more difficult for spammers to forge information like more difficult for spammers to forge information like from addresses. The more email providers that adopt from addresses. The more email providers that adopt these technologies the harder it will be for spammersthese technologies the harder it will be for spammers

SPF or Sender Policy Framework is a DNS record that SPF or Sender Policy Framework is a DNS record that provides a list of authorized servers to send email provides a list of authorized servers to send email from a domainfrom a domain

DKIM or Domain Key Identified Mail is mail that is DKIM or Domain Key Identified Mail is mail that is signed by the sending serversigned by the sending server

A third party provider such as PostiniA third party provider such as Postini

Page 21: Internet Security In the 21st Century Presented by Daniel Mills.

Network ProtectionNetwork ProtectionUser Level Spam ProtectionUser Level Spam Protection

If the User is not satisfied with the Provider level If the User is not satisfied with the Provider level protection, or they want to take care of filtering protection, or they want to take care of filtering them selves they have two basic optionsthem selves they have two basic options

Protection that is built into most modern email Protection that is built into most modern email softwaresoftware

Third party software either as part of their Third party software either as part of their security suite or individualsecurity suite or individual

Page 22: Internet Security In the 21st Century Presented by Daniel Mills.

Network ProtectionNetwork ProtectionUser Level Spam ProtectionUser Level Spam Protection

Most of the time filtering will be more than Most of the time filtering will be more than enough protection for all users. However there enough protection for all users. However there are some techniques that every User should or are some techniques that every User should or can follow to protect themselves.can follow to protect themselves.

Avoid posting email addresses in public Avoid posting email addresses in public locations such as social network sites or forumslocations such as social network sites or forums

Use separate emails one for private and one for Use separate emails one for private and one for publicpublic

Use more than 3 or 4 letters in the usernameUse more than 3 or 4 letters in the username

Avoid emails like info, support, service, etc.Avoid emails like info, support, service, etc.

Page 23: Internet Security In the 21st Century Presented by Daniel Mills.

Questions andQuestions andContact InformationContact Information

Daniel MillsDaniel MillsSenior Technical SpecialistSenior Technical SpecialistPeak InternetPeak [email protected]@peakinternet.comhttp://peakinternet.comhttp://peakinternet.comhttp://blog.peakinternet.comhttp://blog.peakinternet.com