SlideShare a Scribd company logo
Cyber Security Awareness
Jason Murray
TechTalk Live
May 7, 2013
Cyber security awareness
Goals
• Promote cyber security awareness
• Offer self-protection techniques
• Discuss methods to secure personal information
• Provide examples of protection software
http://www.youtube.com/watch_popup?v=pLty-
2U4BXs
0%
2%
4%
6%
8%
10%
12%
14%
Concerns
● Symantec blocked 5.5 billion malware attacks last year
– 81% increase over the previous year (computerworld.com)
● Kaspersky detecting 200,000 new/variant malwares per day (kaspersky.com)
Position Industry Rate
1 Education 146%
2 Retail & wholesale 104%
3 Health Care 100%
4 Banking & Finance 69%
5 Food & Beverage 58%
6 Government 46%
January Malware Encounters
Source:Cisco
Ratesabove100%reflecthigherthan
medianrateofencounter
United States 11.52%
Japan 3.47%
Colombia 2.53%
Source:Fortinet
France 1.87%
Canada 1.74%
Received Spam (Top 5 Regions)
SC Magazine
● http://www.scmagazine.com/may-2013-global-threats/slideshow/1299/
● eBook
FortiGuard Center
● http://www.fortiguard.com/
● Live Threat Monitor
Valuable Content
• Identity
• SSN
• Demographics
• Credit Cards
• Bank accounts
• Intellectual Property
• Business plans
• Innovational ideas
• Marketing campaigns
• Thoughts
Vulnerabilities
• Computers
• Networks
• Systems
• Game consoles
• Phones
• Houses
• Cars
• GPS systems
Greatest Threat
• Users
Security Threats
• Social Engineering
– Facebook
– Twitter
– LinkedIn
Security Threats
• Phishing
Source: APWG
Security Threats
• Phishing
From: MICHELLE REILLY [mailto:mreilly@westfieldnjk12.org]
Sent: Monday, January 28, 2013 11:21 PM
To: employee-web@webmaster.org
Subject: Important Technical Web Notice!
Important Technical Web Notice!
Your mailbox has exceeded one or more size limits set by the
administrator. You may not be able to send or receive new messages
until the mailbox size is reduced. For more space, please CLICK HERE
<http://systemcheck-res.ucoz.com/index1.htm> to upgrade your web
mail account.
The new secure feature upgrades your inbox to a clean, modern look
while maintaining your contacts, passwords, aliases and more. It's fast.
It's intuitive. It's email at its best.
Thank you for your cooperation.
Information and Technology DESK
THE MAIL TEAM.
Security Threats
• Malware
– Viruses
● Trojans
● Worms
● rootkits
– Spyware
● Ransomware
● Adware
● keyloggers
Trojan Horse
Security Threats
• Man in the Middle Attack
• Eavesdropping
• Beware of free WiFi
• KARMA
Security Threats
• Computer/Flash drive Theft
Security Threats
• Script Kiddies
– YouTube
– Google
Passwords
• www.howsecureismypassword.net
• Avoidance
• Personal information
• Facebook
• 2 step verification
• Best Practice
Penetration Testing
• Blackbuntu
• BackTrack
• Metasploit
Additional Tools
• Hiren’s Boot Disk
• Nmap & ZenMap
• Cain & Abel
• Nessus
• AirCrack-ng
Communication Security
• Secure Instant Message
• Pidgin
• Pidgin OTR Plugin
• Prevents eavesdropping
Communication Security
• Anonymization
• Hides the true Internet address
• Masks the geographical location
• Circumvents online tracking technologies
• Software
• Tor
• Bounces on a network of relays
Communication Security
• HTTP vs HTTPS
• Encryption
• HTTPS
• Designed to withstand eavesdropping
• Subject to decryption by SSL stripping tools
• Wireshark with SSL decryption support
• HTTPS Everywhere
• FireFox plugin
• Chrome plugin
Website Vulnerabilities
• Hacked websites
• Hacked advertisements
• Cookies
• Tracking
• Injections
• Malware
• Redirection
Communication Security
• CyberGhost VPN
• Hotspot Shield
• SpotFlux
Mobile Security
Android; 69%
iOS; 19%
Blackberry; 5%
Symbian; 3%
Windows; 3% Others; 2%
Android iOS Blackberry Symbian Windows Others
Source: IDC Worldwide Mobile Phone Tracker, February 14, 2013
Mobile Defense
• Lock passwords
• Device encryption
• Tracking software
• Disable WiFi & Bluetooth when not in use
• Antivirus software
• Remote wipe
Android
• Lookout (tracking)
• Prey (tracking)
• WhisperCore (disk encryption)
• RedPhone (conversation encryption)
• TextSecure (text encryption)
• Gibberbot (messaging encryption)
Source: androidfreeware.net
Summary
Cyber security awareness
Resources
• NEK Cyber Operations
• Androidfreeware.net
• IDC World Mobile Phone Tracker
• APWG
• Wireless Defense
• SC magazine
• SC education security ebook
• Fortiguard

More Related Content

Cyber security awareness