1 / 36

Cyber Security: Today’s Threats and Mitigations

Cyber Security: Today’s Threats and Mitigations. Jonathan Homer, Cyber Security Analyst Idaho National Laboratory. Cyber Security. 45% believe cyber security is just as important as border security…. Cost of Cyber Security. Anticipated future cost of Cyber Crime. $411 billion.

ardara
Download Presentation

Cyber Security: Today’s Threats and Mitigations

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory

  2. Cyber Security 45% believe cyber security is just as important as border security…

  3. Cost of Cyber Security Anticipated future cost of Cyber Crime $411 billion $388 billion Global Drug Trafficking - 2011 Cyber Crime in 2011

  4. Today’s Agenda • Building Defenses Firewalls, Malware Protection and LUA • Sharing Information Wireless Networking Security • Being Alert and Vigilant Good Cyber Behavior

  5. Windows Security Center • Start -> Settings -> Control Panel -> Security Center

  6. System Updates • Ever See these? • Patch and Update Your System!!! • Control Panel -> Windows Update • (XP Only) http://windowsupdate.microsoft.com

  7. Malware Protection • Trend Micro = FREE for BEA Employees • http://virus.inl.gov – instructions and download

  8. Non-Admin Rights • At Work: “Least User Access” (LUA) • At Home: Standard User vs. Administrator You should have at least 3 accounts on every computer • Administrator Account – Only for installing software • Your Account (Standard user) – Daily access • 1 Account per child (Standard User) Standard (non-administrator) accounts prevent the installation of unwanted software. This includes viruses, malware, and games (which might not be as innocent as you think).

  9. How To Setup Multiple Accounts • Start, (Settings), Control Panel • User Accounts

  10. How To Setup Multiple Accounts

  11. Before moving on to wireless networks… Questions about Patching, Malware and LUA?

  12. Wireless Home Networking

  13. Layered Protection • First Layer of Protection • Change Default Administrator Passwords (and Usernames) • Change the Default SSID • Disable SSID Broadcast • Second Layer of Protection • Turn on (Compatible) WPA / WEP Encryption • Consider Hard Wire Computer (Home Office/Business Computer) • Advanced Layer of Protection • Assign Static IP Addresses to Devices • Enable MAC Address Filtering

  14. First Level – Change Default Passwords • Most Popular Brands: • Linksys • NETGEAR • D-Link • Belkin • Dynex Warning – Be Sure To Write Down Any Changes (Keep a Computer Log Book)

  15. First Level - Change the Default SSID • Use something descriptive but cryptive • AmmonResidence - Bad AmRes1House - Better

  16. First Level - Disable the SSID Broadcast

  17. Layered Protection • First Layer of Protection • Change Default Administrator Passwords (and Usernames) • Change the Default SSID • Disable SSID Broadcast • Second Layer of Protection • Turn on (Compatible) WPA / WEP Encryption • Consider Hard Wire Computer (Home Office/Business Computer) • Advanced Layer of Protection • Assign Static IP Addresses to Devices • Enable MAC Address Filtering

  18. Second Level – Turn on WPA/WEP • WEP (Wired Equivalent Privacy) • Weakest but better than nothing • WPA (Wi-Fi Protected Access) • WPA2 (WPA version 2) • They all encrypt the signal but not the content • Both devices (Wireless Access Point and the Laptop)

  19. Second Level – Take Computer Off Air • Does not need portability (i.e. home office computer) • Contains sensitive data • Wire it directly to your Wireless Access Point

  20. Layered Protection • First Layer of Protection • Change Default Administrator Passwords (and Usernames) • Change the Default SSID • Disable SSID Broadcast • Second Layer of Protection • Turn on (Compatible) WPA / WEP Encryption • Hard Wire One Computer (Home Office/Business Computer) • Advanced Layer of Protection • Assign Static IP Addresses to Devices • Enable MAC Address Filtering

  21. Advanced Level – IP Address Restriction • IP Internet Protocol address • Easier than a MAC to spoof • If someone were to know or guess it • IPv4 example 134.20.80.215 • developed in the early 1980’s • 2 32 address spaces or • 4.3 billion unique address spaces • IPv6 a401:0db8:0000:1234:0af0:0567:0001:0001 • developed in the mid1990’s • 3.403 × 1038 address spaces or • 340 trillion trillion trillion unique addresses

  22. Advanced Level – MAC Address Restrict • Media Access Control Address • Unique to every piece of IT equipment • Example 01:a3:5f:08:23:1c • Very hard to spoof • Number is burned into the hardware layer of the device

  23. Okay Let’s Review • First Layer of Protection – THE MOAT • Change Default Administrator Passwords (and Usernames) • Change the Default SSID • Disable SSID Broadcast • Second Layer of Protection – THE DRAWBRIDGE • Turn on (Compatible) WPA / WEP Encryption • Consider Hard Wire Computer (Home Office/Business Computer) • Advanced Layer of Protection – THICK WALLS • Assign Static IP Addresses to Devices • Enable MAC Address Filtering

  24. Good User Practices • Do Not Auto-Connect to Wi-Fi Networks • Manually Connect • Don’t Talk To Strangers • Enable Firewalls On Each Computer • Add another Level of Protection • Position the Router or Access Point Safely • Avoid Upstairs near a Window (radio signals travel a long way) • Turn off Network during Extended Periods of Non-Use • Vacation • Long Weekend

  25. What New In Wireless Routers • Cisco (Linksys) and DLink just released new lines of Wireless Routers

  26. Before moving on to human behaviors… Questions about wireless networks?

  27. 2 Big Behavioral Mistakes • Using Weak Passwords • Victim to Phishing

  28. Defend Yourself • Use longer passwords • Upper and Lowercase • Add Special Characters • Change your password often

  29. Identifying A Phishing Attack • Ask Yourself: Do I associate with this company? • Look for Spelling/Grammar mistakes? • Sense of Urgency • Threats • “Too Good To Be True” • Seeking Charitable Donations • Non Official URLs

  30. Summary of Defending Yourself • Patch and update your system • Run effective malware detection • Secure your wireless network • Use stronger passwords • Mouse over links before clicking “Think Before You Click!”

  31. Jonathan Homer SecAware@inl.gov Questions?

More Related