400 likes | 1.09k Views
Cyber Security: Today’s Threats and Mitigations. Jonathan Homer, Cyber Security Analyst Idaho National Laboratory. Cyber Security. 45% believe cyber security is just as important as border security…. Cost of Cyber Security. Anticipated future cost of Cyber Crime. $411 billion.
E N D
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory
Cyber Security 45% believe cyber security is just as important as border security…
Cost of Cyber Security Anticipated future cost of Cyber Crime $411 billion $388 billion Global Drug Trafficking - 2011 Cyber Crime in 2011
Today’s Agenda • Building Defenses Firewalls, Malware Protection and LUA • Sharing Information Wireless Networking Security • Being Alert and Vigilant Good Cyber Behavior
Windows Security Center • Start -> Settings -> Control Panel -> Security Center
System Updates • Ever See these? • Patch and Update Your System!!! • Control Panel -> Windows Update • (XP Only) http://windowsupdate.microsoft.com
Malware Protection • Trend Micro = FREE for BEA Employees • http://virus.inl.gov – instructions and download
Non-Admin Rights • At Work: “Least User Access” (LUA) • At Home: Standard User vs. Administrator You should have at least 3 accounts on every computer • Administrator Account – Only for installing software • Your Account (Standard user) – Daily access • 1 Account per child (Standard User) Standard (non-administrator) accounts prevent the installation of unwanted software. This includes viruses, malware, and games (which might not be as innocent as you think).
How To Setup Multiple Accounts • Start, (Settings), Control Panel • User Accounts
Before moving on to wireless networks… Questions about Patching, Malware and LUA?
Layered Protection • First Layer of Protection • Change Default Administrator Passwords (and Usernames) • Change the Default SSID • Disable SSID Broadcast • Second Layer of Protection • Turn on (Compatible) WPA / WEP Encryption • Consider Hard Wire Computer (Home Office/Business Computer) • Advanced Layer of Protection • Assign Static IP Addresses to Devices • Enable MAC Address Filtering
First Level – Change Default Passwords • Most Popular Brands: • Linksys • NETGEAR • D-Link • Belkin • Dynex Warning – Be Sure To Write Down Any Changes (Keep a Computer Log Book)
First Level - Change the Default SSID • Use something descriptive but cryptive • AmmonResidence - Bad AmRes1House - Better
Layered Protection • First Layer of Protection • Change Default Administrator Passwords (and Usernames) • Change the Default SSID • Disable SSID Broadcast • Second Layer of Protection • Turn on (Compatible) WPA / WEP Encryption • Consider Hard Wire Computer (Home Office/Business Computer) • Advanced Layer of Protection • Assign Static IP Addresses to Devices • Enable MAC Address Filtering
Second Level – Turn on WPA/WEP • WEP (Wired Equivalent Privacy) • Weakest but better than nothing • WPA (Wi-Fi Protected Access) • WPA2 (WPA version 2) • They all encrypt the signal but not the content • Both devices (Wireless Access Point and the Laptop)
Second Level – Take Computer Off Air • Does not need portability (i.e. home office computer) • Contains sensitive data • Wire it directly to your Wireless Access Point
Layered Protection • First Layer of Protection • Change Default Administrator Passwords (and Usernames) • Change the Default SSID • Disable SSID Broadcast • Second Layer of Protection • Turn on (Compatible) WPA / WEP Encryption • Hard Wire One Computer (Home Office/Business Computer) • Advanced Layer of Protection • Assign Static IP Addresses to Devices • Enable MAC Address Filtering
Advanced Level – IP Address Restriction • IP Internet Protocol address • Easier than a MAC to spoof • If someone were to know or guess it • IPv4 example 134.20.80.215 • developed in the early 1980’s • 2 32 address spaces or • 4.3 billion unique address spaces • IPv6 a401:0db8:0000:1234:0af0:0567:0001:0001 • developed in the mid1990’s • 3.403 × 1038 address spaces or • 340 trillion trillion trillion unique addresses
Advanced Level – MAC Address Restrict • Media Access Control Address • Unique to every piece of IT equipment • Example 01:a3:5f:08:23:1c • Very hard to spoof • Number is burned into the hardware layer of the device
Okay Let’s Review • First Layer of Protection – THE MOAT • Change Default Administrator Passwords (and Usernames) • Change the Default SSID • Disable SSID Broadcast • Second Layer of Protection – THE DRAWBRIDGE • Turn on (Compatible) WPA / WEP Encryption • Consider Hard Wire Computer (Home Office/Business Computer) • Advanced Layer of Protection – THICK WALLS • Assign Static IP Addresses to Devices • Enable MAC Address Filtering
Good User Practices • Do Not Auto-Connect to Wi-Fi Networks • Manually Connect • Don’t Talk To Strangers • Enable Firewalls On Each Computer • Add another Level of Protection • Position the Router or Access Point Safely • Avoid Upstairs near a Window (radio signals travel a long way) • Turn off Network during Extended Periods of Non-Use • Vacation • Long Weekend
What New In Wireless Routers • Cisco (Linksys) and DLink just released new lines of Wireless Routers
Before moving on to human behaviors… Questions about wireless networks?
2 Big Behavioral Mistakes • Using Weak Passwords • Victim to Phishing
Defend Yourself • Use longer passwords • Upper and Lowercase • Add Special Characters • Change your password often
Identifying A Phishing Attack • Ask Yourself: Do I associate with this company? • Look for Spelling/Grammar mistakes? • Sense of Urgency • Threats • “Too Good To Be True” • Seeking Charitable Donations • Non Official URLs
Summary of Defending Yourself • Patch and update your system • Run effective malware detection • Secure your wireless network • Use stronger passwords • Mouse over links before clicking “Think Before You Click!”
Jonathan Homer SecAware@inl.gov Questions?