1.08k likes | 1.28k Views
However, there is one kind of crime which may exist in the future - computer crime. Instead of mugging people in the streets or robbing houses, tomorrow's criminal may try to steal money from banks and other organizations by using a computer.
E N D
However, there is one kind of crime which may exist in the future - computer crime. Instead of mugging people in the streets or robbing houses, tomorrow's criminal may try to steal money from banks and other organizations by using a computer. … it is very difficult to carry out a successful robbery by computer. Many computers have secret codes to prevent anyone but their owners from operating them. As computers are used more and more, it is likely that computer crime will become increasingly difficult to carry out. From The 1981 book, School, Work and Play (World of Tomorrow)
IT Security For Libraries Blake Carver – blake@lishost.org http://lisnews.org/security/ Intro
Security is two different things: It's a feelingIt's a realityBruce Schneier - TedxPSU Intro
"Anonymous is a handful of geniuses...surrounded by a legion of idiots"Cole Stryker Intro
Where Are They Working? • Web Sites • Web Servers • Home Computers • Mobile Devices • Social Networks • Search Engines • Advertising • Email Intro
What Are They Doing? Man In The Middle Attacks Trojans Privilege Escalations DNS Changes Arbitrary File Downloads Cross Site Request Forgery Remote Stack Buffer Overflow Worms Heap Overflows Blended Threats Malvertising Arbitrary Command Execution Address Bar Spoofing Crimevertising Keyloggers File Overwrite Format Strings Shell Uploads Malware Spyware Local Stack Buffer Overflow Advanced Persistent Threats Data Exfiltration Data Aggregation Attacks Remote Code Execution Code Injections Scareware SQL Injections Information Disclosures Denial Of Service Array Integer Overflows Stack Pointer Underflow Null Byte Injection Backdoors Tojan-Downloaders HTTP Parameter Pollution Viruses Cross Site Scripting Cookie Disclosures Forced Tweet Local File Inclusions Rootkits Man In The Browser Attacks Remote Code Injection Adware DNS Poisoning Buffer Overflows Directory Traversals Open Redirection Remote Command Executions Frankenmalware Intro
What Are They Using? lethic s_torpig darkmailer Dofoil FakeCheck Sefnit Phoenix Rimecud Incognito SpyEye CoinMiner ClickPotato Zwangi FakeRean Bleeding Life Hotbar Citadel Siberia fivetoone Ramnit Conedex IRCBot Cycbot Eleonore Alureon ZeuS Blacole Alureon Camec Sirefef GameVance SEO Sploit SpyZeus Poison Intoxicated Onescan FineTop Taterf Taterf MSIL bobax Conficker grum OpenCandy Sality SideTab CrimePack PlayBryte cutwail Pdfjsc sendsafe gheg maazben Intro
Malware Incorporated • There’s an APP for that! • Matured, Diversified and Dangerous • Hard to reach • They conduct business anonymously Intro
Examples *Thanks to Brian Krebs for sharing screenshots: krebsonsecurity.com And to Dr. Mark Vriesenga, BAE systems Intro
What Are They After? • PINs • Passwords • Credit Cards • Bank Accounts • Computers • Usernames • Contact Lists • Emails • Phone Numbers Intro
Personal information is the currency of the underground economy Intro
There is no such thing as a secure computer Intro
Passwords • Staying Safe At Home & Away • Desktops & Laptops • Email • Browsers • Wi-Fi • Social Media • Mobile Devices • Security In Libraries • Biggest Mistakes • Practical Policies • Server Side Security Intro – Next - Passwords
Passwords Reuse Weak Passwords
Passwords Are Like Bubblegum... • Best When Fresh • Should Be Used Once • Should Not Be Shared • Make A Mess When Left Lying Around • Easy To Steal NativeIntelligence.com Passwords
What Have We Learned From Breaches? • Passwords Are Reused • Passwords Are Weak Passwords
What Makes a Good Password? • Uniqueness • Complexity • Length • Strength • Memorableness Passwords
World’s Best Password Policy! • Be at least 32 characters in length. • Contain all of the following 4 character types: • Uppercase letters (ABCDEFGHIJKLMNOPQRSTUVWXYZ) • Lowercase letters (abcdefghijklmnopqrstuvwxyz) • Symbols (,./’~<?;:”[]{}\|!@#$%^&*()_=-+) • Numbers (0123456789) • Not be similar to or contain any portion of your name or login name • Not contain English words that are longer than 4 letters • Not begin or end with a number • Not be the same as any of the previous 78 passwords in the password history • Be changed at least once every 12 days • NOT Use a sequence of keys on the keyboard, such as QWERTY or 12345 • NOT Use information about yourself, family members, friends or pets. This includes (in whole or in part) names, birthdates, nicknames, addresses, phone numbers • NOT Use words associated with your occupation or hobbies • NOT Use words associated with popular culture, such as song titles, names of sports teams, etc. • NOT Be reused for multiple accounts Passwords
O9q[#*FjJ9kds7HJ&^4&!@&$#s(6@GFK Passwords
Simple Things Make a Strong Password • Some Letters – UPPER and lower case • Maybe some numbers • Maybe a something else (*%$@!-+=) • DO Make it as l o n gas you can • Do notreuse it on multiple sites Passwords
What Makes a Bad Password • Default Passwords • Dictionary and Common Words • Predictable Patterns • Passwords From Password Lists • Obvious Personal Details Passwords
Should You Change All Your Passwords Every X # of Months? • Email? • Bank Account? • Network? • Server? • Router? • Facebook & Twitter? • Library Web Site? • LISNews? Passwords
What Can Sysadmins Do? • Don’t allow bruteforcing • Encrypt and Salt Passwords • Allow Large Passwords • Allow Large Character Sets Passwords
Assume Your Password Will Be Stolen Passwords
Have your accounts been compromised? https://www.pwnedlist.com/ Passwords – Next – Staying Safe Online
Staying Safe Online At Home(And Away) Patches Trust Passwords Staying Safe Online
How Do You Know If You Are Infected? You Don’t • Sudden slowness • Change in behavior • Odd sounds or beeps • Random Popups • Unwelcome images • Disappearing files • Random error messages • Fans Spinning Wildly • Programs start unexpectedly • Your firewall yells at you • Odd emails FROM you • Freezes • Your browser behaves funny Staying Safe Online
Your antivirus software is a seat belt – nota force field.- Alfred Huger Staying Safe Online
Desktops & Laptops • Keep everythingpatched / updated • Don’t Trust anything • Links / Downloads / Emails • Backup your stuff! Staying Safe Online
If I took your laptop/iPad right now....What would I have access to? Staying Safe Online
Laptops • Prey / LoJack • Passwords • Sign Out & Do NOT Save Form Data Staying Safe Online
Carry A SafeNot A Suitcase Staying Safe Online
Email • Don’t trust anything • Don’t leave yourself logged in • 2 Factor Authentication • Passwords Staying Safe Online
Email Blended Threats • 新 任 经 理 全 面 管 理 技能提 升 • Fwd: Scan from a Hewlett-Packard ScanJet 38061 • Airline Itineraries • Banks / Credit Cards • Order Confirmations • Better Business Bureau complaints (BBB) • UPS / FedEX Delivery Notifications Staying Safe Online
35% 2% 20% 35% 4% Staying Safe Online
Browsers • Keep Everything Updated • Know Your Settings • Phishing & Malware Detection - Turned ON • Software Security & Auto / Silent Patching - Turned ON • A Few Recommended Plugins: • Something to Limit JavaScript • Something to Force HTTPS • Something to Block Ads Staying Safe Online
Firefox Collusion Staying Safe Online
Wi-Fi • Passworded & Encrypted • MAC & DHCP • Firmware Updates • Off Never Trust Public Wi-Fi Staying Safe Online
Social Media • Understand and adjust your privacy settings • Use HTTPS • Be skeptical of everything • especially ANYONE asking you for money Staying Safe Online
Social Media Common Threats • YOU HAVE TO SEE THIS • Free iPhone 5! • New Apps • Celebrity / Current Event • Twitter @s Hidden behind URL Shortners Staying Safe Online