SlideShare a Scribd company logo
Online Safety & Security
April-May 2014
Epiphany Technology Committee
Jeff Squyres, Jim Cabral
Clickable links to additional
information are included at the end
of this presentation
Agenda
● Why Should I Care About Security?
● Who Is Attacking Me?
● What Do I Need to Protect?
● What Can Happen?
● What Increases My Risk?
● How Can I Protect Myself?
● What If I Get Hacked?
Disclaimer
● We’re Just Trying to Help
● Don’t blame us if things go bad
● We’re volunteers (with day jobs)
Why Should I Care About Security?
“Just like any other public environment, the Internet
requires awareness and caution. Just as you use
locks to keep criminals out of your home, you also
need safeguards to secure your computer. Many of
the crimes that occur in real life are now done - or
at least facilitated - through the Internet. Theft,
abuse, and more can be and are being done online.
Many scammers target older Americans via emails
and websites for charitable donations, dating
services, auctions, health care, and prescription
medications.”
US Department of Homeland Security.
The “Heartbleed” bug
The “Heartbleed” bug: Fun facts
● Only 38% of users have
changed their passwords
○ 6% have changed all
○ 16% changed “some”
○ 16% changed “a few”
The “Heartbleed” bug
● The Internet depends on encryption
○ “https” → S = secure (encryption)
○ Encryption between computers
Encrypted connection
The “Heartbleed” bug
● This encryption is known as “SSL”
○ “Secure Sockets Layer”
SSL encrypted connection
The “Heartbleed” bug
● ⅔ of web sites use the same software for SSL
○ OpenSSL
SSL encrypted connection
Open
SSL
● Software bug in OpenSSL since March 2012
The “Heartbleed” bug
Open
SSL
● Software bug in OpenSSL since March 2012
The “Heartbleed” bug
Open
SSL
The “Heartbleed” bug
It’s like walking through a
crowded restaurant with a
video camera.
Joe Smith:
your total is
$98.17Here’s my
credit card
Please log me in;
my username is
“bobcat371”, my
password is
“LouCardsRule”
You catch snippets of
conversations and images.
Most aren’t important.
But some are.
● Most web sites have fixed the problem
○ It is now safe to go change all your
passwords
● You can’t know if your password was
stolen
○ (there was no way to track the guy
with the video camera)
The “Heartbleed” bug
Who Is Attacking Me?
Albert Gonzales: stole 170M
credit / ATM cards from TJ Maxx
Who Is Attacking Me?
Nigerian (“419”) scammers
Also related:
● Guaranteed loan/credit scams
● Lottery scams
● Overpayment / refund scams
● Disaster relief scams
● Travel scams
● Tech/computer help scams
Who Is Attacking Me?
Dating, foreign
bride, sex scams
Who Is Attacking Me?
State-sponsored
“I’m not important”
● “No one cares
about my Facebook
account…”
● Wrong
○ They care a lot
“I’m not important”
● They’ll use the
same username /
password to login
elsewhere
● They’ll impersonate
you
What Do I Need to Protect?
What Can Happen?
Identity and Data Theft
Surveillance/Spying
Inappropriate Content
Your
child
What Increases My Risk?
Poor Passwords
● Simple passwords
● Old or reused
passwords
● Lack of 2-factor
authentication
“Do I really need a different password on
every web site?”
Yes
(sorry)
“But I can’t remember all those passwords!”
● Use a password-keeper program
● Two good ones:
○ LastPass
○ DashLane
● Both are
“Freemium”
Sidenote: What is 2-factor authentication?
1. Something you know
○ Your password
2. Something you have
○ Your cell phone
Sidenote: What is 2-factor authentication?
Login: bobcat371, LouCardsRule
Sidenote: What is 2-factor authentication?
Text bobcat371’s phone: code is 998321
This code changes every time
Sidenote: What is 2-factor authentication?
Text bobcat371’s phone: code is 998321
This code changes every time
What’s the code?
Sidenote: What is 2-factor authentication?
Text bobcat371’s phone: code is 998321
bobcat371, code is 998321
This code changes every time
Sidenote: What is 2-factor authentication?
You’re logged in!
Why is that useful?
Text bobcat371’s phone:
code is 796537
Login: bobcat371,
LouCardsRule
Why is that useful?
Text bobcat371’s phone:
code is 796537
What’s the code?
Why is that useful?
Text bobcat371’s phone:
code is 796537
Uh...
Why is that useful?
Text bobcat371’s phone:
code is 796537
Uh...
Who supports 2-factor?
Who supports 2-factor?
These are only a few
Many more support 2-factor
authentication
Check your favorite web sites to see if
they support 2-factor authentication
Back to:
What Increases My Risk?
Unpatched Software
● Windows and MacOS
● Applications (PDF, Office)
● Mobile phones, tablets
● Web Servers
(Heartbleed)
● Others (Java)
Insecure Configurations
● Software not set to auto-
update
● Open home WiFi
“I’m not important”
● “No one cares about my
home wifi network”
● Wrong
They care a lot
Wifi reaches outside of your home
With protected wifi
Your home / wifi
Bad guy
can’t get in your
network
With protected wifi
Your home / wifi
Bad guy connects
from the street -- he’s
in your network!
Unprotected wifi
“Unprotected wifi is not
only like leaving your
front door unlocked; it’s
like leaving it wide open
with a ‘Welcome’ mat out
front.”
How Can I Protect Myself?
Use Safe Online Behaviors
● Change ALL your passwords now
○ Use complex, unique
passwords for each site
● Avoid suspicious emails,
messages, websites and public
WiFi
○ If it’s too good to be true, it
probably is
● Monitor your credit cards
Get Help to Setup Security
● Set phones, tablets
and computers to
auto update
● Back up critical
information
● Encrypt your home
WiFi (use WPA2)
Get Help to Setup Security
Get Help to Setup Security
Everyone’s
setup is
different; we
can’t help
you in this
seminar
Get personal
or
professional
help
What If I Get Hacked?
Good Response Better Response
Recap
● The internet is a
dangerous place
○ BUT IT IS
MANAGEABLE!
○ Be sensible, be safe
○ Stop. Think. Connect.
Recap
● You can take actions NOW to protect yourself
○ Change ALL your passwords
■ Use good passwords
■ Get a password keeper
■ Setup 2-factor where possible
○ Ensure your firewall / anti-virus is up to date
○ Upgrade away from Windows XP
○ Set all your software to auto-update
○ Protect your home wifi
○ Setup off-site backups
Questions?
Helpful links
● STOP. THINK. CONNECT.: From the Dept. of Homeland Security
○ http://stopthinkconnect.org
● Malwarebytes: Handy PC software to remove viruses
○ A good second line of defense
○ https://www.malwarebytes.org/
● Lastpass: Password keeper
○ https://lastpass.com/
○ They also run a Hearbleed checker: https://lastpass.com/heartbleed
● Free annual credit report: From the US government
○ https://www.annualcreditreport.com/
● XKCD: Simple cartoon showing how Heartbleed works
○ http://imgs.xkcd.com/comics/heartbleed_explanation.png
Helpful links
● OpenDNS: Parental controls for filtering web sites at home
○ http://www.opendns.com/
● Microsoft Family Safety:
○ https://familysafety.live.com/
● Reporting Computer Crime:
○ http://www.justice.gov/criminal/cybercrime/reporting.html
Thank you!

More Related Content

PDF
Mc physics colloquium2018-03-30.-handouts
PPTX
Usol seminar presentation
PPT
Cybercrime and security
PDF
ATA 2009 Translation Tools Seminar
PPTX
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PPTX
Presentation to NCCA Computer Science Seminar. Dublin Castle, Ireland. 21st F...
PPTX
Seminar On Trojan Horse
PPTX
Object Orinted Programing(OOP) concepts \
Mc physics colloquium2018-03-30.-handouts
Usol seminar presentation
Cybercrime and security
ATA 2009 Translation Tools Seminar
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Presentation to NCCA Computer Science Seminar. Dublin Castle, Ireland. 21st F...
Seminar On Trojan Horse
Object Orinted Programing(OOP) concepts \

Viewers also liked (8)

PPTX
Seminar presentation on 5G
PPT
Quality Function Deployment (QFD) Seminar Presentation
PDF
Basics of ups seminar presentation
PPTX
Brain fingerprinting
PPT
Rapid Prototyping and its Applications
PPTX
Product and service design
PPT
Classroom Management Techniques
PPT
Basics of c++ Programming Language
Seminar presentation on 5G
Quality Function Deployment (QFD) Seminar Presentation
Basics of ups seminar presentation
Brain fingerprinting
Rapid Prototyping and its Applications
Product and service design
Classroom Management Techniques
Basics of c++ Programming Language
Ad

Similar to Computer Security Seminar: Protect your internet account information (20)

PDF
Be Cyber Smart! (DLH 10/25/2019)
PPTX
How to Protect Yourself From Heartbleed Security Flaw
PPTX
Cybersecurity awareness _20241220_223916_0000.pptx
PPT
CyberSecurity.ppt
PPT
Dark Alleys/Internet Security
PDF
Masterclass_ Cybersecurity and Data Privacy Basics
PPTX
An Introduction To IT Security And Privacy In Libraries & Anywhere
PPTX
Digital safety
PDF
Introduction to Personal Privacy and Security
PPTX
Internet / Cyber Security
PPTX
Click or Not to Click (Cyber Security Awareness )
PDF
Understanding Internet Security Threats and What They Mean to You
PDF
Security in the News
PPTX
Protect your Privacy
PPSX
Heartbleed Explained & LastPass Demo
PDF
Fight Spam and Hackers!
PPTX
Understanding Internet and Cyber Security Presentation .pptx
PPTX
Private Data and Prying Eyes
PPTX
Online Discussion: Ways to Address Online Privacy and Security
PDF
Riverview
Be Cyber Smart! (DLH 10/25/2019)
How to Protect Yourself From Heartbleed Security Flaw
Cybersecurity awareness _20241220_223916_0000.pptx
CyberSecurity.ppt
Dark Alleys/Internet Security
Masterclass_ Cybersecurity and Data Privacy Basics
An Introduction To IT Security And Privacy In Libraries & Anywhere
Digital safety
Introduction to Personal Privacy and Security
Internet / Cyber Security
Click or Not to Click (Cyber Security Awareness )
Understanding Internet Security Threats and What They Mean to You
Security in the News
Protect your Privacy
Heartbleed Explained & LastPass Demo
Fight Spam and Hackers!
Understanding Internet and Cyber Security Presentation .pptx
Private Data and Prying Eyes
Online Discussion: Ways to Address Online Privacy and Security
Riverview
Ad

Recently uploaded (20)

PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Getting Started with Data Integration: FME Form 101
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
A Presentation on Touch Screen Technology
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
MIND Revenue Release Quarter 2 2025 Press Release
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
WOOl fibre morphology and structure.pdf for textiles
NewMind AI Weekly Chronicles - August'25-Week II
Getting Started with Data Integration: FME Form 101
gpt5_lecture_notes_comprehensive_20250812015547.pdf
DP Operators-handbook-extract for the Mautical Institute
Accuracy of neural networks in brain wave diagnosis of schizophrenia
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
A Presentation on Artificial Intelligence
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
A Presentation on Touch Screen Technology
Univ-Connecticut-ChatGPT-Presentaion.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Programs and apps: productivity, graphics, security and other tools
MIND Revenue Release Quarter 2 2025 Press Release

Computer Security Seminar: Protect your internet account information

  • 1. Online Safety & Security April-May 2014 Epiphany Technology Committee Jeff Squyres, Jim Cabral
  • 2. Clickable links to additional information are included at the end of this presentation
  • 3. Agenda ● Why Should I Care About Security? ● Who Is Attacking Me? ● What Do I Need to Protect? ● What Can Happen? ● What Increases My Risk? ● How Can I Protect Myself? ● What If I Get Hacked?
  • 4. Disclaimer ● We’re Just Trying to Help ● Don’t blame us if things go bad ● We’re volunteers (with day jobs)
  • 5. Why Should I Care About Security? “Just like any other public environment, the Internet requires awareness and caution. Just as you use locks to keep criminals out of your home, you also need safeguards to secure your computer. Many of the crimes that occur in real life are now done - or at least facilitated - through the Internet. Theft, abuse, and more can be and are being done online. Many scammers target older Americans via emails and websites for charitable donations, dating services, auctions, health care, and prescription medications.” US Department of Homeland Security.
  • 7. The “Heartbleed” bug: Fun facts ● Only 38% of users have changed their passwords ○ 6% have changed all ○ 16% changed “some” ○ 16% changed “a few”
  • 8. The “Heartbleed” bug ● The Internet depends on encryption ○ “https” → S = secure (encryption) ○ Encryption between computers Encrypted connection
  • 9. The “Heartbleed” bug ● This encryption is known as “SSL” ○ “Secure Sockets Layer” SSL encrypted connection
  • 10. The “Heartbleed” bug ● ⅔ of web sites use the same software for SSL ○ OpenSSL SSL encrypted connection Open SSL
  • 11. ● Software bug in OpenSSL since March 2012 The “Heartbleed” bug Open SSL
  • 12. ● Software bug in OpenSSL since March 2012 The “Heartbleed” bug Open SSL
  • 13. The “Heartbleed” bug It’s like walking through a crowded restaurant with a video camera. Joe Smith: your total is $98.17Here’s my credit card Please log me in; my username is “bobcat371”, my password is “LouCardsRule” You catch snippets of conversations and images. Most aren’t important. But some are.
  • 14. ● Most web sites have fixed the problem ○ It is now safe to go change all your passwords ● You can’t know if your password was stolen ○ (there was no way to track the guy with the video camera) The “Heartbleed” bug
  • 15. Who Is Attacking Me? Albert Gonzales: stole 170M credit / ATM cards from TJ Maxx
  • 16. Who Is Attacking Me? Nigerian (“419”) scammers Also related: ● Guaranteed loan/credit scams ● Lottery scams ● Overpayment / refund scams ● Disaster relief scams ● Travel scams ● Tech/computer help scams
  • 17. Who Is Attacking Me? Dating, foreign bride, sex scams
  • 18. Who Is Attacking Me? State-sponsored
  • 19. “I’m not important” ● “No one cares about my Facebook account…” ● Wrong ○ They care a lot
  • 20. “I’m not important” ● They’ll use the same username / password to login elsewhere ● They’ll impersonate you
  • 21. What Do I Need to Protect?
  • 27. Poor Passwords ● Simple passwords ● Old or reused passwords ● Lack of 2-factor authentication
  • 28. “Do I really need a different password on every web site?” Yes (sorry)
  • 29. “But I can’t remember all those passwords!” ● Use a password-keeper program ● Two good ones: ○ LastPass ○ DashLane ● Both are “Freemium”
  • 30. Sidenote: What is 2-factor authentication? 1. Something you know ○ Your password 2. Something you have ○ Your cell phone
  • 31. Sidenote: What is 2-factor authentication? Login: bobcat371, LouCardsRule
  • 32. Sidenote: What is 2-factor authentication? Text bobcat371’s phone: code is 998321 This code changes every time
  • 33. Sidenote: What is 2-factor authentication? Text bobcat371’s phone: code is 998321 This code changes every time What’s the code?
  • 34. Sidenote: What is 2-factor authentication? Text bobcat371’s phone: code is 998321 bobcat371, code is 998321 This code changes every time
  • 35. Sidenote: What is 2-factor authentication? You’re logged in!
  • 36. Why is that useful? Text bobcat371’s phone: code is 796537 Login: bobcat371, LouCardsRule
  • 37. Why is that useful? Text bobcat371’s phone: code is 796537 What’s the code?
  • 38. Why is that useful? Text bobcat371’s phone: code is 796537 Uh...
  • 39. Why is that useful? Text bobcat371’s phone: code is 796537 Uh...
  • 41. Who supports 2-factor? These are only a few Many more support 2-factor authentication Check your favorite web sites to see if they support 2-factor authentication
  • 43. Unpatched Software ● Windows and MacOS ● Applications (PDF, Office) ● Mobile phones, tablets ● Web Servers (Heartbleed) ● Others (Java)
  • 44. Insecure Configurations ● Software not set to auto- update ● Open home WiFi
  • 45. “I’m not important” ● “No one cares about my home wifi network” ● Wrong They care a lot
  • 46. Wifi reaches outside of your home
  • 47. With protected wifi Your home / wifi Bad guy can’t get in your network
  • 48. With protected wifi Your home / wifi Bad guy connects from the street -- he’s in your network!
  • 49. Unprotected wifi “Unprotected wifi is not only like leaving your front door unlocked; it’s like leaving it wide open with a ‘Welcome’ mat out front.”
  • 50. How Can I Protect Myself?
  • 51. Use Safe Online Behaviors ● Change ALL your passwords now ○ Use complex, unique passwords for each site ● Avoid suspicious emails, messages, websites and public WiFi ○ If it’s too good to be true, it probably is ● Monitor your credit cards
  • 52. Get Help to Setup Security ● Set phones, tablets and computers to auto update ● Back up critical information ● Encrypt your home WiFi (use WPA2)
  • 53. Get Help to Setup Security
  • 54. Get Help to Setup Security Everyone’s setup is different; we can’t help you in this seminar Get personal or professional help
  • 55. What If I Get Hacked? Good Response Better Response
  • 56. Recap ● The internet is a dangerous place ○ BUT IT IS MANAGEABLE! ○ Be sensible, be safe ○ Stop. Think. Connect.
  • 57. Recap ● You can take actions NOW to protect yourself ○ Change ALL your passwords ■ Use good passwords ■ Get a password keeper ■ Setup 2-factor where possible ○ Ensure your firewall / anti-virus is up to date ○ Upgrade away from Windows XP ○ Set all your software to auto-update ○ Protect your home wifi ○ Setup off-site backups
  • 59. Helpful links ● STOP. THINK. CONNECT.: From the Dept. of Homeland Security ○ http://stopthinkconnect.org ● Malwarebytes: Handy PC software to remove viruses ○ A good second line of defense ○ https://www.malwarebytes.org/ ● Lastpass: Password keeper ○ https://lastpass.com/ ○ They also run a Hearbleed checker: https://lastpass.com/heartbleed ● Free annual credit report: From the US government ○ https://www.annualcreditreport.com/ ● XKCD: Simple cartoon showing how Heartbleed works ○ http://imgs.xkcd.com/comics/heartbleed_explanation.png
  • 60. Helpful links ● OpenDNS: Parental controls for filtering web sites at home ○ http://www.opendns.com/ ● Microsoft Family Safety: ○ https://familysafety.live.com/ ● Reporting Computer Crime: ○ http://www.justice.gov/criminal/cybercrime/reporting.html