SlideShare a Scribd company logo
DefendingYour Accounts, Devices, &Anonymity
 Information is power!
 Tech is very good today… even for hackers
 John the Ripper & GPUs
 Hacking effected 48% of Americans in 2014 & cost
businesses nearly $500mil in losses
 3.1 million Americans had their phones stolen in 2013
(1.4 million lost their phones)
 Not all hackers are evil (black hat)
 White hats find and help fix problems
 Nations are also in the game
 Stuxnet worm
 PRISM program
 Bugs (Heartbleed)
 Brute force hacking
 John the Ripper
 Social engineering
 Con men
 Packet sniffing
 WireShark
 Robbery
 3.1 million
 Viruses/worms
 Bugs
 PGP
 AES
 RSA
 PBKDF2: Password-Based Key Derivation Function 2
 WPA 2 (WiFi ProtectedAccess)
 WiFi encryption
 TLS (https)
 Internet communication encryption
 Print scan (Touch ID / hand)
 Mostly safe from everyone but the police
 Eye scan (retina / iris)
 Odor sensor (breath)
 Voice recognition
 Face recognition
 The best password is a semisensical passphrase
 th3Qu!ckBr0wnf0XjumP3d.
 Minimum 9 characters including both upper &
lowercase letters, numbers, and specials
 Here’s a strong/unique passcode: !sWt^%vTR]/9
 Two-factor authentication (2FA) can also be
used for additional security
 Sadly, some sites restrict passcodes to 15
characters and/or do not allow specials
 Something you know & something you have
 Apple
 Google
 Microsoft
 Facebook
 Yahoo
 Evernote
 Cloud storage (Tresorit)
 E*Trade,Vanguard, PayPal, etc…
 Amazon
 80% of top security experts use one!
 1Password
 LastPass
 Dashlane
 KeePass
 Norton Identity Safe
 iCloud Keychain
 Google Synch
 Browsers
 Computer / Device specific
 Change the router nameASAP
 Change the admin password ASAP
 Change the gateway’s IP address
 UseWPA2 withAES encryption!
 Quantum computing
 Massively parallel
 Current passwords snap like a twig
 Quantum encryption
 Unbreakable
 The act of intercepting it breaks it
 VPNs
 Route users through multiple IPs masking their
identity and location
 TOR *
 Browser based
 Uses proxies
 Always use HTTPS for commerce & utilize the
EFF’s HTTPS Everywhere extension
 Use 2FA on password recovery email accounts
 Do not underestimate the physical security of your
computers & mobile devices (use a PIN)
 Social engineering is a powerful tool
▪ As is dumpster diving
 Encrypt your PC’s hard drive (VeraCrypt)
 Use PayPal – Keep payment info. in one place
 If you’re not using a password manager, write your
passcodes down and keep them in a safe place.
That said, use a password manager!

More Related Content

PPTX
Digital security
PPTX
Ethical hacking
PPTX
Computing remotely in a secure manner
PPT
Basic Introduction to hacking
PPTX
Hacking intro
PPTX
Hacker&cracker
PPT
PPT
Ethical Hacking
Digital security
Ethical hacking
Computing remotely in a secure manner
Basic Introduction to hacking
Hacking intro
Hacker&cracker
Ethical Hacking

What's hot (18)

PPT
Information Security - A Discussion
PPTX
Hacking final
PPTX
Web defacement
PPTX
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
PPTX
Ethical Hacking
PPT
Csi Netsec 2006 Poor Mans Guide Merdinger
PPTX
Ethical hacking for information security
PPT
Securitytips
PPTX
The Basics of Ethical Hacking
PDF
Smart Bombs: Mobile Vulnerability and Exploitation
PDF
STH-TopFiveSecuritySteps-TipsSheet
PPT
Security Assessment
PPT
Barcamp 2009-Ninjitsu Attack Hack For Fun and Profit
PPT
All about Hacking
PPTX
Ethical Hacking & Network Security
PPT
Power Point Hacker
PPTX
Hacking (cs192 report )
PDF
Hacking
Information Security - A Discussion
Hacking final
Web defacement
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Ethical Hacking
Csi Netsec 2006 Poor Mans Guide Merdinger
Ethical hacking for information security
Securitytips
The Basics of Ethical Hacking
Smart Bombs: Mobile Vulnerability and Exploitation
STH-TopFiveSecuritySteps-TipsSheet
Security Assessment
Barcamp 2009-Ninjitsu Attack Hack For Fun and Profit
All about Hacking
Ethical Hacking & Network Security
Power Point Hacker
Hacking (cs192 report )
Hacking
Ad

Viewers also liked (20)

PPTX
Fleet Robo - Fleet Management Solution for Transportation, Logistics & Vehicl...
PPTX
Enterprise Mobilty Trends 2013- An Agenda for the CIO
PPTX
The Sharing Economy
PDF
Rob Kemp - Portfolio
PPTX
OOAD (1)
PPS
Vehicle Accessibility Consultants Slideshow
PDF
Ideate project
PPTX
Narrative Storyboard
PDF
2017 Bell Joy Ride Program
PDF
Breez Project Presentation
PPTX
Fleet Robo-Fleet Management Solutions with GPS Vehicle Tracking System
PDF
A380 qantas ao-2010-089_final_report
PPTX
First Annual Automotive Mobility Study
PDF
2015 Global Trend Forecast (Technology, Media & Telecoms)
PPT
Re-thinking policies for the tourism sharing economy
PDF
RideConnect Pitch Deck
PDF
12 Vital elements of the Subscription Business Model
PDF
Sharing Economy & Tourism
PDF
Mobile Trends in Mobility Apps
PDF
2014 Global Trend Forecast (Technology, Media & Telecoms)
Fleet Robo - Fleet Management Solution for Transportation, Logistics & Vehicl...
Enterprise Mobilty Trends 2013- An Agenda for the CIO
The Sharing Economy
Rob Kemp - Portfolio
OOAD (1)
Vehicle Accessibility Consultants Slideshow
Ideate project
Narrative Storyboard
2017 Bell Joy Ride Program
Breez Project Presentation
Fleet Robo-Fleet Management Solutions with GPS Vehicle Tracking System
A380 qantas ao-2010-089_final_report
First Annual Automotive Mobility Study
2015 Global Trend Forecast (Technology, Media & Telecoms)
Re-thinking policies for the tourism sharing economy
RideConnect Pitch Deck
12 Vital elements of the Subscription Business Model
Sharing Economy & Tourism
Mobile Trends in Mobility Apps
2014 Global Trend Forecast (Technology, Media & Telecoms)
Ad

Similar to Digital Security (20)

PPT
Dr. Alan Shark
PPTX
password cracking and Key logger
PPT
Computer security
PPT
Computer Systems Security
PPT
Computersystemssecurity 090529105555-phpapp01
PPTX
Introduction to security
PDF
Digital Security for Journalists
PDF
Digital security for journalists laurent eschenauer
PPT
Encryption Primer por Cathy Nolan
PPTX
Lecture about network and host security to NII students
PPT
Hacker
PPTX
Information security & ethical hacking
PDF
Smart Bombs: Mobile Vulnerability and Exploitation
PDF
Computer & Data Security
PPT
IT Security for the Physical Security Professional
PPT
System-Security-acit-Institute
PPT
Hacking Presentation
PPT
It security &_ethical_hacking
PPTX
Data Privacy for Activists
PPT
ASSIST - Fraud Presentation
Dr. Alan Shark
password cracking and Key logger
Computer security
Computer Systems Security
Computersystemssecurity 090529105555-phpapp01
Introduction to security
Digital Security for Journalists
Digital security for journalists laurent eschenauer
Encryption Primer por Cathy Nolan
Lecture about network and host security to NII students
Hacker
Information security & ethical hacking
Smart Bombs: Mobile Vulnerability and Exploitation
Computer & Data Security
IT Security for the Physical Security Professional
System-Security-acit-Institute
Hacking Presentation
It security &_ethical_hacking
Data Privacy for Activists
ASSIST - Fraud Presentation

More from Milford Public Library (10)

PPTX
Electronic Databases
PPTX
PPT
Basic Computer Skills
PPTX
Unleash the Power of Your Cell Phone: The Tricorder in Your Pocket
PPTX
Streaming Media & the Cloud
PPTX
PPTX
The Internet of Things (IoT)
PPTX
Emerging Technology
Electronic Databases
Basic Computer Skills
Unleash the Power of Your Cell Phone: The Tricorder in Your Pocket
Streaming Media & the Cloud
The Internet of Things (IoT)
Emerging Technology

Recently uploaded (20)

PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Complications of Minimal Access Surgery at WLH
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
RMMM.pdf make it easy to upload and study
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
master seminar digital applications in india
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Basic Mud Logging Guide for educational purpose
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Cell Types and Its function , kingdom of life
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Institutional Correction lecture only . . .
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Complications of Minimal Access Surgery at WLH
human mycosis Human fungal infections are called human mycosis..pptx
RMMM.pdf make it easy to upload and study
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
master seminar digital applications in india
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Basic Mud Logging Guide for educational purpose
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Cell Structure & Organelles in detailed.
2.FourierTransform-ShortQuestionswithAnswers.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Microbial diseases, their pathogenesis and prophylaxis
Cell Types and Its function , kingdom of life
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPH.pptx obstetrics and gynecology in nursing
Institutional Correction lecture only . . .

Digital Security

  • 2.  Information is power!  Tech is very good today… even for hackers  John the Ripper & GPUs  Hacking effected 48% of Americans in 2014 & cost businesses nearly $500mil in losses  3.1 million Americans had their phones stolen in 2013 (1.4 million lost their phones)  Not all hackers are evil (black hat)  White hats find and help fix problems  Nations are also in the game  Stuxnet worm  PRISM program  Bugs (Heartbleed)
  • 3.  Brute force hacking  John the Ripper  Social engineering  Con men  Packet sniffing  WireShark  Robbery  3.1 million  Viruses/worms  Bugs
  • 4.  PGP  AES  RSA  PBKDF2: Password-Based Key Derivation Function 2  WPA 2 (WiFi ProtectedAccess)  WiFi encryption  TLS (https)  Internet communication encryption
  • 5.  Print scan (Touch ID / hand)  Mostly safe from everyone but the police  Eye scan (retina / iris)  Odor sensor (breath)  Voice recognition  Face recognition
  • 6.  The best password is a semisensical passphrase  th3Qu!ckBr0wnf0XjumP3d.  Minimum 9 characters including both upper & lowercase letters, numbers, and specials  Here’s a strong/unique passcode: !sWt^%vTR]/9  Two-factor authentication (2FA) can also be used for additional security  Sadly, some sites restrict passcodes to 15 characters and/or do not allow specials
  • 7.  Something you know & something you have  Apple  Google  Microsoft  Facebook  Yahoo  Evernote  Cloud storage (Tresorit)  E*Trade,Vanguard, PayPal, etc…  Amazon
  • 8.  80% of top security experts use one!  1Password  LastPass  Dashlane  KeePass  Norton Identity Safe  iCloud Keychain  Google Synch  Browsers  Computer / Device specific
  • 9.  Change the router nameASAP  Change the admin password ASAP  Change the gateway’s IP address  UseWPA2 withAES encryption!
  • 10.  Quantum computing  Massively parallel  Current passwords snap like a twig  Quantum encryption  Unbreakable  The act of intercepting it breaks it
  • 11.  VPNs  Route users through multiple IPs masking their identity and location  TOR *  Browser based  Uses proxies
  • 12.  Always use HTTPS for commerce & utilize the EFF’s HTTPS Everywhere extension  Use 2FA on password recovery email accounts  Do not underestimate the physical security of your computers & mobile devices (use a PIN)  Social engineering is a powerful tool ▪ As is dumpster diving  Encrypt your PC’s hard drive (VeraCrypt)  Use PayPal – Keep payment info. in one place  If you’re not using a password manager, write your passcodes down and keep them in a safe place. That said, use a password manager!

Editor's Notes

  • #2: There are always tradeoffs between security & convenience…
  • #3: ashleymadison.com hack – 37 million users (10% of U.S.) Identity theft effects about 15 million Americans each year
  • #4: JtR = password cracker / can run through thousands/sec (potentially billions) Kevin Mitnick, king of hackers (con man) Cell industry: Only 47% of users use PINs to secure their phones Device kill switch was killed by Congress (Find My iPhone – find, lock, wipe / Send Last Location) Ransomware has even targeted police Firewall all routers and PCs, use virus protection (Avast), & keep your software updated!
  • #5: Pretty Good Privacy (PGP) Advanced Encryption Standard (AES) Rivest, Shamir, Adleman (RSA) Transport Layer Security (TLS)
  • #6: Not as secure as passcodes, but way more convenient. Hopefully more people will lock their devices now With Touch ID, turn phone off before dealing with police as iPhones require PIN on restart
  • #7: “Diceware” is the most effective (random) method to generate strong/unique passcodes without using a password manager 16 character+ passcodes are mostly secure from brute force attempts LIE for the answers to security questions & note the lies in your password manager! *Usernames can also be varied from site to site and changed like passwords if allowed
  • #8: REQUIRES cell phone. The “real” way is to use a 2nd phone… Good as an ALERT for when someone does attempt unauthorized access Authorize least two different devices & store backup codes someplace safe! Evernote can also encrypt notes internally via desktop client Tresorit : Only you hold key & servers operate under Swiss law Mention Vanguard’s device specific login option
  • #9: The ONLY easy way to implement both strong & unique passcodes 1Password can backup to iCloud, Dropbox, or Wifi & never stores your master key! Change password for Google Synch Recommend 2FA if backing-up to the cloud for extra security
  • #10: Default brand names, passwords, and gateway IPs are online so don’t use them! For extra security limit admin acess to Ethernet only or by MAC address
  • #11: From hundreds of millions/sec to thousands of trillions/sec Researchers recently got five atoms to factor the number 15, and they say it is scalable!
  • #12: Bonus! While you’re at it, why not browse the Internet anonymously too? Also the Signal messaging & voice app! Mention EFF’s new Privacy Badger extension for blocking unwanted tracking cookies Cracked by Carnegie Mellon for the Government (irony)
  • #13: Lock your devices with passcodes! iPhones can be set to wipe after 10 failed attempts Windows Vista+ can auto encrypt hard drive (BitLocker) Using 2FA on PayPal isn't a bad idea either... Be cautious around (unknown) open & ad hoc networks / Disable Java extension when unnecessary / Don’t use IE / Tape over webcams when not in use Apple users should also change their iCloud security key! *The secret to digital security is random characters, lies, and a password manager!