SlideShare a Scribd company logo
1 of 105
4/1/11 Barry Wilson/Scott McNulty – Wharton Computing 4/1/11 Techfast: Security – Not just for banks
Who Are We?And what do we do? 2 Wharton Computing
Two quotes from experts 3 As head of security it is my duty to be... concerned. - Worf, USS Enterprise By failing to prepare, you are preparing to fail. 	 - B. Franklin, local celebrity Wharton Computing 4/1/11
The Internet is out to get you (only a little) 4 Wharton Computing 4/1/11
Password Rules of Thumb WHARTON COMPUTING 5
No sharing passwords between accounts 4/1/11 WHARTON COMPUTING 6
One password to spoil them all 7 Wharton Computing 4/1/11
No short passwords 4/1/11 Wharton Computing 8
No Dictionary Words 4/1/11 WHARTON COMPUTING 9
No personal information 4/1/11 WHARTON COMPUTING 10
Passphrases: exception to the rules 11 Wharton Computing 4/1/11 Very long Easy to remember Hard to crack
Example passphrase My, aren’t members of Wharton Computing good looking?  4/1/11 WHARTON COMPUTING 12
How Secure is your password? 4/1/11 13 http://howsecureismypassword.net Wharton Computing
How long will it take to crack these passwords: 14 Wharton Computing 4/1/11
password 15 Wharton Computing
Instantly 4/1/11 16 Wharton Computing
Other common passwords 4/1/11 Wharton Computing 17
Password Cracking 101 WHARTON COMPUTING 18
Dictionary Attacks 4/1/11 Wharton Computing 19 http://mtyourmind.10001mb.com/2009/0127/
Rainbow Table 4/1/11 WHARTON COMPUTING 20 http://www.elsingadesign.com/
Brute Force attacks 4/1/11 Wharton Computing 21 http://ryan.skow.org/siege/Fields2002/SaturdayBattleReport.html
Social engineering 4/1/11 WHARTON COMPUTING 22 http://news.bbc.co.uk/2/hi/technology/3639679.stm
Password Tip 1 o = 0 4/1/11 Wharton Computing 23
Password Tip 2 cAmelCaSe 4/1/11 Wharton Computing 24
passW0rd 25 Wharton Computing
10 Days 4/1/11 26 Wharton Computing
Password Tip 3 $pec!@l Ch@r@cter$ 4/1/11 WHARTON coMPUTING 27
p055W0rD! 28 Wharton Computing
9 Years 4/1/11 29 Wharton Computing
My, aren’t members of Wharton Computing good looking?  30 Wharton Computing
560 tresvigintillion years 4/1/11 31 Wharton Computing
Managing your passwords the old way 32 Wharton Computing 4/1/11
169 days 4/1/11 33 Wharton Computing
Managing your passwords the old way 34 Wharton Computing 4/1/11
Managing your passwords the secure way 35 Password Safe http://passwordsafe.sourceforge.net/ 1Password http://agilewebsolutions.com/onepassword/ Wharton Computing 4/1/11
Phishing 36 Wharton Computing
As defined by the OED 4/1/11 WHARTON COMPUTING 37
Tips for identifying a phishing email 38 Wharton Computing 4/1/11
Phishing - browser address bar 39 Wharton Computing 4/1/11
Phishing - browser address bar 40 Wharton Computing 4/1/11
Phishing - browser address bar - SSL 41 Wharton Computing 4/1/11
Phishing - browser address bar - SSL 42 Wharton Computing 4/1/11
Phishing – Poor wording 43 Wharton Computing 4/1/11
Phishing – Check the sender 44 From: Usman Bagudu <Usman.Bagudu@pet.hw.ac.uk> Wharton Computing 4/1/11
Phishing – asks for your password 4/1/11 WHARTON COMPUTING 45
Phishing email or not? 4/1/11 WHARTON COMPUTING 46
Phishing email or not? 4/1/11 WHARTON COMPUTING 47 Undisclosed recipients PHISHING! Not a Penn Web site. Not a real group @ Penn
When in doubt: ask 4/1/11 WHARTON COMPUTING 48
Defending against Phishing 4/1/11 WHARTON COMPUTING 49
Defending against Phishing 4/1/11 WHARTON COMPUTING 50
Defending against Phishing 4/1/11 WHARTON COMPUTING 51
What to do if you respond to a phishing email 52 http://mantia.me/wallpaper/dont-panic/ Wharton Computing 4/1/11
Tell Someone 53 Wharton Computing 4/1/11
Change your passwords 54 Wharton Computing 4/1/11
Review Statements 55 Wharton Computing 4/1/11
Contact the authorities Wharton: security@wharton.upenn.edu FTC: 1-877-ID-THEFT or  https://www.ftccomplaintassistant.gov/ Police Credit Card issuers: Setup a fraud alert 56 Wharton Computing 4/1/11
Home Computers 57 Wharton Computing
Avoid: no-name anti-virus 58 Image credit: Complete Computer Repair of CT (http://tinyurl.com/272uvla) Wharton Computing 4/1/11
Avoid: downloading © material 59 Wharton Computing 4/1/11
Forewarned is Forearmed. 60 Wharton Computing
Automatic Software Updates 61 Wharton Computing 4/1/11
Software Updates – 3rd Party Software 62 Wharton Computing 4/1/11
Install Antivirus software 63 http://www.upenn.edu/computing/virus/ Wharton Computing 4/1/11
Install Antivirus software 64 Wharton Computing 4/1/11
Firewall 65 Credit: Stuck in Customs http://www.flickr.com/photos/stuckincustoms/1194563275/in/photostream/ Wharton Computing 4/1/11
Firewall – Windows 7 4/1/11 WHARTON COMPUTING 66
Firewall – Windows 7 4/1/11 WHARTON COMPUTING 67
Firewall – Windows 7 4/1/11 WHARTON COMPUTING 68
Firewall – OS X 4/1/11 WHARTON COMPUTING 69
Firewall – OS X 4/1/11 WHARTON COMPUTING 70
Firewall – OS X 4/1/11 WHARTON COMPUTING 71
Home computers: Ideal vs. Reality 72 Wharton Computing 4/1/11
Home computers: Ideal Dedicated computer: Only you use your computer. Password protected. 73 Wharton Computing 4/1/11
Home computers: Practical Multiple accounts: Each user has their own individual account. VPN. Don’t store work files on home computer. 74 Wharton Computing 4/1/11
Mobile devices 75 Wharton Computing 4/1/11
Mobile devices: set a password 76 Wharton Computing 4/1/11
Mobile devices: remote wipe 77 Wharton Computing 4/1/11
Mobile devices: encryption 78 Wharton Computing 4/1/11
IPAD DEMO Wharton Computing 79
Confidential Data WHARTON COMPUTING 80
Nobody wants this 81 Wharton Computing 4/1/11
Or this… 82 Wharton Computing 4/1/11
Or this! 4/1/11 WHARTON COMPUTING 83
Confidential Data – What is it? 84 Wharton Computing 4/1/11
Legally Protected As defined by the government. SSNs Credit Card Data Bank Account information Medical data Student enrollment data (anything defined in FERPA) 85 Wharton Computing 4/1/11
University Protected As defined by the University All the legally protected info + Salary information Tax and payroll information Data we have agreed to keep confidential:  ,[object Object],86 Wharton Computing 4/1/11
University Policy “This policy establishes expectations around the use of SSNs - sensitive data whose misuse poses privacy risks to individuals, and compliance and reputational risks to the University. It calls on staff, faculty, contractors, and agents of the above to inventory their online and offline SSNs and reduce the above risks by, in priority order: (1) eliminating this data altogether, (2) converting it to PennID, (3) truncating the data to capture and display only the last four digits, (4) when the complete SSN is clearly necessary, ensuring strict security controls to protect the full data.” 87 Wharton Computing 4/1/11
University Policy - Summary Four easy things to do: Eliminate Convert (to PennID) Truncate Secure 88 Wharton Computing 4/1/11
Identity Finder 4/1/11 WHARTON COMPUTING 89
Why Identity Finder? Cross platform Centrally managed Best in class software 4/1/11 WHARTON COMPUTING 90
Identity Finder 91 Wharton Computing 4/1/11
Shredding files 4/1/11 WHARTON COMPUTING 92
Identity Finder Management Console 4/1/11 WHARTON COMPUTING 93
Identity Finder Management Console 4/1/11 WHARTON COMPUTING 94
IMPORTANT None of your data is transmitted/stored on the Identity Finder Management server Only location/general type of found data is transmitted (securely) No data will be deleted from your computer by Wharton Computing without your consent 4/1/11 WHARTON COMPUTING 95
How “dangerous” is your confidential data? 3 questions to help gauge your risk How much do you have? Who does it include? What else is stored with it? 96 Wharton Computing 4/1/11
How do youmanageit? Know what you have Keep it separated Make sure it is secure 97 Wharton Computing 4/1/11
Securingyourconfidential data Store it on a central server Back it up Encrypt it 98 Wharton Computing 4/1/11
Securingyourconfidential data Never let anyone log in as you. Don’t allow workstudies to use a computer that contains confidential data 99 Wharton Computing 4/1/11
Hacking happens WHARTON COMPUTING 100
The Process 101 Wharton Computing 4/1/11
Questions? 102 Wharton Computing
http://beacon.wharton.upenn.edu/security/techfast WHARTON COMPUTING 103 4/1/11
Contact us 104 Barry Wilson Chief Security Officer wilsonbf@wharton.upenn.edu Scott McNulty	 Sr. IT Project Leader smcnulty@wharton.upenn.edu security@wharton.upenn.edu http://beacon.wharton.upenn.edu/security Wharton Computing 4/1/11
Tell us what you think! Tech-fast@wharton.upenn.edu 4/1/11 WHARTON COMPUTING 105

More Related Content

Similar to Wharton Computing Techfast: Security

CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
mccormicknadine86
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
sleeperharwell
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 

Similar to Wharton Computing Techfast: Security (9)

5 things it should be doing (but isn't!)
5 things it should be doing (but isn't!)5 things it should be doing (but isn't!)
5 things it should be doing (but isn't!)
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
Blueprint for Security Architecture & Strategy.pdf
Blueprint for Security Architecture & Strategy.pdfBlueprint for Security Architecture & Strategy.pdf
Blueprint for Security Architecture & Strategy.pdf
 
How to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorHow to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare Sector
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
 
E-Notice and E-Filing Tips
E-Notice and E-Filing TipsE-Notice and E-Filing Tips
E-Notice and E-Filing Tips
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Wharton Computing Techfast: Security

Editor's Notes

  1. phishing |ˈfi sh i ng |nounthe activity of defrauding an online account holder of financial information by posing as a legitimate company
  2. VPN: Sentinal.wharton.upenn.edu