SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Security and Privacy Brown Bag




                          source: https://xkcd.com/936/
proudly presents the
Security and Privacy
 brown bag for nonprofits
Road Map
•   Setting the context
•   Your online identity
•   Examples of social engineering
•   Passwords and password management
•   Your email (the skeleton key)
NPower Northwest

• Vision
  o   A thriving community with high performing nonprofits.

• Mission
  o   To strengthen the nonprofit sector by catalyzing innovation and
      driving adoption of technology solutions.
Introductions

Stephen Eggers
HandsOn Tech AmeriCorp VISTA
Serving at NPower NW
stephene@npowernw.org
Setting the context

Privacy
• Managing your online presence
• What can people learn about you?
• What can people do with that knowledge?

Security
• Best practices
• Password management
• The skeleton key: your email account
What do you know about me?
What do you know about me?

From my website & blog:
 • Which cities I have lived in and now live in
 • Specific clubs that I am in
 • The names of some of my friends
 • Some specific events I participated in

From NPower:
 • Where I work & what I do
 • Specific projects that I am involved in
What do you know about me?
What do you know about me?

From all search results:
 • Some YouTube videos from 2004 - 2012
 • My hobbies based on forum posts
 • Can determine some items I own based on forum posts
 • More photos




  Name                            Alias/handle/username
Social engineering (hacking)



"...social engineering was extremely effective in
reaching my goals without resorting to using a
technical exploit. I would look for the weakest link
in the chain that was the least risk and cost to me
[...] if an attacker can walk into the server room
without much chance of detection, that's all she
wrote"

              Kevin Mitnick (arrested in 1995)
Social engineering today




HBGary and HBGary Federal are technology security companies that were hacked in February of 2011


 •   Retrieved username and password database through known vulnerability in CMS
 •   CEO and COO had very short passwords and were recovered
 •   CEO and COO used same credentials for other services (Twitter, email, LinkedIn)
 •   Attackers simply asked the Chief Security Specialist through series of emails for a
     reminder as to their usernames and passwords
 •   HBGary's website was defaced, thousands of emails made public, people were fired
     and the CEO resigned
Social engineering today
 Want my friends' phone numbers?
  • Create a "clone" of me on Facebook with public data
  • Send friend requests to friends of my friends
  • Assume 500 friend requests were made, and 5%
    accepted
  • We now have an account that can friend request
    direct friends, but this time we have
    many mutual friends in common




At the Silver Bullet security conference in São Paulo, UOLDiveo chief security
officer Nelson Novaes Neto demonstrated this in November 2011
Social engineering today
Is your location attached to your tweet, embedded in a photo's
metadata, or did you forget to make your Google Maps
unlisted?
What can you do?

Everyone:
• Review your privacy settings
• Know what you put in the public domain
• Be aware of social engineering strategies

IT best practices:
 • Use unique, strong passwords
 • Keep systems up to date and patched
Passwords


Use a long password with a mix of uppercase and
lowercase letters and numbers
Ideal: Dw0lGgBeAx0h10EiothF8FnU4G7yk37LtPTIuAcuqqGkdKD8cqIN2eIMtXzriX



Consider using a password management tool
Examples: KeePass, LastPass, Firefox, Chrome
Passwords - a new model

• Consider 1 or 2 long (10+ digits) alphanumeric master 
  passwords
• Reset all other passwords and store in password locker
• All other passwords should be thought of as "disposable"
     • Don't bother remembering them
     • Make them super long
     • Reset them frequently, whenever you forget them, or
       don't have access to your locker storage


 Reset a password? To your email it goes!
Your email account
The skeleton key to your online identity. Protect this!

 Google account: google.com/accounts




Outlook / Exchange:
   • Account timeout after multiple failed guesses
   • Phones accessing exchange should require a screen
     password and allow for a remote wipe
Final PSA

• Do not have to fear online banking and shopping
• Use long, unique passwords (and try a password
  management tool)
• Check your privacy settings on commonly used services
• Google yourself and any aliases or "handles"
• Protect your email account
• Understand that you're more likely to be conned than hacked
• For IT admins: keep services patched and up to date
Any questions?


                                                                   Is that it?!




photo by http://www.flickr.com/photos/plasticrevolver/164351244/

Weitere ähnliche Inhalte

Was ist angesagt?

Conquer Your Inbox: Tips & Tricks for Managing Email
Conquer Your Inbox: Tips & Tricks for Managing EmailConquer Your Inbox: Tips & Tricks for Managing Email
Conquer Your Inbox: Tips & Tricks for Managing Email501 Commons
 
Know Thyself: Sharepoint Adoption for Nonprofits
Know Thyself: Sharepoint Adoption for NonprofitsKnow Thyself: Sharepoint Adoption for Nonprofits
Know Thyself: Sharepoint Adoption for Nonprofits501 Commons
 
Prevent Online Communication Overload
Prevent Online Communication OverloadPrevent Online Communication Overload
Prevent Online Communication Overload501 Commons
 
Websites for Nonprofits
Websites for NonprofitsWebsites for Nonprofits
Websites for Nonprofits501 Commons
 
Webinar-Libraries Supporting Social Good: Tools and Tips for Outreach to Nonp...
Webinar-Libraries Supporting Social Good: Tools and Tips for Outreach to Nonp...Webinar-Libraries Supporting Social Good: Tools and Tips for Outreach to Nonp...
Webinar-Libraries Supporting Social Good: Tools and Tips for Outreach to Nonp...TechSoup
 
Webinar - Web Accessibility 101 - 2016-08-09
Webinar - Web Accessibility 101 - 2016-08-09Webinar - Web Accessibility 101 - 2016-08-09
Webinar - Web Accessibility 101 - 2016-08-09TechSoup
 
An Introduction To Share Point 2007
An Introduction To Share Point 2007An Introduction To Share Point 2007
An Introduction To Share Point 2007TechSoup
 
Producing Webinars For Nonprofits & Libraries
Producing Webinars For Nonprofits & LibrariesProducing Webinars For Nonprofits & Libraries
Producing Webinars For Nonprofits & LibrariesTechSoup
 
Expand Your Reach With Flickr And Twitter
Expand Your Reach With Flickr And TwitterExpand Your Reach With Flickr And Twitter
Expand Your Reach With Flickr And TwitterTechSoup
 
Presentation winning grants
Presentation winning grantsPresentation winning grants
Presentation winning grantsTechSoup
 
Webinar - Working with Tech Consultants - 2016-07-14
Webinar - Working with Tech Consultants - 2016-07-14Webinar - Working with Tech Consultants - 2016-07-14
Webinar - Working with Tech Consultants - 2016-07-14TechSoup
 
Chicago counts collaboration tools
Chicago counts collaboration toolsChicago counts collaboration tools
Chicago counts collaboration toolsChicagoCounts
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19TechSoup
 
Webinar - What Can Libraries Count? Getting a Grip on Social Media Numbers - ...
Webinar - What Can Libraries Count? Getting a Grip on Social Media Numbers - ...Webinar - What Can Libraries Count? Getting a Grip on Social Media Numbers - ...
Webinar - What Can Libraries Count? Getting a Grip on Social Media Numbers - ...TechSoup
 
Digital Strategies York Region Workshop: Part One
Digital Strategies York Region Workshop: Part OneDigital Strategies York Region Workshop: Part One
Digital Strategies York Region Workshop: Part OneGBdigitalstrat
 
Webinar: Seven Strategic fundraising tips for your nonprofit-2016-01-20
Webinar: Seven Strategic fundraising tips for your nonprofit-2016-01-20Webinar: Seven Strategic fundraising tips for your nonprofit-2016-01-20
Webinar: Seven Strategic fundraising tips for your nonprofit-2016-01-20TechSoup
 
University of Zurich Ready to share knowledge (students welcome) with IBM Con...
University of Zurich Ready to share knowledge (students welcome) with IBM Con...University of Zurich Ready to share knowledge (students welcome) with IBM Con...
University of Zurich Ready to share knowledge (students welcome) with IBM Con...Roberto Mazzoni
 
Webinar - Pinterest for Libraries: Building Community Through Social Media - ...
Webinar - Pinterest for Libraries: Building Community Through Social Media - ...Webinar - Pinterest for Libraries: Building Community Through Social Media - ...
Webinar - Pinterest for Libraries: Building Community Through Social Media - ...TechSoup
 
Third Sector Start Up Tech Tools Feb15
Third Sector Start Up Tech Tools Feb15Third Sector Start Up Tech Tools Feb15
Third Sector Start Up Tech Tools Feb15PAVS Communities 2.0
 

Was ist angesagt? (20)

Conquer Your Inbox: Tips & Tricks for Managing Email
Conquer Your Inbox: Tips & Tricks for Managing EmailConquer Your Inbox: Tips & Tricks for Managing Email
Conquer Your Inbox: Tips & Tricks for Managing Email
 
Know Thyself: Sharepoint Adoption for Nonprofits
Know Thyself: Sharepoint Adoption for NonprofitsKnow Thyself: Sharepoint Adoption for Nonprofits
Know Thyself: Sharepoint Adoption for Nonprofits
 
Prevent Online Communication Overload
Prevent Online Communication OverloadPrevent Online Communication Overload
Prevent Online Communication Overload
 
Websites for Nonprofits
Websites for NonprofitsWebsites for Nonprofits
Websites for Nonprofits
 
Webinar-Libraries Supporting Social Good: Tools and Tips for Outreach to Nonp...
Webinar-Libraries Supporting Social Good: Tools and Tips for Outreach to Nonp...Webinar-Libraries Supporting Social Good: Tools and Tips for Outreach to Nonp...
Webinar-Libraries Supporting Social Good: Tools and Tips for Outreach to Nonp...
 
Webinar - Web Accessibility 101 - 2016-08-09
Webinar - Web Accessibility 101 - 2016-08-09Webinar - Web Accessibility 101 - 2016-08-09
Webinar - Web Accessibility 101 - 2016-08-09
 
An Introduction To Share Point 2007
An Introduction To Share Point 2007An Introduction To Share Point 2007
An Introduction To Share Point 2007
 
Producing Webinars For Nonprofits & Libraries
Producing Webinars For Nonprofits & LibrariesProducing Webinars For Nonprofits & Libraries
Producing Webinars For Nonprofits & Libraries
 
Expand Your Reach With Flickr And Twitter
Expand Your Reach With Flickr And TwitterExpand Your Reach With Flickr And Twitter
Expand Your Reach With Flickr And Twitter
 
Presentation winning grants
Presentation winning grantsPresentation winning grants
Presentation winning grants
 
Webinar - Working with Tech Consultants - 2016-07-14
Webinar - Working with Tech Consultants - 2016-07-14Webinar - Working with Tech Consultants - 2016-07-14
Webinar - Working with Tech Consultants - 2016-07-14
 
Chicago counts collaboration tools
Chicago counts collaboration toolsChicago counts collaboration tools
Chicago counts collaboration tools
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Webinar - What Can Libraries Count? Getting a Grip on Social Media Numbers - ...
Webinar - What Can Libraries Count? Getting a Grip on Social Media Numbers - ...Webinar - What Can Libraries Count? Getting a Grip on Social Media Numbers - ...
Webinar - What Can Libraries Count? Getting a Grip on Social Media Numbers - ...
 
Digital Strategies York Region Workshop: Part One
Digital Strategies York Region Workshop: Part OneDigital Strategies York Region Workshop: Part One
Digital Strategies York Region Workshop: Part One
 
Webinar: Seven Strategic fundraising tips for your nonprofit-2016-01-20
Webinar: Seven Strategic fundraising tips for your nonprofit-2016-01-20Webinar: Seven Strategic fundraising tips for your nonprofit-2016-01-20
Webinar: Seven Strategic fundraising tips for your nonprofit-2016-01-20
 
University of Zurich Ready to share knowledge (students welcome) with IBM Con...
University of Zurich Ready to share knowledge (students welcome) with IBM Con...University of Zurich Ready to share knowledge (students welcome) with IBM Con...
University of Zurich Ready to share knowledge (students welcome) with IBM Con...
 
Webinar - Pinterest for Libraries: Building Community Through Social Media - ...
Webinar - Pinterest for Libraries: Building Community Through Social Media - ...Webinar - Pinterest for Libraries: Building Community Through Social Media - ...
Webinar - Pinterest for Libraries: Building Community Through Social Media - ...
 
Low and No Cost ICT tools
Low and No Cost ICT tools   Low and No Cost ICT tools
Low and No Cost ICT tools
 
Third Sector Start Up Tech Tools Feb15
Third Sector Start Up Tech Tools Feb15Third Sector Start Up Tech Tools Feb15
Third Sector Start Up Tech Tools Feb15
 

Andere mochten auch

Google for Nonprofits
Google for NonprofitsGoogle for Nonprofits
Google for Nonprofits501 Commons
 
Storytelling using Data
Storytelling using DataStorytelling using Data
Storytelling using Data501 Commons
 
Google Adwords for Nonprofits
Google Adwords for NonprofitsGoogle Adwords for Nonprofits
Google Adwords for Nonprofits501 Commons
 
Free and low cost tools for nonprofits
Free and low cost tools for nonprofitsFree and low cost tools for nonprofits
Free and low cost tools for nonprofits501 Commons
 
Claim your Google Business Listing
Claim your Google Business ListingClaim your Google Business Listing
Claim your Google Business Listing501 Commons
 
501 Talks Tech 2014 - Broadcast Email Providers
501 Talks Tech 2014 - Broadcast Email Providers501 Talks Tech 2014 - Broadcast Email Providers
501 Talks Tech 2014 - Broadcast Email Providers501 Commons
 
Project Scheduling for Successful Outcomes
Project Scheduling for Successful OutcomesProject Scheduling for Successful Outcomes
Project Scheduling for Successful Outcomes501 Commons
 
Agile Project Management for Nonprofits
Agile Project Management for NonprofitsAgile Project Management for Nonprofits
Agile Project Management for Nonprofits501 Commons
 
Tableau for Nonprofits
Tableau for NonprofitsTableau for Nonprofits
Tableau for Nonprofits501 Commons
 
Data managementfornonprofits 2014-06-19
Data managementfornonprofits   2014-06-19Data managementfornonprofits   2014-06-19
Data managementfornonprofits 2014-06-19501 Commons
 
WordPress Plugins
WordPress PluginsWordPress Plugins
WordPress Plugins501 Commons
 
Keep Your Website Relevant - Brown Bag Presentation
Keep Your Website Relevant - Brown Bag PresentationKeep Your Website Relevant - Brown Bag Presentation
Keep Your Website Relevant - Brown Bag Presentation501 Commons
 
Search Engine Optimization
Search Engine OptimizationSearch Engine Optimization
Search Engine Optimization501 Commons
 
Managing Potential Supporters
Managing Potential SupportersManaging Potential Supporters
Managing Potential Supporters501 Commons
 
Google Analytics for Nonprofits
Google Analytics for NonprofitsGoogle Analytics for Nonprofits
Google Analytics for Nonprofits501 Commons
 
Digital storytelling workshop
Digital storytelling workshopDigital storytelling workshop
Digital storytelling workshop501 Commons
 
Nonprofit technology common problems and some possible solutions
Nonprofit technology common problems and some possible solutionsNonprofit technology common problems and some possible solutions
Nonprofit technology common problems and some possible solutions501 Commons
 

Andere mochten auch (17)

Google for Nonprofits
Google for NonprofitsGoogle for Nonprofits
Google for Nonprofits
 
Storytelling using Data
Storytelling using DataStorytelling using Data
Storytelling using Data
 
Google Adwords for Nonprofits
Google Adwords for NonprofitsGoogle Adwords for Nonprofits
Google Adwords for Nonprofits
 
Free and low cost tools for nonprofits
Free and low cost tools for nonprofitsFree and low cost tools for nonprofits
Free and low cost tools for nonprofits
 
Claim your Google Business Listing
Claim your Google Business ListingClaim your Google Business Listing
Claim your Google Business Listing
 
501 Talks Tech 2014 - Broadcast Email Providers
501 Talks Tech 2014 - Broadcast Email Providers501 Talks Tech 2014 - Broadcast Email Providers
501 Talks Tech 2014 - Broadcast Email Providers
 
Project Scheduling for Successful Outcomes
Project Scheduling for Successful OutcomesProject Scheduling for Successful Outcomes
Project Scheduling for Successful Outcomes
 
Agile Project Management for Nonprofits
Agile Project Management for NonprofitsAgile Project Management for Nonprofits
Agile Project Management for Nonprofits
 
Tableau for Nonprofits
Tableau for NonprofitsTableau for Nonprofits
Tableau for Nonprofits
 
Data managementfornonprofits 2014-06-19
Data managementfornonprofits   2014-06-19Data managementfornonprofits   2014-06-19
Data managementfornonprofits 2014-06-19
 
WordPress Plugins
WordPress PluginsWordPress Plugins
WordPress Plugins
 
Keep Your Website Relevant - Brown Bag Presentation
Keep Your Website Relevant - Brown Bag PresentationKeep Your Website Relevant - Brown Bag Presentation
Keep Your Website Relevant - Brown Bag Presentation
 
Search Engine Optimization
Search Engine OptimizationSearch Engine Optimization
Search Engine Optimization
 
Managing Potential Supporters
Managing Potential SupportersManaging Potential Supporters
Managing Potential Supporters
 
Google Analytics for Nonprofits
Google Analytics for NonprofitsGoogle Analytics for Nonprofits
Google Analytics for Nonprofits
 
Digital storytelling workshop
Digital storytelling workshopDigital storytelling workshop
Digital storytelling workshop
 
Nonprofit technology common problems and some possible solutions
Nonprofit technology common problems and some possible solutionsNonprofit technology common problems and some possible solutions
Nonprofit technology common problems and some possible solutions
 

Ähnlich wie Security and Privacy Brown Bag

Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
 
Stem digital module 1 launch
Stem digital module 1 launchStem digital module 1 launch
Stem digital module 1 launchHelen Webster
 
IT 150 Agenda for 11-14-16.pptx
IT 150 Agenda for 11-14-16.pptxIT 150 Agenda for 11-14-16.pptx
IT 150 Agenda for 11-14-16.pptxMattMarino13
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01TechSoup
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcareNicholas Davis
 
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKelly Robertson
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators
 
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong PasswordsDon't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwordsrmortiz66
 
Electronic Authentication, More Than Just a Password
Electronic Authentication, More Than Just a PasswordElectronic Authentication, More Than Just a Password
Electronic Authentication, More Than Just a PasswordNicholas Davis
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 
Personal Digital Security 101
Personal Digital Security 101Personal Digital Security 101
Personal Digital Security 101Derek Banks
 
Finalised refresh digital champion training
Finalised  refresh digital champion trainingFinalised  refresh digital champion training
Finalised refresh digital champion trainingIrene Mackintosh
 
Startupfest 2017: Justin Schier (SCRUFF)
Startupfest 2017: Justin Schier (SCRUFF)Startupfest 2017: Justin Schier (SCRUFF)
Startupfest 2017: Justin Schier (SCRUFF)Startupfest
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfTechSoup
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular usersGeoffrey Vaughan
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Innovation
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Kimberley Dray
 

Ähnlich wie Security and Privacy Brown Bag (20)

Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Stem digital module 1 launch
Stem digital module 1 launchStem digital module 1 launch
Stem digital module 1 launch
 
IT 150 Agenda for 11-14-16.pptx
IT 150 Agenda for 11-14-16.pptxIT 150 Agenda for 11-14-16.pptx
IT 150 Agenda for 11-14-16.pptx
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application Security
 
International Data Privacy Day 2017
International Data Privacy Day 2017International Data Privacy Day 2017
International Data Privacy Day 2017
 
Tablets, Apps and Cybersecurity
Tablets, Apps and CybersecurityTablets, Apps and Cybersecurity
Tablets, Apps and Cybersecurity
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong PasswordsDon't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
 
Electronic Authentication, More Than Just a Password
Electronic Authentication, More Than Just a PasswordElectronic Authentication, More Than Just a Password
Electronic Authentication, More Than Just a Password
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Personal Digital Security 101
Personal Digital Security 101Personal Digital Security 101
Personal Digital Security 101
 
Finalised refresh digital champion training
Finalised  refresh digital champion trainingFinalised  refresh digital champion training
Finalised refresh digital champion training
 
Startupfest 2017: Justin Schier (SCRUFF)
Startupfest 2017: Justin Schier (SCRUFF)Startupfest 2017: Justin Schier (SCRUFF)
Startupfest 2017: Justin Schier (SCRUFF)
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
 

Mehr von 501 Commons

Getting Ready for Giving Tuesday
Getting Ready for Giving TuesdayGetting Ready for Giving Tuesday
Getting Ready for Giving Tuesday501 Commons
 
501 Commons Washington State Nonprofit Technology Needs Survey
501 Commons Washington State Nonprofit Technology Needs Survey501 Commons Washington State Nonprofit Technology Needs Survey
501 Commons Washington State Nonprofit Technology Needs Survey501 Commons
 
Data management plan template
Data management plan templateData management plan template
Data management plan template501 Commons
 
Introduction to social media
Introduction to social mediaIntroduction to social media
Introduction to social media501 Commons
 
Google for nonprofits
Google for nonprofitsGoogle for nonprofits
Google for nonprofits501 Commons
 
Choosing a cloud storage provider
Choosing a cloud storage providerChoosing a cloud storage provider
Choosing a cloud storage provider501 Commons
 
5 ways to further your mission through Social Media
5 ways to further your mission through Social Media5 ways to further your mission through Social Media
5 ways to further your mission through Social Media501 Commons
 
Social Media Intermediate 2.0
Social Media Intermediate 2.0Social Media Intermediate 2.0
Social Media Intermediate 2.0501 Commons
 
Volunteers & Social Media: Boost Communication and Build Community
Volunteers & Social Media: Boost Communication and Build CommunityVolunteers & Social Media: Boost Communication and Build Community
Volunteers & Social Media: Boost Communication and Build Community501 Commons
 
Social Media: From Strategy to Tactics
Social Media: From Strategy to TacticsSocial Media: From Strategy to Tactics
Social Media: From Strategy to Tactics501 Commons
 
Social Media Content Curation
Social Media Content CurationSocial Media Content Curation
Social Media Content Curation501 Commons
 
Social Media Intermediate
Social Media IntermediateSocial Media Intermediate
Social Media Intermediate501 Commons
 

Mehr von 501 Commons (15)

Getting Ready for Giving Tuesday
Getting Ready for Giving TuesdayGetting Ready for Giving Tuesday
Getting Ready for Giving Tuesday
 
501 Commons Washington State Nonprofit Technology Needs Survey
501 Commons Washington State Nonprofit Technology Needs Survey501 Commons Washington State Nonprofit Technology Needs Survey
501 Commons Washington State Nonprofit Technology Needs Survey
 
Data management plan template
Data management plan templateData management plan template
Data management plan template
 
WordPress
WordPress WordPress
WordPress
 
Introduction to social media
Introduction to social mediaIntroduction to social media
Introduction to social media
 
Social media 101
Social media 101Social media 101
Social media 101
 
Google for nonprofits
Google for nonprofitsGoogle for nonprofits
Google for nonprofits
 
Choosing a cloud storage provider
Choosing a cloud storage providerChoosing a cloud storage provider
Choosing a cloud storage provider
 
5 ways to further your mission through Social Media
5 ways to further your mission through Social Media5 ways to further your mission through Social Media
5 ways to further your mission through Social Media
 
Social Media Intermediate 2.0
Social Media Intermediate 2.0Social Media Intermediate 2.0
Social Media Intermediate 2.0
 
Volunteers & Social Media: Boost Communication and Build Community
Volunteers & Social Media: Boost Communication and Build CommunityVolunteers & Social Media: Boost Communication and Build Community
Volunteers & Social Media: Boost Communication and Build Community
 
Facebook 101
Facebook 101Facebook 101
Facebook 101
 
Social Media: From Strategy to Tactics
Social Media: From Strategy to TacticsSocial Media: From Strategy to Tactics
Social Media: From Strategy to Tactics
 
Social Media Content Curation
Social Media Content CurationSocial Media Content Curation
Social Media Content Curation
 
Social Media Intermediate
Social Media IntermediateSocial Media Intermediate
Social Media Intermediate
 

Security and Privacy Brown Bag

  • 1. Security and Privacy Brown Bag source: https://xkcd.com/936/
  • 2. proudly presents the Security and Privacy brown bag for nonprofits
  • 3. Road Map • Setting the context • Your online identity • Examples of social engineering • Passwords and password management • Your email (the skeleton key)
  • 4. NPower Northwest • Vision o A thriving community with high performing nonprofits. • Mission o To strengthen the nonprofit sector by catalyzing innovation and driving adoption of technology solutions.
  • 5. Introductions Stephen Eggers HandsOn Tech AmeriCorp VISTA Serving at NPower NW stephene@npowernw.org
  • 6. Setting the context Privacy • Managing your online presence • What can people learn about you? • What can people do with that knowledge? Security • Best practices • Password management • The skeleton key: your email account
  • 7. What do you know about me?
  • 8. What do you know about me? From my website & blog: • Which cities I have lived in and now live in • Specific clubs that I am in • The names of some of my friends • Some specific events I participated in From NPower: • Where I work & what I do • Specific projects that I am involved in
  • 9. What do you know about me?
  • 10. What do you know about me? From all search results: • Some YouTube videos from 2004 - 2012 • My hobbies based on forum posts • Can determine some items I own based on forum posts • More photos Name                            Alias/handle/username
  • 11. Social engineering (hacking) "...social engineering was extremely effective in reaching my goals without resorting to using a technical exploit. I would look for the weakest link in the chain that was the least risk and cost to me [...] if an attacker can walk into the server room without much chance of detection, that's all she wrote" Kevin Mitnick (arrested in 1995)
  • 12. Social engineering today HBGary and HBGary Federal are technology security companies that were hacked in February of 2011 • Retrieved username and password database through known vulnerability in CMS • CEO and COO had very short passwords and were recovered • CEO and COO used same credentials for other services (Twitter, email, LinkedIn) • Attackers simply asked the Chief Security Specialist through series of emails for a reminder as to their usernames and passwords • HBGary's website was defaced, thousands of emails made public, people were fired and the CEO resigned
  • 13. Social engineering today Want my friends' phone numbers? • Create a "clone" of me on Facebook with public data • Send friend requests to friends of my friends • Assume 500 friend requests were made, and 5% accepted • We now have an account that can friend request direct friends, but this time we have many mutual friends in common At the Silver Bullet security conference in São Paulo, UOLDiveo chief security officer Nelson Novaes Neto demonstrated this in November 2011
  • 14. Social engineering today Is your location attached to your tweet, embedded in a photo's metadata, or did you forget to make your Google Maps unlisted?
  • 15. What can you do? Everyone: • Review your privacy settings • Know what you put in the public domain • Be aware of social engineering strategies IT best practices: • Use unique, strong passwords • Keep systems up to date and patched
  • 16. Passwords Use a long password with a mix of uppercase and lowercase letters and numbers Ideal: Dw0lGgBeAx0h10EiothF8FnU4G7yk37LtPTIuAcuqqGkdKD8cqIN2eIMtXzriX Consider using a password management tool Examples: KeePass, LastPass, Firefox, Chrome
  • 17. Passwords - a new model • Consider 1 or 2 long (10+ digits) alphanumeric master  passwords • Reset all other passwords and store in password locker • All other passwords should be thought of as "disposable" • Don't bother remembering them • Make them super long • Reset them frequently, whenever you forget them, or don't have access to your locker storage Reset a password? To your email it goes!
  • 18. Your email account The skeleton key to your online identity. Protect this! Google account: google.com/accounts Outlook / Exchange: • Account timeout after multiple failed guesses • Phones accessing exchange should require a screen password and allow for a remote wipe
  • 19. Final PSA • Do not have to fear online banking and shopping • Use long, unique passwords (and try a password management tool) • Check your privacy settings on commonly used services • Google yourself and any aliases or "handles" • Protect your email account • Understand that you're more likely to be conned than hacked • For IT admins: keep services patched and up to date
  • 20. Any questions? Is that it?! photo by http://www.flickr.com/photos/plasticrevolver/164351244/

Hinweis der Redaktion

  1. What do I mean by security and what do I mean by privacy? Online Identity - what is out there for anyone to discover?  Social engineering - what can people do with "public domain" knowledge? What the heck to do with all the passwords Friendly PSA about your email account
  2. Give live demo of my search results.
  3. Give live demo of my search results. This is your online alias or username...  Need one for just about all websites such as youtube, any forums, etc.
  4. An important part of security and privacy is knowing what is out there. Knowing what's in the "public domain" meaning anyone who can do some sort of detective work. When you leave today, Google yourself.  Google your alias as well. Remember my livejournal? A friend back in middle school wrote a very scathing entry about his father.
  5. Image from https://twitter.com/#!/kevinmitnick
  6. SQL injection into CMS Retrieved username/password database DB was not salted and no iterative hashing Passwords were 6 lowercase letters and 2 numbers Recovered passwords from CEO and COO users Linux machine had a 6 month old unpatched  privilege escalation vulnerability  that allowed superuser access.  The other username/password was used for twitter, facebook, google apps, etc. Reset everyone's passwords through google apps Started mailing people through their emails
  7. Give demo of user information