SlideShare a Scribd company logo
1 of 56
Computer Security
                  Awareness, Social
                   Engineering and
                 Physical Security in a
                  Scientific Research
                     Environment
                            -
                    Nicholas Davis
                  MBA, CISA, CISSP
                     DoIT Security
                     Nov 20, 2012
Free Powerpoint Templates
                              Page 1
Introduction
•   Background
•   Thank you for the invitation
•   Today’s Topic, Security Awareness,
    Computer Security, Physical Security
•   Importance to scientific research field
•   Identification vs. Authentication
•   Social Engineering
•   Pretexting
•   Phishing
•   QR Code Danger
•   Social Networks
•   Passwords
•   Malware
•   Baiting
•   Identity Theft: How, Avoiding,
    Responding
•   Physical Security
•   Sharing of information with the public
      Free Powerpoint Templates
                                    Page 2
Technology Is Not
           The Answer
Strong computer security has two
components:

The Technology: passwords,
encryption, endpoint protection
such as anti-virus.

The People: You, your customers,
your business partners

Today, we will talk about both
components


   Free Powerpoint Templates
                               Page 3
Social Engineering

The art of manipulating
people into performing actions
or divulging confidential
information

It is typically trickery or
deception for the purpose of
information gathering, fraud,
or computer system access



   Free Powerpoint Templates
                               Page 4
Most Popular Type of
        Social Engineering
Pretexting: An individual lies to obtain
privileged data. A pretext is a false motive.

Pretexting is a fancy term for impersonation

A big problem for computer Help Desks, in all
organizations

Example:

Some steps the UW-Madison Help Desk takes
to avoid pretexting




      Free Powerpoint Templates
                                     Page 5
Identification Without
    Authentication
Rapidly establishing a
trust relationship, then
trying to exploit it

“I am Bucky Badger,
therefore you should let
me in to see Barry
Alvarez”
Ask yourself: Could this
person have a motivation
to be less than truthful?

Ask for ID. Does it look
legit?



 Free Powerpoint Templates
                             Page 6
Identification by
              Impression
Fake Badges
Uniforms
Logos
Confidence
Dress
Body Language
                What could be
Tone of Voice   learned by a
Knowledge of    stranger, who
Specific        observes your work
Information     environment?
Examples from the
audience!
     Free Powerpoint Templates
                                     Page 7
Getting Access By Any
           Means

Steal
Read
Modify
Deploy


              Manipulate you to:
              Reveal Information
              Perform Actions
Free Powerpoint Templates
                            Page 8
How They Do It
User Interfaces
Phone
Email
Letters and Documents
Instant Messaging and
Phone Texting
Media, CDs, USB drives,
etc.




     Free Powerpoint Templates
                                 Page 9
Let’s Think of Electronic
  Pretexting Example




   Dear Windows User,
   It has come to our attention that your Microsoft windows
   Installation records are out of date. Every Windows
   installation has to be tied to an email account for daily
   update.
   This requires you to verify the Email Account. Failure to
   verify your records will result in account suspension.
   Click on the Verify button below and enter your login
   information on the following page to Confirm your records.


   Thank you,

   Microsoft Windows Team.


Free Powerpoint Templates
                                                                Page 10
Phishing

• Deception, but not just in
  person
• Email
• Websites
• Facebook status updates
• Tweets
• Phishing, in the context of
  the scientific research
  working environment is
  extremely dangerous


   Free Powerpoint Templates
                               Page 11
Phishing History

• Phreaking, term for making
  phone calls for free back in
  1970s
• Fishing is the use bait to
  lure a target
• Phreaking + Fishing =
  Phishing




   Free Powerpoint Templates
                               Page 12
Phishing 1995

• Target AOL users
• Account passwords = free
  online time
• Threat level: low
• Techniques: Similar names,
  such as www.ao1.com for
  www.aol.com




  Free Powerpoint Templates
                              Page 13
Phishling 2001

Target: Ebay and major banks
Credit card numbers and
account numbers = money
Threat level: medium
Techniques: Same in 1995, as
well as keylogger




   Free Powerpoint Templates
                               Page 14
Keyloggers
• Tracking (or logging) the keys
  struck on a keyboard, typically in
  a covert manner so that the
  person using the keyboard is
  unaware that their actions are
  being monitored
• Software or hardware based




    Free Powerpoint Templates
                                Page 15
Phishing 2007

Targets are Paypal, banks,
ebay
Purpose to steal bank
accounts
Threat level is high
Techniques: browser
vulnerabilities, link
obfuscation




   Free Powerpoint Templates
                               Page 16
Don’t Touch That QR Code

• Just as bad as clicking on an
  unknown link
• Looks fancy and official, but
  is easy to create




  Free Powerpoint Templates
                              Page 17
Phishing in 2013

• Trends for the coming year

• Identity Information
• Personal Harm
• Blackmail




   Free Powerpoint Templates
                               Page 18
Looking In the Mirror
• Which types of sensitive
  information do you have access
  to?
• What about others who share the
  computer network with you?
• Think about the implications
  associated that data being stolen
  and exploited!




   Free Powerpoint Templates
                               Page 19
What Phishing Looks Like
• As scam artists become more
  sophisticated, so do their phishing
  e-mail messages and pop-up
  windows.
• They often include official-looking
  logos from real organizations and
  other identifying information
  taken directly from legitimate
  Web sites.




     Free Powerpoint Templates
                                 Page 20
Techniques For Phishing

•   Employ visual elements from target site
•   DNS Tricks:
•   www.ebay.com.kr
•   www.ebay.com@192.168.0.5
•   www.gooogle.com
•   Unicode attacks
•   JavaScript Attacks
•   Spoofed SSL lock Certificates
•   Phishers can acquire certificates for
    domains they own
•   Certificate authorities make mistakes




      Free Powerpoint Templates
                                   Page 21
Social Engineering
       Techniques
Often employed in Phishing, lower
your guard

1.Threats – Do this or else!
2.Authority – I have the authority
to ask this
3.Promises – If you do this, you
will get money
4.Praise – You deserve this




   Free Powerpoint Templates
                               Page 22
How to Know if You Are
    Being Socially Engineered
You know that what
you are doing is
wrong

The situation feels
weird or unusual to
you
                              You are being
You are in a                  rushed to do
situation in which            something
you can’t contact a
person of authority,          Lots of name
to make a decision            dropping is going
                              on

                              You feel like you
                              might offend
                              someone if you
  Free Powerpoint Templates   don’t follow
                              through Page 23
Phishing
              Techniques
•   Socially aware attacks
•   Mine social relationships from public
    data
•   Phishing email appears to arrive from
    someone known to the victim
•   Use spoofed identity of trusted
    organization to gain trust
•   Urge victims to update or validate their
    account
•   Threaten to terminate the account if the
    victims not reply
•   Use gift or bonus as a bait
•   Security promises




      Free Powerpoint Templates
                                   Page 24
Let’s Talk About
                  Facebook
•   So important, it gets its own slide!
•   Essentially unauthenticated – discussion
•   Three friends and you’re out! - discussion
•   Privacy settings mean nothing – discussion
•   Treasure Trove of identity information
•   Games as information harvesters




        Free Powerpoint Templates
                                     Page 25
Socially Aware




Free Powerpoint Templates
                            Page 26
Context Aware

“Your bid on eBay has won!”
“The books on your Amazon wish
list are on sale!”




   Free Powerpoint Templates
                               Page 27
Seems Suspicious




Free Powerpoint Templates
                            Page 28
419 Nigerian Email Scam




 Free Powerpoint Templates
                             Page 29
Too Good to be True,
Even When It Is Signed




Free Powerpoint Templates
                            Page 30
Detecting
        Fraudulent Email
Information requested is inappropriate for
the channel of communication:

"Verify your account."nobody should ask
you to send passwords, login names,
Social Security numbers, or other personal
information through e-mail.

Urgency and potential penalty or loss are
implied:

"If you don't respond within 48 hours,
your account will be closed.”




    Free Powerpoint Templates
                                 Page 31
Detecting Fraudulent
            Email
"Dear Valued Customer."Phishing e-mail
messages are usually sent out in bulk and
often do not contain your first or last
name.




    Free Powerpoint Templates
                                Page 32
Dectecting Fraudulent
            Email
"Click the link below to gain access to
your account.“

This is an example or URL Masking (hiding
the web address)

URL alteration


www.micosoft.com
www.mircosoft.com
www.verify-microsoft.com


    Free Powerpoint Templates
                                Page 33
How to Defend Against
     Phishing Attacks
•Never respond to an email asking
for personal information
• Always check the site to see if it is
secure (SSL lock)
• Look for misspellings or errors in
grammar
• Never click on the link on the
email. Enter the web address
manually
• Keep your browser updated
• Keep antivirus definitions updated
• Use a firewall
• When in doubt, ask your Network
Administrator for their opinion
    Free Powerpoint Templates
                                Page 34
A Note on Spear Phishing

• Designed especially for you
• Includes your name
• May reference an
  environment or issue you
  are aware of and familiar
  with
• Asks for special treatment,
  with justification for the
  request



   Free Powerpoint Templates
                               Page 35
Other Techniques
An ocean of Phishing techniques

•Clone Phishing - Discussion
•Whaling - Discussion
•Filter Evasion - Discussion
•Phone Phishing - Discussion
•Tabnabbing - Discussion
•Evil Twins - Discussion




    Free Powerpoint Templates
                                Page 36
Passwords

Your password is your electronic
key to valuable resources, treat it
like your house key!

Sharing – Discussion
Theft – Discussion
Password Rotation - Discussion




   Free Powerpoint Templates
                               Page 37
Creating a Strong
           Password
Following two rules are bare minimal that
you should follow while creating a
password.

Rule 1 – Password Length: Stick with
passwords that are at least 8 characters in
length. The more character in the
passwords is better, as the time taken to
crack the password by an attacker will be
longer. 10 characters or longer are better.

Rule 2 – Password Complexity: At least 4
characters in your passwords should be
each one of the following:



    Free Powerpoint Templates
                                  Page 38
Creating a Strong
            Password
1.Lower case alphabets
2.Upper case alphabets
3.Numbers
4.Special Characters

Use the “8 4 Rule”
8 = 8 characters minimum length
4 = 1 lower case + 1 upper case + 1
number + 1 special character.

Do not use a password
strength checking website!
Any ideas why this
is a bad idea?



    Free Powerpoint Templates
                                Page 39
Adware, Malware,
          Spyware
Adware – unwanted ad software which is
noticed
Malware – unwanted software which is
noticed and potentially causes harm
Spyware – unwanted software which goes
un-noticed and harvests your personal
information

Use endpoint protection!




    Free Powerpoint Templates
                                Page 40
CIO.WISC.EDU/SECURITY




Free Powerpoint Templates
                            Page 41
Adware, Malware,
         Spyware
How these get on your computer:
Email
Web pages
Downloaded software
CD, USB flash drive
Sometimes, out of the box




   Free Powerpoint Templates
                               Page 42
Trojan Malware




Free Powerpoint Templates
                            Page 43
Baiting

Hey, look! A free USB drive!
I wonder what is on this confidential CD
which I found in the bathroom?

These are vectors for malware!
Play on your curiousity or desire to get
something for nothing

Don’t be a piggy!




     Free Powerpoint Templates
                                 Page 44
Social Engineering
            Methods

Using the Out of Office
responder in a responsible
manner




   Free Powerpoint Templates
                               Page 45
Synthetic Identity Theft

A variation of identity theft which has
recently become more common is
synthetic identity theft, in which identities
are completely or partially fabricated. The
most common technique involves
combining a real social security number
with a name and birthdate other than the
ones associated with the number.




    Free Powerpoint Templates
                                    Page 46
How Does Identity
          Theft Happen
Let’s talk through the attached paper
handout, entitled:

“Techniques for obtaining and exploiting
personal information for identity theft”

Look through the list and think to yourself
“Could this apply to me?” If so, think
about taking steps to avoid it




    Free Powerpoint Templates
                                  Page 47
Tips To Avoid
                Identity Theft
1.    Only Make Purchases On Trusted Sites
2.    Order Your Credit Report
3.    Know How To Spot Phishing
4.    Secure Your Network
5.    Can the Spam
6.    Don't Store Sensitive Information On Non-
      Secure Web Sites
7.    Set Banking Alerts
8.    Don't Reuse Passwords
9.    Use Optional Security Questions
10.   Don't Put Private Information On Public
      Computers




       Free Powerpoint Templates
                                      Page 48
If Your Identity Is Stolen
           (WORK)
1. Contact your supervisor immediately
2. Report the incident to the Office of
   Campus Information Security (OCIS)
   http://
   www.cio.wisc.edu/security-report.aspx
3. Contact the DoIT Help Desk
4. Contact UW Police, depending on
   nature of incident. Consider your
   personal safety! “Better safe, than
   sorry”




    Free Powerpoint Templates
                                Page 49
Physical Security

•   The UW is a fairly open and shared
    physical environment
•   Seeing strangers is normal, we won’t
    know if they are here as friend or foe
•   Lock your office
•   Lock your desk
•   Lock your computer
•   Criminals are opportunistic
•   Even if you are just gone for a moment
•   Report suspicious activity to your
    administration and UW Police
•   If you have an IT related concern,
    contact    the    Office    of   Campus
    Information Security



      Free Powerpoint Templates
                                  Page 50
Forget About Being Polite


Don’t hold the
security door
for anyone
and beware of
tailgaters

Be truthful,
explain
why….People
will
understand

  Free Powerpoint Templates
                              Page 51
Sharing Information With
           The Public
•   The University of Wisconsin is an open
    environment
•   However, on occasion, this open nature
    can be exploited by people with
    nefarious intent
•   Don’t volunteer sensitive information
•   Only disclose what is necessary
•   Follow records retention policies
•   When in doubt, ask for proof, honest
    people    will   understand,   dishonest
    people will become frustrated




      Free Powerpoint Templates
                                   Page 52
Publishing of
          Information
Consider carefully
before publishing
and disseminating
information, such
as phone
directories and
business cards

Sadly, obituaries
are a great place
to learn the
answer to the
most annoying
password
recovery
question: “What is
your mother’s
   Free Powerpoint Templates
maiden name?”                  Page 53
We Have So Much More
          To Talk About
•   Security Awareness matters not just to
    you, but to the University of Wisconsin
    as a whole
•   Security Awareness is an important
    facet of everyone’s work
•   My actions impact you
•   Your actions impact me
•   Security Awareness is an ever changing
    and evolving area, which requires
    constant attention
•   DoIT is here as a resource for you
•   Let us know how we can help
•   Let me know if I can help
•   Don’t be afraid to ask questions
•   Better safe than sorry

      Free Powerpoint Templates
                                   Page 54
A Picture Is Worth
       1000 Words




Free Powerpoint Templates
                            Page 55
Questions and
        Discussion
Nicholas Davis
ndavis1@wisc.edu
608-262-3837
facebook.com/nicholas.a.davis




    Free Powerpoint Templates
                                Page 56

More Related Content

What's hot

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyTom Eston
 
The Original Complete Unit
The Original Complete UnitThe Original Complete Unit
The Original Complete Unitguest09fcd1
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadTom Eston
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018PKF Francis Clark
 
What every product manager needs to know about security
What every product manager needs to know about securityWhat every product manager needs to know about security
What every product manager needs to know about securityAIPMM Administration
 
Amie- Unit 1 P6 and M2
Amie- Unit 1 P6 and M2Amie- Unit 1 P6 and M2
Amie- Unit 1 P6 and M2AmieBodkin
 
Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...gallowayandcollens
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012curlistl
 
LinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering ThreatLinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering ThreatLancope, Inc.
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 

What's hot (16)

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
The Original Complete Unit
The Original Complete UnitThe Original Complete Unit
The Original Complete Unit
 
L48 slides
L48 slidesL48 slides
L48 slides
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile Dead
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
 
What every product manager needs to know about security
What every product manager needs to know about securityWhat every product manager needs to know about security
What every product manager needs to know about security
 
Amie- Unit 1 P6 and M2
Amie- Unit 1 P6 and M2Amie- Unit 1 P6 and M2
Amie- Unit 1 P6 and M2
 
Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...Social Media and Estate Planning presented to Wayne State University Law Scho...
Social Media and Estate Planning presented to Wayne State University Law Scho...
 
Tablets, Apps and Cybersecurity
Tablets, Apps and CybersecurityTablets, Apps and Cybersecurity
Tablets, Apps and Cybersecurity
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
 
LinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering ThreatLinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering Threat
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 

Similar to IT Security in a Scientific Research Environment

It Security For Healthcare
It Security For HealthcareIt Security For Healthcare
It Security For HealthcareNicholas Davis
 
UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing AwarenessNicholas Davis
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Scott Wright
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationShauna_Cox
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and BadTzar Umang
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal lifeNathan Lesser
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
Enjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber CriminalsEnjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber CriminalsStephen Cobb
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 

Similar to IT Security in a Scientific Research Environment (20)

It Security For Healthcare
It Security For HealthcareIt Security For Healthcare
It Security For Healthcare
 
UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing Awareness
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal life
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Enjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber CriminalsEnjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber Criminals
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social MediaShockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 

More from Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentNicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsNicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development MethodologiesNicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewNicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectNicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing EducationNicholas Davis
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An OverviewNicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...Nicholas Davis
 

More from Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 

IT Security in a Scientific Research Environment

  • 1. Computer Security Awareness, Social Engineering and Physical Security in a Scientific Research Environment - Nicholas Davis MBA, CISA, CISSP DoIT Security Nov 20, 2012 Free Powerpoint Templates Page 1
  • 2. Introduction • Background • Thank you for the invitation • Today’s Topic, Security Awareness, Computer Security, Physical Security • Importance to scientific research field • Identification vs. Authentication • Social Engineering • Pretexting • Phishing • QR Code Danger • Social Networks • Passwords • Malware • Baiting • Identity Theft: How, Avoiding, Responding • Physical Security • Sharing of information with the public Free Powerpoint Templates Page 2
  • 3. Technology Is Not The Answer Strong computer security has two components: The Technology: passwords, encryption, endpoint protection such as anti-virus. The People: You, your customers, your business partners Today, we will talk about both components Free Powerpoint Templates Page 3
  • 4. Social Engineering The art of manipulating people into performing actions or divulging confidential information It is typically trickery or deception for the purpose of information gathering, fraud, or computer system access Free Powerpoint Templates Page 4
  • 5. Most Popular Type of Social Engineering Pretexting: An individual lies to obtain privileged data. A pretext is a false motive. Pretexting is a fancy term for impersonation A big problem for computer Help Desks, in all organizations Example: Some steps the UW-Madison Help Desk takes to avoid pretexting Free Powerpoint Templates Page 5
  • 6. Identification Without Authentication Rapidly establishing a trust relationship, then trying to exploit it “I am Bucky Badger, therefore you should let me in to see Barry Alvarez” Ask yourself: Could this person have a motivation to be less than truthful? Ask for ID. Does it look legit? Free Powerpoint Templates Page 6
  • 7. Identification by Impression Fake Badges Uniforms Logos Confidence Dress Body Language What could be Tone of Voice learned by a Knowledge of stranger, who Specific observes your work Information environment? Examples from the audience! Free Powerpoint Templates Page 7
  • 8. Getting Access By Any Means Steal Read Modify Deploy Manipulate you to: Reveal Information Perform Actions Free Powerpoint Templates Page 8
  • 9. How They Do It User Interfaces Phone Email Letters and Documents Instant Messaging and Phone Texting Media, CDs, USB drives, etc. Free Powerpoint Templates Page 9
  • 10. Let’s Think of Electronic Pretexting Example Dear Windows User, It has come to our attention that your Microsoft windows Installation records are out of date. Every Windows installation has to be tied to an email account for daily update. This requires you to verify the Email Account. Failure to verify your records will result in account suspension. Click on the Verify button below and enter your login information on the following page to Confirm your records. Thank you, Microsoft Windows Team. Free Powerpoint Templates Page 10
  • 11. Phishing • Deception, but not just in person • Email • Websites • Facebook status updates • Tweets • Phishing, in the context of the scientific research working environment is extremely dangerous Free Powerpoint Templates Page 11
  • 12. Phishing History • Phreaking, term for making phone calls for free back in 1970s • Fishing is the use bait to lure a target • Phreaking + Fishing = Phishing Free Powerpoint Templates Page 12
  • 13. Phishing 1995 • Target AOL users • Account passwords = free online time • Threat level: low • Techniques: Similar names, such as www.ao1.com for www.aol.com Free Powerpoint Templates Page 13
  • 14. Phishling 2001 Target: Ebay and major banks Credit card numbers and account numbers = money Threat level: medium Techniques: Same in 1995, as well as keylogger Free Powerpoint Templates Page 14
  • 15. Keyloggers • Tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored • Software or hardware based Free Powerpoint Templates Page 15
  • 16. Phishing 2007 Targets are Paypal, banks, ebay Purpose to steal bank accounts Threat level is high Techniques: browser vulnerabilities, link obfuscation Free Powerpoint Templates Page 16
  • 17. Don’t Touch That QR Code • Just as bad as clicking on an unknown link • Looks fancy and official, but is easy to create Free Powerpoint Templates Page 17
  • 18. Phishing in 2013 • Trends for the coming year • Identity Information • Personal Harm • Blackmail Free Powerpoint Templates Page 18
  • 19. Looking In the Mirror • Which types of sensitive information do you have access to? • What about others who share the computer network with you? • Think about the implications associated that data being stolen and exploited! Free Powerpoint Templates Page 19
  • 20. What Phishing Looks Like • As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. • They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. Free Powerpoint Templates Page 20
  • 21. Techniques For Phishing • Employ visual elements from target site • DNS Tricks: • www.ebay.com.kr • www.ebay.com@192.168.0.5 • www.gooogle.com • Unicode attacks • JavaScript Attacks • Spoofed SSL lock Certificates • Phishers can acquire certificates for domains they own • Certificate authorities make mistakes Free Powerpoint Templates Page 21
  • 22. Social Engineering Techniques Often employed in Phishing, lower your guard 1.Threats – Do this or else! 2.Authority – I have the authority to ask this 3.Promises – If you do this, you will get money 4.Praise – You deserve this Free Powerpoint Templates Page 22
  • 23. How to Know if You Are Being Socially Engineered You know that what you are doing is wrong The situation feels weird or unusual to you You are being You are in a rushed to do situation in which something you can’t contact a person of authority, Lots of name to make a decision dropping is going on You feel like you might offend someone if you Free Powerpoint Templates don’t follow through Page 23
  • 24. Phishing Techniques • Socially aware attacks • Mine social relationships from public data • Phishing email appears to arrive from someone known to the victim • Use spoofed identity of trusted organization to gain trust • Urge victims to update or validate their account • Threaten to terminate the account if the victims not reply • Use gift or bonus as a bait • Security promises Free Powerpoint Templates Page 24
  • 25. Let’s Talk About Facebook • So important, it gets its own slide! • Essentially unauthenticated – discussion • Three friends and you’re out! - discussion • Privacy settings mean nothing – discussion • Treasure Trove of identity information • Games as information harvesters Free Powerpoint Templates Page 25
  • 26. Socially Aware Free Powerpoint Templates Page 26
  • 27. Context Aware “Your bid on eBay has won!” “The books on your Amazon wish list are on sale!” Free Powerpoint Templates Page 27
  • 28. Seems Suspicious Free Powerpoint Templates Page 28
  • 29. 419 Nigerian Email Scam Free Powerpoint Templates Page 29
  • 30. Too Good to be True, Even When It Is Signed Free Powerpoint Templates Page 30
  • 31. Detecting Fraudulent Email Information requested is inappropriate for the channel of communication: "Verify your account."nobody should ask you to send passwords, login names, Social Security numbers, or other personal information through e-mail. Urgency and potential penalty or loss are implied: "If you don't respond within 48 hours, your account will be closed.” Free Powerpoint Templates Page 31
  • 32. Detecting Fraudulent Email "Dear Valued Customer."Phishing e-mail messages are usually sent out in bulk and often do not contain your first or last name. Free Powerpoint Templates Page 32
  • 33. Dectecting Fraudulent Email "Click the link below to gain access to your account.“ This is an example or URL Masking (hiding the web address) URL alteration www.micosoft.com www.mircosoft.com www.verify-microsoft.com Free Powerpoint Templates Page 33
  • 34. How to Defend Against Phishing Attacks •Never respond to an email asking for personal information • Always check the site to see if it is secure (SSL lock) • Look for misspellings or errors in grammar • Never click on the link on the email. Enter the web address manually • Keep your browser updated • Keep antivirus definitions updated • Use a firewall • When in doubt, ask your Network Administrator for their opinion Free Powerpoint Templates Page 34
  • 35. A Note on Spear Phishing • Designed especially for you • Includes your name • May reference an environment or issue you are aware of and familiar with • Asks for special treatment, with justification for the request Free Powerpoint Templates Page 35
  • 36. Other Techniques An ocean of Phishing techniques •Clone Phishing - Discussion •Whaling - Discussion •Filter Evasion - Discussion •Phone Phishing - Discussion •Tabnabbing - Discussion •Evil Twins - Discussion Free Powerpoint Templates Page 36
  • 37. Passwords Your password is your electronic key to valuable resources, treat it like your house key! Sharing – Discussion Theft – Discussion Password Rotation - Discussion Free Powerpoint Templates Page 37
  • 38. Creating a Strong Password Following two rules are bare minimal that you should follow while creating a password. Rule 1 – Password Length: Stick with passwords that are at least 8 characters in length. The more character in the passwords is better, as the time taken to crack the password by an attacker will be longer. 10 characters or longer are better. Rule 2 – Password Complexity: At least 4 characters in your passwords should be each one of the following: Free Powerpoint Templates Page 38
  • 39. Creating a Strong Password 1.Lower case alphabets 2.Upper case alphabets 3.Numbers 4.Special Characters Use the “8 4 Rule” 8 = 8 characters minimum length 4 = 1 lower case + 1 upper case + 1 number + 1 special character. Do not use a password strength checking website! Any ideas why this is a bad idea? Free Powerpoint Templates Page 39
  • 40. Adware, Malware, Spyware Adware – unwanted ad software which is noticed Malware – unwanted software which is noticed and potentially causes harm Spyware – unwanted software which goes un-noticed and harvests your personal information Use endpoint protection! Free Powerpoint Templates Page 40
  • 42. Adware, Malware, Spyware How these get on your computer: Email Web pages Downloaded software CD, USB flash drive Sometimes, out of the box Free Powerpoint Templates Page 42
  • 43. Trojan Malware Free Powerpoint Templates Page 43
  • 44. Baiting Hey, look! A free USB drive! I wonder what is on this confidential CD which I found in the bathroom? These are vectors for malware! Play on your curiousity or desire to get something for nothing Don’t be a piggy! Free Powerpoint Templates Page 44
  • 45. Social Engineering Methods Using the Out of Office responder in a responsible manner Free Powerpoint Templates Page 45
  • 46. Synthetic Identity Theft A variation of identity theft which has recently become more common is synthetic identity theft, in which identities are completely or partially fabricated. The most common technique involves combining a real social security number with a name and birthdate other than the ones associated with the number. Free Powerpoint Templates Page 46
  • 47. How Does Identity Theft Happen Let’s talk through the attached paper handout, entitled: “Techniques for obtaining and exploiting personal information for identity theft” Look through the list and think to yourself “Could this apply to me?” If so, think about taking steps to avoid it Free Powerpoint Templates Page 47
  • 48. Tips To Avoid Identity Theft 1. Only Make Purchases On Trusted Sites 2. Order Your Credit Report 3. Know How To Spot Phishing 4. Secure Your Network 5. Can the Spam 6. Don't Store Sensitive Information On Non- Secure Web Sites 7. Set Banking Alerts 8. Don't Reuse Passwords 9. Use Optional Security Questions 10. Don't Put Private Information On Public Computers Free Powerpoint Templates Page 48
  • 49. If Your Identity Is Stolen (WORK) 1. Contact your supervisor immediately 2. Report the incident to the Office of Campus Information Security (OCIS) http:// www.cio.wisc.edu/security-report.aspx 3. Contact the DoIT Help Desk 4. Contact UW Police, depending on nature of incident. Consider your personal safety! “Better safe, than sorry” Free Powerpoint Templates Page 49
  • 50. Physical Security • The UW is a fairly open and shared physical environment • Seeing strangers is normal, we won’t know if they are here as friend or foe • Lock your office • Lock your desk • Lock your computer • Criminals are opportunistic • Even if you are just gone for a moment • Report suspicious activity to your administration and UW Police • If you have an IT related concern, contact the Office of Campus Information Security Free Powerpoint Templates Page 50
  • 51. Forget About Being Polite Don’t hold the security door for anyone and beware of tailgaters Be truthful, explain why….People will understand Free Powerpoint Templates Page 51
  • 52. Sharing Information With The Public • The University of Wisconsin is an open environment • However, on occasion, this open nature can be exploited by people with nefarious intent • Don’t volunteer sensitive information • Only disclose what is necessary • Follow records retention policies • When in doubt, ask for proof, honest people will understand, dishonest people will become frustrated Free Powerpoint Templates Page 52
  • 53. Publishing of Information Consider carefully before publishing and disseminating information, such as phone directories and business cards Sadly, obituaries are a great place to learn the answer to the most annoying password recovery question: “What is your mother’s Free Powerpoint Templates maiden name?” Page 53
  • 54. We Have So Much More To Talk About • Security Awareness matters not just to you, but to the University of Wisconsin as a whole • Security Awareness is an important facet of everyone’s work • My actions impact you • Your actions impact me • Security Awareness is an ever changing and evolving area, which requires constant attention • DoIT is here as a resource for you • Let us know how we can help • Let me know if I can help • Don’t be afraid to ask questions • Better safe than sorry Free Powerpoint Templates Page 54
  • 55. A Picture Is Worth 1000 Words Free Powerpoint Templates Page 55
  • 56. Questions and Discussion Nicholas Davis ndavis1@wisc.edu 608-262-3837 facebook.com/nicholas.a.davis Free Powerpoint Templates Page 56