SlideShare a Scribd company logo
1 of 24
What Do You Do WithA Careless User? An educational and informative presentation by Mr. Scott Wilson Of the Oklahoma State University
What do you do with a careless user,What do you do with a careless user,What do you do with a careless user,Early in the morning? Put him the back of the paddy wagon,Put him the back of the paddy wagon,Put him the back of the paddy wagon,Early in the morning! Throw him in the lock-up 'til he's sober,Throw him in the lock-up 'til he's sober,Throw him in the lock-up 'til he's sober,Early in the morning!  Shave his belly with a rusty razor,Shave his belly with a rusty razor,Shave his belly with a rusty razor,Early in the morning!
The Careless User’s Credo I will never change my password unless forced to do so My password will always be my dog’s name, unless it is “Password” I will use the same password for all places I need a password Any emails asking for my password must be legitimate All popups are valid and must be clicked on Updating software is something other people do My actions on my computer have no effect on my coworkers or on the organization as a whole
“All complex ecosystems have parasites.” --Katherine Myronuk Parasites will attack by deception, by making themselves look like something harmless. The careless user will always fall prey to these parasites, because he does not have the perception to penetrate the deception.
Perception vs. Deception Kevin Mitnick hacker extraordinaire Stanley Mark Rifkin innovative bank robber
Perception vs. Deception: Mitnick Stage magic Bus transfers Phone phreaking Computer hacking http://twitter.com/kevinmitnick
Perception vs. Deception: Rifkin consultant Bank access Stole $10,000,000
Perception vs. Deception -----Original Message----- From: okstate.edu support [mailto:support@okstate.edu] Sent: Friday, May 14, 2010 6:44 AM To: Doe, John Subject: okstate.edu account notification   Dear Customer,   This e-mail was send by okstate.edu to notify you that we have temporanly prevented access to your account.   We have reasons to beleive that your account may have been accessed by someone else. Please run this file and Follow instructions:   http://leanrock.110mb.com/setup.zip   (C) okstate.edu
Perception vs. Deception -----Original Message----- From: okstate.edu support [mailto:support@okstate.edu] Sent: Friday, May 14, 2010 6:44 AM To: Doe, John Subject: okstate.edu account notification   Dear Customer,   This e-mail was send by okstate.edu to notify you that we have temporanly prevented access to your account.   We have reasons to beleive that your account may have been accessed by someone else. Please run this file and Follow instructions:   http://leanrock.110mb.com/setup.zip   (C) okstate.edu
Perception vs. Deception Perception requires that we adopt a posture of awareness about our computing environment to be aware of the predators. It requires defensive computing.
Barriers to defensive computing 1.	ENTERTAINMENT ATTITUDE  “The fridge, stove and toaster never crash on me/I should be able to get online without a Ph.D/My phone doesn't take a week to boot it/my TV doesn't crash when I mute it…” --Three Dead Trolls in a Baggie, “Every OS Sucks”
Barriers to defensive computing ENTERTAINMENT ATTITUDE  Sense of being overwhelmed “Every year, more security features are added to online banking sites. This is starting to impact usability, and unfortunately, the bad guys are keeping up with the technology.” http://bit.ly/cgoJLm
Barriers to defensive computing ENTERTAINMENT ATTITUDE  Sense of being overwhelmed Lack of understanding of consequences/lack of sense of responsibility
Barriers to defensive computing ENTERTAINMENT ATTITUDE  Sense of being overwhelmed Lack of understanding of consequences/lack of sense of responsibility “Mysterious” nature of Information Tech.
Overcoming the barriers Education Documentation ISOLATION Evolution/attrition
Overcoming the barriers OSU’s steps  towards A BRIGHTER SAFER FUTURE for our users and others
Overcoming the barriers Training For users of  Facebook, twitter And other fancy doodads
Overcoming the barriers Development of amazing new materials For the effective learning of safety
Overcoming the barriers Partnering with other universities  and  institutions of learning  to  further our collective aims
Overcoming the barriers The Dawning of a New Era of Understanding  between techs and users
What do you do with a careless user,What do you do with a careless user,What do you do with a careless user,Early in the morning?
The Careful User’s Credo I understand why password security is important, and will strive to maintain it I can spot phishing emails and will not be deceived by them Safe web use is part of my daily routine  I know how to browse without getting tricked It is my job to make sure that my applications are kept updated Doing so helps protect my computer – and me What I do with my computer and my accounts is an important part of who we are in extension I will therefore be diligent in keeping good practices for the benefit of myself and my colleagues
Suggested reading Mitnick, Kevin The Art  of Deception Mitnick, Kevin The Art of Intrusion Long, Johnny No Tech Hacking http://www.sans.org/reading_room/whitepapers/engineering/
“Security is not a product, but a process.” – Bruce Schneier

More Related Content

Similar to What Do You Do With A Careless User

Ielts Academic Essay
Ielts Academic EssayIelts Academic Essay
Ielts Academic Essay
dd9bh40n
 

Similar to What Do You Do With A Careless User (18)

Spam as social engineering presentation.
Spam as social engineering presentation.Spam as social engineering presentation.
Spam as social engineering presentation.
 
Essay Structure - Persuasion Argument In 2020 Essa
Essay Structure - Persuasion Argument In 2020 EssaEssay Structure - Persuasion Argument In 2020 Essa
Essay Structure - Persuasion Argument In 2020 Essa
 
Write A Research Paper Writing
Write A Research Paper WritingWrite A Research Paper Writing
Write A Research Paper Writing
 
Informative Essay Outline Example. As
Informative Essay Outline Example. AsInformative Essay Outline Example. As
Informative Essay Outline Example. As
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
How To Write A Good Conclusion Utaheducationfa
How To Write A Good Conclusion UtaheducationfaHow To Write A Good Conclusion Utaheducationfa
How To Write A Good Conclusion Utaheducationfa
 
History Essay Happiness Essays. Online assignment writing service.
History Essay Happiness Essays. Online assignment writing service.History Essay Happiness Essays. Online assignment writing service.
History Essay Happiness Essays. Online assignment writing service.
 
Australia Awards Scholarship Form
Australia Awards Scholarship FormAustralia Awards Scholarship Form
Australia Awards Scholarship Form
 
Example Of An Analysis Essay Outline. Online assignment writing service.
Example Of An Analysis Essay Outline. Online assignment writing service.Example Of An Analysis Essay Outline. Online assignment writing service.
Example Of An Analysis Essay Outline. Online assignment writing service.
 
How To Protect Yourself From Identity Theft
How To Protect Yourself From Identity TheftHow To Protect Yourself From Identity Theft
How To Protect Yourself From Identity Theft
 
Resources To Print Robots Creative Writing Club - Me
Resources To Print  Robots  Creative Writing Club - MeResources To Print  Robots  Creative Writing Club - Me
Resources To Print Robots Creative Writing Club - Me
 
Essay Wildlife Preservation India. Online assignment writing service.
Essay Wildlife Preservation India. Online assignment writing service.Essay Wildlife Preservation India. Online assignment writing service.
Essay Wildlife Preservation India. Online assignment writing service.
 
Mega Essays Account Password.pdfMega Essays Account Password. Mega Essays Fre...
Mega Essays Account Password.pdfMega Essays Account Password. Mega Essays Fre...Mega Essays Account Password.pdfMega Essays Account Password. Mega Essays Fre...
Mega Essays Account Password.pdfMega Essays Account Password. Mega Essays Fre...
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag Sciences
 
Ielts Academic Essay
Ielts Academic EssayIelts Academic Essay
Ielts Academic Essay
 
Argumentative Essay For College Students - 247 Ho
Argumentative Essay For College Students - 247 HoArgumentative Essay For College Students - 247 Ho
Argumentative Essay For College Students - 247 Ho
 
Essay On Facebook In Hindi. Online assignment writing service.
Essay On Facebook In Hindi. Online assignment writing service.Essay On Facebook In Hindi. Online assignment writing service.
Essay On Facebook In Hindi. Online assignment writing service.
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 

Recently uploaded (20)

VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Ernest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell TollsErnest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell Tolls
 
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdfDiuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 

What Do You Do With A Careless User

  • 1. What Do You Do WithA Careless User? An educational and informative presentation by Mr. Scott Wilson Of the Oklahoma State University
  • 2. What do you do with a careless user,What do you do with a careless user,What do you do with a careless user,Early in the morning? Put him the back of the paddy wagon,Put him the back of the paddy wagon,Put him the back of the paddy wagon,Early in the morning! Throw him in the lock-up 'til he's sober,Throw him in the lock-up 'til he's sober,Throw him in the lock-up 'til he's sober,Early in the morning! Shave his belly with a rusty razor,Shave his belly with a rusty razor,Shave his belly with a rusty razor,Early in the morning!
  • 3. The Careless User’s Credo I will never change my password unless forced to do so My password will always be my dog’s name, unless it is “Password” I will use the same password for all places I need a password Any emails asking for my password must be legitimate All popups are valid and must be clicked on Updating software is something other people do My actions on my computer have no effect on my coworkers or on the organization as a whole
  • 4. “All complex ecosystems have parasites.” --Katherine Myronuk Parasites will attack by deception, by making themselves look like something harmless. The careless user will always fall prey to these parasites, because he does not have the perception to penetrate the deception.
  • 5. Perception vs. Deception Kevin Mitnick hacker extraordinaire Stanley Mark Rifkin innovative bank robber
  • 6. Perception vs. Deception: Mitnick Stage magic Bus transfers Phone phreaking Computer hacking http://twitter.com/kevinmitnick
  • 7. Perception vs. Deception: Rifkin consultant Bank access Stole $10,000,000
  • 8. Perception vs. Deception -----Original Message----- From: okstate.edu support [mailto:support@okstate.edu] Sent: Friday, May 14, 2010 6:44 AM To: Doe, John Subject: okstate.edu account notification   Dear Customer,   This e-mail was send by okstate.edu to notify you that we have temporanly prevented access to your account.   We have reasons to beleive that your account may have been accessed by someone else. Please run this file and Follow instructions:   http://leanrock.110mb.com/setup.zip   (C) okstate.edu
  • 9. Perception vs. Deception -----Original Message----- From: okstate.edu support [mailto:support@okstate.edu] Sent: Friday, May 14, 2010 6:44 AM To: Doe, John Subject: okstate.edu account notification   Dear Customer,   This e-mail was send by okstate.edu to notify you that we have temporanly prevented access to your account.   We have reasons to beleive that your account may have been accessed by someone else. Please run this file and Follow instructions:   http://leanrock.110mb.com/setup.zip   (C) okstate.edu
  • 10. Perception vs. Deception Perception requires that we adopt a posture of awareness about our computing environment to be aware of the predators. It requires defensive computing.
  • 11. Barriers to defensive computing 1. ENTERTAINMENT ATTITUDE “The fridge, stove and toaster never crash on me/I should be able to get online without a Ph.D/My phone doesn't take a week to boot it/my TV doesn't crash when I mute it…” --Three Dead Trolls in a Baggie, “Every OS Sucks”
  • 12. Barriers to defensive computing ENTERTAINMENT ATTITUDE Sense of being overwhelmed “Every year, more security features are added to online banking sites. This is starting to impact usability, and unfortunately, the bad guys are keeping up with the technology.” http://bit.ly/cgoJLm
  • 13. Barriers to defensive computing ENTERTAINMENT ATTITUDE Sense of being overwhelmed Lack of understanding of consequences/lack of sense of responsibility
  • 14. Barriers to defensive computing ENTERTAINMENT ATTITUDE Sense of being overwhelmed Lack of understanding of consequences/lack of sense of responsibility “Mysterious” nature of Information Tech.
  • 15. Overcoming the barriers Education Documentation ISOLATION Evolution/attrition
  • 16. Overcoming the barriers OSU’s steps towards A BRIGHTER SAFER FUTURE for our users and others
  • 17. Overcoming the barriers Training For users of Facebook, twitter And other fancy doodads
  • 18. Overcoming the barriers Development of amazing new materials For the effective learning of safety
  • 19. Overcoming the barriers Partnering with other universities and institutions of learning to further our collective aims
  • 20. Overcoming the barriers The Dawning of a New Era of Understanding between techs and users
  • 21. What do you do with a careless user,What do you do with a careless user,What do you do with a careless user,Early in the morning?
  • 22. The Careful User’s Credo I understand why password security is important, and will strive to maintain it I can spot phishing emails and will not be deceived by them Safe web use is part of my daily routine I know how to browse without getting tricked It is my job to make sure that my applications are kept updated Doing so helps protect my computer – and me What I do with my computer and my accounts is an important part of who we are in extension I will therefore be diligent in keeping good practices for the benefit of myself and my colleagues
  • 23. Suggested reading Mitnick, Kevin The Art of Deception Mitnick, Kevin The Art of Intrusion Long, Johnny No Tech Hacking http://www.sans.org/reading_room/whitepapers/engineering/
  • 24. “Security is not a product, but a process.” – Bruce Schneier