SlideShare uma empresa Scribd logo
1 de 30
BUONE PRATICHE PER LA
SICUREZZA IN RETE
DISCLAIMER
• TUTTO QUELLO DI CUI VI PARLERÒ VA APPLICATO ALL’IMPORTANZA CHE DATE AI VOSTRI DATI,
QUALI E CHE LIVELLO DI SICUREZZA (PARANOIA?) VOLETE MANTENERE
• LA TANA DEL BIANCONIGLIO È TALMENTE PROFONDA CHE TOCCHERÒ DI STRISCIO GLI ARGOMENTI.
• SE INTERESSA QUALCOSA IN PARTICOLARE APPROFONDIAMO NEL Q&A CON UN BUON PIRLO
SCOPO DEL TALK
• BASI SULLA SICUREZZA IN RETE
• COSA SI PUÒ FARE PER PROTEGGERE I PROPRI DATI
• UN’IDEA DI COSA C’È LA FUORI
DI COSA DI PARLARE?
• BUONE PRATICHE
• TWO FACTOR AUTHENTICATION (OTP)
• CRIPTAZIONE
• CLOUD
• SOCIAL ENGINEERING
• SICUREZZA NEI LUOGHI PUBBLICI
• NAVIGAZIONE ANONIMA
SFATIAMO IL PRIMO MITO
NON ESISTE NULLA DI
SICURO
“
”
I THINK INFORMATION SECURITY IS A LOT LIKE
MEDICINE — IT’S BOTH AN ART AND SCIENCE.
MAYBE THIS IS BECAUSE HUMANS HAVE EXPLICITLY
BUILT TECHNOLOGY AND THE INTERNET
PARISA “SECURITY PRINCESS” TABRIZ – HEAD ENGINEER OF GOOGLE’S CHROME SECURITY
TEAM
LA BASI…
• PASSWORD A TUTTI I VOSTRI DISPOSITIVI
• NON LASCIATE MAI IL VOSTRO DISPOSITIVO INCUSTODITO SENZA
BLOCCARE LO SCHERMO
• UN BUON ANTIVIRUS NON FA MAI MALE
UNA BUONA PASSWORD PREVIENE MOLTI ATTACCHI
HTTP://XKCD.COM/936/
LE 10 PEGGIORI PASSWORD DEL 2015
1. 123456
2. PASSWORD
3. 12345678
4. QWERTY
5. 12345
6. 123456789
7. FOOTBALL
8. 1234
9. 1234567
10. BASEBALL
Fonte: https://www.teamsid.com/worst-passwords-2015/
POTETE USARE UN PASSWORD MANAGER…
• LASTPASS
• DASHLANE
• KEEPASS
• 1PASSWORD
• ROBOFORM
…MA RICORDATE CHE….
• SERVE UNA MASTER PASSWORD
• SE LA PERDETE…PERDETE TUTTO
• ANCHE QUESTI SONO SOFTWARE E PERTANTO SOGGETTI A FALLE DI SICUREZZA
• PER CITARNE UNA RECENTE: HTTP://HACKADAY.COM/2016/08/01/LASTPASS-HAPPILY-FORFEITS-
PASSWORDS-TO-SIMPLE-JAVASCRIPT/
TUTTI I SOFTWARE HANNO VULNERABILITÀ
TENETE AGGIORNATI I SISTEMI E PROGRAMMI
MAGARI ASPETTATE UN PAIO DI GIORNI ;)
http://www.cvedetails.com/top-50-products.php?year=2015
ASSICURATEVI DI ESSERE IN HTTPS
• LA S STA PER «SECURE»
• PROTEGGE LA PRIVACY DEGLI UTENTI
• EVITA LO SNIFFING (MAN IN THE MIDDLE)
• CONTROLLATE L’ICONA IN ALTO A SINISTRA
TWO FACTOR AUTHENTICATION
• È UN OTP (ONE TIME PASSWORD)
• ATTIVATELO OVUNQUE POTETE
• MAGARI NON METTETE LA SPUNTA A «NON CHIEDERMELO PIÙ» 
• GOOGLE AUTHENTICATOR
HTTPS://PLAY.GOOGLE.COM/STORE/APPS/DETAILS?ID=COM.GOOGLE.ANDROID.APPS.AUTHENTICATOR2
• AZURE AUTHENTICATOR (IOS, ANDROID E WINDOWS PHONE) A BREVE
SE VI RUBANO IL PORTATILE O UN HD/USB
ESTERNO?
• BIT LOCKER (WINDOWS)
• TRUECRYPT / VERACRYTP (MULTIPIATTAFORMA E CREA ANCHE CONTAINER)
• FILEVAULT (OSX)
• ANDROID HA L’OPZIONE DA ATTIVARE, MA PARE SIA FACILE RAGGIRARLO
• IOS CRIPTA TUTTI I DATI PERSONALI IN AUTOMATICO
COME ACCEDO?
SI INSTALLA UN BOOT LOADER E DA QUI LE SCELTE:
• MODULO TPM
HTTPS://IT.WIKIPEDIA.ORG/WIKI/TRUSTED_PLATFORM_MODULE
• PASSWORD
• CHIAVE USB O SMARTCARD
• PARTIZIONI NASCOSTE (PLAUSIBLE DENIABILITY )
SONO SICURI?
• NON DEL TUTTO
• SOGGETTI AD ATTACCHI «EVIL MAID» (LINUX E OSX)
HTTPS://WWW.SCHNEIER.COM/BLOG/ARCHIVES/2009/10/EVIL_MAID_ATTAC.HTML
• BITLOCKER NO, MA SI VOCIFERA ABBIA DELLE BACKDOOR PERCHÉ COLLABORA CON LA NSA (E
CODICE NON OPEN, PERTANTO NIENTE AUDIT COME A TC)
E IL CLOUD?
• SI FA LO SBAGLIO DI PENSARLI COME HARD DISK ESTERNI
• HANNO TANTI DATI E ATTIRANO L’ATTENZIONE
• SICUREZZA DI CASA VOSTRA VS SICUREZZA GESTITA DA ALTRI
• CASO REMOTO, MA È SUCCESSO CHE ABBIANO CANCELLATO I
DATI
• THE FAPPENING…ANYONE?
• TRESORIT È UN’ALTERNATIVA CRIPTATA
• BOXCRIPTOR CRIPTA PRIMA DI SINCRONIZZARE
SOCIAL ENGINEERING
• MANIPOLAZIONE PSICOLOGICA DELLE PERSONE
• OTTENGO INFORMAZIONI CONFIDENZIALI (PRETEXTING, PHISHING, SPEARPHISHING)
• GLI FACCIO FARE QUALCOSA (BAITING)
“
”
IT IS MUCH EASIER TO TRICK SOMEONE INTO
GIVING A PASSWORD FOR A SYSTEM THAN TO
SPEND THE EFFORT TO CRACK INTO THE SYSTEM.
KEVIN MITNICK
ESEMPIO PIÙ BANALE DI QUANTO IMMAGINATE?
• NEL 2003, IN UN SONDAGGIO SULLA SICUREZZA, IL 90% DEGLI IMPIEGATI AVEVA FORNITO AI
RICERCATORI QUELLA CHE DICHIARARONO ESSERE LA LORO PASSWORD IN RISPOSTA AD UNA
DELLE DOMANDE DEL QUESTIONARIO…IN CAMBIO DI UNA PENNA IN REGALO.
SICUREZZA NEI LUOGHI PUBBLICI
• BLOCCATE LE CONDIVISIONI
• ATTIVATE IL FIREWALL
• HTTPS #CHEVELODICOAFARE
• VPN
• ELIMINATE I WI-FI A CUI NON VI ATTACCATE PIÙ
• NIENTE TRANSAZIONI ECONOMICHE
TOR
• PERMETTE LA NAVIGAZIONE ANONIMA (MEGLIO DI IE, FF, CHROME O SAFARI)
• ABBIAMO ACCESSO ALLA DARK NET (CHE NON È IL DEEP WEB)
• ANDIAMO SU THEHIDDENWIKI (HTTP://ZQKTLWI4FECVO6RI.ONION)
QUINDI È SICURO NAVIGARE CON TOR?
• 3% DEI NODI SONO «ROGUE»
HTTPS://NAKEDSECURITY.SOPHOS.COM/2016/07/26/HONEY-ONIONS-PROBE-THE-TOR-DARK-WEBT-AT-LEAST-3-OF-DARK-WEB-NODES-ARE-ROGUES/
COSA È RIMASTO FUORI?
• IOT
• TYPO SQUATTING
• E-WHORING
• …
E GIUSTO PER NON FARCI MANCARE NULLA
• SE AVETE TUTTO NEL TELEFONO, BASTA HACKARVI QUELLO ;)
HTTP://WWW.PCMAG.COM/NEWS/345207/HACKERS-NO-LONGER-NEED-YOUR-PASSWORD
SFATIAMO IL PRIMO MITO
NON ESISTE NULLA DI
SICURO
QUINDI?
• DIPENDE DALLA VOSTRA INTELLIGENZA E CONOSCENZA
• «BECAUSE THERE IS NO PATCH TO HUMAN STUPIDITY»
DOMANDE?
MAGARI DAVANTI AD UNA BIRRA?
GRAZIE

Mais conteúdo relacionado

Mais procurados

IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTsIT Tech
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcitmmubashirkhan
 
Trabalho de Redes sobre Honeypot
Trabalho de Redes sobre HoneypotTrabalho de Redes sobre Honeypot
Trabalho de Redes sobre HoneypotRamires Marques
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI TechnologySylvain Maret
 
Understanding Windows Access Token Manipulation
Understanding Windows Access Token ManipulationUnderstanding Windows Access Token Manipulation
Understanding Windows Access Token ManipulationJustin Bui
 
Splunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptxSharmilaMore5
 
SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012Rian Yulian
 
SOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdfSOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdfinfosec train
 
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceFatih Ozavci
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementMayur Nanotkar
 
INTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSSylvain Martinez
 
One time password(otp)
One time password(otp)One time password(otp)
One time password(otp)Anjali Agrawal
 

Mais procurados (20)

IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTs
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
Trabalho de Redes sobre Honeypot
Trabalho de Redes sobre HoneypotTrabalho de Redes sobre Honeypot
Trabalho de Redes sobre Honeypot
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Securing password
Securing passwordSecuring password
Securing password
 
Understanding Windows Access Token Manipulation
Understanding Windows Access Token ManipulationUnderstanding Windows Access Token Manipulation
Understanding Windows Access Token Manipulation
 
Splunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk workshop-Threat Hunting
Splunk workshop-Threat Hunting
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012
 
Arcsight explained
Arcsight explainedArcsight explained
Arcsight explained
 
Honeypot ppt1
Honeypot ppt1Honeypot ppt1
Honeypot ppt1
 
SOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdfSOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdf
 
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
INTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICS
 
Honey pots
Honey potsHoney pots
Honey pots
 
One time password(otp)
One time password(otp)One time password(otp)
One time password(otp)
 

Destaque

Stato dell’arte delle truffe bancarie dal phishing ai Trojan.Banker, come si ...
Stato dell’arte delle truffe bancarie dal phishing ai Trojan.Banker, come si ...Stato dell’arte delle truffe bancarie dal phishing ai Trojan.Banker, come si ...
Stato dell’arte delle truffe bancarie dal phishing ai Trojan.Banker, come si ...Gianfranco Tonello
 
Nativi digitali - La sicurezza online dei minori spiegata agli adulti - Ettor...
Nativi digitali - La sicurezza online dei minori spiegata agli adulti - Ettor...Nativi digitali - La sicurezza online dei minori spiegata agli adulti - Ettor...
Nativi digitali - La sicurezza online dei minori spiegata agli adulti - Ettor...SectorNoLimits
 
Consapevolezza uso social_libre_pisa_ep
Consapevolezza uso social_libre_pisa_epConsapevolezza uso social_libre_pisa_ep
Consapevolezza uso social_libre_pisa_epEmma Pietrafesa
 
Uso consapevole delle tecnologie
Uso consapevole delle tecnologieUso consapevole delle tecnologie
Uso consapevole delle tecnologieLibreItalia
 
Pericoli nascosti di internet e tipologie di virus
Pericoli nascosti di internet e tipologie di virusPericoli nascosti di internet e tipologie di virus
Pericoli nascosti di internet e tipologie di virusGiovanni Mennea
 
Netiquette
NetiquetteNetiquette
Netiquettepafafo
 
Discorso cybersecurity
Discorso cybersecurityDiscorso cybersecurity
Discorso cybersecurityGiulioTerzi
 
Introduzione alla sicurezza informatica e giuridica
Introduzione alla sicurezza informatica e giuridicaIntroduzione alla sicurezza informatica e giuridica
Introduzione alla sicurezza informatica e giuridicaCouncil of Europe
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 

Destaque (12)

Stato dell’arte delle truffe bancarie dal phishing ai Trojan.Banker, come si ...
Stato dell’arte delle truffe bancarie dal phishing ai Trojan.Banker, come si ...Stato dell’arte delle truffe bancarie dal phishing ai Trojan.Banker, come si ...
Stato dell’arte delle truffe bancarie dal phishing ai Trojan.Banker, come si ...
 
Le bugie hanno le gambe corte
Le bugie hanno le gambe corteLe bugie hanno le gambe corte
Le bugie hanno le gambe corte
 
Nativi digitali - La sicurezza online dei minori spiegata agli adulti - Ettor...
Nativi digitali - La sicurezza online dei minori spiegata agli adulti - Ettor...Nativi digitali - La sicurezza online dei minori spiegata agli adulti - Ettor...
Nativi digitali - La sicurezza online dei minori spiegata agli adulti - Ettor...
 
Consapevolezza uso social_libre_pisa_ep
Consapevolezza uso social_libre_pisa_epConsapevolezza uso social_libre_pisa_ep
Consapevolezza uso social_libre_pisa_ep
 
Uso consapevole delle tecnologie
Uso consapevole delle tecnologieUso consapevole delle tecnologie
Uso consapevole delle tecnologie
 
Uso consapevole della rete
Uso consapevole della reteUso consapevole della rete
Uso consapevole della rete
 
Pericoli nascosti di internet e tipologie di virus
Pericoli nascosti di internet e tipologie di virusPericoli nascosti di internet e tipologie di virus
Pericoli nascosti di internet e tipologie di virus
 
Sicurezza informatica nelle Scuole
Sicurezza informatica nelle ScuoleSicurezza informatica nelle Scuole
Sicurezza informatica nelle Scuole
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Discorso cybersecurity
Discorso cybersecurityDiscorso cybersecurity
Discorso cybersecurity
 
Introduzione alla sicurezza informatica e giuridica
Introduzione alla sicurezza informatica e giuridicaIntroduzione alla sicurezza informatica e giuridica
Introduzione alla sicurezza informatica e giuridica
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 

Semelhante a Basi per la sicurezza in rete

Ethical hacking for fun and profit
Ethical hacking for fun and profitEthical hacking for fun and profit
Ethical hacking for fun and profitFlorent Batard
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Billtrust
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Emrah Alpa, CISSP CEH CCSK
 
Security as a top of mind issue for mobile application development
Security as a top of mind issue for mobile application developmentSecurity as a top of mind issue for mobile application development
Security as a top of mind issue for mobile application developmentȘtefan Popa
 
Security is a process, not a plugin (WordCamp Oslo 2018)
Security is a process, not a plugin (WordCamp Oslo 2018)Security is a process, not a plugin (WordCamp Oslo 2018)
Security is a process, not a plugin (WordCamp Oslo 2018)Thomas Vitale
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlSecureAuth
 
2.4.1 - Intro to Cyber Security for students.ppt
2.4.1 - Intro to Cyber Security for students.ppt2.4.1 - Intro to Cyber Security for students.ppt
2.4.1 - Intro to Cyber Security for students.pptrameshselvarajkkp
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCharles Cline
 
Security Issues in E-Commerce.pptx
Security Issues in E-Commerce.pptxSecurity Issues in E-Commerce.pptx
Security Issues in E-Commerce.pptxAnshika865276
 
Rothke - A Pragmatic Approach To Purchasing Information Security Products
Rothke - A Pragmatic Approach To Purchasing Information Security ProductsRothke - A Pragmatic Approach To Purchasing Information Security Products
Rothke - A Pragmatic Approach To Purchasing Information Security ProductsBen Rothke
 
Cybersecurity Trends & Startups by Gula Tech Adventures
Cybersecurity Trends & Startups by Gula Tech AdventuresCybersecurity Trends & Startups by Gula Tech Adventures
Cybersecurity Trends & Startups by Gula Tech AdventuresDawn Yankeelov
 
3 Things to Know When Securing Mixed, Multi-Cloud Environments
3 Things to Know When Securing Mixed, Multi-Cloud Environments3 Things to Know When Securing Mixed, Multi-Cloud Environments
3 Things to Know When Securing Mixed, Multi-Cloud EnvironmentsProtectWise
 
Multi Factor Authetification - ZendCon 2017
Multi Factor Authetification - ZendCon 2017Multi Factor Authetification - ZendCon 2017
Multi Factor Authetification - ZendCon 2017Philippe Gamache
 
People dream about smart living
People dream about smart livingPeople dream about smart living
People dream about smart livingZoltán Dankó
 

Semelhante a Basi per la sicurezza in rete (20)

Ethical hacking for fun and profit
Ethical hacking for fun and profitEthical hacking for fun and profit
Ethical hacking for fun and profit
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
Security as a top of mind issue for mobile application development
Security as a top of mind issue for mobile application developmentSecurity as a top of mind issue for mobile application development
Security as a top of mind issue for mobile application development
 
What Is "Secure"?
What Is "Secure"?What Is "Secure"?
What Is "Secure"?
 
Security is a process, not a plugin (WordCamp Oslo 2018)
Security is a process, not a plugin (WordCamp Oslo 2018)Security is a process, not a plugin (WordCamp Oslo 2018)
Security is a process, not a plugin (WordCamp Oslo 2018)
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 
Social engineering
Social engineering Social engineering
Social engineering
 
2.4.1 - Intro to Cyber Security for students.ppt
2.4.1 - Intro to Cyber Security for students.ppt2.4.1 - Intro to Cyber Security for students.ppt
2.4.1 - Intro to Cyber Security for students.ppt
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
 
Seguridad de la Información y Controles contra Hackers - Getting hacked 101 ...
Seguridad de la Información y Controles contra Hackers - Getting hacked 101  ...Seguridad de la Información y Controles contra Hackers - Getting hacked 101  ...
Seguridad de la Información y Controles contra Hackers - Getting hacked 101 ...
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Security Issues in E-Commerce.pptx
Security Issues in E-Commerce.pptxSecurity Issues in E-Commerce.pptx
Security Issues in E-Commerce.pptx
 
Rothke - A Pragmatic Approach To Purchasing Information Security Products
Rothke - A Pragmatic Approach To Purchasing Information Security ProductsRothke - A Pragmatic Approach To Purchasing Information Security Products
Rothke - A Pragmatic Approach To Purchasing Information Security Products
 
Cybersecurity Trends & Startups by Gula Tech Adventures
Cybersecurity Trends & Startups by Gula Tech AdventuresCybersecurity Trends & Startups by Gula Tech Adventures
Cybersecurity Trends & Startups by Gula Tech Adventures
 
3 Things to Know When Securing Mixed, Multi-Cloud Environments
3 Things to Know When Securing Mixed, Multi-Cloud Environments3 Things to Know When Securing Mixed, Multi-Cloud Environments
3 Things to Know When Securing Mixed, Multi-Cloud Environments
 
Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
 
Multi Factor Authetification - ZendCon 2017
Multi Factor Authetification - ZendCon 2017Multi Factor Authetification - ZendCon 2017
Multi Factor Authetification - ZendCon 2017
 
People dream about smart living
People dream about smart livingPeople dream about smart living
People dream about smart living
 

Mais de Alessandro Colla

Cos’è la felicità per te?
Cos’è la felicità per te?Cos’è la felicità per te?
Cos’è la felicità per te?Alessandro Colla
 
Non dire che non hai tempo, semplicemente non sai usarlo!
Non dire che non hai tempo, semplicemente non sai usarlo!Non dire che non hai tempo, semplicemente non sai usarlo!
Non dire che non hai tempo, semplicemente non sai usarlo!Alessandro Colla
 
IAD18 - Testing di un microservizio CQRS con Event sourcing
IAD18 - Testing di un microservizio CQRS con Event sourcingIAD18 - Testing di un microservizio CQRS con Event sourcing
IAD18 - Testing di un microservizio CQRS con Event sourcingAlessandro Colla
 
Assistant, the conversational side of Google
Assistant, the conversational side of GoogleAssistant, the conversational side of Google
Assistant, the conversational side of GoogleAlessandro Colla
 
Responsive Web Design & Single Page Application
Responsive Web Design & Single Page ApplicationResponsive Web Design & Single Page Application
Responsive Web Design & Single Page ApplicationAlessandro Colla
 

Mais de Alessandro Colla (7)

Cos’è la felicità per te?
Cos’è la felicità per te?Cos’è la felicità per te?
Cos’è la felicità per te?
 
Non dire che non hai tempo, semplicemente non sai usarlo!
Non dire che non hai tempo, semplicemente non sai usarlo!Non dire che non hai tempo, semplicemente non sai usarlo!
Non dire che non hai tempo, semplicemente non sai usarlo!
 
IAD18 - Testing di un microservizio CQRS con Event sourcing
IAD18 - Testing di un microservizio CQRS con Event sourcingIAD18 - Testing di un microservizio CQRS con Event sourcing
IAD18 - Testing di un microservizio CQRS con Event sourcing
 
Assistant, the conversational side of Google
Assistant, the conversational side of GoogleAssistant, the conversational side of Google
Assistant, the conversational side of Google
 
Come ti piloto il drone
Come ti piloto il droneCome ti piloto il drone
Come ti piloto il drone
 
Responsive Web Design & Single Page Application
Responsive Web Design & Single Page ApplicationResponsive Web Design & Single Page Application
Responsive Web Design & Single Page Application
 
Nui for real
Nui for realNui for real
Nui for real
 

Último

Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Balliameghakumariji156
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...meghakumariji156
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...kumargunjan9515
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理F
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsPriya Reddy
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsMonica Sydney
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理F
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 

Último (20)

Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 

Basi per la sicurezza in rete

  • 1. BUONE PRATICHE PER LA SICUREZZA IN RETE
  • 2. DISCLAIMER • TUTTO QUELLO DI CUI VI PARLERÒ VA APPLICATO ALL’IMPORTANZA CHE DATE AI VOSTRI DATI, QUALI E CHE LIVELLO DI SICUREZZA (PARANOIA?) VOLETE MANTENERE • LA TANA DEL BIANCONIGLIO È TALMENTE PROFONDA CHE TOCCHERÒ DI STRISCIO GLI ARGOMENTI. • SE INTERESSA QUALCOSA IN PARTICOLARE APPROFONDIAMO NEL Q&A CON UN BUON PIRLO
  • 3. SCOPO DEL TALK • BASI SULLA SICUREZZA IN RETE • COSA SI PUÒ FARE PER PROTEGGERE I PROPRI DATI • UN’IDEA DI COSA C’È LA FUORI
  • 4. DI COSA DI PARLARE? • BUONE PRATICHE • TWO FACTOR AUTHENTICATION (OTP) • CRIPTAZIONE • CLOUD • SOCIAL ENGINEERING • SICUREZZA NEI LUOGHI PUBBLICI • NAVIGAZIONE ANONIMA
  • 5. SFATIAMO IL PRIMO MITO NON ESISTE NULLA DI SICURO
  • 6. “ ” I THINK INFORMATION SECURITY IS A LOT LIKE MEDICINE — IT’S BOTH AN ART AND SCIENCE. MAYBE THIS IS BECAUSE HUMANS HAVE EXPLICITLY BUILT TECHNOLOGY AND THE INTERNET PARISA “SECURITY PRINCESS” TABRIZ – HEAD ENGINEER OF GOOGLE’S CHROME SECURITY TEAM
  • 7. LA BASI… • PASSWORD A TUTTI I VOSTRI DISPOSITIVI • NON LASCIATE MAI IL VOSTRO DISPOSITIVO INCUSTODITO SENZA BLOCCARE LO SCHERMO • UN BUON ANTIVIRUS NON FA MAI MALE
  • 8. UNA BUONA PASSWORD PREVIENE MOLTI ATTACCHI HTTP://XKCD.COM/936/
  • 9. LE 10 PEGGIORI PASSWORD DEL 2015 1. 123456 2. PASSWORD 3. 12345678 4. QWERTY 5. 12345 6. 123456789 7. FOOTBALL 8. 1234 9. 1234567 10. BASEBALL Fonte: https://www.teamsid.com/worst-passwords-2015/
  • 10. POTETE USARE UN PASSWORD MANAGER… • LASTPASS • DASHLANE • KEEPASS • 1PASSWORD • ROBOFORM
  • 11. …MA RICORDATE CHE…. • SERVE UNA MASTER PASSWORD • SE LA PERDETE…PERDETE TUTTO • ANCHE QUESTI SONO SOFTWARE E PERTANTO SOGGETTI A FALLE DI SICUREZZA • PER CITARNE UNA RECENTE: HTTP://HACKADAY.COM/2016/08/01/LASTPASS-HAPPILY-FORFEITS- PASSWORDS-TO-SIMPLE-JAVASCRIPT/
  • 12. TUTTI I SOFTWARE HANNO VULNERABILITÀ TENETE AGGIORNATI I SISTEMI E PROGRAMMI MAGARI ASPETTATE UN PAIO DI GIORNI ;) http://www.cvedetails.com/top-50-products.php?year=2015
  • 13. ASSICURATEVI DI ESSERE IN HTTPS • LA S STA PER «SECURE» • PROTEGGE LA PRIVACY DEGLI UTENTI • EVITA LO SNIFFING (MAN IN THE MIDDLE) • CONTROLLATE L’ICONA IN ALTO A SINISTRA
  • 14. TWO FACTOR AUTHENTICATION • È UN OTP (ONE TIME PASSWORD) • ATTIVATELO OVUNQUE POTETE • MAGARI NON METTETE LA SPUNTA A «NON CHIEDERMELO PIÙ»  • GOOGLE AUTHENTICATOR HTTPS://PLAY.GOOGLE.COM/STORE/APPS/DETAILS?ID=COM.GOOGLE.ANDROID.APPS.AUTHENTICATOR2 • AZURE AUTHENTICATOR (IOS, ANDROID E WINDOWS PHONE) A BREVE
  • 15. SE VI RUBANO IL PORTATILE O UN HD/USB ESTERNO? • BIT LOCKER (WINDOWS) • TRUECRYPT / VERACRYTP (MULTIPIATTAFORMA E CREA ANCHE CONTAINER) • FILEVAULT (OSX) • ANDROID HA L’OPZIONE DA ATTIVARE, MA PARE SIA FACILE RAGGIRARLO • IOS CRIPTA TUTTI I DATI PERSONALI IN AUTOMATICO
  • 16. COME ACCEDO? SI INSTALLA UN BOOT LOADER E DA QUI LE SCELTE: • MODULO TPM HTTPS://IT.WIKIPEDIA.ORG/WIKI/TRUSTED_PLATFORM_MODULE • PASSWORD • CHIAVE USB O SMARTCARD • PARTIZIONI NASCOSTE (PLAUSIBLE DENIABILITY )
  • 17. SONO SICURI? • NON DEL TUTTO • SOGGETTI AD ATTACCHI «EVIL MAID» (LINUX E OSX) HTTPS://WWW.SCHNEIER.COM/BLOG/ARCHIVES/2009/10/EVIL_MAID_ATTAC.HTML • BITLOCKER NO, MA SI VOCIFERA ABBIA DELLE BACKDOOR PERCHÉ COLLABORA CON LA NSA (E CODICE NON OPEN, PERTANTO NIENTE AUDIT COME A TC)
  • 18. E IL CLOUD? • SI FA LO SBAGLIO DI PENSARLI COME HARD DISK ESTERNI • HANNO TANTI DATI E ATTIRANO L’ATTENZIONE • SICUREZZA DI CASA VOSTRA VS SICUREZZA GESTITA DA ALTRI • CASO REMOTO, MA È SUCCESSO CHE ABBIANO CANCELLATO I DATI • THE FAPPENING…ANYONE? • TRESORIT È UN’ALTERNATIVA CRIPTATA • BOXCRIPTOR CRIPTA PRIMA DI SINCRONIZZARE
  • 19. SOCIAL ENGINEERING • MANIPOLAZIONE PSICOLOGICA DELLE PERSONE • OTTENGO INFORMAZIONI CONFIDENZIALI (PRETEXTING, PHISHING, SPEARPHISHING) • GLI FACCIO FARE QUALCOSA (BAITING)
  • 20. “ ” IT IS MUCH EASIER TO TRICK SOMEONE INTO GIVING A PASSWORD FOR A SYSTEM THAN TO SPEND THE EFFORT TO CRACK INTO THE SYSTEM. KEVIN MITNICK
  • 21. ESEMPIO PIÙ BANALE DI QUANTO IMMAGINATE? • NEL 2003, IN UN SONDAGGIO SULLA SICUREZZA, IL 90% DEGLI IMPIEGATI AVEVA FORNITO AI RICERCATORI QUELLA CHE DICHIARARONO ESSERE LA LORO PASSWORD IN RISPOSTA AD UNA DELLE DOMANDE DEL QUESTIONARIO…IN CAMBIO DI UNA PENNA IN REGALO.
  • 22. SICUREZZA NEI LUOGHI PUBBLICI • BLOCCATE LE CONDIVISIONI • ATTIVATE IL FIREWALL • HTTPS #CHEVELODICOAFARE • VPN • ELIMINATE I WI-FI A CUI NON VI ATTACCATE PIÙ • NIENTE TRANSAZIONI ECONOMICHE
  • 23. TOR • PERMETTE LA NAVIGAZIONE ANONIMA (MEGLIO DI IE, FF, CHROME O SAFARI) • ABBIAMO ACCESSO ALLA DARK NET (CHE NON È IL DEEP WEB) • ANDIAMO SU THEHIDDENWIKI (HTTP://ZQKTLWI4FECVO6RI.ONION)
  • 24. QUINDI È SICURO NAVIGARE CON TOR? • 3% DEI NODI SONO «ROGUE» HTTPS://NAKEDSECURITY.SOPHOS.COM/2016/07/26/HONEY-ONIONS-PROBE-THE-TOR-DARK-WEBT-AT-LEAST-3-OF-DARK-WEB-NODES-ARE-ROGUES/
  • 25. COSA È RIMASTO FUORI? • IOT • TYPO SQUATTING • E-WHORING • …
  • 26. E GIUSTO PER NON FARCI MANCARE NULLA • SE AVETE TUTTO NEL TELEFONO, BASTA HACKARVI QUELLO ;) HTTP://WWW.PCMAG.COM/NEWS/345207/HACKERS-NO-LONGER-NEED-YOUR-PASSWORD
  • 27. SFATIAMO IL PRIMO MITO NON ESISTE NULLA DI SICURO
  • 28. QUINDI? • DIPENDE DALLA VOSTRA INTELLIGENZA E CONOSCENZA • «BECAUSE THERE IS NO PATCH TO HUMAN STUPIDITY»

Notas do Editor

  1. Consiglio sul pattern di generazione password e una per le cose veramente importanti
  2. Quando hanno fiondato Ashley Madison c’erano un botto di password con 12345, 123456 etc.
  3. L’utente si deve fidare del browser e delle autorità di rilascio dei certificati Esempio man in the middle con bonifici bancari
  4. Stacco il disco e lo attacco ad un altro pc Prendo dalle discariche i computer buttati, perché la gente dimentica di svuotarli
  5. A likely scenario is that you leave your encrypted computer in your hotel room when you go out to dinner, and the maid sneaks in and installs the hacked bootloader. The same maid could even sneak back the next night and erase any traces of her actions.
  6. Chi conosce il ragazzo in sala server che accede agli storage?
  7. Pretexting: Creare una situazione tale che la vittima è più propensa a darmi Informazioni che non mi darebbe in altri casi. ES: mi fingo polizziotto Spearphishing: ottengo dati mandando al soggetto messaggi che sembrano innocencenti Phishing: ottengo informazioni private in maniera fraudolenta (le email delle banche che chiedono il pin) Baiting uso media fisici che si affidano alla curiosità ed avarizia del soggetto. Esempio del pentest della banca con le chiavi USB
  8. In chat è facilissimo sapere se uno lavora per il governo o meno. Si tende a vantarsi per fare colpo