Personal Internet Security Practice

Brian Pichman
Brian PichmanInnovative Technology Expert, Library Enthusiast em Collegis Education
Personal Internet Security
Practices
Brian Pichman
Twitter: @Bpichman
Personal Internet Security Practice
Agenda
• Understanding Anonymity, Privacy, and Everything in Between
• Protecting Yourself
• Getting Hacked
• Protecting Your Environment
Personal Internet Security Practice
Tools For Anonymity
Making yourself more “invisible”
Onion Routing, Tor Browsing
• Technique for anonymous communication to take place over a network.
The encryption takes place at three different times:
• Entry Node
• Relay Node
• Exit Node
• Tor is made up of volunteers running relay servers. No single router knows
the entire network (only its to and from).
• Tor can bypass internet content filtering, restricted government networks
(like China) or allow people to be anonymous whistle blowers.
• Tor allows you to gain access to “.onion” websites that are not accessible
via a normal web browser.
• Communication on the Dark Web happens, via Web, Telnet, IRC, and other
means of communication being developed daily.
Cloak of Invisibility
Top reasons why people want to hide their IP address:
1. Hide their geographical location
2. Prevent Web tracking
3. Avoid leaving a digital footprint
4. Bypass any bans or blacklisting of their IP address
5. Perform illegal acts without being detected
Cloak of Invisibility
How do you Hide an 800lb Gorilla?
• Use Free Wifi (To Hide your location)
• Use a Secure Web Browser
• Use a Private VPN
• Go back to Dial-up
• Setup RF Data Transfer over CB Radio
Waves
• Use Kali linux to hack someone else’s
Wifi Encryption.
• Setup long-range Wireless Antennas
Cloak of Invisibility
• How to hide yourself?
• Private VPN
• You want a TOTALLY anonymous service.
• Look for one that keeps no log history (Verify via reviews)
• Look at Bandwidth & Available Servers
• Recommendations:
• Private Internet Access (PIA)
• TorGuard VPN
• Pure VPN
• Opera Web Browser
• Avast AntiVirus (SecureLine)
• Worst Case: Free WIFI
Normal Users and How They Appear:
VPN Protected Users
Cloak of Invisibility
• How Tor anonymizes – “You”.
• How VPN keeps ”You” protected.
Understanding Free Wifi
• Sometimes a good alternative if
you need to do something
anonymously
• Nothing is ever 100% anonymous
• Some public wifi does track
websites you access, what you
do, etc.
• Make sure your computer name
you are using doesn’t include your
actual name
Personal Internet Security Practice
Hacked WiFi – Cain and Abel
Best Tips and Practices For Connecting Privately
Do
• Use a device that you’ve never
signed into anything ”personal
on”.
• Pro Tip: buy a computer from a
Pawn Shop or Garage Sale
• If using public WiFi; don’t make
purchases with a credit card.
Don’t
• While on a VPN or any other
anonymous tool; don’t sign into
personal accounts (banks, social
media, etc).
• If posting, don’t use anything
that could be associated to you
Easy Wins for Privacy
• 10 Minute Email
• https://10minutemail.com/
• Temporarily get an email box that’s anonymous and disappears after 10
minutes
• Dr Cleaner (Mac) or Eraser (Win) can overwrite files on your
computer with “blank” data to make file recovery near impossible.
• Tools like Recuva is free softwares to allow you to restore deleted files.
Protecting Yourself
You
• Sites to protect yourself all the time (not free)
• IdentiyGuard.com
• LifeLock.com
• Sites to monitor when breached data gets related (this is free)
• Haveibeenpwned.com
• Password Management Sites (like lastpass.com)
• Don’t have the same password for all your sites.
• Don’t write your passwords down on a post-it-note and leave it at your desk
Personal Internet Security Practice
Personal Internet Security Practice
Google Isn’t Always Your Friend
Dual Factor Authentication
• After logging in; verify login via Email, SMS, or an app with a code.
Credit Card Tools for Online Shopping
• Check out Privacy.Com
• https://privacy.com/join/473XB
shameless plug
Random Tips and Tricks
• Accept only people you know to personal and professional accounts
• Never click on links from people you don’t know.
• Especially if they are using a url shortner: bit.ly, tinyurl.com, etc
• https://www.urlvoid.com/ - test the website to see if its safe
• https://snapito.com/ gets a screenshot of what will load on the site
• If there are people claiming to be you on social media, it’s best to get
your account “verified” on those social media platforms
• This lets users distinguish that you’re the actual official account
• Dual factor authenticate all of your social media logins
More Sources
• https://www.reddit.com/r/deepweb/
• DuckDuckGo.Com doesn’t track searches
• Also lets you search of .onion sites when using TorBrowser to access.
Personal Internet Security Practice
Myths
• I’m not worth being attacked.
• Hackers won’t guess my password.
• I/we have anti-virus software.
• I’ll/we know if I/we been compromised.
Understanding Breaches and Hacks
• A hack involves a person or group to gain authorized access to a
protected computer or network
• A breach typically indicates a release of confidential data (including
those done by accident)
Personal Internet Security Practice
Personal Internet Security Practice
The Costs Of Breaches
• This year’s study found the average consolidated total cost of a data breach
is 3.9 million dollars and in the US the average is actually higher at 8.19
million.
[IBM 2019
http://www-03.ibm.com/security/data-breach/]
• Data Breached Companies Experience…
• People loose faith in your brand
• Loss in patrons
• Financial Costs
• Government Requirements,
Penalties, Fees, etc.
• Sending of Notifications
• Payment of Identity Protection or
repercussions.
https://betanews.com/2016/02/10/the-economic-cost-of-being-hacked/
Personal Internet Security Practice
Protecting Your Home
You home
threats
Data and Information
Why do People Attack?
• Financial Gain
• Stocks
• Getting Paid
• Selling of information
• Data Theft
• For a single person
• For a bundle of people
• Just Because
• Malicious
https://www.experian.com/blogs/ask-experian/heres-how-
much-your-personal-information-is-selling-for-on-the-dark-
web/
Outside
• Modem Router Firewall
Switches
• Servers
End User
• Phones
• Computers
• Laptops
Outer Defenses (Routers/Firewalls)
• Site to Site Protection (Router to
Router or Firewall to Firewall)
• Encrypted over a VPN Connection
• Protection With:
• IDS
• IPS
• Web filtering
• Antivirus at Web Level
• Protecting INBOUND and OUTBOUND
Unified Threat Management
• Single Device Security
• All traffic is routed through a unified
threat management device.
Areas of Attack On Outer Defense
External Facing Applications
• Anything with an “External IP”
• NAT, ONE to ONE, etc.
• Website
• Custom Built Web Applications
or Services
Internal Applications
• File Shares
• Active Directory (usernames /
passwords)
• Patron Records
• DNS Routing
• Outbound Network Traffic
• Who is going where
Attacks
• Man in the Middle
• Sitting between a conversation and either listening or altering the data as its sent
across.
• DNS Spoofing (https://null-byte.wonderhowto.com/how-to/hack-like-pro-spoof-dns-
lan-redirect-traffic-your-fake-website-0151620/) set up a fake website and let people
login to it.
• D/DoS Attack (Distributed/Denial of Service Attack)
• Directing a large amount of traffic to disrupt service to a particular box or an entire
network.
• Could be done via sending bad traffic or data
• That device can be brought down to an unrecoverable state to disrupt business
operations.
• Sniffing Attacks
• Monitoring of data and traffic to determine what people are doing.
Personal Internet Security Practice
Inner Defenses (Switches/Server Configs)
• Protecting Internal Traffic,
Outbound Traffic, and Inbound
Traffic
• Internal Traffic = device to device
• Servers
• Printers
• Computers
• Protected By:
• Software Configurations
• Group Policy
• Password Policy
• Hardware Configurations
• Routing Rules
So…What Can You Do With Just This:
Updates, Patches, Firmware
• Keeping your system updated is important.
• Being on the latest and greatest
[software/update/firmware] isn’t always
good – but security updates are usually key
and super important.
Passwords
• Let’s talk about Passwords
• Length of Password
• Complexity of password
requirements
• DO NOT USE POST IT NOTES
Personal Internet Security Practice
Personal Internet Security Practice
Personal Internet Security Practice
Open DNS
• https://www.opendns.com/home-internet-security/
Setting It Up
• It’s simple, you will just want to update your router’s DNS entry
(or if you wanted, you can do this directly on the device you wish to
protect)
• 208.67.222.123
• 208.67.220.123
Your Wireless Router
• Have your wireless connection protected by a password to join
• Have your wireless password interface ALSO protect with a password
(that isn’t the default password either)
Other Tools To Protect The Computer
Microsoft
https://account.microsoft.com/family/about
Apple
https://support.apple.com/guide/mac-help/set-up-parental-controls-mtusr004/10.14/mac/10.14
https://www.apple.com/families/
Google Accounts for Kids
• https://support.google.com/families/answer/7103338?hl=en
Qustodio
https://www.qustodio.com/en/family/why-qustodio/
Understanding Wireless Encryption
• Open (risky): Open Wi-Fi networks have no passphrase. You shouldn’t set up an open Wi-Fi network—
• WEP 64 (risky): The old WEP protocol standard is vulnerable and you really shouldn’t use it.
• WEP 128 (risky): This is WEP, but with a larger encryption key size. It isn’t really any less vulnerable than
WEP 64.
• WPA-PSK (TKIP): This uses the original version of the WPA protocol (essentially WPA1). It has been
superseded by WPA2 and isn’t secure.
• WPA-PSK (AES): This uses the original WPA protocol, but replaces TKIP with the more modern AES
encryption. It’s offered as a stopgap, but devices that support AES will almost always support WPA2, while
devices that require WPA will almost never support AES encryption. So, this option makes little sense.
• WPA2-PSK (TKIP): This uses the modern WPA2 standard with older TKIP encryption. This isn’t secure, and is
only a good idea if you have older devices that can’t connect to a WPA2-PSK (AES) network.
• WPA2-PSK (AES): This is the most secure option. It uses WPA2, the latest Wi-Fi encryption standard, and the
latest AES encryption protocol. You should be using this option. On some devices, you’ll just see the option
“WPA2” or “WPA2-PSK.” If you do, it will probably just use AES, as that’s a common-sense choice.
• WPAWPA2-PSK (TKIP/AES): Some devices offer—and even recommend—this mixed-mode option. This
option enables both WPA and WPA2, with both TKIP and AES. This provides maximum compatibility with any
ancient devices you might have, but also allows an attacker to breach your network by cracking the more
vulnerable WPA and TKIP protocols.
https://www.howtogeek.com/204697/wi-fi-security-should-you-use-wpa2-aes-wpa2-tkip-or-both
What’s the “Guest” Network On My Router
• You can set up a “Guest” network for when people come over, you
can have your network segmented out so they can’t see the other
content/devices in your home:
• Shared Photos and Files on a Personal Computer
• Access to GoogleHome / Apple TV / etc
General Browsing Rules
What does HTTPS Do?
• HTTPS verifies the identity of a website and encrypts nearly all
information sent between the website and the user.
• Protected information includes cookies, user agent details, URL paths,
form submissions, and query string parameters.
• HTTPS is a combination of HTTP and Transport Layer Security (TLS).
• Browsers and other HTTPS clients are configured to trust a set
of certificate authorities that can issue cryptographically signed
certificates on behalf of web service owners.
What Doesn’t HTTPS Do?
• HTTPS has several important limitations.
• IP addresses and destination domain names are not encrypted.
• Even encrypted traffic can reveal some information indirectly, such as time
spent on site, or the size of requested resources or submitted information.
• HTTPS only guarantees the integrity of the connection between two systems,
not the systems themselves.
• It is not designed to protect a web server from being hacked.
• If a user’s system is compromised by an attacker, that system can be altered
so that its future HTTPS connections are under the attacker’s control.
Why HTTPS?
• Prevents Hackers from watching what you
do over the Internet
• Encrypts Data
• Keeps stuff private
• Keeps you safe
• Prevents people from tracking your
internet activity
• Unencrypted HTTP request reveals
information about a user’s behavior.
The HTTP protocol does not protect data from interception or alteration.
Your Security is as Strong As the Weakest Link
Learn and Practice Cybersecurity
• Learn to identify a scam email
• Understanding the “fake” Facebook friends
• Being careful of links you don’t recognize through email, search, or
posts on social media.
• Take webinars and free classes to learn about these things – have
honest and open conversations
• Evolve Project
• https://www.linkedin.com/in/bpichman
• Twitter: @bpichman
• Email: bpichman@evolveproject.org
• Slideshare.net/bpichman
Brian Pichman
Questions?
1 de 66

Recomendados

Pichman privacy, the dark web, & hacker devices i school (1) por
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
199 visualizações59 slides
Harbin clinic iot-mobile-no-vid por
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidErnest Staats
515 visualizações38 slides
Online Self Defense por
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
759 visualizações47 slides
Hacking and Cyber Security. por
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.Kalpesh Doru
10.7K visualizações36 slides
Information security & data security | Chandan Singh Ghodela por
Information security & data security | Chandan Singh GhodelaInformation security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh GhodelaChandan Singh Ghodela
82 visualizações29 slides
Visual hacking (ec) por
Visual hacking (ec)Visual hacking (ec)
Visual hacking (ec)Bradley W. Deacon
431 visualizações22 slides

Mais conteúdo relacionado

Mais procurados

Infosec 4 The Home por
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
366 visualizações18 slides
Privacy in private browsing mode por
Privacy in private browsing modePrivacy in private browsing mode
Privacy in private browsing modeAparna “Ash” Himmatramka
1.2K visualizações42 slides
Internet Security por
Internet SecurityInternet Security
Internet Securitymjelson
9.1K visualizações37 slides
Phishing with Super Bait por
Phishing with Super BaitPhishing with Super Bait
Phishing with Super BaitJeremiah Grossman
2.4K visualizações37 slides
Cybersecurity Awareness Training Presentation v2021.08 por
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08DallasHaselhorst
6.7K visualizações47 slides
Webinar On Ethical Hacking & Cybersecurity - Day2 por
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Mohammed Adam
1.6K visualizações17 slides

Mais procurados(20)

Infosec 4 The Home por jaysonstreet
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
jaysonstreet366 visualizações
Internet Security por mjelson
Internet SecurityInternet Security
Internet Security
mjelson9.1K visualizações
Phishing with Super Bait por Jeremiah Grossman
Phishing with Super BaitPhishing with Super Bait
Phishing with Super Bait
Jeremiah Grossman2.4K visualizações
Cybersecurity Awareness Training Presentation v2021.08 por DallasHaselhorst
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
DallasHaselhorst6.7K visualizações
Webinar On Ethical Hacking & Cybersecurity - Day2 por Mohammed Adam
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
Mohammed Adam1.6K visualizações
Darknet (ec) por Bradley W. Deacon
Darknet (ec) Darknet (ec)
Darknet (ec)
Bradley W. Deacon678 visualizações
Introduction to Deep Web por IRJET Journal
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep Web
IRJET Journal30 visualizações
Web Security por Randy Connolly
Web SecurityWeb Security
Web Security
Randy Connolly3.3K visualizações
Security Awareness Training por Dmitriy Scherbina
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Dmitriy Scherbina730 visualizações
7 Cybersecurity Sins When Working From Home por DallasHaselhorst
7 Cybersecurity Sins When Working From Home7 Cybersecurity Sins When Working From Home
7 Cybersecurity Sins When Working From Home
DallasHaselhorst920 visualizações
Document safer online for nonprofits guide por Nguyen Xuan Quang
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
Nguyen Xuan Quang21 visualizações
How To Keep the Grinch From Ruining Your Cyber Monday por Michele Chubirka
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
Michele Chubirka367 visualizações
14 tips to increase cybersecurity awareness por Michel Bitter
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter552 visualizações
Dark and Deep web por Khaled Sany
Dark and Deep webDark and Deep web
Dark and Deep web
Khaled Sany5.3K visualizações
001 ho basic computer por Franklin Sondakh
001 ho basic computer001 ho basic computer
001 ho basic computer
Franklin Sondakh323 visualizações
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ... por Start Pad
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
Start Pad1.5K visualizações
CMA Part #1 - Section E - Internet Security por Tariq Al-Basha
CMA Part #1 - Section E - Internet SecurityCMA Part #1 - Section E - Internet Security
CMA Part #1 - Section E - Internet Security
Tariq Al-Basha582 visualizações
Building a culture of security por Courion Corporation
Building a culture of securityBuilding a culture of security
Building a culture of security
Courion Corporation 438 visualizações
INTERNET SAFETY FOR KIDS por Camille Hazellie
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
Camille Hazellie18.1K visualizações

Similar a Personal Internet Security Practice

Securing and Safeguarding Your Library Setup por
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
8 visualizações110 slides
Securing & Safeguarding Your Library Setup.pptx por
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
45 visualizações83 slides
Cybersecurity - Defense Against The Dark Arts Harry Potter Style por
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
62 visualizações153 slides
It security the condensed version por
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
376 visualizações89 slides
Implementing security for your library | PLAN Tech Day Conference por
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
161 visualizações78 slides
Users awarness programme for Online Privacy por
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
102 visualizações33 slides

Similar a Personal Internet Security Practice(20)

Securing and Safeguarding Your Library Setup por Brian Pichman
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
Brian Pichman8 visualizações
Securing & Safeguarding Your Library Setup.pptx por Brian Pichman
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
Brian Pichman45 visualizações
Cybersecurity - Defense Against The Dark Arts Harry Potter Style por Brian Pichman
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Brian Pichman62 visualizações
It security the condensed version por Brian Pichman
It security  the condensed version It security  the condensed version
It security the condensed version
Brian Pichman376 visualizações
Implementing security for your library | PLAN Tech Day Conference por Brian Pichman
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
Brian Pichman161 visualizações
Users awarness programme for Online Privacy por Kazi Sarwar Hossain
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
Kazi Sarwar Hossain102 visualizações
Computer security and malware by shahzad younas por Shahzad Younas
Computer security and malware by shahzad younasComputer security and malware by shahzad younas
Computer security and malware by shahzad younas
Shahzad Younas723 visualizações
Acpe 2014 Internet Anonymity Using Tor por Jack Maynard
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
Jack Maynard2.2K visualizações
Steps and Tips to Protect Yourself and your Private Information while Online.... por Abzetdin Adamov
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
Abzetdin Adamov1.4K visualizações
IT Security Awareness-v1.7.ppt por OoXair
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair918 visualizações
Cyber security por ZwebaButt
Cyber security Cyber security
Cyber security
ZwebaButt283 visualizações
The Personal and Website Security Mindset por Adam W. Warner
The Personal and Website Security MindsetThe Personal and Website Security Mindset
The Personal and Website Security Mindset
Adam W. Warner2K visualizações
Cyber security awareness for end users por NetWatcher
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
NetWatcher2.6K visualizações
Information security Presentation por dhirujapla
Information security Presentation  Information security Presentation
Information security Presentation
dhirujapla635 visualizações
Wfh security risks - Ed Adams, President, Security Innovation por Priyanka Aash
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
Priyanka Aash1.9K visualizações
Chp-15 Cyber Safety ppt-std 11.pptx por HarishParthasarathy4
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
HarishParthasarathy44.7K visualizações
Cyber Security Awareness Training by Win-Pro por Ronald Soh
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
Ronald Soh882 visualizações
Cyber security-1.pptx por CharithraaAR
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR32 visualizações

Mais de Brian Pichman

Content Creation and Social Media Tools for Libraries por
Content Creation and Social Media Tools for LibrariesContent Creation and Social Media Tools for Libraries
Content Creation and Social Media Tools for LibrariesBrian Pichman
14 visualizações58 slides
Artificial Intelligence (AI) – Powering Data and Conversations.pptx por
Artificial Intelligence (AI) – Powering Data and Conversations.pptxArtificial Intelligence (AI) – Powering Data and Conversations.pptx
Artificial Intelligence (AI) – Powering Data and Conversations.pptxBrian Pichman
71 visualizações43 slides
40 Day Challenge por
40 Day Challenge40 Day Challenge
40 Day ChallengeBrian Pichman
16 visualizações23 slides
NCompass Live: AI: The Modern Day Pandora's Box por
NCompass Live: AI: The Modern Day Pandora's BoxNCompass Live: AI: The Modern Day Pandora's Box
NCompass Live: AI: The Modern Day Pandora's BoxBrian Pichman
63 visualizações75 slides
Lets Chat AI - and Not Just ChatGPT por
Lets Chat AI - and Not Just ChatGPTLets Chat AI - and Not Just ChatGPT
Lets Chat AI - and Not Just ChatGPTBrian Pichman
48 visualizações68 slides
CES 2023 por
CES 2023CES 2023
CES 2023Brian Pichman
25 visualizações65 slides

Mais de Brian Pichman(20)

Content Creation and Social Media Tools for Libraries por Brian Pichman
Content Creation and Social Media Tools for LibrariesContent Creation and Social Media Tools for Libraries
Content Creation and Social Media Tools for Libraries
Brian Pichman14 visualizações
Artificial Intelligence (AI) – Powering Data and Conversations.pptx por Brian Pichman
Artificial Intelligence (AI) – Powering Data and Conversations.pptxArtificial Intelligence (AI) – Powering Data and Conversations.pptx
Artificial Intelligence (AI) – Powering Data and Conversations.pptx
Brian Pichman71 visualizações
40 Day Challenge por Brian Pichman
40 Day Challenge40 Day Challenge
40 Day Challenge
Brian Pichman16 visualizações
NCompass Live: AI: The Modern Day Pandora's Box por Brian Pichman
NCompass Live: AI: The Modern Day Pandora's BoxNCompass Live: AI: The Modern Day Pandora's Box
NCompass Live: AI: The Modern Day Pandora's Box
Brian Pichman63 visualizações
Lets Chat AI - and Not Just ChatGPT por Brian Pichman
Lets Chat AI - and Not Just ChatGPTLets Chat AI - and Not Just ChatGPT
Lets Chat AI - and Not Just ChatGPT
Brian Pichman48 visualizações
CES 2023 por Brian Pichman
CES 2023CES 2023
CES 2023
Brian Pichman25 visualizações
Lets Chat AI – And Not Just ChatGPT por Brian Pichman
Lets Chat AI – And Not Just ChatGPTLets Chat AI – And Not Just ChatGPT
Lets Chat AI – And Not Just ChatGPT
Brian Pichman22 visualizações
STEM Programming Ideas at the Library.pdf por Brian Pichman
STEM Programming Ideas at the Library.pdfSTEM Programming Ideas at the Library.pdf
STEM Programming Ideas at the Library.pdf
Brian Pichman17 visualizações
Getting Started With Using AI In Libraries (PLAN) por Brian Pichman
Getting Started With Using AI In Libraries (PLAN)Getting Started With Using AI In Libraries (PLAN)
Getting Started With Using AI In Libraries (PLAN)
Brian Pichman16 visualizações
Coding with Maker Tech por Brian Pichman
   Coding with Maker Tech   Coding with Maker Tech
Coding with Maker Tech
Brian Pichman16 visualizações
CES 2023 por Brian Pichman
CES 2023CES 2023
CES 2023
Brian Pichman147 visualizações
Innovation and Libraries Building a Collaborative Learning Ecosystem.pptx por Brian Pichman
Innovation and Libraries Building a Collaborative Learning Ecosystem.pptxInnovation and Libraries Building a Collaborative Learning Ecosystem.pptx
Innovation and Libraries Building a Collaborative Learning Ecosystem.pptx
Brian Pichman15 visualizações
I’ve Been Hacked  The Essential Steps to Take Next por Brian Pichman
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
Brian Pichman24 visualizações
AI for Beginners - SWFLN Makerpalooza - Session 1 por Brian Pichman
AI for Beginners - SWFLN Makerpalooza - Session 1AI for Beginners - SWFLN Makerpalooza - Session 1
AI for Beginners - SWFLN Makerpalooza - Session 1
Brian Pichman34 visualizações
Developing a Coding Program for Users - SWFLN Makerpalooza - Session 4 por Brian Pichman
Developing a Coding Program for Users  - SWFLN Makerpalooza - Session 4Developing a Coding Program for Users  - SWFLN Makerpalooza - Session 4
Developing a Coding Program for Users - SWFLN Makerpalooza - Session 4
Brian Pichman19 visualizações
Using AI at the Library - SWFLN Makerpalooza - Session 2 por Brian Pichman
Using AI at the Library  - SWFLN Makerpalooza - Session 2Using AI at the Library  - SWFLN Makerpalooza - Session 2
Using AI at the Library - SWFLN Makerpalooza - Session 2
Brian Pichman19 visualizações
Advanced- Programming with AI - SWFLN Makerpalooza - Session 3 por Brian Pichman
Advanced- Programming with AI  - SWFLN Makerpalooza - Session 3Advanced- Programming with AI  - SWFLN Makerpalooza - Session 3
Advanced- Programming with AI - SWFLN Makerpalooza - Session 3
Brian Pichman25 visualizações
Getting Started with Solver Spaces - SWFLN Makerpalooza - Session 5 por Brian Pichman
Getting Started with Solver Spaces  - SWFLN Makerpalooza - Session 5Getting Started with Solver Spaces  - SWFLN Makerpalooza - Session 5
Getting Started with Solver Spaces - SWFLN Makerpalooza - Session 5
Brian Pichman19 visualizações
What's on the Technology Horizon for 2023 por Brian Pichman
What's on the Technology Horizon for 2023 What's on the Technology Horizon for 2023
What's on the Technology Horizon for 2023
Brian Pichman474 visualizações
CES- Technology for the Future por Brian Pichman
CES- Technology for the FutureCES- Technology for the Future
CES- Technology for the Future
Brian Pichman90 visualizações

Último

SUPPLIER SOURCING.pptx por
SUPPLIER SOURCING.pptxSUPPLIER SOURCING.pptx
SUPPLIER SOURCING.pptxangelicacueva6
15 visualizações1 slide
Design Driven Network Assurance por
Design Driven Network AssuranceDesign Driven Network Assurance
Design Driven Network AssuranceNetwork Automation Forum
15 visualizações42 slides
PRODUCT LISTING.pptx por
PRODUCT LISTING.pptxPRODUCT LISTING.pptx
PRODUCT LISTING.pptxangelicacueva6
14 visualizações1 slide
AMAZON PRODUCT RESEARCH.pdf por
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdfJerikkLaureta
26 visualizações13 slides
PRODUCT PRESENTATION.pptx por
PRODUCT PRESENTATION.pptxPRODUCT PRESENTATION.pptx
PRODUCT PRESENTATION.pptxangelicacueva6
14 visualizações1 slide
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf por
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdfDr. Jimmy Schwarzkopf
19 visualizações29 slides

Último(20)

SUPPLIER SOURCING.pptx por angelicacueva6
SUPPLIER SOURCING.pptxSUPPLIER SOURCING.pptx
SUPPLIER SOURCING.pptx
angelicacueva615 visualizações
PRODUCT LISTING.pptx por angelicacueva6
PRODUCT LISTING.pptxPRODUCT LISTING.pptx
PRODUCT LISTING.pptx
angelicacueva614 visualizações
AMAZON PRODUCT RESEARCH.pdf por JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta26 visualizações
PRODUCT PRESENTATION.pptx por angelicacueva6
PRODUCT PRESENTATION.pptxPRODUCT PRESENTATION.pptx
PRODUCT PRESENTATION.pptx
angelicacueva614 visualizações
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf por Dr. Jimmy Schwarzkopf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
Dr. Jimmy Schwarzkopf19 visualizações
Data Integrity for Banking and Financial Services por Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely21 visualizações
Tunable Laser (1).pptx por Hajira Mahmood
Tunable Laser (1).pptxTunable Laser (1).pptx
Tunable Laser (1).pptx
Hajira Mahmood24 visualizações
PharoJS - Zürich Smalltalk Group Meetup November 2023 por Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi127 visualizações
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors por sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab19 visualizações
Democratising digital commerce in India-Report por Kapil Khandelwal (KK)
Democratising digital commerce in India-ReportDemocratising digital commerce in India-Report
Democratising digital commerce in India-Report
Kapil Khandelwal (KK)15 visualizações
Mini-Track: Challenges to Network Automation Adoption por Network Automation Forum
Mini-Track: Challenges to Network Automation AdoptionMini-Track: Challenges to Network Automation Adoption
Mini-Track: Challenges to Network Automation Adoption
Network Automation Forum12 visualizações
SAP Automation Using Bar Code and FIORI.pdf por Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
Virendra Rai, PMP23 visualizações
Ransomware is Knocking your Door_Final.pdf por Security Bootcamp
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp55 visualizações
Voice Logger - Telephony Integration Solution at Aegis por Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma39 visualizações
Five Things You SHOULD Know About Postman por Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman33 visualizações
STPI OctaNE CoE Brochure.pdf por madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb14 visualizações
Evolving the Network Automation Journey from Python to Platforms por Network Automation Forum
Evolving the Network Automation Journey from Python to PlatformsEvolving the Network Automation Journey from Python to Platforms
Evolving the Network Automation Journey from Python to Platforms
Network Automation Forum13 visualizações

Personal Internet Security Practice

  • 1. Personal Internet Security Practices Brian Pichman Twitter: @Bpichman
  • 3. Agenda • Understanding Anonymity, Privacy, and Everything in Between • Protecting Yourself • Getting Hacked • Protecting Your Environment
  • 5. Tools For Anonymity Making yourself more “invisible”
  • 6. Onion Routing, Tor Browsing • Technique for anonymous communication to take place over a network. The encryption takes place at three different times: • Entry Node • Relay Node • Exit Node • Tor is made up of volunteers running relay servers. No single router knows the entire network (only its to and from). • Tor can bypass internet content filtering, restricted government networks (like China) or allow people to be anonymous whistle blowers. • Tor allows you to gain access to “.onion” websites that are not accessible via a normal web browser. • Communication on the Dark Web happens, via Web, Telnet, IRC, and other means of communication being developed daily.
  • 7. Cloak of Invisibility Top reasons why people want to hide their IP address: 1. Hide their geographical location 2. Prevent Web tracking 3. Avoid leaving a digital footprint 4. Bypass any bans or blacklisting of their IP address 5. Perform illegal acts without being detected
  • 8. Cloak of Invisibility How do you Hide an 800lb Gorilla? • Use Free Wifi (To Hide your location) • Use a Secure Web Browser • Use a Private VPN • Go back to Dial-up • Setup RF Data Transfer over CB Radio Waves • Use Kali linux to hack someone else’s Wifi Encryption. • Setup long-range Wireless Antennas
  • 9. Cloak of Invisibility • How to hide yourself? • Private VPN • You want a TOTALLY anonymous service. • Look for one that keeps no log history (Verify via reviews) • Look at Bandwidth & Available Servers • Recommendations: • Private Internet Access (PIA) • TorGuard VPN • Pure VPN • Opera Web Browser • Avast AntiVirus (SecureLine) • Worst Case: Free WIFI
  • 10. Normal Users and How They Appear:
  • 12. Cloak of Invisibility • How Tor anonymizes – “You”. • How VPN keeps ”You” protected.
  • 13. Understanding Free Wifi • Sometimes a good alternative if you need to do something anonymously • Nothing is ever 100% anonymous • Some public wifi does track websites you access, what you do, etc. • Make sure your computer name you are using doesn’t include your actual name
  • 15. Hacked WiFi – Cain and Abel
  • 16. Best Tips and Practices For Connecting Privately Do • Use a device that you’ve never signed into anything ”personal on”. • Pro Tip: buy a computer from a Pawn Shop or Garage Sale • If using public WiFi; don’t make purchases with a credit card. Don’t • While on a VPN or any other anonymous tool; don’t sign into personal accounts (banks, social media, etc). • If posting, don’t use anything that could be associated to you
  • 17. Easy Wins for Privacy • 10 Minute Email • https://10minutemail.com/ • Temporarily get an email box that’s anonymous and disappears after 10 minutes • Dr Cleaner (Mac) or Eraser (Win) can overwrite files on your computer with “blank” data to make file recovery near impossible. • Tools like Recuva is free softwares to allow you to restore deleted files.
  • 19. You • Sites to protect yourself all the time (not free) • IdentiyGuard.com • LifeLock.com • Sites to monitor when breached data gets related (this is free) • Haveibeenpwned.com • Password Management Sites (like lastpass.com) • Don’t have the same password for all your sites. • Don’t write your passwords down on a post-it-note and leave it at your desk
  • 22. Google Isn’t Always Your Friend
  • 23. Dual Factor Authentication • After logging in; verify login via Email, SMS, or an app with a code.
  • 24. Credit Card Tools for Online Shopping • Check out Privacy.Com • https://privacy.com/join/473XB shameless plug
  • 25. Random Tips and Tricks • Accept only people you know to personal and professional accounts • Never click on links from people you don’t know. • Especially if they are using a url shortner: bit.ly, tinyurl.com, etc • https://www.urlvoid.com/ - test the website to see if its safe • https://snapito.com/ gets a screenshot of what will load on the site • If there are people claiming to be you on social media, it’s best to get your account “verified” on those social media platforms • This lets users distinguish that you’re the actual official account • Dual factor authenticate all of your social media logins
  • 26. More Sources • https://www.reddit.com/r/deepweb/ • DuckDuckGo.Com doesn’t track searches • Also lets you search of .onion sites when using TorBrowser to access.
  • 28. Myths • I’m not worth being attacked. • Hackers won’t guess my password. • I/we have anti-virus software. • I’ll/we know if I/we been compromised.
  • 29. Understanding Breaches and Hacks • A hack involves a person or group to gain authorized access to a protected computer or network • A breach typically indicates a release of confidential data (including those done by accident)
  • 32. The Costs Of Breaches • This year’s study found the average consolidated total cost of a data breach is 3.9 million dollars and in the US the average is actually higher at 8.19 million. [IBM 2019 http://www-03.ibm.com/security/data-breach/] • Data Breached Companies Experience… • People loose faith in your brand • Loss in patrons • Financial Costs • Government Requirements, Penalties, Fees, etc. • Sending of Notifications • Payment of Identity Protection or repercussions. https://betanews.com/2016/02/10/the-economic-cost-of-being-hacked/
  • 34. Protecting Your Home You home threats Data and Information
  • 35. Why do People Attack? • Financial Gain • Stocks • Getting Paid • Selling of information • Data Theft • For a single person • For a bundle of people • Just Because • Malicious
  • 37. Outside • Modem Router Firewall Switches • Servers End User • Phones • Computers • Laptops
  • 38. Outer Defenses (Routers/Firewalls) • Site to Site Protection (Router to Router or Firewall to Firewall) • Encrypted over a VPN Connection • Protection With: • IDS • IPS • Web filtering • Antivirus at Web Level • Protecting INBOUND and OUTBOUND
  • 39. Unified Threat Management • Single Device Security • All traffic is routed through a unified threat management device.
  • 40. Areas of Attack On Outer Defense External Facing Applications • Anything with an “External IP” • NAT, ONE to ONE, etc. • Website • Custom Built Web Applications or Services Internal Applications • File Shares • Active Directory (usernames / passwords) • Patron Records • DNS Routing • Outbound Network Traffic • Who is going where
  • 41. Attacks • Man in the Middle • Sitting between a conversation and either listening or altering the data as its sent across. • DNS Spoofing (https://null-byte.wonderhowto.com/how-to/hack-like-pro-spoof-dns- lan-redirect-traffic-your-fake-website-0151620/) set up a fake website and let people login to it. • D/DoS Attack (Distributed/Denial of Service Attack) • Directing a large amount of traffic to disrupt service to a particular box or an entire network. • Could be done via sending bad traffic or data • That device can be brought down to an unrecoverable state to disrupt business operations. • Sniffing Attacks • Monitoring of data and traffic to determine what people are doing.
  • 43. Inner Defenses (Switches/Server Configs) • Protecting Internal Traffic, Outbound Traffic, and Inbound Traffic • Internal Traffic = device to device • Servers • Printers • Computers • Protected By: • Software Configurations • Group Policy • Password Policy • Hardware Configurations • Routing Rules
  • 44. So…What Can You Do With Just This:
  • 45. Updates, Patches, Firmware • Keeping your system updated is important. • Being on the latest and greatest [software/update/firmware] isn’t always good – but security updates are usually key and super important.
  • 46. Passwords • Let’s talk about Passwords • Length of Password • Complexity of password requirements • DO NOT USE POST IT NOTES
  • 51. Setting It Up • It’s simple, you will just want to update your router’s DNS entry (or if you wanted, you can do this directly on the device you wish to protect) • 208.67.222.123 • 208.67.220.123
  • 52. Your Wireless Router • Have your wireless connection protected by a password to join • Have your wireless password interface ALSO protect with a password (that isn’t the default password either)
  • 53. Other Tools To Protect The Computer
  • 56. Google Accounts for Kids • https://support.google.com/families/answer/7103338?hl=en
  • 58. Understanding Wireless Encryption • Open (risky): Open Wi-Fi networks have no passphrase. You shouldn’t set up an open Wi-Fi network— • WEP 64 (risky): The old WEP protocol standard is vulnerable and you really shouldn’t use it. • WEP 128 (risky): This is WEP, but with a larger encryption key size. It isn’t really any less vulnerable than WEP 64. • WPA-PSK (TKIP): This uses the original version of the WPA protocol (essentially WPA1). It has been superseded by WPA2 and isn’t secure. • WPA-PSK (AES): This uses the original WPA protocol, but replaces TKIP with the more modern AES encryption. It’s offered as a stopgap, but devices that support AES will almost always support WPA2, while devices that require WPA will almost never support AES encryption. So, this option makes little sense. • WPA2-PSK (TKIP): This uses the modern WPA2 standard with older TKIP encryption. This isn’t secure, and is only a good idea if you have older devices that can’t connect to a WPA2-PSK (AES) network. • WPA2-PSK (AES): This is the most secure option. It uses WPA2, the latest Wi-Fi encryption standard, and the latest AES encryption protocol. You should be using this option. On some devices, you’ll just see the option “WPA2” or “WPA2-PSK.” If you do, it will probably just use AES, as that’s a common-sense choice. • WPAWPA2-PSK (TKIP/AES): Some devices offer—and even recommend—this mixed-mode option. This option enables both WPA and WPA2, with both TKIP and AES. This provides maximum compatibility with any ancient devices you might have, but also allows an attacker to breach your network by cracking the more vulnerable WPA and TKIP protocols. https://www.howtogeek.com/204697/wi-fi-security-should-you-use-wpa2-aes-wpa2-tkip-or-both
  • 59. What’s the “Guest” Network On My Router • You can set up a “Guest” network for when people come over, you can have your network segmented out so they can’t see the other content/devices in your home: • Shared Photos and Files on a Personal Computer • Access to GoogleHome / Apple TV / etc
  • 61. What does HTTPS Do? • HTTPS verifies the identity of a website and encrypts nearly all information sent between the website and the user. • Protected information includes cookies, user agent details, URL paths, form submissions, and query string parameters. • HTTPS is a combination of HTTP and Transport Layer Security (TLS). • Browsers and other HTTPS clients are configured to trust a set of certificate authorities that can issue cryptographically signed certificates on behalf of web service owners.
  • 62. What Doesn’t HTTPS Do? • HTTPS has several important limitations. • IP addresses and destination domain names are not encrypted. • Even encrypted traffic can reveal some information indirectly, such as time spent on site, or the size of requested resources or submitted information. • HTTPS only guarantees the integrity of the connection between two systems, not the systems themselves. • It is not designed to protect a web server from being hacked. • If a user’s system is compromised by an attacker, that system can be altered so that its future HTTPS connections are under the attacker’s control.
  • 63. Why HTTPS? • Prevents Hackers from watching what you do over the Internet • Encrypts Data • Keeps stuff private • Keeps you safe • Prevents people from tracking your internet activity • Unencrypted HTTP request reveals information about a user’s behavior. The HTTP protocol does not protect data from interception or alteration.
  • 64. Your Security is as Strong As the Weakest Link
  • 65. Learn and Practice Cybersecurity • Learn to identify a scam email • Understanding the “fake” Facebook friends • Being careful of links you don’t recognize through email, search, or posts on social media. • Take webinars and free classes to learn about these things – have honest and open conversations
  • 66. • Evolve Project • https://www.linkedin.com/in/bpichman • Twitter: @bpichman • Email: bpichman@evolveproject.org • Slideshare.net/bpichman Brian Pichman Questions?

Notas do Editor

  1. http://www.pcmag.com/article2/0,2817,2403388,00.asp
  2. https://en.wikipedia.org/wiki/BackTrack
  3. Infrastructure: Network (Switches, Routers, Firewalls, Modem) WiFi Network VPN Connections Servers (File Storage, Active Directory, Application Servers). Phone System, Security System, Website, etc. End Clients End User PCs and other Peripherals Copiers, Scanners, Printers Software
  4. HTTPS verifies the identity of a website or web service for a connecting client, and encrypts nearly all information sent between the website or service and the user. Protected information includes cookies, user agent details, URL paths, form submissions, and query string parameters. HTTPS is designed to prevent this information from being read or changed while in transit. HTTPS is a combination of HTTP and Transport Layer Security (TLS). TLS is a network protocol that establishes an encrypted connection to an authenticated peer over an untrusted network. Browsers and other HTTPS clients are configured to trust a set of certificate authorities [2] that can issue cryptographically signed certificates on behalf of web service owners. These certificates communicate to the client that the web service host demonstrated ownership of the domain to the certificate authority at the time of certificate issuance. This prevents unknown or untrusted websites from masquerading as a Federal website or service.
  5. What HTTPS Doesn’t Do HTTPS has several important limitations. IP addresses and destination domain names are not encrypted during communication. Even encrypted traffic can reveal some information indirectly, such as time spent on site, or the size of requested resources or submitted information. HTTPS only guarantees the integrity of the connection between two systems, not the systems themselves. It is not designed to protect a web server from being hacked or compromised, or to prevent the web service from exposing user information during its normal operation. Similarly, if a user’s system is compromised by an attacker, that system can be altered so that its future HTTPS connections are under the attacker’s control. The guarantees of HTTPS may also be weakened or eliminated by compromised or malicious certificate authorities.
  6. Data sent over HTTP is susceptible to interception, manipulation, and impersonation. This data can include browser identity, website content, search terms, and other user-submitted information.