O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.
DSD 101: Tips, Tools, and
Best Practices to Stay Safe Online
Ben Woelk
ISO Program Manager
infosec@rit.edu
2
You’re a Target. Why?
• Enter your ideas into the chat
3
You’re a Target. Why?
4
Top online safety practices?
• What should someone do to stay safe online?
• Enter your recommendations into the chat
5
Top online safety practices?
http://googleonlinesecurity.blogspot.com/2015/07/new‐research‐comparing‐how‐security.html
6
Protecting Your
Computer and
Information
https://www.rit.edu/security/content/desktop‐
and‐portable‐computer‐security‐stan...
Protecting Your
Computer and
Information
• Policies and Standards
https://www.rit.edu/security/content/desktop‐
and‐portab...
Protecting Your
Computer and
Information
• Policies and Standards
• Anti‐virus
https://www.rit.edu/security/content/deskto...
Protecting Your
Computer and
Information
• Policies and Standards
• Anti‐virus
• Firewalls
https://www.rit.edu/security/co...
Protecting Your
Computer and
Information
• Policies and Standards
• Anti‐virus
• Firewalls
• Patching and updates
https://...
Protecting Your
Computer and
Information
• Policies and Standards
• Anti‐virus
• Firewalls
• Patching and updates
• Passwo...
http://xkcd.com/936/
Passwords/Passphrases
https://www.rit.edu/security/content/password
13
How Strong is Your Password?
https://www.grc.com/haystack.htm
14
Six all lower case letters
15
Change one letter to a
number
16
Change one letter to
uppercase
17
Change one letter to a
special character
18
Add length—8 characters
19
10 characters
20
12 characters
21
Passphrases
It was a dark and 
stormy night 
22
Passphrases
It was a dark and 
stormy night 
becomes
23
Passphrases
It was a dark and 
stormy night 
becomes
ItwasaDark215&StormyNight
24
Passphrases
It was a dark and 
stormy night 
becomes
ItwasaDark215&StormyNight
Length   > complexity
25
Our passphrase—
25 characters
26
Password Managers
27
Quiz Slide
• Do you use a password manager?
• Yes
• No
• ???
28
Multi-Factor Authentication
29
www.turnon2FA.com
30
Most Common Way of Getting
a Password?
• Enter your ideas into the chat
31
Most Common Way of Getting
a Password?
32
Most Common Way of Getting
a Password?
Fraud, Scams, and Malware
• Employee Information
• Invoices
• Attachments
33
http://www.csoonline.com/article/3091795/secu...
Protecting
your
identity
34
Ransomware
35
What are the Top Three Ways to
Protect Yourself?
36
37
Mobile Devices,
Smartphones, Tablets
• Protection commensurate with risk of information accessed or 
stored
• Storage of p...
QUIZ--Mobile Security Apps
• Do you have a mobile security app on your phone?
• Yes
• No
39
Mobile Security Apps
• Lookout Security & Antivirus (Android, iOS)
• Avast Mobile Security (Android)
• Avast SecureMe (iOS...
Protecting	Your	
Information
41
https://www.rit.edu/security/content/infor
mation‐access‐protection‐standard
Never
assume
privacy
Learn and set social network privacy settings
42
Privacy Settings
43
Login Alerts
44
Google Alerts
Monitor 
use of 
your 
name
45
Google My Account Dashboard
46
Google Reverse Image Search
• See how often that LinkedIn profile photo is being used.
• Go to LinkedIn profile.
• Chrome—...
Protecting
Your
Reputation
48
Questions (and maybe some
answers)
Ben Woelk
Ben.woelk@rit.edu
ben@benwoelk.com
49
Benwoelk.com
50
Resources
• RIT Information Security Standards
http://www.rit.edu/security 
• Google Research on User vs Expert Practices
...
Próximos SlideShares
Carregando em…5
×

Digital self defense 101 me rit

46 visualizações

Publicada em

Staying safe online presentation by Ben Woelk CISSP. Creative Commons 3.0 license.

Publicada em: Tecnologia
  • Seja o primeiro a comentar

  • Seja a primeira pessoa a gostar disto

Digital self defense 101 me rit

  1. 1. DSD 101: Tips, Tools, and Best Practices to Stay Safe Online Ben Woelk ISO Program Manager infosec@rit.edu
  2. 2. 2
  3. 3. You’re a Target. Why? • Enter your ideas into the chat 3
  4. 4. You’re a Target. Why? 4
  5. 5. Top online safety practices? • What should someone do to stay safe online? • Enter your recommendations into the chat 5
  6. 6. Top online safety practices? http://googleonlinesecurity.blogspot.com/2015/07/new‐research‐comparing‐how‐security.html 6
  7. 7. Protecting Your Computer and Information https://www.rit.edu/security/content/desktop‐ and‐portable‐computer‐security‐standard (Additional standards/requirements  https://www.rit.edu/security/content/requirement s‐facultystaff) 7
  8. 8. Protecting Your Computer and Information • Policies and Standards https://www.rit.edu/security/content/desktop‐ and‐portable‐computer‐security‐standard (Additional standards/requirements  https://www.rit.edu/security/content/requirement s‐facultystaff) 8
  9. 9. Protecting Your Computer and Information • Policies and Standards • Anti‐virus https://www.rit.edu/security/content/desktop‐ and‐portable‐computer‐security‐standard (Additional standards/requirements  https://www.rit.edu/security/content/requirement s‐facultystaff) 9
  10. 10. Protecting Your Computer and Information • Policies and Standards • Anti‐virus • Firewalls https://www.rit.edu/security/content/desktop‐ and‐portable‐computer‐security‐standard (Additional standards/requirements  https://www.rit.edu/security/content/requirement s‐facultystaff) 10
  11. 11. Protecting Your Computer and Information • Policies and Standards • Anti‐virus • Firewalls • Patching and updates https://www.rit.edu/security/content/desktop‐ and‐portable‐computer‐security‐standard (Additional standards/requirements  https://www.rit.edu/security/content/requirement s‐facultystaff) 11
  12. 12. Protecting Your Computer and Information • Policies and Standards • Anti‐virus • Firewalls • Patching and updates • Passwords/passphrases https://www.rit.edu/security/content/desktop‐ and‐portable‐computer‐security‐standard (Additional standards/requirements  https://www.rit.edu/security/content/requirement s‐facultystaff) 12
  13. 13. http://xkcd.com/936/ Passwords/Passphrases https://www.rit.edu/security/content/password 13
  14. 14. How Strong is Your Password? https://www.grc.com/haystack.htm 14
  15. 15. Six all lower case letters 15
  16. 16. Change one letter to a number 16
  17. 17. Change one letter to uppercase 17
  18. 18. Change one letter to a special character 18
  19. 19. Add length—8 characters 19
  20. 20. 10 characters 20
  21. 21. 12 characters 21
  22. 22. Passphrases It was a dark and  stormy night  22
  23. 23. Passphrases It was a dark and  stormy night  becomes 23
  24. 24. Passphrases It was a dark and  stormy night  becomes ItwasaDark215&StormyNight 24
  25. 25. Passphrases It was a dark and  stormy night  becomes ItwasaDark215&StormyNight Length   > complexity 25
  26. 26. Our passphrase— 25 characters 26
  27. 27. Password Managers 27
  28. 28. Quiz Slide • Do you use a password manager? • Yes • No • ??? 28
  29. 29. Multi-Factor Authentication 29 www.turnon2FA.com
  30. 30. 30 Most Common Way of Getting a Password? • Enter your ideas into the chat
  31. 31. 31 Most Common Way of Getting a Password?
  32. 32. 32 Most Common Way of Getting a Password?
  33. 33. Fraud, Scams, and Malware • Employee Information • Invoices • Attachments 33 http://www.csoonline.com/article/3091795/security/phishing‐scam‐focuses‐on‐the‐basics‐to‐harvest‐ business‐credentials.html
  34. 34. Protecting your identity 34
  35. 35. Ransomware 35
  36. 36. What are the Top Three Ways to Protect Yourself? 36
  37. 37. 37
  38. 38. Mobile Devices, Smartphones, Tablets • Protection commensurate with risk of information accessed or  stored • Storage of private information is prohibited https://www.rit.edu/security/content/desktop‐HTMLStandard 38
  39. 39. QUIZ--Mobile Security Apps • Do you have a mobile security app on your phone? • Yes • No 39
  40. 40. Mobile Security Apps • Lookout Security & Antivirus (Android, iOS) • Avast Mobile Security (Android) • Avast SecureMe (iOS) • Google Authenticator (Android, iOS) • Find My iPhone (iOS) • iVault (iOS) 40
  41. 41. Protecting Your Information 41 https://www.rit.edu/security/content/infor mation‐access‐protection‐standard
  42. 42. Never assume privacy Learn and set social network privacy settings 42
  43. 43. Privacy Settings 43
  44. 44. Login Alerts 44
  45. 45. Google Alerts Monitor  use of  your  name 45
  46. 46. Google My Account Dashboard 46
  47. 47. Google Reverse Image Search • See how often that LinkedIn profile photo is being used. • Go to LinkedIn profile. • Chrome—Right click on image and choose  Search Google for Image • Right click on image. Copy image address. • Click on camera icon in Google search  window. • Paste in image address. 47
  48. 48. Protecting Your Reputation 48
  49. 49. Questions (and maybe some answers) Ben Woelk Ben.woelk@rit.edu ben@benwoelk.com 49
  50. 50. Benwoelk.com 50
  51. 51. Resources • RIT Information Security Standards http://www.rit.edu/security  • Google Research on User vs Expert Practices http://googleonlinesecurity.blogspot.com/2015/07/new‐ research‐comparing‐how‐security.html 51

×