cybersecurity - nsa style

25
5 NSA CYBERSECURITY TIPS cc: Simon Greig Photo - https://www.flickr.com/photos/32563803@N00

Upload: paul-mcgillicuddy

Post on 16-Apr-2017

13.005 views

Category:

Business


2 download

TRANSCRIPT

Page 1: Cybersecurity - NSA Style

5 NSA CYBERSECURITY TIPS

cc: Simon Greig Photo - https://www.flickr.com/photos/32563803@N00

Page 2: Cybersecurity - NSA Style

THESE TIPS ARE STRAIGHTFROM THE NSA WEBSITE

cc: RuffLife - https://www.flickr.com/photos/40993822@N06

Page 3: Cybersecurity - NSA Style

WWW.NSA.GOV/IA

cc: AMWRanes - https://www.flickr.com/photos/59525567@N00

Page 4: Cybersecurity - NSA Style

TELLS ME THESE WILL NEGATE 95% OF ALL ATTACKS

MY NSA CONNECTION

cc: MANYBITS - https://www.flickr.com/photos/38176611@N04

Page 5: Cybersecurity - NSA Style

THEY'RE SIMPLE

AND INEXPENSIVEcc: Dave Dugdale - https://www.flickr.com/photos/37387065@N05

Page 6: Cybersecurity - NSA Style

1. USE WHITELISTS

cc: Ludwig Gatzke - https://www.flickr.com/photos/16851909@N00

Page 7: Cybersecurity - NSA Style

BY DEFAULTEVERYTHING ELSE IS BLOCKED

cc: timothymeaney - https://www.flickr.com/photos/41101678@N00

Page 8: Cybersecurity - NSA Style

DECIDE WHICH PROGRAMS ARE ALLOWED TO RUN

ONLY ADMINISTRATORS

cc: USAID_IMAGES - https://www.flickr.com/photos/46658241@N06

Page 9: Cybersecurity - NSA Style

2. CONTROL ADMIN PRIVILEGES

cc: Poster Boy NYC - https://www.flickr.com/photos/26296445@N05

Page 10: Cybersecurity - NSA Style

GRANT PRIVILEGESONLY WHEN ABSOLUTELY NECESSARY

cc: colemama - https://www.flickr.com/photos/33901022@N00

Page 11: Cybersecurity - NSA Style

LOG & MONITOR

ADMINISTRATOR ACTIVITYcc: casey.marshall - https://www.flickr.com/photos/25299470@N00

Page 12: Cybersecurity - NSA Style

ADMINSTRATIVE ACCOUNTS

• No email account • Not connected to internet • Two factor access

cc: chrisinplymouth - https://www.flickr.com/photos/21450297@N06

Page 13: Cybersecurity - NSA Style

ADMINISTRATOR PASSWORDS

• Can't reuse • Greater than 14 characters • Must change frequently • Good policy for entire

organization

cc: mkandlez - https://www.flickr.com/photos/25541021@N00

Page 14: Cybersecurity - NSA Style

RESTRICT WHERE & WHENADMINISTRATORS CAN ROAM

cc: samgrover - https://www.flickr.com/photos/44124379481@N01

Page 15: Cybersecurity - NSA Style

3. LIMIT WORKSTATION TO WORKSTATION

COMMUNICATION

cc: Wiertz Sébastien - https://www.flickr.com/photos/36169570@N08

Page 16: Cybersecurity - NSA Style

REALLY?HARD TO BELIEVE IT'S STILL ALLOWED ANYWHERE

cc: Greencolander - https://www.flickr.com/photos/37539977@N00

Page 17: Cybersecurity - NSA Style

4. USE ANTI-VIRUSFILE-REPUTATION-SERVICE

cc: Bruno Santos - https://www.flickr.com/photos/65062705@N00

Page 18: Cybersecurity - NSA Style

MUST HAVE

COMPLETE THREAT PICTURE AT ALL TIMEScc: Hkuchera - https://www.flickr.com/photos/59263064@N00

Page 19: Cybersecurity - NSA Style

WITHIN SECONDS INSTEAD OF HOURS OR DAYS

UPDATEScc: wwarby - https://www.flickr.com/photos/26782864@N00

Page 20: Cybersecurity - NSA Style

5. ANTI-EXPLOITATIONTURN IT ON

cc: moofbong - https://www.flickr.com/photos/81314692@N00

Page 21: Cybersecurity - NSA Style

IS USUALLY A HACKER'S FIRST STEP

EXPLOITATIONcc: dustball - https://www.flickr.com/photos/85783274@N00

Page 22: Cybersecurity - NSA Style

EFFECTIVE AGAINST

COMMON ATTACKScc: Tddy - https://www.flickr.com/photos/40434084@N06

Page 23: Cybersecurity - NSA Style

STANDARD EQUIPMENT

AND IT'S FREEcc: othree - https://www.flickr.com/photos/12452841@N00

Page 24: Cybersecurity - NSA Style

IMPLEMENT THESE STEPSTODAY

cc: c.fuentes2007 - https://www.flickr.com/photos/22143940@N08