information security fundamentals david veksler. who is this talk for? non it experts non it experts...

39
Information Security Information Security Fundamentals Fundamentals David Veksler David Veksler

Upload: bailey-tasker

Post on 15-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Information Security Information Security FundamentalsFundamentals

David VekslerDavid Veksler

Page 2: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Who is this talk for?Who is this talk for?

• Non IT experts Non IT experts

• Those working with confidential informationThose working with confidential information

• Especially in parts of the world with high Especially in parts of the world with high informational security risksinformational security risks

Page 3: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Why should I care about Why should I care about security?security?• Can’t I just hire someone and/or install Can’t I just hire someone and/or install

software to protect myself?software to protect myself?

Page 4: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Why should I care about Why should I care about security?security?

• In most organizations, any IT administrator can read and In most organizations, any IT administrator can read and alter any other employees email without any knowledge or alter any other employees email without any knowledge or record.record.

• Mr Smith was an executive building a new manufacturing plant in China. The Mr Smith was an executive building a new manufacturing plant in China. The support technicians in his IT department have access to the corporate mail support technicians in his IT department have access to the corporate mail server. One of them was hired by a competitor. Before he left, he logged on to server. One of them was hired by a competitor. Before he left, he logged on to the mail server and downloaded the entire mail archive for Mr Smith, including the mail server and downloaded the entire mail archive for Mr Smith, including the design plans for the new assembly line. The company did not discover the design plans for the new assembly line. The company did not discover about the leak until the competitor built their own production line and release a about the leak until the competitor built their own production line and release a competing product on the market.competing product on the market.

Page 5: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Why should I care about Why should I care about security?security?

• A tiny device with a build-in cellular modem can act A tiny device with a build-in cellular modem can act as a Trojan horse to open your network to outsiders.as a Trojan horse to open your network to outsiders.

• Widget Corp produces software for sale worldwide. A agent for their Widget Corp produces software for sale worldwide. A agent for their competitors walked into one of their offices and installed a plugbot competitors walked into one of their offices and installed a plugbot (theplugbot.com). The plugbot was able to sniff a domain password (theplugbot.com). The plugbot was able to sniff a domain password and send it over the built-in cellular modem. From there, the attacker and send it over the built-in cellular modem. From there, the attacker established remote access to the corporate data server. A few months established remote access to the corporate data server. A few months later, Widget Corp's suddenly had a new competitor in the market. later, Widget Corp's suddenly had a new competitor in the market.

Page 6: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Why should I care about Why should I care about security?security?

• "It has become the Wild West on that other side of the globe. There is "It has become the Wild West on that other side of the globe. There is little or no respect for Intellectual Property. Copyrights and patents are little or no respect for Intellectual Property. Copyrights and patents are ignored. Accounting issues have recently also come into question for ignored. Accounting issues have recently also come into question for many Chinese companies that have bought U.S. shell corporations to many Chinese companies that have bought U.S. shell corporations to simplify the process of going public in the West. Rough and tumble simplify the process of going public in the West. Rough and tumble attitudes must be expected. Any American company doing business in attitudes must be expected. Any American company doing business in China must anticipate the worst even as it hopes for the best in China must anticipate the worst even as it hopes for the best in expanded marketing opportunities."expanded marketing opportunities."

• http://www.forbes.com/sites/joanlappin/2011/09/21/american-http://www.forbes.com/sites/joanlappin/2011/09/21/american-superconductor-destroyed-for-a-tiny-bribe/superconductor-destroyed-for-a-tiny-bribe/

Page 7: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Why should I care about Why should I care about security?security?• "In terms of outright theft of intellectual property, there is "In terms of outright theft of intellectual property, there is

growing evidence that China’s intelligence agencies are growing evidence that China’s intelligence agencies are involved, as attacks spread from hits on large technology involved, as attacks spread from hits on large technology companies to the hacking of startups and even law firms. companies to the hacking of startups and even law firms. “The government can basically put their hands in and “The government can basically put their hands in and take whatever they want,” says Michael Wessel, who sits take whatever they want,” says Michael Wessel, who sits on the U.S.-China Economic and Security Review on the U.S.-China Economic and Security Review Commission that reports to Congress. “We need to take Commission that reports to Congress. “We need to take more actions and protect our intellectual property.”more actions and protect our intellectual property.”

• Inside the Chinese Boom in Corporate Espionage Inside the Chinese Boom in Corporate Espionage (http://www.businessweek.com/articles/2012-03-14/inside-(http://www.businessweek.com/articles/2012-03-14/inside-the-chinese-boom-in-corporate-espionage)the-chinese-boom-in-corporate-espionage)

Page 8: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Why should I care about Why should I care about security?security?

• ““There have been a large number of corporate spying cases involving China recently… as the toll s the toll adds up, political leaders and intelligence officials in adds up, political leaders and intelligence officials in the U.S. and Europe are coming to a disturbing the U.S. and Europe are coming to a disturbing conclusion. “It’s the greatest transfer of wealth in conclusion. “It’s the greatest transfer of wealth in history,” General Keith Alexander, director of the history,” General Keith Alexander, director of the National Security Agency, said at a security National Security Agency, said at a security conference at New York’s Fordham University in conference at New York’s Fordham University in January.”January.”

Page 9: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Why should I care about Why should I care about security?security?

• ““There have been a large number of corporate spying cases involving China recently… as the toll s the toll adds up, political leaders and intelligence officials in adds up, political leaders and intelligence officials in the U.S. and Europe are coming to a disturbing the U.S. and Europe are coming to a disturbing conclusion. “It’s the greatest transfer of wealth in conclusion. “It’s the greatest transfer of wealth in history,” General Keith Alexander, director of the history,” General Keith Alexander, director of the National Security Agency, said at a security National Security Agency, said at a security conference at New York’s Fordham University in conference at New York’s Fordham University in January.”January.”

Page 10: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those
Page 11: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

ContentsContents

• Part 1: Secure web browsingPart 1: Secure web browsing• Part 2: Secure networksPart 2: Secure networks• Part 3: Secure email and IMPart 3: Secure email and IM• Part 4: Securing operating systems & Part 4: Securing operating systems &

mobile devicesmobile devices• Part 5: Securing organizationsPart 5: Securing organizations• Conclusion: limitations of security Conclusion: limitations of security

measuresmeasures

Page 12: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Choosing a web browserChoosing a web browser

Why web browsers matterWhy web browsers matter

Internet Explorer: upgrade to 9+ or switch Internet Explorer: upgrade to 9+ or switch to:to:

Chrome: recommended for personal use : recommended for personal use

Get HTTPS Everywhere & AdBlockGet HTTPS Everywhere & AdBlock

Firefox as a multi-toolFirefox as a multi-tool

Page 13: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Plugging privacy leaksPlugging privacy leaks

Keep your browser up to dateKeep your browser up to date

Disable unused pluginsDisable unused plugins

AdBlock: it’s not just for blocking ads: it’s not just for blocking ads

Block third party cookiesBlock third party cookies

Using Private ModeUsing Private Mode

Cleaning your tracks with Cleaning your tracks with CC Cleaner

Page 14: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Securing your surfingSecuring your surfing

HTTPS Everywhere

OpenDNS//Google DNS

DNSCrypt

VPN (details later)VPN (details later)

Page 15: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Advanced: monitoring Advanced: monitoring web trafficweb traffic

Outgoing firewalls:Outgoing firewalls:

Zone Alarm (Windows) (Windows)

Little Snitch (OS X) (OS X)

Monitoring network traffic with Monitoring network traffic with Wireshark

Page 16: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Part 2: Secure Part 2: Secure Networks: Virtual Networks: Virtual Private NetworksPrivate Networks

VPN optionsVPN options

PPTP: simple, supported by mobile devices, PPTP: simple, supported by mobile devices, only safe for personal useonly safe for personal use

L2TP: best for corporations: supports digital L2TP: best for corporations: supports digital certificatescertificates

  Open VPN: free, open-sourceOpen VPN: free, open-source

Page 17: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Alternative VPN Alternative VPN SolutionsSolutions

LogMeIn Hamachi: simple ad-hoc and hub : simple ad-hoc and hub and spoke VPNand spoke VPN

SSH Tunneling        

Page 18: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Browser helpers for Browser helpers for VPNsVPNs

Proxy Switchy (Chrome)(Chrome)

Foxy Proxy (Firefox)(Firefox)

Proxy Scripting – works with Proxy Switchy Proxy Scripting – works with Proxy Switchy when configured in Chrome (IE)when configured in Chrome (IE)

Page 19: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Advanced: Running your Advanced: Running your own proxyown proxy

• Why run a proxy locally?Why run a proxy locally?

• Optimize, secure, accelerate trafficOptimize, secure, accelerate traffic

• Control access to outside networkControl access to outside network

Privoxy (recommended) (recommended)

GlimmerBlocker (OS X) (OS X)

Squid (Unix) (Unix)

Polipo (Unix, Windows, OS X) (Unix, Windows, OS X)

Page 20: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Part 3: Secure Email and Part 3: Secure Email and IM: Encryption ToolsIM: Encryption Tools

Page 21: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Symmetric encryptionSymmetric encryption

Page 22: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Asymmetric encryptionAsymmetric encryption

Page 23: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Secure EmailSecure Email

Corporate E-mail: Digital Certificates & Corporate E-mail: Digital Certificates & SigningSigning

Get a free cert at Get a free cert at http://startssl.com/

PGP: PGP: PGP Desktop , ,GnuPG

Page 24: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Secure Instant Secure Instant MessagingMessaging

Corporate Instant Messaging:Corporate Instant Messaging:

Microsoft: Skype, Lynx, Office Microsoft: Skype, Lynx, Office Communication ServerCommunication Server

Personal Instant MessagingPersonal Instant Messaging

Off-The-Record plugin for: plugin for:

Pidgin (Windows), (Windows), Adium (OS X)(OS X)

Page 25: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Part 4: Securing Part 4: Securing Operating Systems: OS Operating Systems: OS HardeningHardening

Page 26: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Basic OS HardeningBasic OS Hardening

• Secure your login mechanismSecure your login mechanism

• Password protect access to your desktopPassword protect access to your desktop

• Admin privileges & user level accounts: run as Admin privileges & user level accounts: run as a user-level account; require password to logina user-level account; require password to login

• Disable file sharing on the networkDisable file sharing on the network

• Enable automatic updatesEnable automatic updates

• Disable unused user accountsDisable unused user accounts

Page 27: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Anti-Virus OptionsAnti-Virus Options• Do you need Anti-Virus software?Do you need Anti-Virus software?

• Anti-Virus for IndividualsAnti-Virus for Individuals

• Windows Defender

• Avast

• Many free options

• F-Secure, Trend Micro Office ScanF-Secure, Trend Micro Office Scan

• Tip: Don't use Norton or McAfee!Tip: Don't use Norton or McAfee!

Page 28: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Anti-Malware OptionsAnti-Malware Options

• Do you need Anti-Malware software?Do you need Anti-Malware software?

• Recommended Anti-Malware:Recommended Anti-Malware:

• Microsoft’s Windows Defender

• Spybot S&D (Free)Spybot S&D (Free)

• Malware Bytes (Free/Pro) (Free/Pro)

Page 29: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Whole disk encryptionWhole disk encryption

• What is it? Do you need it?What is it? Do you need it?

• True Crypt (multiplatform)True Crypt (multiplatform)

•   Bitlocker (Windows)Bitlocker (Windows)

• File Vault (Apple)File Vault (Apple)

• PGP Whole Disk EncryptionPGP Whole Disk Encryption

• Symantec Endpoint EncryptionSymantec Endpoint Encryption

Page 30: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Advanced: Tips from the Advanced: Tips from the ProsPros

• OS Hardening guides from the NSAOS Hardening guides from the NSA

• Windows:Windows:

• OS XOS X

• Security tips from the NSA for all OS’s

Page 31: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Advanced: OS IsolationAdvanced: OS Isolation

• Portable (Live) OS

• Portable apps

• Virtual Machines

• Only an “air gap” is safe for mission critical data!

Page 32: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

OS Specific OS Specific ConsiderationsConsiderations

• OpenBSD: when security is mission-criticalOpenBSD: when security is mission-critical

• LinuxLinux

• Windows Server 2008Windows Server 2008

• Windows XPWindows XP

• Windows 7Windows 7

• OS XOS X

Page 33: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Securing your Securing your smartphonesmartphone

• Notes on locking:Notes on locking:

• Only protects against casual Only protects against casual thefttheft

• Cloud storage risksCloud storage risks

• Remote wipesRemote wipes

Page 34: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Part 5: Secure Part 5: Secure Organizations: physical Organizations: physical security, social security, social engineering, and other engineering, and other considerationsconsiderations

Page 35: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Physical security Physical security

• Human factors

• Physical securityPhysical security

• International travelInternational travel

• Asset management & theft preventionAsset management & theft prevention

Page 36: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Social EngineeringSocial Engineering

• Inside threatsInside threats• Social engineeringSocial engineering• ““Need to access” policiesNeed to access” policies

Page 37: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Advanced: Threat discovery

• Process ExplorerProcess Explorer

• Rootkit detectors:Rootkit detectors:

• Microsoft: Rootkit RevealerMicrosoft: Rootkit Revealer

• Avast: GMER Avast: GMER

• RootkitHunter RootkitHunter 

Page 38: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

Conclusion: Conclusion: Limitations of Limitations of Information SecurityInformation Security

• Limitations of software measures

• Limitations of hardware measures

• Cost vs. benefit of security measures

Page 39: Information Security Fundamentals David Veksler. Who is this talk for? Non IT experts Non IT experts Those working with confidential information Those

The EndThe End

Technologies mentioned in this Technologies mentioned in this presentation have links to more presentation have links to more information – get a copy of the information – get a copy of the PowerPoint from me PowerPoint from me ([email protected]).([email protected]).