lkw security part 1_mvps azra & sanjay

26
LimKokWing University Security and Windows 7 SanjayW – MVP (Security) Azra Rizal – MVP (Security)

Upload: quek-lilian

Post on 14-May-2015

424 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: Lkw Security Part 1_MVPs Azra & Sanjay

LimKokWing University

Security and Windows 7

SanjayW – MVP (Security)Azra Rizal – MVP (Security)

Page 2: Lkw Security Part 1_MVPs Azra & Sanjay

TopicsWhy anyone should care about information security?Introduction & GoalsThe 10 security misconceptionsNew and emerging threatsProtecting privacy and information with Windows 7 and other Microsoft solutions

Demos

Certifications – Your competitive advantage

Page 3: Lkw Security Part 1_MVPs Azra & Sanjay

Why anyone should care about information security?

Just about every professional discipline uses computersKeeping your data, yoursThe InternetSocial engineering

Knowledge is power

Threat of espionage If you don’t then who will?It is your responsibility, legally speaking!It’s a lifelong benefit

Page 4: Lkw Security Part 1_MVPs Azra & Sanjay

Introduction

You

Your data

YourNetworkExposures

Exploit

Page 5: Lkw Security Part 1_MVPs Azra & Sanjay

You

Your data

YourNetworkExposures

Exploit

Our Goal

Page 6: Lkw Security Part 1_MVPs Azra & Sanjay

Top ten security myths1. I’ve got antivirus, I’m good to go2. I have a strong password on my

laptop, no one can access my data

3. I don’t use Windows, I’m already secure

4. No one can see what I do in a public/private WiFi/network

5. The campus IT guys got me covered

Page 7: Lkw Security Part 1_MVPs Azra & Sanjay

Top ten security myths –Cont’d

6. I never visit “bad” internet sites, I will be safe7. I hide all my stuff in

hidden folders and such, my data is safe

8. I never add anyone Idon’t know on socialnetworking sites, blogs, etc..

9. I install lots of security software, I think I am fine

10. I store all my data externally and I carry that everywhere safely

Page 8: Lkw Security Part 1_MVPs Azra & Sanjay

Why Antivirus alone isn’t enough?

Antivirus rely on patterns, i.e. it’s as good as the pattern you useWorms can potentially disarm protection and access to security websitesThus, most exploits become successful because of one primary thing:

Lack of patching, both application and OS

Page 9: Lkw Security Part 1_MVPs Azra & Sanjay

P@sswords?What constitute a good password?Definitely not a passWORD, should a passPHRASE insteadFACT! - Longer passwords are better than short complex ones

5 characters (all lowercase) takes about a minute to crack @ 500,000 passwords/sec10 characters (all lowercase) would take approximately 10 years @ 500,000 passwords/secOf course, don’t use known (dictionary) words la..

Page 10: Lkw Security Part 1_MVPs Azra & Sanjay

Security problems are everywhere, anywhere..

Which is more secure? Unix/Linux or Windows? Or Mac?Security is as strong as it’s weakest linkSometimes (actually most of the time) it’s the human factor

E.g. lack of patchingE.g. lack of security updates in applicationsE.g. use of weak passwords

Page 11: Lkw Security Part 1_MVPs Azra & Sanjay

Wired/Wireless Network

Which is “better”?Use of public networks (e.g. hotspots)

Do’s Don’ts

Page 12: Lkw Security Part 1_MVPs Azra & Sanjay

Organizational security

Protects a lot but not enoughThe perimeter should be your own machine

Moving out of the orgUsing 3G modems, wireless peer, 3rd party connectivity

Page 13: Lkw Security Part 1_MVPs Azra & Sanjay

Threats come uninvited (too)

Almost 50% of threats finds its own way to youThe rest are probably invited ones Plug an unpatched, unprotected computer out on an unprotected internet connection

Takes approximately 20 minutes to get it ridiculed with worms and viruses

Page 14: Lkw Security Part 1_MVPs Azra & Sanjay

Obscurity

Security through obscurity is not securityIt’s merely hidingE.g. hiding a folder in your computerUsing “hide tools”

Hiding is fine, just as long you know, it’s not securing

Page 15: Lkw Security Part 1_MVPs Azra & Sanjay

Online Friends

The issue is not whether who you add or allow to see your private data

Social networking, blogs, picture sites etc..

It’s human to trust friends, disallowing people you don’t knowThin line between friends and foes

Page 16: Lkw Security Part 1_MVPs Azra & Sanjay

Beefing up security

The fact is, the more you have isn’t always the best when the sum of it mattersThat doesn’t also mean, the less is betterThe important thing to remember, the easier the better

That you understand, you best useThat you don’t you may misuse

Page 17: Lkw Security Part 1_MVPs Azra & Sanjay

Mobile storage

Easiest way to access your dataDoes not carry any security by defaultPassword protection on those drives can be easily defeated

Page 18: Lkw Security Part 1_MVPs Azra & Sanjay

New and emerging threats

Social networkingMobile devicesWeb 2.0

Page 19: Lkw Security Part 1_MVPs Azra & Sanjay

Social NetworkingFacebook/Tweeter – The open book of one’s life

Be careful what you post and update in thereThere’s always search engines to profile you

Page 20: Lkw Security Part 1_MVPs Azra & Sanjay

Read the prints

Always check what an application, website etc is asking you for..

Page 21: Lkw Security Part 1_MVPs Azra & Sanjay

Read the prints

Google’s ad sensing technology

Google scans the text of Gmail messages in order to filter spam and detect viruses, just as all major webmail services do. Google also uses this scanning technology to deliver targeted text ads and other related information. This is completely automated and involves no humans.

Page 22: Lkw Security Part 1_MVPs Azra & Sanjay

Mobile devices

PDA/SmartphonesiPods etc…Any device that has data, and its mobile and it can connect to the internet

Page 23: Lkw Security Part 1_MVPs Azra & Sanjay

Web 2.0

Blogs, youtube, photos, online spaces, virtual worlds

Try searching yourself from here

www.123people.com

Page 24: Lkw Security Part 1_MVPs Azra & Sanjay

Other stuff that make it to the headlines

Page 25: Lkw Security Part 1_MVPs Azra & Sanjay

How much information you can deduce from this..?

A facebook status message I saw 2 days ago..“We are packed and ready for Singapore. Peace and quiet!Then, some friends replied, including this..

“Don’t worry bro, Goggles is in good hands..”

Page 26: Lkw Security Part 1_MVPs Azra & Sanjay

How much information you can deduce from this..?1) The person is not contactable2) The person will most likely be away on a holiday/not

working3) He’s not travelling alone4) They have not left *yet*, safe bet, 1 day top5) Most likely Fluff is dog/cat/fish, and his house will be

empty!!!!! 6) His pet’s name is Googles 7) His friend (probably a neighbor) will either frequent the

house to feed the animal..