ttu qep service learning project by blue team students – computer science department csc 4575/5575...

38
Computer Security Awareness and Training (CSAT) Seminar TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

Post on 20-Dec-2015

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

1

Computer Security Awareness and Training (CSAT) Seminar

TTU QEPService Learning Project

By Blue Team Students – Computer Science Department

CSC 4575/5575Information Assurance and Security

Spring 2011

Page 2: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

Cost of Security Incidents in USA In 2009, dollar loss reported for Internet crime reached

all time high ~$560 million Internet Crime (IC3) Annual Report – March 2010

60 percent of financial losses were due to non-malicious actions by insiders Computer Crime and Security Survey, 2009

Page 3: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

Perpetrator Map65.4% perpetrators in United States

Internet Crime (IC3) Annual Report – March 2010

Page 4: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

What’s up for sale in the Cyber Black Market?

http://www.symantec.com/content/en/us/enterprise/white_papers/b-symc_intelligence_qtrly_july_to_sept_WP_21157366.en-us.pdf

Page 5: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

Who is hit hardest?

http://www.symantec.com/content/en/us/enterprise/white_papers/b-symc_intelligence_qtrly_july_to_sept_WP_21157366.en-us.pdf

Page 6: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

6

Goal of the CSAT Seminar

To inform on issues most closely related to the handling of sensitive/non-sensitive data with emphasis on TTU policies and general proper practicesSensitive Data: Social Security numbers, Credit

Cards, Birthdates, Medical information, Passwords, etc.

Page 7: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

7

Topics To CoverSpywareAnti-VirusEmail Spam

Top 10 ScamsPhishing

Social EngineeringPasswordsHTTPSWireless Fidelity (Wi-Fi)

Page 8: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

8

SpywareType of malware that collects user data from

their computer without them knowingCommon Spyware:

Fake Anti-VirusKeyloggers

Page 9: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

9

SpywareScareware/

Ransomware: Fake Anti-VirusUses convincing

names: “Antivirus 2010”, “PC Antispy”, “Spyware Protect”, “Win Defender”

Constant pop-ups saying you are not protected

Will disable common programs

KeyloggersRecords keystrokes

and reports them to a program or person

Can be obtained through many bad practices

Page 10: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

10

Features of SpywareSpyware has many common features

Requires system resourcesChanges computer settings to lock commonly

used featuresAttempts to disable Anti-VirusRedirects web browser

Page 11: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

11

Anti-VirusWhat is Anti-Virus Software?

“Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms” – Microsoft

Who provides it?Symantec – The software used by TTU CampusMcAfeeAVGMicrosoft

Page 12: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

12

Anti-VirusHow do you know if

it’s working?Check your task-bar

at the bottom-right of your desktop

Windows Security Center

Be sure to note:Make sure you have

the option to real-time scan

Keep the software up to date

TTU Policy1: Updates are automatic, but users are responsible for notifying ITS if there are complications with the update

1 http://www.tntech.edu/itspolicies/viruspolicy/

Page 13: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

13

Free Anti-VirusSome things to consider about free Anti-

Virus:Be sure to download from reputable

distributers such as AVG, AntiVir, AVASTDon’t download these from a 3rd party site

Easy questions to ask before downloadingDo I want to pay or get free protection?What am I protecting?Is the software going to slow my system down?

Some distributer’s sites provide statistics

Page 14: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

14

Email SpamJunk email or unsolicited bulk e-mailExamples we all know

Free giftsWeight lossDebt help

“36 Million Americans report purchasing drugs from unlicensed online sellers” – Sophos Security Threat Report 2011

Page 15: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

15

Page 16: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

16

Stay protected!Tips to avoiding scams:

Protect your personal informationKnow who you’re dealing withTake your time – Stop.Think.ConnectAlways read the fine printNever pay for “free gift”

IF IT SEEMS TOO GOOD TO BE TRUE, IT PROBABLY IS!

Page 17: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

17

Top 10 Email Scams1. “Nigerian” Email Scam

- Message claiming to need a large amount of money to be transferred out of their country. Usually offering you a percentage.

2. Email or popup claiming to be a business you may deal with

3. Work-At-Home Scams- Get rich quick by stuffing envelopes, assembling products, data entry, etc.

4. Weight Loss Claims

5. Foreign Lotteries

6. Cure-All Products

7. Check Overpayment - Receive a check overpaying

what was owed and asked to wire back what was overpaid. The check then bounces.

8. Pay-in-Advance Credit Offers

9. Debt Relief

10. Investment Scamshttp://www.onguardonline.gov/topics/email-scams.aspx

Page 18: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

18

Dealing With Email SpamReporting the spam!Forward the spam to

[email protected] the email appears to be impersonating a

bank or company forward the message to the actual organization

Page 19: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

19

PhishingAttempting to acquire sensitive information

such as passwords, credit cards, social security numbers through legitimate sounding offers and warnings

Phishing reports have risen over 100% in last two years - Sophos Security Threat Report 2011

Page 20: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

20

Phishing – January 2011 # Brand Name % Deviation

from December in %

1 Paypal 36.84 52.68

2 Ebay 27.12 92.65

3 Others 19.18 100.00

4 Facebook 4.68 63.05

5 Yahoo 3.46 97.28

6 Chase Bank 2.43 38.76

7 Visa 1.82 4.12

8 Commonwealth Bank 1.67 62.92

9 Banco Santander 1.43 69.74

10 World of Warcraft 1.35 11.11Source: http://techblog.avira.com/2011/02/22/phishing-spam-and-malware-statistics-for-january-2011/en/

Page 21: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

21

Dealing With PhishingTips to avoid Phishing scams:

Don’t email personal or financial informationBe cautious with opening or downloading

attachments received in email, especially on university computers

Report the emails to [email protected] proper Anti-VirusCheck links inside emails before clicking themNever enter personal information into a pop-up

Page 22: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

22

Checking links on web pages

Page 23: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

23

Social Engineering“You could spend a fortune purchasing

technology and services… and your network infrastructure could still remain vulnerable to old-fashioned manipulation”

- Kevin Mitnick

Page 24: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

24

Social EngineeringDumpster Diving

Pretexting

Gimmies

Quid pro Quo

Carelessly disposing of sensitive information

Using pre-mediated scenario to persuade a target

Exploiting curiosity/carlessness to deliver malware

Trading for information

Page 25: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

25

Social EngineeringShoulder Surfing

Smoking Area

Phishing

Someone you would not suspect looking over your shoulder

Socializing at a company’s designated break area

Page 26: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

26

Poll:My password is ab1234 or abcdef or abc123. (True/False)

I have not yet changed the default password given to me. (True/False)

I use the same password for multiple sites. (True/False)

I never change my password. (True/False)

I have written down the password “somewhere”. (True/False)

I have given my password to “X”. (True/False)

Page 27: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

27

PasswordsThings to consider:

Usernames and passwords are designed for personal use

Try not to use the same password for multiple logins

Do not write down passwords in easy to find locations

Have a strong password

Page 28: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

28

PasswordsMaking a strong password

Include letters, numbers, special characters, capitalization

Should be 8 to 12 characters longTry not to include wordsDo not reuse passwords

Page 29: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

29

PasswordsLength of Password

Number of Possible Combinations Average Computer

Multiple Pc's Working Together Super computer What the password Contains

8 100 Million 10 Seconds Instant Instant Numerals123456789

8 53 Trillion 62 Days 6 Days 15 Hours Mixed Alpha

AaBbCcDdEeFfGgHhIiJjKkLlMmNnOoPpQqRrSsTtUuVvWwXxYyZz

8 218 Trillion 253 Days 25¼ Days 60½ HoursMixed Alpha and

Numerals

0123456789AaBbCcDdEeFfGgHhIiJjKkLlMmNnOoPpQqRrSsTtUuVvWwXxYyZz

8 7.2 Quadrillion 23 Years 2¼ Years 83½ DaysMixed Alpha,

Numerals & Symbols

0123456789AaBbCcDdEeFfGgHhIiJjKkLlMmNnOoPpQqRrSsTtUuVvWwXxYyZz <SP>!"#$%&'()*+,-./:;<=>?@[\]^_`{|}~

www.lockdown.co.uk

Page 30: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

30

ITS Password PolicyUser Type Login To Password/PIN

Change Frequency

Faculty/StaffINB (Internet Native Banner) (Regular Access)

Every 90 days

Faculty/Staff INB (Privileged Access) Every 30 days

Faculty/Staff/Student SSB (Self Service Banner) Every 180 days

Faculty/Staff Oracle (Regular Access) Every 90 days

Faculty/Staff Oracle (Privileged Access) Every 30 days

Faculty/Staff/Student TTU Domain/PC Lab Domain/Email Every 90 days

Special Logins Every 90 days

http://www.tntech.edu/itspolicies/password-policy/

Page 31: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

31

HTTPSHypertext Transfer Protocol SecureA protocol that creates a secure connection

between your computer and the web site you are connecting to

Page 32: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

32

HTTPSITS Policy1

Encryption is recommended when sending non-public or internal data.

Encryption is required if any data is confidential or restricted

How do I know it’s in use?Internet Explorer

Firefox

Chrome

1 http://www.tntech.edu/itspolicies/datasecuritypolicy/

Page 33: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

33

Wireless FidelityNote1: “Confidential University business

should not be conducted via the wireless network due to data security issues.”

FiresheepPacket snifferSimplified stealing information

1 www.tntech.edu/its/wirelessaccess

Page 34: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

34

Wireless FidelityWay to protect yourself on an open network

Use HTTPSWays to protect your network at home

Use WPA2 with a pre-shared key to secure your router

Page 35: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

35

Additional Resources

Can be found athttp://users.csc.tntech.edu/~jlnorris21/csat

Page 36: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

36

CreditsAlan ObergShaun TiptonBret HumanMichael Altom Jay PatelNicolas Castellani Jeffrey NorrisHassan AlslameKenison VrabcakPatrick BirdwellRyan Flood

Team Leader / Content DeliveryContent Delivery / Post AssessmentContent Delivery / Content ManagementTeam Leader / Needs AssessmentPost Assessment / Event CoordinationNeeds Assessment / WebsiteWebsite / Content DevelopmentContent Development / Content

ManagementEvent Coordination / Content

ManagementContent Management / WebsiteAdvertisement

Page 37: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

37

Acknowledgement

QEP CommitteeComputer Science DepartmentValerie Nash

Page 38: TTU QEP Service Learning Project By Blue Team Students – Computer Science Department CSC 4575/5575 Information Assurance and Security Spring 2011 1

38

Thank you for your time

Please remember to take our Post Survey at:http://users.csc.tntech.edu/~jlnorris21/csatCertificate - needs to be done by April 29th!