who’s in your pc? keeping the bad guys out. your attention please…

56
Who’s in your PC? Keeping The Bad Guys Out

Upload: isabella-walker

Post on 28-Dec-2015

223 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Who’s in your PC?

Keeping The Bad Guys Out

Page 2: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

YOUR ATTENTION PLEASE…

Page 3: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Digitally Mastered Clip

Page 4: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Media CitationsFor This Presentation:

Movie Clips:

Bourne Ultimatum(Universal Pictures)

Internal INL Animation Team:John Mulligan (Conceptual)Jonathan Homer (Conceptual)Jason Miller (Visual)Carl Fennen (Audio)

Page 5: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Bourne Intro

Page 6: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Cops and Robbers

• A Child’s Game

• A Multi-Trillion Dollar Industry

Page 7: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Challenge #1Using a laser pointer:

- Shoot only Jason Bourne and Nicky Parsons

- Don’t Shoot Desh Bouksani or innocent bystanders

Page 8: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…
Page 9: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

How Did We Do?

• Did we get the bad guys?

• Did we keep the good guys alive?

• Could we do better with practice?

Page 10: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Challenge #2

Using a laser pointer:

- Eliminate the bomb before it explodes

- You have only a single shot

Page 11: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…
Page 12: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

How Did We Do?

• Did you get the bomb?

• Why was this harder?

• What does this represent in the real world?

Page 13: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Challenge #3

Using a laser pointer:

- Identify each of the selected individuals as they appear on the screen.

- Do not incorrectly identify any innocent bystanders

Page 14: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…
Page 15: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…
Page 16: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

How Did We Do?

• Did you get all the identified people?

• Why not?

• Would more guns have helped?

• Group: What would make this scenario plausible?

Page 17: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Today’s Cops and Robbers

• 6,000 employees + 100’s of visitors walk past security guard posts every day

• 30,000 pieces of mail enter or exit the INL on the average day. That’s more mail than the average person receives in 1 lifetime.

• Hundreds of Thousands of emails arrive at the INL daily.

• Terabytes of Data enter/exit the INL every day.

Page 18: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

3 Primary Ways a Computer Is Compromised

1. Direct Attack

Page 19: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

3 Primary Ways a Computer Is Compromised

1. Direct “Firewall” Attack2. Social Engineering

Page 20: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

3 Primary Ways a Computer Is Compromised

1. Direct “Firewall” Attack2. Social Engineering3. Innocent Host

Page 21: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

The Problem If they were breaking into a house…

INL Solution

Firewall Attack Massive Data Quantity / Automated Processes

Sledgehammer to lock

$$$ in Cyber Security

Social Engineering

Fast talking intruder / innocent insider

Slick Salesman Previous communications, trainings, and reminders

Innocent Host Laziness / false sense of comfort

Watch for an unlocked door

TODAY!!!

Page 22: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Protecting Our Assets

• Be smart – use common sense

• Circle the wagons – be a part of the group

• Stay up to date – mitigate known issues

Page 23: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Being Smart

Page 24: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…
Page 25: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

WHAT DID WE SEE? WHAT DID WE LEARN?

Page 26: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…
Page 27: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Being Smart Summary

• Keep passwords private

• Lock your computer when away

• Don’t use INL media in non-INL computers

• Don’t use non-INL media in INL computers

• Encrypt sensitive data

Page 28: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Circle The Wagons

Page 29: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

What’s happening on your Computer

• WHAT YOU SEE: • WHAT’S HAPPENINGIN THE BACKGROUND:

INL AVERAGES:– 33 Processes (Background

Programs)– 55 Services (Drivers and

Controllers)– 16 Connections across the

Network– Has access to dozens of

servers and enterprise systems

STANDARD PROCESSES:DPB2CP.EXEwuauclt.exemsiexec.exePccNTMon.exeNTRtScan.exeexplorer.exercgui.exeTtskmgr.exewmiprvse.exeOfcPfwSvc.exepds.exeLocalSch.EXEresidentAgent.exeMsPSMPSv.exeTmListen.exespoolsv.exeSoftMon.exesvchost.exentmulti.exeldalert.exesvchost.exesvchost.exesvchost.exelsass.exeservices.exeWinlogon.execollector.execsrss.exePDVDDXSrv.execftmon.exesmss.exeSDClientMonitor.exeMDM.exevulscan.exetcpsvcs.exeissuser.exeTmcsvc.exeSystem

Page 30: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Standard INL Configuration

WINDOWS XP

Internet Explorer

MicrosoftO

ffice

LanDeskManaged

Trend Micro AntiVirus

LotusNotes

Page 31: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…
Page 32: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Introducing HRF

• HARDWARE REGISTRATION FORM

• Update to 565.06 (Unclassified Computer Security Form)

• Similar format to AAR (annual asset review)• Updated semi-annually• Gives comprehensive visual into working

environment

Page 33: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

HRF – Accessing The Form

Page 34: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

HRF – Property and Hostname

Page 35: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

HRF – Security

Page 36: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

HRF – Updating 565.06

Page 37: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

HRF – Summary(understanding your system)

Page 38: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Questions About HRF…

Page 39: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…
Page 40: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Introducing LDBlue

• LANDESK GATEWAY

• Increasing toolset of existing LanDesk Suite• Remote Patching and Updates• Permits Remote Assistance

from OpsCenter

Page 41: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

LDBlue

Page 42: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Questions About LDBlue…

Page 43: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Resources Available

• Website:http://myPC.inl.gov https://ldblue.inl.gov (Available External) http://opscenter.inl.govhttp://virus.inl.gov

• Email:[email protected]

• Phone:OpsCenter: 6-1000

Page 44: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Contact Information

Jonathan HomerDesktop [email protected]

Page 45: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

SUCCESS!!!

IT Communications

NLIT 2009

Page 46: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

THE RESULT

• Deemed a huge success

• Recognized by INL

management

• Traveled to Washington

D.C. by request

• Has become a benchmark

when discussing INL

communications

Page 47: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

“Water Cooler” – The Capstone• “The [environmental risk] numbers are impressive and can be

staggering…I think the presentation [should] be a model for other user-training presentations we (IT) develop.”– Homeland Security Researcher, 25+ year INL Veteran

• “I just begrudgingly attended the last available "Who's in Your PC?" training. It wasn't mandatory, I'm busy with year-end deliverables, and I assumed it would be boring. Boy was I wrong….This was perhaps the best executed training I’ve seen at the Lab ever. It was content-rich and fast-paced, used current relevant visuals, had audience participation, and distributed useful handouts. Please take good care of these guys. We need this kind of talent and enthusiasm at the INL.”– Project Manager for Energy and Environment Organization

Page 48: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

PRESENTATION ATTENDENCE

Momentum!

Page 49: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

LESSONS LEARNEDKey Tricks and Trips

Page 50: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Put Yourself In Their Shoes

• Stigma: “Black Text, White Background, Never Ends”

• What do they really need to know?

• How does it apply to them personally?

• The details should be in the support

materials

• Know your audience before you arrive

Page 51: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Interactivity

• 10 minutes of Q&A does not qualify as interactive

• No more than 6 minutes of one person/style

• Get them standing, moving, doing

• Be one of them or have one of them be you (or both)

Page 52: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Make it memorable

• Whenever possible, create a storyline

– Characters

– Setting

– Plot

– Audience plays a role

• Overuse analogies and comparisons, limit statistics

• Laughter leads to learning

Page 53: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Momentum

• Spend the effort in pre-start promotions

– tease but don’t tip your hand

• Give yourself time at the project beginning to build up speed

• Once rolling – move fast

• Recognize the law of diminishing returns and their social impact

Page 54: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

QUESTIONS AND DISCUSSION

Page 55: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…

Contact Info

Jonathan Homer

208.526.9660

[email protected]

Page 56: Who’s in your PC? Keeping The Bad Guys Out. YOUR ATTENTION PLEASE…