cyber security awareness seminar
play

Cyber Security Awareness Seminar Presented By: Ryan Moore Ohio - PowerPoint PPT Presentation

Cyber Security Awareness Seminar Presented By: Ryan Moore Ohio Cyber Range Institute, University of Cincinnati About This Seminar Designed for everyday cyber citizens Online Webinar 2 hour Presentation 10 Minute break


  1. Cyber Security Awareness Seminar Presented By: Ryan Moore Ohio Cyber Range Institute, University of Cincinnati

  2. About This Seminar Designed for everyday cyber citizens • Online Webinar • 2 – hour Presentation • 10 Minute break • Questions? • Resource Guide • Follow-up survey • Ohio Cyber Range Institute, University of Cincinnati

  3. Outcomes of this Seminar Describe common cybersecurity threats • Take simple steps to take to protect: • Information • Devices • Home networks • Yourself • Identify threats • Ohio Cyber Range Institute, University of Cincinnati

  4. Security Mindset Protecting our lives and our property • Locking doors • Checking who is at the door • Alarm systems • Washing your hands • Leaving a light on • Firesafe for valuables Ohio Cyber Range Institute, University of Cincinnati

  5. Cyber Security Mindset Become aware of the threats • Initiate behaviors to minimize threats • Take steps to prevent attacks • Protect your self and others • Ohio Cyber Range Institute, University of Cincinnati

  6. Cyber Security – It doesn’t affect me…. …I barely use the Internet …I don’t shop/bank online …I don’t have anything to steal …That’s what the IT person is for Ohio Cyber Range Institute, University of Cincinnati

  7. Cyber Security – Affects Everyone We are more connected than we realize • Your information is valuable • 95% of all Cyber Security Breaches are caused by • human mistakes and misunderstanding It doesn’t just affect you • Ohio Cyber Range Institute, University of Cincinnati

  8. Don’t Be Afraid Ohio Cyber Range Institute, University of Cincinnati

  9. Common Security Threats Cyber Security Awareness - the knowledge combined with the • attitudes and behaviors that serve to protect our information assets Cyber Security Threat - the potential for an attack to occur • Cyber Security Attack – Occurs when a threat has been exploited • Ohio Cyber Range Institute, University of Cincinnati

  10. Malicious Software - Distribution Categorized by how they spread • Worms & Viruses – Self Replicating • Trojan horse – Disguised as legitimate program • Malvertising - false/fake advertisement Ohio Cyber Range Institute, University of Cincinnati

  11. Malicious Software - Actions Categorized by what they do • Ransomware – Holds files for ransom • Adware – Pop-up Ads • Spyware – Hides and steals info • Botnets and zombies – Used to attack others Ohio Cyber Range Institute, University of Cincinnati

  12. Malicious Software - Demo Demo Video Ohio Cyber Range Institute, University of Cincinnati

  13. Social Engineering Ohio Cyber Range Institute, University of Cincinnati

  14. Man in the Middle Eavesdropping on you communications • Public Wifi Risks • Website Redirection Ohio Cyber Range Institute, University of Cincinnati

  15. Vulnerability Exploitation Vulnerability - a weakness in a system • Virtually impossible to completely eliminate Easily Avoidable Causes • Outdated Software • Misconfigurations • Default Settings • Human Error Ohio Cyber Range Institute, University of Cincinnati

  16. Vulnerability Exploitation Ohio Cyber Range Institute, University of Cincinnati

  17. Protecting Your Information Authentication • Privacy • Encryption • Backups • Ohio Cyber Range Institute, University of Cincinnati

  18. Authentication First line of defense! Identify and Prove Forms of Authentication Username and Password • Finger Print Readers • Facial Recognition • Card and Pin • Ohio Cyber Range Institute, University of Cincinnati

  19. Password Security Most often used method of authentication • Simple, inexpensive, and effective • Not full proof! • Ohio Cyber Range Institute, University of Cincinnati

  20. Creating Strong Passwords Length – The longer the harder to crack Complexity – More character options = more time to crack Randomness – Don’t use words, phrases, or numbers that are common Ohio Cyber Range Institute, University of Cincinnati

  21. Strong and Easy Passwords The Sun Will Come Out, Tomorrow, Bet Your Bottom Dollar tswcotbybd Random! tswco)t(bybd 12 Characters + Symbols! TsWc0)t(ByBd Mixed case and numbers! a$TsWc0)t(ByBd Add “a$” for Amazon.com emTsWc0)t(ByBd Add “ em ” for email https://howsecureismypassword.net/ Ohio Cyber Range Institute, University of Cincinnati

  22. Protect Your Password Always keep your secret to yourself! Don’t write it down! • If you do, keep it in a secure place • Don’t store passwords in programs • Browser/Website • Save login • Don’t tell anyone for any reason • Not to family • Not to the IT Guy • Not to anyone on the phone • Change your password from time to time • Secure passwords can be compromised • Recommended every 90-180 days • Ohio Cyber Range Institute, University of Cincinnati

  23. Multifactor Authentication Using two or more methods to authenticate Something you have Smartphone • Text, App, Phone call • Smart card, ID card, Credit Card • Something you know Password • PIN Number • Passphrase • Something you are Fingerprint • Facial Recognition • Eye Scan • Ohio Cyber Range Institute, University of Cincinnati

  24. Personal Information Online Image Source: https://www.attogtech.com/product/protecting-your-personally-identifiable-information/ Ohio Cyber Range Institute, University of Cincinnati

  25. Protect Your Identify Don’t give out personal information when asked • Read your credit card and bank statements • Bring in your mail everyday • Use a paper shredder • Freeze your credit or use credit monitoring services • Set up alerts • Follow all the other tips in this seminar • Ohio Cyber Range Institute, University of Cincinnati

  26. Privacy Online Social Media Use privacy settings and security settings • Be careful what you share • Understand the terms and conditions • Cookies (Web tracking) Deleting cookies • Use private browsing modes • Location Services Choose which apps or website can use your location • Disable geo-tagging features • Disable Location Services completely • Ohio Cyber Range Institute, University of Cincinnati

  27. Social Media Security and Privacy Demo Video Ohio Cyber Range Institute, University of Cincinnati

  28. Browser Privacy Demo Video Ohio Cyber Range Institute, University of Cincinnati

  29. Data Protection - Encryption Protect data you send, receive, or store Scrambles text and other data into an unreadable format Online encryption Secure web browsing (HTTPS) • Encrypted Messaging • Text Messages • E-mail • Virtual Private Networks (VPNs) • Ohio Cyber Range Institute, University of Cincinnati

  30. Data Protection - Encryption Data at Rest Full Disk Encryption Windows 10 – Bitlocker • Apple OSX – FileVault • 3 rd Party Software • Encrypt Sensitive Files Tax, Payroll, Financial Documents • Data stored on flash drives • Smart Phone Encryption Requires Password, PIN, Patter, etc. • Ohio Cyber Range Institute, University of Cincinnati

  31. Data Protection - Backups 3-2-1 Rule 3 Copies of your data One Primary Copy and Two Backups 2 Types of Media Hard Drive, File Server, Cloud 1 Off-Site Storage Cloud Backup Methods Manual Backup Scheduled Automated Backup Sync Backup Ohio Cyber Range Institute, University of Cincinnati

  32. Data Protection – Backup Methods Manual Backup Copy Important Files to External Storage • Scheduled Automated Backup Built in Tools for Windows or Apple OSX • 3 rd Party Tools • Sync Backup Desktop Sync Services • Google Drive • Microsoft One Drive • Apple iCloud • Phone Sync Services • Google Sync • iOS Backup • 3 rd Party • Ohio Cyber Range Institute, University of Cincinnati

  33. Windows Backup Demo Video Ohio Cyber Range Institute, University of Cincinnati

  34. Protecting Your Devices Updates • Antivirus • User Permissions • Mobile Devices • Ohio Cyber Range Institute, University of Cincinnati

  35. Software Updates Why are Updates Important? Fix Security Vulnerabilities • Fix Bugs or unexpected errors • May include enhancements or new features • Are there downsides to updating? Your device may need to be restarted • Make sure to save your work • Updates can be slow • Doing them regularly reducing the time • Don’t power down your device until updates complete • Can cause the things to break • Ohio Cyber Range Institute, University of Cincinnati

  36. What to Update Operating System Windows • Mac OSX • iPhone – iOS • Android • Applications Microsoft Office • Adobe • Java • Phone Apps • Connected Hardware (Firmware) Printers • Web Cams • Keyboard/Mouse • Digital Camera • External Drives • Ohio Cyber Range Institute, University of Cincinnati

  37. When and How to Update Update Often Most updates released monthly • Important security updates released ASAP • Setup Automatic Updates • Make sure you are using the latest versions • Use Settings Menus to Configure Updates Windows • Mac OSX • iOS • Android • Download Manufacture Software for Devices Logitech Dell HP Cannon Epson Ohio Cyber Range Institute, University of Cincinnati

Recommend


More recommend