Internet Security Presentation Notes
Terms & Concepts
|Two Factor Authentication|
|Problem > Solution|
|Public vs Private Networks|
|This Certificate has Expired|
|Browsers (Firefox, Internet Explorer, Chrome, Safari, Opera)|
|Rogue Security Software|
|Figure out what this mess of words says.|
|Please give us your phone number.|
|Please type in the code that we emailed you.|
|Please click on the link that we emailed you.|
|Please confirm your email address.|
|Is my personal information safe in the cloud?|
|Is my credit card information safe?|
|Should I open that email?|
|Should I download that email attachment?|
|Is my password secure enough?|
|How do I keep track of my passwords?|
|Is my anti-virus good enough?|
|Use a password manager.|
|Use rules to create passwords.|
Threat –> Mitigation –> Demo
The following is taken directly from https://www.getsafeonline.org/themes/sitethemes/getsafeonline/pdf/GetSafeOnlineRoughGuide.pdf
Securing Your Computer
What do hackers want?
- Email Security
- Keeping Secrets
- What Makes a Good Password?
- Password Changes
- Multiple Passwords
Wireless Security and Encryption
Digital Security at Home
Best Safety Practices at Home
This is a checklist of things to do.
- Is the Website reputable?
- When making payments, does a secure symbol (usually a padlock) appear in the bottom right of the screen?
- Is a deal to good to be true?
- Who are you doing business with?
Banking Best Practice
What to look out for?
Scans and Schemes
eBay and auction sites
Get-rich-quick schemes and scams
Ticketing websites to watch out for
Keeping the office secure
Employee and office best practice
Customer data protection
A Rough Guide to physical security for computers
Portable Hard Drives
Back-ups and fireproofing, paper and reports
Mobiles and other devices
- Keep it hidden
- Security tagging
- Use in-built security
- Register your device
- Restrict alternative network usage
- Block premium calls and texts
- Handle with care
- Synchronizing your mobile
- Stay aware of new dangers
Where next for hackers? The future of security threats
Your new favorite devices
For when security fails
What are you going to do?
Physical loss or damage
Network or computer compromise
Who are you going to call?
What if someone else loses your data?
What to expect from police, banks, IT suppliers and providers
- https://www.getsafeonline.org Backed by the UK government and private sector partners, this is probably the most reliable and comprehensive resource on using the Internet safely.
- https://www.owasp.org A not-for-profit that neither endorses nor recommends commercial products/services, this is probably the most reliable and comprehensive resource on building secure software.