Internet Security Presentation Notes

Brainstorming

Terms & Concepts

Captcha
Two Factor Authentication
Problem > Solution
Public vs Private Networks
Tracking
Malware
Spoofing
eCommerce
Heart Bleed
SSL
This Certificate has Expired
Browsers (Firefox, Internet Explorer, Chrome, Safari, Opera)
Email Images
Virus
Worm
Trojan
Spyware
Adware
Spam
Phishing
Pharming
Keyloggers
Rogue Security Software
Identity Theft

Experiences

Figure out what this mess of words says.
Please give us your phone number.
Please type in the code that we emailed you.
Please click on the link that we emailed you.
Please confirm your email address.

Concerns

Is my personal information safe in the cloud?
Is my credit card information safe?
Should I open that email?
Should I download that email attachment?
Is my password secure enough?
How do I keep track of my passwords?
Is my anti-virus good enough?

Techniques

Use a password manager.
Use rules to create passwords.

Threat –> Mitigation –> Demo

Rough Guide

The following is taken directly from https://www.getsafeonline.org/themes/site themes/getsafeonline/pdf/GetSafeOnline RoughGuide.pdf

Securing Your Computer

What do hackers want?

The Problems

Spyware

Malware

The Solutions

Security Software

Updating

Password Protection

Wireless Security and Encryption

Digital Security at Home

Social Networking

Privacy violations

Identity theft

Best Safety Practices at Home

This is a checklist of things to do.

Surfing Kids

Education

Monitoring

Protection

Shopping Online

Banking Best Practice

What to look out for?

Scans and Schemes

eBay and auction sites

Advertising

Get-rich-quick schemes and scams

Pyramid schemes

Ticketing websites to watch out for

Travel Websites

Phishing

419

Keeping the office secure

Employee and office best practice

Spam

Encryption

Compliance

Customer data protection

A Rough Guide to physical security for computers

Data loss

USBs

Portable Hard Drives

Back-ups and fireproofing, paper and reports

Storage

Mobiles and other devices

Safety essentials

Where next for hackers? The future of security threats

Your new favorite devices

Viruses

Social networking

For when security fails

What are you going to do?

Physical loss or damage

Network or computer compromise

Infection

Who are you going to call?

What if someone else loses your data?

What to expect from police, banks, IT suppliers and providers

Resources