• No results found

The Evil Legions - Spam, Hackers and Thieves

N/A
N/A
Protected

Academic year: 2021

Share "The Evil Legions - Spam, Hackers and Thieves"

Copied!
34
0
0

Loading.... (view fulltext now)

Full text

(1)

Know Any Gang Signs?

(2)

Data Security

The Big Picture. The Basic Questions

• Who? - Evil Legions: Spammers, Hackers,

Blackmailers and Thieves

• Why? - I don’t have anything interesting on my

computer

• How? - Email, Internet, WiFi, Cloud,

SmartPhones

• When? - Now! War footing. Only going to get

(3)

Why?!?

What happens in Vegas, stays in Vegas, but your PC is public. Yes, they DO want your computer: all of it

• Email Addresses - addressbook, Sent/Drafts,

Word/Excel, Saved Web Pages

(4)

Why?!?

What happens in Vegas, stays in Vegas, but your PC is public. Yes, they DO want your computer: all of it

• Email Addresses - addressbook, Sent/Drafts,

Word/Excel, Saved Web Pages

• Identity Theft - Bank, Credit Card, Cloud,

(5)

Why?!?

What happens in Vegas, stays in Vegas, but your PC is public. Yes, they DO want your computer: all of it

• Email Addresses - addressbook, Sent/Drafts,

Word/Excel, Saved Web Pages

• Identity Theft - Bank, Credit Card, Cloud,

Amazon, Paypal

• Internet Connection - Launch attacks; download

content

(6)

Why?!?

What happens in Vegas, stays in Vegas, but your PC is public. Yes, they DO want your computer: all of it

• Email Addresses - addressbook, Sent/Drafts,

Word/Excel, Saved Web Pages

• Identity Theft - Bank, Credit Card, Cloud,

Amazon, Paypal

• Internet Connection - Launch attacks; download

content

(7)

Why?!?

What happens in Vegas, stays in Vegas, but your PC is public. Yes, they DO want your computer: all of it

• Email Addresses - addressbook, Sent/Drafts,

Word/Excel, Saved Web Pages

• Identity Theft - Bank, Credit Card, Cloud,

Amazon, Paypal

• Internet Connection - Launch attacks; download

content

• CPU - Crack Passwords

• Disk - Store data: tools, porn, pirated stuff

(8)

Why?!?

What happens in Vegas, stays in Vegas, but your PC is public. Yes, they DO want your computer: all of it

• Email Addresses - addressbook, Sent/Drafts,

Word/Excel, Saved Web Pages

• Identity Theft - Bank, Credit Card, Cloud,

Amazon, Paypal

• Internet Connection - Launch attacks; download

content

• CPU - Crack Passwords

• Disk - Store data: tools, porn, pirated stuff

(9)

Hmmm, Do I Smell Bacon?

(10)

How

(11)

How

• Email - virus, spam, tracking

• Internet - drive-by, worms, sniffing, cryptolocker

(12)

How

• Email - virus, spam, tracking

• Internet - drive-by, worms, sniffing, cryptolocker

(13)

How

• Email - virus, spam, tracking

• Internet - drive-by, worms, sniffing, cryptolocker

• WiFi - Mobile Phones, Laptops

• SmartPhones - ripe for attack

(14)

How

• Email - virus, spam, tracking

• Internet - drive-by, worms, sniffing, cryptolocker

• WiFi - Mobile Phones, Laptops

• SmartPhones - ripe for attack

• Dumb Passwords - use pass-phrases where

(15)

How

• Email - virus, spam, tracking

• Internet - drive-by, worms, sniffing, cryptolocker

• WiFi - Mobile Phones, Laptops

• SmartPhones - ripe for attack

• Dumb Passwords - use pass-phrases where

possible!

• Cloud - Amazon, Apple and Gmail

(16)

How

• Email - virus, spam, tracking

• Internet - drive-by, worms, sniffing, cryptolocker

• WiFi - Mobile Phones, Laptops

• SmartPhones - ripe for attack

• Dumb Passwords - use pass-phrases where

possible!

• Cloud - Amazon, Apple and Gmail

• Social Engineering - email groups, phishing,

(17)

When: Now!

• 90% of all emails are Spam/Virus/Fraud

(18)

When: Now!

• 90% of all emails are Spam/Virus/Fraud

• There are a suspected 250 million zombie

(19)

When: Now!

• 90% of all emails are Spam/Virus/Fraud

• There are a suspected 250 million zombie

computers

• Identity theft rings are flourishing

(20)

When: Now!

• 90% of all emails are Spam/Virus/Fraud

• There are a suspected 250 million zombie

computers

• Identity theft rings are flourishing

(21)

When: Now!

• 90% of all emails are Spam/Virus/Fraud

• There are a suspected 250 million zombie

computers

• Identity theft rings are flourishing

• Cloud confusion

• Virtual Crime has surpassed illicit drugs and

automobile crime

(22)

What is at Stake?

• Privacy - You hold private and powerful data you

(23)

What is at Stake?

• Privacy - You hold private and powerful data you

would not want lost

• HIPAA/SarbOx - Requires you protect your

client/patient’s data

(24)

What is at Stake?

• Privacy - You hold private and powerful data you

would not want lost

• HIPAA/SarbOx - Requires you protect your

client/patient’s data

• Your job requires you to protect data and

(25)

What is at Stake?

• Privacy - You hold private and powerful data you

would not want lost

• HIPAA/SarbOx - Requires you protect your

client/patient’s data

• Your job requires you to protect data and

passwords

• Legions of Evil Doers hover about and constantly

probe

(26)

What to Do?

(27)

What to Do?

• Never share your password. NEVER!

• Firewall - Necessary, but does not solve all

problems

(28)

What to Do?

• Never share your password. NEVER!

• Firewall - Necessary, but does not solve all

problems

(29)

What to Do?

• Never share your password. NEVER!

• Firewall - Necessary, but does not solve all

problems

• Antivirus/Antispyware - But Day-0 virus issue

• Updates all the time

(30)

What to Do?

• Never share your password. NEVER!

• Firewall - Necessary, but does not solve all

problems

• Antivirus/Antispyware - But Day-0 virus issue

• Updates all the time

(31)

What to Do?

• Never share your password. NEVER!

• Firewall - Necessary, but does not solve all

problems

• Antivirus/Antispyware - But Day-0 virus issue

• Updates all the time

• Locking Screen Saver

• Hotmail, HotSex.com, Dropbox, Facebook?

(32)

What to Do?

• Never share your password. NEVER!

• Firewall - Necessary, but does not solve all

problems

• Antivirus/Antispyware - But Day-0 virus issue

• Updates all the time

• Locking Screen Saver

• Hotmail, HotSex.com, Dropbox, Facebook?

(33)

What to Do?

• Never share your password. NEVER!

• Firewall - Necessary, but does not solve all

problems

• Antivirus/Antispyware - But Day-0 virus issue

• Updates all the time

• Locking Screen Saver

• Hotmail, HotSex.com, Dropbox, Facebook?

• Know your WiFi in strange places

• It’s not “your” computer, and you don’t know

how it works...

(34)

What to Do?

• Never share your password. NEVER!

• Firewall - Necessary, but does not solve all

problems

• Antivirus/Antispyware - But Day-0 virus issue

• Updates all the time

• Locking Screen Saver

• Hotmail, HotSex.com, Dropbox, Facebook?

• Know your WiFi in strange places

• It’s not “your” computer, and you don’t know

References

Related documents

Nurse Migration as a Challenge for Professional Development fields of intermediation in intercultural settings native nurses patients as immigrants (nurse) management nurses

Weight and cost optimization (MDO) f hi l Physics Thermal behavior sim lation of ICT Optimization of traffic flow and driver Mathematics Optimization of CAE Solving

“The LSI controller gives us the ability to tie multiple storage devices together as one, which solves our capacity issue,” said Vault Ecommerce’s John Holt, “The data that is

Please place a Security Alert on my file to warn credit issuers that imposters may be using my personal information to fraudulently obtain credit. Due to these problems, creditors

 If Arc Pro Server is installed on the same blade as (is co-resident with) another Cisco application, including Cisco Unified Communications Manager and Unity, the Arc Pro

Jackrabbits Colors ...Yellow and Blue Conference ...Western Wrestling Conference Air Force, North Dakota State, Northern Colorado, Northern Iowa, South Dakota

Test conditions: in accordance with standard IEC 947-5-1 set up for rated control voltage, operating rate: 1800 cycles/hour.. AC-14 and AC-15 operating cycles

EXAMPLE PROGRAM SCHEDULE FOR COMBINED DEGREE: BACHELOR OF BUSINESS (HUMAN RESOURCE MANAGEMENT), BACHELOR OF COMMERCE (ACCOUNTING) FIRST YEAR. First Semester (SP 1, 2