Its presentation
-
Upload
morten-nielsen -
Category
Education
-
view
324 -
download
3
description
Transcript of Its presentation
- 1. IT security A quick introduction (featuring statistics) 2011 Spring Morten Bo Nielsen[email_address]
2. Overview
- Introduction
3. Common use
- Browsers, Emails
Minimizing risk
- Updates, Security awareness
Perspective 4. Questions 5. Introducing security
- Physical
- Seat belts
6. Don't share PIN 7. Lock doors 8. Avoid bad neighborhoods 9. And more...
- Virtual
- Passwords
10. Antivirus 11. Firewalls 12. Browsing habits 13. Awareness 14. And more... 15. Browsing
- The browser
- Internet explorer
16. Chrome 17. Firefox 18. Others 4 of 5 installationsare vulnerable References:
- The register
19. Good vs. bad sites
- Just avoid the dark side
20. Trusted sites have problems also
- Bad user content
21. Malicious activity This discussion is beyond the scope of this presentation 22. Email
- Inherently insecure
- Build to work, not to be secure
23. Faking emails are easy 24. HTML and javascript makes it worse 25. Spam
- Spam works
- E.g. 1 billion mails gives $7000 per day
References:
- Wired.com
26. Phishing
- Phishing
- Click this link
27. Could be fake email from e.g. a bank or ebay (Example on next slide) 28. 29. Difference between email source domain and click here domain Limitted time offer They have paired my email address and my name. Taken from the EAL homepage? 30. Software updates References:
- Net-security.org
- Windows
- 31% of vulnerabilities
31. Automatic updates from MS 32. (use it, it works!)
- 3 rdparty
- 69%
33. 13 vendors average 34. Automatic updates? Might not exist. 35. Security awareness
- Email hygiene
- You did not win the email lottery
36. Lolitta from Russia has not single you out 37. Don't click links
- Browsing habits
- Stay anonymous
38. Beware of social media 39. Be extra careful when money is involved 40. Security awareness
- Your PC
- Automatic updates and antivirus are mandatory
41. USB pens are virus carriers 42. Install trusted programs or addons only
- The rest
- Passwords...
43. Do backups 44. Decide on your level of security 45. Perspectives
- Mobile devices
46. Networked devices (Router, printer) 47. More networked devices (TVs, refrigerators, etc.) It is notthatbad, but Igot your attention, no? 48.