Cyber Security Awareness Seminar
Presented By: Ryan Moore
Ohio Cyber Range Institute, University of Cincinnati
Cyber Security Awareness Seminar Presented By: Ryan Moore Ohio - - PowerPoint PPT Presentation
Cyber Security Awareness Seminar Presented By: Ryan Moore Ohio Cyber Range Institute, University of Cincinnati About This Seminar Designed for everyday cyber citizens Online Webinar 2 hour Presentation 10 Minute break
Cyber Security Awareness Seminar
Presented By: Ryan Moore
Ohio Cyber Range Institute, University of Cincinnati
Ohio Cyber Range Institute, University of Cincinnati
About This Seminar
Ohio Cyber Range Institute, University of Cincinnati
Outcomes of this Seminar
Ohio Cyber Range Institute, University of Cincinnati
Security Mindset
Protecting our lives and our property
Ohio Cyber Range Institute, University of Cincinnati
Cyber Security Mindset
Ohio Cyber Range Institute, University of Cincinnati
Cyber Security – It doesn’t affect me….
…I barely use the Internet …I don’t shop/bank online …I don’t have anything to steal …That’s what the IT person is for
Ohio Cyber Range Institute, University of Cincinnati
Cyber Security – Affects Everyone
human mistakes and misunderstanding
Ohio Cyber Range Institute, University of Cincinnati
Don’t Be Afraid
Ohio Cyber Range Institute, University of Cincinnati
Common Security Threats
attitudes and behaviors that serve to protect our information assets
Ohio Cyber Range Institute, University of Cincinnati
Malicious Software - Distribution
Categorized by how they spread
Ohio Cyber Range Institute, University of Cincinnati
Malicious Software - Actions
Categorized by what they do
Ohio Cyber Range Institute, University of Cincinnati
Malicious Software - Demo
Ohio Cyber Range Institute, University of Cincinnati
Social Engineering
Ohio Cyber Range Institute, University of Cincinnati
Man in the Middle
Eavesdropping on you communications
Ohio Cyber Range Institute, University of Cincinnati
Vulnerability Exploitation
Vulnerability - a weakness in a system
Easily Avoidable Causes
Ohio Cyber Range Institute, University of Cincinnati
Vulnerability Exploitation
Ohio Cyber Range Institute, University of Cincinnati
Protecting Your Information
Ohio Cyber Range Institute, University of Cincinnati
Authentication
First line of defense! Identify and Prove Forms of Authentication
Ohio Cyber Range Institute, University of Cincinnati
Password Security
Ohio Cyber Range Institute, University of Cincinnati
Creating Strong Passwords
Length – The longer the harder to crack Complexity – More character options = more time to crack Randomness – Don’t use words, phrases, or numbers that are common
Ohio Cyber Range Institute, University of Cincinnati
Strong and Easy Passwords
The Sun Will Come Out, Tomorrow, Bet Your Bottom Dollar
Random!
12 Characters + Symbols!
Mixed case and numbers!
Add “a$” for Amazon.com
Add “em” for email https://howsecureismypassword.net/
Ohio Cyber Range Institute, University of Cincinnati
Protect Your Password
Always keep your secret to yourself!
Ohio Cyber Range Institute, University of Cincinnati
Multifactor Authentication
Using two or more methods to authenticate Something you have
Something you know
Something you are
Ohio Cyber Range Institute, University of Cincinnati
Personal Information Online
Image Source: https://www.attogtech.com/product/protecting-your-personally-identifiable-information/
Ohio Cyber Range Institute, University of Cincinnati
Protect Your Identify
Ohio Cyber Range Institute, University of Cincinnati
Privacy Online
Social Media
Cookies (Web tracking)
Location Services
Ohio Cyber Range Institute, University of Cincinnati
Social Media Security and Privacy
Ohio Cyber Range Institute, University of Cincinnati
Browser Privacy
Ohio Cyber Range Institute, University of Cincinnati
Data Protection - Encryption
Protect data you send, receive, or store Scrambles text and other data into an unreadable format Online encryption
Ohio Cyber Range Institute, University of Cincinnati
Data Protection - Encryption
Data at Rest Full Disk Encryption
Encrypt Sensitive Files
Smart Phone Encryption
Ohio Cyber Range Institute, University of Cincinnati
Data Protection - Backups
3-2-1 Rule
One Primary Copy and Two Backups
Hard Drive, File Server, Cloud
Cloud Backup Methods Manual Backup Scheduled Automated Backup Sync Backup
Ohio Cyber Range Institute, University of Cincinnati
Data Protection – Backup Methods
Manual Backup
Scheduled Automated Backup
Sync Backup
Ohio Cyber Range Institute, University of Cincinnati
Windows Backup
Ohio Cyber Range Institute, University of Cincinnati
Protecting Your Devices
Ohio Cyber Range Institute, University of Cincinnati
Software Updates
Why are Updates Important?
Are there downsides to updating?
Ohio Cyber Range Institute, University of Cincinnati
What to Update
Operating System
Applications
Connected Hardware (Firmware)
Ohio Cyber Range Institute, University of Cincinnati
When and How to Update
Update Often
Use Settings Menus to Configure Updates
Download Manufacture Software for Devices Logitech Dell HP Cannon Epson
Ohio Cyber Range Institute, University of Cincinnati
Windows Update
Ohio Cyber Range Institute, University of Cincinnati
Antivirus
Software designed to detect, remove, and/or prevent malicious software Types of Antivirus
Ohio Cyber Range Institute, University of Cincinnati
Antivirus – Pros and Cons
Pros
Cons
Ohio Cyber Range Institute, University of Cincinnati
Antivirus – Which is best?
Free
Paid
Internet Service Provider Options
Ohio Cyber Range Institute, University of Cincinnati
Antivirus – I don’t use Windows?
Yes! Apple MacOSX can get viruses Yes! Smartphones can get viruses Yes! Linux can get viruses Yes! Any computing device could get a virus
Ohio Cyber Range Institute, University of Cincinnati
Local User Accounts
Why use different accounts
Ohio Cyber Range Institute, University of Cincinnati
User Accounts
Types of Accounts
software
Ohio Cyber Range Institute, University of Cincinnati
Windows Local Users
Ohio Cyber Range Institute, University of Cincinnati
Protecting Mobile Devices
Ohio Cyber Range Institute, University of Cincinnati
Protecting Your Networks
Ohio Cyber Range Institute, University of Cincinnati
Home Networks – Wi-Fi (Wireless)
Wireless Router/Access Point
Wireless Router Security
Ohio Cyber Range Institute, University of Cincinnati
Home Networks – Wi-Fi (Wireless)
Advance Wi-Fi Security
connection
Ohio Cyber Range Institute, University of Cincinnati
Home Networks – Firewalls
A device or software program that blocks unwanted Internet traffic Types of Firewalls
How to block or allow traffic
Ohio Cyber Range Institute, University of Cincinnati
Public Networks – Wi-Fi
Connecting to public Wi-Fi can be dangerous
Ohio Cyber Range Institute, University of Cincinnati
Public Networks – VPN
Virtual Private Network Secure private network over public networks Uses encryption to make a “tunnel” Business VPN
Personal VPN
Ohio Cyber Range Institute, University of Cincinnati
Identifying Threats
Ohio Cyber Range Institute, University of Cincinnati
Identifying Phishing Attack
Message my look legitimate, but look out for…
Red Flags!
Ohio Cyber Range Institute, University of Cincinnati
Identifying Malicious Websites
A website may be malicious if….
Look out for other red flags
Ohio Cyber Range Institute, University of Cincinnati
Identifying Physical Attacks
Not all attacks start from a computer
Ohio Cyber Range Institute, University of Cincinnati
Disinformation
Spotting “Fake News” Types
Consider the source
Consider the motivation