InfoSec 101
Introduction to Information Security for (non-IT) Professionals Fabian Lischka, Larry Salibra, Leonhard Weese FCC, Hong Kong, 2015-02-26
V0.97 from 2015-03-12
InfoSec 101 Introduction to Information Security for (non-IT) - - PowerPoint PPT Presentation
InfoSec 101 Introduction to Information Security for (non-IT) Professionals Fabian Lischka, Larry Salibra, Leonhard Weese FCC, Hong Kong, 2015-02-26 V0.97 from 2015-03-12 Content I n t r o d u c t i o n D i s c l a i m e r s
V0.97 from 2015-03-12
InfoSec 101 2015-02-26 Page 2 of 30
– Disclaimers
– Basics: Passwords, Phishing – Communication: Browsing, VPN, Email, Chat
InfoSec 101 2015-02-26 Page 3 of 30
– Film journalist in Syria: Gov't confjscated laptop – AP Twitter account hacked: Phishing – GCHQ captured journalists' emails (BBC, NYT, …) – Hackers used hotel Wi-Fi to steal executive's data
InfoSec 101 2015-02-26 Page 4 of 30
–
Jennifer Valentino DeVries, WSJ
– Relieved/confjdent sources – Practice – Network effect – Red fmag: Help your fellow journalists
InfoSec 101 2015-02-26 Page 5 of 30
– Do not rely on this in life-and-death situations – No protection against WFO, governments, etc.
InfoSec 101 2015-02-26 Page 6 of 30
InfoSec 101 2015-02-26 Page 7 of 30
– Dictionary + trial and error – Database breaches (LinkedIn, Gawker, …) – “I lost my password”
– Good passwords! – No re-use – No security questions
InfoSec 101 2015-02-26 Page 8 of 30
– What you love – Words related to site – Dictionary words, patterns (`1234`, `qwerty`, `abcd`)
– Appending: password123, password! – Substitutions: p@55word – Simple composition: password123angel!
InfoSec 101 2015-02-26 Page 9 of 30
InfoSec 101 2015-02-26 Page 10 of 30
– 1st letter of long passphrase – Example: Wo hěn xǐhuān HK, IT security, and
– 4 or 5 randomly selected words – Example: Keelhaul, cleistogamy, evince, vacuum
InfoSec 101 2015-02-26 Page 11 of 30
– Master Password
– Apple only, simple: iCloud Keychain – Free, open source: pwsafe, or KeePass – Commercial, with support: 1Password, or LastPass
– Compromise
InfoSec 101 2015-02-26 Page 12 of 30
InfoSec 101 2015-02-26 Page 13 of 30
– "log in" on fake site, or hit by drive-by exploit – Spearphishing
– Don't click! – Don't install!
InfoSec 101 2015-02-26 Page 14 of 30
– Hotel, stolen, border
– Smartphones: Automatic (on latest: iOS 8, Android L) – OS X: FileVault – Windows: BitLocker
– OS X: Format as encrypted disks (Disk Utility)
InfoSec 101 2015-02-26 Page 15 of 30
– Search engines, social networks – Cookies – IP address
– Adblock Plus – AlwaysHTTPS – Ghostery – Privacy Badger
InfoSec 101 2015-02-26 Page 16 of 30
– DuckDuckGo: Can set as default eg in Safari – Ixquick: non-Google sources – StartPage: Google source
InfoSec 101 2015-02-26 Page 17 of 30
– Routes through extra hops, encrypted – Torbrowser (OS X, Win), OnionBrowser (iOS), Orbot
– .onion, eg 3g2upl4pq6kufc4m.onion (DuckDuckGo)
– Do not divulge private information – Don't open documents while online
– Slower – Final hop in the clear
InfoSec 101 2015-02-26 Page 18 of 30
– From device encrypted to VPN server "somewhere" – From VPN server unencrypted to destination
– Protects from interception "nearby" – Allows to circumvent censorship
– AirVPN – ZenMate. Free. Only browser
InfoSec 101 2015-02-26 Page 19 of 30
– Plain Text + key + algo = ciphertext – Transmit/store ciphertext – Ciphertext + key + algo = Plain Text
– Key management, MITM ("fjnger prints" OOB)
InfoSec 101 2015-02-26 Page 20 of 30
– Unencrypted – Partially – End-to-End
Server: Xy#! Xy#! Xy#! Alice Bob Server: Abcd Abcd Abcd Alice Bob Server: Abcd Xy#! Xy#! Alice Bob
InfoSec 101 2015-02-26 Page 21 of 30
– PGP: original (1991), GPG: open source – Both implement OpenPGP
– GPG4Win: GPG for Windows – GPGTools: GPG for OS X, with Mail integration. – IPGMail: GPG for iOS.
InfoSec 101 2015-02-26 Page 22 of 30
– Sender, recipient, subject, length, time, frequency of mails
– 4096 bits, RSA – Expiry date, say 2 years
– Strong passphrase
InfoSec 101 2015-02-26 Page 23 of 30
– iMessage (Apple only) – Signal (iOS), TextSecure (Android) – Telegram (using “Secret Chat”)
– Remedy: Out-of-band key comparison
InfoSec 101 2015-02-26 Page 24 of 30
– FaceTime (Apple only) – Signal (iOS), Redphone (Android)
– Normal phone calls – Google Hangout (Voice/Video), Skype
InfoSec 101 2015-02-26 Page 25 of 30
– Phone number, email can be googled – Reverse Image Search (TinEye, Google) – Images: EXIF
InfoSec 101 2015-02-26 Page 26 of 30
– Work – Private – Project XYZ
– move information in a controlled matter
– Have to re-enter passwords etc.
– Makes information leaks less likely
InfoSec 101 2015-02-26 Page 27 of 30
– One layer broken, still secure
– Agree on code words for sensitive entities – Cut message in many pieces, transmit...
– Use TOR over a VPN
InfoSec 101 2015-02-26 Page 28 of 30
– Deleting Data – Cloud Storage – Whistleblowing (“SecureDrop”)
InfoSec 101 2015-02-26 Page 29 of 30
– OpSec – VMs (Virtual Machines) – Tails (The amnesic incognito live system)
InfoSec 101 2015-02-26 Page 30 of 30