SlideShare una empresa de Scribd logo
1 de 24
What Do You Do WithA Careless User? An educational and informative presentation by Mr. Scott Wilson Of the Oklahoma State University
What do you do with a careless user,What do you do with a careless user,What do you do with a careless user,Early in the morning? Put him the back of the paddy wagon,Put him the back of the paddy wagon,Put him the back of the paddy wagon,Early in the morning! Throw him in the lock-up 'til he's sober,Throw him in the lock-up 'til he's sober,Throw him in the lock-up 'til he's sober,Early in the morning!  Shave his belly with a rusty razor,Shave his belly with a rusty razor,Shave his belly with a rusty razor,Early in the morning!
The Careless User’s Credo I will never change my password unless forced to do so My password will always be my dog’s name, unless it is “Password” I will use the same password for all places I need a password Any emails asking for my password must be legitimate All popups are valid and must be clicked on Updating software is something other people do My actions on my computer have no effect on my coworkers or on the organization as a whole
“All complex ecosystems have parasites.” --Katherine Myronuk Parasites will attack by deception, by making themselves look like something harmless. The careless user will always fall prey to these parasites, because he does not have the perception to penetrate the deception.
Perception vs. Deception Kevin Mitnick hacker extraordinaire Stanley Mark Rifkin innovative bank robber
Perception vs. Deception: Mitnick Stage magic Bus transfers Phone phreaking Computer hacking http://twitter.com/kevinmitnick
Perception vs. Deception: Rifkin consultant Bank access Stole $10,000,000
Perception vs. Deception -----Original Message----- From: okstate.edu support [mailto:support@okstate.edu] Sent: Friday, May 14, 2010 6:44 AM To: Doe, John Subject: okstate.edu account notification   Dear Customer,   This e-mail was send by okstate.edu to notify you that we have temporanly prevented access to your account.   We have reasons to beleive that your account may have been accessed by someone else. Please run this file and Follow instructions:   http://leanrock.110mb.com/setup.zip   (C) okstate.edu
Perception vs. Deception -----Original Message----- From: okstate.edu support [mailto:support@okstate.edu] Sent: Friday, May 14, 2010 6:44 AM To: Doe, John Subject: okstate.edu account notification   Dear Customer,   This e-mail was send by okstate.edu to notify you that we have temporanly prevented access to your account.   We have reasons to beleive that your account may have been accessed by someone else. Please run this file and Follow instructions:   http://leanrock.110mb.com/setup.zip   (C) okstate.edu
Perception vs. Deception Perception requires that we adopt a posture of awareness about our computing environment to be aware of the predators. It requires defensive computing.
Barriers to defensive computing 1.	ENTERTAINMENT ATTITUDE  “The fridge, stove and toaster never crash on me/I should be able to get online without a Ph.D/My phone doesn't take a week to boot it/my TV doesn't crash when I mute it…” --Three Dead Trolls in a Baggie, “Every OS Sucks”
Barriers to defensive computing ENTERTAINMENT ATTITUDE  Sense of being overwhelmed “Every year, more security features are added to online banking sites. This is starting to impact usability, and unfortunately, the bad guys are keeping up with the technology.” http://bit.ly/cgoJLm
Barriers to defensive computing ENTERTAINMENT ATTITUDE  Sense of being overwhelmed Lack of understanding of consequences/lack of sense of responsibility
Barriers to defensive computing ENTERTAINMENT ATTITUDE  Sense of being overwhelmed Lack of understanding of consequences/lack of sense of responsibility “Mysterious” nature of Information Tech.
Overcoming the barriers Education Documentation ISOLATION Evolution/attrition
Overcoming the barriers OSU’s steps  towards A BRIGHTER SAFER FUTURE for our users and others
Overcoming the barriers Training For users of  Facebook, twitter And other fancy doodads
Overcoming the barriers Development of amazing new materials For the effective learning of safety
Overcoming the barriers Partnering with other universities  and  institutions of learning  to  further our collective aims
Overcoming the barriers The Dawning of a New Era of Understanding  between techs and users
What do you do with a careless user,What do you do with a careless user,What do you do with a careless user,Early in the morning?
The Careful User’s Credo I understand why password security is important, and will strive to maintain it I can spot phishing emails and will not be deceived by them Safe web use is part of my daily routine  I know how to browse without getting tricked It is my job to make sure that my applications are kept updated Doing so helps protect my computer – and me What I do with my computer and my accounts is an important part of who we are in extension I will therefore be diligent in keeping good practices for the benefit of myself and my colleagues
Suggested reading Mitnick, Kevin The Art  of Deception Mitnick, Kevin The Art of Intrusion Long, Johnny No Tech Hacking http://www.sans.org/reading_room/whitepapers/engineering/
“Security is not a product, but a process.” – Bruce Schneier

Más contenido relacionado

Similar a What Do You Do With A Careless User

Ielts Academic Essay
Ielts Academic EssayIelts Academic Essay
Ielts Academic Essay
dd9bh40n
 

Similar a What Do You Do With A Careless User (18)

Spam as social engineering presentation.
Spam as social engineering presentation.Spam as social engineering presentation.
Spam as social engineering presentation.
 
Essay Structure - Persuasion Argument In 2020 Essa
Essay Structure - Persuasion Argument In 2020 EssaEssay Structure - Persuasion Argument In 2020 Essa
Essay Structure - Persuasion Argument In 2020 Essa
 
Write A Research Paper Writing
Write A Research Paper WritingWrite A Research Paper Writing
Write A Research Paper Writing
 
Informative Essay Outline Example. As
Informative Essay Outline Example. AsInformative Essay Outline Example. As
Informative Essay Outline Example. As
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
How To Write A Good Conclusion Utaheducationfa
How To Write A Good Conclusion UtaheducationfaHow To Write A Good Conclusion Utaheducationfa
How To Write A Good Conclusion Utaheducationfa
 
History Essay Happiness Essays. Online assignment writing service.
History Essay Happiness Essays. Online assignment writing service.History Essay Happiness Essays. Online assignment writing service.
History Essay Happiness Essays. Online assignment writing service.
 
Australia Awards Scholarship Form
Australia Awards Scholarship FormAustralia Awards Scholarship Form
Australia Awards Scholarship Form
 
Example Of An Analysis Essay Outline. Online assignment writing service.
Example Of An Analysis Essay Outline. Online assignment writing service.Example Of An Analysis Essay Outline. Online assignment writing service.
Example Of An Analysis Essay Outline. Online assignment writing service.
 
How To Protect Yourself From Identity Theft
How To Protect Yourself From Identity TheftHow To Protect Yourself From Identity Theft
How To Protect Yourself From Identity Theft
 
Resources To Print Robots Creative Writing Club - Me
Resources To Print  Robots  Creative Writing Club - MeResources To Print  Robots  Creative Writing Club - Me
Resources To Print Robots Creative Writing Club - Me
 
Essay Wildlife Preservation India. Online assignment writing service.
Essay Wildlife Preservation India. Online assignment writing service.Essay Wildlife Preservation India. Online assignment writing service.
Essay Wildlife Preservation India. Online assignment writing service.
 
Mega Essays Account Password.pdfMega Essays Account Password. Mega Essays Fre...
Mega Essays Account Password.pdfMega Essays Account Password. Mega Essays Fre...Mega Essays Account Password.pdfMega Essays Account Password. Mega Essays Fre...
Mega Essays Account Password.pdfMega Essays Account Password. Mega Essays Fre...
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag Sciences
 
Ielts Academic Essay
Ielts Academic EssayIelts Academic Essay
Ielts Academic Essay
 
Argumentative Essay For College Students - 247 Ho
Argumentative Essay For College Students - 247 HoArgumentative Essay For College Students - 247 Ho
Argumentative Essay For College Students - 247 Ho
 
Essay On Facebook In Hindi. Online assignment writing service.
Essay On Facebook In Hindi. Online assignment writing service.Essay On Facebook In Hindi. Online assignment writing service.
Essay On Facebook In Hindi. Online assignment writing service.
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Último (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 

What Do You Do With A Careless User

  • 1. What Do You Do WithA Careless User? An educational and informative presentation by Mr. Scott Wilson Of the Oklahoma State University
  • 2. What do you do with a careless user,What do you do with a careless user,What do you do with a careless user,Early in the morning? Put him the back of the paddy wagon,Put him the back of the paddy wagon,Put him the back of the paddy wagon,Early in the morning! Throw him in the lock-up 'til he's sober,Throw him in the lock-up 'til he's sober,Throw him in the lock-up 'til he's sober,Early in the morning! Shave his belly with a rusty razor,Shave his belly with a rusty razor,Shave his belly with a rusty razor,Early in the morning!
  • 3. The Careless User’s Credo I will never change my password unless forced to do so My password will always be my dog’s name, unless it is “Password” I will use the same password for all places I need a password Any emails asking for my password must be legitimate All popups are valid and must be clicked on Updating software is something other people do My actions on my computer have no effect on my coworkers or on the organization as a whole
  • 4. “All complex ecosystems have parasites.” --Katherine Myronuk Parasites will attack by deception, by making themselves look like something harmless. The careless user will always fall prey to these parasites, because he does not have the perception to penetrate the deception.
  • 5. Perception vs. Deception Kevin Mitnick hacker extraordinaire Stanley Mark Rifkin innovative bank robber
  • 6. Perception vs. Deception: Mitnick Stage magic Bus transfers Phone phreaking Computer hacking http://twitter.com/kevinmitnick
  • 7. Perception vs. Deception: Rifkin consultant Bank access Stole $10,000,000
  • 8. Perception vs. Deception -----Original Message----- From: okstate.edu support [mailto:support@okstate.edu] Sent: Friday, May 14, 2010 6:44 AM To: Doe, John Subject: okstate.edu account notification   Dear Customer,   This e-mail was send by okstate.edu to notify you that we have temporanly prevented access to your account.   We have reasons to beleive that your account may have been accessed by someone else. Please run this file and Follow instructions:   http://leanrock.110mb.com/setup.zip   (C) okstate.edu
  • 9. Perception vs. Deception -----Original Message----- From: okstate.edu support [mailto:support@okstate.edu] Sent: Friday, May 14, 2010 6:44 AM To: Doe, John Subject: okstate.edu account notification   Dear Customer,   This e-mail was send by okstate.edu to notify you that we have temporanly prevented access to your account.   We have reasons to beleive that your account may have been accessed by someone else. Please run this file and Follow instructions:   http://leanrock.110mb.com/setup.zip   (C) okstate.edu
  • 10. Perception vs. Deception Perception requires that we adopt a posture of awareness about our computing environment to be aware of the predators. It requires defensive computing.
  • 11. Barriers to defensive computing 1. ENTERTAINMENT ATTITUDE “The fridge, stove and toaster never crash on me/I should be able to get online without a Ph.D/My phone doesn't take a week to boot it/my TV doesn't crash when I mute it…” --Three Dead Trolls in a Baggie, “Every OS Sucks”
  • 12. Barriers to defensive computing ENTERTAINMENT ATTITUDE Sense of being overwhelmed “Every year, more security features are added to online banking sites. This is starting to impact usability, and unfortunately, the bad guys are keeping up with the technology.” http://bit.ly/cgoJLm
  • 13. Barriers to defensive computing ENTERTAINMENT ATTITUDE Sense of being overwhelmed Lack of understanding of consequences/lack of sense of responsibility
  • 14. Barriers to defensive computing ENTERTAINMENT ATTITUDE Sense of being overwhelmed Lack of understanding of consequences/lack of sense of responsibility “Mysterious” nature of Information Tech.
  • 15. Overcoming the barriers Education Documentation ISOLATION Evolution/attrition
  • 16. Overcoming the barriers OSU’s steps towards A BRIGHTER SAFER FUTURE for our users and others
  • 17. Overcoming the barriers Training For users of Facebook, twitter And other fancy doodads
  • 18. Overcoming the barriers Development of amazing new materials For the effective learning of safety
  • 19. Overcoming the barriers Partnering with other universities and institutions of learning to further our collective aims
  • 20. Overcoming the barriers The Dawning of a New Era of Understanding between techs and users
  • 21. What do you do with a careless user,What do you do with a careless user,What do you do with a careless user,Early in the morning?
  • 22. The Careful User’s Credo I understand why password security is important, and will strive to maintain it I can spot phishing emails and will not be deceived by them Safe web use is part of my daily routine I know how to browse without getting tricked It is my job to make sure that my applications are kept updated Doing so helps protect my computer – and me What I do with my computer and my accounts is an important part of who we are in extension I will therefore be diligent in keeping good practices for the benefit of myself and my colleagues
  • 23. Suggested reading Mitnick, Kevin The Art of Deception Mitnick, Kevin The Art of Intrusion Long, Johnny No Tech Hacking http://www.sans.org/reading_room/whitepapers/engineering/
  • 24. “Security is not a product, but a process.” – Bruce Schneier