SlideShare una empresa de Scribd logo
1 de 24
Descargar para leer sin conexión
Steven Mandzik   Web 2.0 Security
Danah Boyd
    Privacy = Control
Anil Dash
One of the biggest benefits of that reality is that I now have control.
The information I choose to reveal...

Granted, I'll never have total control. But look at most people who are
concerned with privacy. They're fighting a losing battle, trying to
prevent their personal information from being available on the web at
all.

If you recognize that it's going to happen, your best bet is to choose
how, when, and where it shows up.
Social Engineering
Facts
★ 50% of security breaches have come from federal/state
  government (since 2005)

★ Spear Phishing US Government email resulted 74,000
  compromised computers

★ State actors -- Google v China -- East Europe Mafia
Top Problems
★ Social Engineering

★ Spear Phishing

★ Updates

★ Passwords

★ Identity Theft
OBE -- (not top problems)
★ Anti-Virus

★ Identity Theft

★ Passwords (kinda)
Solutions
Simple
Simplify
★ Financial

★ Social

★ News
Financial
E*Trade
Amex
Social
News
Passwords
             Strong Password Definition, Requirements and Guidelines


•A strong password is a password that meets the following guidelines:
•Be 7 or 14 characters long.
•Contain both uppercase and lowercase letters.
•Contain numbers.
•Contain symbols, such as ` ! " ? $ ? % ^ & * ( ) _ - + = { [ } ] : ; @ ' ~ # |  < , > . ? /
•Contain a symbol in the second, third, fourth, fifth or sixth position (due to the way in which encryption
works).
•Not resemble any of your previous passwords.
•Not be your name, your friend's or family member's name, or your login.
•Not be a dictionary word or common name.
OAuth




        Facebook Connect
Finally!
Upgrade, Upgrade
Upgra
Steven Mandzik
Director of Green IT, Navstar Inc.

Steve@acleanlife.org

twitter: robotchampion

www.acleanlife.org --- www.stevenmandzik.com

Más contenido relacionado

Destacado

Rainbowarrior's Guide to Katalamize!
Rainbowarrior's Guide to Katalamize!Rainbowarrior's Guide to Katalamize!
Rainbowarrior's Guide to Katalamize!itsleee
 
V-Pro: Formación en Ventas Profesionales
V-Pro: Formación en Ventas ProfesionalesV-Pro: Formación en Ventas Profesionales
V-Pro: Formación en Ventas ProfesionalesGuillermo Scappini
 
The Near Future of CSS
The Near Future of CSSThe Near Future of CSS
The Near Future of CSSRachel Andrew
 
Classroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and AdolescentsClassroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and AdolescentsShelly Sanchez Terrell
 
The Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris LemaThe Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris LemaChris Lema
 

Destacado (8)

Water Disaster
Water DisasterWater Disaster
Water Disaster
 
What Is Green It?
What Is Green It?What Is Green It?
What Is Green It?
 
Sxsw 2010
Sxsw 2010Sxsw 2010
Sxsw 2010
 
Rainbowarrior's Guide to Katalamize!
Rainbowarrior's Guide to Katalamize!Rainbowarrior's Guide to Katalamize!
Rainbowarrior's Guide to Katalamize!
 
V-Pro: Formación en Ventas Profesionales
V-Pro: Formación en Ventas ProfesionalesV-Pro: Formación en Ventas Profesionales
V-Pro: Formación en Ventas Profesionales
 
The Near Future of CSS
The Near Future of CSSThe Near Future of CSS
The Near Future of CSS
 
Classroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and AdolescentsClassroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and Adolescents
 
The Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris LemaThe Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris Lema
 

Similar a Web20security

Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service DeskNorthCoastHDI
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)David Herrington
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereBlake Carver
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 Thycotic
 
cybersecurity and Bullying
cybersecurity and Bullying cybersecurity and Bullying
cybersecurity and Bullying Karthik Kumar
 
How to Keep Your Business Data Secure Without Spending Time Worrying About a ...
How to Keep Your Business Data Secure Without Spending Time Worrying About a ...How to Keep Your Business Data Secure Without Spending Time Worrying About a ...
How to Keep Your Business Data Secure Without Spending Time Worrying About a ...Xenium HR
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Cyber Security Protection
Cyber Security ProtectionCyber Security Protection
Cyber Security ProtectionMark Cook
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About itAleksandr Yampolskiy
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptCakraWicaksono3
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptpixvilx
 

Similar a Web20security (20)

Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
 
cybersecurity and Bullying
cybersecurity and Bullying cybersecurity and Bullying
cybersecurity and Bullying
 
Information Secuirty
Information SecuirtyInformation Secuirty
Information Secuirty
 
How to Keep Your Business Data Secure Without Spending Time Worrying About a ...
How to Keep Your Business Data Secure Without Spending Time Worrying About a ...How to Keep Your Business Data Secure Without Spending Time Worrying About a ...
How to Keep Your Business Data Secure Without Spending Time Worrying About a ...
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cyber Security Protection
Cyber Security ProtectionCyber Security Protection
Cyber Security Protection
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 

Web20security

  • 1.
  • 2. Steven Mandzik Web 2.0 Security
  • 3. Danah Boyd Privacy = Control
  • 4. Anil Dash One of the biggest benefits of that reality is that I now have control. The information I choose to reveal... Granted, I'll never have total control. But look at most people who are concerned with privacy. They're fighting a losing battle, trying to prevent their personal information from being available on the web at all. If you recognize that it's going to happen, your best bet is to choose how, when, and where it shows up.
  • 6.
  • 7.
  • 8.
  • 9. Facts ★ 50% of security breaches have come from federal/state government (since 2005) ★ Spear Phishing US Government email resulted 74,000 compromised computers ★ State actors -- Google v China -- East Europe Mafia
  • 10. Top Problems ★ Social Engineering ★ Spear Phishing ★ Updates ★ Passwords ★ Identity Theft
  • 11. OBE -- (not top problems) ★ Anti-Virus ★ Identity Theft ★ Passwords (kinda)
  • 17. Amex
  • 19. News
  • 20. Passwords Strong Password Definition, Requirements and Guidelines •A strong password is a password that meets the following guidelines: •Be 7 or 14 characters long. •Contain both uppercase and lowercase letters. •Contain numbers. •Contain symbols, such as ` ! " ? $ ? % ^ & * ( ) _ - + = { [ } ] : ; @ ' ~ # | < , > . ? / •Contain a symbol in the second, third, fourth, fifth or sixth position (due to the way in which encryption works). •Not resemble any of your previous passwords. •Not be your name, your friend's or family member's name, or your login. •Not be a dictionary word or common name.
  • 21. OAuth Facebook Connect
  • 24. Steven Mandzik Director of Green IT, Navstar Inc. Steve@acleanlife.org twitter: robotchampion www.acleanlife.org --- www.stevenmandzik.com