SlideShare una empresa de Scribd logo
1 de 23
Librarians in the Wild

Thinking About Security, Privacy, and
         Digital Information
Lance Hayden
 Six years with the C.I.A.
 Master’s from UT iSchool, 1997
 Cisco Systems since 1998
 Ph.D. from UT iSchool, 2009
 Lecturer in UT iSchool since 1999
   Security Informatics
   We Like to Watch: Surveillance and Society
The Wild
 Term of art in computer security
   The “real world” (as opposed to the lab)


 A metaphor for where we live in a digital society
   Complexity, uncertainty, risk, and threat
   The technology landscape
   The changing environment in which we create and
   deploy digital information infrastructures (and the
   infrastructures themselves, sometimes)
Cities in the Jungle
 We build houses, shelters, and entire
 communities in cyberspace

 Civilization (security of our resources) summed
 up as:
   Confidentiality
   Integrity
   Availability


 We often behave in our communities in ways that
 would give us pause in the physical world
Expansion and Exposure
Four Axioms of Wilderness Life

 Large herds attract big predators


 Structures decay quickly in the wild


 Protective spells are treacherous


 Knowledge is the best survival trait
From Attrition: www.attrition.org/mirror/attritio
From Attrition: www.attrition.org/mirror/attritio
A Brief Survey
 What is your risk tolerance?


 Is your Internet-facing perimeter secure? Your
 wireless?

 Are your systems and applications patched and
 up to date?

 Do your employees and users choose strong
 passwords?

 Do you have a disaster recovery and business
Top Ten Passwords (RockYou
Hack)

1. 123456      6. princess
2. 12345       7. rockyou
3. 123456789   8. 1234567
4. Password    9. 12345678
5. iloveyou    10.abc123
Death by USB
Security & Privacy Norms
Security Resources
 ISO 27000 standards
  Plan-Do-Check-Act
  Security Controls
 Online Resources
  SANS – www.sans.org
  ISSA – www.issa.org
  ISACA – www.isaca.org
  www.insecure.org
  www.securityfocus.com
  www.cert.org
Questions?

Más contenido relacionado

La actualidad más candente

Security and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systemsSecurity and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systems
Marce Torres
 
SafetyNet_Advert
SafetyNet_AdvertSafetyNet_Advert
SafetyNet_Advert
Jason Clark
 

La actualidad más candente (19)

IT Security
IT SecurityIT Security
IT Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Security and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systemsSecurity and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systems
 
Network security
Network security Network security
Network security
 
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, HamonsSecurity workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
 
IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
 
SafetyNet_Advert
SafetyNet_AdvertSafetyNet_Advert
SafetyNet_Advert
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Cyber security Guide
Cyber security GuideCyber security Guide
Cyber security Guide
 
Defense in Depth
Defense in DepthDefense in Depth
Defense in Depth
 
Maleeff university of toronto 11 july 2019
Maleeff university of toronto 11 july 2019Maleeff university of toronto 11 july 2019
Maleeff university of toronto 11 july 2019
 
eScan Version 14 With Cloud Security.
eScan Version 14 With Cloud Security.eScan Version 14 With Cloud Security.
eScan Version 14 With Cloud Security.
 
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 

Destacado

Destacado (6)

Library as Publisher - handout
Library as Publisher - handoutLibrary as Publisher - handout
Library as Publisher - handout
 
Collaborating with IT to Deliver E-Reserves Using Drupal and Zotero
Collaborating with IT to Deliver E-Reserves Using Drupal and ZoteroCollaborating with IT to Deliver E-Reserves Using Drupal and Zotero
Collaborating with IT to Deliver E-Reserves Using Drupal and Zotero
 
Digging for Buried Treasure: Strategies for Promoting Institutional Repository
Digging for Buried Treasure: Strategies for Promoting Institutional RepositoryDigging for Buried Treasure: Strategies for Promoting Institutional Repository
Digging for Buried Treasure: Strategies for Promoting Institutional Repository
 
Can We Build It? Yes We Can! Building an ERM Solution at the University of No...
Can We Build It? Yes We Can! Building an ERM Solution at the University of No...Can We Build It? Yes We Can! Building an ERM Solution at the University of No...
Can We Build It? Yes We Can! Building an ERM Solution at the University of No...
 
Innovative Tools for Access: Enhancing Digital Collections with Emerging Tech...
Innovative Tools for Access: Enhancing Digital Collections with Emerging Tech...Innovative Tools for Access: Enhancing Digital Collections with Emerging Tech...
Innovative Tools for Access: Enhancing Digital Collections with Emerging Tech...
 
Promoting Use of EResources in Bangladesh: A Developing Country Perspective -...
Promoting Use of EResources in Bangladesh: A Developing Country Perspective -...Promoting Use of EResources in Bangladesh: A Developing Country Perspective -...
Promoting Use of EResources in Bangladesh: A Developing Country Perspective -...
 

Similar a Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, and Digital Information - Lance Hayden

The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
laurieannwilliams
 
The nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurityThe nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurity
Sherry Jones
 
The nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurityThe nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurity
Sherry Jones
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
dr_edw777
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
hm5314581
 
Craig wilson
Craig wilsonCraig wilson
Craig wilson
IPPAI
 

Similar a Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, and Digital Information - Lance Hayden (20)

The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
 
The nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurityThe nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurity
 
The nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurityThe nature lover’s guide to cybersecurity
The nature lover’s guide to cybersecurity
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
Dr. Alan Shark
Dr. Alan SharkDr. Alan Shark
Dr. Alan Shark
 
Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano Zanero
 
Mirror mirrror
Mirror mirrrorMirror mirrror
Mirror mirrror
 
Cyber security
Cyber security Cyber security
Cyber security
 
Windows of Opportunity in Hallways of Distractions: the race between threats,...
Windows of Opportunity in Hallways of Distractions: the race between threats,...Windows of Opportunity in Hallways of Distractions: the race between threats,...
Windows of Opportunity in Hallways of Distractions: the race between threats,...
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPT
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Introduction to the concept of it security
Introduction to the concept of it securityIntroduction to the concept of it security
Introduction to the concept of it security
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
 
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
 
Craig wilson
Craig wilsonCraig wilson
Craig wilson
 
Most Viewed Article in the Current Issue - International Journal of Distribut...
Most Viewed Article in the Current Issue - International Journal of Distribut...Most Viewed Article in the Current Issue - International Journal of Distribut...
Most Viewed Article in the Current Issue - International Journal of Distribut...
 
New Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecurityNew Paradigms for the Next Era of Security
New Paradigms for the Next Era of Security
 
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 

Más de Electronic Resources & Libraries

Evaluating and Marketing Electronic Resources - Kennedy supplement material
Evaluating and Marketing Electronic Resources - Kennedy supplement materialEvaluating and Marketing Electronic Resources - Kennedy supplement material
Evaluating and Marketing Electronic Resources - Kennedy supplement material
Electronic Resources & Libraries
 

Más de Electronic Resources & Libraries (20)

Electronic Resources and Libraries Workshop at INFO 2012, Tel Aviv
Electronic Resources and Libraries Workshop at INFO 2012, Tel AvivElectronic Resources and Libraries Workshop at INFO 2012, Tel Aviv
Electronic Resources and Libraries Workshop at INFO 2012, Tel Aviv
 
Evaluating and Marketing Electronic Resources: What are You “Really” Doing to...
Evaluating and Marketing Electronic Resources: What are You “Really” Doing to...Evaluating and Marketing Electronic Resources: What are You “Really” Doing to...
Evaluating and Marketing Electronic Resources: What are You “Really” Doing to...
 
Wednesday Closing speakers: Where are we headed? Tools & Technologies for the...
Wednesday Closing speakers: Where are we headed? Tools & Technologies for the...Wednesday Closing speakers: Where are we headed? Tools & Technologies for the...
Wednesday Closing speakers: Where are we headed? Tools & Technologies for the...
 
Recommendation and the Library
Recommendation and the LibraryRecommendation and the Library
Recommendation and the Library
 
Harvesting From Many Silos at Web-scale Makes E-content Truly Discoverable
Harvesting From Many Silos at Web-scale Makes E-content Truly  DiscoverableHarvesting From Many Silos at Web-scale Makes E-content Truly  Discoverable
Harvesting From Many Silos at Web-scale Makes E-content Truly Discoverable
 
E-Book on the Roll @ The University Alabama Libraries
E-Book on the Roll @ The University Alabama LibrariesE-Book on the Roll @ The University Alabama Libraries
E-Book on the Roll @ The University Alabama Libraries
 
Evaluating and Marketing Electronic Resources - Kennedy supplement material
Evaluating and Marketing Electronic Resources - Kennedy supplement materialEvaluating and Marketing Electronic Resources - Kennedy supplement material
Evaluating and Marketing Electronic Resources - Kennedy supplement material
 
Evaluating and Marketing Electronic Resources: What are You “Really” Doing to...
Evaluating and Marketing Electronic Resources: What are You “Really” Doing to...Evaluating and Marketing Electronic Resources: What are You “Really” Doing to...
Evaluating and Marketing Electronic Resources: What are You “Really” Doing to...
 
Developing a Methodology for Evaluating the Cost-effectiveness of Journal Pac...
Developing a Methodology for Evaluating the Cost-effectiveness of Journal Pac...Developing a Methodology for Evaluating the Cost-effectiveness of Journal Pac...
Developing a Methodology for Evaluating the Cost-effectiveness of Journal Pac...
 
Developing a Methodology for Evaluating the Cost-effectiveness of Journal Pac...
Developing a Methodology for Evaluating the Cost-effectiveness of Journal Pac...Developing a Methodology for Evaluating the Cost-effectiveness of Journal Pac...
Developing a Methodology for Evaluating the Cost-effectiveness of Journal Pac...
 
Living on the Bleeding Edge of Collection Development
Living on the Bleeding Edge of Collection DevelopmentLiving on the Bleeding Edge of Collection Development
Living on the Bleeding Edge of Collection Development
 
Where have all the print journals gone? Adapting Print Collections to an E-ce...
Where have all the print journals gone? Adapting Print Collections to an E-ce...Where have all the print journals gone? Adapting Print Collections to an E-ce...
Where have all the print journals gone? Adapting Print Collections to an E-ce...
 
E-Book Management — It Sounds Serial!
E-Book Management — It Sounds Serial!E-Book Management — It Sounds Serial!
E-Book Management — It Sounds Serial!
 
Collaborating with IT to Deliver E-Reserves Using Drupal and Zotero
Collaborating with IT to Deliver E-Reserves Using Drupal and ZoteroCollaborating with IT to Deliver E-Reserves Using Drupal and Zotero
Collaborating with IT to Deliver E-Reserves Using Drupal and Zotero
 
Serials Assessment Comes of Age - Valuing the Bundles Jewell
Serials Assessment Comes of Age - Valuing the Bundles JewellSerials Assessment Comes of Age - Valuing the Bundles Jewell
Serials Assessment Comes of Age - Valuing the Bundles Jewell
 
Serials Assessment Comes of Age - Caroll
Serials Assessment Comes of Age - CarollSerials Assessment Comes of Age - Caroll
Serials Assessment Comes of Age - Caroll
 
Patron- Driven Selection of eBooks - Safley
Patron- Driven Selection of eBooks - SafleyPatron- Driven Selection of eBooks - Safley
Patron- Driven Selection of eBooks - Safley
 
Patron- Driven Selection of eBooks - Hisle
Patron- Driven Selection of eBooks - HislePatron- Driven Selection of eBooks - Hisle
Patron- Driven Selection of eBooks - Hisle
 
Library as Publisher
Library as PublisherLibrary as Publisher
Library as Publisher
 
Fostering Learning and Technology Development in Technical Services
Fostering Learning and Technology Development in Technical ServicesFostering Learning and Technology Development in Technical Services
Fostering Learning and Technology Development in Technical Services
 

Último

Último (20)

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, and Digital Information - Lance Hayden

  • 1. Librarians in the Wild Thinking About Security, Privacy, and Digital Information
  • 2. Lance Hayden  Six years with the C.I.A.  Master’s from UT iSchool, 1997  Cisco Systems since 1998  Ph.D. from UT iSchool, 2009  Lecturer in UT iSchool since 1999  Security Informatics  We Like to Watch: Surveillance and Society
  • 3. The Wild  Term of art in computer security  The “real world” (as opposed to the lab)  A metaphor for where we live in a digital society  Complexity, uncertainty, risk, and threat  The technology landscape  The changing environment in which we create and deploy digital information infrastructures (and the infrastructures themselves, sometimes)
  • 4. Cities in the Jungle  We build houses, shelters, and entire communities in cyberspace  Civilization (security of our resources) summed up as:  Confidentiality  Integrity  Availability  We often behave in our communities in ways that would give us pause in the physical world
  • 6. Four Axioms of Wilderness Life  Large herds attract big predators  Structures decay quickly in the wild  Protective spells are treacherous  Knowledge is the best survival trait
  • 7.
  • 8.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. A Brief Survey  What is your risk tolerance?  Is your Internet-facing perimeter secure? Your wireless?  Are your systems and applications patched and up to date?  Do your employees and users choose strong passwords?  Do you have a disaster recovery and business
  • 19. Top Ten Passwords (RockYou Hack) 1. 123456 6. princess 2. 12345 7. rockyou 3. 123456789 8. 1234567 4. Password 9. 12345678 5. iloveyou 10.abc123
  • 22. Security Resources  ISO 27000 standards  Plan-Do-Check-Act  Security Controls  Online Resources  SANS – www.sans.org  ISSA – www.issa.org  ISACA – www.isaca.org  www.insecure.org  www.securityfocus.com  www.cert.org

Notas del editor

  1. Get over the distinction between wilderness and civilization – in cyberspace they are co-located.Rather than encroach on the wilderness, it increases as more people build things in it.
  2. Not being an alarmist – simply giving benefit of 20 years of experience at how easy it is to violate trust, take advantage of weakness, and inflict damage on the unsuspecting
  3. Think of each house as an application or a new system or serverEach new addition is filled with things that may be valuable – we build to hold our data, our applications, our processes, etc.Each new addition has doors, windows, chimneys and other ways in which to get inside. Some we know about, some we do not.
  4. Morris Worm was a mistake – stupid kid sets forest on fireHackers and vandals – digital cow tippingCrackers, punks, and lone gunmen – Eastwood in cyberspace, the wild westWar, terror, and crime – it’s now botnets and nation states
  5. The digital matchbookDumb kid sets woods on fire
  6. Hackers and vandals – digital cow tipping
  7. KevinMitnick
  8. Our cities and buildings are built of software, code, and metal boxes.As we add more systems and functions and apps we add more rooms, doors, and windowsThe environment is hostile – materials degrade and cracks form while predators keep looking for ways in (new hacks, new software) Confidentiality Integrity AvailabilityMaintaining integrity is a constant job and most of us allow our structures to fall into disrepair
  9. Security is like the wizard’s protective circle, drawn around our homes and offices – firewall code and malware signaturesSay the words incorrectly, out of order, or leave out an incantation, or fail to draw the circle exactly right, and the circle can be breached
  10. Using trojanUSBs as a social engineering attack
  11. Mark Zuckerberg – Privacy is no longer a social normEric Schmidt, Sergey Brin, Larry Page – Google in China