SlideShare una empresa de Scribd logo
1 de 26
Security Best Practices
For Regular Users
Geoffrey Vaughan
@mrvaughan
Security Engineer
Whoami
• Geoffrey Vaughan @MrVaughan
• Security Engineer @SecurityInnovation
• Appsec pentesting/advisory at all areas of SDLC
• Former High School/Prison/University Teacher
• Occasionally I’m let out of my basement
• Travelled from Toronto to be here with you today
Why This Talk?
• I care about you and your data
• I’m tired of regular users suffering for mistakes made by large
organizations (data breaches) or being caught by the simplest
of phishing scam
• Often small adjustments in user behavior has a large impact on
security / privacy
Tldr; If you only read one slide
Giving it all away at the beginning:
1) Use a password manager
2) Keep your devices up to date
3) Use 2-Factor Authentication on all your accounts
4) Free Wi-Fi Comes at a cost – Don’t connect to untrusted networks
5) Lock and encrypt your devices (phones + computers)
For more info I wrote a Guide:
https://web.securityinnovation.com/essential-guide-to-online-security
Beyond the Basics: How Paranoid
Should I be?
• Protecting your data and privacy online can take a lot of effort
• Complete anonymity is really hard
• It will always be a trade off between usability and
security/privacy
How Paranoid should I be?
It greatly depends on your personal threat model
Threat Model?
Simplified Definition:
Identify and quantify your weaknesses so you can come up with
appropriate defenses.
Threat Modelling on Easy Mode
• What assets are you trying to protect?
• What threats are the assets under?
• What is the likelihood of a threat being realized?
• What measures can help mitigate or decrease the risk
associated with the threat?
Assets to Protect
• Personal Information - Name, Age, DOB, Spouse, Children, Parents
• Personal Pictures, videos, documents
• Financial Information - Banking, loan, credit
• Your Location - Home address, places you frequent, or where you are right
now
• Social Media accounts and data
• Physical Devices
• Business Assets on your devices
• Personal Communications/Conversations - Emails, Text Messages, Chat
etc, phone calls
• Data about Data – When you called someone, who you text messaged
Threats?
• Which of the assets are most important for you to protect?
• How might an attacker target each of those assets?
Personal Information
Threats
• Information obtained through
public searchable resources
(Google, phone/address look
up)
• Attacker reads information
leaked by peers (tagged
pictures, connections)
• Social Media post leaks info
Defenses
• Hack yourself – See what’s out
there
• Harden your social media
security/privacy settings
• Use fake names / complete alter
ego online
• Draw a very clear line between
your public and private life.
• Ask friends not to tag you
Social Media Settings
Personal Pictures, Videos, Documents
Threats
• Malware compromises
mobile/desktop device
• Cloud backup account is
compromised
• ‘Auto post’ feature publishes
content automatically
• Data shared with a friend gets
shared with others
Defenses
• Keep your devices up to date
• Use strong passwords on all
online accounts
• Use multi-factor
authentication wherever
possible
• Be aware of all
security/privacy settings for
the applications you are using
https://twofactorauth.org/
Financial Information
Threats
• Attacker compromises online banking
account (Guesses PVQ, Weak password,
Compromised email allows password
reset)
• Attacker acquires enough information to
perform credit/loan applications on your
behalf
• Website you used improperly stores your
information and your credit
card/information gets compromised
• You use a malicious POS device and your
credit card gets skimmed
• Paypal (or other) account is compromised
Defenses
• Lie on all PVQ questions
• Strong passwords (password
managers)
• Use multi-factor authentication
• Never give out SIN/SS/Personal
Code unless you are sure that
the request is legitimate
• Big retailers are probably safer
than mom/pop shops as they
likely spend much more on
security*
Password Managers
To name a few:
• LastPass
• 1Password
• KeePass
• Built-in to browsers (ex.
Chrome/Safari keychain)
Consider the Features
• Local encrypted database
• Remote ‘cloud’ features
• In browser extensions
• Share passwords across
devices or users
Your Location
Threats
• Government/ISP/App developer is able to
ascertain your exact location at a particular
time
• General pubic is able to ascertain your
location
• Social media posts leaks location
• Image data leaks location
• Misconfigured app leaks location
• Content of image leaks location (OSINT)
• Connected to untrusted wireless
• Motivated attacker is able to ascertain your
location
• Compromised mobile device
• Phishing email
• Compromised mobile application/account
Defenses
• Complete burner phone + number,
Tor/VPN user, completely separate
accounts for burner device
• Harden security settings, disable
EXIF image metadata, be careful
of the content of your posts
• Previously mentioned device
defense strategies:
• Keeping devices up to date
• Don’t click untrusted links
• Strong passwords
Image Content / Open Source
Intelligence
http://blog.ioactive.com/2014/05/glass-
reflections-in-pictures-osint.html
• Tweeted a picture from a hotel
• Previous tweet said they were
in Miami
• Hacker used hotel room
images on travel websites to
find the hotel based on window
structure and reflections
• Used Google earth to render
similar views and get an
estimation on floor and building
area.
Tinder API
http://blog.includesecurity.com/2014/02/ho
w-i-was-able-to-track-location-of-any.html
• In 2014 Tinder API allowed
trilateration of a users exact
location
• Used in conjunction with GPS
spoofing
Social Media Accounts and Data
Threats
• Social media account gets
compromised resulting in
information disclosure,
posting on your behalf, or
data loss
Defenses
• Strong Passwords
• 2-Factor Authentication
• Restrict third party app
access
• Review security settings
• Protect your email account
similarly (password resets)
• Avoid Phishing Scams
Physical Devices
Threats
• Lost or stolen device results
in all data being
lost/compromised
• Your device is inspected at a
border crossing
• Your device is compromised
while being unattended
Defenses
• Strong device password
• Full disk encryption (usually enabled
by default on mobile devices when
you apply a password)
• Restrict what data you keep on your
device (if concerned)
• Consider implications of online vs.
local backups
• Use and test a “lost my device” app
• Enable remote wipe capabilities
(never a guarantee)
Business Assets
• All other threats/defenses apply except now the implications are
more severe
• Greater care needs to be taking with corporate assets
• Consider implications on personal assets if a BYOD policy
allows remote management/monitoring/removal of your data
• Recommend separating business and pleasure or revise your
threat model to consider additional threats
Personal
Communications/Conversations
Threats
• Attacker/ISP/App
Provider/Nation State intercepts
communication data in transit
and reads conversation
• Receiver forwards conversation
to third party
• App Provider is compromised
leaking all conversation logs
• Government requests app
provider to turn over data
Defenses
• Gold Star: Signal Messenger
(now with disappearing
messages)
• Decent: Wickr
• Getting Better: Facebook
Messenger, WhatsApp
• Avoid: SMS
• A couple companies that have
proven they have your back:
OpenWhisper (Signal), Apple,
Facebook
Data About Data
Threats
• You consider information
about who you are talking to
and when sensitive
information
• Attacker/ISP/App
Provider/Nation
State/Untrusted Wireless is
able to collecting metadata
about your
communication/activity
Defenses
• Anonymity is hard. At this level
even the best get caught
• Burner phones / accounts
• Full Tor/VPN would make it
difficult for organizations to
collect data
• Time delayed messages might
mask some traffic
• Create additional noise in
communications, talk to more
people more often
Resources
I wrote a paper:
https://web.securityinnovation.com/essential-guide-to-online-
security
Another talk today:
I’m also presenting one other talk today on a completely
unrelated subject:
Catching IMSI Catchers: Hunting the hunter, can you tell if your
phone’s being captured by a rogue cell phone tower/ IMSI
catcher/ Stingray?
Thank you
Geoffrey Vaughan
@mrvaughan
@SecurityInnovation

Más contenido relacionado

La actualidad más candente

IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTsIT Tech
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
Email phising and spoofing hurting your business
Email phising and spoofing hurting your businessEmail phising and spoofing hurting your business
Email phising and spoofing hurting your businessMithi SkyConnect
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
Ch 13: Network Protection Systems
Ch 13: Network Protection SystemsCh 13: Network Protection Systems
Ch 13: Network Protection SystemsSam Bowne
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measureshazirma
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 

La actualidad más candente (20)

IT Security DOs and DON'Ts
IT Security DOs and DON'TsIT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
Computer virus
Computer virusComputer virus
Computer virus
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Ransomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant MaliRansomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant Mali
 
Internet safety
Internet safety Internet safety
Internet safety
 
Ransomware
RansomwareRansomware
Ransomware
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTs
 
Data security
Data securityData security
Data security
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Email phising and spoofing hurting your business
Email phising and spoofing hurting your businessEmail phising and spoofing hurting your business
Email phising and spoofing hurting your business
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Ch 13: Network Protection Systems
Ch 13: Network Protection SystemsCh 13: Network Protection Systems
Ch 13: Network Protection Systems
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measures
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 

Similar a Security Best Practices for Regular Users

User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacycdunk12
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_WatsonPatricia M Watson
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet SecurityDavid Cirella
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksMichael Davis
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?Jose L. Quiñones-Borrero
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidErnest Staats
 
Security is a Culture GB v 9
Security is  a Culture GB v 9Security is  a Culture GB v 9
Security is a Culture GB v 9Garry Bolland
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeNet at Work
 

Similar a Security Best Practices for Regular Users (20)

User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet Security
 
Information security
Information securityInformation security
Information security
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Security is a Culture GB v 9
Security is  a Culture GB v 9Security is  a Culture GB v 9
Security is a Culture GB v 9
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 

Más de Security Innovation

Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the CloudSecurity Innovation
 
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...Security Innovation
 
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)Security Innovation
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Security Innovation
 
5 Ways To Train Security Champions
5 Ways To Train Security Champions5 Ways To Train Security Champions
5 Ways To Train Security ChampionsSecurity Innovation
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to ComplianceSecurity Innovation
 
How to Hijack a Pizza Delivery Robot with Injection Flaws
How to Hijack a Pizza Delivery Robot with Injection FlawsHow to Hijack a Pizza Delivery Robot with Injection Flaws
How to Hijack a Pizza Delivery Robot with Injection FlawsSecurity Innovation
 
How an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsHow an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsSecurity Innovation
 
Opening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureOpening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureSecurity Innovation
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart WaySecurity Innovation
 
Slashing Your Cloud Risk: 3 Must-Do's
Slashing Your Cloud Risk: 3 Must-Do'sSlashing Your Cloud Risk: 3 Must-Do's
Slashing Your Cloud Risk: 3 Must-Do'sSecurity Innovation
 
A Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber RangeA Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber RangeSecurity Innovation
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 
Cyber Ranges: A New Approach to Security
Cyber Ranges: A New Approach to SecurityCyber Ranges: A New Approach to Security
Cyber Ranges: A New Approach to SecuritySecurity Innovation
 
Is Blockchain Right for You? The Million Dollar Question
Is Blockchain Right for You? The Million Dollar QuestionIs Blockchain Right for You? The Million Dollar Question
Is Blockchain Right for You? The Million Dollar QuestionSecurity Innovation
 
Privacy: The New Software Development Dilemma
Privacy: The New Software Development DilemmaPrivacy: The New Software Development Dilemma
Privacy: The New Software Development DilemmaSecurity Innovation
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingSecurity Innovation
 
Secure DevOps - Evolution or Revolution?
Secure DevOps - Evolution or Revolution?Secure DevOps - Evolution or Revolution?
Secure DevOps - Evolution or Revolution?Security Innovation
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Threat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to VulnerabilitiesThreat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to VulnerabilitiesSecurity Innovation
 

Más de Security Innovation (20)

Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
 
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
 
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
 
5 Ways To Train Security Champions
5 Ways To Train Security Champions5 Ways To Train Security Champions
5 Ways To Train Security Champions
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
How to Hijack a Pizza Delivery Robot with Injection Flaws
How to Hijack a Pizza Delivery Robot with Injection FlawsHow to Hijack a Pizza Delivery Robot with Injection Flaws
How to Hijack a Pizza Delivery Robot with Injection Flaws
 
How an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsHow an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software Systems
 
Opening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureOpening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital Future
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart Way
 
Slashing Your Cloud Risk: 3 Must-Do's
Slashing Your Cloud Risk: 3 Must-Do'sSlashing Your Cloud Risk: 3 Must-Do's
Slashing Your Cloud Risk: 3 Must-Do's
 
A Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber RangeA Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber Range
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Cyber Ranges: A New Approach to Security
Cyber Ranges: A New Approach to SecurityCyber Ranges: A New Approach to Security
Cyber Ranges: A New Approach to Security
 
Is Blockchain Right for You? The Million Dollar Question
Is Blockchain Right for You? The Million Dollar QuestionIs Blockchain Right for You? The Million Dollar Question
Is Blockchain Right for You? The Million Dollar Question
 
Privacy: The New Software Development Dilemma
Privacy: The New Software Development DilemmaPrivacy: The New Software Development Dilemma
Privacy: The New Software Development Dilemma
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Secure DevOps - Evolution or Revolution?
Secure DevOps - Evolution or Revolution?Secure DevOps - Evolution or Revolution?
Secure DevOps - Evolution or Revolution?
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Threat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to VulnerabilitiesThreat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to Vulnerabilities
 

Último

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Security Best Practices for Regular Users

  • 1. Security Best Practices For Regular Users Geoffrey Vaughan @mrvaughan Security Engineer
  • 2. Whoami • Geoffrey Vaughan @MrVaughan • Security Engineer @SecurityInnovation • Appsec pentesting/advisory at all areas of SDLC • Former High School/Prison/University Teacher • Occasionally I’m let out of my basement • Travelled from Toronto to be here with you today
  • 3. Why This Talk? • I care about you and your data • I’m tired of regular users suffering for mistakes made by large organizations (data breaches) or being caught by the simplest of phishing scam • Often small adjustments in user behavior has a large impact on security / privacy
  • 4. Tldr; If you only read one slide Giving it all away at the beginning: 1) Use a password manager 2) Keep your devices up to date 3) Use 2-Factor Authentication on all your accounts 4) Free Wi-Fi Comes at a cost – Don’t connect to untrusted networks 5) Lock and encrypt your devices (phones + computers) For more info I wrote a Guide: https://web.securityinnovation.com/essential-guide-to-online-security
  • 5. Beyond the Basics: How Paranoid Should I be? • Protecting your data and privacy online can take a lot of effort • Complete anonymity is really hard • It will always be a trade off between usability and security/privacy How Paranoid should I be? It greatly depends on your personal threat model
  • 6. Threat Model? Simplified Definition: Identify and quantify your weaknesses so you can come up with appropriate defenses.
  • 7. Threat Modelling on Easy Mode • What assets are you trying to protect? • What threats are the assets under? • What is the likelihood of a threat being realized? • What measures can help mitigate or decrease the risk associated with the threat?
  • 8. Assets to Protect • Personal Information - Name, Age, DOB, Spouse, Children, Parents • Personal Pictures, videos, documents • Financial Information - Banking, loan, credit • Your Location - Home address, places you frequent, or where you are right now • Social Media accounts and data • Physical Devices • Business Assets on your devices • Personal Communications/Conversations - Emails, Text Messages, Chat etc, phone calls • Data about Data – When you called someone, who you text messaged
  • 9. Threats? • Which of the assets are most important for you to protect? • How might an attacker target each of those assets?
  • 10. Personal Information Threats • Information obtained through public searchable resources (Google, phone/address look up) • Attacker reads information leaked by peers (tagged pictures, connections) • Social Media post leaks info Defenses • Hack yourself – See what’s out there • Harden your social media security/privacy settings • Use fake names / complete alter ego online • Draw a very clear line between your public and private life. • Ask friends not to tag you
  • 12. Personal Pictures, Videos, Documents Threats • Malware compromises mobile/desktop device • Cloud backup account is compromised • ‘Auto post’ feature publishes content automatically • Data shared with a friend gets shared with others Defenses • Keep your devices up to date • Use strong passwords on all online accounts • Use multi-factor authentication wherever possible • Be aware of all security/privacy settings for the applications you are using
  • 14. Financial Information Threats • Attacker compromises online banking account (Guesses PVQ, Weak password, Compromised email allows password reset) • Attacker acquires enough information to perform credit/loan applications on your behalf • Website you used improperly stores your information and your credit card/information gets compromised • You use a malicious POS device and your credit card gets skimmed • Paypal (or other) account is compromised Defenses • Lie on all PVQ questions • Strong passwords (password managers) • Use multi-factor authentication • Never give out SIN/SS/Personal Code unless you are sure that the request is legitimate • Big retailers are probably safer than mom/pop shops as they likely spend much more on security*
  • 15. Password Managers To name a few: • LastPass • 1Password • KeePass • Built-in to browsers (ex. Chrome/Safari keychain) Consider the Features • Local encrypted database • Remote ‘cloud’ features • In browser extensions • Share passwords across devices or users
  • 16. Your Location Threats • Government/ISP/App developer is able to ascertain your exact location at a particular time • General pubic is able to ascertain your location • Social media posts leaks location • Image data leaks location • Misconfigured app leaks location • Content of image leaks location (OSINT) • Connected to untrusted wireless • Motivated attacker is able to ascertain your location • Compromised mobile device • Phishing email • Compromised mobile application/account Defenses • Complete burner phone + number, Tor/VPN user, completely separate accounts for burner device • Harden security settings, disable EXIF image metadata, be careful of the content of your posts • Previously mentioned device defense strategies: • Keeping devices up to date • Don’t click untrusted links • Strong passwords
  • 17. Image Content / Open Source Intelligence http://blog.ioactive.com/2014/05/glass- reflections-in-pictures-osint.html • Tweeted a picture from a hotel • Previous tweet said they were in Miami • Hacker used hotel room images on travel websites to find the hotel based on window structure and reflections • Used Google earth to render similar views and get an estimation on floor and building area.
  • 18. Tinder API http://blog.includesecurity.com/2014/02/ho w-i-was-able-to-track-location-of-any.html • In 2014 Tinder API allowed trilateration of a users exact location • Used in conjunction with GPS spoofing
  • 19. Social Media Accounts and Data Threats • Social media account gets compromised resulting in information disclosure, posting on your behalf, or data loss Defenses • Strong Passwords • 2-Factor Authentication • Restrict third party app access • Review security settings • Protect your email account similarly (password resets) • Avoid Phishing Scams
  • 20. Physical Devices Threats • Lost or stolen device results in all data being lost/compromised • Your device is inspected at a border crossing • Your device is compromised while being unattended Defenses • Strong device password • Full disk encryption (usually enabled by default on mobile devices when you apply a password) • Restrict what data you keep on your device (if concerned) • Consider implications of online vs. local backups • Use and test a “lost my device” app • Enable remote wipe capabilities (never a guarantee)
  • 21. Business Assets • All other threats/defenses apply except now the implications are more severe • Greater care needs to be taking with corporate assets • Consider implications on personal assets if a BYOD policy allows remote management/monitoring/removal of your data • Recommend separating business and pleasure or revise your threat model to consider additional threats
  • 22. Personal Communications/Conversations Threats • Attacker/ISP/App Provider/Nation State intercepts communication data in transit and reads conversation • Receiver forwards conversation to third party • App Provider is compromised leaking all conversation logs • Government requests app provider to turn over data Defenses • Gold Star: Signal Messenger (now with disappearing messages) • Decent: Wickr • Getting Better: Facebook Messenger, WhatsApp • Avoid: SMS • A couple companies that have proven they have your back: OpenWhisper (Signal), Apple, Facebook
  • 23. Data About Data Threats • You consider information about who you are talking to and when sensitive information • Attacker/ISP/App Provider/Nation State/Untrusted Wireless is able to collecting metadata about your communication/activity Defenses • Anonymity is hard. At this level even the best get caught • Burner phones / accounts • Full Tor/VPN would make it difficult for organizations to collect data • Time delayed messages might mask some traffic • Create additional noise in communications, talk to more people more often
  • 24. Resources I wrote a paper: https://web.securityinnovation.com/essential-guide-to-online- security
  • 25. Another talk today: I’m also presenting one other talk today on a completely unrelated subject: Catching IMSI Catchers: Hunting the hunter, can you tell if your phone’s being captured by a rogue cell phone tower/ IMSI catcher/ Stingray?

Notas del editor

  1. This is my third presentation today, anyone make all 3?
  2. First time giving this talk, Why talk about the really wild and ‘sophisticated’ hacks when most people are barely doing the basics correctly
  3. 5) Don’t wait for a crypto locker to do it for you This is by no means a complete list, there are definitely way more threats to consider than we can talk about today
  4. Twitter Troll Definition: Ryan Gooler ‏@jippen Oct 20 @mrvaughan a plan for how to lose the company, used to help keep it running Threat models can be long painful processes by companies to plan for every possible outcome… They don’t have to be complex
  5. Pause on next slide
  6. Participate for a few (put in slide prompt)
  7. It’s a question you have to ask yourself
  8. Police officers, teachers, other public officials
  9. Read through all settings, Recognize that they change from time to time
  10. Catalogs every site that supports/ doesn’t support 2FA Allows you to tweet your bank to ask them to implement 2FA DON”T TWEET AT YOUR BANK!
  11. Personas kods in Latvia *Payment processes, everybody gets hacked
  12. Broken up into 3 main threats If you think you need Tor… do your homework OSINT hotel room talk Tinder story
  13. Message Disappearing is not a guarantee If the company feels strongly enough on the political spectrum they can design a zero knowledge system whereby they cannot be compelled to give up any information, but if they are in the middle they may have decent security, but then you have to trust them to battle the government on your behalf,
  14. If an attacker can be highly motivated to exploit you a government can also be highly motivated to find you One thing we can learn from Mr. Robot