SlideShare una empresa de Scribd logo
1 de 50
The Wild, Wild Web
                           -
                  Social Engineering,
                 Malware and Security
                      Awareness
                           -
                    Nicholas Davis
                   MBA, CISA, CISSP
                    DoIT Security

                  November 13, 2012
Free Powerpoint Templates
                             Page 1
Introduction
•   Background
•   Thank you for the invitation
•   Today’s Topic, Malware, Social
    Engineering and overall Security
    Awareness
•   Importance to the healthcare field
•   Pretexting
•   Phishing
•   QR Code Danger
•   Social Networks
•   Passwords
•   Malware
•   Baiting
•   Identity Theft: How, Avoiding,
    Responding
•   Physical Security
•   Sharing of information with the public
      Free Powerpoint Templates
                                   Page 2
Technology Is Not
           The Answer
Strong computer security has two
components:

The Technology: passwords,
encryption, endpoint protection
such as anti-virus.

The People: You, your customers,
your business partners

Today, we will talk about both
components


   Free Powerpoint Templates
                               Page 3
Social Engineering

The art of manipulating
people into performing actions
or divulging confidential
information

It is typically trickery or
deception for the purpose of
information gathering, fraud,
or computer system access



   Free Powerpoint Templates
                               Page 4
Most Popular Type of
        Social Engineering
Pretexting: An individual lies to obtain
privileged data. A pretext is a false motive.

Pretexting is a fancy term for impersonation

A big problem for computer Help Desks, in all
organizations

Example:

Some steps the UW-Madison Help Desk takes
to avoid pretexting




      Free Powerpoint Templates
                                     Page 5
Let’s Think of HSLC
   Pretexting Example




   Dear Windows User,
   It has come to our attention that your Microsoft windows
   Installation records are out of date. Every Windows
   installation has to be tied to an email account for daily
   update.
   This requires you to verify the Email Account. Failure to
   verify your records will result in account suspension.
   Click on the Verify button below and enter your login
   information on the following page to Confirm your records.


   Thank you,

   Microsoft Windows Team.


Free Powerpoint Templates
                                                                Page 6
Phishing

• Deception, but not just in
  person
• Email
• Websites
• Facebook status updates
• Tweets
• Phishing, in the context of
  the healthcare working
  environment is extremely
  dangerous


   Free Powerpoint Templates
                               Page 7
Phishing History

• Phreaking, term for making
  phone calls for free back in
  1970s
• Fishing is the use bait to
  lure a target
• Phreaking + Fishing =
  Phishing




   Free Powerpoint Templates
                               Page 8
Phishing 1995

• Target AOL users
• Account passwords = free
  online time
• Threat level: low
• Techniques: Similar names,
  such as www.ao1.com for
  www.aol.com




  Free Powerpoint Templates
                              Page 9
Phishling 2001

Target: Ebay and major banks
Credit card numbers and
account numbers = money
Threat level: medium
Techniques: Same in 1995, as
well as keylogger




   Free Powerpoint Templates
                               Page 10
Keyloggers
• Tracking (or logging) the keys
  struck on a keyboard, typically in
  a covert manner so that the
  person using the keyboard is
  unaware that their actions are
  being monitored
• Software or hardware based




    Free Powerpoint Templates
                                Page 11
Phishing 2007

Targets are Paypal, banks,
ebay
Purpose to steal bank
accounts
Threat level is high
Techniques: browser
vulnerabilities, link
obfuscation




   Free Powerpoint Templates
                               Page 12
Don’t Touch That QR Code

• Just as bad as clicking on an
  unknown link
• Looks fancy and official, but
  is easy to create




  Free Powerpoint Templates
                              Page 13
Phishing in 2013

• Trends for the coming year

• Identity Information
• Personal Harm
• Blackmail




   Free Powerpoint Templates
                               Page 14
Looking In the Mirror
• Which types of sensitive
  information do you have access
  to?
• What about others who share the
  computer network with you?
• Think about the implications
  associated that data being stolen
  and exploited!




   Free Powerpoint Templates
                               Page 15
What Phishing Looks Like
• As scam artists become more
  sophisticated, so do their phishing
  e-mail messages and pop-up
  windows.
• They often include official-looking
  logos from real organizations and
  other identifying information
  taken directly from legitimate
  Web sites.




     Free Powerpoint Templates
                                 Page 16
Techniques For Phishing

•   Employ visual elements from target site
•   DNS Tricks:
•   www.ebay.com.kr
•   www.ebay.com@192.168.0.5
•   www.gooogle.com
•   Unicode attacks
•   JavaScript Attacks
•   Spoofed SSL lock Certificates
•   Phishers can acquire certificates for
    domains they own
•   Certificate authorities make mistakes




      Free Powerpoint Templates
                                   Page 17
Social Engineering
       Techniques
Often employed in Phishing, lower
your guard

1.Threats – Do this or else!
2.Authority – I have the authority
to ask this
3.Promises – If you do this, you
will get money
4.Praise – You deserve this




   Free Powerpoint Templates
                               Page 18
Phishing
              Techniques
•   Socially aware attacks
•   Mine social relationships from public
    data
•   Phishing email appears to arrive from
    someone known to the victim
•   Use spoofed identity of trusted
    organization to gain trust
•   Urge victims to update or validate their
    account
•   Threaten to terminate the account if the
    victims not reply
•   Use gift or bonus as a bait
•   Security promises




      Free Powerpoint Templates
                                   Page 19
Let’s Talk About
                  Facebook
•   So important, it gets its own slide!
•   Essentially unauthenticated – discussion
•   Three friends and you’re out! - discussion
•   Privacy settings mean nothing – discussion
•   Treasure Trove of identity information
•   Games as information harvesters




        Free Powerpoint Templates
                                     Page 20
Socially Aware




Free Powerpoint Templates
                            Page 21
Context Aware

“Your bid on eBay has won!”
“The books on your Amazon wish
list are on sale!”




   Free Powerpoint Templates
                               Page 22
Seems Suspicious




Free Powerpoint Templates
                            Page 23
419 Nigerian Email Scam




 Free Powerpoint Templates
                             Page 24
Too Good to be True,
Even When It Is Signed




Free Powerpoint Templates
                            Page 25
Detecting
        Fraudulent Email
Information requested is inappropriate for
the channel of communication:

"Verify your account."nobody should ask
you to send passwords, login names,
Social Security numbers, or other personal
information through e-mail.

Urgency and potential penalty or loss are
implied:

"If you don't respond within 48 hours,
your account will be closed.”




    Free Powerpoint Templates
                                 Page 26
Detecting Fraudulent
            Email
"Dear Valued Customer."Phishing e-mail
messages are usually sent out in bulk and
often do not contain your first or last
name.




    Free Powerpoint Templates
                                Page 27
Dectecting Fraudulent
            Email
"Click the link below to gain access to
your account.“

This is an example or URL Masking (hiding
the web address)

URL alteration


www.micosoft.com
www.mircosoft.com
www.verify-microsoft.com


    Free Powerpoint Templates
                                Page 28
How to Defend Against
     Phishing Attacks
•Never respond to an email asking
for personal information
• Always check the site to see if it is
secure (SSL lock)
• Look for misspellings or errors in
grammar
• Never click on the link on the
email. Enter the web address
manually
• Keep your browser updated
• Keep antivirus definitions updated
• Use a firewall
• When in doubt, ask your Network
Administrator for their opinion
    Free Powerpoint Templates
                                Page 29
A Note on Spear Phishing

• Designed especially for you
• Includes your name
• May reference an
  environment or issue you
  are aware of and familiar
  with
• Asks for special treatment,
  with justification for the
  request



   Free Powerpoint Templates
                               Page 30
Other Techniques
An ocean of Phishing techniques

•Clone Phishing - Discussion
•Whaling - Discussion
•Filter Evasion - Discussion
•Phone Phishing - Discussion
•Tabnabbing - Discussion
•Evil Twins - Discussion




    Free Powerpoint Templates
                                Page 31
Passwords

Your password is your electronic
key to valuable resources, treat it
like your house key!

Sharing – Discussion
Theft – Discussion
Password Rotation - Discussion




   Free Powerpoint Templates
                               Page 32
Creating a Strong
           Password
Following two rules are bare minimal that
you should follow while creating a
password.

Rule 1 – Password Length: Stick with
passwords that are at least 8 characters in
length. The more character in the
passwords is better, as the time taken to
crack the password by an attacker will be
longer. 10 characters or longer are better.

Rule 2 – Password Complexity: At least 4
characters in your passwords should be
each one of the following:



    Free Powerpoint Templates
                                  Page 33
Creating a Strong
            Password
1.Lower case alphabets
2.Upper case alphabets
3.Numbers
4.Special Characters

Use the “8 4 Rule”
8 = 8 characters minimum length
4 = 1 lower case + 1 upper case + 1
number + 1 special character.

Do not use a password
strength checking website!
Any ideas why this
is a bad idea?



    Free Powerpoint Templates
                                Page 34
Adware, Malware,
          Spyware
Adware – unwanted ad software which is
noticed
Malware – unwanted software which is
noticed and potentially causes harm
Spyware – unwanted software which goes
un-noticed and harvests your personal
information

Use endpoint protection!




    Free Powerpoint Templates
                                Page 35
CIO.WISC.EDU/SECURITY




Free Powerpoint Templates
                            Page 36
Adware, Malware,
         Spyware
How these get on your computer:
Email
Web pages
Downloaded software
CD, USB flash drive
Sometimes, out of the box




   Free Powerpoint Templates
                               Page 37
Trojan Malware




Free Powerpoint Templates
                            Page 38
Baiting

Hey, look! A free USB drive!
I wonder what is on this confidential CD
which I found in the bathroom?

These are vectors for malware!
Play on your curiousity or desire to get
something for nothing

Don’t be a piggy!




     Free Powerpoint Templates
                                 Page 39
Social Engineering
            Methods

Using the Out of Office
responder in a responsible
manner




   Free Powerpoint Templates
                               Page 40
Medical Identity Theft

Use another person’s name
Sometimes other identifying information
such as a medical bracelet or insurance
information
Obtain medical services
Make false claims
Causes erronious information to be put
into medical records
May lead to inappropriate and life
threatening situaitons




    Free Powerpoint Templates
                                Page 41
Synthetic Identity Theft

A variation of identity theft which has
recently become more common is
synthetic identity theft, in which identities
are completely or partially fabricated. The
most common technique involves
combining a real social security number
with a name and birthdate other than the
ones associated with the number.




    Free Powerpoint Templates
                                    Page 42
How Does Identity
          Theft Happen
Let’s talk through the attached paper
handout, entitled:

“Techniques for obtaining and exploiting
personal information for identity theft”

Look through the list and think to yourself
“Could this apply to me?” If so, think
about taking steps to avoid it




    Free Powerpoint Templates
                                  Page 43
Tips To Avoid
                Identity Theft
1.    Only Make Purchases On Trusted Sites
2.    Order Your Credit Report
3.    Know How To Spot Phishing
4.    Secure Your Network
5.    Can the Spam
6.    Don't Store Sensitive Information On Non-
      Secure Web Sites
7.    Set Banking Alerts
8.    Don't Reuse Passwords
9.    Use Optional Security Questions
10.   Don't Put Private Information On Public
      Computers




       Free Powerpoint Templates
                                      Page 44
If Your Identity Is Stolen
           (WORK)
1. Contact your supervisor immediately
2. Report the incident to the Office of
   Campus Information Security (OCIS)
   http://
   www.cio.wisc.edu/security-report.aspx
3. Contact the DoIT Help Desk
4. Contact UW Police, depending on
   nature of incident. Consider your
   personal safety! “Better safe, than
   sorry”




    Free Powerpoint Templates
                                Page 45
Physical Security

•   The UW is a fairly open and shared
    physical environment
•   Seeing strangers is normal, we won’t
    know if they are here as friend or foe
•   Lock your office
•   Lock your desk
•   Lock your computer
•   Criminals are opportunistic
•   Even if you are just gone for a moment
•   Report suspicious activity to your
    administration and UW Police
•   If you have an IT related concern,
    contact    the    Office    of   Campus
    Information Security



      Free Powerpoint Templates
                                  Page 46
Sharing Information With
           The Public
•   The University of Wisconsin is an open
    environment
•   However, on occasion, this open nature
    can be exploited by people with
    nefarious intent
•   Don’t volunteer sensitive information
•   Only disclose what is necessary
•   Follow records retention policies
•   When in doubt, ask for proof, honest
    people    will   understand,   dishonest
    people will become frustrated




      Free Powerpoint Templates
                                   Page 47
We Have So Much More
          To Talk About
•   Security Awareness matters not just to
    you, but to the University of Wisconsin
    as a whole
•   Security Awareness is an important
    facet of everyone’s work
•   My actions impact you
•   Your actions impact me
•   Security Awareness is an ever changing
    and evolving area, which requires
    constant attention
•   DoIT is here as a resource for you
•   Let us know how we can help
•   Let me know if I can help
•   Don’t be afraid to ask questions
•   Better safe than sorry

      Free Powerpoint Templates
                                   Page 48
A Picture Is Worth
       1000 Words




Free Powerpoint Templates
                            Page 49
Questions and
        Discussion
Nicholas Davis
ndavis1@wisc.edu
608-262-3837
facebook.com/nicholas.a.davis




    Free Powerpoint Templates
                                Page 50

Más contenido relacionado

La actualidad más candente

Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Donald E. Hester
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyGabor Szathmari
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationNick Chandi
 
What every product manager needs to know about security
What every product manager needs to know about securityWhat every product manager needs to know about security
What every product manager needs to know about securityAIPMM Administration
 
Online Privacy, the next Battleground
Online Privacy, the next BattlegroundOnline Privacy, the next Battleground
Online Privacy, the next BattlegroundSensePost
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-Hjmoore55
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
TH3 Professional Developper CEH social engineering
TH3 Professional Developper CEH social engineeringTH3 Professional Developper CEH social engineering
TH3 Professional Developper CEH social engineeringth3prodevelopper
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative mediaAnies Syahieda
 
CISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePointCISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePointImperva
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal PrivacyDoubleXDS
 

La actualidad más candente (19)

Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
What every product manager needs to know about security
What every product manager needs to know about securityWhat every product manager needs to know about security
What every product manager needs to know about security
 
Users guide
Users guideUsers guide
Users guide
 
Internet security
Internet securityInternet security
Internet security
 
Online Privacy, the next Battleground
Online Privacy, the next BattlegroundOnline Privacy, the next Battleground
Online Privacy, the next Battleground
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-H
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
TH3 Professional Developper CEH social engineering
TH3 Professional Developper CEH social engineeringTH3 Professional Developper CEH social engineering
TH3 Professional Developper CEH social engineering
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative media
 
CISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePointCISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePoint
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 

Destacado

Exam II Review Session Information Security 365/765
Exam II Review Session Information Security 365/765Exam II Review Session Information Security 365/765
Exam II Review Session Information Security 365/765Nicholas Davis
 
The IT Security Jungle of Higher Education
The IT Security Jungle of Higher EducationThe IT Security Jungle of Higher Education
The IT Security Jungle of Higher EducationNicholas Davis
 
The Deep Web -- From Spooky to Creepy
The Deep Web -- From Spooky to CreepyThe Deep Web -- From Spooky to Creepy
The Deep Web -- From Spooky to CreepyNicholas Davis
 
Security Related Issues Associated With Migrating to Cloud Services
Security Related Issues Associated With Migrating to Cloud ServicesSecurity Related Issues Associated With Migrating to Cloud Services
Security Related Issues Associated With Migrating to Cloud ServicesNicholas Davis
 
Cyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime targetCyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime targetNicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 

Destacado (7)

Exam II Review Session Information Security 365/765
Exam II Review Session Information Security 365/765Exam II Review Session Information Security 365/765
Exam II Review Session Information Security 365/765
 
The IT Security Jungle of Higher Education
The IT Security Jungle of Higher EducationThe IT Security Jungle of Higher Education
The IT Security Jungle of Higher Education
 
The Deep Hidden Web
The Deep Hidden WebThe Deep Hidden Web
The Deep Hidden Web
 
The Deep Web -- From Spooky to Creepy
The Deep Web -- From Spooky to CreepyThe Deep Web -- From Spooky to Creepy
The Deep Web -- From Spooky to Creepy
 
Security Related Issues Associated With Migrating to Cloud Services
Security Related Issues Associated With Migrating to Cloud ServicesSecurity Related Issues Associated With Migrating to Cloud Services
Security Related Issues Associated With Migrating to Cloud Services
 
Cyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime targetCyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime target
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 

Similar a It Security For Healthcare

IT Security in a Scientific Research Environment
IT Security in a Scientific Research EnvironmentIT Security in a Scientific Research Environment
IT Security in a Scientific Research EnvironmentNicholas Davis
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationShauna_Cox
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal lifeNathan Lesser
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Webinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasWebinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasAbilityNet
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Scott Wright
 
Enjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber CriminalsEnjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber CriminalsStephen Cobb
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereBlake Carver
 

Similar a It Security For Healthcare (20)

IT Security in a Scientific Research Environment
IT Security in a Scientific Research EnvironmentIT Security in a Scientific Research Environment
IT Security in a Scientific Research Environment
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal life
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Webinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasWebinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of Christmas
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
 
Enjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber CriminalsEnjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber Criminals
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 

Más de Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentNicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsNicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development MethodologiesNicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewNicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectNicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing EducationNicholas Davis
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An OverviewNicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...Nicholas Davis
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional CertificationsNicholas Davis
 

Más de Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional Certifications
 

Último

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Último (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

It Security For Healthcare

  • 1. The Wild, Wild Web - Social Engineering, Malware and Security Awareness - Nicholas Davis MBA, CISA, CISSP DoIT Security November 13, 2012 Free Powerpoint Templates Page 1
  • 2. Introduction • Background • Thank you for the invitation • Today’s Topic, Malware, Social Engineering and overall Security Awareness • Importance to the healthcare field • Pretexting • Phishing • QR Code Danger • Social Networks • Passwords • Malware • Baiting • Identity Theft: How, Avoiding, Responding • Physical Security • Sharing of information with the public Free Powerpoint Templates Page 2
  • 3. Technology Is Not The Answer Strong computer security has two components: The Technology: passwords, encryption, endpoint protection such as anti-virus. The People: You, your customers, your business partners Today, we will talk about both components Free Powerpoint Templates Page 3
  • 4. Social Engineering The art of manipulating people into performing actions or divulging confidential information It is typically trickery or deception for the purpose of information gathering, fraud, or computer system access Free Powerpoint Templates Page 4
  • 5. Most Popular Type of Social Engineering Pretexting: An individual lies to obtain privileged data. A pretext is a false motive. Pretexting is a fancy term for impersonation A big problem for computer Help Desks, in all organizations Example: Some steps the UW-Madison Help Desk takes to avoid pretexting Free Powerpoint Templates Page 5
  • 6. Let’s Think of HSLC Pretexting Example Dear Windows User, It has come to our attention that your Microsoft windows Installation records are out of date. Every Windows installation has to be tied to an email account for daily update. This requires you to verify the Email Account. Failure to verify your records will result in account suspension. Click on the Verify button below and enter your login information on the following page to Confirm your records. Thank you, Microsoft Windows Team. Free Powerpoint Templates Page 6
  • 7. Phishing • Deception, but not just in person • Email • Websites • Facebook status updates • Tweets • Phishing, in the context of the healthcare working environment is extremely dangerous Free Powerpoint Templates Page 7
  • 8. Phishing History • Phreaking, term for making phone calls for free back in 1970s • Fishing is the use bait to lure a target • Phreaking + Fishing = Phishing Free Powerpoint Templates Page 8
  • 9. Phishing 1995 • Target AOL users • Account passwords = free online time • Threat level: low • Techniques: Similar names, such as www.ao1.com for www.aol.com Free Powerpoint Templates Page 9
  • 10. Phishling 2001 Target: Ebay and major banks Credit card numbers and account numbers = money Threat level: medium Techniques: Same in 1995, as well as keylogger Free Powerpoint Templates Page 10
  • 11. Keyloggers • Tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored • Software or hardware based Free Powerpoint Templates Page 11
  • 12. Phishing 2007 Targets are Paypal, banks, ebay Purpose to steal bank accounts Threat level is high Techniques: browser vulnerabilities, link obfuscation Free Powerpoint Templates Page 12
  • 13. Don’t Touch That QR Code • Just as bad as clicking on an unknown link • Looks fancy and official, but is easy to create Free Powerpoint Templates Page 13
  • 14. Phishing in 2013 • Trends for the coming year • Identity Information • Personal Harm • Blackmail Free Powerpoint Templates Page 14
  • 15. Looking In the Mirror • Which types of sensitive information do you have access to? • What about others who share the computer network with you? • Think about the implications associated that data being stolen and exploited! Free Powerpoint Templates Page 15
  • 16. What Phishing Looks Like • As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. • They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. Free Powerpoint Templates Page 16
  • 17. Techniques For Phishing • Employ visual elements from target site • DNS Tricks: • www.ebay.com.kr • www.ebay.com@192.168.0.5 • www.gooogle.com • Unicode attacks • JavaScript Attacks • Spoofed SSL lock Certificates • Phishers can acquire certificates for domains they own • Certificate authorities make mistakes Free Powerpoint Templates Page 17
  • 18. Social Engineering Techniques Often employed in Phishing, lower your guard 1.Threats – Do this or else! 2.Authority – I have the authority to ask this 3.Promises – If you do this, you will get money 4.Praise – You deserve this Free Powerpoint Templates Page 18
  • 19. Phishing Techniques • Socially aware attacks • Mine social relationships from public data • Phishing email appears to arrive from someone known to the victim • Use spoofed identity of trusted organization to gain trust • Urge victims to update or validate their account • Threaten to terminate the account if the victims not reply • Use gift or bonus as a bait • Security promises Free Powerpoint Templates Page 19
  • 20. Let’s Talk About Facebook • So important, it gets its own slide! • Essentially unauthenticated – discussion • Three friends and you’re out! - discussion • Privacy settings mean nothing – discussion • Treasure Trove of identity information • Games as information harvesters Free Powerpoint Templates Page 20
  • 21. Socially Aware Free Powerpoint Templates Page 21
  • 22. Context Aware “Your bid on eBay has won!” “The books on your Amazon wish list are on sale!” Free Powerpoint Templates Page 22
  • 23. Seems Suspicious Free Powerpoint Templates Page 23
  • 24. 419 Nigerian Email Scam Free Powerpoint Templates Page 24
  • 25. Too Good to be True, Even When It Is Signed Free Powerpoint Templates Page 25
  • 26. Detecting Fraudulent Email Information requested is inappropriate for the channel of communication: "Verify your account."nobody should ask you to send passwords, login names, Social Security numbers, or other personal information through e-mail. Urgency and potential penalty or loss are implied: "If you don't respond within 48 hours, your account will be closed.” Free Powerpoint Templates Page 26
  • 27. Detecting Fraudulent Email "Dear Valued Customer."Phishing e-mail messages are usually sent out in bulk and often do not contain your first or last name. Free Powerpoint Templates Page 27
  • 28. Dectecting Fraudulent Email "Click the link below to gain access to your account.“ This is an example or URL Masking (hiding the web address) URL alteration www.micosoft.com www.mircosoft.com www.verify-microsoft.com Free Powerpoint Templates Page 28
  • 29. How to Defend Against Phishing Attacks •Never respond to an email asking for personal information • Always check the site to see if it is secure (SSL lock) • Look for misspellings or errors in grammar • Never click on the link on the email. Enter the web address manually • Keep your browser updated • Keep antivirus definitions updated • Use a firewall • When in doubt, ask your Network Administrator for their opinion Free Powerpoint Templates Page 29
  • 30. A Note on Spear Phishing • Designed especially for you • Includes your name • May reference an environment or issue you are aware of and familiar with • Asks for special treatment, with justification for the request Free Powerpoint Templates Page 30
  • 31. Other Techniques An ocean of Phishing techniques •Clone Phishing - Discussion •Whaling - Discussion •Filter Evasion - Discussion •Phone Phishing - Discussion •Tabnabbing - Discussion •Evil Twins - Discussion Free Powerpoint Templates Page 31
  • 32. Passwords Your password is your electronic key to valuable resources, treat it like your house key! Sharing – Discussion Theft – Discussion Password Rotation - Discussion Free Powerpoint Templates Page 32
  • 33. Creating a Strong Password Following two rules are bare minimal that you should follow while creating a password. Rule 1 – Password Length: Stick with passwords that are at least 8 characters in length. The more character in the passwords is better, as the time taken to crack the password by an attacker will be longer. 10 characters or longer are better. Rule 2 – Password Complexity: At least 4 characters in your passwords should be each one of the following: Free Powerpoint Templates Page 33
  • 34. Creating a Strong Password 1.Lower case alphabets 2.Upper case alphabets 3.Numbers 4.Special Characters Use the “8 4 Rule” 8 = 8 characters minimum length 4 = 1 lower case + 1 upper case + 1 number + 1 special character. Do not use a password strength checking website! Any ideas why this is a bad idea? Free Powerpoint Templates Page 34
  • 35. Adware, Malware, Spyware Adware – unwanted ad software which is noticed Malware – unwanted software which is noticed and potentially causes harm Spyware – unwanted software which goes un-noticed and harvests your personal information Use endpoint protection! Free Powerpoint Templates Page 35
  • 37. Adware, Malware, Spyware How these get on your computer: Email Web pages Downloaded software CD, USB flash drive Sometimes, out of the box Free Powerpoint Templates Page 37
  • 38. Trojan Malware Free Powerpoint Templates Page 38
  • 39. Baiting Hey, look! A free USB drive! I wonder what is on this confidential CD which I found in the bathroom? These are vectors for malware! Play on your curiousity or desire to get something for nothing Don’t be a piggy! Free Powerpoint Templates Page 39
  • 40. Social Engineering Methods Using the Out of Office responder in a responsible manner Free Powerpoint Templates Page 40
  • 41. Medical Identity Theft Use another person’s name Sometimes other identifying information such as a medical bracelet or insurance information Obtain medical services Make false claims Causes erronious information to be put into medical records May lead to inappropriate and life threatening situaitons Free Powerpoint Templates Page 41
  • 42. Synthetic Identity Theft A variation of identity theft which has recently become more common is synthetic identity theft, in which identities are completely or partially fabricated. The most common technique involves combining a real social security number with a name and birthdate other than the ones associated with the number. Free Powerpoint Templates Page 42
  • 43. How Does Identity Theft Happen Let’s talk through the attached paper handout, entitled: “Techniques for obtaining and exploiting personal information for identity theft” Look through the list and think to yourself “Could this apply to me?” If so, think about taking steps to avoid it Free Powerpoint Templates Page 43
  • 44. Tips To Avoid Identity Theft 1. Only Make Purchases On Trusted Sites 2. Order Your Credit Report 3. Know How To Spot Phishing 4. Secure Your Network 5. Can the Spam 6. Don't Store Sensitive Information On Non- Secure Web Sites 7. Set Banking Alerts 8. Don't Reuse Passwords 9. Use Optional Security Questions 10. Don't Put Private Information On Public Computers Free Powerpoint Templates Page 44
  • 45. If Your Identity Is Stolen (WORK) 1. Contact your supervisor immediately 2. Report the incident to the Office of Campus Information Security (OCIS) http:// www.cio.wisc.edu/security-report.aspx 3. Contact the DoIT Help Desk 4. Contact UW Police, depending on nature of incident. Consider your personal safety! “Better safe, than sorry” Free Powerpoint Templates Page 45
  • 46. Physical Security • The UW is a fairly open and shared physical environment • Seeing strangers is normal, we won’t know if they are here as friend or foe • Lock your office • Lock your desk • Lock your computer • Criminals are opportunistic • Even if you are just gone for a moment • Report suspicious activity to your administration and UW Police • If you have an IT related concern, contact the Office of Campus Information Security Free Powerpoint Templates Page 46
  • 47. Sharing Information With The Public • The University of Wisconsin is an open environment • However, on occasion, this open nature can be exploited by people with nefarious intent • Don’t volunteer sensitive information • Only disclose what is necessary • Follow records retention policies • When in doubt, ask for proof, honest people will understand, dishonest people will become frustrated Free Powerpoint Templates Page 47
  • 48. We Have So Much More To Talk About • Security Awareness matters not just to you, but to the University of Wisconsin as a whole • Security Awareness is an important facet of everyone’s work • My actions impact you • Your actions impact me • Security Awareness is an ever changing and evolving area, which requires constant attention • DoIT is here as a resource for you • Let us know how we can help • Let me know if I can help • Don’t be afraid to ask questions • Better safe than sorry Free Powerpoint Templates Page 48
  • 49. A Picture Is Worth 1000 Words Free Powerpoint Templates Page 49
  • 50. Questions and Discussion Nicholas Davis ndavis1@wisc.edu 608-262-3837 facebook.com/nicholas.a.davis Free Powerpoint Templates Page 50