best practices to protect personal information

10
1 How to Protect Personal Information Introduction Motivation (ZeuS Trojan) General Awareness Cyber Awareness References and further readings

Upload: hosamshahin

Post on 18-Dec-2014

69 views

Category:

Education


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Best Practices to Protect Personal Information

1

How to Protect Personal Information

Introduction

Motivation (ZeuS Trojan)

General Awareness

Cyber Awareness

References and furtherreadings

Page 2: Best Practices to Protect Personal Information

2

Introduction

Almost All personal affairs are now conducted online.

Online shopping.

Job hunting.

Governments related official functions.

Social networking.

Distance Learning.

Flight, Hotel and cars reservation.

Page 3: Best Practices to Protect Personal Information

3

Motivation

Zeus (Trojan horse)Steal confidential banking information

Customized through the toolkit.

Spread mainly by phishing.

In 2009, Zeus had compromised over 74,000 accounts on Bank of America, NASA, Oracle, Amazon.

Page 4: Best Practices to Protect Personal Information

4

General awareness (PII)

Personally Identifying Information

Social Security number

Credit card number

Debit card number

Bank account number

Driver’s license number

Passport number

First and last names and DOB

Page 5: Best Practices to Protect Personal Information

5

General awareness (Passwords)

How to choose a good password

At leas 8 Chars, Mix and contains symbols.

Don’t use any actual word.

Don’t use consecutive letters, adjacent keys.

Use pattern and change regularly e.g. xxYYMYMYxx like xx201103xx

First letter: “Pay no attention to the man

behind the curtain,” becomes PnAttMBtC

Page 6: Best Practices to Protect Personal Information

6

Cyber Awareness (3 Easy Steps)

1) Operating systems

Turn on the automatic update.

2) Anti-virus software

Automatic scan regular basis.

Manual scan on email Att. And file download.

3) Firewalls

Help block many attacks from the outside.

Page 7: Best Practices to Protect Personal Information

7

Cyber Awareness (Phishing)

Well designed emails and web pages trying to get your personal information.

Don't follow links from untrusted sources. Never reply message that asks for sensitive

information. Trusted institution will never

ask you for personal information.

Page 8: Best Practices to Protect Personal Information

8

Cyber Awareness (Social Network safety)

Never post personnel or sensitive information. Review how much information you share in profile. Apps and games provide strangers access to your

profile. Deleted contents does NOT mean it is gone. Take some time to read Privacy Policy and settings.

Page 9: Best Practices to Protect Personal Information

9

Cyber Awareness (Wireless Network)

Before you join a wireless network What is an untrusted network? What you should do to ensure security

Never save passwords in your browser

Check the URL of any site you visit.

Page 10: Best Practices to Protect Personal Information

10

References

Zeus Trojan

http://en.wikipedia.org/wiki/Zeus_(Trojan_horse)

Virginia Tech IT Security Office

http://www.security.vt.edu/

More About Passwords

http://www.cs.umd.edu/faq/Passwords.shtml This Presentation Online URL

http://www.slideshare.net/hosamshahin/protect-personal-information-27707669