the best security devices don’t stop cars getting stolen thieves look for the old cars/alarms or...

22

Upload: aron-young

Post on 25-Dec-2015

220 views

Category:

Documents


4 download

TRANSCRIPT

• The best security devices don’t stop cars getting stolen

• Thieves look for the old cars/alarms

• Or careless owners…

• Often it is the person, not the process that is the threat.

(“guns don’t kill people, people do”)

“Weapons of Influence”• Reciprocity - People have to return a favour (email info

scares).

• Commitment and Consistency - If people commit, orally or in writing, to an idea or goal, they are more likely to honour that commitment.

• Social Proof - People will do things that they see other people are doing.

• Authority - People will tend to obey authority figures, even if they are asked to perform objectionable acts.

• Liking - People are persuaded by other people that they like.

• Scarcity - Perceived scarcity will generate demand.

Presented by Carol Bott, Asst. Director ICT Security Professionalisation, DSD

Also check out “Stumbling on Happiness”

• The brain tricks us on a second-by-second basis

• People make regular, invalid assumptions of their future happiness

• We want our actions to work out well, even in the face of contradictory evidence

So how do those techniques apply to the online world?

Authority… consistency…

Authority… scarcity…

I received this from a reliable family friend this morning. 10/28/01 BIG TROUBLE !!!!

DO NOT OPEN "WTC Survivor" It is a virus that will erase your whole "C" drive. It will come to you in the form of an E-Mail from a familiar person.

I repeat a friend sent it to me, but called and warned me before I opened it. He was not so lucky and now he can't even start his computer! Forward this to everyone in your address book. I would rather receive this 25 times than not not all.

If you receive an email called "WTC Survivor" do not open it. Delete it right away! This virus removes all dynamic link libraries (.dll files) from your computer. This is a serious one.

Social proof… reciprocity… liking… authority…

Microsoft Mail Internet Headers Version 2.0Received: from mail.nntt.gov.au ([10.10.0.93]) by perdcexch.nntt.gov.au with Microsoft SMTPSVC(6.0.3790.3959);

Wed, 24 Mar 2010 10:59:28 +0800X-IronPort-Anti-Spam-Filtered: trueX-IronPort-Anti-Spam-Result: AggDANIcqUvLCgHyjmdsb2JhbACBQpllFQEBAQEJCwgJEQUfvk+CVYIoBIMcX-IronPort-AV: E=Sophos;i="4.51,298,1267372800"; d="scan'208,217";a="1808472"Received: from outbound-mail01.westnet.com.au ([203.10.1.242]) by ironport.nntt.gov.au with ESMTP; 24 Mar 2010 10:59:28 +0800X-IronPort-Anti-Spam-Filtered: trueX-IronPort-Anti-Spam-Result: Aj8GAEodqUvKSLOI/2dsb2JhbACBQplkdL5UglWCKASDHAX-IronPort-AV: E=Sophos;i="4.51,298,1267372800"; d="scan'208,217";a="66667651"Received: from dsl-202-72-179-136.wa.westnet.com.au (HELO remote.rossgriffin.com.au) ([202.72.179.136]) by outbound-mail01.westnet.com.au with ESMTP/TLS/AES128-SHA; 24 Mar 2010 10:59:16 +0800Received: from RGH-FS1.rgh.com.au ([fe80::2064:1a0f:44e0:5d5d]) by RGH-FS1.rgh.com.au ([fe80::2064:1a0f:44e0:5d5d%10]) with mapi; Wed, 24 Mar 2010 10:59:15 +0800From: Reception <[email protected]>To: "Dart, Martin" <[email protected]>Date: Wed, 24 Mar 2010 10:59:14 +0800Subject: RE: CarThread-Topic: CarThread-Index: AcrK8Rs9/pl5wC0XQou06Ey5nNmsjQADKmaAMessage-ID: <[email protected]>References: <[email protected]>In-Reply-To: <[email protected]>Accept-Language: en-US, en-AUContent-Language: en-USX-MS-Has-Attach:X-MS-TNEF-Correlator:acceptlanguage: en-US, en-AUx-tm-as-product-ver: SMEX-8.0.0.1307-6.000.1038-17272.000x-tm-as-result: No--40.929200-8.000000-31x-tm-as-user-approved-sender: Nox-tm-as-user-blocked-sender: NoContent-Type: multipart/alternative;

boundary="_000_603AE2C1D22F1747A92EA6C9CE375A8057D86724RGHFS1rghcomau_"MIME-Version: 1.0Return-Path: [email protected]: 24 Mar 2010 02:59:28.0318 (UTC) FILETIME=[04B86DE0:01CACAFE]

--_000_603AE2C1D22F1747A92EA6C9CE375A8057D86724RGHFS1rghcomau_Content-Type: text/plain; charset="us-ascii"Content-Transfer-Encoding: quoted-printable

--_000_603AE2C1D22F1747A92EA6C9CE375A8057D86724RGHFS1rghcomau_Content-Type: text/html; charset="us-ascii"Content-Transfer-Encoding: quoted-printable--_000_603AE2C1D22F1747A92EA6C9CE375A8057D86724RGHFS1rghcomau_--

Dr Ian J Watt AOSecretary of Defence

70% of targeted attacks can be mitigated by following 4 basic strategies

Defence is targeted around 200 times each year by organisations seeking to steal specific information.

Non-defence agencies are targeted some 220 times.

Duncan Lewis AONational Security Advisor DPMC

Anonymity & non-attribution the main benefits attacks enjoy.

Mining sector a recently expanding battlefield

“We must all hang together, or most assuredly, we will hang alone”. (Benjamin Franklin)

Other conference points of note:

• The PSM needs urgent review in this area, as it’s focus has been on protecting paper

• Any internet system can be compromised

• We need to extend beyond the footprint of our technology/systems – security involves the end-to-end transaction

• 2007 Estonian ‘cyberwar’ noted as a portent or things to come (be that state-sponsored of non-state actors).

• 75% of attacks utilise targeted socially engineered email

• Any network can be utilised as a jumping off point for bigger attacks (hence we are a target)

• Government has not had capacity to date to realise the extent of attacks

• Boundaries are useless - we must extend systems into the community

• We needs learning/adaptive systems – no more siege warfare

• If not patched, you are swiss cheese.

• Patch within 2 days.

Do this!(at home and work)

Automated patching makes your system self-learning

How?

Easy – Start/search/”update”

1.

2.

3.

4.

Simple tip #1

Choose the right user account…

• Give everyone a personal account• Use unique & complex passwords• Change passwords as often as you can tolerate

Simple tip #2

…and put them in the right group!

• There should only be 1 administrator• If your making your life easier, you making it less secure.

Thanks..

Questions?