what do you do with a careless user n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
What Do You Do With A Careless User? PowerPoint Presentation
Download Presentation
What Do You Do With A Careless User?

Loading in 2 Seconds...

play fullscreen
1 / 24

What Do You Do With A Careless User? - PowerPoint PPT Presentation


  • 79 Views
  • Uploaded on

What Do You Do With A Careless User?. An educational and informative presentation by Mr. Scott Wilson Of the Oklahoma State University. What do you do with a careless user, What do you do with a careless user, What do you do with a careless user, Early in the morning?

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'What Do You Do With A Careless User?' - lieu


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
what do you do with a careless user

What Do You Do WithA Careless User?

An educational and informative presentation

by

Mr. Scott Wilson

Of the

Oklahoma State University

slide2

What do you do with a careless user,What do you do with a careless user,What do you do with a careless user,Early in the morning?

Put him the back of the paddy wagon,Put him the back of the paddy wagon,Put him the back of the paddy wagon,Early in the morning!

Throw him in the lock-up 'til he's sober,Throw him in the lock-up 'til he's sober,Throw him in the lock-up 'til he's sober,Early in the morning!

Shave his belly with a rusty razor,Shave his belly with a rusty razor,Shave his belly with a rusty razor,Early in the morning!

slide3

The Careless User’s Credo

I will never change my password unless forced to do so

My password will always be my dog’s name, unless it is “Password”

I will use the same password for all places I need a password

Any emails asking for my password must be legitimate

All popups are valid and must be clicked on

Updating software is something other people do

My actions on my computer have no effect on my coworkers or on the organization as a whole

slide4

“All complex ecosystems have parasites.”

--Katherine Myronuk

Parasites will attack by deception, by making themselves look like something harmless.

The careless user will always fall prey to these parasites, because he does not have the perception to penetrate the deception.

perception vs deception
Perception vs. Deception

Kevin Mitnick

hacker extraordinaire

Stanley Mark Rifkin

innovative bank robber

perception vs deception mitnick
Perception vs. Deception: Mitnick
  • Stage magic
  • Bus transfers
  • Phone phreaking
  • Computer hacking

http://twitter.com/kevinmitnick

perception vs deception rifkin
Perception vs. Deception: Rifkin
  • consultant
  • Bank access
  • Stole $10,000,000
perception vs deception1
Perception vs. Deception

-----Original Message-----

From: okstate.edu support [mailto:support@okstate.edu]

Sent: Friday, May 14, 2010 6:44 AM

To: Doe, John

Subject: okstate.edu account notification

Dear Customer,

This e-mail was send by okstate.edu to notify you that we have temporanly prevented access to your account.

We have reasons to beleive that your account may have been accessed by someone else. Please run this file and Follow instructions:

http://leanrock.110mb.com/setup.zip

(C) okstate.edu

perception vs deception2
Perception vs. Deception

-----Original Message-----

From: okstate.edu support [mailto:support@okstate.edu]

Sent: Friday, May 14, 2010 6:44 AM

To: Doe, John

Subject: okstate.edu account notification

Dear Customer,

This e-mail was send by okstate.edu to notify you that we have temporanly prevented access to your account.

We have reasons to beleive that your account may have been accessed by someone else. Please run this file and Follow instructions:

http://leanrock.110mb.com/setup.zip

(C) okstate.edu

perception vs deception3
Perception vs. Deception

Perception requires that we adopt a posture of awareness about our computing environment to be aware of the predators.

It requires defensive computing.

barriers to defensive computing
Barriers to defensive computing

1. ENTERTAINMENT ATTITUDE

“The fridge, stove and toaster never crash on me/I should be able to get online without a Ph.D/My phone doesn't take a week to boot it/my TV doesn't crash when I mute it…”

--Three Dead Trolls in a Baggie, “Every OS Sucks”

barriers to defensive computing1
Barriers to defensive computing
  • ENTERTAINMENT ATTITUDE
  • Sense of being overwhelmed

“Every year, more security features are added to online banking sites. This is starting to impact usability, and unfortunately, the bad guys are keeping up with the technology.”

http://bit.ly/cgoJLm

barriers to defensive computing2
Barriers to defensive computing
  • ENTERTAINMENT ATTITUDE
  • Sense of being overwhelmed
  • Lack of understanding of consequences/lack of sense of responsibility
barriers to defensive computing3
Barriers to defensive computing
  • ENTERTAINMENT ATTITUDE
  • Sense of being overwhelmed
  • Lack of understanding of consequences/lack of sense of responsibility
  • “Mysterious” nature of Information Tech.
overcoming the barriers
Overcoming the barriers

Education

Documentation

ISOLATION

Evolution/attrition

overcoming the barriers1
Overcoming the barriers

OSU’s steps

towards

A BRIGHTER

SAFER FUTURE

for our users and others

overcoming the barriers2
Overcoming the barriers

Training

For users of

Facebook, twitter

And other fancy

doodads

overcoming the barriers3
Overcoming the barriers

Development

of amazing new materials

For the effective learning of safety

overcoming the barriers4
Overcoming the barriers

Partnering with other universities

and

institutions of learning

to

further our collective aims

overcoming the barriers5
Overcoming the barriers

The Dawning

of a

New Era

of

Understanding

between techs and users

slide21

What do you do with a careless user,What do you do with a careless user,What do you do with a careless user,Early in the morning?

slide22

The Careful User’s Credo

I understand why password security is important, and will strive to maintain it

I can spot phishing emails and will not be deceived by them

Safe web use is part of my daily routine

I know how to browse without getting tricked

It is my job to make sure that my applications are kept updated

Doing so helps protect my computer – and me

What I do with my computer and my accounts is an important part of who we are in extension

I will therefore be diligent in keeping good practices for the benefit of myself and my colleagues

suggested reading
Suggested reading
  • Mitnick, Kevin The Art of Deception
  • Mitnick, Kevin The Art of Intrusion
  • Long, Johnny No Tech Hacking
  • http://www.sans.org/reading_room/whitepapers/engineering/