Securing the Weakest Link Instructor Jay Ferron CEHI, CISM, CISSP, CWSP, MCITP, MCT, MVP, NSA-IAM …
[email protected] © 2010 Global Knowledge Training LLC. All rights reserved. Section Objectives After completing this section, you will be able to: Discuss the issue of social media in security Describe and show examples of phishing Show methods of discovering and processing online attacks © 2010 Global Knowledge Training LLC. All rights reserved. 2-2 Security Fundamentals Security Importance To protect your finances To protect your data To protect your country To protect your job To protect your way of life To protect your life © 2010 Global Knowledge Training LLC. All rights reserved. 1-3 Security Fundamentals Human Influence in Security “People are the underlying cause of the need for security.” Donn Parker, Fighting Computer Crime © 2010 Global Knowledge Training LLC. All rights reserved. 1-4 Vulnerabilities Social Engineering Dumpster diving and shoulder surfing Organizational charts, passwords, access codes, and log files Use of tools Google, Bing, Yahoo!, etc. www.learnwebskills.com/company www.whitepages.com Hoover’s, Inc. EDGAR Online, Inc. © 2010 Global Knowledge Training LLC. All rights reserved. 1-7 Demo © 2010 Global Knowledge Training LLC. All rights reserved. Discussion DoHow you manydo haveyou of connect children you have to at more thehome Internet than and one WhatDoHave you areyou useback youever encryption? upusing been your tohit data?computer? read by a yourHow virus? often?eHow-mail? often? ifcomputer(DSL, so, what cable, at ages? home?or dial-up)? © 2010 Global Knowledge Training LLC. All rights reserved. Social Media Types Social networking sites Blogging sites Facebook Xanga Twitter LiveJournal Video sharing Bookmarking sites YouTube Digg Photo sharing Flickr © 2010 Global Knowledge Training LLC.