Seguridad, Privacidad Y Vigilancia

Total Page:16

File Type:pdf, Size:1020Kb

Seguridad, Privacidad Y Vigilancia Seguridad, Privacidad y Vigilancia Antonio Carrillo Ledesma y Karla Ivonne González Rosas Facultad de Ciencias, UNAM http://academicos.fciencias.unam.mx/antoniocarrillo Una copia de este trabajo se puede descargar de la página: http://132.248.182.159/acl/seg/ http://132.248.182.159/acl/Textos/ Con…namiento 2020, Versión 1.0 1 1El presente trabajo está licenciado bajo un esquema Creative Commons Atribución CompartirIgual (CC-BY-SA) 4.0 Internacional. Los textos que compo- nen el presente trabajo se publican bajo formas de licenciamiento que permiten la copia, la redistribución y la realización de obras derivadas siempre y cuando éstas se distribuyan bajo las mismas licencias libres y se cite la fuente. ¡Copiaeste libro! ... Compartir no es delito. Seguridad, Privacidad y Vigilancia Índice 1 Introducción 3 2 Sistemas Operativos 11 2.1 Windows .............................. 13 2.2 UNIX y BSD ........................... 16 2.3 Mac OS .............................. 18 2.4 Linux ............................... 20 2.5 Android .............................. 30 2.6 Chromebook y Chrome OS .................... 32 2.7 Otros Sistemas Operativos .................... 35 3 Seguridad, Privacidad y Vigilancia 39 3.1 ¿Qué es la Privacidad y por qué es Importante? ........ 40 3.2 Las Vulnerabilidades y Exposiciones Comunes ......... 46 3.3 Amenazas a la Ciberseguridad .................. 48 4 Recomendaciones de Ciberseguridad 53 4.1 Contraseñas Robustas ...................... 53 4.2 Encriptar Discos o Archivos ................... 55 4.3 Sistema Operativo ........................ 59 4.4 Máquinas Virtuales ........................ 61 4.5 Navegación Segura ........................ 63 4.6 Uso Seguro de las Herramientas de la Nube ........... 66 4.7 Teléfonos Inteligentes y Tabletas ................. 67 4.8 Redes Sociales ........................... 69 4.9 Videoconferencias ......................... 73 4.10 Seguridad de la Red ....................... 74 4.11 Ataques con Técnicas de Inteligencia Social ........... 79 5 Meltdown, Spectre y lo que se Acumule 81 5.1 ¿Qué es Meltdown? ........................ 82 5.2 ¿Qué es Spectre? ......................... 83 5.3 Falla en los Procesadores Snapdragon .............. 84 [email protected] 1 Antonio Carrillo Ledesma, Et alii Seguridad, Privacidad y Vigilancia 6 Distribuciones de Linux «Seguras y para Penetración» 86 6.1 Distribuciones de GNU/Linux «Seguras» ............ 87 6.2 Distribuciones de GNU/Linux «Para Penetración» ...... 90 7 Apéndice A: Software Libre y Propietario 94 7.1 Software Libre ........................... 94 7.1.1 Tipos de Licencias .................... 97 7.2 Software Propietario ....................... 99 7.3 Implicaciones Económico-Políticas ................ 101 8 Bibliografía 105 [email protected] 2 Antonio Carrillo Ledesma, Et alii Seguridad, Privacidad y Vigilancia 1 Introducción Las tecnologías de la información y comunicación (TIC) son el resultado de poner en interacción la informática y las telecomunicaciones. Todo, con el …n de mejorar el procesamiento, almacenamiento y transmisión de la infor- mación. Consiguiendo de esta manera mejorar el nivel de nuestras comunicaciones. Creando nuevas formas de comunicación más rápida y de mayor calidad. Mejoras que reducen costes y tiempo, de aplicación tanto al mundo de la educación, los negocios como a la vida misma. Proporcionándonos una mayor comodidad y mejorando nuestra calidad de vida a la vez que se aboga por el medio ambiente. ¿Qué componen las tecnologías de la información y comuni- cación? los dispositivos de cómputo, las redes y los servicios, por tanto, también pueden ser clasi…cadas según hagan un uso u otro de estos elementos. En relación a los dispositivos mucho es lo que se ha avanzado. La com- putadora personal ha evolucionado desde su aparición y sigue haciéndolo a un ritmo vertiginoso. Al igual que los aparatos periféricos que lo complementan, ofreciendo otras posibilidades. La tecnología no se ha estancado en las computadoras personales. Nos va sorprendiendo introduciendo nuevos tipos de terminales en nuestras vi- das o mejorando sus características. ¿Qué fue de aquel teléfono móvil cuya única función era llamar?. Ahora son dispositivos mucho más so…sticados que han revolucionado la comunicación. La vídeo llamada, las aplicaciones de mensajes de texto gratuitas, las redes sociales, etc. son algunos ejemplos. En cuanto a las redes que permiten que los dispositivos estén interconec- tados, la piedra angular sería el internet. Su impacto en la sociedad no se puede explicar en unas líneas, pero es lo que hace girar este mundo. Las TICs han hecho un arduo trabajo en el campo de las redes. Mejorando la telefonía …ja, la telefonía móvil, el propio internet pasando de la conexión telefónica a la banda ancha, después a la …bra óptica y llevando la conexión a los móviles. Permitiendo así que estemos informados al momento. El otro elemento que conforman las tecnologías de la información y la comunicación, son los servicios. Cada vez es más grande el abanico de ser- vicios que se nos ofrece: correo electrónico, búsqueda de información, banca online, comercio electrónico, e-administración, e-gobierno, servicios privados, servicios de ocio, etc. [email protected] 3 Antonio Carrillo Ledesma, Et alii Seguridad, Privacidad y Vigilancia Ante el constante aumento -explosivo- en el uso de dispositivos como com- putadoras personales, Laptops, tabletas y teléfonos celulares, expertos en ciberseguridad advierten un entorno propicio para que prosperen los ciber- criminales y que, tanto individuos como empresas, se encuentren mayormente expuestos a múltiples amenazas de ciberseguridad. En la actualidad, aproximadamente la mitad de la población mundial accede de algún modo a internet. Con tantos accesos concurrentes a la red de redes, la posible amenaza de seguridad a los sistemas informáticos crece y se complejiza, a pesar de las diversas y especializadas maneras de contra- rrestarlas. En la gran mayoría de los casos, el eslabón más débil de la ciberseguri- dad es el factor humano, que representa la vulnerabilidad más impredeci- ble de cualquier sistema informático. Son las personas las que "caen" en una campaña de Phishing o Whaling, que usan el nombre de la mascota como contraseña. Estas personas son las primeras en abrir las puertas a los ciberdelincuentes. Al estar cada vez más interconectados y, como resultado de esto, la exposi- ción a las vulnerabilidades de seguridad también ha aumentado dramática- mente. Las complejidades de mantener las plataformas de cómputo actuales hacen que sea muy difícil para los desarrolladores cubrir cada punto de en- trada potencial. En 2019 hubo un promedio de más de 45 vulnerabilidades y exposiciones comunes (Common Vulnerabilities and Exposures, CVE) re- gistradas por día y estas siguen en aumento año con año. Los ataques de seguridad vienen en muchas formas y usan varios puntos de entrada. Cada tipo de ataque viene en varios tipos, ya que generalmente hay más de una forma en que se pueden con…gurar o camu‡ar en función de la experiencia, los recursos y la determinación del pirata informático. Sistemas Operativos Actualmente tenemos 5 grandes sistemas opera- tivos en el mercado: Windows 10, Mac OS X1, Android, iOS y GNU/Linux con todas sus diferentes distribuciones. ¿Qué Sistema Operativo Usar? ¿Apple o Microsoft? ¿Windows o Linux? ¿Android o iOS? Son preguntas frecuentes que todos nos hemos hecho alguna vez, y es que elegir un sistema operativo, una computadora o un dispositivo móvil no es tan simple. Al menos no lo era años atrás. En 1 macOS Big Sur 11.0 será el reemplazo de Mac OS X, disponible a partir de 2021. [email protected] 4 Antonio Carrillo Ledesma, Et alii Seguridad, Privacidad y Vigilancia la actualidad las diferencias entre sistemas operativos de escritorio son cada vez menos, hasta el punto que prácticamente cualquier servicio Online es compatible con Windows, Mac OS X y GNU/Linux y las principales …rmas de Software crean aplicaciones para las tres plataformas principales, salvo excepciones. Poco tendremos que decir del sistema operativo de Apple, Mac OS X o iOS, ya que son los sistemas operativos más bonitos y que mejores resultados han dado a todos los usuarios que los han probado. Mac OSX es un sistema pensado para los profesionales de los sectores que necesitan de un equipo de cómputo que sea capaz de todo, como los desarrolladores, programadores, diseñadores, periodistas, fotógrafos, músicos, DJ’s y muchos más empleos que se bene…cian de este sistema operativo. Después tenemos a Windows, un sistema operativo versátil pensado prin- cipalmente para uso doméstico, aunque eso no quita que muchas empresas utilicen Windows en sus equipos de cómputo, ya que es un sistema operativo que puede dar muy buenos resultados en este aspecto. Sin embargo, llegamos a Linux, el gran desconocido por muchos. Un sistema operativo mucho más versátil que Windows y que puede ser igual o más profesional que Mac OS X. Sin embargo, la ventaja que tienen estos dos sistemas operativos, es que vienen ya preparados y con…gurados para el tipo de mercado al que van dirigidos, pero GNU/Linux no. Esto es una ventaja y una desventaja al mismo tiempo, ya que si tenemos práctica, podemos hacer que el sistema operativo se adapte a nuestras necesidades sin problemas, además es Software libre. Seguridad TIC La seguridad TIC (Information Technology Security o IT Security) es un tema de actualidad, ya que cualquier profesional o empresa que use las Tecnologías de
Recommended publications
  • Sistemi Operativi Real-Time Marco Cesati Lezione R13 Sistemi Operativi Real-Time – II Schema Della Lezione
    Sistemi operativi real-time Marco Cesati Lezione R13 Sistemi operativi real-time – II Schema della lezione Caratteristiche comuni VxWorks LynxOS Sistemi embedded e real-time QNX eCos Windows Linux come RTOS 15 gennaio 2013 Marco Cesati Dipartimento di Ingegneria Civile e Ingegneria Informatica Università degli Studi di Roma Tor Vergata SERT’13 R13.1 Sistemi operativi Di cosa parliamo in questa lezione? real-time Marco Cesati In questa lezione descriviamo brevemente alcuni dei più diffusi sistemi operativi real-time Schema della lezione Caratteristiche comuni VxWorks LynxOS 1 Caratteristiche comuni degli RTOS QNX 2 VxWorks eCos 3 LynxOS Windows Linux come RTOS 4 QNX Neutrino 5 eCos 6 Windows Embedded CE 7 Linux come RTOS SERT’13 R13.2 Sistemi operativi Caratteristiche comuni dei principali RTOS real-time Marco Cesati Corrispondenza agli standard: generalmente le API sono proprietarie, ma gli RTOS offrono anche compatibilità (compliancy) o conformità (conformancy) allo standard Real-Time POSIX Modularità e Scalabilità: il kernel ha una dimensione Schema della lezione Caratteristiche comuni (footprint) ridotta e le sue funzionalità sono configurabili VxWorks Dimensione del codice: spesso basati su microkernel LynxOS QNX Velocità e Efficienza: basso overhead per cambi di eCos contesto, latenza delle interruzioni e primitive di Windows sincronizzazione Linux come RTOS Porzioni di codice non interrompibile: generalmente molto corte e di durata predicibile Gestione delle interruzioni “separata”: interrupt handler corto e predicibile, ISR lunga
    [Show full text]
  • Ebook - Informations About Operating Systems Version: August 15, 2006 | Download
    eBook - Informations about Operating Systems Version: August 15, 2006 | Download: www.operating-system.org AIX Internet: AIX AmigaOS Internet: AmigaOS AtheOS Internet: AtheOS BeIA Internet: BeIA BeOS Internet: BeOS BSDi Internet: BSDi CP/M Internet: CP/M Darwin Internet: Darwin EPOC Internet: EPOC FreeBSD Internet: FreeBSD HP-UX Internet: HP-UX Hurd Internet: Hurd Inferno Internet: Inferno IRIX Internet: IRIX JavaOS Internet: JavaOS LFS Internet: LFS Linspire Internet: Linspire Linux Internet: Linux MacOS Internet: MacOS Minix Internet: Minix MorphOS Internet: MorphOS MS-DOS Internet: MS-DOS MVS Internet: MVS NetBSD Internet: NetBSD NetWare Internet: NetWare Newdeal Internet: Newdeal NEXTSTEP Internet: NEXTSTEP OpenBSD Internet: OpenBSD OS/2 Internet: OS/2 Further operating systems Internet: Further operating systems PalmOS Internet: PalmOS Plan9 Internet: Plan9 QNX Internet: QNX RiscOS Internet: RiscOS Solaris Internet: Solaris SuSE Linux Internet: SuSE Linux Unicos Internet: Unicos Unix Internet: Unix Unixware Internet: Unixware Windows 2000 Internet: Windows 2000 Windows 3.11 Internet: Windows 3.11 Windows 95 Internet: Windows 95 Windows 98 Internet: Windows 98 Windows CE Internet: Windows CE Windows Family Internet: Windows Family Windows ME Internet: Windows ME Seite 1 von 138 eBook - Informations about Operating Systems Version: August 15, 2006 | Download: www.operating-system.org Windows NT 3.1 Internet: Windows NT 3.1 Windows NT 4.0 Internet: Windows NT 4.0 Windows Server 2003 Internet: Windows Server 2003 Windows Vista Internet: Windows Vista Windows XP Internet: Windows XP Apple - Company Internet: Apple - Company AT&T - Company Internet: AT&T - Company Be Inc. - Company Internet: Be Inc. - Company BSD Family Internet: BSD Family Cray Inc.
    [Show full text]
  • GF-6, PC-11 and Dexos1™: New Engine Oil Specifications Mean New Additive Challenges
    TECH BEAT Dr. Neil Canter / Contributing Editor SPECIAL REPORT GF-6, PC-11 ™ and dexos1 : New engine oil specifications mean new additive challenges Additive suppliers will need to develop new additives and KKEKEYY COCONCEPTSNC TS formulation approaches to • ThThee iimplementationp of ttwowo subcategoriessubcategories in thethe uppcocomcomiing GFGF-66 sppececificaecificationificatioonn forfor PCPCMOsCMOs meet specification deadlines. meanmeanss tthathat additivadditivee formulations maymay neeneedd ttoo be ddesidesignedggned differentldifferentlyy for GF-6GF-6 A anaandd GFGF-6- 6B.B • FoFor tthe new HDEOO sspecificaspecification,pecificationon, PCPC-1C-11,, the newnew llowero e viscosityviscosity oiloil subcategory,ssubcategory, PC-1PC-11B THE LUBRICANTS INDUSTRY IS IN THE MIDST OF DEVELOPING PROD- representts a significantsignificant challengechallenge because of UCTS for not one but three new engine oil specifications at the thethe poppotentialotetennttial neneedeed tot inincorincorporatecorpporaatte newneneeww frictionfrfricictition same time. Further complicating the issue—two of the speci- moddifieerss witth more eeffeecttive aanttiweear addddittivees.. fications are further organized into specific subcategories. • ImImplementationplementation of tthehe secosecondnd ggenerationeneration With passenger car motor oils (PCMOs), the new speci- fication is known as GF-6.1 It is further segmented into two GM specificaecificationtion, ddexos1™exos1™ priioor to GGF-6F-6 mamayy subcategories: GF-6A and GF-6B. GF-6A will cover existing requirei e thethe lullubricantsububricantbric ca tss iniindustryndustrdu tryy to reformulaterereformulatrmul te engine oil grades while GF-6B will cover new grades with PPCMOsCMOs again. viscosities lower than 0W-20. The impetus for the new grade comes from the request by automotive manufacturers to rec- 10 The heart is typically the size of a fist: 12 cm (5 inches) in length, 8 cm (3.5 inches) wide and 6 cm (2.5 inches) new lower viscosity engine oils with an HTHS of 2.9-3.2.
    [Show full text]
  • Owners Manual
    20_CHEV_Camaro_COV_en_US_84295534A_2019MAY23.ai 1 4/11/2019 1:49:04 PM 2020 2020 C M Y CM MY CY CMY K 84295534 A Chevrolet Camaro Owner Manual (GMNA-Localizing-U.S./Canada/Mexico- 13556304) - 2020 - CRC - 5/10/19 Contents Introduction . 2 Keys, Doors, and Windows . 7 Seats and Restraints . 41 Storage . 89 Instruments and Controls . 91 Lighting . 130 Infotainment System . 137 Climate Controls . 143 Driving and Operating . 152 Vehicle Care . 219 Service and Maintenance . 304 Technical Data . 320 Customer Information . 325 Reporting Safety Defects . 335 OnStar . 339 Connected Services . 347 Index . 350 Chevrolet Camaro Owner Manual (GMNA-Localizing-U.S./Canada/Mexico- 13556304) - 2020 - CRC - 5/10/19 2 Introduction Introduction This manual describes features that Helm, Incorporated may or may not be on the vehicle Attention: Customer Service because of optional equipment that 47911 Halyard Drive was not purchased on the vehicle, Plymouth, MI 48170 model variants, country USA specifications, features/applications that may not be available in your Using this Manual region, or changes subsequent to To quickly locate information about the printing of this owner’s manual. the vehicle, use the Index in the The names, logos, emblems, Refer to the purchase back of the manual. It is an slogans, vehicle model names, and documentation relating to your alphabetical list of what is in the vehicle body designs appearing in specific vehicle to confirm the manual and the page number where this manual including, but not limited features. it can be found. to, GM, the GM logo, CHEVROLET, the CHEVROLET Emblem, Keep this manual in the vehicle for CAMARO, and the CAMARO quick reference.
    [Show full text]
  • Keepass Password Safe Help
    KeePass Password Safe KeePass: Copyright © 2003-2011 Dominik Reichl. The program is OSI Certified Open Source Software. OSI Certified is a certification mark of the Open Source Initiative. For more information see the License page. Introduction Today you need to remember many passwords. You need a password for the Windows network logon, your e-mail account, your website's FTP password, online passwords (like website member account), etc. etc. etc. The list is endless. Also, you should use different passwords for each account. Because if you use only one password everywhere and someone gets this password you have a problem... A serious problem. He would have access to your e-mail account, website, etc. Unimaginable. But who can remember all those passwords? Nobody, but KeePass can. KeePass is a free, open source, light-weight and easy-to-use password manager for Windows. The program stores your passwords in a highly encrypted database. This database consists of only one file, so it can be easily transferred from one computer to another. KeePass supports password groups, you can sort your passwords (for example into Windows, Internet, My Website, etc.). You can drag&drop passwords into other windows. The powerful auto-type feature will type user names and passwords for you into other windows. The program can export the database to various formats. It can also import data from various other formats (more than 20 different formats of other password managers, a generic CSV importer, ...). Of course, you can also print the password list or current view. Using the context menu of the password list you can quickly copy password or user name to the Windows clipboard.
    [Show full text]
  • The Family Business That Has Served Customers and Community for More Than 60 Years Is Always Here for You!
    WHY CHOOSE US? The family business that has served customers and community for more than 60 years is always here for you! Make Us Your Dealer Of Choice! Internet Value Pricing Convenient Service Hours Shuttle Service Selection We strive to offer a fair, We value your time, and Our goal is to make Our selection of new and competitive price on all realize that sometimes every visit to our facility pre-owned inventory is a of our vehicles. We weekends are the most an efficient and product of partnering with encourage our convenient to take care of enjoyable experience. some of the most customers to do the certain tasks. That’s why Enjoy our competitive brands in the research - we are here to our Service Department is complimentary shuttle market - and the hard work help you find the open from 8 a.m. - 2 p.m. service or our Courtesy of our inventory specialists. vehicle and payment every Saturday. Loaner Program on We are here to help you find that works for your life! your next service visit! your ideal vehicle! Expertise Free Car Washes! Trust in Your Choice We Buy Cars! Our technicians are We hope you enjoy your We only want to offer Not in the market to factory trained and ASE vehicle every day as much the best in vehicle purchase currently? We buy master certified; we as you do the day you selection to our cars even if you don’t sell us feature a state-of-the-art purchase it! Our customers. That’s why yours! We are always Body Shop where we renowned car washes are we stand behind the seeking the best in inventory, complete repairs on all free at any of our three quality of our inventory.
    [Show full text]
  • Kodiak Marine 4.3L, 5.3L, 6.2L Direct Injection Operator's Manual
    KODIAK MARINE Marine Operators Manual 4.3L 5.3L AND 6.2L SIDI INJECTED MARINE ENGINES KEM EQUIPMENT INC 10800 SW HERMAN RD TUALATIN, OR. 97062 PHONE (503) 692-5012 FAX (503) 692-1098 KM 10875 Rev. B www.kemequipment.com 08242017 2 WARNING—DANGER OF DEATH OR PERSONAL INJURY WARNING: Extreme High Fuel Rail Pressure. The SIDI Fuel Injectors and fuel rail have extreme high fuel pressures. Do not attempt to remove or service these parts. This poses a potentially hazardous situation that if not avoided, could result in severe personal injury or death, damage to engine and or property. WARNING: FOLLOW INSTRUCTIONS Read this entire manual and all other publications pertaining to the work to be performed before installing, operating, or servicing this equipment. Failure to follow instructions can cause personal injury and/or property damage WARNING: FOLLOW ALL SAFETY PRECAUTIONS AND REGULATIONS Anyone involved in operation of equipment shall be familiar with the information in the warnings, cautions and notes. These safety precautions are mandatory and used to augment formal safety (U.S. Coast Guard) regulations. Anyone operating this equipment should become thoroughly familiar with details of operation of the equipment. Such knowledge, constantly and properly practiced is the only method for ensuring safety as well as reliable and economical equipment. In any boating situation, common sense and logic rule the waterways. WARNING: ELECTRICAL SHOCK HAZARD The ignition system can cause severe shock if proper precautions are not taken. WARNING: OVER-SPEED PROTECTION The engine is equipped with an over-speed protection device to protect against runaway or damage to the engine with possible personal injury, loss of life, or property damage.
    [Show full text]
  • Book of Abstracts
    |zchhppts||jj fivétqrujznéqjsvkÂîñüìîé Ìåæäóíàðîäíî髯®µ¦±¦®·©© ±¡¨±¡¢¯³¸©«¯£©°¯¬½¨¯£¡³¦¬¦ª ²£¯¢¯¥®¯¤¯ °±¯¤±¡­­®¯¤¯¯¢¦²°¦¸¦®©À /LQX[9DFDWLRQ(DVWHUQ(XURSH2 ¤±¯¥®¯07Ĕ10èþíÿ2¤ ±¦²³ l¬½³¦±®¡³©£¡| 2 ÏbÇ ÈÈǹ Ì ºąº­Ë®¯ËąÈ}ĆÒË®ikzº°Ċ}È cËąÈ}ĆÒºÓÓÈ«}ºããËĄÒ«ikzº°Ċ}sslȯÎÈÓ ik©Óĉ}ÒÓk|bÈą¯È cËĆËÓÏËÓ© Ñ.Ñ. Äåðå÷åííèê, êàíäèäàò òåõíè÷åñêèõ íàóê, äîöåíò, çàâåäóþùèé êàôåäðîé ýëåêòðîííûõ âû÷èñëèòåëüíûõ ìàøèí è ñèñòåì Áðåñòñêîãî ãîñóäàðñòâåííîãî òåõíè÷åñêîãî óíèâåðñèòåòà À.Â. Îòâàãèí, êàíäèäàò òåõíè÷åñêèõ íàóê, äîöåíò êàôåäðû ýëåêòðîííûõ âû÷èñëèòåëüíûõ ìàøèí Áåëîðóññêîãî óíèâåðñèòåòà èíôîðìàòèêè è ðàäèîýëåêòðîíèêè Ì |}¯©©ËË²ÓºãºĄÒÒñ¢¯±®©«­¡³¦±©¡¬¯£Âîñüìîé̦§¥´- ®¡±¯¥®¯ª «¯®µ¦±¦®·©© ±¡¨±¡¢¯³¸©«¯£ ©°¯¬½¨¯£¡³¦¬¦ª²£¯- ¢¯¥®¯¤¯ °±¯¤±¡­­®¯¤¯ ¯¢¦²°¦¸¦®©À /LQX[ 9DFDWLRQ (DVWHUQ (XURSH2±¯¥®¯0710èþíÿ 2¤ °¯¥ ¯¢º¦ª ±¦¥ ¯²³¿«¡Ĕ±¦²³¬½³¦±®¡³©£¡Ĕ160² ,6%13070 Æxivétqrkv¡squjznéqjs, ïðåäñòàâëåííûå àâòîðàìè íà Âîñüìóþ Ìåæäóíàðîäíóþ êîíôåðåíöèþ ðàçðàáîò÷èêîâ è ïîëüçîâàòåëåé ñâîáîäíîãî ïðîãðàììíîãî îáåñïå÷åíèÿ Linux Vacation / Eastern Europe 2012, âêëþ÷àÿ âûåçäíóþ çèìíþþ ñåññèþ êîíôåðåíöèè LVEE Winter 2012. Ìàòåðèàëû äîêëàäîâ ïðåäñòàâëåíû íà ñàéòå êîíôåðåíöèè http://lvee.org è ðàñïðîñòðàíÿþòñÿ ïîä ëèöåíçèåé Creative Commons Attribution-ShareAlike 3.0. Ñòàòüè ïîñâÿùåíû íîâûì òåõíîëîãèÿì è ðàçðàáîòêàì â ñôåðå ñâîáîäíîãî (îòêðûòîãî) ïðîãðàììíîãî îáåñïå÷åíèÿ è çàòðàãèâàþò øèðîêèé ñïåêòð ïëàòôîðì – îò ðàáî÷èõ ñòàíöèé è ñåðâåðîâ, âêëþ÷àÿ ðåøåíèÿ íà áàçå âèðòóàëèçàöèè, äî âñòðàèâàåìûõ ñèñòåì è ìîáèëüíûõ óñòðîéñòâ. Ñáîðíèê ìîæåò áûòü èíòåðåñåí ñïåöèàëèñòàì â îáëàñòè èíôîðìàöè-
    [Show full text]
  • Online Security and Privacy
    Security & Privacy Guide Security and Privacy Guide When thinking about security and privacy settings you should consider: What do you want to protect? Who do you want to protect it from? Do you need to protect it? How bad are the consequences if you fail to protect it? How much trouble are you prepared to go to? These questions should be asked whilst considering what information you are accessing (which websites), how you are accessing the information, (what device you are using) and where you are accessing the information (at home, work, public place). Security & Privacy When looking at your Digital Security you are protecting your information against malicious attacks and malware. (Malware is software intentionally designed to cause damage to a computer). Digital Privacy is different as you are deciding what information you are prepared to share with a website or App (or its third party partners) that you are already using. Permission to share this information can be implicit once you start using a website or App. Some websites or Apps will allow you to control how they use your information. Security Physical access: How secure is the device you are using? Is it kept in a locked building, at home, or do you use it when you are out and about? Does anyone else have access to the device? Do you require a passcode or password to unlock your device? Virtual access: Have you updated your IOS software (on an iPad) or installed the latest anti-virus software on your device? Most devices will prompt you when an update is available.
    [Show full text]
  • Password Managers an Overview
    Peter Albin Lexington Computer and Technology Group March 13, 2019 Agenda One Solution 10 Worst Passwords of 2018 Time to Crack Password How Hackers Crack Passwords How Easy It Is To Crack Your Password How Do Password Managers Work What is a Password Manager Why use a Password Manager? Cloud Based Password Managers Paid Password Managers Free Password Managers How to Use LastPass How to Use Dashlane How to Use Keepass Final Reminder References March 13, 2019 2 One Solution March 13, 2019 3 10 Worst Passwords of 2018 1. 123456 2. password 3. 123456789 4. 12345678 5. 12345 6. 111111 7. 1234567 8. sunshine 9. qwerty 10. iloveyou March 13, 2019 4 Time to Crack Password March 13, 2019 5 Time to Crack Password March 13, 2019 6 Time to Crack Password March 13, 2019 7 Time to Crack Password Time to crack password "security1" 1600 1400 1200 1000 Days 800 Days 600 400 200 0 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 Year March 13, 2019 8 How Hackers Crack Passwords https://youtu.be/YiRPt4vrSSw March 13, 2019 9 How Easy It Is To Crack Your Password https://youtu.be/YiRPt4vrSSw March 13, 2019 10 How Do Password Managers Work https://youtu.be/DI72oBhMgWs March 13, 2019 11 What is a Password Manager A password manager will generate, retrieve, and keep track of super-long, crazy-random passwords across countless accounts for you, while also protecting all your vital online info—not only passwords but PINs, credit-card numbers and their three-digit CVV codes, answers to security questions, and more … And to get all that security, you’ll only need to remember a single password March 13, 2019 12 Why use a Password Manager? We are terrible at passwords We suck at creating them the top two most popular remain “123456” and “password” We share them way too freely We forget them all the time We forget them all the time A password manager relieves the burden of thinking up and memorizing unique, complex logins—the hallmark of a secure password.
    [Show full text]
  • Technical Guides
    Technical Guides KeePass Password Manager Tutorial Wireguard Ubuntu Deployment SQM for 1 Gbps Lines With OpenWrt KeePass Password Manager Tutorial Introduction I don't trust online password managers because they are closed source and companies have been hacked in the past. If you look up "lastpass breached" in Google you can see my point. Keepass is open source and offline. Why put your trust in a company when you can create and access the database yourself? An honorable mention is bitwarden. They are also open-source and you have the option of hosting your own bitwarden server at home as an option. If you want to pay and are willing to trust a company and have your passwords encrypted on their cloud they would be your best bet. Downloading Keepass https://keepass.info/download.html Get the Installer for Windows (2.45) aka KeePass-2.45-Setup.exe. After you get it install Keepass. Recommended plugins (.plgx) to download: Keepass has a variety of useful plugins listed here: https://keepass.info/plugins.html I recommend the following below for now. Plugins always have a .plgx file extension. WebAutoType-v6.3.0.zip: https://sourceforge.net/projects/webautotype/files/ YetAnotherFaviconDownloader.plgx: https://github.com/navossoc/KeePass-Yet-Another- Favicon-Downloader/releases After you downloaded the necessary .plgx plugins. Copy or move them into the Plugins folder at C:\Program Files (x86)\KeePass Password Safe 2\Plugins. 1.1.1 Master Password To start off you will be creating a master password which is the masterkey to access all your other passwords.
    [Show full text]
  • © 2019 RSM US LLP. All Rights Reserved. UNDERSTANDING the CYBER THREAT LANDSCAPE
    © 2019 RSM US LLP. All Rights Reserved. UNDERSTANDING THE CYBER THREAT LANDSCAPE © 2019 RSM US LLP. All Rights Reserved. About your Speaker • 15+ years security and privacy experience • Originally from Brooklyn, New York; move to Florida 2018 Shan Grant • PCI QSA &PA-QSA, CISSP, CISA, Fair Credit Reporting Act (FCRA) Certification Supervisor • Worked and designed compliance programs Security, Privacy & for financial entities, fintechs, healthcare/heathtech, and non-profit Risk Services • Specializing in regulated environments: • Payment Card Industry (PCI) [email protected] • HIPAA https://www.linkedin.com/in/shan-grant/ • CRA (FCRA) • FDIC/FFIEC • Data Privacy • Career Highlight: Worked Cannes Film Festival 3 © 2019 RSM US LLP. All Rights Reserved. GIMME SOME MO’ PRIVACY © 2019 RSM US LLP. All Rights Reserved. History of privacy 5 © 2019 RSM US LLP. All Rights Reserved. Going down privacy lane 6 © 2019 RSM US LLP. All Rights Reserved. How is CCPA different than GDPR? Different consumer rights: Rights Covered GDPR CCPA Right to know and of access X X Right to deletion/erasure X X ≠ Right to restriction of X processing GDPR CCPA COMPLIANCE COMPLIANCE Right to data portability X X Right to object X In addition to compliance, it’s really all Right to opt of out sale X about the data—what type of data and Right to equal service and how it is used. X price Data governance and management Right to opt In (minors under programs should consider mapping for X 16) both. 7 © 2019 RSM US LLP. All Rights Reserved. Privacy Cliff Notes • Nevada Online Privacy Law • New York Privacy Act • Maine Act to Protect of Online Consumer Information • Massachusetts Data Privacy Law • Hawaii Consumer Privacy Protection Act • Maryland Online Consumer Protection Act 8 © 2019 RSM US LLP.
    [Show full text]