+ All Categories
Home > Documents > Other useful information about the presentation ECE 6612 Kyle Koza.

Other useful information about the presentation ECE 6612 Kyle Koza.

Date post: 17-Dec-2015
Category:
Upload: ophelia-hudson
View: 218 times
Download: 1 times
Share this document with a friend
Popular Tags:
36
Other useful information about the presentation ECE 6612 Kyle Koza
Transcript
Page 1: Other useful information about the presentation ECE 6612 Kyle Koza.

Other useful information about the presentation

ECE 6612Kyle Koza

Page 2: Other useful information about the presentation ECE 6612 Kyle Koza.

Georgia Tech CyberSecurity

What do you think we do?

Page 3: Other useful information about the presentation ECE 6612 Kyle Koza.

What do you think the bad guys want?

Your email accountFor phishingSend spam

Your access to journal articles Your paycheck

Page 4: Other useful information about the presentation ECE 6612 Kyle Koza.

How do we protect the Institute?

Education and Awareness Intrusion Detection (and Prevention) Vulnerability Scanning Incident Response Policy and Compliance Things come up…

Page 5: Other useful information about the presentation ECE 6612 Kyle Koza.

Phishing: What is it?

Phishing is a fraudulent activity that attempts to acquire sensitive information such as usernames, passwords and credit card numbers by masquerading as a trustworthy and legitimate entity

Email

SCAM

Page 6: Other useful information about the presentation ECE 6612 Kyle Koza.

Phishing: Why does the scam work?

Users are trusting of technology (especially email). Users get a LOT of email and move quickly. Bad guys are convincing. Bad guys use your lack of knowledge to their benefit. Bad guys only have to be right one time. You have

to be right every time.

Page 7: Other useful information about the presentation ECE 6612 Kyle Koza.

What can you believe about an email?

From Name

Date / Time

From Address

Message

Links

Page 8: Other useful information about the presentation ECE 6612 Kyle Koza.

What can you believe about an email?

From Name

Date / Time

From Address

Message

Links

Page 9: Other useful information about the presentation ECE 6612 Kyle Koza.

Verify a message in 3 easy steps

1. Check the web address (URL)

3. When in doubt, stop and ask!!

2. Watch for red flags / trust your gut

Page 10: Other useful information about the presentation ECE 6612 Kyle Koza.

Desktop/Laptop: Verify the Link

Hover your mouse over the link until the real link pops up.

Page 11: Other useful information about the presentation ECE 6612 Kyle Koza.

Browser: Verify the Link

Hover your mouse over the link; check the bottom of the screen

Page 12: Other useful information about the presentation ECE 6612 Kyle Koza.

Mobile: Verify the Link

Hold the link with your thumb until the real link pops up.

Page 13: Other useful information about the presentation ECE 6612 Kyle Koza.

Identify the real domain

https://www.gatech.edu/login/index.html

https://www.gatech.edu/login/index.html

https://www.gatech.edu/login/index.html

https://www.gatech.edu/login/index.htmllast two words,

before first single slash

Page 14: Other useful information about the presentation ECE 6612 Kyle Koza.

iTunes Email: Is it Phishing?

Page 15: Other useful information about the presentation ECE 6612 Kyle Koza.

iTunes Phishing

http://account.verification.ituns.com

Page 16: Other useful information about the presentation ECE 6612 Kyle Koza.

UPS Email: Is it Phishing?

Page 17: Other useful information about the presentation ECE 6612 Kyle Koza.

UPS Phishing

http://ups.packagetracking.trackyourpkg.com

Page 18: Other useful information about the presentation ECE 6612 Kyle Koza.

Georgia Tech Phish

Page 19: Other useful information about the presentation ECE 6612 Kyle Koza.

Georgia Tech Phish

http://www.mamami.webspace.virginmedia.com/gatech/gatech.edu.htm

Page 20: Other useful information about the presentation ECE 6612 Kyle Koza.

Red FlagsNote: Red flags would indicate a possible problem. The lack of red flags does not validate a message.

Email contains: information contrary to what you know is truemisspellings / improper grammara request to click on links / attachmentsa sense of urgencyan appeal to greed or feara request for sensitive dataa link to non-Georgia Tech websites asking for your GT account information

Page 21: Other useful information about the presentation ECE 6612 Kyle Koza.

The bad guys want:

Your email accountFor phishingSend spam

Your access to journal articles Your paycheck

Page 22: Other useful information about the presentation ECE 6612 Kyle Koza.

Logging and Network Analysis

Logging Authentication System events and host intrusion detection IDS/IPS Alerts

Network Analysis Firewall events Netflow Packet capture DNS queries Network Antimalware

Page 23: Other useful information about the presentation ECE 6612 Kyle Koza.

SIEM

Security Information and Event ManagementConsolidateCorrelateSearchStoreAct

Page 24: Other useful information about the presentation ECE 6612 Kyle Koza.

Correlate

Logins across different geographic locationsHaversine formula

Firewall DeniesDarknetsMultiple Firewalls

Page 25: Other useful information about the presentation ECE 6612 Kyle Koza.

Firewalls

600+ firewallsBorder firewallFirewall in front of each VLAN

TypesPacket filteringStatefulNext-Gen (Application)

Page 26: Other useful information about the presentation ECE 6612 Kyle Koza.

Intrusion Detection and Prevention

IPS (Active)Cisco IPSFireEyeOSSEC

IDS (Passive)FireEyeSuricataDamballa

Page 27: Other useful information about the presentation ECE 6612 Kyle Koza.

Problems with Security Systems?

Base-Rate Fallacy Alert overload Cost

Page 28: Other useful information about the presentation ECE 6612 Kyle Koza.

Vulnerability Scanning

QualysNessusOpenVASNexpose

Rolling scans of our entire network Send vulnerability reports to IT staff Clean scans required to manage firewall

Page 29: Other useful information about the presentation ECE 6612 Kyle Koza.

Antimalware

HostDefense in depthMicrosoft SCEPMalwareBytes

NetworkFireEyeDamballaSuricata

Page 30: Other useful information about the presentation ECE 6612 Kyle Koza.

Incident Response

Sometimes things go wrong…

Prevent Detect Contain Eradicate Recover

Page 31: Other useful information about the presentation ECE 6612 Kyle Koza.

Phishing Quiz

Page 32: Other useful information about the presentation ECE 6612 Kyle Koza.

Situation:

You received an email. In a hurry, you clicked the link. You were taken to a webpage. You must now decide whether or not to proceed.

Page 33: Other useful information about the presentation ECE 6612 Kyle Koza.

Gone Phishing?https://login.gatech.edu/cas/login

OK to Proceed? YES!

Page 34: Other useful information about the presentation ECE 6612 Kyle Koza.

Gone Phishing?https://highereducation.gt.edu.hied.com/login

OK to Proceed? NO!

X

Page 35: Other useful information about the presentation ECE 6612 Kyle Koza.

Gone Phishing?http://login.gt.gatech.edu

OK to Proceed? NO!

X

Page 36: Other useful information about the presentation ECE 6612 Kyle Koza.

Gone Phishing?https://loginpage.dept.gatech.edu

OK to Proceed? MAYBE…. When in doubt.. ASK!

Username:_____________________ Password:_____________________

[SUBMIT]?


Recommended