100 likes | 220 Vues
Information Security and Cybercrimes. By Clemente Andre Inocente M.A. & B.S.A (SDSU Alumni) College of Sciences at SDSU Operating Systems Analyst & Information Technology Consultant. What Is The Moral of This Scene?. Supplement Topics To Our Textbook. John the Ripper (Mac, Unix, PC)
E N D
Information Security and Cybercrimes By Clemente Andre Inocente M.A. & B.S.A (SDSU Alumni) College of Sciences at SDSU Operating Systems Analyst & Information Technology Consultant
Supplement Topics To Our Textbook • John the Ripper (Mac, Unix, PC) • Suggested passwords to use, but really up to the individual • Secured Your Mobile Devices? (e.g. iPads, cell phones, laptops, etc…) • Got Anti-Virus/Spyware? • Automating System Security and monitoring (e.g. scheduled preventive maintenance)
John the Ripper(Mac, Unix, and Windows) • John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords, although Windows LM hashes and a number of other password hash types are supported as well. John the Ripper is free and Open Source software, distributed primarily in source code form. • http://www.openwall.com/john/
Suggested Passwords, But Up To Individual Strong passwords and passphrases contain characters from each of the following four categories: REF: Microsoft Windows Help- Tips for creating strong passwords and passphrases
Suggested Passwords, But Up To Individual(Cont…) • Don’t use names, words found in a dictionary, phone numbers, dates, or simple combinations of these. • Avoid using a pattern of keyboard characters, such as diagonal lines of keyboard keys (for example, njimko). • Use a sequence of random characters. Include a mix of upper- and lowercase letters, numbers, punctuation marks, and (if the site or item allows it) characters typed while holding down the Option key. • While defining a password, use the Password Assistant to see how secure your password is. To open the Password Assistant, click the Key button next to the Password field or the New Password field. • Start with a phrase, verse, or line from a song. Omit some letters, and transform others into numbers or punctuation marks that resemble the original character. You might want to insert additional punctuation and numbers too. • (Cont….) REF: OS X Mountain Lion-Tips for creating secure passwords
Secure Your Mobile Devices?(e.g. iPads, cell phones, laptops, etc…) Password protected/swiping/Face-to-Unlock. Delete: unused apps., saved passwords & user names System updates/PRL (mobile phones) http://www.verizonwireless.com/care/popups/prl.html
Got Antivirus, SDSU Students do • REF: http://www-rohan.sdsu.edu/~download/mcafee.html
Systemizing Security Through Automation and Monitoring(e.g. scheduled preventive maintenance) • OS & Software Automatic Updates (scheduled) • Manually check updates, just like your car. • Got Plug-ins/ Add ons? Check out my site:sci.sdsu.edu/andre-inocente/mmtest.htm
Security Through Automation and Monitoring(e.g. scheduled preventive maintenance) (Cont…)