CSAwT Training Quick Guide
CSAwT Training Quick Guide
Afternoon Session
Securing your Person, Online
Basic computer security
Accounts and permissions
Basic security tools for the PC
Basic Windows Lockdown
Disabling USB Autorun
Securing Network Shares
Windows Local Group Policy
Localized data encryption
Encryption with VeraCryt
Passwords and Authentication Best Practices
Do's and Don'ts in handling passwords
Password Managers
Two-factor Authentication (2FA)
Web Browsing Safety
Web browsing safety tips
Demo: interrogating the browser for cookies and other data
Email Safety
Verifying email messages
Securing Email
Workshop: enabling 2FA with Google Authenticator
Email encryption with PGP/GNUPG
Workshop: PGP with Mailvelope
Keeping your sanity with email filters
Social Media Safety
Securing your Facebook account
Chat Safety
Mobile Safety
Trainers
This training quick guide is a companion to the Cybersecurity Awareness Training for End
Users. It contains some definitions, glossary of terms, installation steps for software used in the
workshops, and links to additional tools and references that the training participants can use
and revisit at their own leisure.
What is the internet?
The Internet is a global network of interconnected computers, providing information, storage,
and communication facilities. It was born out of the initial, albeit smaller, ARPANET project from
the Defense Advanced Research Project Agency (DARPA).
The Internet as we know it today is fairly ubiquitous and pervasive. We connect to the internet
via our computers, laptops, mobile phones, tablets, TVs, and even home appliances. Virtually all
manner of data is being stored and exchanged via the internet.
Safety
- (n) the condition of being safe from undergoing or causing hurt, injury, or loss (Merriam
Webster’s Dictionary)
What is cybersecurity?
- (n) the state of being protected against the criminal or unauthorized use of electronic
data, or the measures taken to achieve this. (Google)
- (n) refers to a set of techniques used to protect the integrity of networks, programs and
data from attack, damage, or unauthorized access. (Palo Alto CyberPedia)
Cybersecurity is the term for all the processes and practices implemented to protect networks,
computers, applications, and data from attacks on the C-I-A triad (Confidentiality, Integrity,
and Availability)
The CIA Triad
Confidentiality
● Keep sensitive information off the network, if possible.
● Encrypt sensitive information
● Protect access to your system
● Don’t share sensitive information
● Password protection
Integrity
● Prevent unauthorized modification of information
○ Email
○ Data
○ Digital Downloads
○ Log and audit files
● Check the reliability / trustworthiness of information
○ Pwned / hacked websites
○ Email with modified content
○ Corrupted files
Availability
● Denial of Service Attacks and Distributed Denial of Service Attacks
● Expect the Unexpected (Contingency Plans)
● Beware of Natural or manmade disasters
Cybersecurity:
● is everyone’s concern
● Helps your organization
○ Reduce loss
○ Protect customer information
○ Prevent fraud
○ Reduce stress, hair loss and gnashing of teeth
Myths of Cybersecurity
“Security is expensive!”
Most companies have this mindset. This is partially related to the “magic bullet” fallacy wherein,
users and companies believe that if the more expensive the tool, the better secured they
become.
Adware
software that displays advertisements on your computer
Anonymizing proxy
proxies allow the user to hide their web browsing activity, often used to bypass web
security filters—e.g., to access blocked sites from a work computer.
Browser Hijacker
used to boost advertising revenue, as in the use of blackhat Search Engine Optimization
(SEO), to inflate a site’s page ranking in search results.
The attacker hijacks clicks meant for one page and routing them to another page, most
likely owned by another application, domain, or both.
Brute-force Attack
hackers try a large number of possible keyword or password combinations to gain
unauthorized access to a system or file.
Typical DoS attacks target web servers and aim to make websites unavailable. No data
is stolen or compromised, but the interruption to the service can be costly for an
organization.
● These malware rely on users double-clicking an attachment, which would run the
malicious code, infect their machine and send itself to more email addresses
from that computer.
● user education can raise awareness of email scams and seemingly legitimate
attachments or links.
Worms differ from computer viruses because they can propagate themselves, rather
than using a carrier program or file. They simply create copies of themselves and use
communication between computers to spread.
● Typically in a phishing email scam, you receive an email that appears to come
from a reputable organization, such as banks, social media and financial
institutions
● To protect against phishing attacks, it’s good practice not to click on links in email
messages. Instead, you should enter the website address in the address field
and then navigate to the correct page
IPS can log activity information, and also attempt to block activity and report it to network
administrators to prevent network infections.
Uniform Resource Locator (URL)
A URL is also referred to as a web address, that typically starts with http:// or https:// that
users type on the web browser.
Most malware and phishing attacks are carried out via the web. By restricting access to
certain websites, organizations can reduce the risk that their users will become victims
Ransomware
Ransomware is software that denies you access to your files or computer until you pay a
ransom.
For example, the Archiveus Trojan copies the contents of the My Documents folder into
a password-protected file and then deletes the original files. It leaves a message telling
you that you require a 30-character password to access the folder, and that you will be
sent the password if you make purchases from an online pharmacy
In some cases, the password or key is concealed inside the Trojan’s code and can be
retrieved by malware analysts. However, some criminals use asymmetric or public-key
encryption (which uses one key to encrypt the data, but another to decrypt it) so that the
password is not easily recoverable.
Vulnerability
A security vulnerability is a weakness in a product or system that could allow an attacker
to compromise the integrity, availability, or confidentiality of that product.
Threats
A threat, in the context of computer security, refers to anything that has the potential to
cause serious harm to a computer system.
Threats are potentials for vulnerabilities to turn into attacks on computer systems,
networks, and more.
Threats can include everything from viruses, trojans, backdoors to outright attacks from
hackers.
Exploits
An exploit takes advantage of a weakness in an operating system, application, hardware
or any other software code.
Security exploits come in all shapes and sizes, but some techniques are used more
often than others. Some of the most common web-based security vulnerabilities include
SQL injection attacks, cross-site scripting and cross-site request forgery, as well as
abuse of broken authentication code or security misconfigurations.
The vulnerability only becomes known when a hacker is detected exploiting the
vulnerability, hence the term zero-day exploit.
Systems running the software are left vulnerable to an attack until the vendor releases a
patch to correct the vulnerability and the patch is applied to the software.
Software Utilities
Download at https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns
There is no installation step for Autoruns for Windows. Once you have downloaded the ZIP file,
extract the package to a folder of your choice and run / double click on Autoruns.exe.
VERACRYPT
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. It is
a software for establishing and maintaining an on-the-fly-encrypted volume (data storage
device). On-the-fly encryption means that data is automatically encrypted right before it is saved
and decrypted right after it is loaded, without any user intervention. No data stored on an
encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or
correct encryption keys.
LASTPASS
LastPass is a popular, freemium password manager.
Download at https://www.lastpass.com/
MAILVELOPE
Mailvelope is an open source project that provides OpenPGP encryption for webmail
(web-based email). It comes as an extension for Google Chrome, or an add-on for Firefox.
In order to read a PGP-encrypted email, the receiving party needs to have your PGP public key
installed as well.
1. Download VeraCrypt Setup 1.22.exe or whatever version is available for download from
the website at https://www.veracrypt.fr/en/Downloads.html.
2. Save the exe file into a folder in your computer.
3. Run the installation by double-clicking on the VeraCrypt Setup 1.22.exe installer file.
4. VeraCrypt will ask you if you want to allow the installer to make changes to your PC.
Click on Yes.
5. In the License screen, click on “I accept the license terms” and click Next.
6. In the Wizard Mode dialog, choose ‘Install’ to install. ‘Extract’ is only applicable if you
want VeraCrypt to be portable. In our case, we need it to run only on our Windows
computer.
7. Choose where to install VeraCrypt. You can leave it as is. Click Install.
8. Let VeraCrypt finish installing.
4. Choose ‘Standard VeraCrypt volume’ in the Volume Type dialog and click Next.
5. Specify the volume location for your VeraCrypt volume. Click ‘Select File’, specify the
path and filename of the volume, click Save, then click Next.
6. Select an encryption algorithm to use for your VeraCrypt volume. For this exercise, just
use AES for encryption algorithm, and SHA-512 for hash algorithm. Click Next
7. Choose the size for your VeraCrypt volume (this is where the encryption algorithm is
used). Click Next.
8. To make sure that your VeraCrypt volume doesn’t get mounted arbitrarily by any one
using your computer, assign a password (this is where the hash algorithm is used). Click
Next.
9. Choose a volume format. Modern Windows versions support FAT and NTFS. Linux
support EXT2, EXT3, EXT4, etc. Choose NTFS or FAT. Make sure to move your mouse
to generate enough randomness, and click Format
10. After creating the volume, click on OK in the confirmation dialog.
1. In the main VeraCrypt window, click on an empty mount point and click Select File.
2. Select the VeraCrypt volume encrypted file you generated earlier, and click Open.
3. With the encrypted volume file selected already, click on Mount.
6. Once the volume has been successfully mounted, it will be listed in the mount point, with
the assigned drive letter. You can now access the volume normally via Windows
Explorer and other apps.
Google Authenticator
Google Authenticator is a software token that implements two-step verification services using
the Time-based One-time Password Algorithm (TOTP) and HMAC-based One-time Password
Algorithm (HOTP), for authenticating users of mobile applications by Google.
Setting up Two Factor Authentication for Facebook
5. Under Authentication App, click on Add new app. Scan the generated QR code using
Google Authenticator.
6. As added layer of security. In Recovery Codes, click on Setup, click on Get Codes.
Print and save the codes at your most convenient, yet secure storage location. These
codes will come in handy in the unfortunate event you lose your phone (Google
Authenticator)
5. Type your Twitter password in the popup dialog. Then click Verify.
6. Click on Send code in the next popup.
7. Once you have received your SMS code, type it in the next popup and click Submit. You
can choose to generate backup code as added layer of security
Setting up Two Factor Authentication for Instagram
1. Login your LinkedIn account. Click on the profile picture at the upper right part of the
screen.
2. Under Account, click on Settings and Privacy.
3. In Login and Security, click on Two-step verification.
4. You will be asked to provide a mobile number to verify and receive SMS codes from.
5. Once activated, you will be required to enter an SMS code after typing in your password
upon Login.
Setting up Two Factor Authentication for Gmail
ttps://www.google.com/landing/2step/
1. Navigate to h
2. Click on Get started
3. Enter the phone number you want to use for OTP. This is just in case the authenticator
app isn’t accessible. Click Next.
4. Enter the one-time password sent to your phone. Click Next.
5. Click Turn on.
6. This enables two-factor authentication via SMS on your Google account. Now scroll
down and click Setup under Authenticator app.
7. In the pop-up, select the type of phone you have - Android or iPhone.
8. Now you’ll see a QR code on screen. You can either scan this or click Can’t scan it to
get a code for two-factor authentication. This is where you’ll have to switch to your
smartphone.
9. Download Google Authenticator on Android or iOS.
10. Tap Begin Setup
11. Tap Scan barcode. This will fire up the camera on your smartphone and you can point
that at the QR code on the computer screen.
12. On the Google two-factor authentication page, click Next.
13. Enter the code on your authenticator app and click Verify.
Basics
OpenPGP and therefore Mailvelope use public-key encryption, which means a key is split into
two parts: public and private keys with different purposes:
In order to send an encrypted email, you must have the public key of the recipient. Therefore,
before secure communication can happen between two people, they must exchange their public
key.
Installing
Generating a Key
1. To start using Mailvelope, we need to generate a private key and public key in order for
Mailvelope to perform encryption. Click on the Mailvelope “lock” icon in your browser
then click Configure Mailvelope (gear icon).
4. After generating your keys, you can see the keys by clicking on Display Keys.
Composing an Encrypted Email Message
With Mailvelope already installed and configured, you can now compose an encrypted
message.
LastPass is a free-to-try password manager that works both for desktop and mobile devices.
Using LastPass
1. Get the LastPass browser extension. Install the extension in your browser for saving &
accessing your passwords.
2. Make a strong master password.
3. Explore your LastPass vault.
Setting Privacy settings in Facebook
1. Login to your Facebook account, Click on the down arrow on the upper right hand of the
page.
2. Select Settings and then select Privacy from the left hand side of the page.
3. Adjust privacy settings as desired by clicking on the Edit links for each section.
6.
Additional References
http://time.com/4673602/terms-service-privacy-security/
https://www.pcpd.org.hk/english/publications/files/interd_e.pdf
http://www.bbc.com/news/business-36854292
https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/how-much-is-your-personal
-data-worth-survey-says
https://cacm.acm.org/magazines/2018/2/224626-the-war-over-the-value-of-personal-data/fulltext
https://www.forbes.com/sites/thomasbrewster/2018/04/16/huge-facebook-facial-recognition-data
base-built-by-ex-israeli-spies
https://www.experian.com/blogs/ask-experian/heres-how-much-your-personal-information-is-sell
ing-for-on-the-dark-web/
https://www.windowscentral.com/how-use-windows-10-non-admin-and-why
https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns
https://www.betterbuys.com/estimating-password-cracking-times/
https://howsecureismypassword.net/
http://www.passwordmeter.com/
https://password.kaspersky.com/
https://www.cnet.com/news/the-best-password-managers-directory/
http://www.primalsecurity.net/pgp-encryption/
https://blog.barkly.com/10-fundamental-cybersecurity-lessons-for-beginners
https://www.welivesecurity.com/2017/01/31/cybersecurity-5-basic-lessons-everyone/
https://www.pandasecurity.com/mediacenter/business/10-cybersecurity-basics-employees/
https://www.americanexpress.com/us/small-business/openforum/articles/7-cyber-security-basics
-every-small-business-needs/
http://www.its.ms.gov/Services/Pages/Security-Links-for-Cyber-Security.aspx
https://heimdalsecurity.com/blog/free-cyber-security-tools-list/
https://www.theguardian.com/technology/2013/sep/16/10-ways-keep-personal-data-safe
http://theconversation.com/7-in-10-smartphone-apps-share-your-data-with-third-party-services-7
2404
https://www.ftc.gov/tips-advice/business-center/guidance/small-business-computer-security-basi
cs
https://www.nist.gov/news-events/news/2018/06/youve-been-phished