PROTECTING YOUR DATA AND
PRIVACY
Arman Hasen (CCIE)
CYBER SECURITY TRAINING COURSE NETWORKWALKS ACADEMY (
[email protected])
PROTECTING YOUR COMPUTING DEVICES
We live in a cyber rich world today. Data security & data privacy are the two major concerns that every company & individual is worried about.
All data or information that relates to an identifiable individual or organization, that your business stores or handles, needs to be properly
protected. It ranges from financial information and payment details to contact information for your staff. Below are some security
recommendations & mechanisms about how to protect your data security & data privacy.
▪ Protect All Your Devices
• Password protect
• Encrypt the data
• Only store necessary information
• IoT devices
▪ Manage Your Operating System and Browser
• Set the security settings at medium or higher
• Update your computer’s operating system and browser
• Download and install the latest software patches and security updates
▪ Keep the FW/AV On
• Prevent unauthorized access to your data or computing devices
• Keep the firewall up to date
• Prevent unauthorized access to your data or computing devices
• Only download software from trusted websites
• Keep the software up to date
www.networkwalks.com
USE WIRELESS NETWORKS SAFELY
▪ Home Wireless Network
• Change the pre-set SSID and default administrative password on your Wi-Fi router.
• Disable SSID broadcast
• Use WPA2 encryption feature
• Be aware of WPA2 protocol security flaws
▪ Use caution when using public Wi-Fi hotspots
• Avoid accessing or sending sensitive information
• Use of VPN tunnel can prevent eavesdropping
▪ Turn off Bluetooth when not in use
WLAN Security Standards
Characteristics /Standard WEP WPA WPA2 (802.11i)
Year 1997 2003 2005
Key Distribution Static Static, Dynamic Static, Dynamic
Encryption Type RC4 RC4/TKIP AES
User/Device Auth No/YES YES/YES YES/YES
www.networkwalks.com
USE WIRELESS NETWORKS SAFELY
Practice this extra optional lab to improve your understanding &
skills on WiFi & Wireless networks configuration & security. This lab PRACTICE LAB
belongs to Networking course & you will need Cisco Packet
OPTIONAL LAB
www.networkwalks.com
USE UNIQUE PASSWORDS FOR EACH ONLINE ACCOUNT
▪ Prevents criminals from accessing all your online accounts using one stolen credentials
▪ Use password managers to help with remembering passwords
▪ Tips for choosing a good password:
• Do not use dictionary words or names in any languages
• Do not use common misspellings of dictionary words
• Do not use computer names or account names
• If possible, use special characters, such as ! @ # $ % ^ & * ( )
• Use a password with ten or more characters
Ok Good Better
allwhitecat a11whitecat A11whi7ec@t
Fblogin 1FBLogin 1.FB.L0gin$
amazonpass AmazonPa55 Am@z0nPa55
ilikemyschool ILikeMySchool !Lik3MySch00l
Hightidenow HighTideNow H1gh7id3Now
www.networkwalks.com
QUESTION
Which of these passwords is best for security reasons & why?
1. Ilikemyschool
2. ILikeMySchool
3. !Lik3MySch00l
4. 123!@#abC
5. 092292353150402
6. !@#$%^&*
7. Summer2022
www.networkwalks.com
QUESTION
Which of these passwords is best for security reasons & why?
1. qwertyuiop
2. 1234qwer
3. 123!@#abC
4. 1234567890
5. !@#$%^&*
6. Summer2022
7. Eyed0ntl!kEst@rbuck$
www.networkwalks.com
DO YOU KNOW?
www.networkwalks.com
Do you know?
iloveyou
is one of the most commonly used passwords on the Internet.
It is used more by women as compared to men.
In the USA in 2020, more women (222,287) used "iloveyou" than men (96,785)
Women 222,287
Men 96,785
www.networkwalks.com
USE PASSPHRASE RATHER THAN A PASSWORD
• Tips in choosing a good passphrase:
• Choose a meaningful statement to you
• Add special characters, such as ! @ # $ % ^ & * ( )
• The longer the better
• Avoid common or famous statements, for example, lyrics from a popular song
• Summary of the new guidelines by NIST (National Institute of Standards and Technology):
• 8 characters minimum in length, but no more than 64 characters
https://auth0.com/blog/dont-pass-on-the-new-nist-password-guidelines/
• No common, easily guessed passwords, such as password, abc123
https://pages.nist.gov/800-63-3/sp800-63-3.html
• No composition rules, such as having to include lowercase and uppercase letters and numbers
• No knowledge-based authentication, such as information from shared secret questions, marketing data, transaction history
• Improve typing accuracy by allowing the user to see the password while typing
• All printing characters and spaces are allowed
• No password hints
• No periodical or arbitrary password expiration Ok Good Better
Thisismypassphrase Acatthatlovesdogs Acat_th@tlov3sd0gs
www.networkwalks.com
LAB – CREATE AND STORE STRONG PASSWORDS
Practice this Cyber Security lab to improve your understanding & skills on passwords
PRACTICE LAB
management.
www.networkwalks.com
ENCRYPT YOUR DATA
• Encrypted data can only be read with the secret key or
password
• Prevent unauthorized users from reading the content
• What is Encryption?
• Process of converting the information into a form where
an unauthorized party cannot read it
www.networkwalks.com
BACK UP YOUR DATA
• Prevent the loss of irreplaceable data
• Need additional storage location for the data
• Copy the data to the backup location regularly and automatically
• Local Backup
• NAS, external hard drive, CDs/DVDs, thumb drives, or tapes
• Total control and responsible for the cost and maintenance
• Cloud Storage Service, such as AWS
• Access to backup as long as you have access to your account
• may need to be more selective about the data being backed up
www.networkwalks.com
DELETING YOUR DATA PERMANENTLY
• Use available tools to delete permanently: SDelete and Secure Empty Trash, for example
• Destroy the storage device to ensure that the data is unrecoverable
• Delete the online versions
www.networkwalks.com
TWO FACTOR AUTHENTICATION
• Enable 2FA. All popular online services use two factor authentication
• They need Username / password or PIN and a second token for access:
• Physical object - credit card, ATM card, phone, or fob
• Biometric scan - fingerprint, palm print, as well as facial or voice recognition
www.networkwalks.com
DO NOT SHARE TOO MUCH ON SOCIAL MEDIA
• Share as little information as possible on social media
• Do not share information such as:
• Birth date
• Email address
• Phone number
• Check your social media settings
www.networkwalks.com
EMAIL AND WEB BROWSER PRIVACY
• Email is like sending a postcard.
• Copies of the email can be read by anyone with access.
• The email is passed among different servers
• Use the private browsing mode because it can prevent others from gathering information about your online activities.
Private mode on popular browsers:
• Microsoft Internet Explorer: InPrivate
• Google Chrome: Incognito
• Mozilla Firefox: Private tab / private window
• Safari: Private: Private browsing
www.networkwalks.com
QUIZ
Please attempt this quiz after lecture, refer to Cheatsheet, Live video lecture of instructor & other related
resources as shown by instructor during the classes:
https://networkwalks.com/protecting-your-data-privacy-cyber-security-quiz/
QUIZ
www.networkwalks.com
HOME ASSIGNMENTS
1. Install LastPass Chrome extension & complete the “Create and store strong Passwords Lab” (complete the online lab
test as well)
2. Research & make a list of other password management software alternatives similar to LastPass (use google search
or other online sources)
3. Finish all quizzes & labs that we have studied this weekend
HOW TO SUBMIT YOUR HOMEWORKS?
You can submit your homework online through any of below two methods:
1. Share the results on Facebook by tagging your instructor (@Arman Hasen), as shown in below example:
www.networkwalks.com
2. OR you can submit your Homework via email with screenshot attachments to admin at:
[email protected]DO YOU KNOW?
DO YOU KNOW?
✓ “Eva” and “Alex” are the most common names in passwords
✓ Abu Dhabi is the most commonly used city name in passwords
✓ 90% of internet users are worried about getting their passwords hacked
✓ 53% of people rely on their memory to manage passwords
✓ 51% of people use the same passwords for both work and personal accounts
✓ 57% of people who have already been scammed in phishing attacks still haven’t changed their passwords
✓ The password “123456” is still used by 23 million account holders (refer: networkwalks.com)
✓ 33% of victims have stopped doing business with companies and websites that leaked their credentials
✓ An analysis of more than 15 billion passwords reveals the average password has 8 characters or less
✓ Visit networkwalks.com for more interesting articles on Cyber Security & IT
www.networkwalks.com
Thank You