Network Security-Teachers.key



Network Security-Teachers.key
NewNet 66
Network Security for Teachers
The Quick Course
NewNet 66
Network Security for Teachers
--* Warning *-The information you will see in this presentation is actual data
pulled from school districts on the NewNet 66 network.
This information is NOT designed to scare you or to detour
you from using the Internet as an educational tool but is
designed to inform you of risks and other exploits which are
real and can cause you frustration.
Knowledge about exploits on the Internet and following a few
basic rules will make you more productive in the classroom,
increase your productivity using technology, and protect your
network from the bad guys.
NewNet 66
Network Security for Teachers
Who is NewNet 66?
~ NewNet 66 is an Interlocal Cooperative of K12 schools.
~ Based out of Claremore Oklahoma.
~ We provide Technology/Networking Services to K12 schools.
* Email
* Web Hosting
* Network design
* Network security
* Network monitoring
* Training
~ A lot of Geek Speak Stuff!
In short, NewNet 66 remains very transparent to most
administrators, teachers, and students.
We sit quietly in the background and watch over you (our schools)
insuring your Internet safety.
NewNet 66
Network Security for Teachers
Network Security in K12
Network security for your school is very much like security for
your home. To keep the bad guys out of your home you do things
like lock the doors, turn on lights when your away, or set the
alarm system if you have one.
Questions you might have (discussion):
~ What is a Network?
~ What the heck is Network Security?
~ Why should I care about Network Security?
~ Who is responsible for our school’s Network Security?
~ What is Spyware?
~ What are Viruses and Worms?
~ What is Phishing?
~ What are Trojans, Backdoors, and Key-loggers?
~ How does all of the above affect me? All I want to do is teach!
Network Security for Teachers
NewNet 66
Network Security in K12
Who is responsible for keeping your
school’s network secure?
Everyone is Responsible!!!
am E
NewNet 66
Network Security for Teachers
Spam - What is it? Why do I get it?
• Spam, by simple definition, is unwanted email or email that is
sent to you unsolicited.
• Over 85% of all email on the Internet is Spam.
• Spammers send this type of email because it’s profitable.
• Spam is also a source for worms, viruses, spyware, trojans, and
other network attacks.
• Stopping Spam is becoming more difficult every day. The
spammers are creative and often know you better than you
know yourself.
Network Security for Teachers
NewNet 66
Spam Example
From: [email protected]
Subject: [***SPAM*** Score/Req: 23.7/4.7] Order
status, mustache monkey
Date: July 21, 2006 7:51:52 AM CDT
[email protected]
Even if you have no erectin problems SOFT CIA2LIS
would help you to make BETTER SEQX MORE OFTEN!
and to bring unimagnable plesure to her.
Just disolve half a pil under your tongue
and get ready for action in 15 minutes.
The tests showed that the majority of men
after taking this medic ation were able to have
PERFECT ER5ECTION during 36 hours!
Note the
Email servers
for keywords
but don’t know
how to spell.
Network Security for Teachers
NewNet 66
Phishing 1
Social Engineering
Phishing (fishing)
Watch Out For The Sharks
Phishing (a deliberate misspelling of the word 'fishing') is a specific form of
cyber crime. Phishing tricks computer users into disclosing personal details such
as usernames, passwords, PIN numbers, credit card numbers etc, which
are linked to bank accounts or on-line shopping accounts. These details are
then used to steal money. So phishing is fraud: first your personal information
and then your money...
As you'd expect, phishers target organizations that handle high volume financial
transactions online. In the last 24 months, customers of nearly all major banks
(BOK, Barclays, Citibank, Halifax, HSBC, Lloyds TSB and MBNA, NatWest)
have all been targeted by phishers. However, it's not only banking customers
who are at risk - Amazon, AOL, BestBuy, eBay, MSN, PayPal and Yahoo
have all been targeted by phishing scams.
Network Security for Teachers
NewNet 66
Phishing 2
Social Engineering
Phishing (fishing)
How it Works
How Phishing works: Phishing begins when a crook creates an email that looks like it was sent from a
reputable company. The emails that are sent look very real -- down to the smallest detail. They are
created by professionals that are in the business of stealing your information and turning it into cash.
The organizations that these emails purport to be from are companies such as CitiBank, eBay, Go
Daddy, Bank of Oklahoma, PayPal and many others.
What happens to your information once it is stolen?
So what happens to this information once it is provided to the Phishing crooks? Typically, it is
immediately spirited someplace overseas, quite often (but not necessarily) to third world countries.
Once there, the crooks will begin using the information (perhaps charging your credit card, perhaps
applying for more bogus cards or loans, perhaps debiting money out of your checking account). This
typically takes place within a few hours. In the meantime, you have no idea that this is taking place.
When it comes to Phishing, assume you are on your own!
You also can’t rely on the authorities to come to your rescue. If you’re a victim, you should report the
crime; however, because most of it is across international borders, and because the volume of it is
overwhelming -- don’t look for any help from that end. So the sad truth here is that you’re pretty much
on your own. You’ve simply got to provide your own protection.
Network Security for Teachers
NewNet 66
Phishing 3
Social Engineering
Phishing (fishing)
How to detect Phishing
How to detect Phishing.
So how do you tell if an email being sent to you is a Phishing attempt? Fortunately, there are a
number of rules you can follow and they are very simple:
1. Assume any email requesting that you verify your credit card, password or other personal information
-- is Phishing. You need to be disciplined about this, because the crooks will use all sorts of 'alarming'
reasons to get your data. They’ll say someone else accessed your account, or there’s been suspicious
activity in your account. Ignore all of this. If you have to mitigate the concern, then do so by following
the next rule.
2. Do not visit a company’s website by clicking on the link in the email. Instead, simply type that
company’s web address into your browser. That way, you’re much more assured of going to the
company’s real website, and not a sham website setup by some crook.
3. If you receive an email that simply does not contain your name, but instead refers to you as "Dear
Customer", or doesn’t refer to you at all –- you should assume that it’s Phishing.
4. Beware of any email that asks you for: Credit or Debit card numbers - Driver's License numbers Passwords - Bank Account numbers - Social Security numbers - Your Full Name - Birth Date Email addresses.
NewNet 66
Network Security for Teachers
Phishing BOK Example page 1
From: [email protected] <[email protected]>
Reply-To: [email protected]
Date: Fri, 24 Jun 2005 14:23:43 +0200 (CEST)
To: [email protected]
Subject: The unusual login attempts to your personal account!
Dear Bank Of Oklahoma Customer!
We recently noticed several attempts to log in to your personal account from a foreign IP address and we have
reasons to believe that your account was used by a third party without your authorization. If you recently accessed
your account while traveling, the unusual login attempts may have been initiated by you.
The login attempt was made from:
IP address:
ISP Host:
After three unsuccessful attempts to access your account, your personal Online Profile has been locked. This has
been done to secure your accounts and to protect your private information. Bank Of Oklahoma is trying to make sure
that your online transactions are secure.
You must unlock your profile by going to: <>
If you should have any additional questions or concerns, please contact
Customer Service at:
[email protected] <mailto:[email protected]>
Thank You for using Bank Of Oklahoma !
©2005 Bank Of Oklahoma Corporation. All rights reserved. Bank Of Oklahoma N.A. Member FDIC.
NewNet 66
Phishing BOK Example page 2
Network Security for Teachers
NewNet 66
Network Security for Teachers
Holiday Phishing Example 1
This was spammed
out via email
Christmas Eve of
2007 to millions of
If you were to take
the bait and click, you
immediately get
infected with EmailWorm.Win32.Zhelatin
There is nothing
wrong with the email
itself but when you
click the link it takes
you to servers located
in many different
countries which infect
your computer.
NewNet 66
Network Security for Teachers
Holiday Phishing Example 2
Original email which looks very
When you look inside the email
you see where it really came from. belongs to a DSL
user in Warsaw Poland.
NewNet 66
Network Security for Teachers
How do Viruses/Worms/Spyware
Impact Your School?
• A really bad virus/worm can bring down your entire network.
• Increase Internet bandwidth consumption which affects all
users on the network. (slow network/Internet access)
• Stop the process of recording student information.
• Stop the process of delivering information from local servers
to students and staff.
• Turn your school into a large Spam site resulting in being
“blacklisted” on the Internet. (your email stops working)
• Destroy critical information like student data, and financial
• With SDE mandating SIF compliance your network must be
operational 24X7.
• Frustrate you to the point of *!*%$.
NewNet 66
Network Security for Teachers
The Number One Security Threat Today
• Spyware, Trojans, and Keyloggers are the number one threat
today. All are strongly related to Identity Theft.
• According to security company CipherTrust, more than 180,000
PCs are turned into zombies every day, and that figure is
continually rising.
• Users are rarely aware that their machines have been hijacked.
The network continues to work, albeit more slowly at times, and
users have no control over the secret tasks it is being asked to
• Most analysts forecast that phishing attacks will continue to grow
in number and in sophistication
NewNet 66
Bad Guy
Bot Herder
NewNet 66
How Bad Guys Work
The Mechanics
Bad Guys
ets a
2. G
or K
d Gu
1. G
ata t
its D
3. Tra
4. Withdraw $$$
Step 1. A workstation at the school
goes to the Internet doing research or
possibly checks 3rd party email.
Step 2. A Backdoor, Keylogger, or
Spyware is downloaded to the
School’s Workstation and begins
capturing personal information.
Step 3. The Backdoor, Keylogger or
Spyware transmits banking
information to the Bad Guys. At this
point the Bad Guys Own You!
Step 4. The Bad Guys withdraw
$10.00 from your bank account.
The Bad Guys might make 10,000
transactions per month on
10,000 different bank accounts.
Do the Math!
NewNet 66
Network Security for Teachers
Calculate The Cost
How Much Do Virus/Worm/SpyWare Attacks
Cost Your District?
• How many hours does your technical support staff spend cleaning
just one infected workstation? If 20 get infected do the math.
• How many hours of staff productivity loss can one bad worm cause?
• If your network has infected PCs, can teachers post grades to the
Average time to clean one PC = 45 minutes
20 PCs * 45 minutes = 15 hours
If you had to clean 300 PCs in one year....
That’s 225 hours or 28 - 8 hour working days
NewNet 66 In The News
Network Security for Teachers
NewNet 66
Bandwidth Utilization
Your Connection to the Internet
Normal Bandwidth
Very High Bandwidth Utilization
Due to a Worm
Network Security for Teachers
Network Security for Teachers
NewNet 66
Is it private? Is your password being seen? Who reads your email?
Email - Is the most widely used Internet technology today. It is also the most
Is email you send or receive private? Absolutely Not! The rule of thumb is:
Don’t email passwords, personal information or anything else you don’t want
others to read!
Email passwords need to be secure. DO NOT use family names, school names,
or birth dates as passwords. The hackers can figure this out very quickly and gain
access to your email account.
Why can’t I get to my Gmail or Yahoo email account from school? Many
schools block 3rd party email for security reasons. Viruses and Worms can come
into your network via Yahoo mail and other 3rd party email. It’s not worth the risk.
Just one infected email can cause your entire school network to fail!
Network Security for Teachers
NewNet 66
Email Etiquette
• Take care with rich text and HTML messages. (Use plain text format)
• Do not write in CAPITALS. (This is considered shouting.)
• Don't reply to spam. (You just confirmed your email address to the
bad guys.)
• Use proper spelling, grammar & punctuation. (Makes you look good)
• Do not use email to discuss confidential information. (Remember,
email is not private)
Do not attach unnecessary files. (Smileys, animated gif files etc.)
Don't forward virus hoaxes and chain letters.
Avoid long sentences and be concise.
Read the email before you send it.
Make sure email addresses are correct. (Make sure your address book
and groups are accurate!!!)
Network Security for Teachers
NewNet 66
Passwords (1)
Password Strategies To Avoid
Creating secure passwords is one significant step in maintaining password
security. Below are password strategies to avoid.
~ Avoid sequences or repeated characters. "12345678," "222222,"
"abcdefg," or adjacent letters on your keyboard do not help make secure
~ Avoid your login name. Any part of your name, birthday, social security
number, or similar information for your loved ones constitutes a bad
password choice. This is one of the first things criminals will try. Do NOT
use the school’s mascot name.
~ Don’t write down your password on a sticky note and place it on your
computer monitor.
~ Do not share your password with anyone.
Network Security for Teachers
NewNet 66
Passwords (2)
How To Create Strong Passwords
Creating a strong password can be a simple process and easy to remember.
When creating your password use at least 8 characters and a combination
of lower case letters, upper case letters, numbers, and special characters
like #$%.
~ Pick a base word to work from. Let’s say you like football.
~ Football meets the 8 character criteria but has no special characters. To
make it more secure it might look like [email protected]!
Chandler could look like - cHand1990$%
Kent could look like
- &[email protected]@
Roger could look like
- [email protected]
Password strength check:
Network Security for Teachers
NewNet 66
Guide Lines
The Top Eight Things You Can Do.
1. Update your Antivirus software on your workstation daily. (this may be done automatically
depending on how updates are implemented in your district)
2. Make sure you update your Windows operating system monthly or when updates are
available. (apply the patches)
3. Watch out for strange email or anything that does not fit what you would perceive as “normal.”
4. Delete any email you are not sure of.
5. Don’t download software that is not authorized by your school district.
6. Do not share passwords with anyone!!! Don’t write down your password on a sticky note and
post it on your monitor.
7. If you bring files electronically from home via a CD, DVD, Thumb Drive, or a Floppy Disk, then
have it scanned for Viruses, Worms, and Spyware BEFORE you insert it into your workstation.
8. Use common sense! If you observe something you consider to be out of the ordinary, report it.
NewNet 66
Servage Hosting
Im Grund 9
24939 Flensburg
abuse-mailbox:[email protected]
RIPE # Filtered
Servage Hostmaster
Im Grund 9
24939 Flensburg
Network Security for Teachers
Interesting Tidbits
This Firewall Log shows a person from Germany
trying to gain access to the Sperry Public Schools
network. This Bad Guy is scanning for an “open
door” in the network.
Network Security for Teachers
NewNet 66
Interesting Tidbits
Collinsville Firewall Events
Haifa Israel - Omega Building
Dasman, Kuwait
NewNet 66
Network Security for Teachers
Chandler Public Schools has a Firewall/Intrusion Detection device located at the
hub site. Below are events which took place Sunday, January 20 between
05:41 and 05:44 a.m. Below is a small sample of the Intrusion log.
Vortec inc.
Orlando, Florida
Pushechnaya st.
Moscow, Russia
NewNet 66
This presentation is available on our web site.
Network Security for Teachers