Inspired by the Electronic Frontier Foundation’s Surveillance Self Defense, I have put together a five part course covering privacy and security for people ranging from basic to advanced. Here are my notes and slides from the first of the classes. This covers basic topics that every computer user should be familiar with.
Everything shared on this site is made available under a creative commons share alike license so please feel free to use and modify this for your own library.
<h3> Basics of protecting yourself </h3> <p> Slides for this class can be found <a href="https://leblibrary.com/sites/default/files/Online%20Self%20Defense%20-%20White%20Belt%20Level_0.pdf">here</a> and class handouts with slides and notes can be found <a href="https://leblibrary.com/sites/default/files/Online%20Self%20Defense%20-%20White%20Belt%20Level%20-%20handout.pdf" target="_blank" rel="noopener">here</a>. </p> <h2> Assessing Your Risk </h2> <p> We face many threats online today, but have limited time and attention to address them. Performing a risk assessment will aid you in prioritizing your efforts at protection. The threat model for someone worried about the NSA spying on them is very different from someone worried about identity theft or corporations spying on them to sell their information to advertisers. Every account you have should be evaluated on the above table. The darker the red, the more vulnerable you are. For each service ask yourself, how easy is this to compromised? and how big a deal is it if it is? For example, email accounts are frequently compromised (easy to do) and have a big impact because most of your accounts link back to your email. So securing your email should be a high priority. </p> <p> <img class="alignnone size-full wp-image-214" src="http://techielibrarians.com/wp-content/uploads/2017/11/Threat-model.jpg" alt="" width="448" height="476" srcset="https://techielibrarians.com/wp-content/uploads/2017/11/Threat-model.jpg 448w, https://techielibrarians.com/wp-content/uploads/2017/11/Threat-model-282x300.jpg 282w" sizes="(max-width: 448px) 100vw, 448px" /> </p> <p> After you have prioritized your accounts you need to ask what can be done to proactively protect your account? For example, with email you can enable two factor authenication, use a strong password, and educate yourself about phishing. </p> <p> Finally, think about what can be done to limit the damage if an account is compromised. For instance, using different passwords for each account will keep one compromise from compromising everything. </p> <h3> Malware </h3> <p> Malware is a generic term for MALicious softWARE. There are many different terms for malware. Here are a few terms that you may hear: </p> <ul> <li> Virus – self replicating program that can be spread from one computer to another </li> <li> Adware – advertising software that installs itself onto your computer </li> <li> Spyware – software designed to send information about you to a company </li> <li> Scareware – a program that causes threatening messages to pop up designed to get you to buy a product </li> <li> Ransomware – software that encrypts your files and threatens to delete them unless you pay a ransom </li> <li> Backdoor – software which allows remote access to your device, allowing an attacker to control it. </li> <li> Bloatware – extra software installed by manufacturers It isn’t necessarily malicious, but sometimes can be. </li> </ul> <h3> Phishing </h3> <p> Phishing is a scam using email to get you to click on a malicious link, open an attachment, or provide information. For example, an attacker may send an email that appears to be from your bank that contains a link. Clicking the link will take you to a site that appears to be your bank, but isn’t. When you enter your password and account number, you have just given you bank information to an attacker. Spear phishing is like normal phishing, but it uses personal information about you to gain your trust. This information could come from another hacked site, public records, or a data breach of a company that had information about you. </p> <h3> Avoiding Phishing </h3> <p> The most important thing that you can do to avoid being a victim of a phishing scam are learn to identify phishing emails. Here are some things to look for: </p> <ul> <li> Emails asking for personal information – These will often appear to be from organizations that you do business with. They may say that they need to verify your information for security purposes or use other scary language. </li> <li> Emails with links to click on – Scammers often will include links that say they go to one place but actually go to another. For example if you click on the following link <a href="http://www.google.com">www.google.com</a> you will find it doesn’t take you where you expect it to. Scammers use this to direct you to their websites to harvest any information (username, password, account number, etc) that they can get you to type in. </li> <li> Emails that contain attachments are VERY dangerous – Attachments on emails can contain all kinds of malware and viruses. Simply opening the file can be enough to infect your system. This is the number one source of infection for a new type of virus called cryptolocker which encrypts all your files and threatens to delete them if you don’t pay them a ransom. </li> </ul> <p> So what can you do if you think an email is phishy? </p> <ul> <li> Never give out personal information in response to an email. If your bank emails you and says that they need to verify your information, call your bank to be sure that the email is legitimate, or go directly to their website using a web browser. Do not respond to the email at all. </li> <li> If an email asks you to click on a link, do not do it. Even if it is from someone that you know. It is possible that their email has been compromised and scammers are using it to infect other people. If you want to visit the link, go to a web browser and navigate to the site. This ensures that you are going to the site that you think you are. </li> <li> Do not download an open attachments unless they are from someone that you know and you are expecting the email. Even then make sure that you run a virus scan on the file before opening it. </li> <li> Forward any phishing emails to <a href="mailto:firstname.lastname@example.org">email@example.com</a> to report it. Also, contact whatever organization the email claims to be from to alert them of the scam. This will allow them to let others know about the scam. </li> <li> After this, delete the email. Do not respond to it. </li> </ul> <p> If you follow these steps, you should be much better protected against phishing scams. Keep in mind that these emails can be extremely convincing. </p> <h3> Updates </h3> <p> Do your updates! As software companies learn about vulnerabilities, they send out fixes. By not doing updates, you are making an attackers job easy by letting them use known exploits against you. Any software that is on your computer needs to be kept up to date. For example: </p> <ul> <li> Your operating system. <ul> <li> For windows, use windows update. You can go to <a href="http://windows.microsoft.com/en-us/windows/windows-update">http://windows.microsoft.com/en-us/windows/windows-update</a> for more information. </li> <li> For a Mac, you can access updates through the app store. For more information go to <a href="https://support.apple.com/en-us/HT201541">https://support.apple.com/en-us/HT201541</a> </li> </ul> </li> <li> Java – <a href="https://www.java.com/en/download/help/java_update.xml">https://www.java.com/en/download/help/java_update.xml</a> </li> <li> Flash – <a href="https://helpx.adobe.com/flash-player.html%20">https://helpx.adobe.com/flash-player.html </a> </li> <li> Antivirus – If your antivirus isn’t up to date, it can’t find all of the viruses out there. </li> <li> Web browsers – These directly interact with the internet and must be kept up to date. </li> </ul> <p> This isn’t a complete list by any means. Every piece of software on your computer needs to be kept up to date or it may turn into an exploitable vulnerability. By using a applications auto-update features, you get the protection without the effort. </p> <h3> Antivirus </h3> <p> If your computer is connected to the internet at all, you need antivirus. Antivirus programs aren’t magic pills that eliminate any threat, but they are a powerful tool for ensuring your safety. When looking at Antivirus programs consider the following factors: </p> <ul> <li> Features – does it provide features like scanning all downloads? What about email attachments? </li> <li> Ease of use – are you comfortable with the design and do you find it easy to navigate? </li> <li> System resources – especially for older computers, antivirus programs can be resource hogs. Your computer only has so much processing power and memory available. If your antivirus program is taking it all, it can really impact your computers speed. </li> <li> Cost – Antivirus programs range from free to hundereds of dollars. Choose one that fits your budget, but don’t overlook free offering just because they are free. Sometimes they perform better than expensive alternatives. </li> </ul> <p> To help pick out an anti-virus program, check out the following sites: </p> <ul> <li> <a href="http://www.av-comparatives.org/">http://www.av-comparatives.org/</a> </li> <li> <a href="https://www.av-test.org/">https://www.av-test.org</a> </li> </ul> <p> These organizations test antivirus programs and rank them based on their performance and are extremely helpful for finding the best product for you. </p> <h3> <a id="passwords" name="passwords"></a>Passwords </h3> <p> Passwords are absolutely essential to good computer security. Using weak passwords and reusing passwords are some of the most common mistakes that people make. Unfortunately, these mistakes make any potential breach, such as hacking someone’s email, much more serious. If you reuse passwords, and there is a VERY good chance you do, then getting your password for one thing often means they have your password for a lot of other things too. </p> <p> <img src="http://imgs.xkcd.com/comics/password_strength.png" alt="Through 20 years of effort, we've successfully trained everyone to use passwords that are hard for humans to remember, but easy for computers to guess." width="740" height="601" /> </p> <p> Img Credit: <a href="https://xkcd.com/936/">https://xkcd.com/936/</a> </p> <p> Here are two points to remember about passwords. </p> <ol> <li> Long passwords are strong passwords. Adding length to a password makes it much harder to guess than adding complexity. The only caveat here is that choosing a very long dictionary word doesn’t help at all. Hackers have files with millions of words and variations on words that their computers can try very quickly to crack a password. This brings us to our second point. </li> <li> Passphrases are better than passwords. Choose three to four unrelated (Important!) words and put them together. Make up a story using these words to help yourself remember them. If the site you are setting up a password for doesn’t let you use spaces, use dashes or underscores or cram allthewordstogether into one long non-dictionary word. This strategy exponentially increases the difficulty of cracking a password while making it much easier to remember than what we might normally think of as a secure password. </li> </ol> <h4> Coming up with a good passphrase </h4> <p> It is important to come up with random words for your passphrase. Here are a couple of ways to accomplish that. </p> <ul> <li> <a href="https://xkpasswd.net/s/" target="_blank" rel="noopener">XKpasswd.net</a> – This site is based on the above XKCD comic. It will generate passphrases for you and has a lot of customization options. However, you are trusting a third party to come up with passphrases for you. The site also includes the perl code, so if you are technically inclined you can audit the code and run it on your own computer. This is a more secure way to do things. </li> <li> <a href="http://world.std.com/~reinhold/diceware.html">Diceware</a> – Diceware is an analog way to generate secure passphrases. Basically it includes a huge list of words, all of which have a 5 digit number assigned. You simply roll a dice 5 times to get a five digit number to get your first word and repeat however many times you would like. This site also contains a ton of good information about strong passwords. </li> </ul> <h4> Safely Storing Passwords </h4> <p> The reason that people reuse passwords is that there are simply so many passwords required in modern daily life. It is completely impractical to remember them all. Here are a some methods for remembering passwords so that you do not have to reuse them. </p> <h5> Write it down </h5> <p> Sounds crazy right? How insecure is that? Well, it is actually better than just using the same password for everything. </p> <p> The advantages of this are: </p> <ol> <li> Simplicity – Everyone has access to a pencil and paper </li> <li> Secure from hackers – I have never heard of anyone hacking a notebook yet </li> </ol> <p> However, there are som real disadvantages too: </p> <ol> <li> Hard to keep up to date – If you try to keep it up to date, you can quickly end up with a jumbled mess </li> <li> Must be kept phyically secure – Keeping passwords in your wallet or purse means that if you leave it on the bus or at a resteraunt, whoever ends up with it now has access to everything. If you keep your passwords at your computer or someone easily visible, casual observation can get your password. </li> <li> Not very convenient – To always have your passwords with you means that you have to risk losing them. To keep them physically secure means that you may not have them when needed. </li> </ol> <p> This is definitely not an ideal method. It has significant drawbacks, but will at least allow you to not reuse passwords. </p> <h5> Password Vault </h5> <p> A password Vault is a computer program that saves your passwords for you in an encrypted format. You use a strong master password to unlock the vault. Examples are <a href="https://www.keepassx.org/">KeePassX</a> and <a href="https://lastpass.com/">LastPass</a>. Many password vaults have other nice features like password generators and browser plugins which allow them to automatically type in your username and password. Some even have mobile apps and work on smartphones. A note of caution. If you are choosing a password vault that offers a cloud sync option to keep your passwords synced between devices, make sure that it offers “zero knowledge” storage. This means that you are the only one who can decrypt your passwords. Employees at the company can’t, and hackers who manage to break into the company’s database can’t. </p> <p> Advantages: </p> <ol> <li> Very convenient </li> <li> Very secure (security varies by which program you are using, read reviews and pick a good one) </li> <li> Often have nice added features such as password generators </li> </ol> <p> Disadvantages </p> <ol> <li> Requires a program to be downloaded onto your computer (or tablet or smartphone) </li> <li> Keeping databases synced between devices can be challenging </li> <li> Can be challenging on mobile devices </li> </ol> <p> Password Vaults are a great tool and I highly recommend them. They take a little getting used to, and may seem a bit inconvenient at first, but you will quickly get used to them and there are huge security benefits to being able to have strong, unique passwords for every account you have. </p> <h5> Two Factor Authentication </h5> <p> When authenticating your identity (which is really what passwords are all about) there are a number of ways (factors) that can be used. You can rely on something you know (a password, pin number, secret question, etc), something you have (texting a code to your cell phone or emailing you a code, requiring a hardware key such as a <a href="https://www.yubico.com/">yubikey</a>, etc) or something you are (facial recognition, thumbprint, etc). Most account use passwords as a single factor for authentication. However, many sites are now moving to using two factor authentication. This typically means texting you a code when you try to sign in, or in the case of google, having a smart phone app that generates codes that are needed to login. This ensures that even if someone steals your password, they can’t get into your account without also having your cell phone. </p> <p> Advantages: </p> <ol> <li> Extremely secure </li> <li> Normally very convenient </li> </ol> <p> Disadvantages: </p> <ol> <li> Many sites don’t support two factor authentication </li> <li> Normally requires a smart phone although there are other types of two factor authentication </li> </ol> <p> If it is available, two factor authentication is by far the best and most secure way to set up your accounts </p> <h3> Backups </h3> <p> Backups protect important information against malicious acts (such as ransomware), accidents (hard drive dies or computer is lost), and disasters (home burns down). The 3-2-1 ensures that your backups are protected against all of these. Backup anything that you can’t be easily replaced on your computer. </p> <p> <strong>3</strong> copies of your data ensures redunancy. A virus or hardware failure won’t wipe out your data.<strong>2</strong> different types of media means you aren’t storing both copies on the same hard drive. Having one copy on your computer and one copy on an external hard drive or thumb drive means that your computer dying or getting stolen won’t mean you lose everything.<strong>1</strong> copy offsite protects against disasters such as your house burning down or getting flooded. One copy being physically separated means you have a safe copy regardless. Cloud backups are a popular way to get an offsite backup. </p> <p> Compare Cloud backup software at: <a href="https://en.wikipedia.org/wiki/Comparison_of_online_backup_services">https://en.wikipedia.org/wiki/Comparison_of_online_backup_services</a> </p> </div>