End user security esentials
Password security
- Long (11 chars with upper case + 2 digits + 1 special character)
- You may use a passphrase, getting the initials of each word.
- Limit password retry and reuse.
- Avoid patterns.
Social engineering
- physical person (be careful about tailgating).
- remote person: phishing (+ spear phishing + whaling) → use “hover to discover”.
Physical security
- Shoulder surfing → use screen filer.
- Lock computer → have lock on inactivity + password or pin.
- Physically block movement of computer → use Kensington lock.
- Locate my device software in case it goes missing → use remote wipe in case of theft.
- Clean workspace criteria.
Data disposal
- Keep data it while it is relevant (retention period), or in case of litigation.
- Eliminate data when it is no longer relevant, permanent way, to avoid liability.
Safe Networks
- Check package root: Do you know the nodes?
1
traceroute www.wikipedia.org
- Careful with free wifi (e.g. airports), which can be compromised hotspots (there may be several networks with the same name).
- Monitor antennas.
1
sudo wavemon
- Use certificates in ofice.
- Monitor antennas.
- Careful with celullar networks (they are way more expensive to fake).
- VPN: convert untrusted network into a reliable one via tunneling:
- generate encrypted data.
- hide IP.
- VPN: convert untrusted network into a reliable one via tunneling:
Malicious software
- Run antimalware software (check Virustotal).