<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" class=""><div>Wow. This is hella thorough, guys.</div><div><br class=""></div><div>Carol</div><div><br class=""><blockquote type="cite" class=""><br class="Apple-interchange-newline"><div class="">
<meta http-equiv="Content-Type" content="text/html;
charset=windows-1252" class="">
<div text="#000000" bgcolor="#FFFFFF" class=""><p class="">4. Understanding basic multi-factor authentication and why a
wider ID footprint is good</p><p class=""> a. OS vs browser vs site vs non-browser app authentication--
who's guarding what</p><p class=""> b. What passwordless really means</p><p class=""> c. Why unique passwords are important, since your identity and
at least a few of your passwords are ALREADY OWNED & NOW
published no matter who you think you are.<br class="">
</p><p class=""> d. Password keepers and how they work</p><p class=""> e. Why syncrhonization can kill your work across all of your
platforms.</p><p class="">5. Packet Radio and why there's no encryption</p><p class=""> a. Basic APRS, state of the art X.25 networking and it still
works, but can be impersonated so simply <br class="">
</p><p class=""> b. Digital modes from RTTY to FT4 and they DON'T USE
authentication and why (Part 95)</p><p class=""> c. Spectrum theft by organizations that aren't hams, yet use
opaque protocols that can't be identified (see eHam's treatments
of the topic)</p><p class=""> d. Bruce Perens' work on non-proprietery digital protocols and
why</p><p class="">6. Infection vectors and how</p><p class=""> a. Your firewall/router, smartphones, computers, digital
appliances, IoT devices</p><p class=""> b. Email phishing (as below)</p><p class=""> c. Portable media</p><p class=""> d. browsing maladies</p><p class="">7. Backup, backup, then backup your friends and civilians, based
on the 3-2-1 plan</p><p class=""> a. Three backups, two local, one offsite</p><p class=""> b. Backup all devices (after updating them) and send one to a
trusted place, regularly</p><p class=""> c. Never put network storage devices directly on the open
internet, ever, for any reason, at any time (they're bot lunch)</p><p class=""> d. In the event of theft/fire/destruction, the offsite backup
saves your bacon (or beans, if you're vegetarian)</p><p class="">73 W9YW<br class="">
</p>
<div class="moz-cite-prefix">On 8/5/19 5:57 PM, Wayne Rash via
Ipg-smz wrote:<br class="">
</div>
<blockquote type="cite" cite="mid:000001d54bd8$ca26feb0$5e74fc10$@mindspring.com" class="">
<meta name="Generator" content="Microsoft Word 15 (filtered
medium)" class="">
<div class="WordSection1"><p class="MsoNormal">I’m putting together a presentation on
computer security for ham radio operators. The club has a high
proportion of very smart engineers and a bunch of nuclear
physicists, but as you’d expect, they know little about
security. </p><div class=""> <br class="webkit-block-placeholder"></div><p class="MsoNormal">So I’m putting together a list of topics.</p><div class=""> <br class="webkit-block-placeholder"></div>
<ol start="1" type="1" class="">
<li class="MsoListParagraph">Why hams are at risk (they use
free software from unverified sites and they believe that
Macs are invulnerable)</li>
<li class="MsoListParagraph">What the risks are:</li>
<ol start="1" type="a" class="">
<li class="MsoListParagraph">Phishing</li>
<li class="MsoListParagraph">Credential theft through social
engineering</li>
<li class="MsoListParagraph">Ransomware and how to limit the
damage</li>
<li class="MsoListParagraph">Failure to patch</li>
</ol>
<li class="MsoListParagraph">How to limit the risks</li>
<ol start="1" type="a" class="">
<li class="MsoListParagraph">Know how to identify a phishing
email (I have examples of actual emails)</li>
<li class="MsoListParagraph">How to identify social
engineering</li>
<li class="MsoListParagraph">How to patch</li>
<li class="MsoListParagraph">How and why to back up your
data and why a network share isn’t secure, and neither is
an air gap.</li>
</ol>
</ol><div class=""> <br class="webkit-block-placeholder"></div><p class="MsoNormal">Any thoughts on what else I should include?</p><div class=""> <br class="webkit-block-placeholder"></div><p class="MsoNormal">Wayne Rash</p><p class="MsoNormal">703-425-9231</p><p class="MsoNormal">703-200-4915 cell</p><div class=""> <br class="webkit-block-placeholder"></div>
</div>
<br class="">
<fieldset class="mimeAttachmentHeader"></fieldset>
</blockquote>
<pre class="moz-signature" cols="72">--
Tom Henderson
ExtremeLabs, Inc.
+1 317 250 4646
Twitter: @extremelabs
Skype: extremelabsinc</pre>
</div>
-- <br class="">Ipg-smz mailing list<br class=""><a href="mailto:Ipg-smz@netpress.org" class="">Ipg-smz@netpress.org</a><br class="">http://netpress.org/mailman/listinfo/ipg-smz_netpress.org<br class=""></div></blockquote></div><br class=""></body></html>