[Ipg-smz] Security training for hams
Carol Pinchefsky
will_edit_for_food at mac.com
Tue Aug 6 20:38:25 UTC 2019
Wow. This is hella thorough, guys.
Carol
>
> 4. Understanding basic multi-factor authentication and why a wider ID footprint is good
>
> a. OS vs browser vs site vs non-browser app authentication-- who's guarding what
>
> b. What passwordless really means
>
> c. Why unique passwords are important, since your identity and at least a few of your passwords are ALREADY OWNED & NOW published no matter who you think you are.
>
> d. Password keepers and how they work
>
> e. Why syncrhonization can kill your work across all of your platforms.
>
> 5. Packet Radio and why there's no encryption
>
> a. Basic APRS, state of the art X.25 networking and it still works, but can be impersonated so simply
>
> b. Digital modes from RTTY to FT4 and they DON'T USE authentication and why (Part 95)
>
> c. Spectrum theft by organizations that aren't hams, yet use opaque protocols that can't be identified (see eHam's treatments of the topic)
>
> d. Bruce Perens' work on non-proprietery digital protocols and why
>
> 6. Infection vectors and how
>
> a. Your firewall/router, smartphones, computers, digital appliances, IoT devices
>
> b. Email phishing (as below)
>
> c. Portable media
>
> d. browsing maladies
>
> 7. Backup, backup, then backup your friends and civilians, based on the 3-2-1 plan
>
> a. Three backups, two local, one offsite
>
> b. Backup all devices (after updating them) and send one to a trusted place, regularly
>
> c. Never put network storage devices directly on the open internet, ever, for any reason, at any time (they're bot lunch)
>
> d. In the event of theft/fire/destruction, the offsite backup saves your bacon (or beans, if you're vegetarian)
>
> 73 W9YW
>
> On 8/5/19 5:57 PM, Wayne Rash via Ipg-smz wrote:
>> I’m putting together a presentation on computer security for ham radio operators. The club has a high proportion of very smart engineers and a bunch of nuclear physicists, but as you’d expect, they know little about security.
>>
>>
>> So I’m putting together a list of topics.
>>
>>
>> Why hams are at risk (they use free software from unverified sites and they believe that Macs are invulnerable)
>> What the risks are:
>> Phishing
>> Credential theft through social engineering
>> Ransomware and how to limit the damage
>> Failure to patch
>> How to limit the risks
>> Know how to identify a phishing email (I have examples of actual emails)
>> How to identify social engineering
>> How to patch
>> How and why to back up your data and why a network share isn’t secure, and neither is an air gap.
>>
>> Any thoughts on what else I should include?
>>
>>
>> Wayne Rash
>>
>> 703-425-9231
>>
>> 703-200-4915 cell
>>
>>
>>
>>
> --
> Tom Henderson
> ExtremeLabs, Inc.
> +1 317 250 4646
> Twitter: @extremelabs
> Skype: extremelabsinc
> --
> Ipg-smz mailing list
> Ipg-smz at netpress.org
> http://netpress.org/mailman/listinfo/ipg-smz_netpress.org
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://netpress.org/pipermail/ipg-smz_netpress.org/attachments/20190806/2a9b2ebd/attachment-0001.html>
More information about the Ipg-smz
mailing list