[Ipg-smz] Security training for hams

Richi Jennings richi.jennings at richi.co.uk
Wed Aug 7 10:11:42 UTC 2019


oh, and why using SMS as a second factor is pointless

// @RiCHi <http://twitter.com/RiCHi> | +44.7789.200701 | 1.408.256.0084 |
richi.uk



On Wed, Aug 7, 2019 at 11:10 AM Richi Jennings <richi.ipg at richi.uk> wrote:

> and why a "fire safe" isn't safe against fire (for backup media)
>
> // @RiCHi <http://twitter.com/RiCHi> | +44.7789.200701 | 1.408.256.0084 |
> richi.uk
>
>
>
> On Tue, Aug 6, 2019 at 1:45 AM Tom Henderson via Ipg-smz <
> ipg-smz at netpress.org> wrote:
>
>> 4. Understanding basic multi-factor authentication and why a wider ID
>> footprint is good
>>
>>    a. OS vs browser vs site vs non-browser app authentication-- who's
>> guarding what
>>
>>    b. What passwordless really means
>>
>>    c. Why unique passwords are important, since your identity and at
>> least a few of your passwords are ALREADY OWNED & NOW published no matter
>> who you think you are.
>>
>>    d. Password keepers and how they work
>>
>>    e. Why syncrhonization can kill your work across all of your platforms.
>>
>> 5. Packet Radio and why there's no encryption
>>
>>    a. Basic APRS, state of the art X.25 networking and it still works,
>> but can be impersonated so simply
>>
>>    b. Digital modes from RTTY to FT4 and they DON'T USE authentication
>> and why (Part 95)
>>
>>    c. Spectrum theft by organizations that aren't hams, yet use opaque
>> protocols that can't be identified (see eHam's treatments of the topic)
>>
>>    d. Bruce Perens' work on non-proprietery digital protocols and why
>>
>> 6. Infection vectors and how
>>
>>    a. Your firewall/router, smartphones, computers, digital appliances,
>> IoT devices
>>
>>    b. Email phishing (as below)
>>
>>    c. Portable media
>>
>>    d. browsing maladies
>>
>> 7. Backup, backup, then backup your friends and civilians, based on the
>> 3-2-1 plan
>>
>>    a. Three backups, two local, one offsite
>>
>>    b. Backup all devices (after updating them) and send one to a trusted
>> place, regularly
>>
>>    c. Never put network storage devices directly on the open internet,
>> ever, for any reason, at any time (they're bot lunch)
>>
>>    d. In the event of theft/fire/destruction, the offsite backup saves
>> your bacon (or beans, if you're vegetarian)
>>
>> 73 W9YW
>> On 8/5/19 5:57 PM, Wayne Rash via Ipg-smz wrote:
>>
>> I’m putting together a presentation on computer security for ham radio
>> operators. The club has a high proportion of very smart engineers and a
>> bunch of nuclear physicists, but as you’d expect, they know little about
>> security.
>>
>>
>>
>> So I’m putting together a list of topics.
>>
>>
>>
>>    1. Why hams are at risk (they use free software from unverified sites
>>    and they believe that Macs are invulnerable)
>>    2. What the risks are:
>>       1. Phishing
>>       2. Credential theft through social engineering
>>       3. Ransomware and how to limit the damage
>>       4. Failure to patch
>>    3. How to limit the risks
>>       1. Know how to identify a phishing email (I have examples of
>>       actual emails)
>>       2. How to identify social engineering
>>       3. How to patch
>>       4. How and why to back up your data and why a network share isn’t
>>       secure, and neither is an air gap.
>>
>>
>>
>> Any thoughts on what else I should include?
>>
>>
>>
>> Wayne Rash
>>
>> 703-425-9231
>>
>> 703-200-4915 cell
>>
>>
>>
>> --
>> Tom Henderson
>> ExtremeLabs, Inc.
>> +1 317 250 4646
>> Twitter: @extremelabs
>> Skype: extremelabsinc
>>
>> --
>> Ipg-smz mailing list
>> Ipg-smz at netpress.org
>> http://netpress.org/mailman/listinfo/ipg-smz_netpress.org
>>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://netpress.org/pipermail/ipg-smz_netpress.org/attachments/20190807/2ae7a012/attachment.html>


More information about the Ipg-smz mailing list