Skip to content

Instantly share code, notes, and snippets.

What would you like to do?
A collection of cybersecurity resources for the 12/13 Make a Diff.

Make a Diff 12/13

Cybersecurity Resources

Slide 3 - Intro - Definitions

Slide 4 - Why? Consequences of Bad Online Privacy - Examples

Slide 6 - Basics

Slide 7 - Passwords

7.1 Strength

7.2 Managers

7.3 2FA

  • Always use it when available.
  • Always use an authenticator over SMS when available.

How to Get Gmail or Google Inbox 2FA

Why not use SMS for 2FA?

  • NIST (National Institute of Standards and Technology) no longer recommends it. For a complete list of recommendations:
  • It's pretty easy to swap a SIM (the core of your phone that proves your phone is yours). If someone goes to a phone shop as you they can get the shop to issue a new SIM encoded with your phone number.
  • End of SMS-based-2-FA

Slide 8 - Social Engineering

  • Social Engineering: Attack vector relying heavily on human interaction and often involves tricking people into breaking normal security procedures.

2.1 Phishing

Slide 9 - Data

Slide 10 - Stretch Goals

Slide 11 - Reality

  1. Make a plan
  2. Make it easy
  3. Make it fun
  4. No condesending
  5. Start small
  6. Spend money
  7. Normalize it

Misc. Resources

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment