Skip to content

Instantly share code, notes, and snippets.

@loganmeetsworld
Last active April 19, 2018 03:45
Show Gist options
  • Star 4 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save loganmeetsworld/b9e2931e6b2a9aabe5e85e9f6cdac882 to your computer and use it in GitHub Desktop.
Save loganmeetsworld/b9e2931e6b2a9aabe5e85e9f6cdac882 to your computer and use it in GitHub Desktop.
A collection of cybersecurity resources for the 12/13 Make a Diff.

Make a Diff 12/13

Cybersecurity Resources

Slide 3 - Intro - Definitions

Slide 4 - Why? Consequences of Bad Online Privacy - Examples

Slide 6 - Basics

Slide 7 - Passwords

7.1 Strength

7.2 Managers

7.3 2FA

  • Always use it when available.
  • Always use an authenticator over SMS when available.

How to Get Gmail or Google Inbox 2FA

Why not use SMS for 2FA?

  • NIST (National Institute of Standards and Technology) no longer recommends it. For a complete list of recommendations: https://github.com/usnistgov/800-63-3
  • It's pretty easy to swap a SIM (the core of your phone that proves your phone is yours). If someone goes to a phone shop as you they can get the shop to issue a new SIM encoded with your phone number.
  • End of SMS-based-2-FA

Slide 8 - Social Engineering

  • Social Engineering: Attack vector relying heavily on human interaction and often involves tricking people into breaking normal security procedures.

2.1 Phishing

Slide 9 - Data

Slide 10 - Stretch Goals

Slide 11 - Reality

  1. Make a plan
  2. Make it easy
  3. Make it fun
  4. No condesending
  5. Start small
  6. Spend money
  7. Normalize it

Misc. Resources

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment