410 likes | 624 Views
Information Systems: A Manager ’ s Guide to Harnessing Technology By John Gallaugher.
E N D
Information Systems: A Manager’s Guide to Harnessing TechnologyBy John Gallaugher
This work is licensed under the Creative Commons Attribution-Noncommercial-Share Alike 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/3.0/or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA
Chapter 13Information Security: Barbarians at the Gateway (and Just About Everywhere Else)
Learning Objectives • Recognize that information security breaches are on the rise • Understand the potentially damaging impact of security breaches • Recognize that information security must be made a top organizational priority
Learning Objectives • Understand the source and motivation of those initiating information security attacks • Relate examples of various infiltrations in a way that helps raise organizational awareness of threats • Recognize the potential entry points for security compromise
Learning Objectives • Understand infiltration techniques such as social engineering, phishing, malware, Web site compromises (such as SQL injection), and more • Identify various methods and techniques to thwart infiltration • Identify critical steps to improve your individual and organizational information security
Learning Objectives • Be a tips, tricks, and techniques advocate, helping make your friends, family, colleagues, and organization more secure • Recognize the major information security issues that organizations face, as well as the resources, methods, and approaches that can help make firms more secure
Introduction • Business establishments are increasingly under risk of information security threats • Network in TJX retail store was infiltrated via an insecure Wi-Fi base station • 45.7 million credit and debit card numbers were stolen • Driver’s licenses and other private information pilfered from 450,000 customers • TJX suffered under settlement costs and court-imposed punitive action to the tune of $150 million
Introduction • Factors that amplified severity of TJX security breach are: • Personnel betrayal: An alleged FBI informant used insider information to mastermind the attacks • Technology lapse: TJX used WEP, an insecure wireless security technology • Procedural gaffe: TJX had received an extension on the rollout of mechanisms that might have discovered and plugged the hole before the hackers got in
Introduction • Information security must be a top organizational priority • Information security isn’t just a technology problem; a host of personnel and procedural factors can create and amplify a firm’s vulnerability • A constant vigilance regarding security needs to be part of individual skill sets and a key component of organizations’ culture
Motivations for Criminals • Any Internet-connected network is susceptible to security attacks • Motivation for information security-related crimes vary widely • Account theft and illegal funds transfer • Some hackers steal data for personal use • Others sell stolen data to fraudsters who use it to buy (then resell) goods or create false accounts via identity theft • Stealing personal or financial data
Motivations for Criminals • Compromising computing assets for use in other crimes such as: • Sending spam from thousands of difficult-to-shut-down accounts • Launching tough-to-track click-fraud efforts • Distributed denial of service (DDoS) attacks • Extortionists might leverage botnets or hacked data to demand payment to avoid retribution
Motivations for Criminals • Corporate espionage might be performed by insiders, rivals, or even foreign governments • Cyberwarfare • Devastating technology disruptions by terrorists that cut off power to millions • Terrorism • Compromising a key component in an oil refinery, force it to overheat, and cause an explosion • Taking out key components of vulnerable national power grids
Motivations for Criminals • Pranks involving setting off rumors that could have widespread repercussions • Protest hacking (hacktivism) • Revenge for disgruntled employees
Response to Crime • Law enforcement agencies dealing with computer crime are increasingly outnumbered, outskilled, and underfunded • Technically weak personnel trained in a prior era’s crime fighting techniques • Governments rarely match pay scale and stock bonuses offered by private industry
Understanding Vulnerabilities • A wide majority of security threats is posed by insiders • Rogue employees can steal secrets, install malware, or hold a firm hostage • Other insider threats to information security can come from • Contract employees • Temporary staffers • Outsourcing key infrastructure components • Partner firms such as clients and technology providers
Social Engineering • Con games trick employees into revealing information or performing other tasks that compromise a firm • Examples of social engineering methods include: • Baiting someone to add, deny, or clarify information that can help an attacker • Using harassment, guilt, or intimidation • Social media sites are a major source of information for social engineering scammers
Phishing • Phishing refers to cons executed through technology • The goal is to leverage reputation of a trusted firm or friend to trick a victim into performing an action or revealing information • Requests to reset passwords • Requests to update information • Requests to download malware • Spear phishing attacks specifically target a given organization or group of users
Passwords • Most users employ inefficient and insecure password systems: • Using the same password for different accounts • Making only minor tweaks in passwords • Writing passwords down • Saving passwords in personal e-mail accounts or on unencrypted hard drives • Challenge questions offered by many sites to automate password distribution and resets offer flimsy protection
Passwords • Any firm not changing default accounts and passwords sold with any software purchased risks having an open door • Users setting systems for open access leave their firms vulnerable to attacks
Technology Threats - Malware • Malware threatens any connected system running software such as embedded devices and a firm’s networking equipment • Methods of infection include: • Viruses • Worms • Trojans
Technology Threats - Goals of Malware • Botnets or zombie networks • Malicious adware • Spyware • Keylogger • Screen capture • Blended threats
Technology Threats - Compromising Web Sites • SQL injection technique exploits sloppy programming practices that do not validate user input • Problematic because of absence of deployed piece of security software that can protect a firm • Firms have to check the integrity of their Web sites for vulnerabilities • Related programming exploits: • Cross-site scripting attacks • HTTP header injection
The Encryption Prescription • Scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key • Even the largest known brute force attacks haven’t come close to breaking encryption that scrambles transmissions most browsers use in communication with banks and shopping sites
Other Technology Threats • Push-Button Hacking • Hackers have created tools to make it easy for the criminally inclined to automate attacks • Hacking toolkits can probe systems for the latest vulnerabilities, and then launch appropriate attacks • Network Threats • The network itself may be a source of compromise (Example: TJX hack) • DNS cache poisoning exploits can redirect the DNS mapping
Physical Threats • Dumpster diving: Sifting through trash to uncover valuable data or insights to facilitate attacks • Shoulder surfing: Looking over someone’s shoulder to glean password or other proprietary information on a computer screen • Eavesdropping - Listening into or recording conversations, transmissions, or keystrokes
Taking Action as a User • Question links, enclosures, download requests, and the integrity of Web sites visited • Be on guard for phishing attacks, social engineering con artists, and other attempts for letting in malware • Turn on software update features for your operating system and any application you use • Install a full suite of security software and regularly update it • Encrypt all valuable and sensitive data
Taking Action as a User • Do not turn on risky settings like unrestricted folder sharing • Home networks should be secured with password protection and a firewall • Use VPN software when accessing public hotspots • Maintain a strict password regimen involving regular updating and changing default passwords • Regularly back up systems and destroy data on removable devices after use
Taking Action as an Organization • Security frameworks aim to take all measures to ensure security of firm for its customers, employees, shareholders, and others • ISO 27,000 series • Firms may also face compliance requirements—legal or professionally binding steps • Compliance does not equal security
Taking Action as an Organization • Education, audit, and enforcement • Employees need to know a firm’s policies, be regularly trained, and understand that they will face strict penalties if they fail to meet their obligations • Include operations employees, R&D function, representatives from general counsel, audit, public relations, and human resources in security teams • Audits include real-time monitoring of usage, announced audits, and surprise spot checks
Taking Action as an Organization • Information security should start with an inventory-style auditing and risk assessment • Firms should invest wisely in easily prevented methods to thwart common infiltration techniques • Security is an economic problem, involving attack likelihood, costs, and prevention benefits • Tightening security and lobbying for legislation to impose severe penalties on crooks helps raise adversary costs and lowers likelihood of breaches
Role of technology • Patches • Pay attention to security bulletins and install software updates that plug existing holes • Legitimate concerns exist over ability of patches to unfavorably affect a firm’s systems • Lock down hardware • Reimage hard drives of end-user PCs • Disable boot capability of removable media • Prevent Wi-Fi use • Require VPN encryption for network transmissions
Role of Technology • Lock down networks • Firewalls control network traffic, block unauthorized traffic and permit acceptable use • Intrusion detection systems monitor network use for hacking attempts and take preventive action • Honeypots are seemingly tempting, bogus targets meant to lure hackers • Blacklists deny the entry or exit of specific IP addresses and other entities • Whitelists permit communication only with approved entities or in an approved manner
Role of Technology • Lock down partners • Insist on partner firms being compliant with security guidelines and audit them regularly • Use access controls to compartmentalize data access on a need-to-know basis • Use recording, monitoring, and auditing to hunt for patterns of abuse • Maintain multiple administrators to jointly control key systems
Pointers for firms • Lock down systems • Audit for SQL injection and other application exploits • Have failure and recovery plans • Employ recovery mechanisms to regain control in the event that key administrators are incapacitated or uncooperative • Broad awareness of infiltration reduces organizational stigma in coming forward • Share knowledge on techniques used by cybercrooks with technology partners