1 / 28

Security Essentials

Security Essentials. Security Essentials “In today’s networked world, we have to accept that our systems and networks can not be 100% secure if we still expect them to be useful in the conduct of our business. That means we will have to learn to live with insecurity and manage our risks.”.

mairi
Download Presentation

Security Essentials

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Essentials Security Essentials “In today’s networked world, we have to accept that our systems and networks can not be 100% secure if we still expect them to be useful in the conduct of our business. That means we will have to learn to live with insecurity and manage our risks.”

  2. Presenters • Dave Wordhouse • VP, Network Technologies • dwordhouse@cuanswers.com • Fred Damstra • Network Systems Integration • fdamstra@cuanswers.com • Jim Vickers • Network Operations Coordinator • jvickers@cuanswers.com • Jim Lawrence • Asst. Mgr. Internal Networks • jlawrence@cuanswers.com • Tony Walliczek • Network Operations Coordinator • twalliczek@cuanswers.com

  3. Agenda • What is Information Security? • Identify the threats. • What’s at stake? • It all starts with the Security Policy. • The threat from within. • Portable data storage devices. • Ten action steps for a more secure network. • Developing a Security Awareness program.

  4. Definition of Information Security • Information Security – • Computer Security is the protection of data against unauthorized access. • Information Security is not confined to computer systems, nor to information in an electronic or machine-readable form. It applies to all aspects of safeguarding or protecting information or data, in whatever form. • Ensure data • Availability • Confidentiality • Integrity

  5. Data Availability, Confidentiality, and Integrity

  6. First Immutable Law of Security • In security, there are no “silver bullets”. • Security is built in layers • No one piece of software, no single firewall, no single policy can totally protect • Ensure data: • Availability • Confidentiality • Integrity

  7. Identify the Threats • Types of threats • Unintentional • Employee errors, omissions, etc. • Intentional (malicious) • Virus, trojan, etc. • Phishing attack • Denial of Service attack (DoS) • Natural Disasters (fire, flood, etc.) • Fire, flood, etc. • (attend 9.65 Disaster Recovery/ Business Continuity for more information)

  8. What’s at stake for you? • Credibility • Legal issues • Customer satisfaction • Competitor advantage • Staff frustration • Loss of money

  9. What’s at stake for the attacker? If a financial institution is robbed by someone with a gun, the criminal will be hunted to the ends of the earth with whatever means necessary. But if robbed by someone with a computer, it is likely they will not even acknowledge that a crime has been committed in order to avoid the publicity. [John Tartaglia, "Introduction to Network Security," Computer Security Institute's Conference] • The average armed robber will get $2,500 to $7,500 with the risk of being shot and killed. • Fifty to 60 percent of armed robbers will be caught and 80 percent of those will be convicted and sentenced to an average of five years of hard time. • The average computer criminal will get $50,000 to $500,000 with a risk of being fired or going to jail. • Ten percent of those computer criminals that are discovered are caught, with only 15 percent of those caught being reported to authorities. • Over 50 percent of these reported never go to trial due to a lack of evidence or a desire to avoid publicity. • Fifty percent of those who do go to trial are convicted and sentenced to five years of relatively easy time. *Laws vary in different states and municipalities. New laws are being written to increase the penalties for computer criminals.

  10. Types of Attacks • Malicious software • User opens attachment or downloads file. • Virus, Trojan, Spyware • Phishing • User responds to email request for attention. • Identity of institution is stolen. • Social engineering • Exploiting human trust • Covered in 9.55 The Human Side of Security. • System/network compromise • Exploiting a system or application vulnerability • Covered in 9.35 The Armored Network.

  11. Malicious Software • Viruses • A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. • Usually obtained by opening a file attachment to an email message, visiting an untrusted web site or by downloading a file. • Trojans • Will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. • Spyware • Software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. • Typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet. • Once installed, monitors user Internet activity and transparently transmits that information to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers. • Protection against Viruses, Trojans, and Spyware includes a combination of a centrally managed Anti-Virus software solution combined with user education.

  12. Phishing • Phishing is actually two online identity thefts used together. In phishing scams, the identity of the target company is stolen first in order to steal even more identities- those of unsuspecting members. • Typical phishing attack contains two pieces- • An authentic-looking email • A fraudulent web page. • Email is designed to confuse, upset, or excite the recipient. • Phishing techniques • Explicit display of Phishing URL (make no effort to hide) • Address bar spoofing • Using pop-up windows (showing a legitimate site) • Using forms within the phishing email • Web site spoofing (exact duplicate of your web site)

  13. Phishing (form of Social Engineering) • Elements of a Phishing attack • Stages of a phishing attack • The attacker obtains email addresses for the intended victims. These could be guessed or obtained from a variety of sources. • The attacker generates an email that appears legitimate and requests the recipient to perform some action. • The attacker sends an email to the intended victims in a way that appears legitimate and obscures the true source. • Depending on the content of the email, the recipient opens a malicious attachment, completes a form, or visits a web site. • The attacker harvests the victim's sensitive information and may exploit it in the future. • Reduce the risk of falling for a phishing attack by: • Establish and enforce corporate email policies. • Regularly conduct highly visible anti-phishing information campaigns. • Support consumer education regarding phishing. • Consider acquiring anti-phishing products and services from your trusted security vendor. • Visit www.cusecure.org for information on materials available from CU*Answers • Statement inserts that educate members. • Improvements to CU*@Home that help educate members. • Consult Web Services for suggestions on web site materials to education and inform members.

  14. The Threat from Within • A crime (security breach) perpetrated by, or with the help of, a person working for or trusted by the victim. • Employee (current/former), friend or spouse of an employee, vendor, etc. • Internal security breaches at the world's financial institutions are growing faster than external attacks, as institutions invest in technology, instead of employee training. • According to the 2005 Global Security Survey, published by Deloitte Touche Tohmatsu, • 35 per cent of respondents said that they had encountered attacks from inside their organization within the last 12 months, up from 14 per cent in 2004. • In contrast, only 26 per cent confirmed external attacks, compared to 23 per cent in 2004.

  15. The Threat from Within (cont) • What to look for: • Are users accessing information that does not relate to their job functions? • Would you know if they were? Are you sure? • Are attempts being made to access specific areas of the system? • Would you know if they were? Are you sure? • Are there accounts that consistently have authentication failures? • Would you know if they were? Are you sure? • Who’s responsible for reviewing your logs?

  16. Portable data storage devices • What are they? • How can they be used breach security? • How to prevent access to USB ports? • I've heard of companies filling in the USB ports with plastic resin. When it dries, the ports are unuseable. This prevents the use of USB mouse, keybords, printers, etc. • Disable port in System BIOS (password protect). • Prevent installation of USB device drivers on Windows XP. • Modify the registry Win XP sp2 to make USB ports read-only • Purchase software that locks out users from specific USB device types (Deviceshield, etc.). • Create and enforce an acceptable use policy that fits your organization. *Remember that all technical controls are just that. If a user has physical control of the machine, he can enable hardware.

  17. Proper disposal of data • Depreciated hardware. • End-of-life media (tapes, disks, etc.) • Paper information (reports, forms, etc.) • Hardware disposal stories. • A recent university study examined 105 hard drives which had been purchased on internet auction sites and was able to access data on 92 of them. • The data recovered by the university team included staff passwords and national insurance numbers, a template to print a university degree and even detailed information about school children. • Researchers found 57% of the readable disks contained data which allowed the original owners - ranging from organizations in the leisure and financial services industries to a number of universities - to be identified. • Twenty percent of the disks contained financial information, including sales receipts and profit and loss reports. • "The only way to be sure is to physically destroy the device“.

  18. Circle of Security • Protect • Detect • Respond • Recover “It all starts with the Security Policy”

  19. What a Security Policy should include • Your security policy should include: • Acceptable use policy. • Security incident handling procedures. • Incident escalation procedures. • Remote access policy. • Firewall management policy. • Disaster recovery policy.

  20. Internet Email Safety • Never open any attached file unless you are expecting it! • Recent worm and Trojan horse activity indicate its not safe to open files from trusted sources anymore. • Sender’s email address may be spoofed. • Most viruses spread themselves via Email attachments. • If you are unsure about a file, contact the sender and ask them what they sent you.

  21. Incidence Response • Could you spot a breech of security? • Do you (and your staff) know what to do in the event of a breach? • Is there an Incidence Response plan in place? • Who to contact? • Protection of evidence? • Publicity? • Who’s monitoring your security logs?

  22. A culture of Security Awareness • The human factor is the only vulnerability that is virtually unpatchable, and no security product, service, or update can protect people from their own choices. Users must never let their growing dependency on technology lead to complacency and irresponsibility. • Users can contribute significantly to the security of the network by just following certain guidelines and performing simple, logical practices. • Every staff employee should know: • Why security is important. • Why each person is important in security matter. • Why strong passwords are used. • What is a virus and how to prevent them from spreading. • What is social engineering and how to identify it. • Importance of physical security. • Contents of security policy and repercussions if violated.

  23. Ten action steps for a more secure network • Model threats to your business, and perform a security risk assessment. • Develop an information security policy and educate your users. • Design a secure, layered security strategy. • Use anti-virus software at the gateway and the desktop. • Use only operating systems that have adequate security baseline capabilities (proper patch management). • Know your network (harden systems). • Use personal firewalls, especially on laptops (mobile). • Use strong authentication. • Develop a computer incident response plan. • Get started!

  24. Nine ways to increase security for laptop users • Avoid using computer bags. • Never leave access numbers or passwords in your carrying case. • Carry your laptop with you (don't check it at the gate). • Encrypt your data (on the drive). • Keep an eye on your laptop. Don't let someone switch it. • Buy laptop security device. Security cable, tracing program, ID checker, etc. • Avoid setting your laptop on the floor. If have to, between your feet or against your leg. • Use a screen guard (beware shoulder surfers). • Try not to leave your laptop in your hotel room or with the front desk. *Have a plan of action in case it is stolen.

  25. Top 5 mistakes • Top 5 System Administrator Mistakes • The lack of a well established personal security policy. • Connecting misconfigured systems to the Internet. • Relying on tools. • Failing to monitor the logs. • Running extra and unnecessary services/software/scripts. • Top 5 Management mistakes • Employing untrained and inexperienced experts. • Failing to realize the consequences of a potential security breach. • Not spending enough money on the Information Security issue. • Relying mainly on commercial tools and products. • Thinking security is a one-time investment. • Top 5 End User mistakes • Violating the company's security policy. • Forwarding sensitive data to their home computers. • Writing down accounting data. • Downloading from untrusted devices. • Failing to pay serious attention to the physical security issue.

  26. Additional Resources • CU*Answers has two CISSP (Certified Information Systems Security Professional) on staff. • Randy Brinks (rbrinks@wesconet.com) • Joe Couture (jcouture@wesconet.com) • CERT (www.cert.org) • Home computer security document • Home computer security checklist handout • SANS (www.sans.org) • Microsoft Product Security Notification • http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/notify.asp

  27. Additional Resources • Other SECURE-U courses • 9.15 – “Security Essentials“ • Essential security and privacy issues • 9.35 – “The Armored Network” • Network security at CU*Answers • 9.55 – “The Human Side of Security” • Social Engineering and other exploits • 9.65 – “Disaster Recovery and Business Continuity” • The CU*Answers plan

  28. Questions and Answers • ???

More Related