Presentation on theme: "Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar."— Presentation transcript:
Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar Network Administrator University of Arizona
Information Security Awareness 4 FERPA HIPPA GLBA State Legislation (House Bills) Online Privacy Statement Misuse of State of Arizona Equipment Many more to come Why Awareness? (cont) Heightened Activity Regulatory Drivers
Information Security Awareness 5 Why Awareness? (cont.) Relationship of Privacy & Security Roles and Responsibilities
Information Security Awareness 6 Where to start and how? Step 4 - How will we monitor progress? Monitoring Step 1: Where are we now? Current Situation Assessment Step 2. Where do we want to be? Strategic Direction Step 3 - How do we plan to get there? Implementation Planning
Information Security Awareness 7 Security Policies & Standards are minimal and may or may not be documented. Security Incidents are viewed as someone else's problem. Existing programs and services are perceived as sufficient. Security is viewed as an enforcer. Realization that existing Information Security processes are fragmented. Executive level support and involvement is visible. Some Security Awareness interventions are implemented and are ongoing. General acceptance of campus-wide standards based on Security Infrastructure and displayed through noticeable behavior change. Staff, faculty and students actively and visibly participate in the programs and services. Security incidents are reported immediately to the appropriate area. The integration of Security programs and services in the campus departments is complete. Security is involved at the onset of projects. U of A is considered as a Security Awareness Best Practice campus. Threats are continually reevaluated based on changing threat population and security incidents. Additional or more cost effective alternatives are continually identified. The practice of Security is considered a component of the campus culture. Security Awareness is viewed as a business enabler. Level 4 COMMON PRACTICE Level 4 COMMON PRACTICE Level 5 CONTINUOUS IMPROVEMENT Level 5 CONTINUOUS IMPROVEMENT University of Arizona Characteristics Level 3 INTEGRATION INTEGRATION Level 2 ACKNOWLEDGEMENT ACKNOWLEDGEMENT Level 1 COMPLACENCY COMPLACENCY Goal: Set the stage for all security efforts by bringing about a change in attitudes, which will change the campus culture.
Information Security Awareness 8 Administrators Students Staff Faculty Technical vs. Non-technical Challenges Funding & Resources Diversity and Decentralization Varied Audiences
Information Security Awareness 9 The What, How & Why or Want to do Solutions Timeline / Opportunities Message vs. Delivery Method Surveys Include WIIFM - What’s in it for me? Include Knowledge, Skill and Attitude
Information Security Awareness 10 The following three slides are a consistent message we communicate or incorporate in our awareness / education efforts to help reinforce the message that Security is Everyone's responsibility! That technology alone cannot keep us secure. People are the last layer of defense.
Information Security Awareness 11 SEC- -Y The key to security is embedded in the word security. YOU ARE IT!
Information Security Awareness 12 If not you, who? If not now, when?
Information Security Awareness 13 During your typical day, you may be exposed to situations where you become aware of an attempt to breach an area of security. You need to be prepared to: Protect Detect React
Information Security Awareness 14 Increased reporting & requests Benefits Heightened Awareness Key Partnerships formed Campus wide understanding, acknowledgement and support Recognition of Security Office
Information Security Awareness 15 Dedicated Staff Costs Pamphlets Security Awareness Day Posters
Information Security Awareness 16 Monthly “Brown Bag” Presentations Customized group presentations Redesigned Security Page security.arizona.edu Campus Security Awareness Day security.arizona.edu/awarenessday.html New Employee Orientation Handout Initiatives
Information Security Awareness 17 Initiatives (cont.) Pamphlets Privacy Basics - Guide to Protecting Personal Information Risk Reduction - Computer Protection and Prevention Security Basics - Guide for Protecting Your Computer Computer Security and Privacy Information - What everyone needs to know Security Awareness Posters security.arizona.edu/posters.html
Information Security Awareness 18 First Set
Information Security Awareness 19 First Set
Information Security Awareness 20 First Set
Information Security Awareness 21 Second Set
Information Security Awareness 22 Second Set
Information Security Awareness 23 Second Set
Information Security Awareness 24 Security Policies & Standards are minimal and may or may not be documented. Security Incidents are viewed as someone else's problem. Existing programs and services are perceived as sufficient. Security is viewed as an enforcer. Realization that existing Information Security processes are fragmented. Executive level support and involvement is visible. Some Security Awareness interventions are implemented and are ongoing. General acceptance of campus-wide standards based on Security Infrastructure and displayed through noticeable behavior change. Staff, faculty and students actively and visibly participate in the programs and services. Security incidents are reported immediately to the appropriate area. The integration of Security programs and services in the campus departments is complete. Security is involved at the onset of projects. U of A is considered as a Security Awareness Best Practice campus. Threats are continually reevaluated based on changing threat population and security incidents. Additional or more cost effective alternatives are continually identified. The practice of Security is considered a component of the campus culture. Security Awareness is viewed as a business enabler. Level 4 COMMON PRACTICE Level 4 COMMON PRACTICE Level 5 CONTINUOUS IMPROVEMENT Level 5 CONTINUOUS IMPROVEMENT University of Arizona Characteristics Level 3 INTEGRATION INTEGRATION Level 2 ACKNOWLEDGEMENT ACKNOWLEDGEMENT Level 1 COMPLACENCY COMPLACENCY Goal: Set the stage for all security efforts by bringing about a change in attitudes, which will change the campus culture.
Information Security Awareness 25 Questions
ISO| ECAT 26 § ¦ µ Kelley Bogart Information Security Coordinator Gil Salazar UA Network Administrator
Information Security Awareness 27
Information Security Awareness 28 Agenda State of the Internet today Viruses, Worms & Spies! How to Protect Yourself
Information Security Awareness 29 State of the Internet Today Internet goes thru your computer
Information Security Awareness 30 Some Local Statistics University of Arizona Campus Cyber attacks per day # of outside to inside attacks : 64,959 # of Inside to outside attacks : 60,040 # of Inside to Inside attacks : 6,941 Total of related victim machines : 593,734
Information Security Awareness 31 Threat Follows Value The 1950s American bank robber Willie Sutton was asked why he robbed banks. He said he robbed banks because, “That’s where the money is.” Today, the money is in Cyberspace! The Internet provides for criminals the two capabilities most required for the conduct of criminal activities: Anonymity & Mobility
Information Security Awareness 32 Do The Math Spam mailed to over 100 million inboxes If 10% read the mail and clicked the link = 10 million people If 1% of people who went to site signed up for 3-days free trial = (100,000 people) x ($0.50) = $50,000 If 1% of free trials sign up for 1 year = (1,000 people) x ($144/yr) = $144,000/yr
Information Security Awareness 33 Most attacks occur here Situation: It is getting scary! Product ship VulnerabilityDiscovered | Potential attack SoftwareModified Patch released Patch deployed at home/office Why does this gap exist?
Information Security Awareness 34 Exploit Timeline Days From Patch to Exploit –The average is now nine days for a system to be reverse-engineered Why does this gap exist? exploit code patch Days between patch and exploit ZoTob 151 180 331 Blaster Welchia/ Nachi Nimda 25 SQL Slammer 1
Information Security Awareness 35 Exploit Survival Time The SANS Institute has studied what it calls the "survival time" of an unprotected computer hooked up to the Internet. A year ago, the average time before it was compromised was about 55 minutes. Today it's 20 minutes. On the UA campus it can be less then ONE MINUTE.
Information Security Awareness 36 Questions? State of the Internet Why do criminals use the internet today? To be Anonymous & Mobile
Information Security Awareness 37 Viruses, Worms & Spies
Information Security Awareness 38 Old “traditional” viruses usually required human interaction –You have to save it, run it, share floppy disks –E-mailing a program / document, without knowing it is infected Typically just attach themselves to programs & documents, and then depend on humans to propagate This is changing… Virus:
Information Security Awareness 39 How It Spreads E-mail Instant Messenger Networks P2P/Filesharing software Downloads Floppy disks, Flash Drives. CDs, etc.
Information Security Awareness 40 To: firstname.lastname@example.org Subject: Notify about your e-mail account utilization. From: email@example.com Dear user of Arizona.edu gateway e-mail server, Your e-mail account will be disabled because of improper using in next three days, if you are still wishing to use it, please, resign your account information. For further details see the attach. For security reasons attached file is password protected. The password is "03406". Best wishes, The Arizona.edu team http://www.arizona.edu Sample E-Mail................... This has a virus attached!
Information Security Awareness 41 Questions? Virus: What is the most common way viruses are spread today? E-Mail
Information Security Awareness 42 Worms: Sub-class of Virus Replicated Automatically without human help Example is e-mail address book attack Bogs down networks and Internet Zotob, Blaster are examples
Information Security Awareness 43
Information Security Awareness 44 Worms: Scary part – you don’t have to do anything but turn your computer on! Or make a simple click.
Information Security Awareness 45 Trojan Horse Program that appears to be a “good” program, but really isn’t Might do what it is supposed to, plus a whole lot more! programs installed in this category use several methods to enter the computer; –Web, e-mail, spyware
Information Security Awareness 46 Botnets are networks of captive computers (often called zombies) that are created by trojans or worms that have infected unprotected PCs. These networks are frequently used to send spam and initiate distributed denial of service (DDoS) attacks. Botnets or “Zombies”
Information Security Awareness 47 Questions? Worms: What is it called when a program sneaks onto your computer? A Trojan
ISO| ECAT 48
Information Security Awareness 49 Have you ever received an email that says something like this? “We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity.” OR “During our regular verification of accounts, we couldn’t verify your information. Please click here to update and verify your information.”
Information Security Awareness 50 This is a typical “phishing” attempt
Information Security Awareness 51 What is Phishing? Phishing is a form of social engineering, characterized by attempts to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or legitmate business in an apparently official electronic communication, such as an email, pop-up window or an instant message. http://en.wikipedia.org/wiki/Phishing#Phishing_technique
Information Security Awareness 52 Social engineering preys on qualities of human nature: the desire to be helpful the tendency to trust people the fear of getting into trouble Social engineering is the practice of obtaining confidential information by manipulation of legitimate users. A social engineer will commonly use the telephone or Internet to trick people into revealing sensitive information or getting them to do something that is against typical policies. By this method, social engineers exploit the natural tendency of a person to trust his or her word, rather than exploiting computer security holes.
Information Security Awareness 53 EBAY
Information Security Awareness 54 EBAY
Information Security Awareness 55 EBAY
Information Security Awareness 56 EBAY
Information Security Awareness 57 PayPal
Information Security Awareness 58 PayPal
Information Security Awareness 59 PayPal
Information Security Awareness 60 Visa
Information Security Awareness 61 Visa
Information Security Awareness 62 Microsoft
Information Security Awareness 63 Stats from Anti-Phishing Working Group
Information Security Awareness 64 Stats from Anti-Phishing Working Group
Information Security Awareness 65 Stats from Anti-Phishing Working Group
Information Security Awareness 66 Arizona State Credit Union
Information Security Awareness 67 DM Federal Credit Union
Information Security Awareness 68 Recognizing Phishing False Sense Of Urgency - Threatens to "close/suspend your account," or charge a fee. Indirect invitation - "Dear valued customer", "Dear reader", "In attention to [service name here] customers“. Misspelled or Poorly Written - Helps fraudulent e-mails avoid spam filters.
Information Security Awareness 69 Recognizing Phishing Suspicious-Looking Links & Pop-Ups Links containing all or part of a real company's name asking you to submit personal information. Hyperlinks spoofing You see the "http://www.yourbank/Login" link in the message, but if you hover the mouse cursor over the link, you will see that it points to "http://www.spoofedbanksite.com/Login"
Information Security Awareness 70 Discover Card Awareness
Information Security Awareness 71 Citibank
Information Security Awareness 72 Spyware or Phishing-based Trojans – Keyloggers ?
Information Security Awareness 73 Designed with the intent of collecting information on the end-user in order to steal those users' credentials. Unlike most generic keyloggers, phishing-based keyloggers have tracking components which attempt to monitor specific actions (and specific organizations, most importantly financial institutions and online retailers and ecommerce merchants) in order to target specific information, the most common are; access to financial based websites, ecommerce sites, and web-based mail sites. Phishing-based Trojans – Keyloggers
Information Security Awareness 75 Unique Websites Hosting Keyloggers
Information Security Awareness 76 Yet Another Form of Phishing to worry about Unlike a scam which tries to trick you into providing personal information. This: executes code Changes your host file Redirects legitimate webpage to spoofed site ….and all you did was open an email or view it in a preview pane in programs like Microsoft Outlook
Information Security Awareness 77 Phishing-based Trojans – Redirectors Designed with the intent of redirecting end-users network traffic to a location where it was not intended to go to. This includes crimeware that changes hosts files and other DNS specific information, crimeware browser-helper objects that redirect users to fraudulent sites, and crimeware that may install a network level driver or filter to redirect users to fraudulent locations. This is particularly effective because the attackers can redirect any of the users requests at any time and the end-users have very little indication that this is happening as they could be typing in the address on their own and not following an email or Instant Messaging lure.
Information Security Awareness 78
Information Security Awareness 79 FTC suggestions to help avoid getting hooked by a phishing scam: If you get an email or pop-up message that asks for personal or financial information, do not reply. And don’t click on the link in the message, either. Use anti-virus software and a firewall, and keep them up to date. Don’t email personal or financial information.
Information Security Awareness 80 Review credit card and bank account statements as soon as you receive them Be cautious about opening any attachment or downloading any files from emails Forward spam that is phishing for information to firstname.lastname@example.org and to the company, bank, or organization impersonated in the phishing email@example.com FTC suggestions (cont’d)
Information Security Awareness 81 Additional Protection Tips Treat all email with suspicion Never use a link in an email to get to any web page Ensure that all of your software is up to date Use anti-spyware detection software on a regular basis
Information Security Awareness 82 If you must use your financial information online, ensure that you have adequate insurance against fraud If you must use your financial information online, ensure that you have adequate insurance against fraud Be aware or beware. Be aware or beware. Additional Protection Tips
Information Security Awareness 83 Questions? What does the term “Phishing” refer to? Attempt to gather information for illicit use
Information Security Awareness 84 Spyware Ever get pop-ups that constantly ask for you to click “OK” and won’t go away? This is most likely Spyware of some sort
Information Security Awareness 85 Spyware: What it is spyware is programming that is put in your computer to secretly gather information about You or your pc and relay it to advertisers or other interested parties adware pushes ads, track Internet habits and performs other sneaky tricks
Information Security Awareness 86 Spyware : How Do I know I have it? Computers slow down to a crawl Annoying Pop-ups appear Browser Start Page changes Unwanted toolbars, tray programs New programs are installed on your PC and show up on the desktop
Information Security Awareness 87 Spyware: why is it bad? Corrupt/alter the current software Steal passwords, information etc. Track browsing habits, sites interferes with system settings –(registry, startup) Even after removal, it can leave crumbs which helps program re-install itself
Information Security Awareness 88 Spyware: How did I get it? Email Instant Messaging Internet Browsing P2P Software (kazaa, limewire, bearshare, AIM) Downloads and Installs –Potentially Unwanted Programs (PUPs)
Information Security Awareness 89
Information Security Awareness 90
Information Security Awareness 91 Spyware : Why do they do it? 0x80 is a hacker… he says: "Most days, I just sit at home and chat online while I make money," 0x80 says. "I get one check like every 15 days in the mail for a few hundred bucks, and a buncha others I get from banks in Canada every 30 days." He says his work earns him an average of $6,800 per month, although he's made as much as $10,000. Not bad money for a high school dropout.
Information Security Awareness 92 Questions? What are a couple things Spyware does? Create pop-ups, hijacks web pages, collect info, slow pc down. Spyware:
Information Security Awareness 93 How to Protect Yourself
Information Security Awareness 94 Practice Good Surfing Sense You know there are bad parts of town that you don’t go to The Internet is the same way – be wary!
Information Security Awareness 95 Download Rules Never download or open something, if you don’t know what it is Even if you know the sender by name, check with them to see if they sent you something
Information Security Awareness 96 True company-based e-mails never send attachments Make sure the link actually goes to their site & not a spoofed one! Only download what you trust, and even then be wary! Download Rules
Information Security Awareness 97 Be Aware of Spoofing Have you ever received an e-mail telling you that you have a virus? It is possible that : –Your address could’ve been spoofed and sent to someone else –It could be a trick to get you to install some “anti-virus” or “patch” (which is really a virus itself!)
The Best Defense
Information Security Awareness 99 The Best Defense Use Strong Passwords –Passwords should contain 8 characters including upper and lowercase, special characters (*^#) and numbers Don’t take downloads from strangers –Only install what you trust –“free” music & file sharing programs are wide open doors for hackers
Information Security Awareness 100 Check if your PC has any issues: –Does your browser open to a new home page, or search page? –Increase in advertisements & pop-ups? –Computer seems sluggish? –Know your system and what is installed The Best Defense
Information Security Awareness 101 Get a detect & removal tool for spyware Ad-Aware: easiest to use, free for home use only SpyBot: Free for any use, more advanced, has automated protection features Microsoft Anti-spyware: Free for any use, has automated protection and updates. Use all three together for complete protection! The Best Defense
Information Security Awareness 102 The Best Defense Install anti-virus software –(Sophos, Norton, McAfee etc…) Install a Firewall –(Windows built-in, Kerio, ZoneAlarm) Keep everything up-to-date! Windows Automatic Updates, Anti-virus, Spyware detection.
Information Security Awareness 103
Information Security Awareness 104 Limit access to your computer keep doors locked if your not around and system is on Thumb drives can be used to steal data The Best Defense
Information Security Awareness 105 At home use multiple user accounts when sharing computers and switch users/lock workstation when leaving system on when you are away from the desktop Control Alt Delete Windows Key – l for XP The Best Defense
Information Security Awareness 106 Quote from a victim… "Overall, you've got to realize that, just like if you don't secure your home, you run the risk of getting burglarized; if you're crazy enough to leave the door on your computer open these days, like I did, someone's gonna walk right in and make themselves at home." ~Pastor Michael White
Information Security Awareness 107 Questions? The Best Defense What is the best way to keep passer bys from accessing your computer? Control-alt-delete or Windows-Key L
Information Security Awareness 108 Other Reminders…. Back up your computer data. Keeping system patches updated Firewalls, pop-up blocker, spyware apps updated. Know your systems
Information Security Awareness 109 Now for any Final Q&A…
Information Security Awareness 110 Don’t let the computer control you! Don’t ever give up! If the situation seems hopeless: