Presentation is loading. Please wait.

Presentation is loading. Please wait.

Oct 4, 2006Dept Security Contacts Training1 Managing Sensitive Data Harvard Townsend Interim University IT Security Officer 532-2985 College.

Similar presentations


Presentation on theme: "Oct 4, 2006Dept Security Contacts Training1 Managing Sensitive Data Harvard Townsend Interim University IT Security Officer 532-2985 College."— Presentation transcript:

1 Oct 4, 2006Dept Security Contacts Training1 Managing Sensitive Data Harvard Townsend Interim University IT Security Officer College Court 114

2 Oct 4, 2006Dept Security Contacts Training2 “…as we know, there are known knowns; there are things we know we know. We also know there are known unknowns; that is to say we know there are some things we do not know. But there are also unknown unknowns - the ones we don't know we don't know.” Donald Rumsfeld, Secretary of Defense, 2002

3 Oct 4, 2006Dept Security Contacts Training3 Why Should We Care? 93,998,906 and counting… … the approximate number of records with personal identity information that have been compromised due to security breaches since February 15, 2005 Privacy Rights Clearing House

4 Oct 4, 2006Dept Security Contacts Training4 Why Should We Care? Data entrusted to our care Handling a breach very expensive Damage to institution’s reputation

5 Oct 4, 2006Dept Security Contacts Training5

6 Oct 4, 2006Dept Security Contacts Training6 Why Should We Care? It is the law: –SB 196 Kansas Security Breach Law takes effect Jan. 1, 2007 Protects personal identity information Mandates prompt investigation and notification –FERPA (student records) –HIPAA (medical records) –GLB (financial records) –ECPA (electronic communications)

7 Oct 4, 2006Dept Security Contacts Training7 Why Should We Care? It is K-State policy –PPM 3495 “Collection, Use, and Protection of Social Security Numbers” –PPM 3415 “Information Security Plan” (GLB) –PPM 7010, section.430 “Intellectual Property Rights” –PPM 7010, section.440 “Data Access and Retention” –PPM 3485 “Protecting Sensitive Data by Desktop Search Products” –PPM 3060 “Kansas Open Records Act” –PPM 3090 “Retention of Records” –PPM 3430 “Security for Information, Computing and Network Resources”

8 Oct 4, 2006Dept Security Contacts Training8

9 Oct 4, 2006Dept Security Contacts Training9

10 Oct 4, 2006Dept Security Contacts Training10 Spoofed Website Hosted on the server in China Legitimate Website

11 Oct 4, 2006Dept Security Contacts Training11 Hosted in Germany Source of Spam Harvested Data Victim Login from Romania

12 Oct 4, 2006Dept Security Contacts Training12 What is “Sensitive Data?” Sensitivity = level of protection against disclosure and abuse Criticality = level of importance to the institution Risk = measure of negative impact of a event and probability it will occur

13 Oct 4, 2006Dept Security Contacts Training13 Data Classification Public data Internal restricted data Confidential data National Security Interest data

14 Oct 4, 2006Dept Security Contacts Training14 Public Data Approved for distribution to the public No such thing as unauthorized disclosure Very low sensitivity Still needs protection Examples: –Course catalog –Campus maps –Online people directory –Extension publications –Press releases

15 Oct 4, 2006Dept Security Contacts Training15 Internal Restricted Data Intended for use only within K-State for University purposes Requires access controls Public disclosure could cause problems Moderate sensitivity Examples: –Departmental intranet –Transaction log files –Budget data –Purchase orders

16 Oct 4, 2006Dept Security Contacts Training16 Confidential Data Highly sensitive data that can only be disclosed to individuals with explicit authorization Protection required by law (FERPA, HIPAA) Unauthorized disclosure harmful or catastrophic to individual, group, or institution High sensitivity, thus requires highest level of protection Examples: SSN, credit card #s, personal identity data, student records, personnel records, medical records

17 Oct 4, 2006Dept Security Contacts Training17 National Security Interest Data Federal government classified data Restrictions determined by the source agency Moderate to high sensitivity, depending on federal classification Examples: –Biosecurity Research Institute data –DoD contracts –Homeland Security contracts

18 Oct 4, 2006Dept Security Contacts Training18 Managing Confidential Data General Guidelines Data owner must approve access Require strong authN/authZ for access Understand and secure all interfaces (“trust relationships”) Secure test and development systems Secure developers’ desktops Don’t use real data for test and development Control printing Encrypt stored data where feasible Fear wireless!

19 Oct 4, 2006Dept Security Contacts Training19 Managing Confidential Data General Guidelines Transmit securely (SFTP and SSH, not FTP and Telnet) Don’t send in Store on a secure server, not desktop or laptop Place systems behind firewall with restrictive ruleset Restrict physical access and remote access to server(s) Monitor 24x7x365 Secure, frequent, off-site backups Destroy data thoroughly upon disposal Perform security audit at least annually

20 Oct 4, 2006Dept Security Contacts Training20 Social Security Numbers See policy on the “Collection, Use, and Protection of Social Security Numbers” Removal from ID cards July 1, 2006 Replaced with Wildcat ID (WID) Available in K-State Online, KATS, DARS, eID e-profile Full conversion in new SIS

21 Oct 4, 2006Dept Security Contacts Training21 What Should You Do About SSNs? Read “Understanding K-State IDs” Communicate the issue with your department Identify uses of SSNs and compare to policy requirements Be paranoid! Watch IT Tuesday for more info

22 Oct 4, 2006Dept Security Contacts Training22 Credit Card Numbers Never store credit card numbers Use third party credit service company If you handle credit cards, review Payment Card Industry Data Security Standards (PCI DSS)PCI DSS K-State is currently level 3 merchantlevel 3 merchant Become level 1 if compromised

23 Oct 4, 2006Dept Security Contacts Training23 Mobile Devices Laptop or tablet PCs Smart phones like Blackberry, Palm Treo Personal Digital Assistants (PDAs) Portable media players (iPod) Storage media like USB flash drive, SD or CompactFlash cards

24 Oct 4, 2006Dept Security Contacts Training24 Preventing Theft Use tracking and recovery software like Computrace from Absolute Software (www.absolute.com)www.absolute.com Use lock cables Apply tamper-resistant asset tag or engrave cover Use a nondescript carrying case Don’t let it out of your sight when you travel Always take it in your carry-on luggage Don’t leave it in view in your car Lock it securely with a cable in your hotel room

25 Oct 4, 2006Dept Security Contacts Training25 Data on Mobile Devices DON’T store confidential data on mobile devices If you must, encrypt it Beware of managing encryption keys Keep the original file(s) on a secure server Diligently manage the security of the device (patches, antivirus software, firewalls, etc.)

26 Rumsfeldisms on IT Security On interrogating hackers: “I don't know what the facts are but somebody's certainly going to sit down with him and find out what he knows that they may not know, and make sure he knows what they know that he may not know.” On communicating with the media after a compromise: “I believe what I said yesterday. I don't know what I said, but I know what I think, and, well, I assume it's what I said.” “If I said yes, that would then suggest that that might be the only place where it might be done which would not be accurate, necessarily accurate. It might also not be inaccurate, but I'm disinclined to mislead anyone.” “Learn to say 'I don't know.' If used when appropriate, it will be often.” “I am not going to give you a number for it because it's not my business to do intelligent work.”

27 Oct 4, 2006Dept Security Contacts Training27 Questions?


Download ppt "Oct 4, 2006Dept Security Contacts Training1 Managing Sensitive Data Harvard Townsend Interim University IT Security Officer 532-2985 College."

Similar presentations


Ads by Google