Security Planning Susan Lincke Security Awareness: Brave New World.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
User Awareness and Practices B Phaneuf  The internet allows an attacker to attack from anywhere on the planet.  Risks caused by poor security.
User Awareness and Practices.  The internet allows an attacker to attack from anywhere on the planet.  Risks caused by poor security knowledge and practice:
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
User Awareness and Practices
 Surveillance State  Information Warfare  Cyber Crime  Hacktivism  Vandalism  Experimentation.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Security, Privacy, and Ethics Online Computer Crimes.
Cyber X-Force-SMS alert system for threats.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Viruses & Destructive Programs
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Security for Seniors SeniorNet Help Desk
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Cyber Crimes.
Viruses.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
CYBER CRIME.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Computer security By Isabelle Cooper.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Issues for Computer Users, Electronic Devices, Computer and Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
User Awareness and Practices Andy Wiener Director, Information Technology FAME.
IT Security  .
Instructor Materials Chapter 7 Network Security
Security Awareness: Brave New World
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Deji Abioye & Segun Odejide
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Security Planning Susan Lincke Security Awareness: Brave New World

Security Planning: An Applied Approach | 6/13/2016 | 2 Study Sheet The student shall be able to: Describe the following attack types, who is involved and the information they hope to obtain or actions they hope to accomplish: Hacktivism, cyber-crime, cyber warfare, surveillance state Define attacks: virus, worm, logic bomb, trojan horse, social engineering, phishing, pharming, botnet, zombie, man in the middle, rootkit, dictionary attack, spyware, keystroke logger, ransomware. Define the role of these security techniques and technologies: firewall, security patches, secure behavior Define passwords using three techniques. Define how fraud is commonly found in an organization.

Security Planning: An Applied Approach | 6/13/2016 | 3 History of Cyber-Security Surveillance State Information Warfare Cyber Crime Hacktivism Vandalism Experimentation

Security Planning: An Applied Approach | 6/13/2016 | 4 Cracker: Computer-savvy programmer creates attack software Script Kiddies: Unsophisticated computer users execute programs Hacker Bulletin Board SQL Injection Buffer overflow Password Crackers Password Dictionaries Successful attacks! Crazyman broke into … CoolCat penetrated… Malware package=$1K-2K Experimentation

Security Planning: An Applied Approach | 6/13/2016 | 5 A virus attaches itself to a program, file, or disk When executed, the virus activates, replicates Malware Infection Rates: ○ Web: 1 in 566 ○ 1 in 196 ○ 40% of data breaches Program A Extra Code Program B infects Malware includes Virus

Security Planning: An Applied Approach | 6/13/2016 | 6 Independent program sends copies of itself from computer to computer across networks Click on attachment to execute the worm May send itself to addresses in your list May carry other forms of malware To Joe To Ann To Bob List: Worm

Security Planning: An Applied Approach | 6/13/2016 | 7 Social engineering manipulates people into performing actions or divulging confidential information. 29% of Breaches Phone Call: This is John, the System Admin. What is your password? Transfer $ from Nigeria ABC Bank has a problem with your account Watch this funny video… see attached You have a notice from Facebook Social Engineering - Phishing

Security Planning: An Applied Approach | 6/13/2016 | 8 The fake web page looks like the real thing Extracts account information Pharming = Fake Web Pages

Security Planning: An Applied Approach | 6/13/2016 | 9 An attacker pretends to be your final destination on the network. The attacker may look like a strong WLAN access point. 1% of hacking attacks Man in the Middle Attack

Security Planning: An Applied Approach | 6/13/2016 | 10 After penetration, hacker installs a rootkit Eliminates evidence of break-in Modifies the operating system Rate of infection/malware Rootkit: 39% Backdoor: 66% Keystroke logger:75% Backdoor entry Keystroke Logger Hidden user Rootkit

Security Planning: An Applied Approach | 6/13/2016 | 11 Surveillance State Information Warfare Cyber Crime Hacktivism Vandalism Experimentation Example Hacktivist: Anonymous Political causes, e.g.: Middle East Democracy WikiLeaks Mexican Miner’s rights Bad ways, e.g.: Web defacement DDOS attacks on Visa, MasterCard, MPAA Computer hacking 2% of external breaches History of Cyber-Security

Security Planning: An Applied Approach | 6/13/2016 | 12 Cross international boundaries Distributed Denial of Service: Attack web pages $100 per 1000 infected computers Command & Control: 51% of malware attacks Botnet

Security Planning: An Applied Approach | 6/13/2016 | 13 Surveillance State Information Warfare Cyber Crime Hacktivism Vandalism Experimentation Target: Finance, Retail, Food 55% of external breaches Cost of Credit Card Numbers: U.S.: $10 European: $50 Bulk: $1 or more History of Cyber-Security

Security Planning: An Applied Approach | 6/13/2016 | 14 Silently tracks the keys you enter Sends credit card info, password to the criminal You see unusual charges on credit card statement 75% of Malware Keystroke Logger

Security Planning: An Applied Approach | 6/13/2016 | 15 Trojan Horse: Masquerades as beneficial program The Zeus Trojan: Infected millions of computers Mostly in the U.S. and often via Facebook today: top 5 malware problems Steals bank passwords and empties accounts Can impersonate a bank website Trojan Horse

Security Planning: An Applied Approach | 6/13/2016 | 16 Gonzalez cracked and exposed over 170 million credit card numbers Stole from: Barnes & Noble, Boston Market, OfficeMax, Sports Authority, TJ Maxx, Dave & Buster’s, Marshall’s, Heartland Payment Systems, 7-Eleven, and Hannaford Brothers Sentenced to 20 years prison, 2009 Followed by 3 years supervised release 2003 arrested & released: became informant to Secret Service War Driving and Hacking

Security Planning: An Applied Approach | 6/13/2016 | 17 Skimmers used at ATMs, gas stations, stores. Skimmers make up 91% of physical security attacks (35%) Skimmers match color of bank ATMs Manufactured in bulk, by 3D printers Check for loose parts; hide PIN Gonzalez encode PINs onto debit card magnetic strips ATM – Point of Sale Credit Card Fraud

Security Planning: An Applied Approach | 6/13/2016 | 18 “You are infected. Buy antivirus.” “You’ve stored underage pornography. Pay a fine or go to jail. Notice from FBI” CryptoLocker: “Your disk has been encrypted. Pay to decrypt.” Pay in 72 hours or else… Backup can be corrupted – MS Shadow Massachusetts Police dept. paid $750 Ransomware

Security Planning: An Applied Approach | 6/13/2016 | 19 PatternCalculationResultTime to Guess (2.6x10 18 /month) Personal Info: interests, relatives20Manual 5 minutes Social Engineering1Manual 2 minutes American Dictionary80,000< 1 second 4 chars: lower case alpha x chars: lower case alpha26 8 2x chars: alpha52 8 5x chars: alphanumeric62 8 2x min. 8 chars alphanumeric x min. 8 chars: all keyboard95 8 7x hours 12 chars: alphanumeric x years 12 chars: alphanumeric x years 12 chars: all keyboard x chars: alphanumeric x10 28 Password Cracking: Dictionary Attack versus Brute Force

Security Planning: An Applied Approach | 6/13/2016 | 20 Surveillance State Information Warfare Cyber Crime Hacktivism Vandalism Experimentation 2010 Stuxnet worm: Developed by U.S., Israel Hit Iranian nuclear power plants damaged nearly 1000 centrifuges nearly 1/5 of those in service Iran attacked American banks, oil companies History of Cyber-Security

Security Planning: An Applied Approach | 6/13/2016 | 21 Next wars will be computer attacks to power, water, financial systems, military systems, etc Cyberweapons are MUCH cheaper than military Causes as much damage High priority: Protecting utilities, infrastructure New black market in 0-day attacks. Governments pay more > $150,000/bug Govts. include Israel, Britain, India, Russia, Brazil, North Korea, Middle Eastern countries, U.S. New hacking firms openly publicize products Information Warfare

Security Planning: An Applied Approach | 6/13/2016 | 22 Surveillance State Information Warfare Cyber Crime Hacktivism Vandalism Experimentation 21% external breaches: State affiliated 96% from China History of Cyber-Security

Security Planning: An Applied Approach | 6/13/2016 | 23 People’s Liberation Army targets manufacturing, research, military aircraft NY Times fought off China for 4 months Who gave info on P.M. Wen Jiabo? 45 mostly-new malware Attacked from 8 AM-midnight China time Stole all passwords; hacked 53 PCs Discussed repeatedly at Pres. Level China says U.S. guilty (Snowden) China – IPR Theft

Security Planning: An Applied Approach | 6/13/2016 | 24 NSA has requested/manipulated: Water down encryption Install backdoors in software Collect communication data Verizon, Google, Yahoo, Microsoft and Facebook were coerced into …? Gag orders prevent companies from speaking Yahoo/Google: nearly 200 million records, Dec 2012 Includes metadata (headers) and content Snowden Releases…

Security Planning: An Applied Approach | 6/13/2016 | 25 Lavabit provided secure services… including to Edgar Snowden FBI wanted Software, Private Key and Passwords for ALL clients Ladar Levison, President Lavabit fought off court orders, then closed company “I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States.” Effect: Buyers wary of products from surveillance-state/info warfare countries Lavabit

Security Planning: An Applied Approach | 6/13/2016 | 26  Yes  No Is Your Computer Safe?

Security Planning: An Applied Approach | 6/13/2016 | 27  Yes  No Is Your Computer Safe? “The confidence that people have in security is inversely proportional to how much they know about it.” -Roger Johnston

Security Planning: An Applied Approach | 6/13/2016 | 28 Symptoms: Antivirus software detects a problem Pop-ups suddenly appear (may sell security software) Disk space disappears Files or transactions appear that should not be there System slows down to a crawl Stolen laptop (1 in 10 stolen in laptop lifetime) Often not recognized Recognizing a Break-in or Compromise

Security Planning: An Applied Approach | 6/13/2016 | 29 (Additional) Spyware symptoms: Change to your browser homepage/start page Searches end up on a strange site Firewall turns off automatically Lots of network activity while not particularly active New icons, programs, favorites which you did not add Frequent firewall alerts about unknown programs trying to access the Internet Often not recognized Malware Detection

Security Planning: An Applied Approach | 6/13/2016 | 30

Security Planning: An Applied Approach | 6/13/2016 | 31 Anti-virus software detects malware and can remove it before damage is done For PC, Tablet, Smartphone Install, keep anti-virus software updated Anti-virus is important but limited in capability Antivirus - Antispyware

Security Planning: An Applied Approach | 6/13/2016 | 32 Do not open attachments unless you expect the with attachment you trust the sender Do not click on links in s unless you are absolutely sure of their validity Only visit and/or download software from web pages you trust Avoid Social Engineering and Malicious Software

Security Planning: An Applied Approach | 6/13/2016 | 33 Web Request Ping Request FTP request Connect Request Web Response Telnet Request Response SSH Connect Request DNS Request Response Web Response Illegal Source IP Address Illegal Dest IP Address Microsoft NetBIOS Name Service Use a Firewall

Security Planning: An Applied Approach | 6/13/2016 | 34 Microsoft regularly issues updates to fix security problems Windows Update should automatically install updates. Avoid logging in as administrator Protect your Operating System

Security Planning: An Applied Approach | 6/13/2016 | 35 Create a Good Password

Security Planning: An Applied Approach | 6/13/2016 | 36 Combine 2 unrelated words Mail + phone = Abbreviate a phraseMy favorite color is blue= Mfciblue Music lyricDeck the halls with boughs of holly, Fa la la la la la la la la la Dthwboh,F9xl Create a Good Password, Cont’d

Security Planning: An Applied Approach | 6/13/2016 | 37 Password Recommendations PCI DSS vers. 3 [PCIv3] CIS Microsoft Windows 8 [CIS8] Password length7 characters14 characters Account lockout threshold6 invalid attempts5 invalid attempts Account lockout duration (clears lockout counter) 30 minutes15 minutes Screen saver time-out15 minutes Max. password age90 days60 days Min. password ageNot specified1 day Password history retention424 Password complexity requirements Numeric and alphabetic3 of 4: uppercase alpha, lowercase alpha, numeric, punctuation

Security Planning: An Applied Approach | 6/13/2016 | 38 Always use secure browser to do online purchasing Never use a Debit card on-line.  Frequently delete temp files, cookies, history, saved passwords etc. Symbol showing enhanced security Kind-of Secure On-line Financial Transactions

Security Planning: An Applied Approach | 6/13/2016 | 39 Disappearing info: Malware, ransomware, disk failure, … What information is important to you? Is your back-up: Recent? Off-site & Secure? Process Documented? Tested? Encrypted? Back up Important Information

Security Planning: An Applied Approach | 6/13/2016 | 40 Threat TypeYear: Example Threats Experiment1984: Fred Cohen publishes “Computer Viruses: Theory and Experiments” Vandalism1988: Jerusalem Virus deletes all executable files on the system, on Friday the 13 th. 1991: Michelangelo Virus reformats hard drives on March 6, Michelangelo’s birthday. Hactivism2010: Anonymous’ Operation Payback hits credit card and communication companies with DDOS after payment cards refuse to accept payment for Wiki-Leaks. Cyber-crime2007: Zeus Trojan becomes ‘popular’; turns computers into zbots and spyware steals payment card numbers. 2008, 2009: Gonzales re-arrested for sniffing WLANs and implanting spyware, affecting 171 million credit cards. 2013: In July 160 million credit card numbers are stolen via SQL Injection Attack. In Dec., 40 million credit card numbers and 70 million customer information are stolen through Target stores. California indicates 167 data breaches are reported this year. Information Warfare 2007, 2008: Russia launches DDOS attack against Estonia, then Georgia news, gov’t, banks 2010: Stuxnet worm disables 1000 of Iran’s nuclear centrifuges. Surveillance State 2012: State affiliated actors mainly tied to China quietly attack U.S./foreign businesses to steal intellectual property secrets, summing to 19% of all forensically analyzed breaches 2013: Lavabit closes secure service rather than divulge corporate private key to NSA without customers’ knowledge. Summary – Examples of Types