Air Force Association (AFA) 1. 1.Disaster Recovery Plan 2.Plan to Recover 3.Legal Regulations 4.Cyberlaws 5.Computer Crime 2 AGENDA 6.Attacks on Networks.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Security+ Guide to Network Security Fundamentals
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Chapter 1 Introduction to Security
Threats and Attacks Principles of Information Security, 2nd Edition
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
CYBER CRIME AND SECURITY TRENDS
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Securing Information Systems
Information Security Technological Security Implementation and Privacy Protection.
“Breach of Privacy” nPresented by Sumit Yadav. Computer Science and Engineering Computer security Aspects nPrivacy (confidentiality ) n integrity n availability.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
ISMS for Mobile Devices Page 1 ISO/IEC Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.
Cyber crime & Security Prepared by : Rughani Zarana.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Unethical use of Computers and Networks
CYBER CRIME.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
What is Spam? d min.
Chap1: Is there a Security Problem in Computing?.
Cybercrime What is it, what does it cost, & how is it regulated?
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Privacy, Security and Ethics
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Issues for Computer Users, Electronic Devices, Computer and Safety.
ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Information Security and Privacy in HRIS
Securing Information Systems
Add video notes to lecture
GCSE ICT SECURITY THREATS.
Chapter 19.1 Cyberlaw and Cybercrime
A Project on CYBER SECURITY
Securing Information Systems
Five Unethical Uses of Computers
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
Faculty of Science IT Department By Raz Dara MA.
Forensic and Investigative Accounting
Computer Security By: Muhammed Anwar.
Presentation transcript:

Air Force Association (AFA) 1

1.Disaster Recovery Plan 2.Plan to Recover 3.Legal Regulations 4.Cyberlaws 5.Computer Crime 2 AGENDA 6.Attacks on Networks 7.Intellectual Property & Privacy Laws 8.Laws to Protect against Cyber Crime 9.Lab

How do you protect data from this? Minimize the effects Handle the disaster right after it hits 3 Disaster Recovery Protected data will: 1.Be Available 2.Have Integrity 3.Be Confidential

Identify Critical Functions What functions are essential to keep the business going? What resources do those functions require? How long can the business survive without operating? How much can you afford to spend for protection? 4 Disaster Recovery Plan EXAMPLE: In a hospital where electronic records can save lives, the data is critical and success depends on access to the data The Resources required are servers, computers, networks, backup systems. People are aslo critical to operate the systems.

Backup Data Backup Servers (could use Cloud Servers) Backup Facilities (could be pre-fab or shared) Plan for Outsourcing Services and Staffs Agreements with other businesses for short- term use of facilities and infrastructure Backup Power systems Backup Heating and Air Conditioning systems Extra supplies (paper, forms, cables) Documentation Plan to Recover 5

Legal Regulations 6 Unique types of crimes developed along with the increased use of technology, exploiting these new tools. Stalkers abuse social web sites and chat rooms in anonymity. Fraud, theft and embezzlement lurked on the internet in the form of phishing attacks and scams and financial dealings. Criminals discovered vulnerabilities in the complex systems, blackmailing networks and intercepting bank transfers. Businesses, Banks, Hospitals, Schools and Government facilities were suddenly at risk. New efforts launched to develop effective laws, policies and law enforcement procedures to catch the criminals and bring them to justice. Technology is evolving at an exponential rate and the legal system is struggling to keep up. Companies conduct business across the US and internationally, expanding the challenge to develop effective laws, policies and methods of enforcement.

“Cyberlaws” Computer Crime Laws 7 International and National Cyberlaws deal with unauthorized changes to personal information, destruction or disclosure of information, unauthorized access and inserting malicious code into systems to disrupt or disable them. EXAMPLES OF CYBER CRIMES: (CISSP, Shon Harris) Attacks on Financial systems to steal money or info Attacks on military installations for info or materials Spying on industries to obtain confidential data Information Warfare attacks on national infrastructure “Hactivism” – attacking websites and defacing them as a protest against the government or companies Distributed Denial of Service Attacks Capture passwords or other sensitive data, install malware, rootkits and sniffers Carry out a buffer overflow to take control of a system Cyber porn and stalking (especially of children)

Computer Crime 8 Most criminals are never caught because they destroy the logs that track their movements and use innocent people’s systems to conduct attacks. They find vulnerabilities and insert malicious code like Trojan Horses and Zombies (which conduct the attack for the criminals. Law Enforcement at local police stations, FBI, Secret Service and government security had to learn new ways to protect the chain of custody and new forensic methods. RESPONSES by VICTIM COMPANIES: Patch software, Patched hardware or infrastructure, Install additional security software, Conduct forensic investigation, Change security policies, Change or replace systems or software, Report intrusions to law enforcement, Attempted to identify the criminal, Notified victims of attack, Provided new security services, Used third-party investigators, Reported crimes to public media

Attacks on Networks 9 According to a 2010 article by Lance Whitney, spam shot up to 200 billion messages each day in to 90% of all s sent to organizations were spam, and spam carrying malware surged during the second half of 2009 from 600 million to 3 billion a day. Attackers used social networks like Facebook and Twitter to inject malware. Twitter’s shortened URLs were exploited to misdirect users to fake sites. Attackers used business accounts to spread malware to thousands at a time, injecting malware, causing damage across networks. International companies and federations are increasing efforts to notify each other of criminal activities and resolve jurisdiction issues across the countries with varied legal systems. Some legal systems use religious laws to govern. Interpol or the International Police cooperate to share information and resolve crimes. Sometimes governments are involved in the attacks, complicating the issues. Another very dangerous threat is one that is within an organization, where the attacker has access to all the sensitive data and can hide from detection.

Intellectual Property and Privacy Laws 10 These laws deal with protection for music, software or data that are owned by an individual or company from unauthorized duplication or use. INTELLECTUAL PROPERTY: PESONALLY IDENTIFIABLE INFO: Trade SecretsName CopyrightsSocial Security or National ID Number TrademarksIP Address PatentsVehicle Registration Drivers License Number Face, Fingerprints or Handwriting Credit Card Numbers Digital ID Birthday or Age and/or Birthplace Genetic Info or Gender Name of School and Grades Criminal Record

Laws to Protect against Cyber Crime Some Examples Below 11 Sarbanes-Oxley Act (SOX) : Public Company Accounting Reform and Investor Protection Act of 2002: Enforces standards for safe transfer and protection of data and funds USA Patriot Act of 2001: Allows Federal agencies to access more data and information to protect Americans against terrorism Health Insurance Portability and Accountability Act: National Standards and procedures for the storage, use and transmission of personal medical information and healthcare data. Gramm-Leach-Bliley Act of 1999: Financial Privacy Rules, Safeguards Rule and Pretexting Protection (social engineering) Computer Fraud and Abuse Act: Lists illegal acts using computers in unauthorized ways to obtain data or information

Policy Lab 12 Learn to: Enable Editing Force a minimal password length Force password change every 30 days Force password history Set an account lockout threshold Protect your credit cards Use security for your personal information