Thursday, April 3, 2008 Presenters: Dr. Tom Cupples, EdD, CISSP, MCSE Dr. Craig Klimczak, DVM, MS.

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
A Security Analysis of Two Commercial Browser and Cloud Based Password Managers Rui Zhao 1, Chuan Yue 1, Kun Sun 2 University of Colorado Colorado Springs.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
LittleOrange Internet Security an Endpoint Security Appliance.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Steering Committee CSRIC Working Group 2A Cyber Security Best Practices October 7, 2010.
Securing Information Systems
A First Course in Information Security
Information Security Technological Security Implementation and Privacy Protection.
1 Introduction to Security Chapter 11 Information Technology (IT) Security.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
CIS 2200 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Internet Security for Small & Medium Business Week 6
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Cyber Security & Fraud – The impact on small businesses.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
IS Network and Telecommunications Risks Chapter Six.
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Small Business Security Keith Slagle April 24, 2007.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Computer Security By Duncan Hall.
Delivering Assured Services John Weigelt National Technology Officer Microsoft Canada.
Chapter 14: Controlling and Monitoring Access. Comparing Access Control Models Comparing permissions, rights, and privileges Understanding authorization.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Cyber Security – The Changing Landscape Erick Weber Department of Public Works Khaled Tawfik Cyber Security.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Matt Jennings.  Introduction  Value Chains  Major value chains in the illegal market  Means of Communication  Conclusion.
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
Defining your requirements for a successful security (and compliance
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Cybersecurity - What’s Next? June 2017
Network Security Fundamentals
Securing Information Systems
Teaching Computing to GCSE
I have many checklists: how do I get started with cyber security?
Risk of the Internet At Home
Cybersecurity Strategy
Information Security CIS 9002 Kannan Mohan Department of CIS
Cyber Security in New Jersey State Government
Staying safe on the internet
Chapter 9 E-Commerce Security and Fraud Protection
Protecting Your Company’s Most Valuable Asset
Networking for Home and Small Businesses – Chapter 8
Security week 1 Introductions Class website Syllabus review
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

Thursday, April 3, 2008 Presenters: Dr. Tom Cupples, EdD, CISSP, MCSE Dr. Craig Klimczak, DVM, MS

 Security Terms 101  The Security Forecast ◦ Technology Risks ◦ Personnel Risks  The Threat to Higher Education  Tools for Coping Thursday, April 3, 2008

 Threat – potential cause of an unwanted event which could cause damage to an asset  Vulnerability – weakness of an asset that can be exploited by a threat  Impact – a measure of the effect of an event  Risk – the combination of the likelihood of an event and its potential impact  Control – means of managing risk – can be administrative, technical, managerial, or legal in nature Reference - Thursday, April 3, 2008

 VoIP  Professional Attack Toolkits  Virtualization  Online gaming  Vista  Storm Worms  Pump and Dump  Social Networking Sites  Online applications  Phishing Reference - Thursday, April 3, 2008

 Browser vulnerabilities  Botnets  Targeted Phishing  VoIP/Mobile Devices  Insider Attacks  Persistent Bots  Spyware  Web Applications  Blended Phishing with VoIP & Event Phishing  Supply chain attacks Reference - Thursday, April 3, 2008

 Web 2.0  Botnets  Instant Malware  Online Gaming  Vista  Adware  Targeted Phishing  Parasitic Malware  Virtualization  VoIP Reference - Thursday, April 3, 2008

 Botnets  Malware  Online Gaming  Social Networking Sites  Key Dates of Opportunity  Web 2.0  Vista  Mobile Devices Reference - Thursday, April 3, 2008

 Bot Evolution  Election Campaigns  Mobile Platforms  Spam Evolution  Virtual Worlds Reference - Thursday, April 3, 2008

 VoIP/Mobile Devices & Platforms  Professional Attack Toolkits  Virtualization & Vista  Online & Web-based Applications  Browser Vulnerabilities  Botnets & Persistent Bots & Bot Evolution  Spyware  Supply Chain Attacks  Web 2.0  Instant Malware, Parasitic Malware & Adware Thursday, April 3, 2008

 Online Gaming  Storm Worms  Pump and Dump  Social Networking Sites  Event, Targeted, & Blended Phishing  Insider Attacks  Key Dates of Opportunity & Election Campaigns  Virtual Worlds Thursday, April 3, 2008

 Web Applications  Social Engineering  Cyber Terrorism  Communications  Human Error/Lack of Training  Crisis Management  Strong Passwords/ID Protection  Networks (Physical-Wireless, Logical-Social)  Identity Life Cycle Management  PCI Standard for Payment Acceptance Thursday, April 3, 2008

 Microsoft ( s.aspx?familyid=E9C4BFAA-AF88-4AA5- 88D4-0DEA898C31B9&displaylang=en) s.aspx?familyid=E9C4BFAA-AF88-4AA5- 88D4-0DEA898C31B9&displaylang=en  Sun Microsystems ( tyThreats.pdf) tyThreats.pdf Thursday, April 3, 2008

 Education  Policy Development  Procedure Development & Personnel Training  Monitoring Thursday, April 3, 2008

 Federal Bureau of Investigation (  Law Enforcement Training Site ( bs/02.html) bs/02.html  Department of Homeland Security ( Thursday, April 3, 2008

 International Telecommunications Union (  Federal Communications Commission (  National Institute of Standards and Technology ( Thursday, April 3, 2008

 Education  Policy Development  Procedure Development & Personnel Training  Monitoring Thursday, April 3, 2008

 Missouri Department of Homeland Security (  Missouri Campus Security Task Force ( x.htm) x.htm  FEMA (  Local Law Enforcement Thursday, April 3, 2008

 Microsoft “How-to” ( eate.mspx) eate.mspx  Microsoft ‘Password Checker” ( ecker.mspx) ecker.mspx  Microsoft - What is a Strong Password? ( /d406b c-4c2a-8de2- 9b7ecbfa6e mspx?mfr=true) /d406b c-4c2a-8de2- 9b7ecbfa6e mspx?mfr=true  SANS Tutorial ( cation/1636.php) cation/1636.php Thursday, April 3, 2008

 Use Encryption for ◦ Storing Usernames and Passwords ◦ Transmitting Usernames and Passwords ◦ Storing Files ◦ Transmitting files on a  Local Area Network  Virtual Private Network  Intranet/Extranet  Use two factor authentication when possible  Enforce Strong Passwords  Use Password Policies that require timely changes in passwords Thursday, April 3, 2008

◦ Microsoft ( chnologies/idm/ilm.mspx) chnologies/idm/ilm.mspx ◦ Sun Microsystems ( papers/identity_enabled_ilm.pdf) papers/identity_enabled_ilm.pdf Thursday, April 3, 2008

 PCI Standard Website (  PCI Standard White Paper ( pci_dss_v1-1.pdf) pci_dss_v1-1.pdf  PCI Forum ( Thursday, April 3, 2008

 There is no guarantee of total security.  The best that can be accomplished is managing the threats  Know your enemy! Thursday, April 3, 2008

Dr. Tom Dr. Craig Thursday, April 3, 2008