© Copyright 2010 Hewlett-Packard Development Company, L.P. 1 1 Marco Casassa Mont Cloud & Security Lab HP Labs, Bristol, UK Risk Exposure to Social Networks.

Slides:



Advertisements
Similar presentations
Chapter 1 Business Driven Technology
Advertisements

PSHE education in the Secondary Curriculum An overview of the subject.
Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC) 3 3 Sept 2014 MIT House of Security and Measurement of Security Perceptions.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Learning Center Webinar Series Strategies for Alumni Associations Using Presenting: Molly Wasko, PhD
Risk and Resilience Delivered by Alba
Introduction to Enterprise Risk Management (ERM)
Tax Risk Management Keeping Up with the Ever-Changing World of Corporate Tax March 27, 2007 Tax Services Bryan Slone March 27, 2007.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
On Privacy-aware Information Lifecycle Management (ILM) in Enterprises: Setting the Context Marco Casassa Mont Hewlett-Packard.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Panel: Business Impact of Research.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
CORPORATE RISK MANAGEMENT & INSURANCE BY R P BLAH D.G.M. INCHARGE THE ORIENTAL INSURANCE COMPANY LIMITED REGIONAL OFFICE BHUBANESWAR.
Information Systems Controls for System Reliability -Information Security-
Privileged and Confidential Strategic Approach to Asset Management Presented to October Urban Water Council Regional Seminar.
Introduction to Network Defense
Tackling racial discrimination in the workplace Nicola Power & Verity Lewis.
Corporate Social Responsibility- do we need a Statutory Instrument? Presented to the Zambia Alternative Mining Indaba conference- July 17, 2013 Sombo Chunda,
© Copyright 2010 Hewlett-Packard Development Company, L.P. 1 1 Risk Assessment and Decision Support for Security Policies IEEE Policy 2011 Symposium Marco.
Career culture Class of 2012 survey results Career Success Plan Internships CI student experience Parents’ role GW Career Success.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
SEC835 Database and Web application security Information Security Architecture.
Team 2 Andrew Boyd Kaven Williams.  Privacy, Security and Compliance Issues  Current State of Research  Implications  Areas of Research Opportunity.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Chapter 7 The Recruiting Process
Delivering an Architecture for the Social Enterprise Alpesh Doshi, Fintricity Information Age Social&Mobile Business Conference Tuesday 31st January 2012.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Margaret J. Cox King’s College London
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
1 Moderator: Thomas N. Shorter, Godfrey & Kahn, S.C. Panelists: Nancy Davis, Ministry Health Care Lee Kadel, Wheaton Franciscan Healthcare Ralph Topinka,
IT Risk Management, Planning and Mitigation TCOM 5253 / MSIS 4253
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
© 2003 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Global Citizenship Walt Rosenberg.
Chapter 4 Copyright © 2011 by Nelson Education Ltd. 1 Prepared by Norm Althouse University of Calgary Prepared by Norm Althouse University of Calgary.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
NCAR’s Societal Impacts Program: WIST-Related Research Efforts Julie Demuth NCAR Societal Impacts Program 3 rd National Surface Transportation Weather.
Public Relations DPR 3B Template for a Public Relations Strategy based on the TOCOM Model Learning Unit 2.3 Student Manual pp August 2011.
Carl Wirdak Occidental Petroleum Corporation GEMI Gemstones Environmental Management Systems GEMI Conference March 2003.
Strategic Planning Workshop 2 Environmental Scan Stakeholder Engagement SWOT Analysis.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Public Affairs Management
Major Issues in Knowledge Management C.VIJAY KUMAR International School of Information Management University of Mysore MYSORE th December,2008.
Conficker Update John Crain. What is Conficker? An Internet worm  Malicious code that is self-replicating and distributed over a network A blended threat.
Information, Analysis, and Knowledge Management in the Baldrige Criteria Examines how an organization selects, gathers, analyzes, manages, and improves.
Marv Adams Chief Information Officer November 29, 2001.
Developing an Investment Governance Framework
Digital brand management strategies Part 1
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Risk Management for Small & Medium Sized Enterprises
Why BI….? Most companies collect a large amount of data from their business operations. To keep track of that information, a business and would need to.
H2020 FOCUS ON EDUCATION Creat-it Conference
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Managing Marketing Information 4 Principles of Marketing.
INNOVATIVE USE OF ICTS: TOWARDS A CITIZEN- DRIVEN PUBLIC SECTOR Barbara-Chiara Ubaldi Project Manager, E-government Public Sector Reform Directorate for.
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
HEALTH WEALTH CAREER April 28, 2016 STRICTLY PRIVATE & CONFIDENTIAL The information included in this report is strictly confidential and is proprietary.
The Online Workplace: Virtuality Group A. Matt PhilipMahendraAlan PaulMichaelEd.
Internet of Things Business Case Template. Powered by InfoTech, provided by Atlantic BT Summarize the business case for analyzing the Internet of Things.
Workshop on Research Methods to Study Productivity Determinants Within Firms and the Role of Policy November 1, 2012 P olicy setting and firm-level focus.
LINKAGES BETWEEN INSTITUTIONS OF HE, VET AND LABOUR MARKET MR NIKOS IOANNOU.
Internet law Business law.
Presentation transcript:

© Copyright 2010 Hewlett-Packard Development Company, L.P. 1 1 Marco Casassa Mont Cloud & Security Lab HP Labs, Bristol, UK Risk Exposure to Social Networks in Enterprises CCCS Conference 2011 Newcastle, 15 March 2011

© Copyright 2010 Hewlett-Packard Development Company, L.P. 2 Outline Adoption of Social Networks in Enterprises Analysis of Involved Threats and Risks Decision Support for Risk Assessment Conclusions

© Copyright 2010 Hewlett-Packard Development Company, L.P. 3 Outline Adoption of Social Networks in Enterprises Analysis of Involved Threats and Risks Decision Support for Risk Assessment Conclusions

© Copyright 2010 Hewlett-Packard Development Company, L.P. 4 Adoption of Social Networks Widespread usage of Social Networks by People, World Wide: “Nearly one in five Internet users is tweeting on Twitter or using another service to share personal and business updates, or to see updates about others (Pew Internet & American Life Project, 2009)”

© Copyright 2010 Hewlett-Packard Development Company, L.P. 5 Usage of Social Networks in Enterprises Increasing Usage of Social Networks by Employees: - Within the Organisation - At Home (potentially with Work Equipment…) - When Travelling … Blurring the Boundaries between Work and Private Life: - Consumerization - Reflected by the Information shared in Social Networks …

© Copyright 2010 Hewlett-Packard Development Company, L.P. 6 Statistics - Employees’ Adoption of Social Networks Source: NetProspex Social Report, May 2010 (100K contacts) Ranking of US Organisations, Based on their Employees’ usage of Social Networks (100K contact records)

© Copyright 2010 Hewlett-Packard Development Company, L.P. 7 Statistics - Employees’ Adoption of Social Networks Source: NetProspex Social Report, May 2010 (100K contacts) Social Network Membership in US Largest Companies

© Copyright 2010 Hewlett-Packard Development Company, L.P. 8 Statistics - Employees’ Approach to Social Networks Deloitte Ethics & Workplace Survey, 2009: 1/3rd of employed respondents say they never consider what their boss would think before posting materials online. 61% of employees say that even if employers are monitoring their social networking profiles or activities, they won’t change what they are doing online 54% of employees say a company policy won’t change how they behave online

© Copyright 2010 Hewlett-Packard Development Company, L.P. 9 Statistics - Employees’ Approach to Social Networks - 1 st Annual Risk Index of Social Networks of SMBs Study - Panda Security Report (315 SMBs, 1000 employees): 77% employees Use Social Networks during Work Hours 33% infected by Malware distributed by these communities …

© Copyright 2010 Hewlett-Packard Development Company, L.P. 10 Advantages for Enterprises –Sharing Knowledge –Collaborations –Potential Productivity Increase – in specific Work Areas … –Utilization of Social Networks for Enterprise Functions: Sharing Corporate Messages Looking for Job Candidates … –But there are Issues too …

© Copyright 2010 Hewlett-Packard Development Company, L.P. 11 Outline Adoption of Social Networks in Enterprises Analysis of Involved Threats and Risks Decision Support for Risk Assessment Conclusions

© Copyright 2010 Hewlett-Packard Development Company, L.P. 12 Threat Areas for Organisations –Data Leakage –Reputational Damage –Malware & Virus Attacks –De-Perimeterisation of Organisation’s Information Boundaries –Compliance & Legal Implications –Loss of Productivity –…

© Copyright 2010 Hewlett-Packard Development Company, L.P. 13 Attack Surface & Attack Vectors Attack Surface -Personal and Confidential Information, disclosed to Social Networks -Compromised Systems and IT Infrastructure (e.g. due to Malware downloaded from Social Networks) -Employees … Attack Vectors -Employees & Insiders -External Attackers (Hackers, Competitors, Criminals, etc.) - Data aggregation & correlation (using various Automation Tools) - Social Attacks (bogus accounts, etc.) - …

© Copyright 2010 Hewlett-Packard Development Company, L.P. 14 Key Threat: Malware & Malicious Code Some Statistics WebSense 2010 Threat Report: 40% of all Facebook status updates have links: 10% of those links are either spam or malicious 65% of Top 100 (and 95% of Top 20) most popular Websites categorized as Social Networking or Search …

© Copyright 2010 Hewlett-Packard Development Company, L.P. 15 Key Threat: Data Leakage –Which Personal and Business (Confidential) Information is actually stored out there? –Who is Looking at it? What can they Learn? –Many ways to Learn about Organisations’ Tactics and Strategies, based on Information posted by Employees: Correlations Data Mining Deductions & Intuitions Tools automating the heavy and mechanical data mashing activities …

© Copyright 2010 Hewlett-Packard Development Company, L.P. 16 Data Leakage: Types of “Attacks” on Social Networks [1/2] Vertical Attacks -Attacks focusing on the profile of one of more individuals within a Social Network -Profiling of Employees -Aggregate Profiles & Data provided by different Employees -Correlation of Information Provided by Employees In the same Company - e.g. A few Employees of Company X and Area Y suddenly looking for new Job Opportunities … Social Network X + + Employees’ Profiles & Posted Data Attackers’ Data Aggregation & Correlation

© Copyright 2010 Hewlett-Packard Development Company, L.P. 17 Data Leakage: Types of “Attacks” on Social Networks [2/2] Horizontal Attacks -Attacks focusing on the Profile & Data of one of more individuals with presence in multiple Social Networks -Aggregation and Correlation of Profiles & Data across various Social Networks Social Network X + + Employee’s Profiles & Posted Data Social Network Y Social Network Z Attackers’ Data Aggregation & Correlation

© Copyright 2010 Hewlett-Packard Development Company, L.P. 18 Are Organisations Prepared? - In general Organisations are not Prepared to Address the Involved Risks -Typical Extreme Approaches: - Over-Reaction (block accesses …) vs. Under-Reaction (ignore the problem …) -Many Security Professionals still believe that Social Media is a Personal Platform … -Frost & Sullivan’s Global Information Security Workforce Study (GIWS – Information Security Professionals): - Organisations allowing employees to access Facebook (51%) or Linkedin (63%) at work - 28% of their organisations have no restrictions on the usage of social media (31% for EMEA region…)

© Copyright 2010 Hewlett-Packard Development Company, L.P. 19 Outline Adoption of Social Networks in Enterprises Analysis of Involved Threats and Risks Decision Support for Risk Assessment Conclusions

© Copyright 2010 Hewlett-Packard Development Company, L.P. 20 How to Help Enterprises to Address Risks? –Which Strategy should Organisations Follow? −It depends on the Context, Organisational Culture & Environment, Employees, … –Which Investments Should they Make? −Education, Enforcement (e.g. Blocking Access), Monitoring, Hybrid Investments … ? –Limitation of Risk Assessment based on ISO 2700x: −ISO 2700x Provides a General Framework −Coarse Grained … −Still need to be contextualised to the specific Organisational Reality …

© Copyright 2010 Hewlett-Packard Development Company, L.P. 21 Need to Provide Strategic Decision Support –Target Key Decision Makers (CIOs, CISOs, Risk Officers, etc.) –Illustrate the “Risk Exposure” due to the Adoption of Social Networks - based on the actual Employees’ Attitude, Processes and Controls (grounding to the Organisation’s Reality) –Illustrate, in advance (“What-if” analysis) the implications of making specific Decisions and/or Investments –Explore suitable “trade-offs” for Strategic Aspects of relevance (Economics): Security Risks, Productivity, Compliance, Costs, …

© Copyright 2010 Hewlett-Packard Development Company, L.P. 22 Problems with Security Investments –Security Investments affect multiple outcomes: budget, confidentiality, integrity, availability, … –In most situations these outcomes can only be predicted with high degrees of uncertainty –Often the outcomes are inter-related (trade-off) and the link to investments is poorly understood –Classical business justification/due diligence (Return on Security Investment, cost benefit analysis) encourages these points to be glossed over

© Copyright 2010 Hewlett-Packard Development Company, L.P. 23 R&D: Potential Approaches to Move Forward 1. Security Analytics 2. Situational Awareness

© Copyright 2010 Hewlett-Packard Development Company, L.P. 24 Security Analytics Providing Strategic Decision Support –R&D Work carried out at HP Labs, Bristol, UK (transferring to HP Information Security – HP Business Group) –Collaboration with UK “Trust Economics” Government-sponsored Project: Economics, Maths Foundations, Cognitive Science & Human Factors UCL, Newcastle University, Bath University, (Merrill Lynch in transition to National Grid), HP Labs

© Copyright 2010 Hewlett-Packard Development Company, L.P. 25 Security Analytics –Providing Strategic Decision Support to Decision Makers (e.g. CIOs, CISOs, etc.) –Using Modelling and Simulation to Represent Process, IT Systems, Interactions, Human Behaviours and their Impact on Aspects of Relevance: Security Risks, Productivity, Costs, … –Carry out “What-If” Analysis and Make Predictions, based on Alternative Investments, Threat Environments, etc.

© Copyright 2010 Hewlett-Packard Development Company, L.P. 26 Security Analytics: Integrating Scientific Knowledge Economic Theory (utility, trade offs, externalities, information asymmetry, incentives) Applied Mathematics (probability theory, queuing theory, process algebra, model checking) Experiment and Prediction (Discrete event modelling and simulation) Empirical Studies (Grounded theory, discourse analysis, cognitive science) CISO / CIO / Business Security/Systems Domain knowledge Business Knowledge

© Copyright 2010 Hewlett-Packard Development Company, L.P. 27 Problem Definition Problem Definition Empirical Data Gathering Empirical Data Gathering Modelling Simulation Outcome Analysis Outcome Analysis Validation Security Analytics Methodology

© Copyright 2010 Hewlett-Packard Development Company, L.P. 28 Applying Security Analytics Risk Assessment in Social Networks –Identify Suitable Metrics to Convey “Risk Exposure”: Amount of Leaked Data Amount of Data Prevented from Leaking Exposure of Company-related data to Social Networks … Type of data … –Create Grounded Models of: Employees behaviours Enterprise Policies, Processes and Controls Cause-effect relationships at the base of Data Leakage … Effectiveness of Current Controls Threat Environments (e.g. Attackers, etc.) and Types of Attacks … –Simulations – What-if Analysis …

© Copyright 2010 Hewlett-Packard Development Company, L.P. 29 Event: Employee’s Access to SN Access Location? At Work Outside Work Process: Choice of Suitable SNx Process: Choice of Suitable SNx Process: Selection of SN Activity (Share, Read, Delete …) Access Attempt Blocked or Discouraged By Enterprise Controls? NO Data Disclosure To SNx? Data Leakage? YES OUTPUT MEASURES - # Confidential Data Exposed - # Types of Data SNx Status: - Disclosed Data - Type of Data Data Deletion In SNx? NO SNx Status: - Disclosed Data - Type of Data SNx Status: - Disclosed Data - Type of Data YES Event: Attack Selection of Attack Activity Process: Identification of Targeted SNx Successful Attack? YES OUTPUT MEASURES - # of confidential information retrieved -Types of data - Types of attacks Security Analytics (Template) Model YES

© Copyright 2010 Hewlett-Packard Development Company, L.P. 30 Modelling Aspects –Types of Organisational Controls: Enforcement Controls Educations Monitoring and Punishment –Level of Investment/Effectiveness of Controls: 0: none, 1: Low, 2: Medium, 3: High –Types of Data and Potential Value –Involved Costs Function(Enforcement[Level], Education[Level], Monitoring&Punishment[Level]) –Attackers: Motivations and Skills –Overall Risk Exposure: Function (attacker_skill_level, attacker_motivation_level) * Information_Disclosed(value)

© Copyright 2010 Hewlett-Packard Development Company, L.P. 31 Simulations & What-If Analysis Investments = (Control, Education, Monitoring) Experimental Results - Cost vs. Risk Trade-offs:

© Copyright 2010 Hewlett-Packard Development Company, L.P. 32 Experimental Results Risk Exposure based on Attackers’ Factors Attacker’s Profile = (Skill, Motivation) Risk Exposure

© Copyright 2010 Hewlett-Packard Development Company, L.P. 33 Role of “Situational Awareness” –“Trust but Control” –Monitoring strategic Organisational Assets, Communications and Information Flows –Leveraging emerging Security Information and Event Management Solutions/Frameworks (SIEM) –Get early warning about Trends and Threats –Obtain “grounded data” to support Security Analytics activities …

© Copyright 2010 Hewlett-Packard Development Company, L.P. 34 Importance of Understanding the Threat Environment –Nature of Threats –Motivations of Attackers and Related Ecosystem –How to Disrupt the Threat Environment Investing in Additional Controls Disrupting the Ecosystem of the Attackers … –Work in Progress …

© Copyright 2010 Hewlett-Packard Development Company, L.P. 35 More Information … IEEE Computer Magazine Using Modeling and Simulation to Evaluate Enterprises' Risk Exposure to Social Networks January 2011 (vol. 44 no. 1) pp. – Anna Squicciarini, Pennsylvania State University Sathya Dev Rajasekaran, Pennsylvania State University Marco Casassa Mont, HP Labs HP Information Security Trust Economics - / /

© Copyright 2010 Hewlett-Packard Development Company, L.P. 36 Outline Adoption of Social Networks in Enterprises Analysis of Involved Threats and Risks Decision Support for Risk Assessment Conclusions

© Copyright 2010 Hewlett-Packard Development Company, L.P. 37 Conclusions –Trend: Increasing Adoptions of Social Networks by Employees –Potential Exposure to High Risks. Organisations are Unprepared on How to React … –Risk Assessment Methodologies like ISO 2700x shows their Limits. Need for Decision Support based on Scientific Methods … –Security Analytics (based on Modelling and Simulations) can play a key Role in this Space –Importance of Situational Awareness and Understanding of Threat Environment –Work in Progress …

© Copyright 2010 Hewlett-Packard Development Company, L.P. 38 Q&A Marco Casassa Mont HP Labs, Bristol, UK