IT Security/Online Loss Prevention Bill Finnerty Assistant Director of Information Technology Cumberland County.

Slides:



Advertisements
Similar presentations
Secure IT 2005 Panel Discussion Felecia Vlahos, SDSU Sally Brainerd, UCSD Brooke Banks, CSU Chico.
Advertisements

Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
Computer Crimes and Security Professor Matt Thatcher.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background.

Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Security Awareness Presenter: Royce Wilkerson.
Security, Privacy, and Ethics Online Computer Crimes.
Security Controls – What Works
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
INFORMATION SYSTEMS & SERVICES FY Budget Worksession July 17, 2007.
Unit 28- Website Development Assignment 1- THEORY P3
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY Are You Exposed? Network Security.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
Data Protection Act. Lesson Objectives To understand the data protection act.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Introduction to Business Organisations
PCI DSS Managed Service Solution October 18, 2011.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Protecting ICT Systems
WEB DESIGN Dario Smagata
General Awareness Training
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Viruses.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
PCI: As complicated as it sounds? Gerry Lawrence CTO
2015 ANNUAL TRAINING By: Denise Goff
Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Effective Restrictions on Internet Usage What is our responsibility? & What can I do?
STUDY MANAGER Tina Noonan Director of Clinical Research Administration Office of Clinical Research Indiana University School of Medicine.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
EECS 4482 Fall 2014 Session 8 Slides. IT Security Standards and Procedures An information security policy is at a corporate, high level and generally.
Module 11: Designing Security for Network Perimeters.
April 28, A shared commitment to provide the most effective education to all students so they live successful lives. In order to accomplish the.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity for the modern Commercial Brokerage Presented by Brian W. Palm.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Santa Clara, CA (408)
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
THE ___________ PUBLIC LIBRARY WHERE MINDS GROW. Digital Literacy … the ability to use information and communication technologies to find, evaluate, create.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Technology Department Annual Report
Red Flags Rule An Introduction County College of Morris
24/7/365 Remote Computer Support
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

IT Security/Online Loss Prevention Bill Finnerty Assistant Director of Information Technology Cumberland County

What is your gender? 1. Female 2. Male

What age group do you fall into? or less to to to or more

What job classification best fits you? 1. Elected Office 2. Human Resources 3. County Administration 4. Finance 5. Criminal Justice 6. Human Resources 7. IT 8. Other

I am attending this session because 1. I am a geek at heart 2. I am scared out of my mind 3. There was nothing else that interested me in this time slot 4. I heard there would be free food

I am confident in my organization’s IT security 1. Strongly Agree 2. Agree 3. Neutral 4. Disagree 5. Strongly Disagree

Who is the average hacker? Age – 16 to 19 Gender – 90% male Residence – 70% United States Spend an average of 57 hours working on a computer a week Knows c, c++, or perl

1. Albert Gonzalez 2. Cody Reigle 3. Stephen Watt 4. Kevin Mitnick Who is the hacker? 1)2) 3)4)

How much would you be willing to pay for a security assessment? 1. Less than $10k 2. $10k to $30k 3. $30k to $50k 4. More than $50k

Online Fraud 2009 Over $560 million lost in online fraud Zeus botnet is able to over write online bank reports to cover fraud trailbotnet FBI investigates Citibank hack by Russian organized crime 2010 Zeus botnet adds licensing module and automatic notification via IM Most exploits sold in online black markets for $5000 or less

Cumberland County Redevelopment Authority Hack September 22, 2009 $479,000 lost Attack mechanism Clampi Virus Replaced banking website with maintenance message Used remote session to access the bank account Used Electronic Fund Transfers to quickly move money

Breach of Personal Information Notification Act § Notification of breach An entity that maintains, stores or manages computerized data that includes personal information shall provide notice of any breach of the security of the system following discovery of the breach of the security of the system to any resident of this Commonwealth whose unencrypted and unredacted personal information was or is reasonably believed to have been accessed and acquired by an unauthorized person … notice shall be made without unreasonable delay

What can we learn from a 3,000 year old Irish fort about IT security? Defense in depth The key is to have enough warning and delays to be able to react

Perimeter Security Firewall Intrusion Prevention gateway Web proxy server

Internal Security Anti-virus, Anti-malware, Anti-spam, etc Desktop firewall Host based instruction detection Permissions

IT Security Policy Cover what is needed for your environment Internet access Social media Hardware Software Anti-virus, Anti-malware, Anti-spam Use plain English, these are not for the legal and IT departments

Does your organization regularly present IT security training? 1. Yes 2. No

Security Training Know your learners Vary the delivery methods Presentations Video Blogs Contests Gotcha training

What type of bank(s) does your organization do business with? 1. Credit Unions 2. Regional 3. National

Coordinating with your Business Partners Establish a relationship with your banks IT security staff Service level agreements in contracts related to IT security

Resources Budget Man hours Internal vs. External

Assessing IT Security Readiness Industry standards ISO and NIST Special Publication A PCI Security Standard Independent external assessment IT responsibilities Business unit responsibilities Remediation

Questions