Presentation is loading. Please wait.

Presentation is loading. Please wait.

Top Things to Keep in Mind to Protect Yourself and Others

Similar presentations


Presentation on theme: "Top Things to Keep in Mind to Protect Yourself and Others"— Presentation transcript:

1 Top Things to Keep in Mind to Protect Yourself and Others
MANAGING IT SYSTEMS Top Things to Keep in Mind to Protect Yourself and Others

2 1. Passwords are one of the WORST forms of security
Your password can be easily guessed or found. Biometrics is one of the best forms of authentication. Biometrics – the identification of a user based on a physical characteristic Finger prints Hand prints Voice prints Iris/Retinal scan Appearance of your face It may be expensive and intrusive (some feel this way) , but it is worth it.

3 2. Privacy of Your Customers
If you gather or store information about someone, you have the RESPONSIBILITY and OBLIGATION to protect that information from misuse and abuse. You also have the obligation to ensure that it is accurate, especially because that information may be used to make decisions that may affect someone (deny them something they should get or give them something they shouldn’t get) If confidentiality was assumed, others (customers, partners, suppliers) may not trust your business. Pizza Video

4 3. Use of Copyrighted Software
When you buy software, you are purchasing a license to use it. In a legal sense, you don’t own the software. You just have a right to use it. You MUST have one copy of the software or one site license for each machine that is running a particular piece of software. In the US, you may always make one copy of copyrighted software to keep for backup purposes—remember, when you buy copyrighted software, you are paying for the right to use it: that’s all. Software Piracy: the unauthorized use, duplication, distribution, or sale of copyrighted software Did you buy the software or did a friend simply allow you to install a copy on your machine as well? Software Publisher’s Association: The Software Police Most common type of computer crime. In some parts of the world, more than 90% of business software is thought to be pirated. Video

5 4. While you should be concerned about hackers, they are not your primary concern.
38% of security incidents originate within the organization (Employees are the concern) Insiders: legitimate users who purposely or accidentally misuse their access (fraud, embezzlement, harassment) Social engineering: using one’s social skills to trick people into revealing access credentials or other information Many people freely give up their passwords or write them on sticky notes next to their computers, leaving the door wide open to intruders

6 Protect company assets during employee departures http://www
Protect your personal privacy at work

7 5. Protect Your Identity A common way to steal identities online is called phishing. Phishing: a technique used to con people into supplying personal information Watch Bob Video One way is to send out a “legitimate-looking message, asking you to verify important information. Because it looks legitimate, you respond. A newer technique is to send an message to you asking you to click on a link to a web site, where you will then supply personal information

8 6. Ways Organizations Can Protect Themselves
Use content filtering software to: Filter and prevent sensitive info from being transmitted outside the organization. Filter for spam. Filter for viruses (anti-virus software) Block user access to certain web sites. Encrypt data so that someone can’t read it if it is intercepted/stolen (can only be read if someone has the encryption key). Data transmitted wirelessly is EXTREMELY vulnerable and needs to be encrypted. Out in the Open Video

9 Watch Identify Theft Video

10 FIREWALLS One of the most common defenses for preventing a security breach is a firewall Firewall – hardware and/or software that guards a private network by analyzing the information leaving and entering the network Firewall software also provides basic protection to computers where it is installed Basic firewall software incorporated into recent versions of Windows and Mac. A firewall examines each message that wants entrance to the network, and unless the message has the correct marking, the firewall prevents it from entering the network What would happen to an organization that did not have firewalls at the entrance of its networks? This organization’s servers would not be operating for long because they would be hacked by every hacker around

11 FIREWALLS Sample firewall architecture connecting systems located in Chicago, New York, and Boston A firewall examines each message that wants entrance to the network, and unless the message has the correct marking, the firewall prevents it from entering the network Point out to your students the placement of the firewalls between the servers and the Internet Notice the placement of the firewalls between the servers and the Internet

12 7. You can be monitored at work
Why does monitoring happen? Your employer pays you money to do a job. To ensure appropriate behavior on the job. To avoid litigation for employee misconduct Employers can/do monitor The you send and receive using company resources. Screen capture programs Key logger (key trapper) software to capture your keystrokes and/or mouse clicks

13 Ways You Can Be Monitored
Cookie files can be used to track your movements on the Internet. A small record deposited on your hard drive by a web site containing information about you and your web activities. Web logs are also created, consisting of one line for every visitor to a web site. Contains identifying info such as your IP address and your Clickstream. Stored on a web server. Clickstream – records information about you during a web surfing session, such as what sites you visited, how long you were there, what ads you looked at, what you bought, and what links that you clicked on. Cell phone calls, satellite transmissions, and can all be monitored.

14 Ways You Can Be Monitored
Adware - software to generate ads that installs itself on your computer when you download some other (usually free) program from the Web. Adware Spyware (also called sneakware or stealthware)- software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer’s CPU and storage for some task you know nothing about.

15 E-Mail: Hardly Private
Each you send results in at least 3 or 4 copies being stored on different computers as it travels from sender to recipient (it may even be backed up several times as well) Federal law permits employers to monitor all sent and received by employees. Deleted can be retrieved.

16 “The email I receive is personal” vs “Protecting the Company”
Companies are liable for the that is sent using their systems. They are also liable for the they store. Chevron Corporation and Microsoft settled sexual harassment lawsuits for $2.2 million each because employees sent offensive to other employees and management did not intervene. The Microsoft Antitrust Trial People write things in that they would never say in public. Offensive remarks can leave a company defenseless. Company time and equipment are being used

17 Employee Monitoring (image is link to web site

18 PRIVACY Privacy – the right to be left alone and not to be observed without your consent Your actions can be monitored Key logger (key trapper) software & hardware – capture keystrokes and mouse clicks. Can be installed by a hacker or even your employer. Screen capture programs – capture screen from video card: periodically take a snapshot of what is on the screen is completely insecure.

19 Privacy and Employees Companies need information about their employees to run their business effectively As of March 2005, 60% of employers monitored employee s 70% of Web traffic occurs during work hours 78% of employers reported employee Internet abuse 60% employees admitted abusing Internet privileges at work. Since misuse of company resources has become so widespread, employers are tightening their policies on the use of company computers, , and Internet access

20 Privacy and Employees Reasons for monitoring
Cyberslacking – misuse of company resources Visiting inappropriate sites or sites not related to the work that is being performed Gaming, chatting, stock trading, etc. Example of cost of misuse Watching an online fashion show uses as much bandwidth as downloading the entire Encyclopedia Britannica: tied up telecommunications lines for many companies at 3pm one afternoon a few years ago. Reasons for monitoring Ensure appropriate behavior on the job Avoid litigation for employee misconduct

21 So, what can organizations do to protect themselves?

22 Information Security Information security – a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization Lines of Defense First Line of Defense: People Second Line of Defense: Technology CLASSROOM OPENER NOT-SO-GREAT BUSINESS DECISIONS – Scrushy Faces 30 Years in Prison Richard Scrushy, former chief executive of HealthSouth, was convicted of bribing Don Siegelman, former governor of Alabama, for a seat on the state's hospital regulatory board, which oversaw some of his company's facilities. The verdict came a year and a day after Mr. Scrushy was found not guilty of involvement in a $2.7 billion accounting fraud at HealthSouth, which he built from scratch into America's largest provider of rehabilitative healthcare. Mr. Siegelman, a Democrat who was governor from 1999 to 2003, was also convicted of bribery and mail fraud, following a seven-week trial and 11 days of jury deliberations. Prosecutors accused Mr. Siegelman of operating a "pay to play" scheme in which companies and contractors gave political donations in return for contracts and favors. The pair could each face up to 30 years in jail for the crimes. UBS, the Swiss investment bank, was embroiled in the case through its role as former banker to HealthSouth. A former UBS banker testified that the bank had helped engineer Mr. Scrushy's payment to the lottery campaign by forgiving $250,000 in fees it was owed by a healthcare company through which the donation was funneled. Mike Martin, HealthSouth's former chief financial officer, told the jury he had put pressure on UBS, at Mr. Scrushy's behest, to help finance the donation. Mr. Scrushy denied the donation was a bribe, arguing he wanted to foster good relations with the governor and support his push to improve public education through a lottery. HealthSouth was among the raft of US companies where large scale frauds were discovered in the wake of the accounting scandals at Enron and WorldCom.

23 The First Line of Defense - People
The biggest issue surrounding information security is not a technical issue, but a people issue 38% of security incidents originate within the organization Insiders – legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident Social engineering – using one’s social skills to trick people into revealing access credentials or other information valuable to the attacker Organizations must enable employees, customers, and partners to access information electronically Most information security breaches result from people misusing an organization's information either advertently or inadvertently For example, many people freely give up their passwords or write them on sticky notes next to their computers, leaving the door wide open to intruders CLASSROOM EXERCISE A Good Defense Ask your students to research the Internet to find the latest version of the CSI/FBI Computer Crime and Security Survey to find the newest information on computer crime and security breeches

24 The Second Line of Defense - Technology
Three primary information security areas Authentication and authorization Prevention and resistance Detection and response Why do you think technology is the second line of defense? CLASSROOM EXERCISE Discussing Security Statistics on security issues: Review the IM for many current statistics on security

25 AUTHENTICATION AND AUTHORIZATION
Authentication – a method for confirming users’ identities Authorization – the process of giving someone permission to do or have something The most secure type of authentication involves a combination of the following: Something the user knows such as a user ID and password Something the user has such as a smart card or token Something that is part of the user such as a fingerprint or voice signature: biometrics What type of authentication are you using today? User id Password Pin Show id card Answer a question What type of authorization do you experience? What type of authentication is used at your bank? What type of authentication and authorization is used for your online banking? Is it secure? Why or why not?

26 Something the User Knows such as a User ID and Password
User ID and passwords are the most common way to identify individual users, and are the most ineffective form of authentication Passwords are considered the WORST form of computer security. Sometimes id numbers and passwords can be guessed by just randomly trying different combinations. Over 50 percent of help-desk calls are password related Password Sniffer A small program hidden in a network or a computer system that records identification numbers and passwords. Have you ever had your authentication method hacked? What was the outcome? Over 50 percent of help-desk calls are password related

27 Something the User Has such as a Smart Card or Token
Smart cards and tokens are more effective than a user ID and a password Token – small electronic devices that change user passwords automatically You enter in your user id and then pull out the token to see what the new password is. Smart card – a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing. Having the card serves as your identification (may even be used like RFID). Smart cards can act as identification instruments, a form of digital cash, or a data storage device with the ability to store an entire medical record

28 Something That Is Part of the User such as a Fingerprint or Voice Signature
This is by far the best and most effective way to manage authentication Biometrics – the identification of a user based on a physical characteristic Finger prints Hand prints Voice prints Iris/Retinal scan Appearance of your face Unfortunately, this method can be costly and intrusive Eye scans are expensive and people consider them intrusive. Finger prints are cheaper and less intrusive, but also not 100% accurate. How many of you would like to have an iris scan performed each time they entered your classroom? The U.S. government is beginning to use biometrics for passport identification

29 DETECTION AND RESPONSE
If prevention and resistance strategies fail and there is a security breach, an organization can use detection and response technologies to mitigate the damage Antivirus software is the most common type of detection and response technology Intrusion Detection software (IDS) searches for patterns in network traffic to indicate attacks (compares current network traffic against a “listing” of attack characteristics. Looks for people on the network who shouldn’t be there or who are acting suspiciously. There are many examples of virus attacks causing millions and millions worth of damage on the Internet including Jeffrey Parson A single worm can cause massive damage. In August 2003, the “Blaster worm” infected over 50,000 computers worldwide and was one of the worst outbreaks of the year. Jeffrey Lee Parson, 18, was arrested by U.S. cyber investigators for unleashing the damaging worm on the Internet. The worm replicated itself repeatedly, eating up computer capacity, but did not damage information or programs. The worm generated so much traffic that it brought entire networks down.

30 Hackers: people very knowledgeable about computers who use their knowledge to invade other people’s computers White-hat hacker: work at the request of system owners to find system vulnerabilities and plug the holes. Ethical hackers Black-hat hacker: break into other people’s computer systems and may just look around or may steal and destroy information Hactivist: have philosophical and political reasons for breaking into systems. Will often deface a Web site as a political protest. Script kiddies/script bunnies: Wanabe hackers. Have downloaded a program that does all the hacking for them. Don’t have much technical expertise. Often used as a shield by the “real” hackers. Cracker: criminal hacker-a hacker with criminal intent Cyberterrorist: seek to cause harm to people, destroy critical systems or info and use the Internet as a weapon of mass destruction White-hat hackers—work at the request of the system owners to find system vulnerabilities and plug the holes Black-hat hackers—break into other people’s computer systems and may just look around or may steal and destroy information Hactivists—have philosophical and political reasons for breaking into systems and will often deface the Web site as a protest Script kiddies or script bunnies—find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses Cracker—a hacker with criminal intent Cyberterrorists—seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction

31 Security threats to e-business include:
Elevation of privilege: a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system. For example, an attacker might log on to a network by using a guest account, and then exploit a weakness in the software that lets the attacker change the guest privileges to administrative privileges. Hoaxes attack computer systems by transmitting a virus hoax, with a real virus attached. By masking the attack in a seemingly legitimate message, unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends, infecting many users along the way. Malicious code includes a variety of threats such as viruses, worms, and Trojan horses Spoofing is the forging of the return address on an so that the message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses. Elevation of privilege is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system. For example, an attacker might log on to a network by using a guest account, and then exploit a weakness in the software that lets the attacker change the guest privileges to administrative privileges. Hoaxes attack computer systems by transmitting a virus hoax, with a real virus attached. By masking the attack in a seemingly legitimate message, unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends, infecting many users along the way. Malicious code includes a variety of threats such as viruses, worms, and Trojan horses Spoofing is the forging of the return address on an so that the message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses. Spyware is software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer’s CPU and storage for some task the user knows nothing about. According to the National Cyber Security Alliance, 91 percent of the study had spyware on their computers that can cause extremely slow performance, excessive pop-up ads, or hijacked home pages. A snifferis a program or device that can monitor data traveling over a network. Sniffers can show all the data being transmitted over a network, including passwords and sensitive information. Sniffers tend to be a favorite weapon in the hacker’s arsenal. Packet tampering consists of altering the contents of packets as the travel over the Internet or altering data on computer disks after penetrating a network. For example, an attacker might place a tap on a network line to intercept packets as they leave the computer. The attacker could eavesdrop or alter the information as it leaves the network.

32 Security threats to e-business include:
Spyware is software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer’s CPU and storage for some task the user knows nothing about. In a recent study, 91% of the participants had spyware on their computers that can cause extremely slow performance, excessive pop-up ads, or hijacked home pages. A sniffer is a program or device that can monitor data traveling over a network. Sniffers can show all the data being transmitted over a network, including passwords and sensitive information. Sniffers tend to be a favorite weapon in the hacker’s arsenal. Packet tampering consists of altering the contents of packets as the travel over the Internet or altering data on computer disks after penetrating a network. For example, an attacker might place a tap on a network line to intercept packets as they leave the computer. The attacker could eavesdrop or alter the information as it leaves the network. Elevation of privilege is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system. For example, an attacker might log on to a network by using a guest account, and then exploit a weakness in the software that lets the attacker change the guest privileges to administrative privileges. Hoaxes attack computer systems by transmitting a virus hoax, with a real virus attached. By masking the attack in a seemingly legitimate message, unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends, infecting many users along the way. Malicious code includes a variety of threats such as viruses, worms, and Trojan horses Spoofing is the forging of the return address on an so that the message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses. Spyware is software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer’s CPU and storage for some task the user knows nothing about. According to the National Cyber Security Alliance, 91 percent of the study had spyware on their computers that can cause extremely slow performance, excessive pop-up ads, or hijacked home pages. A snifferis a program or device that can monitor data traveling over a network. Sniffers can show all the data being transmitted over a network, including passwords and sensitive information. Sniffers tend to be a favorite weapon in the hacker’s arsenal. Packet tampering consists of altering the contents of packets as the travel over the Internet or altering data on computer disks after penetrating a network. For example, an attacker might place a tap on a network line to intercept packets as they leave the computer. The attacker could eavesdrop or alter the information as it leaves the network.

33 Denial-of-Service Attacks
Denial-of-service (DoS) attacks - flood a Web site with so many requests for service that it slows down or crashes. Quite often, multiple computers are used in DoS attacks.

34 Virus - software written with malicious intent to cause annoyance or damage
Worm: a type of virus that spreads itself via from computer to computer. The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, in order to spread. Worms do not need to attach to anything to spread and can tunnel themselves into computers. Denial-of-service attack (DoS) flood a Web site with so many requests for service that it slows down or crashes. Quite often, multiple computers are used in DoS attacks. Trojan-horse virus: something you don’t want hidden inside something you do want. Backdoor program: viruses that open a way into the network for future attacks Polymorphic virus and worm: change their form as they propagate/spread Worm—a type of virus that spreads itself, not only from file to file, but also from computer to computer. The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, in order to spread. Worms do not need to attach to anything to spread and can tunnel themselves into computers. Denial-of-service attack (DoS)—floods a Web site with so many requests for service that it slows down or crashes the site Distributed denial-of-service attack (DDoS)—attacks from multiple computers that flood a Web site with so many requests for service that it slows down or crashes. A common type is the Ping of Death, in which thousands of computers try to access a Web site at the same time, overloading it and shutting it down. Trojan-horse virus—hides inside other software, usually as an attachment or a downloadable file Backdoor programs—viruses that open a way into the network for future attacks Polymorphic viruses and worms—change their form as they propagate

35 The Love Bug Starts working immediately:
It uses your address book to itself to others. It destroys files .mp3 music files, .jpg picture files, .doc Word files, .xls Excel files, .wav sound files, .html files It can also change your IE start page

36 SoBig Virus Slammer Worm Arrived as e-mail attachment
Searched hard disk for addresses Sent out huge numbers of useless s At its height, SoBig constituted 1 in 17 s worldwide Slammer Worm Flooded the victim server to fill the buffer Sent out 55 million bursts of information per second Found all vulnerable servers in 10 minutes

37 Issues Related to Global Information Systems
A business can’t just worry about its home-country laws, rules and regulations. If a business has global operations, it must also take into account the laws, rules and regulations of the country (countries) where it conducts business.

38 GLOBAL INFORMATION ISSUES
Businesses must have the appropriate levels of authentication, access control, and encryption in place, to ensure… That only authorized individuals can gain access to the network That they have access to only those applications for which they are entitled That information cannot be understood or altered while in transit

39 GLOBAL INFORMATION ISSUES
Deperimeterization - occurs when an organization moves employees outside its firewall, a growing movement to change the way corporations address technology security Companies should focus on beefing up security in end-user devices and an organization's critical information assets Your technology can’t always sit behind a firewall. End-users need to be trained. Deperimeterization occurs when an organization moves employees outside its firewall, a growing movement to change the way corporations address technology security. In a business world where many employees are off-site or on the road, or where businesses increasingly must collaborate with partners and customers, some say it’s not practical to rely on a hardened perimeter of firewalls. Instead, proponents of deperimeterization say companies should focus on beefing up security in end-user devices and an organization’s critical information assets.

40 Information Privacy Transborder data flows (TDF) occur when business data flows across international boundaries over the telecommunications networks of global information systems Many countries view TDF as violating their national sovereignty China, North Korea, Syria, Libya and others limit Internet access. The European Union has some of the strictest regulations regarding transborder data flows. CLASSROOM EXERCISE Making Movies that Change Jeff Skoll made his fortune as the first president of eBay. Now he's spending it at the movies. His company, Participant Productions, makes entertaining, issues-driven films that inspire real change -- Murderball, Syriana, An Inconvenient Truth ... Here, he talks about the people who've inspired him to do good, and about some upcoming films that will open your eyes.

41 European Union Privacy Directives
Any organization processing personal data of a person living in the EU must comply with key principles: Data must be fairly and lawfully processed Processed for limited purposes Adequate, relevant, and not excessive Accurate Not kept longer than necessary Processed in accordance with the data subject’s rights Not transferred to countries without adequate protection In the European Union, you have the right to: Know the source of personal data processing and the purpose of that processing. Access and/or correct inaccuracies in one’s own personal information. Disallow the use of personal data (collected about you) A “safe harbor” program has been created where US companies show evidence of their compliance with EU directives so that they can conduct business with EU nations without worrying about being sued by EU citizens. All member countries of the European Union adhere to a directive on the protection of personal data A directive is a legislative act of the European Union that requires member states to achieve a particular result without dictating the means of how to achieve that result


Download ppt "Top Things to Keep in Mind to Protect Yourself and Others"

Similar presentations


Ads by Google