1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun...

67
1 IT Security and IT Security and Privacy Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu

Transcript of 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun...

Page 2: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

2

IT Security IT Security Information securityInformation security is the is the

process of process of protecting information protecting information systemssystems and and datadata from from

unauthorized access, use, unauthorized access, use, disclosure, destruction, disclosure, destruction,

modification, or disruption. modification, or disruption. Information securityInformation security is is

concernedconcerned with the with the confidentiality, integrity, and confidentiality, integrity, and

availability of availability of datadata regardless of regardless of the form the data may take: the form the data may take:

electronic, print, or other formselectronic, print, or other forms..

http://en.wikipedia.org/wiki/It_security, viewed April 2nd, 2007

Page 3: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

3

OverviewOverview

Why is it important?Why is it important? Role of CSORole of CSO Costs of IT SecurityCosts of IT Security Security ThreatsSecurity Threats Practices to mitigate threatsPractices to mitigate threats Case StudyCase Study Case StudyCase Study

Page 4: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

4

Why is IT Security Important?Why is IT Security Important?

““Security breachesSecurity breaches are as are as commoncommon in today’s in today’s business landscape as bad coffee and business landscape as bad coffee and briefcases.”briefcases.”

Computer systemsComputer systems are are vulnerablevulnerable to many to many threats that can inflict various types of damage threats that can inflict various types of damage resulting in significant losses. This damage can resulting in significant losses. This damage can range from errors harming database integrity to range from errors harming database integrity to fires destroying entire computer centers. fires destroying entire computer centers.

An Introduction to Computer Security: The NIST Handbook, National Institute of Standards and Technology. U.S. Department of CommerceSpecial Publication 800-12

http://www.cio.com/article/28648/Data_Breaches_Preparation_Damage_Control_and_a_Recent_History, April 2, 2008

Page 5: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

5

46% of Respondents said that their organization

had experienced a

security incident in

2007

Why is IT Security Why is IT Security Important?Important?

Gordon, Lawrence, Martin Loeb, William Lucyshn, and Robert Richardson. “Computer Crime and Security Survey”. Computer Security Institute. 2007.

Page 7: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

7

Trends in Information Security Trends in Information Security BreachesBreaches

Security is increasing as a top management concern.

Luftman, J., Kempaiah, R., and Nash, E., Key Issues for IT Executives 2005, MIS Quarterly Executive, Vol. 5, No. 2, June 2006, pp 81-99

Page 8: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

8

Trends in Information Security Trends in Information Security BreachesBreaches

The percentage

of companies

with a written security

policy has increased

from 47% in 2004 to 62%

in 2006.

http://http://www.industrialcontroldesignline.com/showArticle.jhtml;jsessionid=XDVFQM3C2DBASQSNDLOSKH0CJUNN2JVN?articleID=204200898&queryText=Written+Security+Policy/, viewed April 2, 2008

Page 9: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

9

Trends in Information Security Trends in Information Security BreachesBreaches

Figure 2. Security breaches are getting more serious.

http://http://www.industrialcontroldesignline.com/showArticle.jhtml;jsessionid=XDVFQM3C2DBASQSNDLOSKH0CJUNN2JVN?articleID=204200898&queryText=Written+Security+Policy/, viewed April 2, 2008

Severity Level of Security Breaches

0-10 Scale of Severity

Page 11: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

11

Chief Security OfficerChief Security Officer (CSO) is (CSO) is a corporation's top a corporation's top executive who is responsible for securityexecutive who is responsible for security. The CSO . The CSO serves as the business leader responsible for the serves as the business leader responsible for the development, implementation and management of the development, implementation and management of the organization’s corporate security vision, strategy and organization’s corporate security vision, strategy and programs. programs. They direct staff in identifying, developing, They direct staff in identifying, developing, implementing and maintaining security processes implementing and maintaining security processes across the organization to reduce risks, respond to across the organization to reduce risks, respond to incidents, and limit exposure to liability in all areas of incidents, and limit exposure to liability in all areas of financial, physical, and personal risk;financial, physical, and personal risk; establish establish appropriate standards and risk controls associated with appropriate standards and risk controls associated with intellectual property; and direct the establishment and intellectual property; and direct the establishment and implementation of policies and procedures related to implementation of policies and procedures related to data security.data security.

CSOCSO

http://en.wikipedia.org/wiki/Chief_Security_Officer, view April 2, 2008

Page 12: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

12

Most CSOs have an IT Background (63%)Most CSOs have an IT Background (63%) Others: (37%)Others: (37%)

Corporate Security Corporate Security MilitaryMilitary Law Enforcement Law Enforcement Business Operations Business Operations Audit Audit

Background of CSOBackground of CSO

Petersen, Rodney,Petersen, Rodney, The Role of the CSO, The Role of the CSO, Educause, September/October, 2006, pp. 73-82.Educause, September/October, 2006, pp. 73-82.

Page 13: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

13

Oversee a network of security directors and Oversee a network of security directors and vendors who safeguard the companies vendors who safeguard the companies assets, intellectual property, and computer assets, intellectual property, and computer systems, along with the physical safety of systems, along with the physical safety of employees and visitorsemployees and visitors

Role of CSORole of CSO

Petersen, Rodney,Petersen, Rodney, The Role of the CSO, The Role of the CSO, Educause, September/October, 2006, pp. 73-82.Educause, September/October, 2006, pp. 73-82.

http://images.google.com/imgres?imgurl=http://www.csointerchange.org/images/cso_interchange_logo.gif&imgrefurl=http://www.csointerchange.org/bios/bios-chicago-05/&h=93&w=303&sz=5&hl=en&start=19&um=1&tbnid=Zu6MFMM7sH-YvM:&tbnh=36&tbnw=116&prev=/images%3Fq%3Dcso%2BSymantec%2BCorporation%2B%26um%3D1%26hl%3Den, viewed April 10, 2008

Page 14: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

Identify protection goals, objectives, and Identify protection goals, objectives, and metrics consistentmetrics consistent with corporate strategic with corporate strategic plansplans

ManageManage the development and the development and implementationimplementation of global security policy, of global security policy, standards, guidelines, and procedures to standards, guidelines, and procedures to ensure ongoing maintenance of securityensure ongoing maintenance of security

Role of CSO (Cont’d)Role of CSO (Cont’d)

Petersen, Rodney,Petersen, Rodney, The Role of the CSO, The Role of the CSO, Educause, September/October, 2006, pp. 73-82.Educause, September/October, 2006, pp. 73-82.

Page 16: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

16

IT Security CostsIT Security CostsAverage losses in 2007 were $345,000 per respondent

Gordon, Lawrence, Martin Loeb, William Lucyshn, and Robert Richardson. “Computer Crime and Security Survey”. Computer Security Institute. 2007.

Page 17: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

17

IT Security CostsIT Security Costs

The figure above shows the total losses as reported by the 2005 CSI/FBI Annual Computer Crime and Security Survey. http://www.acunetix.com/websitesecurity/web-hacking.htm, viewed March 27, 2008

Page 18: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

18

IT Security CostsIT Security Costs

Gordon, Lawrence, Martin Loeb, William Lucyshyn, and Robert Richardson. “Computer Crime and Security Survey”. Computer Security Institute. 2007.

Are Costs equalizing?

Page 19: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

19Information Security Magazine July 1999 - "Top Obstacle is Budget: What is the SINGLE greatest obstacle to

achieving adequate infosecurity at your organization?"

What is the SINGLE greatest

obstacle to achieving adequate

infosecurity at your

organization?"

IT Security CostsIT Security Costs

Page 21: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

21

21

Many types of threats exist.

Gordon, Lawrence, Martin Loeb, William Lucyshyn, and Robert Richardson. “Computer Crime and Security Survey”. Computer Security Institute. 2006. PP 1-25.

Page 22: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

22

Types of Attacks or AbuseTypes of Attacks or Abuse

Gordon, Lawrence, Martin Loeb, William Lucyshyn, and Robert Richardson. “Computer Crime and Security Survey”. Computer Security Institute. 2007. PP 1-25.

Page 23: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

23

Who is Attacking?Who is Attacking?

http://www.esecurityplanet.com/, Viewed April 2, 2008

Page 24: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

24

2 Types of threats that can affect both Individual and

Organizational Security:

1.Natural Threats- Weather, Deterioration, Accidents, etc

2. Man Made Threats - Hacker, Spam, Phishing, Identity

Theft, Terrorism

Page 25: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

25

Natural Security ThreatsNatural Security Threats

WeatherWeather

DeterioratiDeteriorationon

AccidentsAccidents

-Do you have backup data stored offsite?

- Do you have a plan?

Page 26: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

26

PhishingPhishingIdentity TheftIdentity TheftTerrorismTerrorism

Man Made Security Man Made Security ThreatsThreats

What do you have in place to prevent these things from happening?

Page 27: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

27

PhishingPhishing

An attempt to criminally and fraudulently acquire An attempt to criminally and fraudulently acquire sensitive information, such as usernames, sensitive information, such as usernames, passwords and credit card details, by masquerading passwords and credit card details, by masquerading as a trustworthy entity in an electronic as a trustworthy entity in an electronic

communication.communication.

Man Made Security Man Made Security ThreatsThreats

http://en.wikipedia.org/wiki/Phishing, viewed April 2, 2008

Page 28: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

28

Risk of Phishing Risk of Phishing

According to the Kaspersky Lab, 45% of the According to the Kaspersky Lab, 45% of the online activity requires users to disclose online activity requires users to disclose personal or financial data.personal or financial data.

The top online activities listed by home PC The top online activities listed by home PC users that require the disclosure of personal users that require the disclosure of personal information were information were bankingbanking(20%), (20%), shoppingshopping(15%), and (15%), and travel bookingtravel booking(10%). (10%).

http://www.lexisnexis.com.ezproxy.umsl.edu, Inter Business News on Jan 9, 2007 View on Mar 3, 2008

Page 29: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

29

Risk of Phishing Risk of Phishing

Presently, the risk of phishing is attacking Presently, the risk of phishing is attacking both both businessbusiness and and personal personal transactions.transactions.

The main purpose of phishing is to steal The main purpose of phishing is to steal financial datafinancial data..

There were around 14,156 fake websites in There were around 14,156 fake websites in 2006, increase from 1,713 in 2005. (The Sun) 2006, increase from 1,713 in 2005. (The Sun)

http://www.lexisnexis.com.ezproxy.umsl.edu, The Sun: Still @ IT on Oct 23, 2007 View on Mar 3, 2008

Page 30: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

30

Risk of Phishing (Cont)Risk of Phishing (Cont)

According to the Sun poll as of 2007, According to the Sun poll as of 2007, a thirda third of the internet users responded to the email of the internet users responded to the email they did not know. they did not know.

15%15% thought a website was secure if it thought a website was secure if it claimed to belong to a well know company claimed to belong to a well know company but were unable to distinguish a secure but were unable to distinguish a secure website from the fake one.website from the fake one.

http://www.lexisnexis.com.ezproxy.umsl.edu, The Sun: Still @ IT on Oct 23, 2007, Viewed on Mar 3, 2008

Page 31: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

Most Targeted Industry Sectors in December 2007

http://www.antiphishing.org, Phishing Activity Trends Report for 2007 by Anti-Phishing Working Group (APWG) viewed March 4, 2008

Financial service is the most targeted industry sector of all attacks record at 91.7%.

Page 32: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

Top 10 Phishing Sites Hosting Countries

http://www.antiphishing.org, Phishing Activity Trends Report for 2007 by Anti-Phishing Working Group (APWG) viewed March 4, 2008

The United States is the 1st rank phishing sites hosting.

Page 33: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

33

Example of the phishingExample of the phishing

The real example happened to an UMSL The real example happened to an UMSL email several recently.email several recently.

The UMSL email sever was attacked from the The UMSL email sever was attacked from the phishing email which claimed that it came phishing email which claimed that it came from the Central Bank from the Central Bank

Page 34: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

34

Example of the phishing Example of the phishing (Con’t)(Con’t)

http://www.centralbank.net7idpersonalbanking-secure-survey-id-58274.28secure.net.jikao.com.tw/.https://www.centralbank.net/

Page 35: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

35

Some Tips to avoid risk of Some Tips to avoid risk of phishing phishing

Do not complete a form in an e-mail message Do not complete a form in an e-mail message that ask you for personal informationthat ask you for personal information

Enter personal information only at the secure Enter personal information only at the secure website (https)website (https)

Avoid clicking the link in the e-mail messageAvoid clicking the link in the e-mail message Never type PIN or secret data via e-mailNever type PIN or secret data via e-mail

Page 36: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

36

Man Made Security Man Made Security ThreatsThreats

Identity TheftIdentity TheftCrimes involving illegal usage of another individual's identity. The most common form of identity theft is credit card fraud. While the term is relatively new, the practice of stealing money or getting other benefits by pretending to be a different person is thousands of years old.

http://en.wikipedia.org/wiki/Identity_Theft, Viewed April 2, 2008

Page 37: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

37

Types/ Cost of Identity theftTypes/ Cost of Identity theft

Crimes involving illegal usage of another individual's Crimes involving illegal usage of another individual's identity identity

Types:Types: Financial Identity TheftFinancial Identity Theft (using another's identity to obtain (using another's identity to obtain

goods and services)goods and services) Criminal Identity TheftCriminal Identity Theft (posing as another when (posing as another when

apprehended for a crime) apprehended for a crime) Identity CloningIdentity Cloning (using another's information to assume his or (using another's information to assume his or

her identity in daily life)her identity in daily life) Business/Commercial Identity TheftBusiness/Commercial Identity Theft (using another's (using another's

business name to obtain credit) business name to obtain credit)

Page 38: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

38“Identity Theft by Victims Age”. Identity Theft Data Clearinghouse. May 12 2006. PP 2-32.

Page 39: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

39

Man Made Security Man Made Security ThreatsThreats

TerrorismTerrorismThose acts which are intended to create fear (terror), are perpetrated for an ideological goal and by a member or members of a group (as opposed to being carried out in a lone attack), and which deliberately target, or else disregard the safety of, non-combatants (civilians).

http://en.wikipedia.org/wiki/Terrorism, Viewed 4/02/2008

Page 40: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

40

Threat AssessmentThreat Assessment

You can look at threat assessment two ways:You can look at threat assessment two ways:

QualitativeQualitative – an “educated best guess” based on – an “educated best guess” based on opinions of knowledgeable others gained through opinions of knowledgeable others gained through interviews, history, tests, and personal experienceinterviews, history, tests, and personal experience

QuantitativeQuantitative – uses statistical sampling based on – uses statistical sampling based on mathematical computations determining the mathematical computations determining the probability of an occurrence based on historical probability of an occurrence based on historical datadata

Kovacich, Gerald L., Information Systems Security Officer’s Guide: Butterworth Heinemann, 2003.

Page 41: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

41Gordon, Lawrence, Martin Loeb, William Lucyshn, and Robert Richardson. “Computer Crime and Security Survey”. Computer Security Institute. 2007.

Security Audits were 63% useful in evaluating the effectiveness of security technology

Page 42: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

42

Insurance PoliciesInsurance Policies

Gordon, Lawrence, Martin Loeb, William Lucyshn, and Robert Richardson. “Computer Crime and Security Survey”. Computer Security Institute. 2007.

Page 43: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

43

Practices to Mitigate ThreatsPractices to Mitigate Threats

Biometric SecurityBiometric Security Intrusion Prevention SystemIntrusion Prevention System

Page 44: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

44

Biometric SecurityBiometric Security

Use computerized method to identify a Use computerized method to identify a person by their unique physical or behavioral person by their unique physical or behavioral characteristicscharacteristics

Provide extremely accurate and secure Provide extremely accurate and secure access to informationaccess to information

http://news.bbc.co.uk/2/shared/spl/hi/guides/456900/456993/html/default.stm, Biometric Technology. BBC News. March 4, 2008. http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=10, Biometric Technology Overview. March 4, 2008.

Page 45: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

45

Example of BiometricExample of Biometric Fingerprint Identification – the process of Fingerprint Identification – the process of

automatically matching one or unknown automatically matching one or unknown fingerprint against a database of know and fingerprint against a database of know and unknown patternunknown pattern

Iris Scan - provide an analysis of the rings, Iris Scan - provide an analysis of the rings, furrows, and freckles in the colored ring furrows, and freckles in the colored ring which surrounds the pupil of the eyewhich surrounds the pupil of the eye

http://news.bbc.co.uk/2/shared/spl/hi/guides/456900/456993/html/default.stmhttp://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=10http://en.wikipedia.org/wiki/Biometric

Page 46: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

46

Intrusion Prevention SystemIntrusion Prevention System

Next Generation FirewallNext Generation Firewall It is a computer security device that monitors It is a computer security device that monitors

network and system activities for malicious or network and system activities for malicious or unwanted behavior and can react in real-timeunwanted behavior and can react in real-time

http://en.wikipedia.org/wiki/Intrusion_Prevention_System

Page 47: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

47

Washington Mutual Phishing Case

Page 48: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

48

Washington Mutual Overview

Founded in 1889

Retailer of financial services Mortgage Lending Commercial Banking Other Financial Services

CIO - Debora D. Horvath

Prior to joining WaMu, she served as senior vice president and CIO for Richmond, Virginia-based GE Insurance. There, she led a global information technology organization with a $500 million budget.

Assets of 333.62 billion

More than 2,400 Retail Banking

Source:http://www.rsa.com/press_release.aspx?id=6801, viewed April 10, 2008http://www.wamu.com/business/default.asp, viewed April 11 th, 2008

Page 49: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

49

Phishing trip: Washington Mutual

http://www.infectionvectors.com/library/phishing_trip_wamu-iv.pdf,, viewed April 10, 2008

Page 50: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

50

Current Practice of Online Banking Security

Washington Mutual further protects its online users with multi-factor authentication solution

http://www.wamu.com/business/default.asp

Page 51: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

51

RSA Cyota Consumer Solutions

RSA Cyota Consumer Solutions, a division of RSA Security Inc., offers proven solutions for online banking and e-commerce that range from adaptive

Authentication – with risk-based technology, one-time-passwords and transaction-signing – to anti-Phishing services and real-time transaction monitoring that controls fraud and manages risk.

The company’s eFraudNetwork™ community is the world’s most effective cross-bank collaborative online fraud network. Today, many of the world’s top 50 banks, including nine of the top 12 banks in North America and the UK, use RSA Cyota solutions to protect approximately 430 million consumers.

http://www.baselinemag.com/c/a/Projects-Security/Security-Case-Washington-Mutual-Gets-a-Line-on-Phishing/

Page 52: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

52

Authentication

"Washington Mutual is once again taking a proactive approach to protecting our customers by securing their accounts and personal information with superior, flexible, cutting-edge technology. By doing so, Washington Mutual customers will continue to benefit from the convenience and ease of online banking with the utmost confidence," said Dave Cullinane, chief information security officer at Washington Mutual and International President of the Information Systems Security Association.

Washington Mutual’s enhanced security will analyze every online login and transaction behind the scenes and score the potential risk based on a broad range of criteria, including the user’s IP address, geographic location, prior transaction behaviors and much more. When a potential risky situation is detected, it can invoke additional authentication methods in real-time. In addition, because online fraud crosses international boundaries, WaMu is further protecting its customers by joining a real-time world-wide fraud detection network.

http://www.baselinemag.com/c/a/Projects-Security/Security-Case-Washington-Mutual-Gets-a-Line-on-Phishing/

Page 53: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

Case Study:

What is Ameren?

53

Page 54: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

Company Overview Provide energy to approximately

2.4 million electric customers and nearly 1 million gas customers in IL and MO.

Ameren created via mergers. Union Electric (UE) Central IL Public Service Co.

(CIPSCO) Central IL Light Co. (CILCO) Illinois Power (IP)

Headquarters in St. Louis, MO 9,000 employees

http://www.ameren.com/AboutUs/ADC_AU_FactSheet.pdf, viewed March 28, 2008

54

Page 55: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

CEO Ameren

CEO Ameren Services Other CEO’s

Other VP’s Sr. VP Admin

VP Info Technology

Manager IT Security and Planning

Ameren Organizational Chart

Other Directors and Managers

Supv IT Financial PlanningSupv IT InfrastructureAccount Consultants

http://scholar/orgchart/ChartApp.aspx?defaultredirect=true&action=viewinorgchart&key=19721, March 20, 2008

Managing Supv IT Security & Plan

IT Security Analyst, Architects, Engineers

55

Page 56: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

56

Security IT Background 530 IT employees

5 Full time employees for information security.

IT security budget is 1% of annual IT Budget 600K O&M 400K Capital

1 manager type, 6 supervisors, 3 account consultants

30 technical architects, engineers, analyst.

Linda Nappier, Manager IT Security – Planning, Interview with Scott Wibbenmeyer, April 10, 2008

http://scholar/orgchart/ChartApp.aspx?defaultredirect=true&action=viewinorgchart&key=19721, March 20, 2008

56

Page 57: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

5757

Linda Nappier, Manager IT Security – Planning, Interview with Scott Wibbenmeyer, April 10, 2008

Page 58: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

58

Top Security Risk

1. Data loss (Customer and Corporate) – Image

2. Viruses

3. External Attacks (firewall attacks)

4. Internal Attacks (email virus, spam, bots)

5. Phishing – Social Engineering

Mark Habrock and Edmond Rogers, Security Analyst, Interviewed in person by Scott J. Wibbenmeyer, April 8, 2008

Page 59: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

59

IT Security Technologies

Access Control Systems Physical Security

Enterprise Security Management System Card readers limiting access to hardware rooms and security

personnel.

Data Security Access Policy Network Access Control Software Limiting access to software and networks on an as needed

bases. Disabling Blue tooth capabilities on Ameren equipment (i.e.

cell phones)

Mark Habrock and Edmond Rogers, Security Analyst, Interviewed in person by Scott J. Wibbenmeyer, April 8, 2008

59

Page 60: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

60

IT Security Technologies

Firewalls Intrusion Detection System (IDS) Over 1 million attacks against firewall a year 24 hr personnel monitoring of Firewall 6000 firewall rules Monitors IP address of attack

Mark Habrock and Edmond Rogers, Security Analyst, Interviewed in person by Scott J. Wibbenmeyer, April 8, 2008

60

Page 61: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

61

IT Security Technologies

Two Factor Authentication – Tokens & Passwords RSA SecurID Token

Anti-Virus Software Symantec

Email is evaluated by Symantec off-site

Network Pattern Software Monitors usage patterns of network

Mark Habrock and Edmond Rogers, Security Analyst, Interviewed in person by Scott J. Wibbenmeyer, April 8, 2008

61

Page 62: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

62

IT Security Technologies

Anti-Spam Software Frontbridge – relay service Personnel updating trigger points. Over 4.3 million spam emails blocked a day

Policies Remote Access Internet Usage - Websense Equipment Procurement Communication Policy Disaster Recovery Policy Audit Policy

Mark Habrock and Edmond Rogers, Security Analyst, Interviewed in person by Scott J. Wibbenmeyer, April 8, 2008

62

Page 63: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

63

Walk Away Today Safer - Quick Summary

Protect your personal information. It's valuable. Don’t cut Security to save money. Use antivirus and personal firewall software and update both

regularly. Be sure to set up your operating system, Network and Web

browser software properly, and update them regularly. Protect your passwords. Back up important files. Learn who to contact if something goes wrong online.

Page 64: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

?? Questions ??

Page 65: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

65

References http://en.wikipedia.org/wiki/It_security, viewed April 2nd, 2007 An Introduction to Computer Security: The NIST Handbook, National Institute of Standards and Technology. U.S.

Department of CommerceSpecial Publication 800-12

http://www.cio.com/article/28648/Data_Breaches_Preparation_Damage_Control_and_a_Recent_History, April 2, 2008 Gordon, Lawrence, Martin Loeb, William Lucyshn, and Robert Richardson. “Computer Crime and Security Survey”.

Computer Security Institute. 2007. Luftman, J., Kempaiah, R., and Nash, E., Key Issues for IT Executives 2005, MIS Quarterly Executive, Vol. 5, No. 2,

June 2006, pp 81-99 http://http://www.industrialcontroldesignline.com/

showArticle.jhtml;jsessionid=XDVFQM3C2DBASQSNDLOSKH0CJUNN2JVN?articleID=204200898&queryText=Written+Security+Policy/, viewed April 2, 2008

http://http://www.industrialcontroldesignline.com/showArticle.jhtml;jsessionid=XDVFQM3C2DBASQSNDLOSKH0CJUNN2JVN?articleID=204200898&queryText=Written+Security+Policy/, viewed April 2, 2008

http://en.wikipedia.org/wiki/Chief_Security_Officer, view April 2, 2008 Petersen, Rodney, The Role of the CSO, Educause, September/October, 2006, pp. 73-82. http://images.google.com/imgres?imgurl=http://www.csointerchange.org/images/

cso_interchange_logo.gif&imgrefurl=http://www.csointerchange.org/bios/bios-chicago-05/&h=93&w=303&sz=5&hl=en&start=19&um=1&tbnid=Zu6MFMM7sH-YvM:&tbnh=36&tbnw=116&prev=/images%3Fq%3Dcso%2BSymantec%2BCorporation%2B%26um%3D1%26hl%3Den, viewed April 10, 2008

Petersen, Rodney, The Role of the CSO, Educause, September/October, 2006, pp. 73-82. http://www.acunetix.com/websitesecurity/web-hacking.htm, viewed March 27, 2008 Information Security Magazine July 1999 - "Top Obstacle is Budget: What is the SINGLE greatest obstacle to achieving

adequate infosecurity at your organization?" Gordon, Lawrence, Martin Loeb, William Lucyshn, and Robert Richardson. “Computer Crime and Security Survey”.

Computer Security Institute. 2007. PP 1-25. http://www.esecurityplanet.com/, Viewed April 2, 2008 http://en.wikipedia.org/wiki/Phishing, viewed April 2, 2008

Page 66: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

66

References (Continued) http://www.lexisnexis.com.ezproxy.umsl.edu, Inter Business News on Jan 9, 2007 View on Mar 3, 2008 http://www.lexisnexis.com.ezproxy.umsl.edu, The Sun: Still @ IT on Oct 23, 2007 View on Mar 3, 2008 http://en.wikipedia.org/wiki/Identity_Theft, Viewed 4/02/2008 “Identity Theft by Victims Age”. Identity Theft Data Clearinghouse. May 12 2006. PP 2-32. http://en.wikipedia.org/wiki/Terrorism, Viewed 4/02/2008 Kovacich, Gerald L., Information Systems Security Officer’s Guide: Butterworth Heinemann, 2003. Gordon, Lawrence, Martin Loeb, William Lucyshyn, and Robert Richardson. “Computer Crime and Security

Survey”. Computer Security Institute. 2007. http://news.bbc.co.uk/2/shared/spl/hi/guides/456900/456993/html/default.stm http://en.wikipedia.org/wiki/Biometric, April 2, 2008 http://www.wamu.com/business/default.asp, viewed April 11th, 2008 :http://www.rsa.com/press_release.aspx?id=6801, viewed April 10, 2008 http://www.infectionvectors.com/library/phishing_trip_wamu-iv.pdf,, viewed April 10, 2008 http://www.baselinemag.com/c/a/Projects-Security/Security-Case-Washington-Mutual-Gets-a-Line-on-

Phishing/ http://www.ameren.com/AboutUs/ADC_AU_FactSheet.pdf, viewed March 28, 2008 http://scholar/orgchart/ChartApp.aspx?defaultredirect=true&action=viewinorgchart&key=19721, March 20,

2008 Linda Nappier, Manager IT Security – Planning, Interview with Scott Wibbenmeyer, April 10, 2008 Mark Habrock and Edmond Rogers, Security Analyst, Interviewed in person by Scott J. Wibbenmeyer, April 8,

2008

Page 67: 1 IT Security and Privacy Eddie Meyer Scott Wibbenmeyer Chanchart Chanthanan Zhijing Fang ZongJun Zhu.

References (Continued)

http://news.bbc.co.uk/2/shared/spl/hi/guides/456900/456993/html/default.stm, Biometric Technology. BBC News. March 4, 2008.

http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=10, Biometric Technology Overview. March 4, 2008.

• http://www.antiphishing.org, Phishing Activity Trends Report for 2007. Dec. 2007. Anti-Phishing Working Group (APWG). March 4, 2008.

• http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=10, Biometric Technology Overview. 4 March 2008.

• http://en.wikipedia.org/wiki/Intrusion_Prevention_System, March 4 2008. • http://www.security-int.com/categories/intrusion-prevention-systems/intrusion-prevention-systems.asp, Intrusion

Prevention Systems on the Security Software Map. March 5, 2008.