Information Security in the Digital A ge

31
Information Security in the Digital Age Sali Kaceli Director, Educational Technology and Distance Learning, Cairn University Email: [email protected] | Tel. (215) 702-4555

description

Information Security in the Digital A ge. Sali Kaceli Director, Educational Technology and Distance Learning, Cairn University. Email: [email protected] | Te l . (215) 702-4555. Agenda. Current Headlines. I am OK, why worry?. 2012 Sentinel Network: Fraud & Complaints. 369,132. - PowerPoint PPT Presentation

Transcript of Information Security in the Digital A ge

Page 1: Information Security in the Digital  A ge

Information Security in the Digital Age

Sali KaceliDirector, Educational Technology and Distance Learning, Cairn University

Email: [email protected] | Tel. (215) 702-4555

Page 2: Information Security in the Digital  A ge

2

What is happening in

this field?

What can we do? Conclusion

Agenda

Page 5: Information Security in the Digital  A ge

2012 Sentinel Network: Fraud & Complaints

Source: ftc.gov http://www.ftc.gov/sentinel/reports/sentinel-annual-reports/sentinel-cy2012.pdf

369,132

Page 6: Information Security in the Digital  A ge

How bad is it really?

The “cyber threat is one of the most serious economic and national security challenges we face as a nation” and that “America's economic prosperity in the 21st century will depend on cybersecurity.” -http://www.whitehouse.gov/cybersecurity

Page 7: Information Security in the Digital  A ge

Other Key Findings

• In recent 5 years, 650% increase in attacks*• 2/3 of U.S. firms victim of cyber attacks*

* http://www.infosecisland.com/documentview/21249-DHS-National-Preparedness-Report-and-Cybersecurity.html

Page 8: Information Security in the Digital  A ge

Top causes of data breaches in 2012How is it possible?

Source: http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.en-us.pdf

Page 9: Information Security in the Digital  A ge
Page 10: Information Security in the Digital  A ge

To en

sure

accu

racy

& co

nsist

ency

of d

ata o

ver i

ts en

tire l

ifecy

cleData

&Servic

es

To ensure that information and

systems are available as needed

To ensure protection against unauthorized access to or use of confidential information

CIAof data

What is information security?

Page 11: Information Security in the Digital  A ge

Data &

Services

The data is under attack from a variety of sources

VulnerabilitiesExploitsTookits

Social Networking

Mobile and cloud computing

Industrial espionage

Hactivism

Water hole attacks

Cyberwarfare

DDoS attacks

Phishing

Malware/Viruses

Page 12: Information Security in the Digital  A ge

Three Approaches to System Security

Page 13: Information Security in the Digital  A ge

What can we do organizationally

• Top-down approach with leadership as champions

• Resource allocation: expensive• Security starts at inception and design– Data ownership– Data custodian– Data users

• Policies and awareness

Page 14: Information Security in the Digital  A ge

A comprehensive approach to data security

Image courtesy of: http://resources.arcgis.com/en/communities/enterprise-gis/01n200000030000000.htm

Page 15: Information Security in the Digital  A ge

15

Technical Solutions to Info. Security

Firewall NAT Spam Control

Web Filtering IPS Protocol Control

Page 16: Information Security in the Digital  A ge

What can we do individually?

• Security Basics– Update your Operating System– Update Common Applications– Think before you click

• General Security – Safeguard your password– Lock your computer (Win + L)– Use secure sites (https://)– Shred data you are disposing– Do not store sensitive data on removable media

Page 18: Information Security in the Digital  A ge

Sample PDF Reader Exploit

Page 19: Information Security in the Digital  A ge

Sample phishing email

Page 20: Information Security in the Digital  A ge

End user solutions cont.

– Free means you do not have much control– Choose your friends wisely– Do not fall for phishing– Use two factor authentication whenever possible

Page 21: Information Security in the Digital  A ge

Deter Threats: while on the Road

Avoid saving sensitive data on mobile device

Set a lock code for device

Connect securely

Avoid connecting to free WIFI networks

Do not login using public computers

Think before you click

Page 22: Information Security in the Digital  A ge

Deter Threats: Identity Theft

Protect Social Security Numbers

Shred sensitive data

Use difficult passwords

Monitor transactions

Be on guard when using the Internet

Page 23: Information Security in the Digital  A ge

Detect: Phishing Attempts and Fraud

• Microsoft Security Essentials, AVG Free, Avast• Malwarebytes and Spybot (Antispyware tools)• Windows Firewall, Home Router Firewall,

other…

Install and keep antivirus and firewall up

to date

• Check the links• Does it sound suspicious• Were you expecting it?

Phishing Attacks

• You search google.com and something else comes up

Redirecting to deceptive sites

Page 24: Information Security in the Digital  A ge

Detect: Malware and Spyware

Symptoms include:

• Pop-ups• Computer running slower than

usual• Website redirection• Fake antivirus software• Cannot get to Windows Update

Picture credit: http://empireonline.com

Page 25: Information Security in the Digital  A ge

Detect: Intrusions

Monitor account

access and transactions

Check system logs

Pay attention to file changes

Page 26: Information Security in the Digital  A ge

Defend: Malware or Viruses

If you are a victim of:• Virus or Malware infection• Computer intrusion• Password theft• Unauthorized access

Contact your IT department immediately

Run a full system scan

Consider full computer reload

Locate a previous backup

Page 27: Information Security in the Digital  A ge

Detect: Identity TheftSymptoms include:• Inaccurate information on credit

reports• Not receiving bills in the mail• Being denied credit• Calls or letters from debt collectors

What can you do?• Monitor Financial

Statements• Check credit reports

annually from http://freecreditreport.com

• Be cautious what you post online

Page 28: Information Security in the Digital  A ge

Defend: Identity Theft

If you are a victim of

Identity TheftPlace a fraud alert on one of the three credit companies:: Equifax, Experian, Transunion

Close accounts and contact appropriate parties

File complaint with FTC (http://ftc.gov/idtheft)

File police report

Page 29: Information Security in the Digital  A ge

Conclusion

1. Assume you are a target: Think before you click2. You can make a difference3. It takes a comprehensive multi-layered approach

Information security is the responsibility of everyone. It is going to get worse before getting any better!!!

Page 30: Information Security in the Digital  A ge

Additional Resources

http://Intranet.cairn.edu/cla (this PowerPoint, videos etc.)

http://ftc.gov/idtheft

Antivirus: http://microsoft.com/security_essentials

Antimalware: Malwarebytes or Spybot Search and Destroy

Encryption: Truecrypt from http://truecrypt.org

Contact Information: Sali Kaceli | Email: [email protected] | Tel. (215) 702-4555

You can make a difference. Think before you click.

Page 31: Information Security in the Digital  A ge

31

Questions? Comments?