Download Security Training

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Security Training
Lunch ‘n Learn
Agenda






Threat Analysis
Legal Issues
Threat Mitigation
User Security
Mobile Security
Policy Enforcement
Threat Analysis
 Information security is the responsibility of
everyone who works with it
 Security is a process not a product
 Threats can be both internal and external
 Vendor contracts need privacy clauses
Threat Analysis
• Packet sniffing
– Collects sensitive data including passwords
– Even encrypted passwords can be cracked
• Code exploits
– Buffer overflows
– Remote executable
• Malware
– Collection of sensitive data
– Distributed Denial of Service attack
Threat Analysis
• Social Engineering
– Phishing websites, emails, IMs
– Hacker may pose as someone else to gain
password
• Intellectual Property Theft
– Research data needs to be secured
• Identity Theft
– Social security numbers and financial
information must be secured
Malicious Software
• Virus
– Self replicating code that infects a host file
– Requires file sharing to spread across
network
• Worm
– Stand alone, does not require host
– Self propagating through email or IM
Malicious Software
• Trojan horse
– Installed along with other software
– Opens backdoor or sends sensitive data back
to source
• Spyware
– Collects personal information and browsing
habits
• Adware
– Creates popups
Malicious Software
• ActiveX/Java applets
• Bundled with freeware as part of Terms of
Agreement
• Only download from trustworthy sources
• Peer to Peer filesharing
– Can unknowingly share sensitive information
– Can accidentally download copyrighted
material
Legislation
• Family Educational Rights and Privacy Act
(FERPA)
– Protects a student academic record
– Defines when academic record or directory
information can be released without consent
• Gramm-Leach Bliley Act (GLBA)
– Protects the financial information of a person
– Consumer must be provided privacy note on
yearly basis
Legislation
• Sarbanes-Oxley Act (SOX)
– Deals with the accuracy and reliability of a
companies financial information
• Health Insurance Portability and
Accountability Act (HIPAA)
– Privacy of medical records
Legislation
• New York’s Education Law (Article 1 S-2b)
– Restricted use of SSN
• New York’s Information Security Breach
and Notification Act
– Individual must be notified if sensitive
personal information is compromised
Legislation
• Why are these important?
– External auditors have told us to adhere to as
many regulations as possible
– Many financial regulations are in the process of
being applied to higher ed
– Our Board of Trustees have insisted on it
• Information Security Policy
• Information Security Procedures/Standards
Threat Mitigation
• Access control
– Physical security
– Authentication, authorization, and accounting
– Access control lists
– Firewalls
– Network Access Control
• Patch management
– Network devices
– Servers
Threat Mitigation
• Encryption
– SSH, SSL, file level encryption
• VPN
– Creates secure tunnel between external
address and internal network
– Secures all wireless traffic
• Barracuda Spam Filter
• Proper disposal of information
– Shredders, DoD level hard disk formatting
Desktop Security
• Separate machine for work and home
– Child/spouse may compromise data
• Strong passwords
– Combination of lower case, caps, numbers,
and symbols
– Do no share password with anyone
– Change passwords frequently
• Always lock machine when not using it
– Automated screen saver password
Desktop Security
• Antivirus
– Up to date definitions
– Real time monitoring
• Spyware removal tools
– Up to date definitions
– Frequent scans
• Personal firewall
– Only open ports to necessary services
Desktop Security
• Use Firefox over Internet Explorer if at all
possible
– Popup blockers
• Only install software from trusted sources
– This includes any ActiveX/Java applets
• Keep up to date with the latest security
patches
• Ensure screen is not visible to outsiders
Mobile Security
• Try not to store sensitive data locally on
mobile machines
– Data can be compromised by loss or theft
– Encrypt sensitive data that needs to be stored
locally
• Users should cable lock laptops when not
in presence
– Even in cars, hotel rooms, etc…
Mobile Security
• Never leave a PDA unattended
• Remote wipe software
• Encrypt data on portable media
Policy Enforcement
• Our goal is not to punish you for misdeeds
but to keep the network clean and the
information secure
• Punitive actions can promote cover ups,
denials, and prolongs detection
• Please contact us immediately if anything
appears suspicious
• Feel free to come to me with any
questions
Conclusion
•
•
•
•
Questions?
Comments?
Compliments?
Complaints?
• http://infosecurity.marist.edu/
• [email protected]