* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download evesecuref5
Survey
Document related concepts
Post-quantum cryptography wikipedia , lookup
Cyberwarfare wikipedia , lookup
Wireless security wikipedia , lookup
Airport security wikipedia , lookup
Information privacy law wikipedia , lookup
Unix security wikipedia , lookup
Distributed firewall wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Mobile security wikipedia , lookup
Information security wikipedia , lookup
Cyber-security regulation wikipedia , lookup
Security-focused operating system wikipedia , lookup
Social engineering (security) wikipedia , lookup
Transcript
IT Security & Privacy MIS 6800 Group Six Professor: Dr. Mary Lacity Group Members • Liang Liu • Timothy Beecher • Kadambari Goel • Jonathan Riek • Wilfrid Hutagalung Fall 2005, UMSL 1 What Keeps CIO's up at Night Security… Survey on CIO's concerns On Management: No. 3 in 2004, 2003 On Applications: No. 1 in 2004 Luftman, J., and McLean, E., “Key Issues for IT Executives,” MISQ Executive, Vol. 4, 2, 2005, pp. pp.269-286 2 Agenda Introduction – Liang Liu Case Studies Threat and Vulnerability Assessment Tim Beecher: Interviewed Kathy Forrester, CIO at Fleishman Hillard Strategy, Architecture and Design Kadambari Goel: Interviewed Gaurav Huria, Project Manager at AT&T Threat and Vulnerability Management Jonathan Riek: Interviewed John Todd, Senior LAN Administrator at First Data Corporation Conclusion - Wilfrid Hutagalung 3 Introduction Definition Importance Relationship Functional Inventory CISO Legal and Regulatory 4 Definitions IT Security Privacy is to provide protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats • The right “to be left alone” – 1890 • Informational self-determination – Current Source for Security: U.S. National Information Systems Security Glossary Source for Privacy: Warren, S. D. and Brandeis, L. D. (1890): Harvard Law Review, 5, pp 205 5 Importance of Security & Privacy Build Customer Trust – Vital to E-Commerce Laws and Regulations – Federal & State Part of IT Infrastructure Can be Costly – Losses and Expenditures – Most systems cannot run without security: Abz insurance system 7 weeks outage due to the Siennax subcontracting with BlueX – Verisign 6 Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn and Robert Richardson, 2005 CSI/FBI 10th Computer Crime and Security Survey. 7 Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn and Robert Richardson, 2005 CSI/FBI 10th Computer Crime and Security Survey. 8 Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn and Robert Richardson, 2005 CSI/FBI 10th Computer Crime and Security Survey. 9 Relationship between Security and Privacy Complementary – Reinforces each other Contradictory - Conflicts each other Which one is more important? • Privacy – Customers • Security - Corporations Avoid two extremes • Complete Lack of Security • Complete Privacy 10 Key Elements of an Information Security Program. Presentation by Bryant Tow, Director North America Managed Security Solutions for Unisys, copyright Unisys 2004 11 CISO (CSO) More Jobs for CISO • 2005 – 40% Companies • 2004 – 31% Companies • Weakness in Strategic Planning and Regulatory Compliance CISO is NOT just for IT - protect all business’s info assets Best report to CEO Think like a CFO Implement a Process-Oriented Portfolio Strategy IDG’s CIO Magazine & Price Waterhouse Coopers Survey September 2005 12 Legal and Regulatory Major Federal and State Laws • Gramm-Leach-Bliley Act The Financial Modernization Act of 1999 or GLB • Sarbanes-Oxley Act (2002) • Patriot Act (2001 after 9/11) • HIPAA – Health Insurance Portability & Accountability Act (1996) • California’s SB 1386 (July, 2003) CIO Magazine • 38% Co. not in compliance with Sarbanes-Oxley • 23% Co. not in compliance with HIPAA • 15% not in compliance with California’s SB 1386 IDG’s CIO Magazine & Price Waterhouse Coopers Survey September 2005 13 Threat & Vulnerability Assessment 14 Fleishman-Hillard- Overview Global communications agency with offices in 59 cities around the world 2,000 employees rely on the quality of its data to address a wide range of client needs, from new product introductions and marketing promotions to crisis management Staffers need remote connectivity 15 Fleishman-Hillard- CIO Profile Kathy Forrester - Chief Information Officer, Senior Vice President, and Senior Partner Oversees the company's worldwide information service groups and supporting information technology needs, including network/data center services for the company's core lines of business With Fleishman-Hillard for the past 10 years Has an IT budget of 7-8 million dollars and 4% goes directly to IT Security 16 Average Daily Data Usage Fleishman Hillard • • 4 Terabytes Terabyte - 1024 GB, 1,048,576 MB, 8,388,608 KB, 1,099,511,627,776 Bytes and 8,796,093,022,208 bits AT&T • • 1.6 Petabytes Petabyte - 1024 TB, 1,048,576 GB, 1,073,741,824 MB, 1,099,511,627,776 KB, 1,125,899,906,842,624 Bytes and 9,007,199,254,740,992 bits http://www.glossary-tech.com/byte.htm 17 Fleishman Hillard - Services Internet Protect Firewall Services Intrusion Detection Secure E-Mail Kathy Forrester, CIO of Fleishman-HIllard, Interviewed in person by Jim Beecher, October 26, 2005. 18 Common Threats User • • • Giving out passwords Leaving workstations Leaving laptops at airports Outsourcing/Sub-Contractors • • Sloppy coding Audit Hackers • Career Data Base Kathy Forrester, CIO of Fleishman-Hillard Interviewed in person by Jim Beecher, October 26, 2005. 19 Common Threats- continued Viruses • Trojans • I love you virus Spiders • Continually attacking the firewall Distributed Denial of Service (DDoS) • DDoS attacks can overwhelm web servers and saturate a company's Internet connections thus resulting in the inability to maintain efficient communications, commerce, and ultimately connectivity Kathy Forrester, CIO of Fleishman-Hillard Interviewed in person by Jim Beecher, October 26, 2005. 20 Proactive Assessment Perform threat analysis of current and emerging solutions to detect, trace and filter the unwanted traffic as soon as possible User Training - 20 & 40 minute training sessions on the common threats & risks to all employees, clients, subcontractors Hackers, Viruses, Spiders, DDos • The only real proactive activities are to learn from past encounters and to implement/invest in the best firewalls and anti-virus Outsourcing/Sub-Contractors • Research • Actively monitor • Ensure they know your system Kathy Forrester, CIO of Fleishman-HillardInterviewed in person by Jim Beecher, October 26, 2005. Cullen, S., Seddon, P., and Willcocks, “Managing Outsourcing: The Life Cycle Imperative,” MIS Quarterly Executive, March 2005, pp. 229-246 21 Reactive Assessment Provide near real time threat analysis of current attacks Early Warning - allows most real-time attacks (viruses, worms and DDoS attacks) to be addressed and mitigated before a hacker releases them Once help desk lights up is usually when most security departments discover that there has been a breach Communicate threat information through training sessions to establish active threat levels for organizations Kathy Forrester, CIO of Fleishman-Hillard Interviewed in person by Jim Beecher, October 26, 2005. 22 Reactive Assessment- continued Information is one of the most valuable assets of any company Security breaches can happen everyday to anyone whether you're a large enterprise or a small business Steps 1.Quick detection and mitigation techniques 2.Building and keeping network security infrastructure updated against newer vulnerabilities 3.Enforce security policies 4.Review data gathered during security incidents Kathy Forrester, CIO of Fleishman-Hillard Interviewed in person by Jim Beecher, October 26, 2005. 23 Reactive Assessment- continued Users • Giving out passwords Fingerprint scans instead of numeric passwords ID cards that changes passwords every second • Leaving workstations Setting a screen saver to appear when computer is inactive for 30sec and can only be activated with a password • Leaving laptops at airports Future plan is to try to disable the device remotely Hackers • Find and report them Kathy Forrester, CIO of Fleishman-Hillard Interviewed in person by Jim Beecher, October 26, 2005. 24 Reactive Assessment- continued Viruses, Spiders & DDoS • Find and isolate affected areas • Contact anti-virus companies to see if they can help but usually they are too slow and have a guy in-house that can write a code to get ride of the virus or spider Outsourcing/Sub-Contractors • Sloppy code - Correct their work to ensure that breaches will not happen again Kathy Forrester, CIO of Fleishman-Hillard Interviewed in person by Jim Beecher, October 26, 2005. 25 Architecture and Design 26 IT Security In Demand Recent IDC Survey Number of computer security specialists will grow 3 times than the IT field as a whole Survey of more than 5,000 Security Managers worldwide indicated growth of nearly 15% during 2004 Hiring is expected to increase by nearly 14% during each of the next 4 years Overall Growth in the IT Professional ranks at about 5% Nikki Swartz- Information Management Journal: Jan/Feb 2005 Vol. 39, Issue 1, pg 18 27 Security Efforts Still Lacking Architecture & Design Expenditures account for over 58% of an Organization’s IT Budget & is growing at 11% a year Financial Institutions, Energy Companies spend the most on their Architecture & Design Budget as compared to Manufacturing Industries 41% Respondents spend about 5-10% (Unsecure) 73% Reviewed their Disaster Recovery Planning after 9/11 But Only 1 in 10 said it was Top Priority Nikki Swartz- Information Management Journal: Jan/Feb 2003 Vol. 37, Issue 1, pg 15 Bruce R Lewis, Terry Anthony Byrd - European Journal of Information Systems: June 2003 Vol. 12, Issue 2, pg 28 93 Need for Architecture & Design Quick decision making has led to Fast and Open Access to corporate networks increasing Security Threats New Weapon Advantage in developing Ensures Availability, Information Systems sustained Confidentiality & Competitive Integrity of Foundation for Managing Information Assets & Tangible Benefits for Continuity of Business Practices Provides Support for Global Business Strategies & Catalyst for Globalization Process Bruce R Lewis, Terry Anthony Byrd - European Journal of Information Systems: June 2003 Vol. 12, Issue 2, pg 29 93 Network Security Architecture & Design From Reactive to Proactive Approach Authentication : “Who are you?” Process of verifying the Identity of a Participant Authorization : “Should you be doing that.” Process of determining whether a Participant may use or access a resource Analysis of Current and Emerging Solutions Design Technological Information Security Controls for Business Solutions Impact of Design Requirements on User Experience 30 Gaurav Huria, Project Manager, AT&T, Interviewed in person by Kadambari Goel, October 17 th 2005 AT&T - Overview Third-Quarter 2005 Earnings: October 21st 2005 Third-quarter earnings per diluted share of $0.64 Consolidated revenue of $6.6 billion Operating income of $955 million Third-quarter cash from operating activities of $1.4 billion Increased full-year 2005 revenue and operating margin guidance Major products the company sells Internet Protocol & Enhanced Services (IP&E-services) Data Services LD and Local Voice Outsourcing, Professional Services & Other Characteristics of their customers Bundled Services Standalone LD, Transactional & Other Services Local Customers 31 www.att.com, viewed October 30th, 2005 Organization Chart CHAIRMAN/CEO PRESIDENT & COO AT&T PRESIDENT-GNTS AT&T CTO & CIO VICE PRESIDENT DIRECTOR GROUP MANAGER PROJECT MANAGER TECHNICAL SPECIALIST EVENT MANAGER Hossein Eslambolchi joined AT&T Bell Labs in 1986 Became CTO & President of AT&T Labs in Sept 2001 Company CIO in 2002 Earns more than $4.2 million a year, making him one of the highest-paid CIO's in the world Allocates roughly 20% of his time to operations, 25% to labs, 25% to CTO job & 30% to CIO issues Has more than 300 patents granted or pending 24-by-7 kind of guy who operates at 100 miles an hour 32 Presented by Information Week, Networking Pipeline Nov 29, 2004 "IP Will Eat Everything" By Paul Travis Dealing With Threats Commonly Faced Risks DDoS Attacks Unauthorized Data Access VIRUS WORMS Trojans Security Services Offered Internet Protect Firewall Services Intrusion Detection Secure E-Mail Gateway Token Authentication Services Gaurav Huria, Project Manager, AT&T, Interviewed in person by Kadambari Goel, October 17 th 2005 33 Service Offering from AT&T Internet Protect as a Leading Security Offer for Preventing Attacks before they Materialize Proactive Approach for Malicious Intruders & Unauthorized Activities by providing a Robust, all Inclusive Information Security Portal Distributed Denial of Service (DDoS) Defense Attacks for the most Nefarious Activities passing on the Internet next to Worms & Viruses Quality of Data Analysis carrying over 1.6 Petabytes of data daily Advanced Intelligence Gathering 34 Gaurav Huria, Project Manager, AT&T, Interviewed in person by Kadambari Goel, October 17 th 2005 Details of Service Internet ProtectSM is a security Alerting and Notification service that offers advanced information regarding potential Real-Time attacks that are in the early formation stages This service Detects and Mitigates DDoS & other Flood attacks to Customer Systems within the core of the IP backbone First step involves Identification of an attack & then Mitigating the detected attack before traffic reaches the Customer’s Network In DDoS Defense if a denial of service attack is detected, the traffic is routed to a network mitigation farm, where the malicious DDoS attack packets are identified and dropped while the valid traffic is allowed to pass 35 Gaurav Huria, Project Manager, AT&T, Interviewed in person by Kadambari Goel, October 17th 2005 Functioning of Service Detecting & Alerting: Current detection devices detect denial of service attacks and alert the customer Routing & Scrubbing: Routing change instructs (triggers) the facility to re-route customer traffic to the scrubbing facility. Scrubbing can be initiated by the customers, From backbone devices, manually or automatically from remote detection devices Gaurav Huria, Project Manager, AT&T, Interviewed in person by Kadambari Goel, October 17th 2005 36 Benefits & Challenges Benefits Early Warning Advanced Intelligence Gathering, Detecting & Mitgation Detection & Trace Back of Attacks Filtering techniques for different types of Attacks Challenges Time consuming Cost Associated Real Time Monitoring Gaurav Huria, Project Manager, AT&T, Interviewed in person by Kadambari Goel, October 17 th 2005 37 Security Model Create a Policy Statement beginning with assessing the risk to the network and building a team to respond Conduct a Risk Analysis by identifying portions of your network, assign a threat rating to each portion, and apply an appropriate level of security Establish a Security Team with participants from each of your company's operational areas Approve Security Changes which is defining changes to network equipment that have a possible impact on the overall security of the network (firewall configuration) Monitor Security of Your Network detecting changes in the network that indicate a security violation 38 Security Model- continued Implement changes to prevent further access to the violation Restore normal network operations Define and implement controls to limit risk of identified vulnerability Develop and maintain effective disaster recovery plan Review the process as a final effort in creating and maintaining a security policy Ensure that information security program activities align with organizational goals Key Elements of an Information Security Program. Presentation by Bryant Tow, Director North America Managed Security Solutions for Unisys, copyright Unisys 2004 www.cisco.com, viewed October 30th, 2005 39 AT&T Good Security Policy detailing outline to Users' Roles & Responsibilities Incident Response Team in case of Threat Auditing the Network Risk Analysis Upgrading the Network from New Vulnerabilities Gaurav Huria, Project Manager, AT&T, Interviewed in person by Kadambari Goel, October 17th 2005 40 Threat & Vulnerability Management 41 Ongoing Management Process Assessment showed us what we need, why we need it, and how to learn from incidents Architecture and Design illustrated key components and capabilities of a solid strategy Management will show the day to day processes, communication, and departmental interaction 42 First Data Corporation Third largest payment processing company in the world Oldest portion of business – Western Union, founded in 1871 First company to process both Visa and MasterCard transactions in 1976 Now: 1100 financial transactions per second, and 36 billion transactions to date Manage over 406 million cardholder accounts 43 http://ir.firstdata.com/profile.cfm, viewed November 2, 2005 First Data - Company Profile Year ending Dec 31 2000 2001 2002 2003 2004 Revenues (millions) $5,922 $6,602 $7,503 $8,400 $10,013 Net Income (millions) $1,027 $989 $1,232 $1,394 $1,868 EPS $1.24 $1.25 $1.60 $1.86 $2.22 Cash Flow (millions) $1,181 $1,400 $1,889 $1,958 $2,327 Customers Include: 4.1 million retail locations, such as Wal-Mart or grocery stores 1400 individual credit card issuers Subsidiaries: TeleCheck check processing, Western Union, etc. Handles payment processing, customer service, account setups, and more for credit card companies and card issuers Divisions: Commercial Services – Handles customers Resources – IT, Programming, HR, supply, etc. Corporate Offices 44 http://ir.firstdata.com/profile.cfm, viewed November 2, 2005 http://ir.firstdata.com/ar2004v2/firstdata_final/index.htm, viewed November 2, 2005 First Data - CIO Profile Guy Battista - Chief Information Officer and Executive Vice President Overseeing the company's Information Services Group and supporting information technology needs, including network/data center services for the company's core lines of business More than 30 years of IT background, 14 years at First Data Annual compensation unknown, but stock options alone in 2004 totaled $3.3 million http://www.firstdata.com/abt_bio_battista.jsp , viewed November 2, 2005 45 http://www.forbes.com/finance/mktguideapps/personinfo/FromPersonIdPersonTearsheet.jhtml?passedPersonId=391436, Viewed November 2, 2005 Vulnerability Management Proactive Policies • Serve as a guide, deterrent, or both • User or hardware / software based • User example – password security policies • Hardware / Software example: Wireless access (802.11) Monitoring and Reporting • Constant and consistent tracking of key areas for vulnerability or weakness • Monitoring often done by remote from a home office location or by outsourced firm to reduce bias Jill R. Aitoro, “Cyber Security -- Federal cybersecurity: a work in progress”, VARbusiness July 11, 2005, Iss. 2115; pg. G.23 46 Proactive - continued Business Continuation / Disaster Recovery (BC/DR) • Mirrored data centers – real time remote replication of data • Traditional “Point-in-Time” backups Example – tape backups • Monitoring and Management Backup team monitoring backup completeness, links between data centers, etc. • Prevent loss of backup data Updates to key components • Antivirus and Anti Spam • Operating System updates • Firmware updates for firewalls / network hardware 47 Data Protection and Disaster Recovery of Local and Remote File Servers Julie Herd Goodman. Computer Technology Review. Los Angeles: Aug/Sep 2005.Vol.25, Iss. 5; pg. 29, 2 pgs Incident Response - Reactive Dedicated response team with vast resources Follow a prescribed plan – work carefully through a set plan to ensure that resources are brought online in the right order, and that all critical data is present. Prioritization of resources – ensure that business critical systems are given priority James Ryan, Alex Rosenbaum, Scott Carpenter. “Getting a Handle on Incidents”, Security Management. Arlington: April 2005. Vol.49, Iss. 4; pg. 66, 7 pgs 48 Education and Communication Ethics and awareness training • Helps to prevent Social Engineering - the process of obtaining confidential information by manipulation of legitimate users • Ongoing training for all users on common schemes and weaknesses, proper password handling, importance of data privacy, etc. • First Data does this through regular required online classroom sessions, with follow-up testing and user tracking Issue reporting • Open line to company users to report a potential or real time vulnerability Reporting to senior management • Important policy changes • Business Continuation and Disaster Recovery plans • Realistic perspective and likelihood of threat and potential impact on business operations Robert P Moffie, David L Baumer, Ralph B Tower. “Identity Theft and Data Security”, Internal Auditing. Sept/Oct 2005. Vol.20, Iss. 5; pg. 29, 9 pgs 49 Policies, Procedures & Standards Software / Hardware enforced policies: • USB storage devices • Password renewal and complexity policy • Remote access policies • Encryption policies User based policies: • Focus on areas that cannot easily or completely be limited by technology • No viewing of consumer data on laptops around non-FDC employees • Restriction on editing of sensitive code with family or friends in the room • Internet browsing policy Written principles and standards • Emphasis on protective behavior overall cuts down on risk of social engineering George V Hulme. “Data Breaches: Turn Back The Tide”, Business Credit. New York: October 2005. Vol.107, Iss. 9; pg. 34, 5 pgs 50 Organizational Interaction Departments or entities typically involved: • Physical Security • Vendors and Partners • Legal / Privacy • Operations • Audit / Global Compliance • Human Resources Physical Security at First Data: • Electronic security pass cards • Video surveillance • Guards Human Resources at First Data • Responsible for distributing and tracking all training George V Hulme. “Data Breaches: Turn Back The Tide”, Business Credit. New York: October 2005. Vol.107, Iss. 9; pg. 34, 5 pgs 51 Performance & Effectiveness Evaluation Track number and type of incidents that occur, find ways to avoid Regularly test user awareness and knowledge Oversight Board • Group of users and managers from all areas of the company • Can provide valuable input on ease of use, alignment with organizational goals, and more • Security process should be a business enabler, not disabler, and a confidence builder to users Uses of results: • Ongoing reassessment • Design modifications • Real time training enhancements or changes Key Elements of an Information Security Program. Presentation by Bryant Tow, Director North America Managed Security Solutions for Unisys, copyright Unisys 2004 52 First Data – Ongoing Challenges Overall Mindset – Improved focus on the proactive Learning for previous challenges Heightened focus on consumer data security Stronger hardware and software based policies 53 Management Best Practices 54 InfoSec Management Best Practice 1. Security Policy Demonstrate management commitment to, and support for information security 2. Organizational Security - Develop a management framework for the coordination and management of information security in the organization; allocate information security responsibility 3. Asset Classification & Control -Maintain an appropriate level of protection for all critical or sensitive assets 4. Personnel Security - Reduce the risk of error, theft, fraud, or misuse of computer resources by promoting user training and awareness regarding risks and threats to information Information Security Management Best Practice Based on ISO/IEC 177799 Information Management Journal, Jul/Aug 2005 Vol. 39 Iss. 4 55 Best Practice- continued 5. Physical & Environmental Security - Prevent unauthorized access to information processing facilities and prevent damage to information and to the organization's premises 6. Communications & Operations Management Reduce the risk of failure and its consequences by ensuring the proper and secure use of information processing facilities and by developing incident response procedures 7. Access Control - Control access to information to ensure the protection of networked systems and the detection of unauthorized activities. Information Security Management Best Practice Based on ISO/IEC 177799 Information Management Journal, Jul/Aug 2005 Vol. 39 Iss. 4 56 Best Practice- continued 8. Systems Development and Maintenance - Prevent the loss, modification, or misuse of information in operating systems and application software 9. Business Continuity Management - Ability to react rapidly to the interruption of critical activities resulting from failures, incidents, natural disasters, or catastrophes 10. Compliance - Ensure that all laws and regulations are respected and that existing policies comply with the security policy in order to ensure that the objectives laid out by senior management are met Information Security Management Best Practice Based on ISO/IEC 177799 Information Management Journal, Jul/Aug 2005 Vol. 39 Iss. 4 57 Mapping The Cases Into Best Practices Don't bring home Zip drives, USB devices Not allowed to ping Instant messaging tools kept minimum Blocking unwanted web pages and port numbers Examples of Security Policy Implementation 58 Mapping-continued Establish joint security team Creation of Chief Information Security Officer Organizational Security Management Framework Assign threat ratings to portions of customer's network system Asset Classification and Control 59 Mapping-continued Building User Awareness (eg. through training) Personnel Security Using Password-protected screen saver, ID cards with auto-changing password -Physical and Environmental Security -Access Control Early Warning Information System & Communicating Threat Communications and Operations Management 60 Mapping-continued Continuously analyze Threats and Implement most updated Security Technology Make the needed Security Changes Systems Development and Maintenance Automatically Routing the oncoming attack to a Network Mitigation Farm Mirrored data centers Business Continuity Management 61 CONCLUSION Information security threat increases as computer and network systems are growing more complex and more business processes are integrating with computer/network systems Information Security is a real and significant aspect in IT/IS systems all over the world It has become mandatory by law (Sarbanes-Oxley Act) instead of just an optional facility Best Practice Frameworks are available that can be used to help organizations build a good and sound information security system 62 ? 63