31
“Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim [email protected]

“Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim [email protected]

Embed Size (px)

Citation preview

Page 1: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

“Hole in the Wall – The Human Factor in Security”

13 September 2012

Mohd Rafiq Mohamed [email protected]

Page 2: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

Overview

Information sharing Information dissemination

ExtranetIntranet

E-CommerceE-Learning

Wikipedia

Web applications are intended to increase employee productivity !

Businesses Need Internet Access

Page 3: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

THREAT!!’

“The Internet is full with information but the Internet also full with..

Page 4: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

Viruses

Hackers

Privacy threats

Spam

Popups

Trojan horses

Worms

Spyware

Cookies

Intrusions

Do you have an effective means of keeping your business running smoothly by

eliminating all threats and annoyances?

Phishing

Threats From Everywhere

Page 5: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

Threats From Everywhere

Page 6: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my
Page 7: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my
Page 8: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my
Page 9: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

Confidentiality

Page 10: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

Integrity

Page 11: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

Availability

Page 12: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

The Consequences of Inadequate Security..(Cont’d)

Internet

Internal LAN

Internet/DMZ/Servers

Remote Access Servers

Border Router

InternalRouter

1. Inadequate Router Access Control

Mobile/home user

2. Unsecured/unmonitored remoteAccess

3. Informationleakage via zonetransfer& Services(SMTP, telnet)

4. Running Unnecessary services (FTP, DNS, SMTP)

5. Weak or reused password

6. User acctswith excessive privileges

7. MisconfiguredInternet servers

8. MisconfiguredFirewall or Router

9. S/W unpatched, outdated, defaultconfigurations

10. Excessive file& directory Accesscontrols

Source: Hacking Exposed McClure, Scambray & Kurtz, McGraw-Hill

Top 10 Security Vulnerabilities

Page 13: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

Users Don’t Get It• There’s nothing important on my

computer

• We have virus software so my computer is protected from everything

• All threats are from the outside

• It’s not my job/I’m too busy to worry about security

• Technology provides full protection

Page 14: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

• Reasons employees gave for altering security settings on their computers (CISCO 2008 White paper)

Users Don’t Get It

Page 15: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

• Employees are the security blackhole

Example –RSA’s SecureID Breach, 2011

– In March, an employee opened excel attachment from email in junk folder

– Malware in attachment created system backdoor

– Hackers able to up-gain privilege and copy SecureID security codes from databse

– 40million customers affected

– Result – RSA customers, (L3 & Lockheed) were attacked in April & June

Users Don’t Get It

Page 16: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

• Phishing email sent to RSA Employee

Why: Users Don’t Get It

Page 17: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

Most Common Mistakes• Poor Password Management• Workstation Attached and Unattended• Malicious E-mail Attachments• Ineffective Anti-virus Software• Uncontrolled Laptops• Unreported Security Violations• Updates, Hot Fixes, Service Packs not Installed• Poor Perimeter Protection

– Electronic– Physical

Page 18: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

What?

• Data Backup/Restore• Physical Security• Portables• Social Engineering• ID/Passwords• E-mail• Wireless• Malicious Software

Page 19: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

Data Backup/Restore• Users are responsible for communicating their

needs• IT is responsible for making sure it happens

– Included in IT procedures– Tools supplied to users

Page 20: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

Physical Security

• Every User is an Extension of the Security Force• Lock Offices as Often as Practical• Restrict Open External Entrances• Technology

– Cameras– Motion sensors– Alarm systems– Tags

Page 21: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

Portables• Favorite Target of Thieves• Less Likely to Draw Attention• Easily Hidden• “Turn” Fast at Pawn Shops and Online • Almost Always Contain “Sensitive” Data

Page 22: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

Social Engineering• “This is (manager, director, etc.)

and I need…”• “This is Sue with the Help Desk and we are:

– verifying your passwords…”– troubleshooting logon problems…”– got your (bogus) request to change your…”

• E-mail Attachments• Dumpster Diving• Recover Data from Surplus

Equipment/Media

Page 23: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

ID/Passwords• Users are responsible for what

happens with their ID/password• If you HAVE to write them down treat the paper like a credit

card• Change passwords if there is a

possibility it has been compromised• Use complex passwords• The sanctions for not protecting login credentials are…

Page 24: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

ID/PasswordsPasswords Are Like Underwear:

• Change yours often!

• Don’t leave yours lying around!

• The longer the more protection!

• Don’t share yours with friends!

• Be mysterious!

Page 25: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

E-Mail• E-mails Exist in Multiple Places• Deleting an Email from One Place Does Not Delete it from

Anywhere Else• Be Aware of “bcc”• Spam Effects and Avoidance• Verify Attachments Before Opening• Don’t Send Confidential Information

via Standard E-mail• E-mail Can be Forged

Page 26: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

Wireless• Don’t Plug in Your Own Wireless Access Point• Don’t Change the Secure Configuration:

– To make it work with your home network– So it will connect in the airport– To access other facilities networks

• Use a Wire When Available– Faster– More secure– Less competition for access

point bandwidth

Page 27: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

Malicious Software• Leave Virus Protection and Firewall Programs Running• Check for or Allow Updates• Recognize Potential Malicious Activities:

– Hard drive running when no programs are running– Unusual or unexpected logon screens– Boot up speed or sequence changes– Performance degradation– Returned e-mails

Page 28: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

The 5Q

Page 29: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

Remember..!!!

Page 30: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

“Prevention is always better than cure”.

Page 31: “Hole in the Wall – The Human Factor in Security” 13 September 2012 Mohd Rafiq Mohamed Hashim rafiq@gitn.com.my

THANK YOUTHANK YOU