63
Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Embed Size (px)

Citation preview

Page 1: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Jake BartlettFrancis Lam

Masha PryamkovaMuna Siddiqi

Page 2: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

2

Page 3: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

1. Introduction Risk definition Why IT Security and Privacy are important Types of risks List of most common risks

2. Case Studies The Secret Healthcare Company Visa ChoicePoint

3. Summary of Best Practices

3

Page 4: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

A risk can be defined as a function of three variables:◦ the probability that there's a threat◦ the probability that there are any vulnerabilities◦ the potential impact

A threat is anything (man made or act of nature) that has the potential to cause harm

A vulnerability is a weakness that could be used to endanger or cause harm to an informational asset

4Source: 18

Page 5: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

5

Risks

Vulnerabilities• Flaws in hardware, software, or network elements• Security is constantly playing catch-up to technology• Internet was designed to be open• Systems operating close to capacity

• Increasing use of off-the-shelf software • Lack of centralized control• Critical Infrastructure interdependencies• Standardization of products• Expansion of Internet

Threats

User Error

Natural Disasters Hostile Nations

/ Groups

Spies / Snoops

Other Infrastructure Disruptions

Activists CriminalsPrankstersTerrorists

Potential Damage

Customer Confidenc

e Lost

Customer Confidenc

e LostCritical

Operations Halted

Critical Operations Halted

Services Interrupte

d

Services Interrupte

dData

Corrupted

Data Corrupte

dAssets Lost

Assets Lost

Source: 1

Page 6: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

CSI Computer Crime and Security Survey Published by Computer Security Institute since

1995 494 respondents (anonymous) Data for 2007 report is based on2006 calendar year

6Source: 14

Page 7: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

7

Average annual loss from IT Security incidents reported in 2007 - $345,000 per respondent

2007: 494 respondents

Source: 14

Page 8: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

8

46% of the organizations experienced a security incident in the past 12 months

Source: 14

Page 9: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

61% of the companies said that their organizations allocated 5 percent or less of their overall IT budget to information security

9Source: 14

Page 10: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Internal External

Human Non-Human

Intentional Accidental

Disclosure, Modification, Destruction, Denial of Use

10Source: 4

Page 11: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

11

Page 12: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

12Source: 18

Page 13: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

13*Top 15 types of incidents

Source: 14

Page 14: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

1414

Page 15: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

A Fortune 50 company Offers a broad range of medical and

specialty products Has approximately 34 million medical

members Manages extensive Public Health

Information (PHI) This requires high security focus

15

Page 16: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

40% of all the health care organizations are not compliant with HIPAA

50% faced attacks from e-mail viruses

Encryption of data is limited 48% do not encrypt data during transmission

69% do not encrypt stored data or devices

16Source: 3

Page 17: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Viruses Identity theft (Organized crime) Offshore hacking Spam Phishing –fraudulent information requests

Associate carelessness and malicious activity -

inappropriate sharing of PHI Configuration errors –software or hardware

17

Page 18: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

18

Page 19: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Data is collected in large volumes The regulatory environment is highly

charged and sensitive Service providers / partner exposures –

outsourcing or delegated work Privacy is a signature issue

19

Page 20: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Information Security Obligation HIPAA Breach Notification Statues Section 5 of FTC Act Gramm-Leach-Bliley

20

Page 21: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

1. Health Industry Paying All Attorneys

2. Highly Intricate Paperwork in Abundant Amounts

3. High Income Potential for Aggressive Attorneys

4. Huge Increase in Paperwork and Aggravation Act

5. Health Insurance Portability and Accountability Act

What does HIPAA stands for?

21

Page 22: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Developed by the Department of Health and Human Services (HHS)

Introduces a set of requirements and standards for the use and dissemination of health care information

Requires Health Care Companies to develop information security systems

5 components: The Privacy Rule --- Protection of PHI, paper and

electronic The Transactions and Code Sets Rule--- used for claim filing The Security Rule --- Electronic The Unique Identifiers Rule The Enforcement Rule

22Source: 18

Page 23: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Administrative Safeguards Physical Safeguards Electronic Safeguards

23

Page 24: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

The Company does not allow:

Unnecessary exposure to PHI and protected information Sharing user ID’s or leaving them in view Leaving any PHI in view

Disposal and destruction of media containing electronic data is strictly monitored

Facility security plans, maintenance records, and visitor sign-in and escorts are highly controlled

Contractors or agents are also fully trained on their

physical access responsibilities

24

Page 25: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

The Company does not: Allow any non certified software on the computers

Sell advertisement space on the internet portals

Allow direct public access to update the database

Allow opening e-mails from unknown people or entities

and clicking on links or attachments

Allow visiting internet retail and information sharing sites

The Company constantly monitors for suspicious or unusual activities –the incident response team quickly eliminates, isolates, and manage any threats

25

Page 26: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Chief Information Security Officer

Policy Management

Team

Security Risk Management

Team

Access Security

Team

InfrastructureSecurity

Team

ApplicationSecurity

Team

Program Management

Team

•Policy Development

•Training

•Security Education

•Process Development

•Risk Coordination and Reporting

•Data Handling Risk

•Vendor Risk management

•Incident Response

•Encryption operation

•Access Risk Assessment

•Account Administration

•Protection against Antivirus/Spam

•Network Protection

•Security application development

•Database Security

•Integrated Planning

•Financial Management

•Communications

26

Page 27: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Budget for IT: 14.3 million Security Budget: 1.2 million, 8%

27

Page 28: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Validation Proactive Monitoring

Security Audits

Technology Secured

Infrastructure, Application and

Tools

Technology Secured

Infrastructure, Application and

Tools

Process Appropriate Comprehensive

Policies, Standards and Training

Process Appropriate Comprehensive

Policies, Standards and Training

Organization Information

Security Team

Organization Information

Security Team

Secured Environment

Secured Environment

Physical Security ProtocolsPhysical Security Protocols28

Page 29: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Large companies have higher security budget (more than $1 million), have more technology in place, follow more strategic practices, but

The larger companies suffer more security breaches and bigger losses

According to IT Policy Compliance Group Research, 75% of all data breaches were caused by human errors

29

Page 30: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

The Secret Healthcare Company lost an unencrypted CD holding personal and medical information of 75,000 members while sending it to a contractor firm

30

What could the company do to prevent data leak?

Page 31: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

1. Continue to Develop and Deliver Security Awareness, Training and Education

2. Redesign Policies and Standards Framework and Content

3. Expand Processes and Methodologies to Integrate Security into the Enterprise

4. Create and Deploy Data Protection Practices and Solutions

5. Implement Vendor Management Oversight of Data Management and Contract Compliance

6. Develop Incident Handling Protocols and Manage Responses

31

Page 32: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Continue to apply the right organization model

Having consistent policies, procedures, and standards in place

Providing ongoing security training Looking for better ways to secure the

technology Strengthening the information integrity

in more proactive ways Executing the information security

strategy

32

Page 33: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi
Page 34: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

'Credit card fraud' is one of many form of Bank fraud that involve credit cards, charge cards, or debit cards

34Source: 18

Page 35: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

The fraud begins with either the theft of the physical card or the compromise of the account information

The compromise can occur by many common routes, including something as simple as a store clerk copying sales receipts

A) B)

35

Page 36: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

The rapid growth of credit card use on the Internet has made database security lapses particularly costly; in some cases, millions of accounts have been compromised

40% of U.S. and European consumers have stopped an online transaction due to security concerns

36Source: 23

Page 37: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Since 2005, credit card fraud in the UK and America has increased by 350% on average according to Reuters

With credit card crime occurring across state lines, criminals often are never prosecuted because the dollar amounts are too low for local law enforcement to pay for extradition

37Source: 24

Page 38: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

The cost of credit and charge card fraud - to card holders and to card companies alike - may be as high as $500 million a year

Everyone pays for credit and charge card fraud in higher prices, whether or not they are personally defrauded

38Source: 25

Page 39: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

“12 commandments” PCI Standard “Verified by Visa” Contactless cards Zero Liability Policy

Components of Visa’s Security Components of Visa’s Security SystemSystem

39

Page 40: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

In 2000, Visa trumpeted a list of security "best practices" for e-merchants that accept Visa cards

◦ It also announced its intention to verify merchants’ compliance

In October 2007 Visa introduced a new set of Payment Application Security Mandates

◦ Merchants now have time till July, 2010 to comply

40Source: 6, 17

Page 41: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

1. Install and maintain a working firewall2. Keep application and operating system security patches up

to date3. Encrypt stored credit card data4. Encrypt data sent across the network5. Use and regularly update antivirus software6. Don't use vendor supplied defaults for password security 7. Assign a unique user ID to each person with computer

access 8. Track access to data, including read only, by unique ID9. Regularly test security systems and processes10. Restrict access to data on a business "need to know" basis11. Have a management or human resources policy that

addresses security in the workplace, such as doing background checks

12. Restrict physical access to authorized employees

41Source: 6

Page 42: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

PCI DSS stands for Payment Card Industry Data Security Standard

A security standard accepted by all major credit card companies

Originally began with 5 different programs, including Visa’s

Visa requires its merchants to comply with both PCI and 12 Commandments

42Source: 18

Page 43: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Starting October 2007, Visa introduced penalties for non-compliance with PCI

Merchant’s volume of transactions

Penalty Effective Date

Impact on user

> 1 million Visa transactions per year

Acquirers for these merchants will see their interchange rate raised a tier

October 2007

Acquirers pass their interchange costs on to their merchant clients as part of the discount rate

At least 6 million Visa transactions per year

Separate monthly fines to the acquirers of noncompliant merchants

October 2007

Acquirers will pass their fine costs along to merchants as well1 to 6 million Visa

transactions per year

Separate fines January 2008

43Source: 2

Page 44: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

In addition to other security measures (PIN, 3-digit security code, address matching etc) Visa introduced "Verified by Visa” for online transactions

Unique passwords or codes are required during Internet transactions to verify the user's identity

According to Visa's own research, 76% of customers wanted a password protected system to enable them to shop on the internet with total peace of mind, and this is the reason we have introduced Verified by Visa"

44

Page 45: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Standard cards Feature a static card

verification value written into the magnetic stripe

This number is not known to the user and is designed to verify that the card is present during a transaction

However, because it never changes, criminals can use stolen data from the magnetic stripe to produce cloned cards that would work until the issuer reissued the card

45

Contactless Visa cards Feature embedded

microchips that generate a unique code whenever the cards are used

The code is unique to each transaction, which means that criminals who manage to skim card data during a single transaction to create counterfeit cards would have only an old code

Source: 13, 21

Page 46: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Customer-oriented policy that ensures complete liability protection for all card transactions that take place on the Visa system

i. e “You owe nothing in fraudulent transactions”

46Source: 22

Page 47: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi
Page 48: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Identity Theft is a crime where a criminal assumes someone else's identity in order to profit by fraudulent means

Not the same as Credit Card Fraud

48Source: 8

Page 49: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Identity theft is one of the fastest growing crimes in the United States

Identity Theft costs almost $53 billion between business and individual victims for all types of reported identity theft ◦ Business victims experienced a total loss of $47.5

billion or an average of $4,800 per business victim per year

◦ Individual victims account for a total loss of $5 billion and $500 per victim annually

Americans spent 300 million hours resolving issues related to identity theft

49Source: TBD

Page 50: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Stealing personal information in computer databases (hacking or using Trojan horses)

Dumpster diving Phishing Social Engineering Browsing social network

sites (MySpace, Facebook etc) for personal details that have been posted by users

50

Page 51: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Universities often become victims of data breaches!

51

Company / Institution Date made public

Number of records

Fidelity National Information Services, Certegy Check Services Inc.

July 3, 2007 8.5 million

Yale University Aug 8, 2007 10,000

California Public Employees' Retirement System (CalPERS)

Aug 22, 2007 445,000

Monster.com Aug 23, 2007 1.6 million

University of Michigan School of Nursing Sep 19, 2007 8,585

Gap, Inc. Sep 28, 2007 800,000

Commerce Bank Oct 10, 2007 20

Source: 10, 19

Page 52: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

52

A data aggregation company based in Alpharetta, near Atlanta, Georgia

Acts as a private intelligence service to government and industry: combines personal data sourced from multiple public and private databases for sale to the government and the private sector

Maintains more than 17 billion records of individuals and businesses, which it sells to an estimated 100,000 clients, including 7,000 federal, state and local law enforcement agencies

Source: 8

Page 53: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

In February 2005 ChoicePoint revealed that sensitive information for at least 114,000 (some sources say 163,000) people had been compromised

The breach occurred earlier in 2004, when criminals posed as customers to obtain data

No direct technology breach occurred, butmedia characterized the incident as if one had

At least 750 (some sources say 5,000) cases of identity theft as a result of the breach

Similar scam perpetrated in 2000 resulted in at least $1 million in fraudulent purchases

53Source: 7, 8, 20

Page 54: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

A number of investigations including congress people, the Federal Trade Commission, the US Securities and Exchange Commission and US state attorneys general as well as personal lawsuit

ChoicePoint has agreed to pay $15 million:◦ $ 10 billion fine◦ $ 5 billion as a fund to help the victims of the identity

theft Company must overhaul its security program

and submit to independent audits of security procedures every 2 years for the next 20 years

54Source: 11

Page 55: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

In April 2007 a Gartner Analyst told USA Today that "ChoicePoint transformed itself from a poster child of data breaches to a role model for data security and privacy practices“

◦ Some of the preventive steps included abandoning a line of business worth $20 million because of its potential to risk a future data breach

55Source: 7, 16

Page 56: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

5-step action plan for securing data and privacy system proposed by ChoicePoint’s CIO:

1. Governance – Chief Privacy Officer reports to a board that governs privacy and public responsibility

2. Clearly define expected behavior and provide tools to simplify compliance for employees

3. Create data breach response policies and procedures

4. Determine the credentials of those you work with and those who work for you

5. Embrace openness

56Source: 12

Page 57: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

57

Page 58: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

58

Security Policy

Organizational Security

Access Classification and Control

Compliance

Physical Security

Business Continuity Management

Access Control

Physical and Environmental Security

System Development and Maintenance

Communications and Operations Management

Legend:

Organizational Aspect

Technical Aspect

Physical Aspect

Source: 9

Page 59: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi
Page 60: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Journal Articles 1. Goles et al., “Dark Screen: An Exercise in Cyber Security” MIS Quarterly Executive, Vol. 4, 2, 20052. Green, J., “Merchants Face a Double Whammy” Cards & Payments, Vol 20,10, 20073. Holmes, A., "The Global State of Information Security 2006; Some things are getting better, slowly,

but security practices are still immature and, in some cases, regressing”, CIO, Vol. 19.23, 2006, p.1 4. Loch, K., Carr, H., Warkentin, M., “Threats to Information Systems: Today's Reality, Yesterday's

Understanding” MIS Quarterly, Executive, Vol. 16, 2, 19925. Luftman, J., and McLean, E., “Key Issues for IT Executives,” MIS Quarterly Executive, Vol. 4, 2, 2006,

pp. 81-99, 269-2866. Messmer, E., “Online Card Fraud Targeted” Network World Vol. 17-34, 2000  7. McNulty, E., Lee, J., Boni, B., Coghlan, J., Foley, J. “Boss, I Think Someone Stole Our Customer Data”,

Harvard Business Review; Vol. 85. 9, 2007, pp.37-508. Miller, M., “Why Europe is Safe from ChoicePoint: Preventing Commercialized Identity Theft Through

Strong Data Protection and Privacy Laws” The George Washington International Law Review, Vol. 39, 2, 2007, p.395

9. Saint-Germain, R., “Information Security Management Best Practice Based on ISO/IEC 17799” The Information Management Journal, Vol. 39, 4, 2005, pp 60-66.

10.Swartz, N., “ID Thieves Targeting Universities” Information Management Journal, VOl 41, 2, 2007, p. 7

11.Swartz, N., “Data Breach Costs Broker $15 Million” Information Management Journal, Vol. 40,3, 2006, p10.  

12.Swartz, N., “ChoicePoint Lessons Learned” , Information Management Journal; Vol 41, 5, 2007, p. 24

13.Wolfe, D., “Visa Security Idea: Mag Strripe with 'Dynamic' Code” American Banker, Vol. 172, 48, 2007

60

Page 61: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Electronic publications14.Richardson, R., “CSI Computer Crime and Security Survey 2007”,

http://www.gocsi.com/forms/csi_survey.jhtml;jsessionid=W3MH0WN1ZFW0SQSNDLOSKHSCJUNN2JVN, viewed October 1, 2007

15. “An Introduction to Computer Security: The NIST Handbook”, http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf, viewed November 4, 2007

16.Swartz, J., and Acohido, B., “Who's guarding your data in the cybervault?” USA Today , http://www.usatoday.com/tech/news/computersecurity/infotheft/2007-04-01-choicepoint_N.htm, viewed November 1, 2007

17.Vijayan, J.,”What New Visa Security Mandates Mean to You”, PC World, http://www.pcworld.com/businesscenter/article/139048/what_new_visa_security_mandates_mean_for_you.html, viewed November 1, 2007

Websites14.Wikipedia

15.http://www.privacyrights.org/ar/ChronDataBreaches.htm, viewed November 1, 2007

16.http://jurist.law.pitt.edu/paperchase/2006/01/ftc-imposes-record-fine-on-choicepoint.php, viewed November 1, 2007

17.http://www.informationweek.com/security/showArticle.jhtml?articleID=183702491, viewed November, 1

18.http://www.congressionalfcu.org/aboutus/securitycenter/ZeroLiabilityPolicy.pdf, viewed November, 1

61

Page 62: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

Websites19.http://marketwire.com 

20.http://today.reuters.com

21.http://techweb.com/wire/security/

22.(Creditsourceonline.com) 

23.(About.com)

24.(identitytheft.gov)

62

Page 63: Jake Bartlett Francis Lam Masha Pryamkova Muna Siddiqi

63Source: 14