information security awareness 1 university of arizona security awareness campaign kelley bogart...

110
1 Information Security Awareness University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar Network Administrator University of Arizona

Upload: dawson-mccullough

Post on 14-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

1

Information Security Awareness

University of ArizonaSecurity Awareness Campaign

Kelley Bogart University

Information Security Coordinator

Gil SalazarNetwork

Administrator University of

Arizona

Page 2: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

2

Information Security Awareness

Agenda

Why Awareness Challenges Solutions Benefits Costs Initiatives Demonstration

Page 3: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

3

Information Security Awareness

Why Awareness?Campus Policy, Standards & Guidelines

Privacy Guidelines Acceptable Use Policy Security Policy – Draft Supporting Security Standards &

Guidelines Business Continuity & Disaster Recovery

Incident Reporting

Management Responsibilities for Security

Networked Device Security

Page 4: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

4

Information Security Awareness

FERPA HIPPA GLBA State Legislation (House Bills)

Online Privacy Statement Misuse of State of Arizona Equipment

Many more to come

Why Awareness? (cont)

Heightened Activity Regulatory Drivers

Page 5: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

5

Information Security Awareness

Why Awareness? (cont.)

Relationship of Privacy & Security

Roles and Responsibilities

Page 6: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

6

Information Security Awareness

Where to start and how?

Step 4 - How will we monitor progress?Monitoring

Step 1: Where are we now? Current Situation Assessment

Step 2. Where do we want to be? Strategic Direction

Step 3 - How do we plan to get there? Implementation Planning

Page 7: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

7

Information Security Awareness

Security Policies & Standards are minimal and may or may not be documented. Security Incidents are viewed as someone else's problem. Existing programs and services are perceived as sufficient. Security is viewed as an enforcer.

Realization that existing Information Security processes are fragmented. Executive level support and involvement is visible. Some Security Awareness interventions are implemented and are ongoing.

General acceptance of campus-wide standards based on Security Infrastructure and displayed through noticeable behavior change. Staff, faculty and students actively and visibly participate in the programs and services. Security incidents are reported immediately to the appropriate area.

The integration of Security programs and services in the campus departments is complete. Security is involved at the onset of projects. U of A is considered as a Security Awareness Best Practice campus.

Threats are continually reevaluated based on changing threat population and security incidents. Additional or more cost effective alternatives are continually identified. The practice of Security is considered a component of the campus culture. Security Awareness is viewed as a business enabler.

Level 4Level 4COMMON PRACTICECOMMON PRACTICE

Level 4Level 4COMMON PRACTICECOMMON PRACTICE

Level 5Level 5CONTINUOUS IMPROVEMENTCONTINUOUS IMPROVEMENT

Level 5Level 5CONTINUOUS IMPROVEMENTCONTINUOUS IMPROVEMENT

University of Arizona CharacteristicsUniversity of Arizona Characteristics

Level 3Level 3INTEGRATIONINTEGRATION

Level 3Level 3INTEGRATIONINTEGRATION

Level 2Level 2ACKNOWLEDGEMENTACKNOWLEDGEMENT

Level 2Level 2ACKNOWLEDGEMENTACKNOWLEDGEMENT

Level 1Level 1COMPLACENCYCOMPLACENCY

Level 1Level 1COMPLACENCYCOMPLACENCY

Goal: Set the stage for all security efforts by bringing about a change in attitudes, which will change the campus culture.

Page 8: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

8

Information Security Awareness

AdministratorsStudentsStaff Faculty Technical vs. Non-technical

Challenges

Funding & ResourcesDiversity and DecentralizationVaried Audiences

Page 9: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

9

Information Security Awareness

The What, How & Why or Want to do

Solutions

Timeline / Opportunities

Message vs. Delivery Method

Surveys Include WIIFM - What’s in it for me?

Include Knowledge, Skill and Attitude

Page 10: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

10

Information Security Awareness

The following three slides are a consistent message we communicate or incorporate in our awareness / education efforts to help reinforce

the message that

Security is Everyone's responsibility!

That technology alone cannot keep us secure. People are the last layer of defense.

Page 11: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

11

Information Security Awareness

SEC- -Y

The key to security is embedded in the word security.

YOU ARE IT!

Page 12: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

12

Information Security Awareness

If not you, who?

If not now, when?

Page 13: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

13

Information Security Awareness

During your typical day, you may be exposed to situations where you become aware of an attempt to breach an area of security.

You need to be prepared to:

ProtectDetect

React

Page 14: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

14

Information Security Awareness

Increased reporting & requests

Benefits

Heightened Awareness

Key Partnerships formed

Campus wide understanding, acknowledgement and support

Recognition of Security Office

Page 15: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

15

Information Security Awareness

Dedicated Staff

Costs

Pamphlets

Security Awareness Day

Posters

Page 16: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

16

Information Security Awareness

Monthly “Brown Bag” Presentations

Customized group presentations

Redesigned Security Pagesecurity.arizona.edu

Campus Security Awareness Daysecurity.arizona.edu/awarenessday.html

New Employee Orientation Handout

Initiatives

Page 17: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

17

Information Security Awareness

Initiatives (cont.)

Pamphlets Privacy Basics - Guide to Protecting Personal Information

Risk Reduction - Computer Protection and Prevention

Security Basics - Guide for Protecting Your Computer

Computer Security and Privacy Information - What everyone needs to know

Security Awareness Posterssecurity.arizona.edu/posters.html

Page 18: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

18

Information Security Awareness

First Set

Page 19: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

19

Information Security Awareness

First Set

Page 20: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

20

Information Security Awareness

First Set

Page 21: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

21

Information Security Awareness

Second Set

Page 22: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

22

Information Security Awareness

Second Set

Page 23: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

23

Information Security Awareness

Second Set

Page 24: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

24

Information Security Awareness

Security Policies & Standards are minimal and may or may not be documented. Security Incidents are viewed as someone else's problem. Existing programs and services are perceived as sufficient. Security is viewed as an enforcer.

Realization that existing Information Security processes are fragmented. Executive level support and involvement is visible. Some Security Awareness interventions are implemented and are ongoing.

General acceptance of campus-wide standards based on Security Infrastructure and displayed through noticeable behavior change. Staff, faculty and students actively and visibly participate in the programs and services. Security incidents are reported immediately to the appropriate area.

The integration of Security programs and services in the campus departments is complete. Security is involved at the onset of projects. U of A is considered as a Security Awareness Best Practice campus.

Threats are continually reevaluated based on changing threat population and security incidents. Additional or more cost effective alternatives are continually identified. The practice of Security is considered a component of the campus culture. Security Awareness is viewed as a business enabler.

Level 4Level 4COMMON PRACTICECOMMON PRACTICE

Level 4Level 4COMMON PRACTICECOMMON PRACTICE

Level 5Level 5CONTINUOUS IMPROVEMENTCONTINUOUS IMPROVEMENT

Level 5Level 5CONTINUOUS IMPROVEMENTCONTINUOUS IMPROVEMENT

University of Arizona CharacteristicsUniversity of Arizona Characteristics

Level 3Level 3INTEGRATIONINTEGRATION

Level 3Level 3INTEGRATIONINTEGRATION

Level 2Level 2ACKNOWLEDGEMENTACKNOWLEDGEMENT

Level 2Level 2ACKNOWLEDGEMENTACKNOWLEDGEMENT

Level 1Level 1COMPLACENCYCOMPLACENCY

Level 1Level 1COMPLACENCYCOMPLACENCY

Goal: Set the stage for all security efforts by bringing about a change in attitudes, which will change the campus culture.

Page 25: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

25

Information Security Awareness

Questions

Page 26: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

26

ISO| ECAT

Kelley Bogart Information Security Coordinator

Gil Salazar UA Network Administrator

Page 27: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

27

Information Security Awareness

Page 28: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

28

Information Security Awareness

Agenda

•State of the Internet today

•Viruses, Worms & Spies!

•How to Protect Yourself

Page 29: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

29

Information Security Awareness

State of the Internet Today

Internet goes thru your computer

Page 30: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

30

Information Security Awareness

Some Local Statistics

University of Arizona Campus Cyber attacks per day

# of outside to inside attacks : 64,959

# of Inside to outside attacks : 60,040

# of Inside to Inside attacks : 6,941

Total of related victim machines : 593,734

Page 31: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

31

Information Security Awareness

Threat Follows Value

The 1950s American bank robber Willie Sutton was asked why he robbed banks. He said he robbed banks because,

“That’s where the money is.”

Today, the money is in Cyberspace!

The Internet provides for criminals the two capabilities most required for the conduct of criminal activities:

Anonymity & Mobility

Page 32: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

32

Information Security Awareness

Do The Math

Spam mailed to over 100 million inboxes

If 10% read the mail and clicked the link = 10 million people

If 1% of people who went to site signed up for 3-days free trial

= (100,000 people) x ($0.50) = $50,000

If 1% of free trials sign up for 1 year = (1,000 people) x ($144/yr) =

$144,000/yr

Page 33: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

33

Information Security Awareness

Most attacks Most attacks occur hereoccur here

Situation: It is getting scary!

Product Product shipship

VulnerabilityVulnerabilityDiscovered Discovered ||Potential attackPotential attack

SoftwareSoftwareModifiedModified

Patch Patch releasedreleased

Patch Patch deployeddeployed

at at home/officehome/office

Why does this Why does this gap exist?gap exist?

Page 34: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

34

Information Security Awareness

Exploit Timeline

• Days From Patch to Exploit– The average is now nine days

for a system to be reverse-engineered

Why does this Why does this gap exist?gap exist?

exploitexploitcodecodepatchpatch

Days between patch and exploitDays between patch and exploit

ZoTobZoTob

151151180180

331331

BlasterBlasterWelchia/ Welchia/ NachiNachi

NimdaNimda

2525SQL SQL

SlammerSlammer

1

Page 35: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

35

Information Security Awareness

Exploit Survival Time

• The SANS Institute has studied what it calls the "survival time" of an unprotected computer hooked up to the Internet.

• A year ago, the average time before it was compromised was about 55 minutes.

• Today it's 20 minutes. • On the UA campus it can be less then

ONE MINUTE.

Page 36: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

36

Information Security Awareness

Questions?

State of the Internet

• Why do criminals use the internet today?

•To be Anonymous & Mobile

Page 37: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

37

Information Security Awareness

Viruses, Worms & Spies

Page 38: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

38

Information Security Awareness

• Old “traditional” viruses usually required human interaction– You have to save it, run it, share floppy disks– E-mailing a program / document, without

knowing it is infected• Typically just attach themselves to programs &

documents, and then depend on humans to propagate

• This is changing…

Virus:

Page 39: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

39

Information Security Awareness

How It Spreads

• E-mail

• Instant Messenger

• Networks

• P2P/Filesharing software

• Downloads

• Floppy disks, Flash Drives. CDs, etc.

Page 40: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

40

Information Security Awareness

To: [email protected]: Notify about your e-mail account utilization. From: [email protected]

Dear user of Arizona.edu gateway e-mail server,

Your e-mail account will be disabled because of improper using in next three days, if you are still wishing to use it, please, resign your account information. For further details see the attach. For security reasons attached file is password protected. The password is "03406".

Best wishes, The Arizona.edu team http://www.arizona.edu

Sample E-Mail...................This has a virus attached!

Page 41: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

41

Information Security Awareness

Questions?

Virus:

• What is the most common way viruses are spread today?

•E-Mail

Page 42: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

42

Information Security Awareness

Worms:

• Sub-class of Virus• Replicated Automatically without

human help• Example is e-mail address book

attack• Bogs down networks and Internet• Zotob, Blaster are examples

Page 43: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

43

Information Security Awareness

Page 44: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

44

Information Security Awareness

Worms:

• Scary part – you don’t have to do anything but turn your computer on!

• Or make a simple click.

Page 45: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

45

Information Security Awareness

Trojan Horse

• Program that appears to be a “good” program, but really isn’t

• Might do what it is supposed to, plus a whole lot more!

• programs installed in this category use several methods to enter the computer;– Web, e-mail, spyware

Page 46: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

46

Information Security Awareness

•Botnets are networks of captive computers (often called zombies) that are created by trojans or worms that have infected unprotected PCs.

•These networks are frequently used to send spam and initiate distributed denial of service (DDoS) attacks.

Botnets or “Zombies”

Page 47: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

47

Information Security Awareness

Questions?

Worms:

• What is it called when a program sneaks onto your computer?

•A Trojan

Page 48: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

48

ISO| ECAT

Page 49: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

49

Information Security Awareness

Have you ever received an email that says something like this?

“We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity.”

OR

“During our regular verification of accounts, we couldn’t verify your information.Please click here to update and verify your information.”

Page 50: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

50

Information Security Awareness

This is a typical “phishing” attempt

Page 51: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

51

Information Security Awareness

What is Phishing?

Phishing is a form of social engineering, characterized by attempts to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or legitmate business in an apparently official electronic communication, such as an email, pop-up window or an instant message.

http://en.wikipedia.org/wiki/Phishing#Phishing_technique

Page 52: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

52

Information Security Awareness

Social engineering preys on qualities of human nature:

the desire to be helpful the tendency to trust people the fear of getting into trouble

Social engineering is the practice of obtaining confidential information by manipulation of legitimate users. A social engineer will commonly use the telephone or Internet to trick people into revealing sensitive information or getting them to do something that is against typical policies. By this method, social engineers exploit the natural tendency of a person to trust his or her word, rather than exploiting computer security holes.

Page 53: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

53

Information Security Awareness

EBAY

Page 54: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

54

Information Security Awareness

EBAY

Page 55: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

55

Information Security Awareness

EBAY

Page 56: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

56

Information Security Awareness

EBAY

Page 57: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

57

Information Security Awareness

PayPal

Page 58: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

58

Information Security Awareness

PayPal

Page 59: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

59

Information Security Awareness

PayPal

Page 60: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

60

Information Security Awareness

Visa

Page 61: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

61

Information Security Awareness

Visa

Page 62: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

62

Information Security Awareness

Microsoft

Page 63: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

63

Information Security Awareness

Stats from Anti-Phishing Working Group

Page 64: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

64

Information Security Awareness

Stats from Anti-Phishing Working Group

Page 65: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

65

Information Security Awareness

Stats from Anti-Phishing Working Group

Page 66: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

66

Information Security Awareness

Arizona State Credit Union

Page 67: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

67

Information Security Awareness

DM Federal Credit Union

Page 68: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

68

Information Security Awareness

Recognizing Phishing

False Sense Of Urgency - Threatens to "close/suspend your account," or charge a fee.

Indirect invitation - "Dear valued customer", "Dear reader", "In attention to [service name here] customers“.

Misspelled or Poorly Written - Helps fraudulent e-mails avoid spam filters.

Page 69: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

69

Information Security Awareness

Recognizing Phishing

Suspicious-Looking Links & Pop-Ups Links containing all or part of a real company's name asking you to submit personal information.

Hyperlinks spoofing You see the "http://www.yourbank/Login" link in the message, but if you hover the mouse cursor over the link, you will see that it points to "http://www.spoofedbanksite.com/Login"

Page 70: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

70

Information Security Awareness

Discover Card Awareness

Page 71: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

71

Information Security Awareness

Citibank

Page 72: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

72

Information Security Awareness

Spyware or Phishing-based Trojans – Keyloggers ?

Page 73: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

73

Information Security Awareness

Designed with the intent of collecting information on the end-user in order to steal those users' credentials.

Unlike most generic keyloggers, phishing-based keyloggers have tracking components which attempt to monitor specific actions (and specific organizations, most importantly financial institutions and online retailers and ecommerce merchants) in order to target specific information, the most common are; access to financial based websites, ecommerce sites, and web-based mail sites.

Phishing-based Trojans – Keyloggers

Page 74: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

74

Information Security Awareness

Phishing-based Trojans – Keyloggers, Unique Variants

Page 75: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

75

Information Security Awareness

Unique Websites Hosting Keyloggers

Page 76: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

76

Information Security Awareness

Yet Another Form of Phishing to worry about

Unlike a scam which tries to trick you into providing personal information.

This:

executes code Changes your host file Redirects legitimate webpage to spoofed site

….and all you did was open an email or view it in a preview pane in programs like Microsoft Outlook

Page 77: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

77

Information Security Awareness

Phishing-based Trojans – Redirectors

Designed with the intent of redirecting end-users network traffic to a location where it was not intended to go to. This includes crimeware that changes hosts files and other DNS specificinformation, crimeware browser-helper objects that redirect users to fraudulent sites, and crimeware that may install a network level driver or filter to redirect users to fraudulent locations.

This is particularly effective because the attackers can redirect any of the users requests at any time and the end-users have very little indication that this is happening as they could be typing in the address on their own and not following an email or Instant Messaging lure.

Page 78: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

78

Information Security Awareness

Page 79: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

79

Information Security Awareness

FTC suggestions to help avoid getting hooked by a phishing scam:

If you get an email or pop-up message that asks for personal or financial information, do not reply. And don’t click on the link in the message, either.

Use anti-virus software and a firewall, and keep them up to date.

Don’t email personal or financial information.

Page 80: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

80

Information Security Awareness

Review credit card and bank account statements as soon as you receive them

Be cautious about opening any attachment or downloading any files from emails

Forward spam that is phishing for information to [email protected] and to the company, bank, or organization impersonated in the phishing email.

FTC suggestions (cont’d)

Page 81: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

81

Information Security Awareness

Additional Protection Tips

Treat all email with suspicion

Never use a link in an email to get to any web page

Ensure that all of your software is up to date

Use anti-spyware detection software on a regular basis

Page 82: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

82

Information Security Awareness

If you must use your financial If you must use your financial information online, ensure that you have information online, ensure that you have adequate insurance against fraudadequate insurance against fraud

Be aware or beware.Be aware or beware.

Additional Protection Tips

Page 83: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

83

Information Security Awareness

Questions?

• What does the term “Phishing” refer to?

•Attempt to gather information for illicit use

Page 84: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

84

Information Security Awareness

Spyware

• Ever get pop-ups that constantly ask for you to click “OK” and won’t go away?

• This is most likely Spyware of some sort

Page 85: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

85

Information Security Awareness

Spyware: What it is

• spyware is programming that is put in your computer to secretly gather information about You or your pc and relay it to advertisers or other interested parties

• adware pushes ads, track Internet habits and performs other sneaky tricks

Page 86: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

86

Information Security Awareness

Spyware : How Do I know I have it?

• Computers slow down to a crawl

• Annoying Pop-ups appear

• Browser Start Page changes

• Unwanted toolbars, tray programs

• New programs are installed on your PC and show up on the desktop

Page 87: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

87

Information Security Awareness

Spyware: why is it bad?

• Corrupt/alter the current software

• Steal passwords, information etc.

• Track browsing habits, sites

• interferes with system settings – (registry, startup)

• Even after removal, it can leave crumbs

which helps program re-install itself

Page 88: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

88

Information Security Awareness

Spyware: How did I get it?

• Email

• Instant Messaging

• Internet Browsing

• P2P Software (kazaa, limewire, bearshare, AIM)

• Downloads and Installs – Potentially Unwanted Programs (PUPs)

Page 89: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

89

Information Security Awareness

Page 90: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

90

Information Security Awareness

Page 91: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

91

Information Security Awareness

Spyware : Why do they do it?

• 0x80 is a hacker… he says: "Most days, I just sit at home and chat online while I make money," 0x80 says. "I get one check like every 15 days in the mail for a few hundred bucks, and a buncha others I get from banks in Canada every 30 days." He says his work earns him an average of $6,800 per month, although he's made as much as $10,000. Not bad money for a high school dropout.

Page 92: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

92

Information Security Awareness

Questions?

• What are a couple things Spyware does?

•Create pop-ups, hijacks web pages, collect info, slow pc down.

Spyware:

Page 93: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

93

Information Security Awareness

How to Protect Yourself

Page 94: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

94

Information Security Awareness

Practice Good Surfing Sense

• You know there are bad parts of town that you don’t go to

• The Internet is the same way – be wary!

Page 95: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

95

Information Security Awareness

Download Rules

• Never download or open something, if you don’t know what it is

• Even if you know the sender by name, check with them to see if they sent you something

Page 96: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

96

Information Security Awareness

•True company-based e-mails never send attachments

•Make sure the link actually goes to their site & not a spoofed one!

•Only download what you trust, and even then be wary!

Download Rules

Page 97: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

97

Information Security Awareness

Be Aware of Spoofing

• Have you ever received an e-mail telling you that you have a virus?

• It is possible that :– Your address could’ve been spoofed and

sent to someone else– It could be a trick to get you to install

some “anti-virus” or “patch” (which is really a virus itself!)

Page 98: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

The Best Defense

Page 99: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

99

Information Security Awareness

The Best Defense

• Use Strong Passwords– Passwords should contain 8 characters

including upper and lowercase, special characters (*^#) and numbers

• Don’t take downloads from strangers– Only install what you trust– “free” music & file sharing programs are wide

open doors for hackers

Page 100: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

100

Information Security Awareness

• Check if your PC has any issues:

– Does your browser open to a new home page, or search page?

– Increase in advertisements & pop-ups?

– Computer seems sluggish?

– Know your system and what is installed

The Best Defense

Page 101: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

101

Information Security Awareness

• Get a detect & removal tool for spyware• Ad-Aware: easiest to use, free for home use only• SpyBot: Free for any use, more advanced, has

automated protection features• Microsoft Anti-spyware: Free for any use, has

automated protection and updates.

• Use all three together for complete protection!

The Best Defense

Page 102: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

102

Information Security Awareness

The Best Defense

• Install anti-virus software – (Sophos, Norton, McAfee etc…)

• Install a Firewall – (Windows built-in, Kerio, ZoneAlarm)

• Keep everything up-to-date!• Windows Automatic Updates, Anti-virus,

Spyware detection.

Page 103: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

103

Information Security Awareness

Page 104: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

104

Information Security Awareness

• Limit access to your computer• keep doors locked if your not around and

system is on• Thumb drives can be used to steal data

The Best Defense

Page 105: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

105

Information Security Awareness

• At home use multiple user accounts when sharing computers and switch users/lock workstation when leaving system on when you are away from the desktop

Windows Key – for XP

The Best Defense

Page 106: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

106

Information Security Awareness

Quote from a victim…

"Overall, you've got to realize that, just like if you don't secure your home, you run the risk of getting burglarized; if you're crazy enough to leave the door on your computer open these days, like I did, someone's gonna walk right in and make themselves at home."

~Pastor Michael White

Page 107: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

107

Information Security Awareness

Questions?

The Best Defense

• What is the best way to keep passer bys from accessing your computer?

•Control-alt-delete or Windows-Key L

Page 108: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

108

Information Security Awareness

Other Reminders….

• Back up your computer data.

• Keeping system patches updated

• Firewalls, pop-up blocker, spyware apps updated.

• Know your systems

Page 109: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

109

Information Security Awareness

Now for any Final Q&A…

Page 110: Information Security Awareness 1 University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar

110

Information Security Awareness

Don’t let the computer control you!

Don’t ever give up!

If the situation seems hopeless: