recognizing, detecting and preventing cyber security threats...•now known to hackers as a victim...

21
Cyber Hygiene Practices 11/30/17 Bloustein Local Government Research Center 1 2017 Annual Governmental Accounting & Auditing Update Conference Rutgers Business School By Marc Pfeiffer, Assistant Director Bloustein Local Government Research Center Rutgers University Recognizing, Detecting and Preventing Cyber Security Threats

Upload: others

Post on 12-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 1

2017AnnualGovernmentalAccounting&AuditingUpdateConference

RutgersBusinessSchoolByMarcPfeiffer,AssistantDirectorBlousteinLocalGovernmentResearchCenter

RutgersUniversity

Recognizing,DetectingandPreventingCyberSecurityThreats

Page 2: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 2

BOTTOMLINE▪ Criminalstrytomanipulatepeopleinto

divulgingpersonalorbusinessinformationortrickthemintoschemestodefraud

▪ Criminalscanbeindividualsorpartofindustrialized,cybercrimebusinesses

Nosinglefixsincethethreatskeepchanging;It’saperpetutalbattle

Page 3: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 3

WHYSHOULDICARE?

•60%ofemployeeswillclickaphishinglink

•30%ofthemwillactuallygiveuporganizationcredentials

•20%statedtheywouldselltheirorganizationalpassword

REALITY:thebulkofsuccessfulattackscomebecauseanemployeeclickedon

somethingtheyshouldn’thave

TypesofAttacksandThreats• TargetedAttacks– Governmentagenciesaregenerallytargets– Italsohappensifsomethinggoeswrong

• MassAttacks– Thisstemsfromsuccessfulemailphishing,socialengineering,plus“bruteforce”attacksonnetworks

• Man-in-the-MiddleAttack:– Alinktoalog-insitethatlookslegit,butisfraudulentandwillstealyourcredentials

• Unsecurehumans– Clickingonthewronglink/openingthewrongfile– Anemployeewhostealsdataforresaleorillegaluse

Page 4: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 4

SomeCommonTerms

Malware

Destructiveformofcomputersoftwaretransmittedbyemailandwebsitelinks

Viruses,Trojans.Rootkits.Worms.Spyware.Crimeware. Adware

Page 5: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 5

Phishingaformofsocialengineeringthatappearsasemailoratextmessagethatattackersusetogainlogincredentialsoraccountinformation

Anditsevilcousin,thetargetedSpear-PhishorVish,usingvoicetofoolyou

PHISHINGEMAILSEXAMPLES

Phishingemailposesasanimportantemailfromatrustedorganization

– Anotificationfromthepostoffice,UPS,FedExshippinginformingtherecipientofadelivery

– Amessagefromautilityproviderorretaileraboutanoverduebill

– Analertabouttherecipient’staxreturn– Invoicesornoticesforgoodsandservices(Amazon,Costco)

– Fakecreditcardrewardschemes– Directionfromyouremployer,i.e.,needtolog-inbecauseyoulostsomepermission

Eachvariationreliesonourinstincttoactonmessagesthatappeartobeurgent

Page 6: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 6

• Clickingonanattachmentoralinkembeddedinasuspiciousemaillaunchesaprogramthatencrypts(orrewrites)yourfiles.

Page 7: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 7

THISISRANSOMWARE!SOWHATHAPPENS?

• Thefilesareheldforransom;thehackerwhosenttheemailwillrequireapaymentfromyoubeforetheywill(hopefully)sendyouthekey(alineofcomputercode)thatdecryptsthefilesandrestorethem.

• Hopeyouhavebackupstorestoreyoursystem;otherwiseyoupay!

• Nowknowntohackersasavictimandwillbesubjecttofutureattacks

Page 8: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 8

WHEN EMAIL TURNS EVIL!!!

EMAILASSOURCEOFMALWARE?

- Embedded,butfakelinksenticeyoutoopenharmfulwebsites

- Spoofed“from”addresses

- Attachmentscanhaveembeddedvirusesormalware;MSOfficedocumentscanhavemaliciousmacrosinthemorrequeststolinktootherfilesfromafileyoudownloaded.Otherattachmentsincludehtmlandzip.

- Couponsandadvertisementswith“hiddenagendas”

- Alwayswithsuggestionthatyouneedsomething,orcouldgetsomethingforabargain.

Page 9: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 9

PROTECTYOURSELFFROMEVILEMAIL

Page 10: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 10

• Learntohoverandreadlinks!

• Besuspiciousofunexpectedemails

• Donotdownloadoropenattachmentsyouarenotexpecting:• Confirmfirstwiththesenderifitlooksimportant• Orjustdeleteit

• Alwaysbesuspicious(donotletyourguarddown)

• Ifitdoesn’tlookright,it’snotright

• Donotlogintoanaccountfromanemaillinkunlessyouverifyit’salegitemailandsite

• Neverunsubscribefromagroupthatyouareunfamiliarwithordidnotsubscribeto

Page 11: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 11

• Usestrongpasswordsorbetteryetpass-phrases; donotusenames,dateofbirths,oranythingknownaboutyou.Andvarythem.– Particularlyforfinancialsites,siteswithyourcreditcardinformation,andemail.

– Changethemperiodically(annuallyforkeyones)• Donotsharepasswords!– Anythingthathappensonthataccountgetstreatedasifyoudidit.

– Ifyoudoshareapasswordchangeittosomethinggenericbeforeandbacktosomethingcomplexafter;orchangeitafterit’suse

• Useapersonalpasswordmanager

MakingandManagingStrongPasswords

Page 12: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 12

SAFEWEBBROWSING

Page 13: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 13

HTTP

HTTPS

Page 14: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 14

http://masterupdate.net/.....

Ifyouareunsureaboutthistypeofpop-up,searchfor“flashupdate”andgotoanadobe.com sitetocheck.Don’tdownloadfromapop-upthat’snotfromtheadobe.comwebsite.

Page 15: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 15

• DONOTCLICKONsuspiciouspop-upsorunexpectedmessageswhenbrowsing!– Ifatwork,callIT;ifathome,closethewindowor,disconnect

fromnetwork

– Workiswork,nothome!

– Rememberyourwebbrowsingactivitiesaretracked(evenifyouclearthebrowserhistory)!

– DON’TCLICKonthatpop-up!

– DON’TCALLthenumberonthescreen

SafeBrowsing:@Workand@Home

• Thingsthataretoogoodtobetrue,aren’ttrue.Don’tclickonthemordeletethem

• Caughtinaloop?Shutdownandreboot

• StaySafe:Browsetrusted sites:• Knowtheaddress:HTTPvs.HTTPS,andnopasswordsonnon-https sites

• Usetwo-factorauthenticationwhenoffered• Don’tdownload“toolbars”orcleaners,unlessknownorcheckedout.Youprobablydon’tneedthem

KEEPYOURCOMPUTERUPTODATEKeepwindows,antivirus,andbrowser

updatedwithlatestversions

Page 16: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 16

FormsofSocialEngineering

• In-person• Phone• Digital

Page 17: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 17

BEWAREOF……phonecallersaskingforconfidentialemployeror

personalinformation,eveniftheyclaimtobefromIToravendor.ReferthemtoITsupportorhangup.

'Canyouhearme?'phonescamAdangerousnewphonescamisspreadingacrossthecountry,withfauxtelemarketersaskingunwillingvictimstorespondwithasinglewordto"Canyouhearme?"

{ }

Page 18: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 18

UNFORGETTABLES

• Donotlogonandoffacomputerwhenaskedbyanotheremployeeoroutsideperson–unlessidentityisverified

• CallerIDcanbe“spoofed”• Usetwo-factorauthenticationtransactionswheneveritsavailable

• FiscalandHRpeople:POSTIVELYconfirmallemaileddirectionsforanything(especiallyforpersonnelinformationandpaymentdirection)

• Usepasscodeonmobiledevices35

Page 19: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 19

• Nosystemis100%perfect- sincethreatsarealwayschanging

• Stayaware:stop,think,thenconnect• CallyourITsupportpersonwhenindoubt• Athome:www.malwarebytes.com ifyougetinfected

UH,NOPE

PUTTINGITALLTOGETHER

• Don’tbecurious– justdon’tclick• Online;freeisneverfree• Besuspicious– hoverfirstandcheckitout• Ifyoudidn’taskforit,youdon’tneedit• Never openattachmentsfromunknownpeople• Don’tinstinctivelyopenfilesfrompeopleyouknowbutwerenotexpecting;checkwiththemfirst

• LockyourPCwhenawayfromyourdesk– “Ctrl+Alt+Del>Enter”or“Windows+L”

• Testyourself:searchfor“PewCybersecurityQuiz”• www.pewinternet.org/quiz/cybersecurity-knowledge/

Page 20: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 20

Youknowwhattheysay…

Formoreinformationforworkorhomeorschool:www.stopthinkconnect.org

Page 21: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats

CyberHygienePractices 11/30/17

Bloustein Local Government ResearchCenter 21

Forfurtherdiscussionandcomments

MarcPfeiffer,AssistantDirectorBloustein LocalGovernmentResearchCenterBloustein SchoolofPlanningandPublicPolicyRutgersUniversityMarc.Pfeiffer@rutgers.edu

• SeetheTechnologyRiskManagementPapersbysearchingfor“Bloustein TechnologyRisk”