security awareness protecting sensitive information

27
Security Awareness Protecting Sensitive Information “Good but he that filches from me my good name, robs me of that which not enriches him, and makes me poor indeed." - Shakespeare, Othello, act iii. Sc. 3.

Upload: ezra

Post on 23-Feb-2016

62 views

Category:

Documents


0 download

DESCRIPTION

Security Awareness Protecting Sensitive Information. “Good but he that filches from me my good name, robs me of that which not enriches him, and makes me poor indeed."  - Shakespeare, Othello, act iii. Sc. 3. Security Awareness mindset : - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Security Awareness Protecting Sensitive Information

Security AwarenessProtecting Sensitive Information

“Good but he that filches from me my good name, robs me of that which not enriches him,

and makes me poor indeed." 

- Shakespeare, Othello, act iii. Sc. 3.

Page 2: Security Awareness Protecting Sensitive Information

Security Awareness mindset :

“I understand that there is the potential for some people to deliberately or accidentally steal, damage or misuse the data that is stored within my computer systems and throughout our University. Therefore, it would be prudent for me to stop that from happening.”

SEC Y

Page 3: Security Awareness Protecting Sensitive Information

We handle sensitive or confidential data in all types of formats

• Social Security number (SSN)• credit card number• drivers license number• personally identifiable patient information• personally identifiable student information• personnel information• proprietary research data• confidential legal data• proprietary data that should not be shared

with the public

Page 4: Security Awareness Protecting Sensitive Information

Regulations, Regulations and Regulations !!!!

• Gramm-Leach Bliley Act (GLBA)

• Family Rights to Privacy Act (FERPA)

• North Carolina Identity Theft Protection Act

• Health Insurance Portability and Accountability Act (HIPAA)

And More !!

Page 5: Security Awareness Protecting Sensitive Information

• A laptop belonging to Fidelity Investments, one of the largest mutual fund companies in the world, was stolen recently

• The laptop contained financial information on almost 200,000 current and former Hewlett Packard employees…..

Page 6: Security Awareness Protecting Sensitive Information

• The Department of Veterans Affairs (VA) recently learned that an employee, a data analyst took home data from the VA, which he was not authorized to do.

• Over 26 MILLION veterans had their personal information stolen, including social security numbers and disability ratings when the employee’s home was burglarized.

• The VA is now implementing procedures to dismiss the employee.

Page 7: Security Awareness Protecting Sensitive Information

And At Universities….

University of Colorado officials announced that 49,000 current and former students may have had theirprivacy compromised after the university found hackershad tapped into a database in the registrar's office The data contained names, Social Security numbers, addresses and phone numbers

“You feel violated. For the people whose data we are hereto protect, you just feel awful.'‘- Barbara Todd, CU-Boulder registrar.

Page 8: Security Awareness Protecting Sensitive Information

How do Hackers get what they want?

Page 9: Security Awareness Protecting Sensitive Information

Phishing

Fraudulent emails created by criminals to look like messages and websites from established businesses, financial institutions, or government agencies in order to gain personal information from unsuspecting users—YOU

Page 10: Security Awareness Protecting Sensitive Information

Dear Laredo National Bank customer,

CONGRATULATIONS!

You have been chosen by the Laredo National Bank online department to take part in our quick and easy 5 question survey.

I n return we will credit $25 to your account - Just for your time! Helping us better understand how our customers feel benefits everyone.

With the information collected we can decide to direct a number of changes to improve the results and expand our online service. We kindly ask you to spare two minutes of your time in taking part with this unique offer!

SERVICE: Laredo National Bank $25 Reward Survey EXPI RATI ON: J une - 30 - 2006

Confirm Nowyour $25 Reward Survey with Laredo National Bank.

https:/ / secure.lnb-online.com/ cgi-bin/

The information you provide us is all non-sensitive and anonymous No part of it is handed down to any third party groups. I t will be stored in our secure database for maximum of 3 days while we process the results of this nationwide survey.

Please do not reply to this message. For any inquiries, contact Customer Service. Document Reference: (97051203). Copyright 1996 - 2006 Laredo National Bank

Copyright 1998 - 2006, Laredo National Bank. All Rights Reserved

Page 11: Security Awareness Protecting Sensitive Information

Social Engineering

• A hacker’s favorite tool—the ability to extract information from computer users without having to touch a computer

• Coercing people to give out information is known as “social engineering” and is one of the greatest security threats out there

Page 12: Security Awareness Protecting Sensitive Information

• Social engineers prey on some basic human tendencies….– The desire to be HELPFUL– The tendency to TRUST people– The FEAR of getting into trouble

Page 13: Security Awareness Protecting Sensitive Information

Hacker:

“Hello ! I’m Karen from XYZ Corp. We are conducting a survey of ABC financial database software users to determine their level of satisfaction”

Office Worker:

I’m sorry, we don’t use ABC database software, we use MNO database, sorry I can’t help you”

YOU JUST DID !

THE PHONY CALL

Page 14: Security Awareness Protecting Sensitive Information

What can Malware do?A Virus installed on your computer may:

• Download other malware• Crash your workstation• Capture and send sensitive information

from your workstation to the hacker• Be used to perform attacks from inside our

network

Page 15: Security Awareness Protecting Sensitive Information

What Can I Do?

Page 16: Security Awareness Protecting Sensitive Information

• Do not copy or download data from the university’s administrative systems to a PC, PDA, Laptop, etc unless required by your department

• If you are required to store sensitive data, store it on Piratedrive

Page 17: Security Awareness Protecting Sensitive Information

• Search your workstation for sensitive data and either delete or move it to Piratedrive

• Use encryption if you must store sensitive data locally

• Keep your computer updated with the latest patches and antivirus definitions

Page 18: Security Awareness Protecting Sensitive Information

• Use strong passphrases on all your computer systems and change them regularly

• Never give your passphrase out to anyone

• Don’t use the same passphrase on your university and home workstations or programs

Page 19: Security Awareness Protecting Sensitive Information

• Don’t store sensitive information on a web server

• Use a secure server to store sensitive data

• Use an encrypted database, such as SQL or Oracle to store sensitive information

• Remove the confidential part of the information

from the data if this is possible (e.g., SSN)

Page 20: Security Awareness Protecting Sensitive Information

• Never allow others to use your PirateID or other logins –this includes your supervisor!

• When you are not at your workstation, log out or lock it using CTL-ALT-DEL

• Don’t use the “auto complete” option to remember your passphrases

Page 21: Security Awareness Protecting Sensitive Information

• Avoid using Instant Messaging and Chat

Software

• Avoid using Peer to Peer file sharing software

• Don’t download or install unauthorized programs

Page 22: Security Awareness Protecting Sensitive Information

• Don’t leave unattended sensitive data on your desk, FAX, printers or copiers

• Keep sensitive data stored in a locked desk, drawer or cabinet

• Shred sensitive data for disposal

• Email is not secure and should not be used to send sensitive information. If you must use email ALWAYS encrypt sensitive data

Page 23: Security Awareness Protecting Sensitive Information

• Don’t open unscanned, unknown or unexpected email attachments

• Download an attachment and check it with A/V prior to opening it

• If you receive an email with a hyperlink, don’t open it in the email –open a web browser and type the link in manually

Page 24: Security Awareness Protecting Sensitive Information

• Use a screensaver with the password enabled

• When you go home, turn off the computer

Page 25: Security Awareness Protecting Sensitive Information

• Despite all our security controls, we are wide open to an attack if an employee unwittingly gives away key information in an email, by answering questions over the phone with someone they don't know or failing to ask the right questions

Page 26: Security Awareness Protecting Sensitive Information

If you suspect a problem

Notify the ITCS Help Desk at 328-9866

IF you’ve been hacked, or think you have, change the passphrase to ALL systems you have access to

(and not from the hacked workstation either)

If you have received a threat notify the ECU Campus Police

Page 27: Security Awareness Protecting Sensitive Information

For more information

Please visit the ITCS website atWWW.ECU.EDU/ ITCS

and click on

“Computer Safety and Security”