FISSEA Conference 2011 Presentation

FISSEA Conference 2011 Presentation

Securing the Weakest Link Instructor Jay Ferron CEHI, CISM, CISSP, CWSP, MCITP, MCT, MVP, NSA-IAM … [email protected] © 2010 Global Knowledge Training LLC. All rights reserved. Section Objectives After completing this section, you will be able to: Discuss the issue of social media in security Describe and show examples of phishing Show methods of discovering and processing online attacks © 2010 Global Knowledge Training LLC. All rights reserved. 2-2 Security Fundamentals Security Importance To protect your finances To protect your data To protect your country To protect your job To protect your way of life To protect your life © 2010 Global Knowledge Training LLC. All rights reserved. 1-3 Security Fundamentals Human Influence in Security “People are the underlying cause of the need for security.” Donn Parker, Fighting Computer Crime © 2010 Global Knowledge Training LLC. All rights reserved. 1-4 Vulnerabilities Social Engineering Dumpster diving and shoulder surfing Organizational charts, passwords, access codes, and log files Use of tools Google, Bing, Yahoo!, etc. www.learnwebskills.com/company www.whitepages.com Hoover’s, Inc. EDGAR Online, Inc. © 2010 Global Knowledge Training LLC. All rights reserved. 1-7 Demo © 2010 Global Knowledge Training LLC. All rights reserved. Discussion DoHow you manydo haveyou of connect children you have to at more thehome Internet than and one WhatDoHave you areyou useback youever encryption? upusing been your tohit data?computer? read by a yourHow virus? often?eHow-mail? often? ifcomputer(DSL, so, what cable, at ages? home?or dial-up)? © 2010 Global Knowledge Training LLC. All rights reserved. Social Media Types Social networking sites Blogging sites Facebook Xanga Twitter LiveJournal Video sharing Bookmarking sites YouTube Digg Photo sharing Flickr © 2010 Global Knowledge Training LLC. All rights reserved. 2-3 Demonstration Social Networking: Help Desk © 2010 Global Knowledge Training LLC. All rights reserved. 2-4 © 2010 Global Knowledge Training LLC. All rights reserved. Social Media Vulnerabilities Profile Information Name: John Doe Address: 1234 Main Street Capital City, USA Phone Number: 000-555-1110 Date of Birth: 06/15/1972 © 2010 Global Knowledge Training LLC. All rights reserved. 2-5 Vulnerabilities Items At Stake Social security number Mother’s maiden name Birth date Billing addresses E-mail addresses Account numbers Password System information Company or government data Who, what, and where you work © 2010 Global Knowledge Training LLC. All rights reserved. 2-6 Now that I have your ID Let Search about you Let create a New you © 2010 Global Knowledge Training LLC. All rights reserved. Vulnerabilities Attacker Mentality They look for holes They think creatively They think outside of the box © 2010 Global Knowledge Training LLC. All rights reserved. Social Networking Sites Billy Bob, Jr. © 2010 Global Knowledge Training LLC. All rights reserved. Not in Book Social Networking Sites Billy Bob, Jr. © 2010 Global Knowledge Training LLC. All rights reserved. Social Networking Sites Billy Bob, Jr. © 2010 Global Knowledge Training LLC. All rights reserved. Social Networking Sites Profile Management Social networking profiles Koobface outbreak Hoax applications Profile information compromised © 2010 Global Knowledge Training LLC. All rights reserved. 2-8 Social Media Social Engineering Desk call personnel Eagerly talkative employees Janitorial Corporate Contract staff Dumpster diving Delivery personnel © 2010 Global Knowledge Training LLC. All rights reserved. 2-9 Demonstration Dumpster Diving video © 2010 Global Knowledge Training LLC. All rights reserved. 2-10 © 2010 Global Knowledge Training LLC. All rights reserved. Discussion E-mail Phishing © 2010 Global Knowledge Training LLC. All rights reserved. 2-11 Phishing Fraudulent process to acquire: User names Passwords Credit card details Appears to be a trustworthy source Banks Username: Social Web sites Password: Auction sites OK Cancel Options Online payment processors IT administrators © 2010 Global Knowledge Training LLC. All rights reserved. 2-12 Demonstration Internet Phishing © 2010 Global Knowledge Training LLC. All rights reserved. 2-13 Phishing Phishing via E-mail Online security alert: To protect your First Tennessee Internet Banking account from unauthorized access, we have set limit of failed login attempts. Unfortunately, you have just reached critical number of attempts, so your access to Online Banking has been limited for the security purposes. This measure doesn’t affect to your access to ATM machines. To restore your account access, please follow the link below. https://banking.firsttennessee.com/servlet/ftb/index.html?BID=0170 https://banking.bankfirsttennessee.biz/servlet/ftb/index.html?=0170 Thank you for using First Tennessee Bank © 2010 Global Knowledge Training LLC. All rights reserved. 2-14 Phishing SSL © 2010 Global Knowledge Training LLC. All rights reserved. Phishing Phishing Result © 2010 Global Knowledge Training LLC. All rights reserved. 2-15 Online Attacks Statistical Data 491,815,456 records containing personal information compromised since January 2005 Example: TJ retail stores (TJX) 45,700,000 credit and debit card account numbers compromised TJMaxx Marshalls HomeSense AJWright TKMaxx Winners and HomeGoods stores in Canada 48 million more people affected, according to latest records © 2010 Global Knowledge Training LLC. All rights reserved. 2-16 Online Attacks Security Breach Sources Lack of commitment from management No social motivation Incorrect assumptions Not part of job description Not part of performance appraisal No economic motivation © 2010 Global Knowledge Training LLC. All rights reserved. 2-17 Exercise 1 © 2010 Global Knowledge Training LLC. All rights reserved. Exercise 2 © 2010 Global Knowledge Training LLC. All rights reserved. Exercise 3 © 2010 Global Knowledge Training LLC. All rights reserved. Exercise 4 © 2010 Global Knowledge Training LLC. All rights reserved. Questions Thank you for attending if you have questions [email protected] © 2010 Global Knowledge Training LLC. All rights reserved..

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    35 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us