• No results found

INFORMATION SECURITY FOR YOUR AGENCY

N/A
N/A
Protected

Academic year: 2021

Share "INFORMATION SECURITY FOR YOUR AGENCY"

Copied!
34
0
0

Loading.... (view fulltext now)

Full text

(1)

I

NFORMATION

S

ECURITY FOR YOUR

A

GENCY

Presenter:

Chad Knutson

(2)

C

ONTACT

I

NFORMATION

 Dr. Kevin Streff

 Professor at Dakota State University  Director - National Center for the

Protection of the Financial Infrastructure

 Managing Partner at SBS  kevin@protectmybank.com

 Chad Knutson

 Senior Information Security Consultant  CISSP, CISA, CRISC

 Phone: 605-480-3366

 chad@protectmybank.com

(3)

D

AKOTA

S

TATE

N

ATIONALLY

R

ECOGNIZED

• National Security Agency

• Department of Homeland Security

• 4,000 universities in the country

• Only 100 named national centers in the past 10 years

(4)

D

AKOTA

S

TATE

U

NIVERSITY

S

UMMARY

 Dakota State University is the only national

center of excellence focused on the security of banks

(5)

S

ECURE

B

ANKING

S

OLUTIONS  Information Security  IT Risk Assessment  Policy Development  IT Audit  Vulnerability Assessments  Penetration Testing  Social Engineering  Financial Institutions  www.protectmybank.com

 Community Banks & Credit Unions

 Healthcare

(6)

A

GENDA

 What information security laws and regulations

apply to me?

 What security threats exist in todays world that

I should be concerned about?

 How can I protect my business?

(7)

C

YBER

C

RIME

– W

HO IS THE TARGET

?

 Cybercrime will eclipse terrorism – FBI Director  …around 85% of cyber attacks are now targeting

small businesses – Whitehouse

 70% of small business lack basic security

controls

Who has the data that cybercriminals want? Who are the least expecting targets?

 Where might information security be the

weakest?

 Where could a cybercriminal break in, where

(8)

H

ACKING MADE EASY  Default Passwords http://cirt.net/passwords  Hacking Tools http://sectools.org/  Caller ID Spoofing http://www.telespoof.com/freecall/agi

 Social Engineer Toolkit

(9)

I

NDUSTRY

R

ISK

A

SSESSMENT 9

Sensitive Data

Size / Locat

ion

Lar ge/Met ro Sm all /Rural

Business Health Financial

(10)

G

RAMM

-L

EACH

-B

LILEY

A

CT

(GLBA)

"develop, implement, and maintain a

comprehensive written Information Security Program containing administrative,

technical, and physical safeguards that are

appropriate to the size and complexity of the entity, the nature and scope of its activities, and the sensitivity of any customer information at issue." - Safeguards Rule implement section 501(b) of GLBA (effective on July 1, 2001)

 The law covers banks, savings and loans, credit

unions, insurance companies and securities

(11)

H

EALTH

I

NSURANCE

P

ORTABILITY AND

A

CCOUNTABILITY

A

CT

(HIPAA)

 Security Rule requires covered entities to

maintain reasonable and appropriate

administrative, technical, and physical

safeguards for protecting e-PHI.

 Specifically, covered entities must:

Ensure the confidentiality, integrity, and

availability of all e-PHI they create, receive, maintain or transmit;

 Identify and protect against reasonably anticipated

threats to the security or integrity of the information;

 Protect against reasonably anticipated, impermissible

uses or disclosures; and

 Ensure compliance by their workforce.

(12)

O

THER

S

TATE

& F

EDERAL

L

AWS

 Identify Theft Red Flags Rule  Fair Credit Reporting Act

 Fair & Accurate Credit Transactions (FACT) Act  State Data Breach Notification Laws

(13)

P

ERSONALLY

I

DENTIFIABLE

I

NFORMATION

 Information which can be used to distinguish or trace an individual's identity, such as their name, social security number, biometric records, etc. alone, or when combined with other personal or identifying information which is linked or linkable to a specific individual, such as date and place of birth, mother’s maiden name, etc. (NIST 800-122 and Westport

“Personal Data”)

 First name and last name or first initial and last name in combination with any one or more of the

following data elements that relate to such resident: (a) Social Security number; (b) driver's license

number or state-issued identification card number; or (c) financial account number, or credit… (Mass

(14)

S

ECURITY PROCESS

Plan

(15)

I

NFORMATION

S

ECURITY

P

ROGRAM

15

Administrative

(16)

I

NFORMATION

S

ECURITY

P

ROGRAM 16 Administrative Technical Physical • Malware Protection • Hardware Firewall • Software Firewall • Software Patching • Wireless Security • Unique User Accounts • Limited User Permissions • Data Encryption • Data Backup • Mobile Devices • Physical Security • Security Cameras • Motion Sensors • Receptionist • Secure Areas • Locked Doors

(17)

Policy & Procedures

Agency

Risk

Assessment Response Incident Penetration Test Continuity Business Vulnerability Assessment Awareness Security Engineering Social IT Audit

ISP B

LUEPRINT

(18)

Policy & Procedures

Agency

Risk

Assessment Response Incident Penetration Test Continuity Business Vulnerability Assessment Awareness Security Engineering Social IT Audit

ISP B

LUEPRINT

Q1

(19)

S

MALL

B

USINESS

I

NFORMATION

S

ECURITY

:

T

HE

F

UNDAMENTALS

 October 2009 NIST 7621 was released  Assist small business management in

understanding how to provide basic security for their information, systems, and networks.

 Provides commercially reasonable security

measures which will reduce the likeliness of a security incident.

 Three basic areas which may reduce likeliness:

Absolutely Necessary (todays focus)

 Highly Recommended  Other Considerations

 http://csrc.nist.gov/publications/nistir/ir7621/nistir-7621.pdf

(20)

1) M

ALWARE

- V

IRUS

, T

ROJANS

, S

PYWARE

 If your networks access the internet, then you

(21)

2) H

ARDWARE

F

IREWALL

 Most small businesses have a broadband (high

speed) internet connection which is always “on”. This leaves the network susceptible to network

attacks on a 24/7 basis from anywhere in the world.

(22)

3) S

OFTWARE

F

IREWALL

 In addition to hardware firewalls, software

firewalls should be used on all workstations, mobile devices, and servers.

 Software firewalls protect systems from each

other.

(23)

4) S

OFTWARE

P

ATCHING

 All operating systems such as Microsoft

Windows, Apple OSX, and all distributions of UNIX/Linux have patches that need to be

installed on a regular basis.

 Most software products require patches,

including Microsoft Office, Adobe, Java, QuickTime, Firefox.

 These patches fix compatibility issues and

known security vulnerabilities, not applying them leaves you vulnerable.

(24)

5) B

ACKUP

D

ATA

 Backing up your data protects it from numerous

threats:

 Hackers destroying your computer  Malware corrupting your data

 Fire and other natural disaster destroying your

systems

 Many other threats

 Include all your critical data, backup often.  Store a copy offsite.

 Test your backup process to know you can

(25)

6)

PHYSICAL ACCESS

S

ECURITY

 Secure each entrance point

 Monitor areas for unauthorized people  Escort visitors around the building

 Secure documents, computers, servers from theft

25

Secure ?

(26)

7) W

IRELESS

S

ECURITY

 Do not use wireless unless required for business  Securely configure all wireless devices and

access points.

 Most users implement with default settings

 Default passwords - http://cirt.net/passwords

 WEP encryption can be hacked in hours (WPA2)  Security vulnerabilities in wireless technology

www.us-cert.gov/cas/techalerts/TA12-006A.html

 Update wireless software and firmware

 Users connect wireless devices to unsecured

(27)

8) S

ECURITY

A

WARENESS

T

RAINING

 Employees should read security policies  Employees should sign Acceptable Use

Agreement

 Employees should receive training on security

threats:  Malware  Phishing  Social Engineering  Unauthorized Access 27 Phishing 15% Other Spam 74% Legitimate Email 11%

(28)

9) U

NIQUE

U

SER

A

CCOUNTS

 Users should have a unique login to all computers,

programs, and websites.

 Users should not be administrators on their local

machine. If users can install software, then malware can install itself to the computer when clicked.

Complex passwords - the password Spring08 can be

cracked with on a normal computer in 24 seconds.

Secure Passwords - 73% of users share the passwords

which they use for online banking, with at least one

nonfinancial website.

 If its easy to remember, its easy to guess. Try mnemonics

“Proud to be an American” + birth year = PtbaA0&91 0&91 where the & has been substituted for 8 and 0891 is backwards for 1980.

(29)

10) L

IMIT

A

CCESS TO

D

ATA

 For all employees, provide access to only those

systems and only to the specific information that they need to do their jobs.

 Do not allow a single individual to both initiate

and approve a transaction (financial or otherwise).

 Limited access reduces the exposure of data to

malware and hackers. Also reduces the impacts of malicious insiders.

(30)

11) E

NCRYPT

P

ERSONALLY

I

DENTIFIABLE

I

NFORMATION

 Identify where in your institution you have

personally identifiable information.

 When that information leaves your institution,

assess whether or not you have encrypted that data during transmission or storage.

 Common systems needing encryption are:

 Company Website  Email

 Offsite backup tapes  Laptops

 Mobile phones / Tablets / iPads

(31)

12) D

OCUMENTED

I

NFORMATION

S

ECURITY

P

OLICY

 Document the process of how risks to personally

identifiable information will be assessed.

 Document specific controls implemented to

protect this information.

 Document auditing and testing procedures used

to validate your security policy.

 Document acceptable use of information and

technology by employees.

 Document how you will identify, contain, and

respond to a security incident; including

communication with third parties, regulators, authorities, and customers.

 Document how you will recover from a disaster.

(32)

R

ESOURCES

 HIPAA Security Rule

(33)

33

Presenter:

Chad Knutson, Secure Banking Solutions chad@protectmybank.com

(34)

C

ONTACT

I

NFORMATION

 Dr. Kevin Streff

 Professor at Dakota State University  Director - National Center for the

Protection of the Financial Infrastructure

 Managing Partner at SBS  kevin@protectmybank.com

 Chad Knutson

 Senior Information Security Consultant  CISSP, CISA, CRISC

 Phone: 605-480-3366

 chad.knutson@protectmybank.com

References

Related documents

When data for this report was extracted on 09 October 2020, 167 Serious Incidents on the StEIS system were designated by their reporters as Never Events and had a reported

In this work, this result is extended to the general case N > 2 and to this end another synchronization control is proposed, which is not based on the theory of [45] and a

Proposition 6: Those organizations building alliances and achieving coordination by sharing information and plans with external stakeholders prior to a crisis will experience

Impact on mortality of the timing of renal replacement therapy in patients with severe acute kidney injury in septic shock: the IDEAL-ICU study (initiation of dialysis

We made the following three hypotheses: (1) individuals with normal aging would present hyper-activation in the frontopari- etal network and default mode network and hypo-activation

As indicated in the table the entry level VSC50 service, is provided with a 1GB Internet bundle with a maximum download speed of 512kbps and an upload speed of 128kbps with the

As an example of the applications, a high gain planar array antenna at V band by using the half-height-pin gap waveguide has been designed and is presented in the paper with a

Corporate must take vulnerability audit as basic policy and practice in evaluation, planning, execution and monitoring and control of their information security on network