Privacy of Information (Securing Personal Data) Casualty Actuarial Society May 16, 2005

advertisement
Privacy of Information
(Securing Personal Data)
Casualty Actuarial Society
May 16, 2005
John B. Storey, cissp
Securing Data Is No Monkey Business
2
Public Concerns for Personal Data

The “Big Brother” image

Identity theft on the rise and a sense of helplessness prevails

Are corporations and the government doing enough to protect
Personally Identifiable Information (PII) in their custody?

Identification numbers are attached to almost every
transactional activity in our lives and history

Balancing the good and bad uses of information about an
individual

Our need for access to many data sources has created a need
for quick response

Securing PII and Personal Health Information (PHI) is a federal
mandate
3
FBI Annual Report
 Over
$65 Billion is lost as a result of identity
theft each year
 There are over 10 million incidents of
identity theft each year

Many people who suffer a loss don’t make a
report
 Consumers
have spent over 300 million hours
in dealing with clearing their credit reports


Many don’t get through the process for years
Others have been unjustly denied job
opportunities
4
The Need for Data Repositories

“Everyone wants to know it now and fast”


The ease of access to information for quick decisions
Large data repositories for fraud detection
Are criminals exploiting our system?
 Are people impersonating others?


Analytical data models and the almost perfect
degree of accuracy required


Creating the fair balance with scores
Risk analysis in a business transactions
5
Recent Publicized Personal Data Dilemmas

Choice Point


DSW Shoe Warehouse


600,000 employee and customer social security numbers
misplaced by the SEFETY vault
Bank of America


1.4 million credit card and drivers-license numbers
Time Warner


145,000 names, addresses and social security numbers obtained
by false customers and used in an identity theft ring
1.2 million customers social security numbers misplaced in transit
LexisNexis

310,000 social security and drivers-license numbers
6
Inadvertent Disclosure Data

Viruses can be used to obtain passwords
Search randomly or specifically for password files
 Inadvertent disclosure and theft of data


Phishing uses creative “bait and hook”


Deception and coercion lure the unsuspecting Internet user into
disclosing sensitive information
Trojan Horses – the silent listener
Get into a computer system in many ways
 Could be used to intercept sensitive information


Social Engineering


Don’t be tricked into giving sensitive information to the wrong
individual
Employees and contractors
Beware of the opportunist and safeguard sensitive information by
strictly applying the “need to know” rules
 83% of companies surveyed experienced a security breach in 2004
 2004 Deloitte Global Security Survey

7
Protecting Data in your Custody



Are data custodians aware of stored or shared PII
data?
Who is using the data and for what purpose?
Is the data available for viewing on the Internet?




What type of logs or electronic footprints are kept
to meet regulatory requirements?
Where is it stored and for how long?


Is encryption used?
Is the Customer or viewer properly credentialed?
Inherent security controls must be in place consistently as
long as the data is stored and used
Are adequate data disposal controls in place?
8
The Cost of Security Breaches
 2001
ChoicePoint paid $1.3 million for
sending drivers license information
over the Internet
 2003 Acxiom experienced a hacking
activity that resulted in information
loss
 The
cost for the Privacy breach was
approximately $12 million
 2005
ChoicePoint had a privacy breach
 The
approximate cost to date is $15 - $20
million in loss of potential business
9
Protecting Data with an effective
Security Program
Risk
Mgt.
Develop risk management methodologies to
quantify technology risks for informed decision
processes, based on industry standards such as
OCTAVE and NIST Risk Management.
Policies, Procedures
and Best Practices
Awareness & Training
Monitoring & Reporting
Develop policies and best practices to safeguard ISO
and Subsidiaries electronic information.
Policies and best practices must be Third Party
validated standards such as ISO17799 and BS7799-2.
Educate and raise awareness among
employees of your company
Monitor, quantify, and report
violations of access controls
10
Statistics
source: Symantec/MSS 2003
(20,000 sensors deployed in over 180 countries)
Top Originating Countries Excluding Worms
Attack activity by type
Exploit Attempts
17%
Pre-Attack
Recon.
40%
Worms and
Blended Threats
43%
Severe events experienced by industries per 10,000
events
Severe events
10
8
6
4
7.8
6.2
6.1
5.4
Rank
Country
Total
1
2
3
4
5
6
7
8
9
10
United States
Canada
China
Japan
Australia
Germany
South Korea
Taiwan
France
Italy
58%
8%
3%
3%
3%
2%
2%
2%
1%
1%
First Half Position
2003
in 2/2002
1
5
2
9
NR
3
4
NR
6
10
1
7
3
10
NR
4
2
6
5
8
5.1
3
2
2.7
2.5
2.4
1.9
0
Industries
11
The Cost of Security
vulnerabilities

Sophisticated attacks




Tools from password sniffing to self-propagating malicious
software (malware)
Speed of attacks from 3 years (i.e., boot sector) to 4 days (i.e.,
Melissa) to minutes (i.e., Beagle worm)
Financial loss worldwide of $2 billion in August 2003 due to 3
worms in 12 days (Blaster, Welchia, and Sobig.F)
Increased number of software and system vulnerabilities
From 171 vulnerabilities in 1995 to 3,784 in 2003
(source: CERT/CC)
 Average of 10 vulnerabilities per day
 70% of vulnerabilities are classified as EASY TO EXPLOIT
(source: Symantec)


Open computing environment attacks

i.e., remote access, PDA, wireless, etc.
12
Federal and State
Electronic Information Protection

Federal
Graham-Leach-Bliley Act (GLBA)
 Health Insurance Portability and Accountability Act (HIPAA)
 Sarbanes-Oxley (COSO and COBIT)
 Fair Credit Reporting Act (FCRA)


State
NYS Department of Health Cyber Security
 could follow California regulations on protecting employees and
overseas outsourced arrangements
 NYS276
 Additional privacy requirements on GLBA
 CA1386
 Strict security control requirements information
 other states could follow

13
Summary

Implement security controls consistent with
industry standards for adherence to regulatory

Businesses and Technology must work together to
protect the privacy of data

Adhere to regulatory security controls
requirements

Safeguard your Corporation’s Intellectual
Property and investments

Use prudent measures to safeguard your
Corporation from internal exposures
14
Elements of a
Privacy Checklist
What data is stored on your systems and does it
require encryption?
 What privacy elements are contained in the data?
 How long will the data be stored on your systems?
 Are adequate security access controls in place?
 Is sensitive information transmitted unencrypted?
 Do you have a way to determine if data is out of
date?
 Are security controls in place to prevent
tampering?
 Are you complying with privacy regulations

15
Thank You
16
Download