Information Security Training Jason Belford Jimmy Lummis Presenters – Who are these guys? • Jason Belford – Principal Information Security Engineer • Jimmy Lummis – Information Security Policy and Compliance Manager 2 Georgia Tech Information Security • Security Policy • Regulatory Compliance • Incident Response • Operational IT Security • Training and Georgia Tech Awareness Information Security OIT 3 Computer & Network Usage and Security Policy (CNUSP) 4 CNUSP - Highlights • Applies to Faculty / Staff / Students / Guests / Contractors • Encompasses appropriate use of GT computers and networks • Defines expectation of privacy 5 CNUSP - Do Do: • Use IT resources in an ethical and legal manner • Follow Intellectual Property laws • Use a password-protected screensaver • Report issues immediately • Stop and ask if you have questions or concerns! 6 CNUSP – Don’t Don’t: • Circumvent security • Install non-approved software • Use Institute Resources for personal gain (Incidental Use) • Allow others to use your computer • Be afraid to ask questions! 7 CNUSP - Quiz True or False: The CNUSP allows you to download MP3s to your Georgia Tech computer. True or False: I do not need approval to install or use personal software on my Georgia Tech computer. True of False: If my coworker asks for access to my computer, I should just allow it. 8 CNUSP – Links • Computer & Network Usage and Security Policy – http://policylibrary.gatech.edu/computer-and-networkusage-and-security 9 Data Access Policy 10 Data Access Policy (DAP) The Data Access Policy (DAP) provides a structured and consistent process for employees to obtain necessary data access for conducting Georgia Tech operations • All employees of Georgia Tech are covered by the DAP • All Georgia Tech data (electronic, paper or otherwise) are covered by the DAP • All Georgia Tech data is classified into one of four categories 11 Data Access Policy - Data Classification • Category I – Public Use – Examples: Institute web site content, press releases, employee work addresses • Category II – Internal Use – Examples: directory listings, internal intranet web sites, gtID (alone) • Category III – Sensitive – Examples: Social Security Number, research data, intellectual property of Georgia Tech • Category IV – Highly Sensitive – Examples: Credit Card Numbers 12 Data Access Policy – Do Do: • Request access to non-public data appropriately • Assume all data, unless already classified, is category II • Limit the use of data to only what is absolutely necessary • Encrypt non-public data at rest and in-flight • Be mindful of who you share non-public data with • Reach out to Information Security and ask! 13 Data Access Policy – Don’t Don’t: • Attempt to access data you aren’t authorized to access • Give data to unauthorized individuals • Store data unless absolutely necessary • Store data on unsecured systems • Store data on mobile devices unless absolutely necessary • Be shy, reach out to Information Security and ask! 14 Data Access Policy - Quiz True or False: The Data Access Policy states that all data and information should be freely available and made public. Question: What classification category is credit card data? True of False: When I’m not sure what to do with sensitive data, I should crawl under my desk and hide. 15 Data Access Policy – Links • Data Access Policy – http://policylibrary.gatech.edu/data-access 16 Current Threats 17 Hacking • To circumvent security and break into another's server, Web site, or the like with malicious intent • Motivation 1 – – – – – Curiosity Monetary Political Publicity Strategic (State sponsored) 1. http://dictionary.reference.com/browse/hacking 18 Hacktivisim • Hack + Activist = Hacktivist • Political motivation • Most often carried out anonymously 19 Hacks (2011) http://redmondmag.com/articles/2011/06/27/ timeline-of-anonymous-lulzsec-hacks.aspx 20 Hacks (2012) http://redmondmag.com/articles/2011/06/27/ timeline-of-anonymous-lulzsec-hacks.aspx 21 Malware • Malicious Software • Purpose – disrupt computer operation – gather sensitive information – gain unauthorized access to computer systems • Biggest issue on Georgia Tech campus each year http://en.wikipedia.org/wiki/Malware 22 Social Engineering Art of manipulating people into performing actions or divulging confidential information. • Types – – – – 23 Baiting Phishing Tailgating Vishing Phishing From: GaTech Email Admin [mailto:noreplies@gatech.edu] Sent: Friday, September 09, 2011 3:35 AM To: George Burdell <george.burdell@gatech.edu> Subject: Upgrade Your Email You are currently viewing Gatech in basic HTML. Why? Follow the link below for faster, better webmail. Click HERE. 24 Phishing From: GaTech Email Admin <noreplies@gatech.edu> Sent: Friday, September 09, 2011 3:35 AM To: George Burdell <george.burdell@gatech.edu> Subject: Upgrade Your Email You are currently viewing Gatech in basic HTML. Why? Follow the link below for faster, better webmail. Click HERE. http://gatechupgrade.dfjsdh422tgs.cn 25 URL Disection http://www.gatech.edu/login/index.html http://www.gatech.edu/login/index.html http://www.gatech.edu/login/index.html http://www.gatech.edu/login/index.html 26 Phishing From: GaTech Email Admin noreplies@gatech.edu Sent: Friday, September 09, 2011 3:35 AM To: George Burdell <george.burdell@gatech.edu> Subject: Upgrade Your Email You are currently viewing Gatech in basic HTML. Why? Follow the link below for faster, better webmail. Click HERE. http://gatechupgrade.dfjsdh422tgs.cn 27 Phishing Quiz 28 Gone Phishing? https://login.gatech.edu Is this site legitimate? 29 YES! Gone Phishing? https://highereducation.gt.edu.hied.com/login Is this site legitimate? 30 NO! Gone Phishing? http://login.gt.gatech.edu Is this site legitimate? 31 NO! Gone Phishing? https://loginpage.dept.gatech.edu Username:_____________________ Password:_____________________ [SUBMIT] Is this site legitimate? 32 MAYBE…. When in doubt.. ASK! Mobile Device Security 33 Mobile Device Security – What’s a Mobile Device? Mobile computing devices at Georgia Tech include, but are not limited to: • Cellular telephones • Smart phones (e.g. iPhones, Android Phones, BlackBerry) • Tablet computers (e.g. iPad, Kindle, Kindle Fire, Android Tablets) • Personal Digital Assistants (e.g. Palm Pilot) • Any other mobile device containing Georgia Tech data (e.g laptops, USB drives) 34 Mobile Device Security - Threats • • • • 35 Lost or stolen devices Mobile malware Privacy threats Wi-Fi / Bluetooth sniffing Mobile Device Security – Securing the Device • • • • • • 36 Passwords/Encryption Don’t store sensitive data Antivirus Device locators Remote wipe Don’t jailbreak! Mobile Device Security – Device Awareness • Keep your mobile devices with you at all times • If not with you, store in a secured location • Do NOT leave devices unattended in public locations – Airports – Conference rooms – Restaurants 37 Mobile Device Security - Quiz True or False: Malware is only an issue for my home computer. True of False: I should always store sensitive data on my mobile device! True of False: It’s okay to ask a stranger to hold your mobile device while you tie your shoe. 38 Mobile Device Security – Links • Stay Tuned – Currently working to update Data Access Policy and Data Protection Safeguards to include controls for mobile devices 39 Passwords 40 Policy – Changing Soon… Passwords must… • Be 11 to 23 characters • Be changed every 120 days • Contain at least 3 character classes • Lowercase Alphabetic (abcdefg…) • Uppercase Alphabetic (ABCDEFG…) • Numbers (0123456789) • Special Characters (!@#$%&*) Password cannot… • Contain your username • Be one of your most recent 3 passwords http://policylibrary.gatech.edu/passwords 41 Picking a Strong Password – Bad Habits • • • • Don’t share your password with anyone… EVER! Don’t use the same password for multiple accounts Don’t write down your passwords Don’t select a password and then keep changing the number on the end • DON’T USE ANY PASSWORD SEEN IN THIS PRESENTATION! 42 Picking a Strong Password (Method 1) Start with a phrase that means something to you I’m a Rambling Wreck from Georgia Tech!!! Keep the first letter from each word and the punctuation I’ a R W f G T !!! Add some numbers or replace letters with numbers 1’ a R W f 6 1’aRWf6T!!! 43 T !!! Picking a Strong Password (Method 2) Start with a phrase that means something to you And a Heck of an Engineer Replace spaces and letters with special characters &a-Heck-of-an-Engineer &a-Heck-of-an-Engineer 44 Picking a Strong Password (Method 3) Start with a phrase that means something to you Like all the jolly good fellows Pad the beginning and the end with special characters and numbers 1885jollygoodfellows… 1885jollygoodfellows… 45 Picking a Strong Password How do our new password compare? Buzz1234567 1’aRWf6T!!!!! &a-Heck-ofan-Engineer 1885jollygoodf ellows… Number of Characters 11 11 23 23 Character Classes 3 4 3 3 Weak Strong Very Strong Very Strong 10 hours 19 years 9 billion trillion centuries 6 billion trillion centuries How Secure? Time to Crack? Source: https://www.grc.com/haystack.htm 46 Picking a Strong Password Good Mascot Bad Password 47 Quiz 1. (T/F) When my supervisor asks for my password, I am required to give it to them. 2. (T/F) Since the passwords here are supposed to be more complex, it is ok to write it down. 3. (T/F) I should just think of just one password and keep putting a different number on the end each password change. 48 Physical Security 49 Physical Security - Threats • • • • 50 Theft Vandalism Sabotage Espionage Physical Security – Common Exploitation Methods • • • • • 51 Hardware key-loggers Posing as a trusted authority or service person Social engineer staff to gain access to facilities Connect a rogue device to wired/wireless network Tailgating to gain access to data center Physical Security – Combating the Threat • Be aware of your surroundings • Report anything that appears out of the ordinary • Inspect USB and other ports for unknown devices • When in doubt ask for ID • Don’t let your devices out of your sight • Keep sensitive items behind locked doors/drawers • Don’t leave sensitive items in your car 52 Physical Security - Quiz True or False: It’s okay to hold the door for someone on your way into a secured facility. Question: ________ are devices that can be attached to a computer which capture everything entered on a keyboard. True of False: It’s okay to talk about confidential research data on the phone with someone you’ve never talked to before. 53 What to do if you suspect you’ve been hacked! • Contact your CSR and report the issue • Run virus scan – If you are unable to do so: • Save your work • Shut down your computer • Change your GT account password – May be a good idea to change all other passwords 54 Questions 55 Contact Information Jason Belford Jimmy Lummis jason.belford@oit.gatech.edu jimmy.lummis@oit.gatech.edu 404-894-6159 404-385-0334 support@oit.gatech.edu 56