SEAS - Security - PPT

Information Security for CPAs
Southeastern Accounting Show
J. Carlton Collins
Copyright August 2009 – J. Carlton Collins
Information Security for CPAs
J. Carlton Collins, CPA
1. Virus Protection
Top Virus Protection Products
2. Patches & Updates
Windows Updates
Windows XP & Windows Vista Firewalls
3. Password Protected
Screen Saver
4. Firewall
5. Configure Your
Wireless Routers
Firewall Settings
–Reset password
–Turn on Encryption
–Broadcast different name (SSID)
6. Encryption Primer
Encrypting Word and Excel Files
Encryption Primer
Page 17
All encryption is based
on two prime numbers:
About Bits
Page 17
It takes 8 Bits to Form a Single Number
40 Bit
1 second
56 Bit
19 hours
64 Bit
7 months
128 Bit
1234567891234513 4.3 quadrillion
7. Encrypt Your Data Files,
Folders & Hard Drives
Protecting Your Hard Drive
1. BIOS Password
2. Windows Password
Carlton Collins
How Thieves beat BIOS &Windows Passwords
1. Remove Drive
2. Insert in another
computer as
second drive
3. Second drive
How Thieves beat BIOS & Widnows Passwords
1. Or they use
3. Encrypt Files or Folders
1. Must use NTFS (in Windows XP)
2. Right click file or folder, select “Properties”
3. Select “Advanced”
4. Or Use Vista BitLocker
1. New in Vista
5. Or Use TrueCrypt
Hard drive is encrypted and decrypted on the fly
8. Encrypting Your E-Mail
PGP (Pretty Good Privacy)
E-Mail Encryption Software
E-Mail Encryption Software
E-Mail Encryption Software
E-Mail Encryption Software
9. Use Windows Vista
Why Vista?
– I know, I know – the image that Vista stinks
– I told people Vista stinks for almost a year, I now
believe otherwise
– Vista is the greatest operating system ever written
on the planet
– Far more secure than Windows XP
– Sees more RAM and processors
– Very fast
– Instant Search
– 3-D Flip
10. Regular Backups
Online Backup
–Carbonite - $50 year
–XCentric - Superior
11. Use an Uninterruptible
Battery Backup Device
12. Filter Your Searches
13. Strong Passwords
3. Use Strong Passwords
Page 28
Happy – 5 minutes to break
Happy44 – 15 minutes to break
hAPP5y44 – Many hours to break
(Microsoft recommends using Upper/lower/special
delta 4499
I recommend the old phone number method:
638 4822 delta 4499
14. Employee & Customer
Background Checks
5. - Instant Criminal & Background Check SSN Verification/FCRA (877)974-1500 - Screen Employees with Personality, Aptitude, Skills Tests. - Industry's fastest turnaround time. Trusted by Fortune 500.
6. - Accurate and compliant employee background checks, drug testing, physical
exams, and Form I-9 eSolutions provided by Kroll.
7. - Instant online results for criminal checks, driving records, and credit reports. FCRA
compliant. National criminal check only $19.95.
8. - $18.95 - Free preliminary results. Instantly check millions of
records - $18.95. Comprehensive state and national background checks.
9. - Professional employment background screening, hire with confidence!
10. - Medical, Manufacturing, Financial Quality Customized Services
11. - Provider of online applicant-screening services.
12. - Site enables visitors to perform free background checks, using public
13. - A service which provides instant desktop delivery of criminal records
information, social security validation and more.
14. - Provider of web-based pre-employment screening services and employee
background checks, including criminal, reference, DMV, education and employment verification.
15. - Provider of Internet-based applicant testing services, including technical, language and
programmer/analyst aptitude testing.
16. - Provides national employee and business background online.
17. - Firm offers pre-employment screening services for employers, human resources and
security departments.
18. - Provider of online pre-employment screening services.
19. - Provides internet-based employee screening.
20. - Instant online results for criminal checks, driving records, and credit reports. FCRA
compliant. National criminal check only $19.95.
21. - Many searches with instant results. Compare vendors. Free 1 week Trial.
22. - Provider of legally compliant, employment screening services over the Internet.
23. - Provider of pre-employment screening through background checks. Provides a web based
order and retrieval system.
24. - Provider of Internet-based solutions to attract, screen, interview and retain technology
15. Follow Good Computer
Disposal Practices
1. Federal Environmental Law - The Resource Conservation and Recovery Act (RCRA) has
been updated recently to include guidelines regarding the disposal of computer
2. Sarbanes Oxley and HIPPA - Sarbanes Oxley and HIPPA laws require that all data be
properly removed before hard drives are properly disposed of.
3. Hazardous Materials - Computers contain hazardous materials such as mercury,
cadmium (a known carcinogen), and hexavalent chromium (associated with high
blood pressure, iron-poor blood, liver disease, and nerve and brain damage in
4. CRT Concerns - Most environmental concerns are associated with monitors.
Specifically, a color cathode ray tube (CRT) contains about four to five pounds of lead,
which of course is considered hazardous waste according to the EPA.
5. Computers in Landfills Outlawed - California, Massachusetts, and Minnesota have
outlawed the disposal of computer waste in landfills.
6. Ponder This - Suppose what might happen if groundwater becomes contaminated
and a search for the source finds that your old computer (identified by a control tag or
manufacturer’s number) has been discarded nearby. You could be subject to
potentially costly criminal and civil litigation (i.e., SARA, formerly CERCLA, litigation).
This could happen even if the organization had donated the equipment to a charity or
paid a company to recycle it.
7. License Considerations - If you donate your computer, you should evaluate software
license agreements to determine if they preclude transfer of the software along with the
16. Use Pick Proof
Door Locks
Open any padlock with a beer can -
Learn how locks work
Open door locks with picking tools
Make your own pick tools
Pick a padlock with homemade pick tools
Open door locks with a bump hammer
Open a door lock with a pick gun
Open a car with a tennis ball
Open car with wood wedge and pole
Open a tubular lock
Pick a club and pick a car ignition
Pick tools described
Order picking tools online
Order a pick gun online
Order a bump hammer online
Order car pick tools online
17. Shred Everything
18. Online
Security Tests
ShieldsUp! - Port Authority Edition
Broadband Tests and
GFI Email Security Testing
Hacker Whacker
PC Flank
PC Pitstop
19. Employee Agreements
5. Users will not associate unapproved domain name sites with a company owned IP
6. Users will not knowingly or carelessly perform an act that will interfere with the normal
operation of computers, terminals, peripherals, or networks.
7. Users will not knowingly or carelessly run or install on any computer system or network,
or give to another user, a program intended to damage or to place excessive load on a
computer system or network. This includes, but is not limited to, programs known as
computer viruses, Trojan Horses, and worms.
8. Users will refrain from activity that wastes or overloads computing resources. This
includes printing too many copies of a document or using excessive bandwidth on the
9. Users will not violate terms of applicable software licensing agreements or copyright
10. Users will not use company resources for commercial activity, such as creating products
or services for sale.
11. Users will not use electronic mail to harass or threaten others, or to send materials that
might be deemed inappropriate, derogatory, prejudicial, or offensive. This includes
sending repeated, unwanted e-mail to another user.
12. Users will not use electronic mail on company-owned, or company-sponsored, or
company-provided hardware or services to transmit any information, text, or images
that would be deemed offensive, inappropriate, derogatory, prejudicial, or offensive.
20. Periodic Computer
1. Recent Applications
2. Search history
3. Browsing History
4. Cookie History
5. Temporary Internet Files
6. Search for JPGs
7. Recycle Bin
8. Suspicious Password Protected Files
9. Requesting Lost Passwords
10. Review Sent and Received E-Mail
11. Review Deleted E-Mail Folder
12. Review Junk E-Mail Folder
13. Use E-Mail Rules to Track Usage
14. Use E-Mail Server Settings to Track Usage
15. Game High Scores
16. Microsoft Coffee
•Tools to help You Track Computer Usage
•Key Loggers
•Print Monitor Pro (free)
•Give Me Do (free)
•Desktop Spy (free)
•Hardware Keylogger ($60)
•Internet Spy (free) •Evidence Tracker
•Evidence Blaster ($23)
21. Physical Inventories &
Surprise Cash Counts
22. Bolt Down
Computer Systems
23. Filter Out Spam
• Robs you of productivity
• Many approaches to reducing spam
– Anti-spam Software - SpamFighter
– Outlook Junk Mail Filter
– Filter Junk Mail at the Mail Server - GMail
– Filter Junk Mail at your Router - Barracuda
– Microsoft’s Suggestions
24. Be Wary of Hacking
Hacking & Cracking Tools
• Crackz
• Hackz
• Warez
• Serialz
25. Identity Theft Tips
Avoid Phishing
How Serious
is the Problem?
Date of Theft:
Type of Data Stolen:
National Institute of Health
February 2008
Patient data for 2,500 patients over a 7 year period
How Stolen:
From an employee’s home
Davidson County Election Commission (Nashville, TN)
Date of Theft:
December 28, 2007
Type of Data Stolen: Names and complete Social Security numbers for
337,000 registered voters
How Stolen:
Someone broke into several county offices over
Christmas and stole laptop computers
Transportation Security Administration (TSA)
Date of Theft:
August 10, 2006
Type of Data Stolen: Social Security numbers, payroll information, and
bank account data for approximately 133,000
employee records
How Stolen:
From a government vehicle
Federal Trade Commission (FTC)
Date of Theft:
June 22, 2006
Type of Data Stolen: Data on about 110 people that was "gathered in
law enforcement investigations”
How Stolen:
Stolen from a locked vehicle
Internal Revenue Service (IRS)
Date of Theft:
June, 2006
Type of Data Stolen: 291 employees and job applicants, including
fingerprints, names, Social Security numbers, and
dates of birth
How Stolen:
In transit on an airline flight
Date of Theft:
June, 2006
Type of Data Stolen: Unencrypted hard drive containing names,
addresses and Social Security numbers of 330,000
AICPA members.
How Stolen:
Lost during shipping
US Government Veterans Affairs Administration
Date of Theft:
May 3, 2006
Type of Data Stolen: 26.5 million veterans, their spouses, and activeduty military personnel
How Stolen:
Laptop stolen from employees home
Date of Theft:
Type of Data Stolen:
How Stolen:
Citibank Student Loan Corporation
March 8, 2006
Information on 3.9 million customers
Lost in transit while being shipped
A laptop that belonged to an Ernst & Young employee was
stolen from a vehicle. The computer contained personal
information of 243,000 customers.
American International Group, a major insurance company,
became responsible for private data of 970,000 potential
customers when their file server and several laptop
computers were stolen from its Midwest offices.
An Equifax Inc., company laptop was stolen from a travelling
employee. Information compromised included employee
names and Social Security numbers.
13,000 District of Columbia employees and retirees were put
in danger of identity theft when a laptop belonging ING U.S.
Financial Services was stolen from an employee’s home.
A laptop containing debit card information and Social
Security numbers of 65,000 persons was stolen from YMCA’s
seemingly safe administrative offices.
Four laptop computers containing names, Social Security
numbers, and addresses of 72,000 customers were stolen
from the Medicaid insurance provider Buckeye Community
Long List of Documented Thefts of Data
Victims Include:
Here’s An Even Bigger List
Date of Theft:
Type of Data Stolen:
How Stolen:
Drug Enforcement Agency (DEA)
June 7, 2004
Laptop of DEA Informants
From the trunk of an Auditor’s car while he was at
a bookstore coffee shop in suburban Washington
PGP (Pretty Good Privacy)
Phil Zimmerman
Is Big Brother Watching You Anyway?
‘Widely Rumored that a master key' exists
Study collections