The Value of Membership Why the Attention to Cyber Security? Responsibility of Board and Management Incident Response Current Cyber Threats DDoS, Types of Hacking, ext. Hacking Lesson Password Lesson Methods used to effectively implement security into daily operations. The Value of Membership Recent Breaches: AshleyMadison.com Home Depot Dairy Queen Target Yahoo Michaels eBay Experian NoMoreRack Sally Beauty California DMV P.F. Chang’s Anthem Neiman Marcus Citigroup IRS The Value of Membership Among 21 Industries: 3rd in confirmed in data losses 4th in security incidents The Value of Membership FFIEC Urges Boards and Management to: Per FFIEC Information Technology Examination Handbook Management NOVEMBER 2015: Understand the institution’s cybersecurity inherent risk; routinely discussing cybersecurity issues in meetings; Monitor and maintain sufficient awareness of threats and vulnerabilities; The Value of Membership FFIEC Urges Boards and Management to: Establish and maintain a dynamic control environment; Manage connections to third parties; and Develop and test business continuity and disaster recovery plans that incorporate cyber incident scenarios. The Value of Membership Incident vs. Breach The Value of Membership Breach Response Scenario Exercise Incident Response NIST Special Publication 800-61 Computer Security Incident Handling Guide The Value of Membership DDoS Hacking Social Engineering Non-Conformance to: Industry Best Practice Standards Current Polices Methods used to effectively implement security into daily operations. The Value of Membership Distributed Denial-ofService (DDoS) Attackers use compromised systems (zombies / bots) to attack a specific target Compromised systems send an overwhelming number of connections requests it floods the target The target receives so many connections, it shuts down denying service to legitimate requests May be a distraction The Value of Membership Assess Risk / Remediation Targets are Internet Facing Website Home Banking Internet Service Provider Allowed timeframe Due Diligence Include vendor’s plan into credit union’s disaster recovery The Value of Membership Types of Hackers White hat hacker - breaks security for nonmalicious reasons (i.e. network penetration testing) Grey hat hacker - uses their skills for legal or illegal acts, but not for personal gains A black hat hacker - someone who breaks computer security without authorization or uses technology (usually a computer, phone system or network) for vandalism, credit card fraud, identity theft, piracy, or other types of illegal activity A social engineer uses non-technical skills to gain assess to information. Texas Credit Union League © 2013 The Value of Membership Types of Hacks Security exploit Packet sniffer Password cracking Spoofing attack Key loggers Trojan horse Virus Malware Social engineering Texas Credit Union League © 2012 The Value of Membership How Protect from Threats Risk Assessment Encryption In storage In transit Training Testing Multi-layered Security Deploy administratively Deploy physically Deploy technically Rule of Least Privileges The Value of Membership How Protect from Threats Assume you are the target The Value of Membership First Line of Security Employees Your ammunition is: Knowing that: COMPLIANCE SECURITY Educating employees, members, friends, and family Altered frame of mind Cognizant of new security threats Texas Credit Union League © 2013 The Value of Membership Hacking Lesson for the Non-Techie Create a malicious Trojan Horse. Texas Credit Union League © 2013 The Value of Membership Hacking Lesson for the Non-Techie Install a virus. Texas Credit Union League © 2012 The Value of Membership Hacked by: Poor system security Antivirus Antispyware Operating System Updates Computer / System Privileges USER KNOWLEDGE Texas Credit Union League © 2012 The Value of Membership Hacking Lesson for the Non-Techie Hack a Password Texas Credit Union League © 2012 The Value of Membership Hack a Password The Value of Membership Texas Credit Union League © 2012 The Value of Membership Hacked by: Weak password Computer / System Privileges (allowed a key logger to be installed) USER KNOWLEDGE If a non-techie hacks your password: You’ve been SOCIALLY ENGINEERED!!!!!!! Texas Credit Union League © 2012 The Value of Membership Fundamental Network Security Practices Framework to setup and remember passwords meeting complex policy requirements Step 1 – Think of a sentence (pass phrase) My wife Elsa and I live in El Paso, Texas. – Step 2 – Extract the first letters of each word in the pass phrase My wife Elsa and I live in El Paso Texas The Value of Membership Fundamental Network Security Practices Framework to setup and remember passwords meeting complex policy requirements Step 3 – Place the first letters together MwEailiEPT Step 4 – Substitute characters A or a = @ L or l / I or I = ! S or s = $ After the substitution, the password would be Mw3@!1!3PT The Value of Membership Non-Technical Hack Social Engineering Psychological manipulation The act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical hacking techniques. Trickery or deception for the purpose of information gathering, fraud, or computer system access. In most cases the attacker never comes face-to-face with the victim. Technical way of lying Texas Credit Union League © 2012 The Value of Membership Current Methods of Attack Vishing is a combination of the words voice and phishing SMsphISHINGSMS (Short Message Service) is the technology used for text messages on cell phones SIM-swap Caller ID Spoofing Calls Pretexting - Get significant data Test security posture Gain small amount of data Texas Credit Union League © 2012 The Value of Membership How / Why It Works Humans inherently: Are trusting Have fear of authority Are courteous Want to help Desire to be liked Are social Are curious Texas Credit Union League © 2012 The Value of Membership Social Engineering – ID Theft Full name Address / phone numbers (past and present) Date of birth Social security number Mother’s maiden name Children’s name Bonus Loan information Account numbers Credit Card information Employment information Passwords Texas Credit Union League © 2012 The Value of Membership Current Methods of Attack, cont. Pharming - Planting bogus websites www.redcross.org www.redcrosss.com www.redcross.org Phishing – Usually through e-mail Website spoofing Spear phishing – your credit union is the target Whaling – high profile employee is the target Texas Credit Union League © 2012 The Value of Membership Current Methods of Attack Use of fear Angry Member Senior Executive Law enforcement Credit Collector Physical bait USB CD Acting – Third Party AT&T Building maintenance Law enforcement IT Vendor Examiner Flirting Texas Credit Union League © 2012 The Value of Membership Where is your stolen information? Carding / Hackers Forums Supply Chain Harvesters Phishing, Key Logging, ext. Brokers Sell the harvested credit card, account, password, personal information Distribution ID Theft - use information to purchase tangible items then sold for cash. Texas Credit Union League © 2012 The Value of Membership The Value of Membership The Value of Membership The Value of Membership The Value of Membership Don’t Throw your Security Investment away! Bypass physical security (e.g., perimeter alarm sensors, motion ext.) Bypass all doors, locks, keys Firewalls Intrusion Detection / Prevention Systems (IDS/IPS) Network access levels Data processor access levels Many more… Texas Credit Union League © 2012 The Value of Membership Security Posture Result Reactive Credit Union Lack of knowledge of current methods No testing Proactive Credit Union Semi-annual training Testing result positive Texas Credit Union League © 2012 The Value of Membership Summary Train – EVERYONE and Often Test – EVERYONE and Often First Line of Security - Employees Your ammunition is: Knowledge of the following material Creativity to build on the material Educating employees, members, friends, and family Be vigilant and alert Be abreast to the new methods Trust – but be suspicious and verify Assume you are the target Share stories The Value of Membership Information security management for a credit union begins with managing risks The Value of Membership Idrees Rafiq AVP - IT Consulting Credit Union Resources, Inc. Toll free: (800) 442-5762 ext. 6799 Direct: (469) 385-6799 Cell: 915-449-4456 irafiq@curesources.coop The Value of Membership