IT Security and Privacy A Presentation for MIS 5800 By: Chad Keeven Brian Ledford Hai Lin Komsun Santiwiwatkul IT Security & Privacy 1 Session Overview Costs of IT Security IT Threats – Man-made and Natural Role of CSO IT Behavior and Access Case Study Disaster and Recovery Conclusions IT Security & Privacy 2 Why should senior management focus at IT security? “…Those that have invested in IT security staff get more return on their investment via reduced security breaches and increased concordance among CEOs and other officers on the need for security investments.” http://www2.cio.com/research/surveyreport.cfm?id=6, viewed on November 26th, 2006 IT Security & Privacy 3 How much do companies spend on IT security? Companies spend, on average, 36% of their security budget toward technology and 7% - 8% of their overall IT budget on technology (N=276) http://www2.cio.com/research/surveyreport.cfm?id=6, viewed on November 26th, 2006 IT Security & Privacy 4 Cost of Attacks While the majority (84%) of survey respondents reported incidents (defined as security breaches or crimes including viruses and hoaxes that resulted in damage or loss) in the past 12 months, fewer than half (38%) of the IT professionals surveyed could quantify the damages. (N=276) http://www2.cio.com/research/surveyreport.cfm?id=6, viewed on November 26th, 2006 IT Security & Privacy 5 “The proliferation in the use of computer and communications technologies over approximately the last 20 years has resulted in significant changes in the types of threats that are posed to the information environment that we have come to rely on. The way in which the threats that are posed to an information environment are measured has not advanced at the same rate as the technology has developed and as a result, has not yet transitioned from being an art to science.” - Andy Jones “Identification of the method for the calculation of the capability of threat agent in an information environment” Kovacich, Gerald L., Information Systems Security Officer’s Guide: Butterworth Heinemann, 2003. IT Security & Privacy 6 Threats and Vulnerabilities Today's world of Information Systems leaves us vulnerable to a plethora of threats Natural Threats Man Made Threats Vulnerabilities are weaknesses that allow specific threats to cause adverse affects Anything that weakens the security of the systems and the information they handle Kovacich, Gerald L., Information Systems Security Officer’s Guide: Butterworth Heinemann, 2003. IT Security & Privacy 7 Threat Assessment You can look at threat assessment two ways: Qualitative – an “educated best guess” based on opinions of knowledgeable others gained through interviews, history, tests, and personal experience Quantitative – uses statistical sampling based on mathematical computations determining the probability of an occurrence based on historical data Kovacich, Gerald L., Information Systems Security Officer’s Guide: Butterworth Heinemann, 2003. IT Security & Privacy 8 Natural Threats Sometimes thought of as “Acts of God,” these problems are random and often thought of as things that cannot be prepared for. Fire Hurricane Earthquake Typhoon Accidents Kovacich, Gerald L., Information Systems Security Officer’s Guide: Butterworth Heinemann, 2003. IT Security & Privacy 9 Can We Prepare for These? Fire Paper data backed up and stored offsite? Servers in a fire retardant room? Escape plans for employees? Earthquake Building built properly? Data on computers backed up off-site? Servers stored in safe location? IT Security & Privacy 10 Can We Prepare for These? Hurricane? Typhoon? Accidents? What are your solutions? IT Security & Privacy 11 Man made : What kinds of IT security that can happen? Hacker, Spam, and Phishing Credit card fraud and Identity Thief Terrorism IT Security & Privacy 12 HACKER is someone who creates and modifies computer software and computer hardware, including computer programming, administration, and security-related items. August 2006, AT&T computer systems were hacked and stolen credit-card numbers and other personal information of about 18,000 to 19,000 customers.1 June 2006, The Navy announced that personal data on 28,000 sailors and family members had been found on a civilian web site.2 http://en.wikipedia.org/ viewed November 4, 2006 1 AT&T Discloses Online Theft by Hackers. Wall Street Journal (Eastern edition). New York, N.Y.: Aug 30,2006. pg.B.2 2 Hack at USDA puts 26,000 at risk. Federal Computer Week; Jun 26, 2006.Vol.20, Iss 21; pg.11, 1pgs IT Security & Privacy 13 SPAMMING is the abuse of electronic messaging systems to send unsolicited, undesired bulk messages. Source : http://en.wikipedia.org/ viewed November 4, 2006 IT Security & Privacy 14 PHISHING is a criminal activity using social engineering techniques. Phishers attempt to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an electronic communication. Source : http://en.wikipedia.org/ viewed November 4, 2006 IT Security & Privacy 15 FROM THE DESK OF MR. HASSAN YERIMA, EXECUTIVE DIRECTOR, FOREIGN OPERATIONS DEPARTMENT, CENTRAL BANK OF NIGERIA, GARIKI ABUJA TELL : 234-803-7105651. IMMEDIATE Release of your contract payment of US$18 million with contract number #:MAV/NNPC/FGN/MIN/2003. ATTENTION : THE HONOURABLE CONTRACTOR, Sir, From the records of outstanding contractors due for payment with the Federal government of Nigeria, your name was discovered as next on the list the outstanding contractors who have not received their payment. I wish to inform you that your payment is being processed and will be released to you as soon as you respond to this letter. Also note that from the record in my file your outstanding contract payment is US$18,000,000.00 million dollars (Eighteen million united states dollars) only. Please re-confirm to me if this is inline with what you have in your record and also re-confirm to me the following : 1) Your full name and address 2) Phone, fax and mobile #. 3) Company's name, position and address. 4) Profession, age and marital status. As soon as this information is received, your payment will be made to you by Telegraphic Wire Transfer (KTT) or Certified Bank Draft from central bank of Nigeria call me on my direct number as soon as you receive this letter for more details. Thanks, MR. HASSAN YERIMA., EXECUTIVE DIRECTOR, FOREIGN OPERATIONS DEPARTMENT, CENTRAL BANK OF NIGERIA IT Security & Privacy 16 Recently study by Symantec Phishing attacks skyrocketed 260% in 2nd half of 2004 Virus and worm attacks jumped more than 300% (the number one is financial institutions) 47 % of 229 mid-size and large companies were hit by worms (Mazu network) Symantec conducts the surveys using its "Global Intelligence Network," which consists of more than 40,000 sensors monitoring activity on computers in over 180 countries. The firm also gathers data from over 120 million computer systems that use Symantec's anti virus products. Corporate Cyber Attacks on the Rise. Information Management Journal: Jul/Aug 2005,Vol.39, Iss. 4 IT Security & Privacy 17 Identity Thief IT Security & Privacy 18 Identity Thief The fastest growth crime in the United states1 13.3 persons per minute1 799 per hour1 19,178 per day1 Victims spent between 15-60 hours resolving their problems. 1Identity theft toolkid Vinita M Ramaswamy. The CPA Journal. New York: Oct 2006.Vol.76, Iss. 10; pg. 66, 5 pgs IT Security & Privacy 19 Consumer Fraud and Identity Theft Complaint Data January-December 2005, Federal Trade Commission. http://www.consumer.gov/sentinel/pubs/Top10Fraud2005.pdf IT Security & Privacy 20 Consumer Fraud and Identity Theft Complaint Data January-December 2005, Federal Trade Commission. http://www.consumer.gov/sentinel/pubs/Top10Fraud2005.pdf IT Security & Privacy 21 Cost of Identity Thief per year Victims: 9.3 million Loss to businesses: $52.6 billion Loss to individual victims: $5 billion Hours victims spent resolving their problems: 297 million. 1Identity theft toolkid Vinita M Ramaswamy. The CPA Journal. New York: Oct 2006.Vol.76, Iss. 10; pg. 66, 5 pgs IT Security & Privacy 22 Terrorism “Bin Laden's operatives use encrypted e-mail to communicate, and . . . the hijackers did as well" (Behar, R. (2001, October 15). Fear along the fire wall. Fortune, 144(7), 145-148.) "Terrorist watchers suspect al-Qaeda may be hiding its plans on online pornographic sites because there are so many of them, and they're the last place fundamentalist Muslims would be expected to go" (Cohen, A. (2001, November 12). When terror hides online. Time, 158(21), p. 65) Cybercrime in the United States Criminal Justice System: Cryptography and Steganography as tools of Terrorism. Andrew Schmurr, William Crawley; Journal of security administration; Dec 2003; 26, 2 ABI/INFORM GLOBAL IT Security & Privacy 23 Terrorism Cryptography the replacement of a unit of plaintext (i.e., a meaningful word or phrase) with a code word (for example, apple pie replaces attack at dawn). The Ancient Greek scytale, probably much like this modern reconstruction, may have been one of the earliest devices used to implement a cipher. Source : http://en.wikipedia.org/ viewed November 4, 2006 IT Security & Privacy 24 Terrorism Steganography the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message By removing all but the last 2 bits of each color component, an almost completely black image results. Making the resulting image 85 times brighter results in the image. Image extracted from above image. Image of a tree. Source : http://en.wikipedia.org/ viewed November 4, 2006 IT Security & Privacy 25 ROLE OF CSO IT Security & Privacy 26 CSO Job Descriptions Oversee a network of security directors and vendors who safeguard the companies assets, intellectual property, and computer systems, along with the physical safety of employees and visitors Identify protection goals, objectives, and metrics consistent with corporate strategic plans Manage the development and implementation of global security policy, standards, guidelines, and procedures to ensure ongoing maintenance of security Petersen, Rodney, The Role of the CSO, Educause, September/October, 2006, pp. 73-82. IT Security & Privacy 27 CSO Job Descriptions (cont.) Maintain relationships with local, state, and federal law enforcement and other related government agencies Oversee incident response planning as well as the investigation of security breaches Work with outside consultants as appropriate for independent security audits. Petersen, Rodney, The Role of the CSO, Educause, September/October, 2006, pp. 73-82. IT Security & Privacy 28 The role of the CSO within organizations 75% of all organizations have some form of integration between physical security and computer security This is up from 53% in 2005 and 29% in 2003 40% have the same executive overseeing computer and physical security This is up from 31% in 2005 and 11% in 2003 Vara, Vauhini, Technology (A Special Report); Intruder Alerts: Physical security and information security have a lot in common; But melding the two isn’t always smooth: Wall Street Journal (Eastern edition). New York, October 23, 2006, pp. R. 10 “” IT Security & Privacy 29 CSO Background CSO’s come from Information Systems background 63% of the time 35 30 25 20 15 CSO background 10 Audit Business Operations Law Enforcement Military 0 Corporate Security 5 Petersen, Rodney, The Role of the CSO, Educause, September/October, 2006, pp. 73-82. IT Security & Privacy 30 CSO Qualifications An intelligent, articulate and persuasive leader who can serve as an effective member of the senior management team and who is able to communicate security-related concepts to a broad range of technical and non-technical staff Experience with business continuity planning, auditing and risk management, as well as contract and vendor negotiation Strong working knowledge of pertinent law and the law enforcement community A solid understanding of information technology and information security Petersen, Rodney, The Role of the CSO, Educause, September/October, 2006, pp. 73-82. IT Security & Privacy 31 How many CSO’s are there? Last year, 16 percent of companies surveyed created a CISO position while 15 percent had a CSO position. This year’s study finds that 20 percent currently employ a CISO and an additional 20 percent have a CSO. N = 8,200 from 63 countries The State of Information Security, 2005, Part Two, CSO research reports, http://www.csoonline.com/csoresearch/report95.html. viewed November 26th, 2006. IT Security & Privacy 32 IT Security: Behavior & Access POP QUIZ IT Security & Privacy 33 IT Security: Behavior & Access How many passwords do you have for work? How many passwords do you have for your personal business? How many of you have passwords written down? How many of you have had passwords stolen? How many of you know someone else’s passwords (ATM, log-ins, etc.)? IT Security & Privacy 34 IT Security: Behavior & Access Easy passwords are easy to hack Written down passwords defeat the purpose of having a password Weak passwords and security behaviors are a Clear and Present Danger to your office and your accounts. IT Security & Privacy 35 IT Security: Behavior & Access Strong passwords are a must New UMSL requirements:* Strong Passwords For security reasons, you must choose a strong password that meets the following requirements. 1.Your password must be 8 or more characters long. 2.Your password must contain at least three out of four of the following categories of characters: •Uppercase letters (A-Z) •Lowercase letters (a-z) •Digits (0-9) •The following symbols/punctuation: ? . , ! _ - ~ $ % + = *UMSL My Gateway website https://sso.umsl.edu/perl/reset_pass.pl IT Security & Privacy 36 IT Security: Behavior & Access Some companies are utilizing stronger measures for passwords and log-ins: IT Security & Privacy 37 IT Security: Behavior & Access Trusted Platform Module (TPM) System A chipset in a device stores all passwords for a user One password accesses all protected sites Eliminates the need to remember or write down dozens of passwords: users need only one password IT Security & Privacy 38 IT Security: Behavior & Access Biometrics Soon to be the security standard Fingerprint access: commonly appearing on phones, laptops, and PDAs Optical scan: rare; for high security Voice recognition: constantly improving Facial recognition: limited use IT Security & Privacy 39 IT Security: Threats & Remedies POP QUIZ IT Security & Privacy 40 IT Security: Threats & Remedies How many of your employers restrict downloads? How many of your employers disable or remove USB ports on your PC or laptop? How many have been affected at work or home by a virus? What was the extent of the damage? IT Security & Privacy 41 IT Security: Threats & Remedies Threats to Information Systems Hacks Denial of Service Attacks Viruses Inadvertent and intentional sabotage from authorized users IT Security & Privacy 42 IT Security: Threats & Remedies Remedies Virus Protection Strong passwords Active countermeasures and monitoring Limited user access to systems and hardware Others? IT Security & Privacy 43 IT Security: Hardware & Software Telecommuting Rising in popularity: 23.5M million currently; 40M+ by 2010* How do you secure your company’s systems with outside users? * Int’l Telework Association & Council, July 2006 IT Security & Privacy 44 IT Security: Hardware & Software Virtual Private Network (VPN) Secure channel established through the Internet Encryption Enables remote users to securely access their desktop at work IT Security & Privacy 45 IT Security: Case Study Diversified Financial Services, LLC •Underwriter of commercial and agricultural equipment loans and leases •$300M in volume; income not disclosed (privately owned) •100 employees in St. Louis and Omaha; 20 remote users IT Security & Privacy 46 IT Security: Procedures Security is imperative Personal credit bureaus Financial statements Credit applications with account numbers Banking and commercial lending laws IT Security & Privacy 47 IT Security: Procedures All remote users must be approved by Vice President Approvals forwarded to Chief Operating Officer VPN information and setups are given to employee by network administrator Same passwords and logins are used remotely as in the office IT Security & Privacy 48 IT Security: Procedures Other Security Measures: Tough password standards; changed monthly USB ports disabled Network administrator limits access No downloads permitted; emailed documents scanned and macros disabled prior to opening Virus and network protection IT Security & Privacy 49 After Disaster Strikes The Federal Emergency Management Agency (FEMA) states that Between 1976 and 2001, a total of 906 major disasters were declared in the United States. Of all the businesses damaged by Hurricane Andrew in 1992, 80 percent of those lacking a business continuity plan (BCP) failed within two years of the storm. A study by Data Pro Research Company found that 43 percent of companies hit by severe crises never reopen another 29 percent fail within two years. Virginia Cerullo and Michael J. Cerullo, “Business Continuity Planning: A Comprehensive Approach” www.ism-journal.com, Summer 2004 IT Security & Privacy 50 What happened in Katrina The 2005 hurricane season emerged as the busiest ever recorded. A total of 23 named storms have formed by early November, causing 11 federal disaster declarations. The most storms everrecorded prior to 2005 was 21 in 1933. Loss Total damage estimates now place Katrina as the costliest natural disaster to occur in the United States, with an estimated $40 billion in insurance losses. Janette Ballman, “2005 Hurricane Season: A Recap of the devastating, record breaking season”, www.drj.com IT Security & Privacy 51 Business Continuity Planning VS. Disaster Recovery Management Business continuity is all about planning ways to keep the doors open while minimizing the impact of disruptions on customers and business operations. Disaster Recovery Management is the series of steps taken to restore the business once a problem occurs. Disaster Recovery is a subset of Business Continuity Planning. John Wylder, “Strategic Information Security”, P153 IT Security & Privacy 52 Types of outages Natural disasters Floods Earthquakes Fire Weather events: tornados, hurricanes, ice, hail & wind Landslides, avalanches & other earth movements Man-made disasters Sabotage of property, computer systems, and information Terrorist acts Strikes Protests and other forms of civil unrest Denial-of-service attacks on computer networks Viruses, worms, and other computer beasts Subset of natural disasters and man-made events Infrastructure failures (utility outrages, power outages, etc.) Communications failures Transportation outages John Wylder, “Strategic Information Security”, P153 Virginia Cerullo and Michael J. Cerullo, “Business Continuity Planning: A Comprehensive Approach” CPM/KPMG Business Continuity Benchmark Survey Based on 624 respondents IT Security & Privacy 53 Causes of Unavailability Causes for Unavailability of Critical Business Systems (Source: Ernst & Young, Global Information Security Survey, 2002) Virginia Cerullo and Michael J. Cerullo, “Business Continuity Planning: A Comprehensive Approach” www.ism-journal.com, Summer 2004 IT Security & Privacy 54 Cost of Outage Published estimates of the costs of systems downtime for company Web sites include the following: ❚ Downtime is costing major Internet players an estimated $8000 per hour (Forrester Research). ❚ Downtime costs $1400 per minute on average (Oracle). ❚ Typical medium-sized business downtime costs average $78,000 per hour; these sites typically lose more than $1 million annually due to downtime (IDC). Average Hourly Effect on Businesses of Web Site Downtime Virginia Cerullo and Michael J. Cerullo, “Business Continuity Planning: A Comprehensive Approach” www.ism-journal.com, Summer 2004 IT Security & Privacy 55 Steps To Develop A Plan Acquire executive support Select a process owner Assemble a cross-functional team Conduct a business impact analysis Identify and prioritize requirements Assess possible business continuity strategies Rich Schiesser, “IT Systems Management”, P300-306 IT Security & Privacy 56 Steps To Develop A Plan Develop a request for proposal for outside services Evaluate proposals and select best offering Choose participants and clarify their roles for the recovery team Document the disaster recovery plan Plan and execute regularly scheduled tests of the plan Conduct a lessons-learned postmortem after each test Continually maintain, update, and improve the plan Rich Schiesser, “IT Systems Management”, P300-306 IT Security & Privacy 57 Roles and Responsibility Quiz: Who should be the executive sponsor? CFO, CTO or the Head of Internal Audit? IT Security & Privacy 58 Roles and Responsibility Executive sponsor CTO Pro: Responsible for critical IT resources Con: Not responsible for operational resources or for buildings and facilities Usually places emphasis on the protection of technology based assets Head of internal audit Lacks credibility to make decisions about operational issues or nonfinancial risk management issues. CFO Chooses alternatives such as insurance Judges the impact of an outage on the financial viability of the business, which is a key of the Business Impact Analysis Assesses regulatory issues and their affect on risk management Assesses cost issues and recommending budget and cost guidelines John Wylder, “Strategic Information Security”, P159-160 IT Security & Privacy 59 Roles and Responsibility Teams: Recovery management team: Salvage team Decide what can be salvaged and what needs to be replaced Operational team Execute the disaster recovery plan Get the critical functions of the business restored as soon as possible The people who run things until the business returns to normal Usually is a subset of the team that runs the same functions under normal circumstances Communication team Design the means of communicating information to employees, customers, and the public in general Quiz: emergency contact phone list John Wylder, “Strategic Information Security”, P160-161 IT Security & Privacy 60 Integration of the BCP (Source: 2002 CPM/KPMG Business Continuity Benchmark Survey, Witter Publishing Coporation, 2002) The Ernst & Young Survey 2002 found that only 29 percent of responding firms treated BCPs as a business unit expenditure, and 45 percent said it was within the IT budget. Virginia Cerullo and Michael J. Cerullo, “Business Continuity Planning: A Comprehensive Approach” www.ism-journal.com, Summer 2004 IT Security & Privacy 61 The Cost Increased dependence on E-business would also increase the need for spending on disaster recovery to reduce the risk of short-term interruptions; these costs are estimated to be from an average of 3 percent to 7 percent of data center budgets. Tradeoff of cost and service level A case study…… Virginia Cerullo and Michael J. Cerullo, “Business Continuity Planning: A Comprehensive Approach” www.ism-journal.com, Summer 2004 IT Security & Privacy 62 Case Study Company description global power leader that designs, manufactures, sells and services engines and related technology around the world revenues: $9.9 billion Employees: 33,500 worldwide Structure IT Security & Privacy 63 Case Study The spending on business continuity infrastructure till now is $2.5 millions, most is on data storage and redundant links. Data backup: synchronized infrastructure vs. asynchronies infrastructure synchronized infrastructure: send the record simultaneously asynchronies infrastructure: send the records in a batch of dozen Cost: synchronized cost 3 - 4 times compared to asynchronies Chargeback system The daily operation cost is using a chargeback system IT Security & Privacy 64 Business Continuity Summarize A comprehensive BCP will dramatically increase a company’s defenses and reduce the impact of any business interruptions BCP need to acquire executive support Reference: Business Continuity Planning: A Comprehensive Approach Virginia Cerullo and Michael J. Cerullo www.ism-journal.com, Summer 2004 IT Security & Privacy 65 What does it mean? IT Security & Privacy 66 There’s no guarantee… Despite the growing number of CSO/CISO positions and the implementation of security measures, the threat of attacks on a companies data remains. There are no sure-fire ways to stop attacks, but the better prepared you are, the less damaging they can be. Remember, it’s an art, not a science! IT Security & Privacy 67