evesecuref7

advertisement
Jake Bartlett
Francis Lam
Masha Pryamkova
Muna Siddiqi
2
1.
Introduction




2.
Case Studies



3.
Risk definition
Why IT Security and Privacy are important
Types of risks
List of most common risks
The Secret Healthcare Company
Visa
ChoicePoint
Summary of Best Practices
3

A risk can be defined as a function of three
variables:
◦ the probability that there's a threat
◦ the probability that there are any vulnerabilities
◦ the potential impact


A threat is anything (man made or act of nature)
that has the potential to cause harm
A vulnerability is a weakness that could be used
to endanger or cause harm to an informational
asset
Source: 18
4
Threats
Terrorists
User
Error
Pranksters
Natural
Disasters
Criminals
Activists
Hostile Nations
/ Groups
Spies /
Snoops
Other
Infrastructure
Disruptions
Vulnerabilities
• Flaws in hardware, software, or network elements
• Security is constantly playing catch-up to
technology
• Internet was designed to be open
• Systems operating close to capacity
•
•
•
•
•
Increasing use of off-the-shelf software
Lack of centralized control
Critical Infrastructure interdependencies
Standardization of products
Expansion of Internet
Risks
Customer
Confidence
Lost
Potential Damage
Critical Operations
Halted
Services
Interrupted
Assets
Lost
Source: 1
Data
Corrupted
5
CSI Computer Crime and Security Survey
Published by Computer Security Institute since
1995
 494 respondents (anonymous)
 Data for 2007 report is based on
2006 calendar year

Source: 14
6

Average annual loss
from IT Security
incidents reported in
2007 - $345,000 per
respondent
2007: 494 respondents
Source: 14
7

46% of the
organizations
experienced a
security incident in
the past 12 months
Source: 14
8

61% of the
companies said
that their
organizations
allocated 5
percent or less of
their overall IT
budget to
information
security
Source: 14
9

Internal
External

Human
Non-Human

Intentional
Accidental

Disclosure, Modification, Destruction, Denial
of Use
Source: 4
10









Terrorist / hacker attacks
Malicious Code /
Viruses/ Worms / Trojans
Denial of Service
Salami attacks
Spam
Online fraud
Identity theft
Phishing
Social Engineering





Dumpster Diving
Unauthorized Data
Access / Data Theft
Industrial Espionage
Bad data entry
System disruptions due
to floods, fires, other
natural /industrial
disasters
11

Terrorist /hacker attacks
Malicious Code / Viruses,
Worms, Trojans
Denial of Service is an attempt to

Salami attacks -


make a computer resource unavailable to
its intended users
a series of minor
data-security attacks that together results
in a larger attack

Spam
Online fraud –

Phishing -

passwords and credit card details, by
masquerading as a trustworthy entity in
an electronic communication

Social Engineering -

Dumpster Diving -

using online
services to present fraudulent solicitations
to prospective victims, to conduct
fraudulent transactions, or to transmit the 
proceeds of fraud

 Identity theft - fraud related to

activity in connection with identification
documents, authentication features, and
information.
acquiring sensitive
information, such as usernames,
manipulating people into performing
actions or divulging confidential
information
sifting
through commercial or residential trash to
find items that have been discarded for
being unusable by their owners, but may
be useful to the Dumpster diver
Unauthorized Data Access /
Data Theft
Industrial Espionage
Bad data entry
System disruptions due to
floods, fires, other natural
/industrial disasters
Source: 18
12
*Top 15 types of incidents
Source: 14
13
14





A Fortune 50 company
Offers a broad range of medical and specialty
products
Has approximately 34 million medical
members
Manages extensive Public Health Information
(PHI)
This requires high security focus
15

40% of all the health care organizations are not
compliant with HIPAA

50% faced attacks from e-mail viruses

Encryption of data is limited
 48% do not encrypt data during transmission
 69% do not encrypt stored data or devices
Source: 3
16

Viruses

Identity theft (Organized crime)

Offshore hacking

Spam

Phishing –fraudulent information requests

Associate carelessness and malicious activity inappropriate sharing of PHI

Configuration errors –software or hardware
17
18




Data is collected in large volumes
The regulatory environment is highly
charged and sensitive
Service providers / partner exposures –
outsourcing or delegated work
Privacy is a signature issue
19
 Information




Security Obligation
HIPAA
Breach Notification Statues
Section 5 of FTC Act
Gramm-Leach-Bliley
20
What does HIPAA stands for?
1.
2.
3.
4.
5.
Health Industry Paying All
Attorneys
Highly Intricate Paperwork in
Abundant Amounts
High Income Potential for
Aggressive Attorneys
Huge Increase in Paperwork and
Aggravation Act
Health Insurance Portability and
Accountability Act
21




Developed by the Department of Health and
Human Services (HHS)
Introduces a set of requirements and standards
for the use and dissemination of health care
information
Requires Health Care Companies to develop
information security systems
5 components:





The
The
The
The
The
Privacy Rule --- Protection of PHI, paper and electronic
Transactions and Code Sets Rule--- used for claim filing
Security Rule --- Electronic
Unique Identifiers Rule
Enforcement Rule
Source: 18
22



Administrative Safeguards
Physical Safeguards
Electronic Safeguards
23

The Company does not allow:
 Unnecessary exposure to PHI and
protected information
 Sharing user ID’s or leaving them in view
 Leaving any PHI in view
Disposal and destruction of media
containing electronic data is strictly monitored


Facility security plans, maintenance records, and
visitor sign-in and escorts are highly controlled

Contractors or agents are also fully trained on their
physical access responsibilities
24

The Company does not:
 Allow any non certified software on the computers
 Sell advertisement space on the internet portals
 Allow direct public access to update the database
 Allow opening e-mails from unknown people or entities
and clicking on links or attachments
 Allow visiting internet retail and information sharing sites

The Company constantly monitors for suspicious or
unusual activities –the incident response team
quickly eliminates, isolates, and manage any threats
25
Chief Information
Security Officer
Policy
Management
Team
•Policy
Development
•Training
•Security
Education
•Process
Development
Security Risk
Management
Team
•Risk
Coordination
and Reporting
•Data
Handling Risk
•Vendor Risk
management
Access
Security
Team
•Encryption
operation
•Access Risk
Assessment
•Account
Administration
Infrastructure
Security
Team
•Protection
against
Antivirus/
Spam
•Network
Protection
Application
Security
Team
Program
Management
Team
•Integrated
•Security
Planning
application
development
•Financial
Management
•Database
Security
•Communications
•Incident
Response
26


Budget for IT: 14.3 million
Security Budget: 1.2 million, 8%
27
Organization
Information
Security
Team
Validation Proactive
Monitoring
Security Audits
Secured
Environment
Process Appropriate
Comprehensive
Policies, Standards and
Training
Technology Secured
Infrastructure,
Application and
Tools
Physical Security Protocols
28
Large companies have higher security budget
(more than $1 million), have more technology in
place, follow more strategic practices, but

The larger companies suffer more security
breaches and bigger losses

According to IT Policy Compliance Group
Research, 75% of all data breaches were caused by
human errors

29
The Secret Healthcare
Company lost an
unencrypted CD holding
personal and medical
information of 75,000
members while sending it
to a contractor firm
What could the company
do to prevent data leak?
30
1.
2.
3.
4.
5.
6.
Continue to Develop and Deliver Security
Awareness, Training and Education
Redesign Policies and Standards Framework
and Content
Expand Processes and Methodologies to
Integrate Security into the Enterprise
Create and Deploy Data Protection Practices
and Solutions
Implement Vendor Management Oversight of
Data Management and Contract Compliance
Develop Incident Handling Protocols and
Manage Responses
31






Continue to apply the right organization
model
Having consistent policies, procedures,
and standards in place
Providing ongoing security training
Looking for better ways to secure the
technology
Strengthening the information integrity
in more proactive ways
Executing the information security
strategy
32

'Credit card fraud' is one of many form of
Bank fraud that involve credit cards, charge
cards, or debit cards
Source: 18
34

The fraud begins with either the theft of the
physical card or the compromise of the
account information
A)

B)
The compromise can occur by many common
routes, including something as simple as a
store clerk copying sales receipts
35


The rapid growth of credit
card use on the Internet
has made database security
lapses particularly costly; in
some cases, millions of
accounts have been
compromised
40% of U.S. and European
consumers have stopped
an online transaction due
to security concerns
Source: 23
36


Since 2005, credit card fraud in the UK and
America has increased by 350% on average
according to Reuters
With credit card crime occurring across state
lines, criminals often are never prosecuted
because the dollar amounts are too low for
local law enforcement to pay for extradition
Source: 24
37


The cost of credit and charge card fraud - to
card holders and to card companies alike may be as high as $500 million a year
Everyone pays for credit and charge card
fraud in higher prices, whether or not they
are personally defrauded
Source: 25
38
Components of Visa’s Security
System





“12 commandments”
PCI Standard
“Verified by Visa”
Contactless cards
Zero Liability Policy
39

In 2000, Visa trumpeted a list of security
"best practices" for e-merchants that accept
Visa cards
◦ It also announced its intention to verify merchants’
compliance

In October 2007 Visa introduced a new set of
Payment Application Security Mandates
◦ Merchants now have time till July, 2010 to comply
Source: 6, 17
40
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
Install and maintain a working firewall
Keep application and operating system security patches up to
date
Encrypt stored credit card data
Encrypt data sent across the network
Use and regularly update antivirus software
Don't use vendor supplied defaults for password security
Assign a unique user ID to each person with computer access
Track access to data, including read only, by unique ID
Regularly test security systems and processes
Restrict access to data on a business "need to know" basis
Have a management or human resources policy that addresses
security in the workplace, such as doing background checks
Restrict physical access to authorized employees
Source: 6
41




PCI DSS stands for Payment Card Industry
Data Security Standard
A security standard accepted by all major
credit card companies
Originally began with 5 different programs,
including Visa’s
Visa requires its merchants to comply with
both PCI and 12 Commandments
Source: 18
42

Starting October 2007, Visa introduced
penalties for non-compliance with PCI
Merchant’s
volume of
transactions
Penalty
Effective
Date
Impact on user
> 1 million Visa
transactions per
year
Acquirers for these
merchants will see their
interchange rate raised
a tier
October
2007
Acquirers pass their
interchange costs on to
their merchant clients as
part of the discount rate
At least 6 million
Visa transactions
per year
Separate monthly fines
to the acquirers of
noncompliant
merchants
October
2007
1 to 6 million Visa
transactions per
year
Separate fines
January
2008
Acquirers will pass their
fine costs along to
merchants as well
Source: 2
43



In addition to other security measures (PIN, 3digit security code, address matching etc) Visa
introduced "Verified by Visa” for online
transactions
Unique passwords or codes are required during
Internet transactions to verify the user's identity
According to Visa's own research, 76% of
customers wanted a password protected system
to enable them to shop on the internet with total
peace of mind, and this is the reason we have
introduced Verified by Visa"
44
Standard cards
Contactless Visa cards




Feature a static card
verification value written
into the magnetic stripe
This number is not known
to the user and is designed
to verify that the card is
present during a
transaction
However, because it never
changes, criminals can use
stolen data from the
magnetic stripe to produce
cloned cards that would
work until the issuer
reissued the card

Feature embedded microchips
that generate a unique code
whenever the cards are used
The code is unique to each
transaction, which means that
criminals who manage to skim
card data during a single
transaction to create
counterfeit cards would have
only an old code
Source: 13, 21
45


Customer-oriented policy that ensures
complete liability protection for all card
transactions that take place on the Visa
system
i. e “You owe nothing in fraudulent
transactions”
Source: 22
46


Identity Theft is a crime where a criminal
assumes someone else's identity in order to
profit by fraudulent means
Not the same as Credit Card Fraud
Source: 8
48


Identity theft is one of the fastest growing
crimes in the United States
Identity Theft costs almost $53 billion between
business and individual victims for all types of
reported identity theft
◦ Business victims experienced a total loss of $47.5
billion or an average of $4,800 per business victim
per year
◦ Individual victims account for a total loss of $5 billion
and $500 per victim annually

Americans spent 300 million hours resolving
issues related to identity theft
Source: TBD
49





Stealing personal
information in computer
databases (hacking or
using Trojan horses)
Dumpster diving
Phishing
Social Engineering
Browsing social network
sites (MySpace, Facebook
etc) for personal details
that have been posted by
users
50
Company / Institution
Date made
public
Number of
records
Fidelity National Information Services,
Certegy Check Services Inc.
July 3, 2007
8.5 million
Yale University
Aug 8, 2007
10,000
California Public Employees' Retirement
System (CalPERS)
Aug 22, 2007
445,000
Monster.com
Aug 23, 2007
1.6 million
University of Michigan School of Nursing
Sep 19, 2007
8,585
Gap, Inc.
Sep 28, 2007
800,000
Commerce Bank
Oct 10, 2007
20
Universities often become victims of data breaches!
Source: 10, 19
51



A data aggregation company based in Alpharetta,
near Atlanta, Georgia
Acts as a private intelligence service to
government and industry: combines personal
data sourced from multiple public and private
databases for sale to the government and the
private sector
Maintains more than 17 billion records of
individuals and businesses, which it sells to an
estimated 100,000 clients, including 7,000
federal, state and local law enforcement agencies
Source: 8
52

In February 2005 ChoicePoint revealed that sensitive
information for at least 114,000 (some sources say
163,000) people had been compromised
The breach occurred earlier in 2004, when
criminals posed as customers to obtain data

No direct technology breach occurred, but
media characterized the incident as if one had


At least 750 (some sources say 5,000) cases of identity
theft as a result of the breach

Similar scam perpetrated in 2000 resulted in at least $1
million in fraudulent purchases
Source: 7, 8, 20
53


A number of investigations including congress
people, the Federal Trade Commission, the US
Securities and Exchange Commission and US
state attorneys general as well as personal
lawsuit
ChoicePoint has agreed to pay $15 million:
◦ $ 10 billion fine
◦ $ 5 billion as a fund to help the victims of the identity
theft

Company must overhaul its security program and
submit to independent audits of security
procedures every 2 years for the next 20 years
Source: 11
54

In April 2007 a Gartner Analyst told USA
Today that "ChoicePoint transformed itself
from a poster child of data breaches to a role
model for data security and privacy practices“
◦ Some of the preventive steps included abandoning
a line of business worth $20 million because of its
potential to risk a future data breach
Source: 7, 16
55

5-step action plan for securing data and privacy
system proposed by ChoicePoint’s CIO:
1. Governance – Chief Privacy Officer reports to a board
that governs privacy and public responsibility
2. Clearly define expected behavior and provide tools to
simplify compliance for employees
3. Create data breach response policies and procedures
4. Determine the credentials of those you work with and
those who work for you
5. Embrace openness
Source: 12
56
57
Legend:
Organizational
Aspect
Security Policy
Technical
Aspect
Organizational
Security
Access Classification
and Control
Physical
Aspect
Access Control
Compliance
Physical Security
System Development
and Maintenance
Physical and
Environmental Security
Communications and
Operations Management
Business Continuity
Management
Source: 9
58
Journal Articles
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
Goles et al., “Dark Screen: An Exercise in Cyber Security” MIS Quarterly Executive, Vol. 4, 2, 2005
Green, J., “Merchants Face a Double Whammy” Cards & Payments, Vol 20,10, 2007
Holmes, A., "The Global State of Information Security 2006; Some things are getting better,
slowly, but security practices are still immature and, in some cases, regressing”, CIO, Vol. 19.23,
2006, p.1
Loch, K., Carr, H., Warkentin, M., “Threats to Information Systems: Today's Reality, Yesterday's
Understanding” MIS Quarterly, Executive, Vol. 16, 2, 1992
Luftman, J., and McLean, E., “Key Issues for IT Executives,” MIS Quarterly Executive, Vol. 4, 2,
2006, pp. 81-99, 269-286
Messmer, E., “Online Card Fraud Targeted” Network World Vol. 17-34, 2000
McNulty, E., Lee, J., Boni, B., Coghlan, J., Foley, J. “Boss, I Think Someone Stole Our Customer
Data”, Harvard Business Review; Vol. 85. 9, 2007, pp.37-50
Miller, M., “Why Europe is Safe from ChoicePoint: Preventing Commercialized Identity Theft
Through Strong Data Protection and Privacy Laws” The George Washington International Law
Review, Vol. 39, 2, 2007, p.395
Saint-Germain, R., “Information Security Management Best Practice Based on ISO/IEC 17799” The
Information Management Journal, Vol. 39, 4, 2005, pp 60-66.
Swartz, N., “ID Thieves Targeting Universities” Information Management Journal, VOl 41, 2, 2007,
p. 7
Swartz, N., “Data Breach Costs Broker $15 Million” Information Management Journal, Vol. 40,3,
2006, p10.
Swartz, N., “ChoicePoint Lessons Learned” , Information Management Journal; Vol 41, 5, 2007, p.
24
Wolfe, D., “Visa Security Idea: Mag Strripe with 'Dynamic' Code” American Banker, Vol. 172, 48,
2007
60
Electronic publications
14. Richardson, R., “CSI Computer Crime and Security Survey 2007”,
15.
http://www.gocsi.com/forms/csi_survey.jhtml;jsessionid=W3MH0WN1ZFW0SQSNDLOSKHSCJUNN2JVN
, viewed October 1, 2007
“An Introduction to Computer Security: The NIST Handbook”,
http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf, viewed November 4, 2007
16. Swartz, J., and Acohido, B., “Who's guarding your data in the cybervault?” USA Today ,
http://www.usatoday.com/tech/news/computersecurity/infotheft/2007-04-01-choicepoint_N.htm,
viewed November 1, 2007
17. Vijayan, J.,”What New Visa Security Mandates Mean to You”, PC World,
http://www.pcworld.com/businesscenter/article/139048/what_new_visa_security_mandates_mean_fo
r_you.html, viewed November 1, 2007
Websites
14. Wikipedia
15. http://www.privacyrights.org/ar/ChronDataBreaches.htm, viewed November 1, 2007
16. http://jurist.law.pitt.edu/paperchase/2006/01/ftc-imposes-record-fine-on-choicepoint.php, viewed
November 1, 2007
17. http://www.informationweek.com/security/showArticle.jhtml?articleID=183702491, viewed
November, 1
18. http://www.congressionalfcu.org/aboutus/securitycenter/ZeroLiabilityPolicy.pdf, viewed November, 1
61
Websites
19.
20.
21.
22.
23.
24.
http://marketwire.com
http://today.reuters.com
http://techweb.com/wire/security/
(Creditsourceonline.com)
(About.com)
(identitytheft.gov)
62
Source: 14
63
Download