Playing Safely in the Cloud

Slides:



Advertisements
Similar presentations
Springfield Technical Community College Security Awareness Training.
Advertisements

Security Controls – What Works
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
It’s always better live. MSDN Events Securing Web Applications Part 1 of 2 Understanding Threats and Attacks.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Software Security Course Course Outline Course Overview Introduction to Software Security Common Attacks and Vulnerabilities Overview of Security.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Information Security Information Technology and Computing Services Information Technology and Computing Services
SEC835 Database and Web application security Information Security Architecture.
Marketing of Information Security Products. The business case for Information Security Management.
HTTP and Server Security James Walden Northern Kentucky University.
Juha Siivikko SECURITY IN SOCIAL MEDIA.
IT security By Tilly Gerlack.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Playing Safely in the Cloud Marie Greenberg, CISSP, IAM, IEM Information Security Manager Virginia State Corporation Commission.
Building Secure Web Applications With ASP.Net MVC.
Playing Safely in the Cloud Marie Greenberg, CISSP, IAM, IEM Information Security Manager Virginia State Corporation Commission.
Frontline Enterprise Security
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Technological Awareness for Teens and Young Adults.
Computer Security Keeping you and your computer safe in the digital world.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Securing Information Systems
IT Security Awareness Day October 19, 2016
Add video notes to lecture
Done by… Hanoof Al-Khaldi Information Assurance
Cybersecurity - What’s Next? June 2017
TOPIC: Web Security (Part-4)
Internet Identity, Safety, & Security
Digital Citizenship Middle School
Secure Software Confidentiality Integrity Data Security Authentication
Computer Virus and Antivirus
Finding and Fighting the Causes of Insecure Applications
Trends in my profession, Information Technology
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Year 10 ICT ECDL/ICDL IT Security.
Securing Information Systems
Cybersecurity Awareness
CYB 110 Competitive Success/snaptutorial.com
Call AVG Antivirus Support | Fix Your PC
yahoo mail technical support number
CYB 110 Education Begins / Snaptutorial.com. CYB 110 All Assignments For more classes visit CYB 110 Week 1 Individual Protecting.
CYB 110 Education for Service-- tutorialrank.com
Content Management lifecycle
Introduction to Business & Marketing
امنیت نرم‌افزارهای وب تقديم به پيشگاه مقدس امام عصر (عج) عباس نادری
Playing Safely in the Cloud
David J. Carter, CISO Commonwealth Office of Technology
Protecting Yourself from Fraud including Identity Theft
Security of Data  
Implementing Client Security on Windows 2000 and Windows XP Level 150
Finding and Fighting the Causes of Insecure Applications
Privacy and Data Mining
Privacy and Data Mining
Module 4 System and Application Security
Cloud Computing for Wireless Networks
Presentation transcript:

Playing Safely in the Cloud Marie Greenberg, CISSP, IAM, IEM Information Security Manager Virginia State Corporation Commission

“Come into my parlor.” said the spider to the fly. Every day, government agencies are moving business practices from the physical realm into the cloud. Pay your taxes, renew your drivers license, incorporate your small business, order your birth certificate, look up a state employee… As a public entity we have certain responsibilities to the citizens of Virginia. The public looks to us for guidance and assumes that the service we are providing is secure.

What can we do to make “Playing Safely in the Cloud” a reality for our Citizens? Assure the public that we have a secure site for them to conduct e-government business. Require all users to register on our sites. Verify the identity of users.

Bring awareness to the Citizens COV Citizen Awareness Banner http://www.vita.virginia.gov/security/default.aspx?id=5146 The security of your personal information is important to us! Diligent efforts are made to ensure the security of Commonwealth of Virginia systems. Before you use this Web site to conduct business with the Commonwealth, please ensure your personal computer is not infected with malicious code that collects your personal information. This code is referred to as a keylogger. The way to protect against this is to maintain current Anti-Virus and security patches. For more information on protecting your personal information online, refer to the Citizens Guide to Online Protection.

Establish good Security Practices Ensure secure payment services are in place. Use a third party to evaluate the security of the web site.

What can we do within our organizations to be more secure? Identify the internet threats facing us. Take ownership. Promote a ‘culture of security awareness’. Create and maintain a security policy.

Take steps to protect our systems and data. Keep software up-to-date. Develop a disaster recovery plan. Be proactive.

Playing Safely in the Cloud Online Identity Management Web Application Security Steve Werby Information Security Officer Virginia Commonwealth University

Anything you upload to a public website is not private – it's public.

Identity Theft Phishing Reconnaissance Social Engineering Email Address Identity Theft Phishing First Name Last Name Alias Colleges Degrees Employers Job Titles Email Address Friends Colleagues Alias Email Address Interests Email Address City / State Email Address Interests Activities Friends Age Website Reconnaissance First Name Last Name Email Address Birthday Street Address City / State Phone Number Website Marital Status Colleges Degrees Friends Alias City / State Friends Colleagues Website First Name Last Name Alias Age City / State Website Marital Status Friends Interests Activities First Name Last Name Friends Colleagues Interests Activities Social Engineering

Aggregate social network data Your personal lifestream Your connections' lifestreams

Is the concept of privacy outdated?

Manage your identity Make informed decisions Voice your concerns See #1

Web 2.0 Cybercrime‏ SaaS Russian Business Network, Rock Phish 3G, 802.11n, mesh Russian Business Network, Rock Phish Cybercrime‏ IE, Firefox, Chrome, Safari, Opera HIPAA, PCI, GLBA, FACTA, FERPA Phishing, Smishing, Vishing Blackberry, iPhone, Windows Mobile AJAX

Cross Site Scripting (XSS)‏ Injection Flaws Malicious File Execution Failure to Restrict URL Access Insecure Direct Object Reference Cross Site Scripting (XSS)‏ Information Leakage / Improper Error Handling Cross Site Request Forgery (CSRF)‏ Insecure Communications Insecure Cryptographic Storage Broken Authentication and Session Management

Know your web applications Know your data Secure EVERYTHING Educate, educate, EDUCATE