7/22/071 Avoiding Voice Fraud & Threats Are you Really Who You Claim to Be? Valene Skerpac, CISSP

Slides:



Advertisements
Similar presentations
Chapter 10. Understand the importance of establishing a health care organization-wide security program. Identify significant threats—internal, external,
Advertisements

The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
Voice Biometric Overview for SfTelephony Meetup March 10, 2011 Dan Miller Opus Research.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
September 19, 2006speermint interim1 VoIP Threats and Attacks Alan Johnston.
Security Controls – What Works
The State of Security Management By Jim Reavis January 2003.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
1 An Overview of Computer Security computer security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Biometrics: Voice Recognition
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Bank Crime Investigation Techniques by means of Forensic IT
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Securing Information Systems
Information Security Technological Security Implementation and Privacy Protection.
Storage Security and Management: Security Framework
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
ISEC0511 Programming for Information System Security
PART THREE E-commerce in Action Norton University E-commerce in Action.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
HIPAA COMPLIANCE WITH DELL
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
“Stronger” Web Authentication: A Security Review Cory Scott.
Geneva, Switzerland, September 2014 Identity Based Attestation and Open Exchange Protocol (IBOPS) Scott Streit Chief Scientist.
Communications-Electronics Security Group. Excellence in Infosec.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
Engineering Essential Characteristics Security Engineering Process Overview.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 5: Basic Security.
Introduction to Information Security
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Safe’n’Sec IT security solutions for enterprises of any size.
1 Authentication Technologies Authentication Mechanisms –Something you know –Something you have –Something you are Features –Authenticator & Base secret.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
CS457 Introduction to Information Security Systems
Design for Security Pepper.
Security Standard: “reasonable security”
I have many checklists: how do I get started with cyber security?
Cyber Issues Facing Medical Practice Managers
SECURITY MECHANISM & E-COMMERCE
NCUCA Fraud and Risk Education April 17, 2019
Presentation transcript:

7/22/071 Avoiding Voice Fraud & Threats Are you Really Who You Claim to Be? Valene Skerpac, CISSP

7/22/072 Agenda  Introduction  Threats associated with fraud & voice  Mitigating Risks  Best Practices  Voice Related Controls  Summary

7/22/073 Introduction  Key Questions Covered  How do today’s threats of fraud effect voice applications?  What voice related controls are used to mitigate risk associated with the identified threats?  What best practices are used?

7/22/074 THREATS ASSOCIATED WITH FRAUD AND VOICE Profits Driving Fraud  Toll call fraud  Fraudulent account control (financial)  Fraudulent purchases  Identity theft  New account creation (fraudulent loans and credit cards)  Unauthorized transfer of funds, stocks and securities  Obfuscation of criminal activities (money laundering)  Fraudulent travel documents  unauthorized receipt of government benefits.

7/22/075 THREATS ASSOCIATED WITH FRAUD AND VOICE Top Threats - unauthorized access & activity  Phishing Attack Schemes ( ’Phishing attacks use both social engineering and technical subterfuge to steal consumers' personal identity, financial or other confidential data ’  Vishing Attack Schemes ( ‘Vishing uses IP-based voice messaging technologies (primarily VoIP) …’  Automated attacks  Easy worldwide connectivity, minimal cost of calls  Mask or impersonation of Caller-ID  Ease of automated calling (war dialing)  Difficult to parse words from voice messages  Can hide source of attack via traffic routing  Use of botnets to proliferate messages  Attacks today  Initiated via , text messaging, voic or live phone call  Directed to fraudulent IVR application which collects data or Primary Rate Service  Many future attack variations possible

7/22/076 THREATS ASSOCIATED WITH FRAUD AND VOICE Top Threats - unauthorized access activity…continued  Security Threats in a Converged Environment  Network, Database and Application Vulnerabilities  SANS TOP 20 (  VoIP server and phones  Denial-of-Service (DoS), Eavesdropping, VoIP phishing scams and toll fraud  VoIP Security Alliance (  Application security bugs  AJAX  SPIT  Brute force hacks  Eavesdropping on media streams (voice channel)  Poor Access control, identity and authorization management

7/22/077 Mitigating the Risk of Threats  Fraud Management  Technology – people – policy – processes  Real-time monitoring, Incident response program  Multi-channel aggregation  Predictive analysis, process structured and unstructured information  Converged Security  Development and maintenance of policies and procedures, regular training, security audits and assessments  Multi-vendor - no one vendor can protect from device to data  Defense in depth approach – layered security  Security Development Life Cycle (SDLC)  security integrated from the beginning can save 2 to 3 times the cost to add security later on  value of the investment in security prevents a projected amount of loss and preserves the reputation of the organization

7/22/078 Mitigating the Risk of Threats  Converged Security …..continued  Access control, identity and authorization management  Identity  Subject and Claim  Claims about subjects evaluated to negotiate access  7 Laws of Identity (  User control and consent  Minimal disclosure for limited use  Justifiable party  Directed Id  Plurality of operators and technologies  Human Integration  Consistent experience  Continually re-assess new schemes looking for solutions  OpenID using voice  Application Development Life Cycle (  Scans/code review/security testing required  Targeted open source tools for VoiceXML environment needed  Potential Project – contact presenter -

7/22/079 Mitigating the Risk of Threats  Voice Related Security Controls  Authentication – Beyond ID and Password/PIN  Voice Channel (In-band) self-service transactions  additional authentication factor, speaker verification and/or other factor  Multi-channel (out-of-band) transactions  Call-back authentication, speaker verification and/or other factor  Call Center Monitoring  Background monitoring with speaker verification and/or recognition running   Speaker Recognition  A biometric modality that uses an individual’s speech. It uses both the physical structure of an individual’s vocal tract and the behavioral characteristics of the individual, for identification, verification or other related tasks

7/22/0710 Voice Biometrics Basics  Security – Authentication Factor  ‘Something the user is’  Biometric Reference Model (voiceprint) - Identity Factor  Vendor specific, proprietary statistical representation (not raw data)  Speaker Verification vs. Speaker Identification  Text Dependent vs. Text Independent Imposter False Accept Rate (FAR)Imposter False Rejection Rate (FRR) Equal Error Rate (ERR) FAR% = FRR% High Convenience High SecurityAccuracy  Subject to human and environmental factors  100% Accuracy Not Realistic  Thresholds based on risk assessments  Not the sole identifier

7/22/0711 Voice Biometrics... continued Risk Assessment  Know your threats  Consider potential biometric attacks & protection mechanisms  Spoofing  Loss of biometric data, Injection of biometric data  False enrollment, System circumvention, etc.  Understand biometrics capabilities and performance (FRR/FAA) Best Practices  Include in Security & Privacy Processes  Enrollment Procedures – Low to high risk ID criteria  Appropriate biometric verification fallback procedures  Policy, controls, audit and monitoring of biometrics data and performance  ISO 19092, Biometric Security Management  Biometric lifecycle  Speaker Recognition Standards  MRCP (Media Resource Control Protocol)  (  VXML (Voice XML) (  Inclusion in future Voice XML Version 3  Speaker Identification and Verification (SIV) Requirements for VoiceXML Applications - Open for Comments  Other ISO biometrics standards in progress

7/22/0712 Summary  Threats  Growing and Costly  Risk Mitigation  Deliberate and Integral Approach Required