E-Commerce Technology Risk and Security

Slides:



Advertisements
Similar presentations
Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Advertisements

PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
PCI-DSS Erin Benedictson Information Security Analyst AAA Oregon/Idaho.
Complying With Payment Card Industry Data Security Standards (PCI DSS)
2014 PCI DSS Meeting OSU Business Affairs Process Improvement Team (PIT) Robin Whitlock & Dan Hough 10/28/2014.
Springfield Technical Community College Security Awareness Training.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Property of CampusGuard Compliance With The PCI DSS.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Jeff Williams Information Security Officer CSU, Sacramento
Property of the University of Notre Dame Navigating the Regulatory Maze: Notre Dame’s PCI DSS Solution EDUCAUSE Midwest Regional Conference March 17, 2008.
Security Controls – What Works
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
GPUG ® Summit 2011 November 8-11 Caesars Palace – Las Vegas, NV Payment Processing Online and Within Dynamics GP PCI Compliance and Secure Payment Processing.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Why Comply with PCI Security Standards?
Introduction to PCI DSS
Northern KY University Merchant Training
Payment Card Industry (PCI) Data Security Standard
Disclaimer Copyright Michael Chapple and Jane Drews, This work is the intellectual property of the authors. Permission is granted for this material.
Payment Card Industry Data Security Standard (PCI DSS) By Roni Argetsinger
Website Hardening HUIT IT Security | Sep
Central Michigan University Payroll and Travel Services 3.
PCI DSS Managed Service Solution October 18, 2011.
The Right Choice for Call Recording OAISYS and PCI DSS Compliance Managing Payment Card Industry Compliance with OAISYS Call Recording Solutions.
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
The Payment Card Industry (PCI) Data Security Standard: What it is and why you might find it useful Fred Hopper, CISSP TASK - 27 March 2007.
PCI requirements in business language What can happen with the cardholder data?
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
PCI: As complicated as it sounds? Gerry Lawrence CTO
Credit Card Processing Gail “Montreal” Shoffey Keeler August 14, 2007.
Introduction to Payment Card Industry Data Security Standard
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Information Security 2013 Roadshow - PCI. Roadshow Outline  What IS PCI  Why we Care about PCI  What PCI Means to You and Me.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
1 Payment Card Industry (PCI) Security Standard Developed by the PCI Security Council formed by major card issuers: Visa, MasterCard, American Express,
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
U.S. Businesses Targeted Randy Wolverton Brian J. Koechner.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Introduction to PCI DSS
Payment Card Industry (PCI) Rules and Standards
Performing Risk Analysis and Testing: Outsource or In-house
PCI-DSS Security Awareness
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Internet Payment.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Contact Center Security Strategies
Introduction to the PACS Security
Presented by: Jeff Soukup
Anatomy of a Common Cyber Attack
Presentation transcript:

E-Commerce Technology Risk and Security Brian Trevey and Randy Romes

Presenter Contact Information Randall J. Romes, CISSP, MCP Principal, Information Security Services LarsonAllen LLP 612-397-3114 Office 612-554-3967 Cell rromes@larsonallen.com www.larsonallen.com Brian Trevey Vice President - Delivery Trustwave 410/573-6910 x7828 Office 410/507-3084 Cell btrevey@trustwave.com www.trustwave.com

Agenda Trends in E-Commerce and Information Security Compliance Drivers Security Best Practices Recommendations

Anatomy of a Data Breach – Initial Entry Header April 17 Anatomy of a Data Breach – Initial Entry Trustwave Data Breach Analysis Top Methods of Entry Included: Remote Access Applications [45%] Default vendor supplied or weak passwords [90%] 3rd Party Connections [42%] MPLS, ATM, frame relay SQL Injection [6%] Web application compromises [90%] Exposed Services [4%] Remote File Inclusion [2%] Email Trojan [<1%] 2 recent Adobe vulnerability cases Physical Access [<1%] 218 Investigations 24 countries Trustwave Confidential-Page

Anatomy of a Data Breach – Initial Entry Header April 17 Anatomy of a Data Breach – Initial Entry SANS 2009 Cyber Security Risk Report Client side software vulnerabilities Commonly used programs such as Adobe PDF Reader, QuickTime, Adobe Flash and Microsoft Office Internet facing websites (> 60% of total Internet attack attempts) Web application vulnerabilities such as SQL injection and Cross-Site Scripting flaws in open-source as well as custom-built applications account for more than 80% of the vulnerabilities being discovered. Attack Vectors: Email Phishing Drive by Downloads Trustwave Confidential-Page 5

Email Phishing – Targeted Attack Randall J. Romes [rromes@larsonallen.com] Randall J. Romes [rromes@larsonallen.com] Two or Three tell-tale signs Can you find them? https://microsoft.issgs.net

Email Phishing – Targeted Attack https://microsoft.issgs.net Fewer tell tale signs on fake websites

Michigan Company Sues Bank Michigan company is suing its bank after cyber thieves allegedly made fraudulent wire transfers totaling US $560,000. The cyber thieves obtained the banking account credentials through a phishing email sent to an employee at EMI. The transactions wired funds to bank accounts in Russia, Estonia, Scotland, Finland, China and the US and were withdrawn soon after the deposits were made. Alleges Comerica's security practices made EMI vulnerable to the phishing attack. The bank allegedly routinely sent its online customers emails with links asking them to submit information to renew digital certificates. Also alleges that the bank failed to notice unusual activity. Until the fraudulent transactions were made, EMI had made just two wire transfers ever; in just a three-hour period, 47 wire transfers and 12 transfer of fund requests were made. In addition, after EMI became aware of the situation and asked the bank to halt transactions, the bank allegedly failed to do so until 38 more had been initiated.

Bank Sues Customer for ACH Fraud??? A Texas bank is suing commercial banking customers Cyber thieves made a series of ACH transactions that totaled $801,495 from Hillary Machinery Inc.'s bank account. The bank was able to retrieve about $600,000 of the money, Customer subsequently sent a letter requesting that the bank refund the remaining $200,000, Bank responded by filing the lawsuit requesting that the court certify that Banks's security was in fact reasonable, and that it processed the wire transfers in good faith. Documents filed with the court allege that the fraudulent transactions were initiated using the defendant's valid online banking credentials.

Incident Response – Investigative Conclusions Header April 17 Incident Response – Investigative Conclusions Window of Data Exposure While attackers were still on systems an average of 156 days before being detected, elimination of stored data greatly reduces the data loss exposure. Trustwave Confidential-Page

Penetration Tests – Top 10 – External Network Header April 17 Penetration Tests – Top 10 – External Network Rank Vulnerability Name Circa Attack Difficulty 1 Unprotected Application Management Interface 1994 Easy 2 Unprotected Infrastructure Management Interface 1993 3 Access to Internal Application via the Internet 1997 Medium 4 Misconfigured Firewall Permits Access to Internal Hard 5 Default or Easy to Determine Credentials 1979 Trivial 6 Sensitive Information, Source Code, etc. in Web Dir 1990 7 Static Credentials Contained in Client 1980 8 Domain Name Service (DNS) Cache Poisoning 2008 9 Aggressive Mode IKE Handshake Support 2001 10 Exposed Service Version Issues (Buffer Overflows) 1996 1,894 Penetration Tests 48 countries Many Included a Mixture of Vectors Network, application, wireless, physical Tests Averaged 80 hours in Length Over 100,000 hours of testing was performed Classified as Manual Testing Some tools are used but mostly for low level tasks Trustwave Confidential-Page

Conclusions Attackers are using old vulnerabilities Header April 17 Conclusions Attackers are using old vulnerabilities Attackers are using new vulnerabilities (not a contradiction!) Attackers know they won’t be detected Organizations do not know what they own or how their data flows Blind trust in 3rd parties is a huge liability Fixing new/buzz issues, but not fixing basic/old issues In 2010, take a step back before moving forward Trustwave Confidential-Page

Compliance Mandates and Data Protection Data Type PCI DSS Payment Card Industry Data Security Standard (2004, 2006) Credit Card Data HIPAA Health Insurance Portability & Accountability Act (1996) Privacy & Security Rules (2003) PHI: Protected Health Information GLBA Gramm-Leach-Bliley Act (1999) Financial Services Modernization Act NPPI: Non-Public Personal Information SOX Sarbanes-Oxley Act (2002) Sections 404 and 302 Financial Records Intellectual Property FERPA Family Educational Rights & Privacy Act (1974) Student Records ITAR International Traffic in Arms Regulations (US Dept of State) Military & Defense Related IP on the US Munitions List FISMA Federal Information Security Management Act (2002) Data Security and Audit Standards for US Government and Contractors Title 21 CFR Part 11 US Food & Drug Administration Regulation Electronic records and signatures US State Data Privacy California SB 1386 44 states (as of June 2008) Customer Data Protection Breach notification to customers

Payment Card Industry Data Security Standard (PCI DSS) Six Goals, Twelve Requirements PCI DSS requirements Build and maintain a secure network Install and maintain a firewall configuration to protect cardholder data Do not use vendor-supplied defaults for system passwords and other security parameters Protect cardholder data Protect stored cardholder data Encrypt transmission of cardholder data across open, public networks Maintain a vulnerability management program Use and regularly update anti-virus software or programs Develop and maintain secure systems and applications Implement strong access control measures Restrict access to cardholder data by business need-to-know Assign a unique ID to each person with computer access Restrict physical access to cardholder data Regularly monitor and test networks Track and monitor all access to network resources and cardholder data Regularly test security systems and processes Maintain an information security policy Maintain a policy that addresses information security for employees and contractors

Why the PCI-DSS is Successful? Increased awareness Focus on protection of cardholder data Standardized controls accepted by all card brands Eradication of prohibited data storage Continual improvements and updates to the standard Evolution of the standard Based on information gathered and trends identified in post- compromise forensic investigations PCI Positive Impacts - The upside of PCI DSS Increased awareness Increased focus on protection of CHD Standardized controls for all card brands Targeted initiatives to eradicate prohibited data (highest risk for subsequent fraud) Modifications are a direct result of information gathered / trends identified in post-compromise forensic investigations

The Global Remediation Plan Header April 17 The Global Remediation Plan Rank Strategic Initiative 1 Perform and Maintain a Complete Asset Inventory; Decommission Old Systems 2 Monitor Third Party Relationships 3 Perform Internal Segmentation 4 Rethink Wireless 5 Encrypt Your Data 6 Investigate Anomalies 7 Educate Your Staff 8 Implement and Follow a Software Development Life Cycle (SDLC) 9 Lock Down User Access 10 Use Multifactor Authentication Every Where Possible Trustwave Confidential-Page

E-Commerce Best Practices Header April 17 E-Commerce Best Practices Network Vulnerability Scanning Penetration Testing Application Testing SSL Certificates Web Site Seals Patches and Network Security User Awareness and Training Study research offered by McAfee also showed that one-third of consumers would rather buy from a smaller Web site with a trustmark than a larger, more well-known e-tailer.  When you join a trust and security program, it can benefit your business in two ways. First, you will create a feeling of trust with your consumers, which in could help boost sales. Another benefit can be found in security trust services. These trustmark programs help you to better protect your business and your customer's sensitive data. Trustwave Confidential-Page

Conclusion Best Practices Checklist Have you tested security? Header April 17 Conclusion Best Practices Checklist Have you tested security? Are your SSL or EV SSL certificates valid and not expiring during the holiday season? Are your Web site seals valid and up to date? Have you obtained all patches and are the patches up-to-date? Do you know what and who are using your network? Trustwave Confidential-Page

Resources Trustmarks http://www.ecommerce-guide.com/solutions/advertising/article.php/3860526 Trustwave’s Global Security Report 2010 https://www.trustwave.com/whitePapers.php SANS 2009 Cyber Security Report http://www.sans.org/top-cyber-security-risks/ SANS NewsBites Vol. 12 Num. 13 – Business Customer Sues Bank http://www.sans.org/newsletters/#newsbites Bank Sues Customer http://www.bankinfosecurity.com/articles.php?art_id=2132

Questions?