Confidentiality (slides courtesy of Danny Lungstrom and Senthil Somasundaram)

Slides:



Advertisements
Similar presentations
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Advertisements

Types of Credit Consumer Loan One time loan that the borrower pays back in a specified period of time with a pre-determined payment schedule Home mortgages,
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Section 22.1.
Online Holiday Shopping Brings Great Deals – and Fraud This lesson is part of the iKeepCurrent TM Program, provided by iKeepSafe TM.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
1.7.2.G1 Electronic/Online Banking & Bill Pay Take Charge of Your Finances.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
22 November Security and Privacy  Security: the protection of data, networks and computing power  Privacy: complying with a person's desires when.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
“Electronic Payment System”
1 and DNS Hacking. Overview Hacking - Technology - Attacks - Phishing/Spearphishing/Whaling DNS Hacking - Technology - Attacks - Flux 2.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Confidentiality Information Assurance Policy (95-803) Danny Lungstrom Senthil Somasundaram 03/27/2006.
Online and Mobile Banking. Online banking Online Banking  Online banking is a fairly established practice in our internet-saturated world.  Many people.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Information Security Technological Security Implementation and Privacy Protection.
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
Credit Cards One of the most popular forms of credit Next Slide.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
ECE Lecture 1 Security Services.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Security, Social and Legal Issues Regarding Software and Internet.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Topic 5: Basic Security.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
SIMPLE AND COMPOUND INTEREST
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
Langara College PCI Awareness Training
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Personal Privacy: Limited Disclosure using Cryptographic Techniques Mark Shaneck Karthikeyan Mahadevan SCLab.
THE LARGEST NAME SERVICE ACTING AS A PHONE BOOK FOR THE INTERNET The Domain Name System click here to next page 1.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Safe Computing Practices. What is behind a cyber attack? 1.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Travel & Hospitality. Guest services Digital signage Automated retail Mobile operations management Remote monitoring Learn how new technologies pave the.
Why is this called “the ostrich effect”?
One of the most popular forms of credit
Security, Social and Legal Issues Regarding Software and Internet
Protection of CONSUMER information
Social Engineering Charniece Craven COSC 316.
Phishing is a form of social engineering that attempts to steal sensitive information.
Managing the IT Function
Lesson 2- Protecting Yourself Online
Red Flags Rule An Introduction County College of Morris
Cyber Trends and Market Update
CompTIA Security+ Study Guide (SY0-401)
Security Hardening through Awareness August 2018
Business Compromise and Cyber Threat
Lesson 2- Protecting Yourself Online
Presentation transcript:

Confidentiality (slides courtesy of Danny Lungstrom and Senthil Somasundaram)

CIA Triad Confidentiality Availability Integrity Secure Ref: Security In Computing - Charles Pfleeger

Threats to Confidentiality  Access to confidential information by any unauthorized person  Intercepted data transfers  Physical loss of data  Privileged access of confidential information by employees  Social engineered methods to gain confidential information  Unauthorized access to physical records  Transfer of confidential information to unauthorized third parties  Compromised machine where attacker is able to access data thought to be secure

Confidentiality Agreements  Strict access controls are crucial to protecting the confidential information  Those who should have access to the confidential information should be clearly defined –These people must sign a very clear confidentiality agreement –Should understand importance of keeping the information private

Financial Importance  According to Computer Security Institute's 6 th “Computer Crime and Security Survey”  “the most serious financial losses occurred through theft of proprietary information”  34 respondents reported losses of $151,230,100  $4.5 million per company in 1 year

Trade Secrets  No registration/approval or standard procedure  Quick and easy  Limited protection –Not protected against reverse engineering or obtaining the secret by “honest” means

Trade Secrets (2)  Why trade secrets?  How to protect –Enforce confidentiality agreements –Label all information as “Confidential” for the courts  How long do trade secrets remain secret? –Average is 4 to 5 years (decreasing)

Best Kept Trade Secrets  Coca-cola –Coca-Cola decided to keep its formula secret, decades ago! –Only known to a few people within the company –Stored in the vault of a bank in Atlanta –The few that know the formula have signed very explicit confidentiality agreements –Rumor has it, those that know the formula are not allowed to travel together –If Coca-cola instead patented the syrup formula, everyone could be making it today  KFC

Phishing Scams  Tricking people into providing malicious users with their private/financial information  Financial losses to consumers: –$500 million to $2.4 billion per year depending on source –15 percent of people that have visited a spoofed website have parted with private/personal data, much of the time including credit card, checking account, and social security numbers

Phishing example? Date: Tue, 20 Sep :06: (PDT) From: Countrywide To: Subject: Important Customer Correspondence [Image: "height="] [Image: "Countrywide - Full Speectrum Lending Division"] [Image: " "] [Image: "height="] [Image: "height="] [Image: "height="] [Image: "If you could use some extra cash, Countrywide could make it easy."] [Image: "Click Here to Get Started"] [Image: "height="] [Image: "height="] [Image: "height="] [Image: "height="] Dear Timothy, We can help customers get cash from the available equity they've built up in their homes by refinancing their mortgages ? and with the trend in rising home values, we estimate your home's equity may have increased to as much as $43, (much more…) Phone number appears legit, current mortgage holder Note typographical errors (Speectrum, empty images, etc.) Big payoff offered Closer look: embedded domains doesn’t match from domain (m0.net, r.delivery.net, not countrywide.com, all same ISP (Digital Impact))

Legal Requirements  HIPAA  Gramm-Leach Bliley  FERPA  Confidentiality/Non-disclosure Agreements

Giant Eagle Example  Giant Eagle's Loyalty Program –Nearly 4 million active users in 2005 –User's purchases at both the grocery store and gas station are knowingly monitored –Can even link the card to fuel perks, enable check cashing and video rental service –Also use card at 4,000 hotels, Avis, Hertz, Alamo, numerous local retailers, sporting events, museums, zoos, ballets, operas, etc.

Giant Eagle (2)  From the privacy policy: –Giant Eagle does not share your personal information or purchase information with anyone except:  As necessary to enable us to offer you savings on products or services; or  As necessary to complete a transaction initiated by you through the use of your card;

Writing Policies  Ask numerous questions before beginning –What information is confidential? –Who should be allowed to access this information? –How long is it to remain confidential? –What type of security policy is needed? –What level of confidentiality is necessary for the given organization?

Chinese Wall Policy  Conflicts of interest –Person in one company having access to confidential information in a competing company  Based on three levels for abstract groups –Objects –Company Groups –Conflict Classes  Company groups with competing interests

Chinese Wall Policy (2)  Access control policy –Individual may access any information, given that (s)he has never accessed any information from another company in the same conflict class –So, once individual has accessed any object in a given conflict group, they are from then on restricted to only that company group within the conflict group, the rest are off-limits

Writing the Policy  Contents should include: –Obligation of confidentiality –Restrictions on the use of confidential information –Limitations on access to the confidential information –Explicit notification as to what is confidential

Implementing Policy  Host lockdown  Database lockdown  Encryption  Backup controls   Network lockdown  Device controls  Personnel controls