Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
7 Effective Habits when using the Internet Philip O’Kane 1.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Personal Online Safety Florida Department of Law Enforcement Computer Crime Center Mary McLaughlin Cyber Security Analyst.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Principles of Information Technology
INFORMATION SECURITY UPDATE Al Arboleda Chief Information Security Officer.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Norman SecureSurf Protect your users when surfing the Internet.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
General Awareness Training
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Small Business Security Keith Slagle April 24, 2007.
Topic 5: Basic Security.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Information Security: Current Threats Marc Scarborough Information Security Officer
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Introduction to Networking. What is a Network? Discuss in groups.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Critical Security Controls
Security Standard: “reasonable security”
Instructor Materials Chapter 7 Network Security
Data Compromises: A Tax Practitioners “Nightmare”
Robert Leonard Information Security Manager Hamilton
Risk of the Internet At Home
Chapter 9 E-Commerce Security and Fraud Protection
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Cybersecurity Threat Assessment
Security in mobile technologies
6. Application Software Security
Principles of Information Technology
Presentation transcript:

Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer

© 2005 Copyright Citadel Security Software Inc. 2 Are you Vulnerable? Do you have or use ….

© 2005 Copyright Citadel Security Software Inc. 3 Odds aren’t in your favor Have High Speed Internet at home? –If you directly connected your computer, you were probably infected in the first 15 seconds Why? –Most computers and devices aren’t configured for proper security –Devices like cell phones, PDAs, computers are designed for ease of use and to make internet access simple The simple truth is good security takes effort

© 2005 Copyright Citadel Security Software Inc. 4 Five Classes of Vulnerabilities Software Defects Misconfigured Services Unsecured Accounts and Passwords Malware Unnecessary services

© 2005 Copyright Citadel Security Software Inc. 5 What Vulnerabilities Allow An attacker to execute commands as another user Allows an attacker to access data that is contrary to the specified access restrictions for that data Allows an attacker to pose as another entity Allows an attacker to conduct a denial of service Allows an attacker to conduct information gather activities Allows an attacker to hide activities Includes a capability that behaves as expected by can be easily compromised Is a primary point of entry that an attack may attempt to use to gain access to the system or data Is considered a problem according to some reasonable security policy

© 2005 Copyright Citadel Security Software Inc. 6 Illustrating the Risk Some spyware is suspected of sending captured data to North Korean intelligence agency servers North Korean government is suspected of selling data to criminals and organizing Denial of Service Attacks South Korea’s Defense Ministry claims North Korea has an aggressive hacker training program that includes five years of university training Source:

© 2005 Copyright Citadel Security Software Inc. 7 Vulnerability Statistics Approximately 10 vulnerabilities per day are discovered and made public 18.78% are Extremely Critical or Highly Critical 36.6% are Moderately Critical 37.49% are Less Critical 7.13% are Not Critical The difference is whether a vulnerability has an identified exploit or a suspected exploit

© 2005 Copyright Citadel Security Software Inc. 8 Vulnerability Statistics 70.7% of all attacks are initiated remotely 11.4% of all attacks are initiated from the local network 17.89% are initiated from the local machine 27% of all attacks are to gain system access 21% are Denial of Service attacks 12% are privilege escalation attacks 17% seek to expose sensitive or system level information Source:

© 2005 Copyright Citadel Security Software Inc. 9 What’s Affected? Operating Systems Desktop and Server Applications Network Devices Wireless Phones Even Antivirus Software and Firewalls Everything. Source:

© 2005 Copyright Citadel Security Software Inc. 10 What Should You Do? Identify your assets –Servers, Desktops, Wireless Devices, Network Printers, Hubs, Routers, Telephone Switches Assess your risk. –Follow security oriented web sites to keep up to date –Use vulnerability assessment tools to regularly evaluate your degree of risk –Diagnose your systems for spyware and other malware Review and Evaluate –Your vulnerabilities against the risk identified Remediate –Apply patches but also review the advice in your vulnerability assessment tool for specific advice –Review your security policies and how they are enforced Monitor and Maintain –Reassess with vulnerability assessment –Track system changes –Monitor compliance with security policies

© 2005 Copyright Citadel Security Software Inc. 11 How Can You Start? Use hardware firewalls –Software firewalls have been exploited Learn to use a vulnerability assessment scanner Use antivirus software for all inbound and outbound –Newer versions also protect Instant Message applications –New generation products provide some protection against phishing –You will not win a lottery you never heard of –You don’t have any mysterious relatives in Nigeria or South Africa who want to wire money to your bank account. Patch Judiciously –Don’t just apply every patch. Make sure it applies to you. Develop and Implement Consistent, Measurable Policies Stay Informed

© 2005 Copyright Citadel Security Software Inc. 12 Top Frauds and Scams Type of Fraud% Of Total Average Dollar Loss Per Incident Auctions51%$765 General Merchandise20%$846 Nigerian Money Offers8%$2,649 Phishing5%$182 Information/”Adult” Services3%$241 Fake Checks3%$5,201 Lotteries/Lottery Clubs3%$2,225 Computer Equipment/ Software 1%$1,401 Fake Escrow Services1%$2,585 Internet Access Services1%$1,187 Source: Internet Fraud Watch

© 2005 Copyright Citadel Security Software Inc. 13 Summary Computer related crime has increased 36 fold since 1997 There were more than 56 Million computer attacks in 1994 – the majority were probes for existing, known vulnerabilities As of March 2003, verifiable attacks cost more than $16 Billion in economic damage 20% of all organizations are expected to experience a serious security incident 750,000 Americans had their identities hijacked in 2004 Average loss to fraud per victim increased to $895, up from $527 in fraud has increased to 22%, up from 5% in 2003 Effective security policies and vulnerability management are possible, regardless of operating system or application.

© 2005 Copyright Citadel Security Software Inc. 14 Questions? For more information visit our web site at Or contact me – Bill Diamond