Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security.

Slides:



Advertisements
Similar presentations
Security for Mobile Devices
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Getting Set-up with Hosting and WordPress Gregory Young Alternative Hosting
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Basic Data Safety Practices That Can Prevent Malpractice Claims & Ethics Violations Grant County Bar Association June 14, 2011 Kim J. Brand PresidentFounder.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Tips and Techniques: How to Protect Yourself and Others Better Jeanne Smythe February 20, 2004.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
Viruses & Destructive Programs
Threats to I.T Internet security By Cameron Mundy.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Data Security GCSE ICT.
Information Security Technological Security Implementation and Privacy Protection.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
DATA SECURITY AND YOU! W/ DAVE California Center for Population Research.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Unit 19 INTERNET SECURITY
IT Security for Users By Matthew Moody.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
What are the risks to the data when we store all our work on computer? By Jessica Mann.
By Ksenia Primizenkina 8K
The Simple Side of Computer Security for The Brownies That Like To Read!!
In the old days... You Your computer. Then came... The Network.
PC Maintenance How to keep your computer healthy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Viruses, Hacking and Backups By Katie Louise Bieber!
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Types of Electronic Infection
CPT 123 Internet Skills Class Notes Internet Security Session A.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
INTERNET SAFETY FOR KIDS
Small Business Security Keith Slagle April 24, 2007.
Computer security By Isabelle Cooper.
All about viruses, hacking and backups By Harriet Thomas.
SSL. Why Is Security Important ●Security is important on E-Commerce because it makes sure that your information gets from your computer to their server.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
All you need to know to keep you and your computer safe!!!
Understand Encryption LESSON 2.5_A Security Fundamentals.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
QIP Education Session INFORMATION SECURITY Joseph Zurba Information Security & IT Compliance Officer Harvard Medical School February 16, 2015.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Virus Removal Support Services. H OW TO K EEP Y OUR C OMPUTER F REE F ROM V IRUS T HREAT ? Virus can attack your PC any time without any.
Ransomware BISD Technology Department. Ransomware Ransomware is a type of malicious software (malware) that infects a computer and/or mobile device and.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
What they are and how to protect against them
Common Methods Used to Commit Computer Crimes
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch.
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Data Recovery: Why Secure Deletion is so Important.
Presentation transcript:

Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security

Problems with Data We’re accountable for real/possible exposures Data integrity important to research There are people who want to steal data If systems are compromised data exposure or corruption can be collateral damage Data gets everywhere…

Data Gets Everywhere

Example Data Leaks Thumb drives get lost Laptops are stolen NAS devices are put on the Internet Collaboration tool permissions too broad Misdirected s Malware steals data Servers/databases are compromised

Personal Devices Hard to remove all traces of data from systems and backups Destruction of devices sometimes necessary Personal systems usually not secure or compliant Personal cloud backup, , or collaboration tools probably not compliant

Configuration Challenges Too many devices to keep track of Settings can unexpectedly change Knowing details of settings can be a full time job It’s too easy to have your data end up in the cloud without realizing it

The Hacker Threat “Attacker” is more accurate Authorized “White Hat” or “Ethical Hackers” test and improve security So what about the bad hackers?

Attacker Motivation Money - information can be sold or held for ransom Ideology - hacktivism & nation states Borrowing your system (maybe for resale) –Used to launch attacks –Bitcoin mining or other computation For fun or bragging rights

Attacker Techniques Staggering number of ways: Compromising web or other servers Malware Social engineering Network attacks Cryptographic attacks Attacks on physical security

Tools Encryption Antivirus System patching Data destruction Managed systems

Encryption – Basic Idea

Encryption Types Data in Transit  On a wire/through the air  HTTPS, SSL Data at Rest  In a file/on a disk  Credant, FileVault, BitLocker

FIPS Encryption FIPS is a government standard Third-party testing labs certify products as being validated FISMA requires it Some projects/grants require it HHS refers to the same standards for PHI Encryption key must be separate

Encryption Misconceptions MS Office encryption is fine –Depends on the version Zip file encryption is OK –Need to use WinZip 18.5 or later in FIPS mode. If my system is encrypted, I’m safe. –An infected system can leak data

More Misconceptions It’s safe to click through certificate warnings –Someone could be intercepting your data If it says FIPS compatible it’s OK –It needs to be FIPS certified/validated. NIST has lists of vendor products

Yet More Misconceptions I can use the same password everywhere if it’s strong –Attackers get one password and try it everywhere If I have a password set on my laptop, it’s encrypted –See demo later

Antivirus Not 100%, but can catch common malware A dedicated attacker won’t be deterred Average attackers won’t go to this trouble Not all antivirus products are equal. Watch for updated recommendations from Security & Compliance

System Patching Serious vulnerabilities found every week May only have a few hours to patch We’ve seen systems compromised in 4-5 hours of announcements Automatic updates are best

Data Destruction It can be hard to erase data Traditional (non-SSD) hard drives require several passes of wiping SSD or flash memory devices may or may not be capable of being sanitized Physical destruction is only sure way Best if device is encrypted before use

Managed Systems On managed systems, you don’t have to worry about the system itself Example managed systems –AirWatch –MiHarbor/MCIT Core Thumb drives, external drives, NASs, and personal equipment still an concern

Demo & Questions