“Passwords are No Longer Sufficient” Brian Rivers University of Georgia.

Slides:



Advertisements
Similar presentations
McAfee One Time Password
Advertisements

Achieve Benefit from IT Projects. Aim This presentation is prepared to support and give a general overview of the ‘How to Achieve Benefits from IT Projects’
State of Indiana Business One Stop (BOS) Program Roadmap Updated June 6, 2013 RFI ATTACHMENT D.
Mr C Johnston ICT Teacher
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
MSIA Introduction to Information Systems Security Training and Policy Week 1 Live Session Presentation.
Security Controls – What Works
Information Security Policies and Standards
Chapter 12 Network Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Computer Security: Principles and Practice
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Security Technological Security Implementation and Privacy Protection.
[Name / Title] [Date] Effective Threat Protection Strategies.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
BUSINESS B1 Information Security.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 1.
Dell Connected Security Solutions Simplify & unify.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Chapter 6 of the Executive Guide manual Technology.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Presidio Bank Business Online Banking Security Overview.
Small Business Security Keith Slagle April 24, 2007.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
APolicy EASy Security Project Analysis and Recommendations for TJX Companies, Inc.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IS3220 Information Technology Infrastructure Security
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Cybersecurity - What’s Next? June 2017
Security Engineering.
Jon Peppler, Menlo Security Channels
SAM GDPR Assessment <Insert partner logo here>
Check Point Connectra NGX R60
County HIPAA Review All Rights Reserved 2002.
How to Mitigate the Consequences What are the Countermeasures?
Implementing Client Security on Windows 2000 and Windows XP Level 150
Fy ‘08 NETWORK PLANNING TASK FORCE
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

“Passwords are No Longer Sufficient” Brian Rivers University of Georgia

 For systems that provide access to sensitive and restricted information systems  Requires something you have (hardware token) in addition to something you know (username + password)  Over 1700 employees currently using ArchPass to access these systems

Session Outcomes  Understand how ordinary user credentials are no longer sufficient and how multi-factor authentication adds an additional layer of protection that would have prevented recent incidents  Understand how multi-factor authentication can integrate into complex, decentralized technical architectures in a timely and cost- effective manner.  Understand the human dimension, placing the implementation in the context of business functions, user requirements, and involve critical stakeholders across the institution.

Session Outcomes  This could save your bacon.  “So easy a caveman can do it.”  We really can play nice in the sandbox.

The Threat

June 17 th, :53 GMT By Eduard Kovacs Data Breaches in the News

Victims by Location Data breaches % Australia7% Canada 3% UK2% Brazil1.2% Other20.8% data source: Trustwave Global Security Report

Attackers by Location Originated in US 29% Romania33.4% Ukraine4.4% China 3.9% Unknown14.8% data source: Trustwave Global Security Report

Phishing / Malicious 14 billion malicious spam daily 9.8 billion messages contain links to websites that will infect your computer Of spam s sent daily are malicious 10% data source: Trustwave Global Security Report

Phishing Attacks Phishing Spear Phishing Whaling Target(s)Anyone Group or organization Specific person or team Research required MinimalModerateSubstantial BelievabilityMediumHighVery High SophisticationMinimalModerateSubstantial GoalIdentities / access to system or network data source:

The Response

Changing the Culture  Creating awareness – “Information security is non-negotiable, and it’s everybody’s business”  Accept Change – “Institutions need to adopt common sense measures that move the pendulum back so that a balance is struck between user convenience and security”  Invest in Technology – “Tools such as anti-virus, digital loss prevention (DLP) software, and multi-factor authentication reduce attack surfaces dramatically”

ArchPass - Business Functionality and User Impacts  UGA Culture and Background  UGA has a strong culture of compliance and a willingness to improve information security however,  ArchPass would need to overcome:  UGA’s decentralized administrative structures  Institutional skepticism and reluctance to add administrative burden

Business Functionality and Impacts  Role of the Administrative Systems Advisory Council (ASAC)  Involve UGA business units and stakeholders with shared responsibility in the delivery and support of information technology, application, and data needs of the University community.  Represent the entire University when making administrative system recommendations. Thus ASAC has broad representation from each of Vice Presidents and major units and extends itself to gather feedback from special interest groups.

Business Functionality and Impacts  ASAC Approach to ArchPass  Review initial proposal from the VP for IT for phase one of a multi-factor authentication program.  Recommend criteria for systems required to use ArchPass, policy and procedure, and an exception process.

Business Functionality and Impacts  ASAC Approach to ArchPass (continued)  Gather input and feedback on the recommendations from University-wide user groups.  Provide this feedback to IT. This feedback was key to implementing a program with University-wide acceptance. The User community was part of the decision-making and the overall process.

Business Functionality and Impacts  Key Concerns Expressed by Users and ASAC  Creating an exception process (both opt-in and opt-out) with appropriate vetting, risk assessment, and functional and technical management approval.  Access to systems from off-site locations, especially during emergencies.  University recognition that this was ‘Phase I’ and not ‘end state’. Need to monitor, adjust, and update policy/procedure over time.

ArchPass - Business Functionality and User Impacts  Post Implementation Feedback  “It is easy to use.”  “Has become a way of life, just like using my UGA ID card for building access.”  Status Symbol of sorts – “My co-worker has an ArchPass, why don’t I have one?”

Implementation

Multifactor Authentication Strategy The University of Georgia elected to deploy a network (VPN) based 2-Factor authentication using hardware tokens. Decision Factors were  Timeliness of Deployment  Diversity and age of platforms being protected  Supportability of authentication platform

The Technology ArchPass Project Timeline

Network Level Multifactor  Pros:  No application modifications needed for integration (good option for legacy applications)  Central logging of network behaviors  Protects against application & OS authentication vulnerabilities  Leverages tried & true VPN security technology  Cons:  VPN client required for access  Possible spoofing risks if done incorrectly

Hardware Token Solution  Pros:  Tried & true solution  Lower complexity in support model  Avoids BYOD support & function issues  Avoids multi-platform support issues  Cons:  Deployment overhead  Per Unit hardware/software cost is higher  Software Tokens are currently under investigation for Phase 2

Data Containment Strategy The University of Georgia deployed a Secure Virtual Desktop Infrastructure along with Data Loss prevention technology within the Secure Network zone.  Glove box for user data processing  Controlled desktop with application safe-listing  Highly restricted browser access  Detailed access and use logging

Cost Estimates Below are possible cost estimates for a 500 user implementation. EstimatesInitial CostsAnnual Maint.3 year Tco5 year Tco 500 Tokens$20,000$3,000 Incidentals$5,000 Cisco ASA 5555$16,437$2,250 Total$41,437$5,250$51,937$62,437 UGA ongoing support estimates approximately 1/3 rd FTE.

Questions