Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO

Slides:



Advertisements
Similar presentations
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Advertisements

Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
Crisis Communications for Security Issues: A Nightmare You Can Manage Marilu Goodyear Donna Liss Allison Rose Lopez Jenny Mehmedovic The University of.
Springfield Technical Community College Security Awareness Training.
Protecting Personal Information Guidance for Business.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Data Incident Notification Policies and Procedures Tracy Mitrano Steve Schuster.
Advancing Security Programs through Partnerships Cathy HubbsShirley Payne IT Security Coordinator Director for Security Coordination & Policy George Mason.
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
 Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM.
Password District Data Breach Exercise [District Name] [Date] [Logo]
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
University of Guelph IT Security Policy Doug Blain Manager, IT Security ISC, April 27th.
Risk Assessment 101 Kelley Bradder VP and CIO Simpson College.
© 2003, EDUCAUSE Information Privacy: Public Policy and Institutional Policies Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
Network security policy: best practices
Information Resources and Communications University of California, Office of the President System-Wide Strategies for Achieving IT Security at the University.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Information Security Information Technology and Computing Services Information Technology and Computing Services
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
CBLE Relationships with Administration, Staff, Students and Parents.
Business Education Department - Standard Grade Administration.
Securing Information in the Higher Education Office.
2005 MASFAA CONFERENCE CHARLESTON, WEST VIRGINIA Ginny D’Angelo Vice President of Student Loans Commerce Bank Diane Lambart Fleming Associate Director.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
Working Effectively with Law Enforcement: How to Protect the Privacy of Your University Community Without Going to Jail Michael Corn Director, Security.
Public Employees Retirement System October 31, 2007 Eric Sokol, CSD Administrator Jeffrey Marecic, ISD Administrator Senate Bill 583 Implementation.
Data Risk and Security Andrew Roderick Campus Technology Committee – January 21, 2015.
 Sana Riaz  Registration No  Saira Khalid  Registration No
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Information Assurance Policy Tim Shimeall
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
The Privacy Symposium – Summer 2008 Identity Theft Resource Center Jay Foley, Executive Director Presents: Privacy: Pre- and Post-Breach © Aug 2007.
CU – Boulder Security Incidents Jon Giltner. Our Challenge.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
Incident Response November 2015 Navigating a Cybersecurity Incident.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Development of a Clean Room/Highly Restricted Zone June 12, 2012 Thomas Garrubba - CVS Caremark; Manager, Technical Assessments Group ©2011 The Shared.
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
Information Security Services. Overview  Administrative Systems Security  Legislative Requirements  SUNet Security  Individual Security Awareness.
Responding to a Security Incident Maryland Security Day March 2, 2004 Jack Suess
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
2 United States Department of Education, Privacy Technical Assistance Center 1 Western Suffolk BOCES Data Breach Exercise.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
DART Technology Nicole Fontayne-Bardowell, MPA Vice President & CIO
Responding to Intrusions
Data Compromises: A Tax Practitioners “Nightmare”
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Protecting Personal Information Guidance for Business.
IT Development Initiative: Status and Next Steps
Digital Forensics in the Corporation
Red Flags Rule An Introduction County College of Morris
North Port Police Department Organizational Chart
IT Development Initiative: Status & Next Steps
Cyber Security: What the Head & Board Need to Know
Information Technology Organization Overview RFP #220-05
Anatomy of a Common Cyber Attack
Presentation transcript:

Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO

Developing a Response Capacity in Fall 2004 Developing a Response Capacity in Fall 2004  CSIRT-tech IT Security Coordinator formed team with Windows engineer, Unix engineer & Net engineer; sent team to SANS incident response training.  CSIRT-exec Deputy CIO formed team with university counsel, VP of UR., FERPA officer, President’s Chief of Staff, and University Safety Officer.

Incident Description  January 3 rd, ITU Windows Server Manager noticed his servers being probed by server in ID Card Office.  Rushed to ID Card Office and removed server from network. Then called CSIRT-Tech  Contained damage, preserved evidence, enabled restoration of service, determined files contained SSNs.

Incident Handling  Grade: B network dir  CSIRT-Exec decided community had to be notified; president agreed.

Getting/Sharing the Facts  Took 3 days to ascertain: - no other servers on LAN were compromised (some had credit card numbers); - no files on original server had other private data; & - get advice from Feds as to how community could protect their identities (but this advice too strong)

Getting/Sharing the Facts  Another 2.5 days to get delivered to every class of customer  Could not tell if the files had been downloaded or copied and law enforcement forensics teams are too overloaded to work quickly so contracted with forensics firm

Getting/Sharing the Facts  Struggled to determine if ID cards were the target. This caused us to contract with police to patrol residence halls and eventually to issue new ID cards to every resident student

Assigning Roles  Law Enforcement Coordination – Campus Police (FC, FBI)  Communication strategy – University Relations  Communication point - CIO  Coordination – CIO

More Roles  Technical Remediation – Executive Director: Technology Systems Division  Customer Web Site – Public Relations  Were the files copied? Who did what? Are any other servers in danger? – Forensics Firm  Assist Forensics Firm: IT Security Coordinator

Work Involved  Engaged and worked with Forensics Firm, every day  Worked with law enforcement  Interviews with Washington Post, local papers and national.coms  Student newspaper (twice)  Hundreds of phone calls, hundreds of s

Work Involved  Implemented new ID card software  Reissued ID cards for resident students  Vendor reps, some well connected, persisted in efforts to sell security stuff and identity theft protection services

Work Involved  Did a line by line comparison of 36,000 records in ID Card database with corresponding records in student system  Surveyed every department to see if they stored private admin data on a server, then worked with company to assess security of every one of these servers

Work Involved  Responded to legislative interest, including a bill to turn over all security incident handling to VITA  Wrote and rewrote updates to web site  Campus police investigated every reported problem

Lessons Learned  SSNs are not, by themselves, of interest to criminals looking for a scalable return  A percentage of people panic on the issue; more effort needs to be expended to control panic  SAs do not know what is on their servers  Eliminating SSN as identifier is not sufficient to protect SSNs

Lessons Learned  You can not say to the public “it wasn’t my server.”  Keep hour by hour records of your response  Need to train all SAs in preserving evidence and containing damage

Future  Hardware, software & policy changes that will enable: log, log, log  Much more ITU involvement in protecting other people’s servers (e.g. MS 2-day)  Accelerate intrusion detection implementation

Future  Accelerate VPN  Accelerate authentication project  Develop curriculum, templates, etc. to aid SAs in preserving evidence & containing damage  Implement perimeter firewall

Future  Insist all data files be removed from web servers  Insist all shared drives with sensitive data be specially protected  Build security into employee performance plans

Future  Ensure CIO has same great relationship with new VP of U.R.