Protecting Sensitive Information and Keeping Your Identity Your Own Cyberethics, Cybersafety, and Cybersecurity Conference October 7, 2005 Amy Ginther,

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Keeping Your Identity Your Own Amy Ginther, Project NEThics Coordinator OIT Town Meeting August 24, 2005.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
[your name, organization] Protecting Your IdentityProtecting Your Identity: What to Know, What to Do.
MONEY MANAGEMENT II Billing Errors/Disputes & Identity Theft.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity theft: Real or Virtual? By: Alex Metzler.
Protecting Your Information Assets
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
FINANCIAL MANAGEMENT 29 AUG 05 OC CARUSO. OVERVIEW BUDGETS CREDIT CARDS IDENTITY THEFT IMPORTANT FINANCIAL TOPICS FOR NEW COLLEGE STUDENTS.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Information Security Sharon Welna Information Security Officer.
By: Asfa Khan and Huda Mukhtar
Jeff loses his identity! Lesson 8: Identity Theft.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Personal data protection in research projects
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Any criminal action perpetrated primarily through the use of a computer.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Identity Theft The fastest growing type of fraud..
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Jeff loses his identity! Lesson 5: Identity Theft.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Protecting Your Identity:
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protecting Your Identity:
Jeff loses his identity!
Red Flags Rule An Introduction County College of Morris
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Protecting Sensitive Information and Keeping Your Identity Your Own Cyberethics, Cybersafety, and Cybersecurity Conference October 7, 2005 Amy Ginther, Project NEThics Coordinator Office of Information Technology

Types of Data Compromise Data loss Data theft Identity theft

CIFAC Project Computer Incident Factor Analysis and Categorization Project Examined perceptions of the importance of 80 variables in causing computer-related incidents involving systems, data, or people Lack of sufficient training and education identified as most frequent cause of incidents. Analysis of best practice recommendations for incident prevention, mitigation and management yielded conclusion: “Having policies in place, enforcing policies, and providing user awareness training was considered the most important factor in preventing the incidents from happening.” Rezmierski, Rothschild, Kazanis, Rivas (2005).

Personal Identification Initiative Policy on the Collection, Use and Protection of ID numbers Limit use of social security numbers Promote the use of alternate identifiers: U ID (number) and Directory ID (alpha-numeric ID) Increase protection of ssn For more information, see and llection_Use_Protection_of_ID_Numbers.pdf llection_Use_Protection_of_ID_Numbers.pdf

State Privacy Law Privacy policy: If you are asked to provide personal information on an official university web site, university policy provides that you should be notified of the following: The purpose for which the personal information is collected; Any specific consequences for refusing to provide the information; Your right to inspect, amend, or correct personal records, if any; Whether the personal information is generally available for public inspection; and Whether the personal information is made available or transferred to or shared with any entity.

Potential ID Theft at Universities “Universities have accounted for 28% of the 50 securities breaches of personal information recorded by California since 2003… …that’s more than any other group…” - San Francisco Chronicle March 29 th 2005 And this is just California!

Shadow Databases “A thief recently walked into a Berkeley office and swiped a laptop containing personal information about nearly 100,000 alumni…” - San Francisco Chronicle March 29 th 2005

Universities with ID Theft Incidents UC, Berkeley Carnegie Mellon University UTexas, Austin George Mason University and several more…

What can be done? Stop using shadow databases Limit who has/has access to sensitive data Encryption Ensure the computer it’s stored on is protected (both physically and electronically)

Shadow Databases Shadow databases are copies of a master database (ex: a copy of the Alumni database made for a professor for research purposes)

Shadow Databases Shadow databases on laptops and desktops are often unprotected. This leaves them vulnerable to theft, viruses, worms, bots, hackers, etc.

Limiting Access to Sensitive Data Why does someone need a copy of a database? Why does there need to be a full SSN? Use the last 5-6 numbers Once the data is no longer needed – delete it!

Encryption Encryption is a way to convert a document into an unreadable format by way of an algorithm You need a key (a password or passphrase) to convert the encrypted version back to the original document If an encrypted DB is stolen and the thief doesn’t have the key they can’t read it

Protecting computers Physical security: laptop/desktop cables and locks (like a bicycle lock), STOP Tag Up-to-date anti-virus software ( Up-to-date on patches (Windows Update) Personal firewall (XP Service Pack 2 or ZoneAlarm)

Better Password Practices Use strong passwords! (ex: ‘tIaHrdPa$s2Crk’, not ‘password’) Store passwords safely. Do not store your passwords on your computer, keep a list of them next to your computer, or put them in your top drawer where a snooping visitor can find them. Use different passwords for different accounts. Change passwords with some regularity.

UMD’s push to minimize SSN use Creation of the UID – a unique number not tied to SSNs; needed for variety of purposes Move to U ID from SSN: Policy approval by President Inventory where SSN is used to plan conversion Print U ID NOT SSN on ID cards Remove SSN from display on information system screens and on printed reports Remove SSN option from login screens Continue education of all Password self-service

UMD’s push to minimize SSN use OIT is currently auditing every department on campus to minimize the number of computers that have sensitive data on them, and to lock down those computers that MUST have sensitive data

UMD’s push to minimize SSN use We will lock down these computers by: Encrypt the database containing sensitive info Up-to-date on patches Personal firewall Use of strong passwords Services that aren’t needed are turned off

The Range of Dangers Fee fraud hoax ShareYourExperiences.com and Word-of-Mouth.org Work from home scam Phishing Pharming Evil Twins

Legit? PayPal notice “…and we have reasons to belive that your account was hijacked by a third party” “If you choose to ignore our request, you leave us no choise but to temporaly suspend your account.” PayPal logo on legitimate Web site ( always appears with trademarkhttp://

How to Identify Scam Messages Fraudulent messages only offer one means of communication with the company. Look for awkward writing, grammatical and spelling errors in messages—they abound! Fraudulent messages begin with a general greeting; you are not identified by name Dangerous messages may contain attachments that load software to enable thieves to record your keystrokes

Additional Tips to Avoid Victimization Don’t react to the urgent or obligatory nature of the message Don’t click on links to reach a company…they can take you to an illegitimate site. Instead, type the URL into a browser window to go to a secure (https) site. Your legitimate service provider should be requiring you to authenticate using an established user ID and password to login Checking legitimacy of Web host

Steps to Take if You Become a Victim 1. Contact your creditors and banks immediately. 2. Begin keeping records 3. Flag your credit file for fraud. For more information, go to 4. Review your credit reports 5. Report the crime 6. Address public record errors

What Compromised Agency Should Do Communicate with you Explain the nature of compromise and the likelihood of data theft Advise you of steps to take (fraud alert) Provide Web site for more information and other resources Tell you how to expect that you will be contacted with additional information Do not release personal information in response to contacts which you have not initiated Tell you the steps that have been taken to mitigate the situation, protect information

Other Self-Protection Strategies Next time you have checks printed, have only your initials and last name printed on them Do not sign the back of your credit cards; instead, write “Photo ID Required” Do not put the full account number on the “for” line of your checks when paying bills, just use the last four numbers Do put your work phone on your checks instead of home phone Do photocopy the contents of your wallet

Contact information Amy Ginther, Project NEThics Coordinator, x52619 Gerry Sneeringer, IT Security Director, Project NEThics, Thanks to: Kevin Shivers, Lead Security Analyst (former), for input to this session.