PREPARED BY: SHOUA VANG ABHINAV JUWA CHASE PAUL EASy Security Project Anonymous vs HBGary Inc.

Slides:



Advertisements
Similar presentations
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
7 Effective Habits when using the Internet Philip O’Kane 1.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
 Controls that provide security against internal and external threats  2 Types of access controls: › Physical controls › Logical controls.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Security Analysis and Recommendations. PB’s&J Presenters & Topics David Bihm User Account Management Nathan Julson Data Classification Firewall Architectures.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Lecture 11 Reliability and Security in IT infrastructure.
Computer Security Fundamentals
Factors to be taken into account when designing ICT Security Policies
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
SiteLock Internet Security: Big Threats for Small Business.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Incident Response Updated 03/20/2015
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
APA of Isfahan University of Technology In the name of God.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Special Anatomy of an Attack Or Layered Security Failure.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
PART THREE E-commerce in Action Norton University E-commerce in Action.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Unethical use of Computers and Networks
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
IS Network and Telecommunications Risks Chapter Six.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Engineering Essential Characteristics Security Engineering Process Overview.
Training and Dissemination Enabling Grids for E-sciencE Jinny Chien, ASGC 1 Training and Dissemination Jinny Chien Academia Sinica Grid.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
PCI Training for PointOS Resellers PointOS Updated September 28, 2010.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Computer Security By Duncan Hall.
APolicy EASy Security Project Analysis and Recommendations for TJX Companies, Inc.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
The Security Circus MPICT Summer Conference, June, 2011.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Critical Security Controls
Server Concepts Dr. Charles W. Kann.
Forensics Week 11.
I have many checklists: how do I get started with cyber security?
Risk of the Internet At Home
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Message Digest Cryptographic checksum One-way function Relevance
Security week 1 Introductions Class website Syllabus review
Test 3 review FTP & Cybersecurity
Presentation transcript:

PREPARED BY: SHOUA VANG ABHINAV JUWA CHASE PAUL EASy Security Project Anonymous vs HBGary Inc.

The Security Incident Aaron Barr, CEO of HBGary Inc, stirred the Anonymous beehive by claiming to have information on members of Anonymous  Anonymous is a loose coalition of internet ‘hacktivist’, who are using hacking as a form of protest  They are regarded by some as a cyber terrorist group with no clear leadership Barr announced he will sell information to FBI and other organizations Anonymous retaliated by  Hacking and defacing HBGary’s website  Extracting and uploading over 40,000 s and documents to Pirate Bay  Deleted 1TB of HBGary backup data  Hacked Aaron Barr’s twitter, remotely wiped his IPAD, and release his personal information out to public  Releasing thousands of documents which harmed HBGary greatly. Anonymous gained access into HBGary’s internal server and website mainly by  SQL Injection  Social Engineering

Impact on HBGary Inc. Impact on Anonymous Aaron Barr stepped down from his post as CEO of HBGary Inc. Lost of business with companies who does not want to be associated with HBGary after the s were release Financial damages in the ‘millions’ Pulled out of RSA conference Negative reputation as a security company who got hacked Glorious publicity for Anonymous Impact of Security Incident

Analysis of the Security Incident using COBIT  5.1 Manage Security Measures  5.2 Identification, Authentication and Access  5.3 Security of Online Access to Data  5.4 User Account Management  5.5 Management Review of User Accounts  5.6 User Control of User Accounts  5.7 Security Surveillance  5.8 Data Classification  5.9 Central Identification and Access Rights Management  5.10 Violation and Security Activity Reports  5.11 Incident Handling  5.12 Reaccreditation  5.13 Counterparty Trust  5.14 Transaction Authorization  5.15 Nonrepudiation  5.16 Trusted Path  5.17 Protection of Security Functions  5.18 Cryptographic Key Management  5.19 Malicious Software Prevention, Detection and Correction  5.20 Firewall Architectures and Connections with Public Networks  5.21 Protection of Electronic Value Based on our use of COBIT we determined that HBGary failed 16 out of the 21 control objectives.

Recommended Changes in Control Process Problems in Control Process From the COBIT analysis we were able to narrow it down to five main processes that should be change or updated.  Reaccreditation  Since HBGary are using a custom ordered Content management system they should Routinely audit the system for security holes Off-the-shelf software could’ve prevented the whole thing Most commercial off-the-shelf software would’ve done the job to protect against SQL Injection Commercial CMS would not cost as much as custom ordered one and would already be  Prevention, Detection, and Correction  Create procedures to detect and correct vulnerable holes that exist in the system  Security Surveillance  HBGary should get a Security Information Management system in place to track and log activities that are going on.  We would recommend TriGeo’s Security Information Manager since we did not find any information on whether they have an activity logging system going on.

Recommended Changes in Control Process  Identification, Authentication and Access  Store password securely  Establish policy to force users to use more complex passwords  Establish policy to force users to not reuse same password all over the places  Establish policy to force users to change password every 90 days Password Reminder Pro from SysOp Tools  Train employees against Social Engineering  Provide training to employees against social engineering  Defcon-5 provides great training for 20 employees at a flat rate of $2000 for 1-2 days

References Anderson, N. (2011, March, 10). Anonymous vs. HBGary: the aftermath. retrieved April , from Ars Technica Web Site: vs-hbgary-the-aftermath.ars/2 Bright, P. (February, 25, 2011). Anonymous speaks: the inside story of the HBGary hack. In 1/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars/3. Nachreiner, C. (2011, February, 22). The HBGary vs. Anonymous Saga: What can we learn?. retrieved April , from WatchGuard Security Center Web Site: what-can-we-learn/ Thomas, K. (2011, March, 7). 8 Security Tips from the HBGary Hack. retrieved April , from PC World Web Site: ary_hack.html