Security for Online Games Austin GDC, September 2009 Tim Ray, CISSP.

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
HIPAA Security Standards What’s happening in your office?
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Why Comply with PCI Security Standards?
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
People Who Change the World Need the Tools to Do it! Holly Ross, Executive Director Security Matters It’s not about the network.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Chapter 13: Data Security & Disaster Recovery Database Management Systems.
SEC835 Database and Web application security Information Security Architecture.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Tech Made Simple: Boosting Your Business Using Technology.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Management Information Systems The Islamia University of Bahawalpur Delivered by: Tasawar Javed Lecture 17.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Chapter 8 Managing Operations. Key Points in Chapter 8 Outsourcing IS Functions Outsourcing IS Functions Security in the Internet Age Security in the.
Fraud and Risk in the Electronic Payment Space Michelle Marshall-Thompson VP, Fraud/Risk Officer FirstMerit Merchant Bankcard.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
CYBER SECURITY & ITS IMPACT ON FINANCIAL STATEMENTS AUDITS BOB WAGNER TUESDAY, NOVEMBER FLORIDA SCHOOL FINANCE OFFICERS ASSOCIATION CONFERENCE.
Risk Assessment and Risk Management James Taylor COSC 316 Spring 2008.
SY0-401 COMPTIA Security+ Certification Exam Vcepracticetest.com.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Security and the “H” word Glen Klinkhart, CEO Mike Messick, CTO.
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Risk management.
Building A Security Program From The Ground Up
Security Standard: “reasonable security”
Responding to Intrusions
Compliance with hardening standards
Recommending a Security Strategy
Introduction to Networking
Forensics Week 11.
Tool Server Workstation Router Universal
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
I have many checklists: how do I get started with cyber security?
Reporting personal data breaches to the ICO
Security Threats Severity Analysis
Ransomware and Data breaches in public libraries
DATABASE SECURITY For CSCL (BIM).
Detecting Insider Threats: Actions Speak Louder than Words
Security week 1 Introductions Class website Syllabus review
Hanqing Zhou|Yijiang Li|Jason M Mays|Karabo Ntokwane|Qianru Yang
Anatomy of a Common Cyber Attack
Presentation transcript:

Security for Online Games Austin GDC, September 2009 Tim Ray, CISSP

Bio Security Analyst for the Network/Security Operations Center (NSOC) Department of Information Resources, State of Texas IT full time since 1996 Origin Systems Wing Commander III, Strike Commander MCSE, CISSP, IAM/IEM, CNA

Security is Not: Changing the job description of your network admin. Keeping everything about security a secret. Having a card swipe on your server room door. Hoping the bad guys don’t know you exist. Fraud prevention. Keeping the backups in the trunk of your car. Coding standards (though those are a part of it)

Security Is: A policy with executive support Not free Done by professionals. As transparent as possible. Not in an appliance. Not sold by a vendor. The responsibility of everyone in the firm.

Security Benefits Peace of mind, especially for your investors Increased trust from customers and employees Professionalism Trust from customer base (example: Blizzard’s use of two factor authentication)

The Challenge The users are out to get you The staff is out to get you (though they don’t mean to) Everyone is technical Cost center

All is Not Lost! Everyone is technical Passionate workforce Flexible thinkers

Three Things for Today: Security Policy Development Risk Analysis Incident Response

FUD Fear, Uncertainty and Doubt This isn’t that… But there is a threat.

Verizon Data Breach Report 2009 Industry standard rity/reports/2009_databreach_rp.pdfhttp:// rity/reports/2009_databreach_rp.pdf They report on successful breaches Largest single data set on security breaches in the business world In 2008, 90 breaches, 285 million compromised records.

Threat Sources Most from external sources. Few were caused by insiders. Roughly a third implicated business partners. Many involved multiple parties. No such data exists for game companies. There is a need for greater transparency!

How does it happen? Most were aided by significant errors. Most resulted from hacking. Many utilized malware. Some involved privilege misuse. Very few occurred via physical attacks.

What can you do? Have a security policy Take a realistic look at your risks Prepare a response team

Security Policy Time for a policy! What goes in it? We’ll get to that… Who reads it? Everyone! Most important that everyone believe in it… And it starts at the top.

Security Policy Supports the corporate vision statement Practical Enforceable Concise as it can be (they tend to run long) Defines how the policy itself can change.

What’s in it? Accountability of roles: Management, users, key employees (admins) –Data classification (secret, confidential, Office Use Only) Network Service Policy –VPN, switches, routers, firewalls, partner/vendor connections System Policy –Servers, workstations, use of personal equipment Physical Security Acceptable Use Policy Incident Response Policy –Who can declare an “incident”? –Who’s on the CSIRT? Security Training and Awareness Policy Reference to software security document

Risk Analysis Risk is the product of threat impact and likelihood Your threats are different depending on your firm, IP and situation Thus, a risk analysis needs to be done Risk analysis is part of due diligence for investors, too! It demonstrates that your company is aware of the environment. It’s often wise to have a third party do an initial risk analysis.

Risk Analysis What are you protecting? –IP or technology –User goodwill/trust (hardest to quantify) –Data (Confidentiality, integrity, authenticity) –Cash transactions

Risk Analysis What are the main threats? –Players Their game is against you, the developer –Internal Does not have to be intentional! Leaks –Partners If you share data, or store it on another system, your security is only as good as theirs!

Risk Analysis Quantify the risk Assign numbers to the threat and likelihood Make a matrix Risk = likelihood x impact

Risk Matrix Low Impact (10)Medium Impact (50)High Impact (100) Unlikely (0.10)1510 Might happen (0.50) Very Likely (1.0)

Risk Analysis Every threat gets a score Put them in order Work the list from high to low Every item needs a compensating control /sp pdf

Compensating Controls Control is “security speak” for the answer to a threat. There are policy controls (acceptable use statement) Technical controls (password lockout, encryption) Physical controls (a door lock) Most controls address more than one threat.

Quantitative Risk Controls cost must be less than the potential cost of threats they answer. Cost limit of a given threat = risk score as a percentage x estimated loss. Thus, if you might lose $1,000,000 to a threat, and it’s medium impact/might happen (25%), you could justify $250,000 in control cost. No control is perfect!

Incident Response You got burned! AAAAIIIEEEEEE! Blamestorm! Who’s the lead? Who’s on the team? Who talks to the press? What is an “incident?”

CSIRT Computer Security Incident Response Team Incident Response Manager: Coordinates and directs Subject Matter Expert: Expert on the nature of the incident (floating position) Public Relations: This person is the ONLY one allowed to pass information to the press. Legal: Just do it. Scribe: Keeps track of the actions of the team. Now, what do they do?

Incident Response Process Prepare (establish team, etc.) Identify (what happened?) Contain (isolate and partition) Eradicate (fix the problem) Recover (back in business!) Follow up (documentation, talk it over, policy recommendations)

Thank you! Please contact me for security or IT questions!