Information Security: Current Threats Marc Scarborough Information Security Officer

Slides:



Advertisements
Similar presentations
UNIT 20 The ex-hacker.
Advertisements

K-State IT Security Training Ken Stafford CIO and Vice Provost for IT Services Harvard Townsend Chief Information Security Officer
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Crime and Security in the Networked Economy Part 4.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Prepared by: Nahed Al-Salah
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
1 Telstra in Confidence Managing Security for our Mobile Technology.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Web server security Dr Jim Briggs WEBP security1.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
DIYTP What is Cybercrime?  Using the Internet to commit a crime.  Identity Theft  Hacking  Viruses  Facilitation of traditional criminal activity.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Protecting Customer Websites and Web Applications Web Application Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
PART THREE E-commerce in Action Norton University E-commerce in Action.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Security Aspects of Web Site Design Office of Enterprise Security (What we look for in web applications and Why)
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
CS 111 – Oct. 11 Internet topics –Network applications and technology for business –Security Commitment: –Quiz Wednesday. –Homework #1 due Oct. 18: Discuss.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Hurdles in implementation of cyber security in India.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Network Security. Announcements Review Assignment - Assessment 3 (due Tuesday, before class) Assessment 3 – Next Thursday Reminders: Network Design Project.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Staff addresses Availability tradeoffs December 13, 2012.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Challenges We Face On the Internet
Threats to computers Andrew Cormack UKERNA.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Chapter 11 crime and security in the networked economy
Lesson 2- Protecting Yourself Online
Little work is accurate
Introduction to Cybercrime and Security
Security in mobile technologies
Presentation transcript:

Information Security: Current Threats Marc Scarborough Information Security Officer

Changing Nature of Attacks Before: Prank/Defacement – Word Macro viruses that inject words into documents when printed – Web site defacements Recently: Resource “Theft” – Coordinated DDOS (Distributed Denial of Service) Attacks by remote controlling hacked computers – Hacking systems for their disk space and network speed, creating distributed repositories of stolen content 2

Changing Nature of Attacks Now: Targeted Attacks - Political and Financial Gain – Credit Card / Personal Information / ID Theft – Worldwide crime organizations coordinating specific attacks for specific purposes – Government Entities defining ‘Cyberwar’ 3

Recent Headlines 4

IRS: Phishing - Number One Scam 5 IRS currently defines phishing (an information gathering scam through or phone) as their primary threat. Higher Education, including Rice University, has also seen a sharp increase in the number and complexity of phishing attacks on campus. The attacks are looking for Rice NetID’s and passwords which are used to log into our Webmail servers to send other types of scams to Internet users around the world. The scams sent from hacked Rice NetID’s include Nigerian 419 scams and Death Threat s. Information Technology has worked diligently to slow these messages and inform the community as they arrive IRS currently defines phishing (an information gathering scam through or phone) as their primary threat. Higher Education, including Rice University, has also seen a sharp increase in the number and complexity of phishing attacks on campus. The attacks are looking for Rice NetID’s and passwords which are used to log into our Webmail servers to send other types of scams to Internet users around the world. The scams sent from hacked Rice NetID’s include Nigerian 419 scams and Death Threat s. Information Technology has worked diligently to slow these messages and inform the community as they arrive

Hannaford Credit Card Breach 6 Hannaford reported a significant credit card breach As many as 4.2 million credit card numbers were exposed. At least 1,800 were subject to fraud (so far). The breach began December 7, 2007 and was not contained until March 10, Rice University is and has been taking steps to secure our credit card transactions. More information on these steps is coming. Hannaford reported a significant credit card breach As many as 4.2 million credit card numbers were exposed. At least 1,800 were subject to fraud (so far). The breach began December 7, 2007 and was not contained until March 10, Rice University is and has been taking steps to secure our credit card transactions. More information on these steps is coming.

Ohio University: The Response 7 Highlights from the (Ohio) blueprint include: Implementing a perimeter firewall that will filter Internet traffic to protect computers outside of the central cluster from hacker attacks. Classifying data by the level of security required. Rice is also working towards similar goals Enhanced firewall protection for our Students and Staff Enhanced auditing of critical systems and services Highlights from the (Ohio) blueprint include: Implementing a perimeter firewall that will filter Internet traffic to protect computers outside of the central cluster from hacker attacks. Classifying data by the level of security required. Rice is also working towards similar goals Enhanced firewall protection for our Students and Staff Enhanced auditing of critical systems and services

More Information Yes! We are available for IT security presentations to departments and other Rice community groups. Marc Scarborough IT Security Officer