(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,

Slides:



Advertisements
Similar presentations
An investigation into the security features of Oracle 10g R2 Enterprise Edition Supervisor: Mr J Ebden.
Advertisements

BalaBit Shell Control Box
Information Security Policies and Standards
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Analysis and Recommendations. PB’s&J Presenters & Topics David Bihm User Account Management Nathan Julson Data Classification Firewall Architectures.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Security: Principles and Practice
Why Comply with PCI Security Standards?
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Incident Response Updated 03/20/2015
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Information Security Technological Security Implementation and Privacy Protection.
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
General Awareness Training
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Sagar Joshi Senior Security Consultant | ACE Team, Microsoft Information Security
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Troubleshooting Windows Vista Security Chapter 4.
Module 14: Configuring Server Security Compliance
Privacy & Security Policy Meets Technology at the Crossroads: Best Practice Methods & Approaches to Developing Organizational Frameworks to Avoid Collision.
Lecture 7 Network & ISP security. Firewall Simple packet-filters Simple packet-filters evaluate packets based solely on IP headers. Source-IP spoofing.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Information Systems Security
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
Chapter 2 Securing Network Server and User Workstations.
Small Business Security Keith Slagle April 24, 2007.
Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
APolicy EASy Security Project Analysis and Recommendations for TJX Companies, Inc.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
Computer Security Sample security policy Dr Alexei Vernitski.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Information Systems Design and Development Security Precautions Computing Science.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
PCI-DSS Security Awareness
Critical Security Controls
Common Methods Used to Commit Computer Crimes
LAND RECORDS INFORMATION SYSTEMS DIVISION
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
County HIPAA Review All Rights Reserved 2002.
Information Security Awareness
How to Mitigate the Consequences What are the Countermeasures?
Intrusion Detection system
PLANNING A SECURE BASELINE INSTALLATION
Computer Security By: Muhammed Anwar.
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson, Benjamin Nikolay

 UWM discovered Malware Infection, May 25, 2011  Affected Server was Immediately Shutdown  Authorities were called in to investigate Image from this Site ("Information on Computer," 2011)

 UWM found Malware had access to SSNs, June 30, 2011  No evidence of Identity Theft was found  No suspects were found View TMJ News Video - ("Information on Computer," 2011)

 UWM notified effected individuals, August 10, 2011  They were asked to monitor their credit reports  UWM updated security on Servers Image from this Site ("Information on Computer," 2011)

Evaluate Analyze Synthesize

AnalyzeSynthesize  UWM Objective Failure  Security was updated in reaction to Breach  Risk Management Training  Re-evaluation of IS roles and responsibilities  Risk Assessment  Regular Business/IT Management Meetings  Cost = $8118 Image from this Site

AnalyzeSynthesize  UWM Objective Failed  Inferred malware access obtained via weak Admin password  Dictionary Attack  Use Radom Password Generator  Setup automated Password Expiration  Password History  ACL Access Limitation  Hardware and Port Lockdown  Cost = $minimal Image from this Site

AnalyzeSynthesize  UWM Objective Passed  UWM has a solid “Admin Access” policy  No Recommendations Needed Image from this Site

AnalyzeSynthesize  UWM Objective Passed  UWM requires use of “Strong” Passwords  Multiple characters types required  No Recommendations Needed Image from this Site

AnalyzeSynthesize  UWM Objective Passed  UWM requires use of “Strong” Passwords  Auditing of Passwords is performed randomly  No Recommendations Needed Image from this Site

AnalyzeSynthesize  UWM Objective Failed  Inferred - Server Admin. Account Compromised  Delay in recognition of illicit activity  Provide users history of prev. activity at login.  Implement Active Directory Audit Tool (AD Audit Plus)  Cost = $7680 annually Image from this Site

AnalyzeSynthesize  UWM Objective Failed  Insufficient audit trail to catch the intruders  Far too much elapsed time before those affected were notified  Verify existing configuration / make changes ( Windows Group Policy / Auditing tools )  Research and assess possible 3 rd party tools  Cost – Variable or minimal, depending on option selected

AnalyzeSynthesize  UWM Objective Passed  Sensitive data classifications do exist  Data was separated and housed on different systems  No Recommendations needed

AnalyzeSynthesize  UWM Objective Passed  Scalability as an enterprise level network  Thousands of user accounts and various types  No Recommendations needed

AnalyzeSynthesize  UWM Objective Failed  Security activity was insufficiently logged  Inability to track/catch the attacker  Checked and escaladed on a regular basis?  Refer to 5.7 recommendations  “Common Sense Security Auditing”  Cost – Variable, depending on route taken

AnalyzeSynthesize  UWM Objective Failed  Attackers were never caught  2 months had elapsed before notifying those affected  Continuously evaluate system/audit security on a regular basis  Evaluate/revise procedures and auditing as necessary  Cost – variable to minimal

AnalyzeSynthesize  UWM Objective Passed  UWM will setup times to perform audits on their network  No Recommendations Needed

AnalyzeSynthesize  UWM Objective Failed  Hacker gained access through open firewall ports  Purchase and install a new firewall  SonicWall NSA E7500  Features Next- Generation Firewall, & Intrusion Prevention.  Cost = $35,339 Image from this Site

AnalyzeSynthesize  UWM Objective Failed  UWM’s spyware failed to deny the outside attacker from gaining access.  Purchase security add- ons to the NSA E7500 firewall.  Included is anti-virus and spyware, and application intelligence on the firewall.  Cost = $14,514 for 3 years.

AnalyzeSynthesize  UWM Objective Irrelevant  There were no transactions or digital signatures needed in this type of security breach.  No Recommendations Needed

AnalyzeSynthesize  UWM Objective Passed  UWM has a excellent records and retention policy to explain how to transfer data.  No Recommendations Needed

AnalyzeSynthesize  UWM Objective Passed  Malware bypassed tamperproof security measures  Security design of infrastructure kept confidential  No Recommendations Needed

AnalyzeSynthesize  UWM Objective Failed  Cryptography Encryption Keys were not used  Unlikely attackers accessed data  Implement asymmetric database encryption  Use DSS encryption technology with private and public keys  Cost - $12,500

AnalyzeSynthesize  UWM Objective Failed  Failed to prevent the malware to install  Physical firewall and configuration remained private  Symantec Endpoint Protection 12.1  SEPM Training for IT department  Policy and Procedure creation and implementation  Cost - $40.89 per device per year $ for training

AnalyzeSynthesize  UWM Objective Passed  No data was transmitted to the WAN  Firewall did not play a role in this incident  No Recommendations Needed

AnalyzeSynthesize  UWM Objective Irrelevant  Integrity of physical mechanisms maintained  Unrelated to physical access or authentication of foreign devices.  No Recommendations Needed

 10 Cobit Objectives Failed  Action Plan’s suggested for all failed objectives  Please visit the Wiki for further details ("Information on Computer," 2011)

EASy as Pie!