Compu4ng Privacy Requirements

Size: px
Start display at page:

Download "Compu4ng Privacy Requirements"

Transcription

1 Security Requirements Security in Compu4ng, Chapters 1 & Topics What are the key requirements to implement a secure system? Privacy Anonymity Authen4ca4on & Authorisa4on Integrity Audit 2

2 Privacy A state of being free from being observed or disturbed by others A core requirement of a secure system is to protect privacy Privacy issues predate computers and are mo4vated by fundamental human rights People and socie4es differ on what they consider what data should be private With computers and modern media, once privacy is transgressed, it can be difficult to reverse unless you are able to act fast Prior to computers, publicly available data was rarely accessed due to the difficul4es in searching it You can now use Google to achieve what could have been a life4mes work... Access to informa4on about you needs to be carefully considered since it is virtually impossible to remove it once it is released Cross referencing different data sources allows you to build a detailed picture of an individual 3 Privacy & Society There is much debate as to the level of privacy one should be allowed in society, for example compare privacy laws of U.S. versus E.U. E.U. - data about you is private to you and the selling of this data is restricted U.S. - data a business collects about you belongs to the company and may be freely sold on The most obvious effect is direct marke4ng approaches. Less obvious un4l recently is the ques4on of what is acceptable behaviour of government security agencies. The level of privacy afforded to an individual in a society owen defines how liberal the society is Many repressive regimes collect data on their popula4ons with a view to controlling them in some way, either by force or thought (the media...) 4

3 Privacy - The Data Protec4on Act The Data Protec4on Act is designed to protect your privacy and enforce how organisa4ons handle informa4on rela4ng to you. There are eight data protec4on principles: Data should be fairly and lawfully obtained It should be held only for a specific and lawful purpose The data should be relevant to the task and not excessive for those purposes It should be accurate and up- to- date It should not be kept for longer than necessary It should be processed in accordance with the rights of the person to whom the data refers It should be kept securely to ensure it is not misused It should not be transferred out of the European Economic Area unless the des4na4on has an adequate level of data protec4on. See BCS hap:// 5 Privacy Do you think data concerning your browsing habits are important? Do you mind businesses data mining your web ac4vi4es? Phorm is a system embedded at ISP level and intercepts data packets, watching users browsing behaviour and injec4ng adverts (or other data) into the hap stream Capable of changing content sent by a site and replacing it with own data At present this is aimed at targeted adver4sing but where will this go? Google openly admits collec4ng and analysing your data with a view to selling you on to adver4sers and other interested par4es. As we have seen, analysis of meta- data about a users ac4vi4es and the groups they interact with can be very informa4ve 6

4 Anonymity - to be nameless Anonymity protects privacy since although you may know facts about a person, it is harder to cause harm if you do not know who they are. Phorm s defense is that users are anonymous Anonymity has many benefits Removes bias secret ballots, double blind trials/reviews Whistleblowers can reveal details with less fear of reprisal (although it is owen easy to work out who they must be based on what they have revealed) Removes barriers to interac4on with untrusted par4es encouraging people to get involved/inves4gate/ contribute if they are not traceable This can be both good and bad - e.g. discussion forums, wikis What about payment and delivery if you are anonymous convenient but easy to defraud or exploit 7 Pseudonymity The most common form of avoiding problems of anonymous iden4ty is a pseudonym An en4ty people recognise as being associated with you, that is not actually you People/organisa4ons can regularly interact with your pseudonym without you giving away informa4on that 4es your pseudonym to your actual iden4ty or loca4on (mostly...) Allows an individual to change their pseudo iden44es with rela4ve ease Not so easy if you have used your real name... 8

5 Issues with Anonymity Commercial Anonymity Swiss Bank Accounts What I buy is up to me... What if it is explosives? Medical Anonymity My medical condi4ons are my business? What if someone finds out you need treatment Posi4ves & Nega4ves Posi4ve Whistleblowers Discussions Nega4ve Aaacker can hide iden4ty Discussions... 9 Authen4ca4on & Authorisa4on Who are you and what are you allowed access to? Authen4ca4on is the process of iden4fying an individual as being genuine and not an impostor Systems frequently aaempt authen4ca4on by checking something a user: Knows Has Is Password, PIN, Date of birth??? Card, key, uniform, badge Face, fingerprint, iris scan A system is more secure if it combines two or more of these factors for authen4ca4on 10

6 Authorisa4on Authorisa4on is concerned with what a user is allowed to do If we accept that they are who they say they are, now we must restrict what they can do OWen this is to protect the systems they are working on Some4mes it is to protect them from themselves User access levels on Windows... Typical levels on a computer User Create files in their own space, view local documents, cannot install sowware Manager Edit documents in project workspaces Administrator Install sowware, configure printers, manage accounts Military systems can have many informa4on access levels Public, restricted, secret, top secret etc. Problems can occur when a User needs access to part of data only a Manager can see Clever users can piece together segments of authorised accessible data to infer data they cannot directly see by crea4ng crawed queries where only one individual is returned 11 Integrity Integrity is concerned with ensuring that informa4on is genuine Has the data or the system maintaining it been tampered with (e.g. a website) Data which has maintained integrity is not necessarily an accurate reflec4on of the real world, it just reflects what was recorded Undermining the integrity of informa4on can have drama4c effects Aaempts can be made to lure you to a fake site phishing What if you cannot tell the difference between real and fake? Would you use either? Uncertainty or loss of confidence in the value of something is damaging Stock prices, criminal records, vehicle details, credit scores... 12

7 Integrity 13 Integrity Web based media is very powerful, rapidly reaching an audience of millions The poten4al damage caused by manipula4ng the truth (e.g. a video clip) is high Once achieved, it is very hard to undo this deceit Accountability acts as an insurance policy for data integrity It involves keeping a log of relevant events, who carried them out and when By keeping a careful audit trail, it should be possible to observe any change to data and iden4fy the person responsible for the change Data can be rolled back to original values Person can be ques4oned and the trail followed further Audi4ng and version control occurs in large sowware development projects CVS, Subversion 14

8 Audit & Forensics Audit is the ability to conduct a methodical and thorough review of a system Audi4ng processes rely on logging and recording ac4ons of the system and users For example, login/out, remote connec4ons, service start/stop... Audit may prevent an aaack if it dissuades an aaacker due to the audit trail they leave behind Skilled hackers are able to cover up their tracks by edi4ng audit logs This removes evidence of their intrusion How do you remove the audit trail of you edi4ng the audit trail? Without proper audit processes in place, it is very difficult to trace an aaack and work out what damage may have been done and by whom Forensics iden4fying what happened, how, when and why relies on good audi4ng processes It is hard to solve a puzzle when you don t have all the pieces 15 Summary We have looked at the core requirements for a secure system : Privacy Relevant anonymity Authen4ca4on Authorisa4on Integrity Audit This module will look at examples of subver4ng these requirements and relevant methods for mee4ng them 16

The Billion Dollar Product Online Privacy. Rui Miguel Feio Security Lead RSM Partners

The Billion Dollar Product Online Privacy. Rui Miguel Feio Security Lead RSM Partners The Billion Dollar Product Online Privacy Rui Miguel Feio Security Lead RSM Partners Agenda Introduc.on Free online services Nothing in life is for free Paid online web services How do they do it? Risks

More information

Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik

Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik Privacy- Preserving P2P Data Sharing with OneSwarm Presented by Adnan Malik Privacy The protec?on of informa?on from unauthorized disclosure Centraliza?on and privacy threat Websites Facebook TwiFer Peer

More information

Balancing Usability and Security for Medical Devices

Balancing Usability and Security for Medical Devices Balancing Usability and Security for Medical Devices Ken Hoyme Adven&um Labs ken.hoyme@adven8umlabs.com Robert North, LLC bnorth@humancenteredstrategies.com March 17, 2014 3/17/2014 2014 Adven8um Labs

More information

Honeycomb Crea/ve Works is financed by the European Union s European Regional Development Fund through the INTERREG IVA Cross- border Programme

Honeycomb Crea/ve Works is financed by the European Union s European Regional Development Fund through the INTERREG IVA Cross- border Programme Honeycomb Crea/ve Works is financed by the European Union s European Regional Development Fund through the INTERREG IVA Cross- border Programme managed by the Special EU Programmes Body. Web Analy*cs In

More information

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones Network Security Security in Compu5ng, Chapter 7 Topics l Network AAacks l Reconnaissance l AAacks l Spoofing l Web Site Vulnerabili5es l Denial of Service l Network Defences l Firewalls l Demilitarised

More information

This presenta,on covers the essen,al informa,on about IT services and facili,es which all new students will need to get started.

This presenta,on covers the essen,al informa,on about IT services and facili,es which all new students will need to get started. This presenta,on covers the essen,al informa,on about IT services and facili,es which all new students will need to get started. 1 Most of the informa,on is covered in more depth on the Informa,on Services

More information

How To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook

How To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook How To Perform a SaaS Applica7on Inventory in 5Simple Steps A Guide for Informa7on Security Professionals WHY SHOULD I READ THIS? This book will help you, the person in the organiza=on who cares deeply

More information

Bring your own device (BYOD) Bring your own technology(byot. ..but move forward to Flipped Classrooms

Bring your own device (BYOD) Bring your own technology(byot. ..but move forward to Flipped Classrooms Sharing experience and exper.se www.mirandanet.ac.uk A project about teachers as learners and their learning Bring your own device (BYOD) Bring your own technology(byot..but move forward to Flipped Classrooms

More information

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define

More information

Opportuni)es and Challenges of Textual Big Data for the Humani)es

Opportuni)es and Challenges of Textual Big Data for the Humani)es Opportuni)es and Challenges of Textual Big Data for the Humani)es Dr. Adam Wyner, Department of Compu)ng Prof. Barbara Fennell, Department of Linguis)cs THiNK Network Knowledge Exchange in the Humani)es

More information

Email Spam and the Ethics of An3spam measures

Email Spam and the Ethics of An3spam measures Email Spam and the Ethics of An3spam measures Behrooz Sangchoolie Chalmers PhD Course in Ethics and Philosophy of Compu3ng 2015 What is an Email Spam? Emails that are sent to someone without that person

More information

Google: Trust, Choice, and Privacy

Google: Trust, Choice, and Privacy Google: Trust, Choice, and Privacy Gus Meuli, Caitlin Finn Trust is hard to earn, easy to loose, and nearly impossible to win back. 1 This statement seems to ring true in the constantly changing world

More information

Protec'ng Informa'on Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protec/ng Informa/on Assets Greg Senko

Protec'ng Informa'on Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protec/ng Informa/on Assets Greg Senko Protec'ng Informa'on Assets - Week 10 - Identity Management and Access Control In the News Readings MIS5206 Week 10 Identity Management and Access Control Test Taking Tip Quiz In the News Discuss items

More information

Data protection. Protecting your personal information online

Data protection. Protecting your personal information online Data protection Protecting your personal information online 3 Introduction More and more people are conducting their personal affairs online. Online shopping, social networking, job hunting and the ability

More information

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management

More information

Member Municipality Security Awareness Training. End- User Informa/on Security Awareness Training

Member Municipality Security Awareness Training. End- User Informa/on Security Awareness Training End- User Informa/on Security Awareness Training 1 Why Awareness Training? NCLM sanc:oned mul:ple Security Risk Assessments for a broad spectrum of member municipali:es The assessments iden:fied areas

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

WHITE PAPER. Let s do BI (Biometric Identification)

WHITE PAPER. Let s do BI (Biometric Identification) WHITE PAPER Let s do BI (Biometric Identification) Fingerprint authentication makes life easier by doing away with PINs, passwords and hint questions and answers. Since each fingerprint is unique to an

More information

The Case for a Processor Serial Number Control Unit

The Case for a Processor Serial Number Control Unit Introduction Cyber-Rights & Cyber-Liberties (UK) Report on the Intel 1 Pentium 1 III Processor Serial Number Feature Recently Intel have announced that the new Pentium III processor, due for release in

More information

Nodes, Ties and Influence

Nodes, Ties and Influence Nodes, Ties and Influence Chapter 2 Chapter 2, Community Detec:on and Mining in Social Media. Lei Tang and Huan Liu, Morgan & Claypool, September, 2010. 1 IMPORTANCE OF NODES 2 Importance of Nodes Not

More information

Rogue Programs. Rogue Programs - Topics. Security in Compu4ng - Chapter 3. l Rogue programs can be classified by the way they propagate

Rogue Programs. Rogue Programs - Topics. Security in Compu4ng - Chapter 3. l Rogue programs can be classified by the way they propagate Rogue Programs Security in Compu4ng - Chapter 3 Rogue Programs - Topics l Rogue programs can be classified by the way they propagate l Virus l Trojan l Worm l Or how they are ac4vated l Time Bomb l Logic

More information

Successful Change Management

Successful Change Management Successful Change Management Key Principles and Insights for Super Funds Ma; Hardy, Right Lane Consul@ng Types of change Barriers and pidalls Today s session Change experiences in our own industry Principles

More information

UAB Cyber Security Ini1a1ve

UAB Cyber Security Ini1a1ve UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment

More information

Social Media! Marketing!

Social Media! Marketing! Social Media! Marketing! First things first [Marke2ng] is more about giving, than taking. You have to create communica2ons that actually enhance the meaning in someone s life that give them insights into

More information

Splunk and Big Data for Insider Threats

Splunk and Big Data for Insider Threats Copyright 2014 Splunk Inc. Splunk and Big Data for Insider Threats Mark Seward Sr. Director, Public Sector Company Company (NASDAQ: SPLK)! Founded 2004, first sohware release in 2006! HQ: San Francisco

More information

HIPAA Compliance and Electronic Protected Health Informa6on: Ignorance is not bliss!

HIPAA Compliance and Electronic Protected Health Informa6on: Ignorance is not bliss! Maxxum, Inc. HIPAA Compliance and Electronic Protected Health Informa6on: Ignorance is not bliss! Medical Device ephi Risk Iden6fica6on and Mi6ga6on Webinar Overview Relevance why this topic? Risk a perspective

More information

Data Protecon and E-Safety Policy

Data Protecon and E-Safety Policy Data Protecon and E-Safety Policy From Staff Policies Contents 1 Relevant legislaon 2Purpose 3 Principles 4Detail 5 Roles and Responsibilies 6 Monitoring and Evaluaon 7 Related Documents and Locaons 8

More information

NCDS Leadership Summit " The Friday Center" Chapel Hill, North Carolina" April 23 & 24, 2013!

NCDS Leadership Summit  The Friday Center Chapel Hill, North Carolina April 23 & 24, 2013! NCDS Leadership Summit " The Friday Center" Chapel Hill, North Carolina" April 23 & 24, 2013! Data Collection Scale of Problem Challenges v Research versus clinical contexts v Science versus medicine v

More information

Main Research Gaps in Cyber Security

Main Research Gaps in Cyber Security Comprehensive Approach to cyber roadmap coordina5on and development Main Research Gaps in Cyber Security María Pilar Torres Bruna everis Aerospace and Defence Index CAMINO WP2: Iden8fica8on and Analysis

More information

MAKING A COMPLAINT. Problem with a Health or Mental Health care provider?

MAKING A COMPLAINT. Problem with a Health or Mental Health care provider? MAKING A COMPLAINT Problem with a Health or Mental Health care provider? (e.g. Hospital, Nurse, Psychiatrist, Chiropractor, Physio, Den'st, Doctor, Psychologist, etc) HOW THE HEALTH CONSUMERS COUNCIL CAN

More information

Opinion and recommendations on challenges raised by biometric developments

Opinion and recommendations on challenges raised by biometric developments Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future

More information

Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty

Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty Offensive & Defensive & Forensic Techniques for Determining Web User Iden

More information

Trus%ng your Cloud Provider s System

Trus%ng your Cloud Provider s System Trus%ng your Cloud Provider s System Retaining Control over Private Virtual Machines Hosted by a Cloud Provider Using Mandatory Access Control, Trusted Boot and A>esta?on Vorarlberg University of Applied

More information

Alternative authentication what does it really provide?

Alternative authentication what does it really provide? Alternative authentication what does it really provide? Steve Pannifer Consult Hyperion Tweed House 12 The Mount Guildford GU2 4HN UK steve.pannifer@chyp.com Abstract In recent years many new technologies

More information

HIPAA Basics. Health Insurance Portability and Accountability Act of 1996

HIPAA Basics. Health Insurance Portability and Accountability Act of 1996 HIPAA Basics Health Insurance Portability and Accountability Act of 1996 HIPAA: What Is HIPAA? Protects the privacy of healthcare informa@on for all Americans, including the individuals you support Protects

More information

Online Gambling - Advantages And Disadvantages

Online Gambling - Advantages And Disadvantages MOVING YOUR BUSINESS ONLINE TO MAXIMIZE ROI By Shelby Landeck Manager of Client Relations, Income Access PRESENTATION OVERVIEW Why going online is important And what your business can achieve online Defining

More information

India s Integrated Taxpayer Data Management System (ITDMS) - A data mining tool for non-intrusive anti-tax evasion work

India s Integrated Taxpayer Data Management System (ITDMS) - A data mining tool for non-intrusive anti-tax evasion work India s Integrated Taxpayer Data Management System (ITDMS) - A data mining tool for non-intrusive anti-tax evasion work Winner of Prime Minister Award For Excellence In Public Administration April 2010

More information

Background Checks and the Fair Credit Reporting Act. Cole Cummins, ARM-P APEI

Background Checks and the Fair Credit Reporting Act. Cole Cummins, ARM-P APEI Background Checks and the Fair Credit Reporting Act Cole Cummins, ARM-P APEI Today s Topics n Why do background checks n FCRA n EEOC n Best Prac:ces Why Do Background Checks n To keep the workplace safe

More information

Mobile Weblink Security

Mobile Weblink Security Name Maryam Al- Naemi Date 11/01/2013 Subject ITGS higher level Title How safe is the informa@on we store on our smartphones? Area of impact Home & Leisure Social & Ethical Issue Security Ar:cle Smartphone

More information

Audit/Logging Repudiation. Security Testing: Testing for What It s NOT supposed to do

Audit/Logging Repudiation. Security Testing: Testing for What It s NOT supposed to do Audit/Logging Repudiation Laurie Williams williams@csc.ncsu.edu Security Testing: Testing for What It s NOT supposed to do Thompson, Herbert, *, IEEE Security and Privacy, July/Aug 2003, pp. 83-86. 1 Audit

More information

Mul: channel communica:on increases your chances of reaching and mo:va:ng more of your audience.

Mul: channel communica:on increases your chances of reaching and mo:va:ng more of your audience. Direct Mail Heavy compe--on for share of mailbox. Direct Mail Spending $19.2 Billion $19.1 Billion (projected) 2009 2010 Source: July 19, 2010, Directmag.com $19.6 Billion (projected) 2011 Mobile Mobile

More information

Mobility in the Modern Factory. Discussion of Mobile Adop7on for the Factories of the Future

Mobility in the Modern Factory. Discussion of Mobile Adop7on for the Factories of the Future Mobility in the Modern Factory Discussion of Mobile Adop7on for the Factories of the Future Talking Points History Lesson The Reasons for Going Mobile Mobile Infrastructure Mobile Device Security BYOD

More information

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some

More information

Encrypted Email Opening and Replying to a Secure Message

Encrypted Email Opening and Replying to a Secure Message First Time User Registration Opening a Secure Encrypted Email Where to go for Help Frequently Asked Questions Information Technology Encrypted Email Opening and Replying to a Secure Message First Time

More information

October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services

October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services October 2014 Issue No: 2.0 Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services

More information

Keeping out of harm s way in cyberspace

Keeping out of harm s way in cyberspace Keeping out of harm s way in cyberspace Martin Smith MBE FSyI Chairman and Founder The Security Company (International) Limited The Security Awareness Special Interest Group What is Cybercrime? Criminal

More information

How to write an effec-ve DIGITAL MARKETING STRATEGY. Secrets from the professionals

How to write an effec-ve DIGITAL MARKETING STRATEGY. Secrets from the professionals How to write an effec-ve DIGITAL MARKETING STRATEGY Secrets from the professionals Wri-ng an effec-ve digital media strategy comes down to three things: content, connec-ons and consistency. When building

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An

More information

HIPAA Breaches, Security Risk Analysis, and Audits

HIPAA Breaches, Security Risk Analysis, and Audits HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC What cons?tutes PHI? HIPAA provides a list of 18 iden?fiers that cons?tute PHI. Any one of these iden?fiers

More information

Build a HIPAA- Compliant Prac5ce. Wes Strickling, Founder & CEO

Build a HIPAA- Compliant Prac5ce. Wes Strickling, Founder & CEO Build a HIPAA- Compliant Prac5ce Wes Strickling, Founder & CEO Agenda What is HIPAA Compliance? What does it mean to your prac5ce? What should you do? Q & A What Is HIPAA Compliance? Health Insurance Portability

More information

LOCKING DOWN LOG FILES: ENHANCING NETWORK SECURITY BY PROTECTING LOG FILES

LOCKING DOWN LOG FILES: ENHANCING NETWORK SECURITY BY PROTECTING LOG FILES LOCKING DOWN LOG FILES: ENHANCING NETWORK SECURITY BY PROTECTING LOG FILES Bernie Lantz, Utah State University, bernie.lantz@usu.edu Rob Hall, Utah State University, rob.hall@usu.edu Jason Couraud, Utah

More information

Computer Security Incident Handling Detec6on and Analysis

Computer Security Incident Handling Detec6on and Analysis Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION

More information

WHY ANALYSE? BOB APOLLO

WHY ANALYSE? BOB APOLLO WHY ANALYSE? BOB APOLLO Analy-cs are the key that enables the VP of sales, sales opera-ons and front- end sales organiza-ons to move from a culture based only on gut feeling and percep-on- based decision

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

Internet basics 2.3 Protecting your computer

Internet basics 2.3 Protecting your computer Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from

More information

Quick guide to the employment practices code

Quick guide to the employment practices code Data protection Quick guide to the employment practices code Ideal for the small business Contents 3 Contents Section 1 About this guidance 4 Section 2 What is the Data Protection Act? 5 Section 3 Recruitment

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

Tim Blevins Execu;ve Director Labor and Revenue Solu;ons. FTA Technology Conference August 4th, 2015

Tim Blevins Execu;ve Director Labor and Revenue Solu;ons. FTA Technology Conference August 4th, 2015 Tim Blevins Execu;ve Director Labor and Revenue Solu;ons FTA Technology Conference August 4th, 2015 Governance and Organiza;onal Strategy PaIerns of Fraud and Abuse in Government What tools can we use

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy

More information

Hands On- Google Grants Google Adwords for Non- Pro5its

Hands On- Google Grants Google Adwords for Non- Pro5its Hands On- Google Grants Google Adwords for Non- Pro5its Search Adver5sing Approach and Strategy Katherine Cleland ClelandMarke5ng 1 Why Google Adwords? Online Search has replaced Yellow Pages 80% of online

More information

The Smart Guide to Be0er Banner Ads By Aaron Kupferberg Crea;ve Director Didit

The Smart Guide to Be0er Banner Ads By Aaron Kupferberg Crea;ve Director Didit The Smart Guide to Be0er Banner Ads By Aaron Kupferberg Crea;ve Director Didit Introduc&on Design banner ads that get clicks Banner ads are the most prolific form of marke&ng on the web. Since the earliest

More information

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of

More information

10 Essential reasons to upgrade your CRM Now

10 Essential reasons to upgrade your CRM Now 10 Essential reasons to upgrade your CRM Now There are a myriad of reasons why it might be 3me for you to consider upgrading your exis3ng Customer Rela3onship Management (CRM) system. We have compiled

More information

Data Obesity: Ethics, Law or Regulation?

Data Obesity: Ethics, Law or Regulation? Data Obesity: Ethics, Law or Regulation? Mireille Hildebrandt Chair of Smart Environments, Data Protec:on and the Rule of Law, RU Nijmegen Professor of Technology Law and Law in Technology, Vrije Universiteit

More information

Belmont 16 Foot Sailing Club. Privacy Policy

Belmont 16 Foot Sailing Club. Privacy Policy Belmont 16 Foot Sailing Club Privacy Policy APRIL 2014 1 P age Belmont 16 Foot Sailing Club Ltd (the 16s ) respects your right to privacy and is committed to protecting your personal information. This

More information

Security and Internet Censorship

Security and Internet Censorship Security and Internet Censorship Computer Literacy 1 Lecture 24 13/11/2008 Topics Security Hacker Viruses Phishing Firewall Censorship of the Internet 2 Examples Hacking or Cracking Cracking = Subverting

More information

Best Prac*ces in NPS Follow- Up 6 Must- Do Ac*on Items for Improving Customer Success

Best Prac*ces in NPS Follow- Up 6 Must- Do Ac*on Items for Improving Customer Success Best Prac*ces in NPS Follow- Up 6 Must- Do Ac*on Items for Improving Customer Success Intro Table of Contents (click the links below to jump to each topic) 6 Ac*on Items 1. Prove your value to Extreme

More information

Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com Outline of Information Security Introduction Impact of information Need

More information

DNS Traffic Monitoring. Dave Piscitello VP Security and ICT Coordina;on, ICANN

DNS Traffic Monitoring. Dave Piscitello VP Security and ICT Coordina;on, ICANN DNS Traffic Monitoring Dave Piscitello VP Security and ICT Coordina;on, ICANN Domain Names ICANN coordinates the administra2on of global iden2fier systems Domain names provide user friendly identification

More information

HOW TO CREATE APPS FOR TRAINING. A step- by- step guide to crea2ng a great training app for your company

HOW TO CREATE APPS FOR TRAINING. A step- by- step guide to crea2ng a great training app for your company HOW TO CREATE APPS FOR TRAINING A step- by- step guide to crea2ng a great training app for your company From compliance and health & safety to employee induction and self-assessment, there are endless

More information

STRONGER ONLINE SECURITY

STRONGER ONLINE SECURITY STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial

More information

9/19/11. Connec&ng genera&ons Should kids take the lead? What do these ini?a?ves have in common?

9/19/11. Connec&ng genera&ons Should kids take the lead? What do these ini?a?ves have in common? Connec&ng genera&ons Should kids take the lead? Yiannis Laouris Cyprus Safer Internet Center Cyprus Neuroscience & Technology Institute www.cyberethics.info An An amazing book about how the whole universe

More information

Identity Access Management: Beyond Convenience

Identity Access Management: Beyond Convenience Identity Access Management: Beyond Convenience June 1st, 2014 Identity and Access Management (IAM) is the official description of the space in which OneLogin operates in but most people who are looking

More information

What is a Connected TV. User Experience in Connected TV A usability and eye tracking research 5/3/12

What is a Connected TV. User Experience in Connected TV A usability and eye tracking research 5/3/12 User Experience in Connected TV A usability and eye tracking research Mari- Carmen Marcos. Communica>on Department. Universitat Pompeu Fabra. Verónica Mansilla. Student at Master in Digital Contents Management

More information

Net-ID 2006 Berlin PROTECTING IDENTITY IN THE DIGITAL ERA. Robin Wilton

Net-ID 2006 Berlin PROTECTING IDENTITY IN THE DIGITAL ERA. Robin Wilton Net-ID 2006 Berlin PROTECTING IDENTITY IN THE DIGITAL ERA Robin Wilton Corporate Architect (Federated Identity) Sun Microsystems robin.wilton@sun.com +44 705 005 2931 http://blogs.sun.com/racingsnake Aim

More information

My CEO wants an ipad now what? Mobile Security for the Enterprise

My CEO wants an ipad now what? Mobile Security for the Enterprise My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager

More information

Agenda. FY16 State Budget Advocacy 3/9/15. Housing Ac0on Illinois 2015 Advocacy Agenda Webinar March 9, 2015 3:00 p.m. to 4:00 p.m.

Agenda. FY16 State Budget Advocacy 3/9/15. Housing Ac0on Illinois 2015 Advocacy Agenda Webinar March 9, 2015 3:00 p.m. to 4:00 p.m. Housing Ac0on Illinois 2015 Agenda Webinar March 9, 2015 3:00 p.m. to 4:00 p.m. Agenda State Issues 1. Fiscal Year 16 State Budget. 2. Senate Bill 1281: State legisla0on to create reverse mortgage protec0ons

More information

SAFEGUARDING YOUR HOMEOWNERS ASSOCIATION AND COMMON AREAS

SAFEGUARDING YOUR HOMEOWNERS ASSOCIATION AND COMMON AREAS SAFEGUARDING YOUR HOMEOWNERS ASSOCIATION AND COMMON AREAS March 2011 www.cybersecurityguy.com 1 2 SAFEGUARDING YOUR HOMEOWNER'S ASSOCIATION AND COMMON AREAS Many Homeowner Associations provide security

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

Mitigating Cybercrime and Online Social Networks Threats in Nigeria

Mitigating Cybercrime and Online Social Networks Threats in Nigeria , 22-24 October, 2014, San Francisco, USA Mitigating Cybercrime and Online Social Networks Threats in Nigeria Adu Michael K, Alese Boniface K and Adewale Olumide S. Abstract: Many internet and Online Social

More information

Chair: Stephen Darvill (Logica) Raporteur: Edward Phelps (EURIM) SUMMARY OF ROUND TABLE STATEMENTS AND DISCUSSION

Chair: Stephen Darvill (Logica) Raporteur: Edward Phelps (EURIM) SUMMARY OF ROUND TABLE STATEMENTS AND DISCUSSION 1 Summary Report of the Directors Round Table on Information Governance, 1600-1800, 24 th November 2008, The Boothroyd Room, Portcullis House, Westminster Chair: Stephen Darvill (Logica) Raporteur: Edward

More information

Guide to iconnect. Enabling interac(on and collabora(on in real (me!

Guide to iconnect. Enabling interac(on and collabora(on in real (me! Guide to iconnect Enabling interac(on and collabora(on in real (me! STEP 1: Join our community Join our community of educa2on professionals on www.interfacespace.com And create a profile! Tell others about

More information

Jeff Warson, GCIH, SCPS, CISSP, CCSK Sr. Principal Security Strategist Symantec Corpora5on

Jeff Warson, GCIH, SCPS, CISSP, CCSK Sr. Principal Security Strategist Symantec Corpora5on Jeff Warson, GCIH, SCPS, CISSP, CCSK Sr. Principal Security Strategist Symantec Corpora5on Agenda 1 2 3 4 5 Sources of a Breach Key IT Security Trends How is DLP Implemented Symantec's Strategy and Recent

More information

How to protect your identity. Identity fraud explained

How to protect your identity. Identity fraud explained How to protect your identity Identity fraud explained What is identity fraud? Identity theft is when someone gets hold of your personal information without your permission. This can include your name,

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis

More information

ENISA s ten security awareness good practices July 09

ENISA s ten security awareness good practices July 09 July 09 2 About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for the European

More information

Investigation Techniques

Investigation Techniques Investigation Techniques Sources of Information 2016 Association of Certified Fraud Examiners, Inc. Internal vs. External Internal sources may be all that s available (accounting and business tax records,

More information

UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY

UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY UNILEVER PRIVACY PRINCIPLES Unilever takes privacy seriously. The following five principles underpin our approach to respecting your privacy: 1. We value the trust that you place in us by giving us your

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

Chapter 8: Security Measures Test your knowledge

Chapter 8: Security Measures Test your knowledge Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such

More information

CS 5150 So(ware Engineering Legal Aspects of So(ware Development

CS 5150 So(ware Engineering Legal Aspects of So(ware Development Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering Legal Aspects of So(ware Development William Y. Arms Legal Environment So(ware is developed in a complex legal and economic

More information

THE ROLE OF IDS & ADS IN NETWORK SECURITY

THE ROLE OF IDS & ADS IN NETWORK SECURITY THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker

More information

School Technology 101 for Parents. Tips for Monitoring Your Child s Digital Life

School Technology 101 for Parents. Tips for Monitoring Your Child s Digital Life School Technology 101 for Parents Tips for Monitoring Your Child s Digital Life ipad Helpful Tips Look at your child s ipad daily 70% of students surveyed last year said parents looked at their ipads rarely

More information

+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains

+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains Information Security Advisor December 2015 Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains +GAMES Spot the insider & Human firewall Filtering EXerCISE Good

More information

Holiday Safe Shopping

Holiday Safe Shopping Holiday Safe Shopping Or How to keep the Grinch away this Holiday Season What is Identify Theft Scams and Technology How to Protect yourself How to Protect your customers What is Identity Theft Identity

More information

PATRIOT BANK CUSTOMERS. Corporate Account Takeover & Information Security Awareness

PATRIOT BANK CUSTOMERS. Corporate Account Takeover & Information Security Awareness PATRIOT BANK CUSTOMERS Corporate Account Takeover & Information Security Awareness What will be covered! What is Corporate Account Takeover?! How does it work?! Sta9s9cs! Current Trend Examples! What can

More information

HI THIS IS URGENT PLZ FIX ASAP: Cri5cal Vulnerabili5es and Bug Bounty Programs

HI THIS IS URGENT PLZ FIX ASAP: Cri5cal Vulnerabili5es and Bug Bounty Programs HI THIS IS URGENT PLZ FIX ASAP: Cri5cal Vulnerabili5es and Bug Bounty Programs Kymberlee Price Senior Director of Researcher Opera5ons Bugcrowd @Kym_Possible whoami? Senior Director of a Red Team PSIRT

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information