Social Engineering: Hunt for the digital crown jewels using a door handle

Size: px
Start display at page:

Download "Social Engineering: Hunt for the digital crown jewels using a door handle"

Transcription

1 Social Engineering: Hunt for the digital crown jewels using a door handle TJ Dimkov Deloitte Netherlands 31 st of January 2012

2 A new member Defending my PhD thesis at University of Twente in February. Methodologies for physical penetration testing using social engineering. The methodologies try to achieve Reliable, Repeatable, Reportable, Respectful and Realistic penetration tests. As part of the research, executed more than 30 penetration tests in University of Twente and Technical University of Eindhoven. Reliable Requirements Repeatable Reportable Respectful for all actors Realistic 2 PvIB Evenement

3 Agenda Information security revisited Case Lessons learned Questions and Answers 3

4 Hacking and information security revisited 4

5 In a bold, systematic hit on a landmark Ventura Boulevard office building, burglars stole scores of computers from at least 60 of the 80 businesses there, taking machines containing sensitive legal documents, credit card numbers and the tax information of thousands of people, police said Saturday. Several business owners said they were taken aback by the brazenness of the theft, which deprived them of their computers but left behind other valuable equipment, including monitors, faxes, copiers and printers. Several concluded that the thieves' target must have been the information contained on their hard drives, not property Police Lt. Jay Roberts said investigators are looking at people familiar with the building and its security system. Late Saturday, police were still determining the extent of the crime. The thieves did not ransack or damage the building. No one was injured. "They systematically got into the offices," Abrams said. "It looks like they had a superkey. "It had to be somebody who knows that building," said Mary Hatcher, who runs several companies at the site. "It wasn't forced entry..

6

7 Information is stolen by a combination of physical access and social engineering Physical Security Unauthorized access Safety Digital Security Confidentiality Integrity Availability Security Awareness Social Engineering Security Policies Computer Security Information Security Physical Mechanism Safe Fence Door Digital Mechanisms Encryption Signature Firewall Awareness Simulation Seminar

8 Information is stolen by a combination of physical access and social engineering How can we perform a complete (physical-digital-social) vulnerability assessment of an organization? Without disturbing the work flow process. Without hurting/stressing anyone. In a quantitative, reportable way. With minimum tests. PvIB Evenement

9 Case 9

10 Methodology Info gathering Reconaissance Vulnerability detection Exploitation Penetration testing approach Information gathering Gather publicly available information from the Internet. Google maps, Social networks, company website, outsourcing parties, forums Reconnaissance Scout the facility and learn the security procedures that are in place. Talk to people around the facility. Identification of vulnerable systems Search for potential vulnerabilities in physical controls, people and procedures Exploitation Manual verification of vulnerabilities found Find a path to the internal network! 10

11 Methodology What are the steps? Setup Execution Closure Behave normally 1 Behave normally 1 Behave normally 1 Initialize Sign documents Scout Coordinator approval Security approval Execute Contain Collect equipment Debrief Select contact people 5 Select custodians 6 Distribute information 7 Collect logs 13 Report 15 Time ROLES: SECURITY OFFICERS, GUARDS, EMPLOYEES, CONTACT PEOPLE, CUSTODIANS, TESTERS

12 Physical penetration testing Pilot study in University of Twente

13 Physical penetration testing 30 tests in University of Twente and TU/e

14 Lessons learned 14

15 Surveillance cameras Surveillance cameras are not used as alarming mechanisms (1) the cameras are not mounted in offices, - privacy issues and cost effectiveness (2) the thief can easily conceal the laptop (3) thieves usually know the position of the cameras and obscure their face, (4) each of the bags might conceal a stolen laptop. if the persons are not caught on the spot and challenged by the security guards, the evidence from the surveillance camera can not be used against them. The surveillance system provides no help in stopping the theft and has limited usage in identifying the thief a posteriori.

16 Access Control We spotted three weaknesses of the access control in the universities. Locks are usually bypassed because (1) they are disabled during working hours (2) the doors and windows where the locks reside are easy to force. (3) the credentials are easy to steal or social engineer and because there are many people entering and leaving the area where the theft occurs, it is hard to deduce which person is the thief. Access control mechanisms deployed in the open institutions are mainly used to deter opportunistic thieves, but provide no help against a determined thief.

17 Security awareness of the employees The thefts occurred because an employee (1) left the laptop unattended in a public location (1) did not lock the door when leaving the office (2) opened door from offices of their colleagues, (3) shared credentials or handed in laptops without any identification. Even with strong access control in place, if the security awareness of the employees is low, the access control can easily be circumvented. The main reason behind the failure of 67% of all failed penetration tests. In these cases, an employee (1) informed the security guards for suspicious activities, (2) rejected to open a door for the tester, (3) rejected to unlock a laptop without permission from the custodian (4) interrupted the tester during the theft Employees are usually considered as the weakest link in the security of an organization. We observe that employees can also be the strongest link in the security of open organization. PvIB Evenement

18 Questions and answers 18

19 Contact TJ Dimkov Risk Services Laan van Kronenburg AS Amstelveen The Netherlands Senior Consultant Mobile: tdimkov@deloitte.nl Risk Services Laan van Kronenburg AS Amstelveen Marko van Zwam The Netherlands Partner Security & Privacy Mobile: mvanzwam@deloitte.nl 19 PvIB Evenement

20 Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Deloitte provides audit, tax, consulting, and financial advisory services to public and private clients spanning multiple industries. With a globally connected network of member firms in more than 150 countries, Deloitte brings world-class capabilities and deep local expertise to help clients succeed wherever they operate. Deloitte's approximately 170,000 professionals are committed to becoming the standard of excellence. This publication contains general information only, and none of Deloitte Touche Tohmatsu Limited, its member firms, or their related entities (collectively, the Deloitte Network ) is, by means of this publication, rendering professional advice or services. Before making any decision or taking any action that may affect your finances or your business, you should consult a qualified professional adviser. No entity in the Deloitte Network shall be responsible for any loss whatsoever sustained by any person who relies on this publication. 20

Free Article PHYSICAL PENTESTING A WHOLE NEW STORY IN PENETRATION TESTING 2/2011. by Trajce Dimkov & Wolter Pieters

Free Article PHYSICAL PENTESTING A WHOLE NEW STORY IN PENETRATION TESTING 2/2011. by Trajce Dimkov & Wolter Pieters Free Article 2/2011 PHYSICAL PENTESTING A WHOLE NEW STORY IN PENETRATION TESTING by Trajce Dimkov & Wolter Pieters FREE ARTICLE Physical Penetration Testing A Whole New Story In Penetration Testing Physical

More information

Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations 1

Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations 1 Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations Trajce Dimkov, Wolter Pieters, Pieter Hartel Distributed and Embedded Security Group University of Twente,

More information

Hands on, field experiences with BYOD. BYOD Seminar

Hands on, field experiences with BYOD. BYOD Seminar Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl

More information

Two methodologies for physical penetration testing using social engineering

Two methodologies for physical penetration testing using social engineering Two methodologies for physical penetration testing using social engineering Trajce Dimkov, Wolter Pieters, Pieter Hartel Distributed and Embedded Security Group University of Twente, The Netherlands {trajce.dimkov,

More information

Two methodologies for physical penetration testing using social engineering

Two methodologies for physical penetration testing using social engineering Two methodologies for physical penetration testing using social engineering Trajce Dimkov, Wolter Pieters, Pieter Hartel Distributed and Embedded Security Group University of Twente, The Netherlands {trajce.dimkov,

More information

Vision on Mobile Security and BYOD BYOD Seminar

Vision on Mobile Security and BYOD BYOD Seminar Vision on Mobile Security and BYOD BYOD Seminar Brussel, 25 september 2012 Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl +31 610 999 199 1

More information

May 2011. 1C Group ERP data bridge setup Typical approach

May 2011. 1C Group ERP data bridge setup Typical approach May 2011 1C Group ERP data bridge setup Typical approach Our approach In order to provide our clients with the effective solution for Group reporting generation we have developed a 1C-Group ERP data bridge

More information

How-To Guide: Cyber Security. Content Provided by

How-To Guide: Cyber Security. Content Provided by How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses

More information

SecurityMetrics Vision whitepaper

SecurityMetrics Vision whitepaper SecurityMetrics Vision whitepaper 1 SecurityMetrics Vision: Network Threat Sensor for Small Businesses Small Businesses at Risk for Data Theft Small businesses are the primary target for card data theft,

More information

Achieving Information Security

Achieving Information Security Achieving Information Security Beyond penetration testing and frameworks ISACA Athens Conference 25 November, 2014. All good information security presentations start with a Bruce Schneier quote - Not Bruce

More information

Credit management services Because a sale is a gift until it is paid

Credit management services Because a sale is a gift until it is paid Credit management services Because a sale is a gift until it is paid Introduction In times of crisis, working capital and cash are high on the agenda. They are key to ensuring your business runs smoothly

More information

Preventing Burglaries

Preventing Burglaries Preventing Burglaries By Captain Binder The United States is one of the wealthiest countries in the world, home to some very affluent communities. Not surprisingly, some of the wealthiest cities are located

More information

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and

More information

Computer Security at Columbia College. Barak Zahavy April 2010

Computer Security at Columbia College. Barak Zahavy April 2010 Computer Security at Columbia College Barak Zahavy April 2010 Outline 2 Computer Security: What and Why Identity Theft Costs Prevention Further considerations Approach Broad range of awareness Cover a

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com Outline of Information Security Introduction Impact of information Need

More information

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft? Protecting Yourself Against Identity Theft Identity theft is a serious crime. Identity theft happens when someone steals your personal information and uses it without your permission. It is a growing threat

More information

Central Asian Information Security Survey Results (2014) Insight into the information security maturity of organisations, with a

Central Asian Information Security Survey Results (2014) Insight into the information security maturity of organisations, with a Central Asian Information Security Survey Results (2014) Insight into the information security maturity of organisations, with a focus on cyber security Introduction and Executive summary From September

More information

Palm Beach County Sheriff s Office

Palm Beach County Sheriff s Office Palm Beach County Sheriff s Office Business Security Self Survey Since 1909, the deputies of Palm Beach County have provided a safe environment for hundreds of thousands of people who live, work and visit

More information

The Roles of Software Testing & QA in Security Testing

The Roles of Software Testing & QA in Security Testing The Roles of Software Testing & QA in Security Testing Hung Q. Nguyen LogiGear, President and CEO Bob Johnson Independent, Security Consultant ASQ-SSQA Presentation, May 14, 2002 Objective To jump start

More information

Security Defense Strategy Basics

Security Defense Strategy Basics Security Defense Strategy Basics Joseph E. Cannon, PhD Professor of Computer and Information Sciences Harrisburg University of Science and Technology Only two things in the water after dark. Gators and

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004 A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:

More information

I ve been breached! Now what?

I ve been breached! Now what? I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have

More information

Car Security Begins at Home

Car Security Begins at Home Please print out and complete this form to reduce the risk of car theft happening to you. In Australia, seven in 10 late model vehicles are stolen by the thief gaining access to the vehicles keys or transponder.

More information

Climbing the Big Data Ladder Leveraging your ERP to unlock your information assets

Climbing the Big Data Ladder Leveraging your ERP to unlock your information assets Climbing the Big Data Ladder Leveraging your ERP to unlock your information assets Melbourne, April 2012 Robert Hillard Robert Hillard is the Deloitte partner leading the Australian Technology Consulting

More information

Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com

Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Matt Malone Fall 2015 Spring 2016 IDENTITY THEFT Identity

More information

White Paper: Are there Payment Threats Lurking in Your Hospital?

White Paper: Are there Payment Threats Lurking in Your Hospital? White Paper: Are there Payment Threats Lurking in Your Hospital? With all the recent high profile stories about data breaches, payment security is a hot topic in healthcare today. There s been a steep

More information

IIABSC 2015 - Spring Conference

IIABSC 2015 - Spring Conference IIABSC 2015 - Spring Conference Cyber Security With enough time, anyone can be hacked. There is no solution that will completely protect you from hackers. March 11, 2015 Chris Joye, Security + 1 2 Cyber

More information

Deloitte Solutions Network (SNET) Disaster Recovery POC on Amazon EC2

Deloitte Solutions Network (SNET) Disaster Recovery POC on Amazon EC2 Deloitte Solutions Network (SNET Disaster Recovery POC on Amazon EC2 September 2010 Agenda Solutions Network Profile Oracle E-Business Suite R12 POC Amazon Public Cloud Custom Application POC Hybrid Cloud

More information

What is Penetration Testing?

What is Penetration Testing? White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing? Penetration testing is the process of identifying security gaps in your IT infrastructure by mimicking

More information

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One Information Security and Challenges

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One Information Security and Challenges Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One Information Security and Challenges Agenda Overview of Information Security Management Information

More information

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current

More information

The Human Component of Cyber Security

The Human Component of Cyber Security www.thalescyberassurance.com In this white paper Humans, their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions,

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

1. Understanding Big Data

1. Understanding Big Data Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte

More information

Commercial Burglary Prevention

Commercial Burglary Prevention Commercial Burglary Prevention Montgomery County Police 2 nd District Officer Dana Stroman Community Services Officer Officer Oliver Janney Community Services Officer 240-773-6700 Message from the commander

More information

How One Smart Phone Picture Can Take Down Your Company

How One Smart Phone Picture Can Take Down Your Company SESSION ID: HUM-R04 How One Smart Phone Picture Can Take Down Your Company Dr. Larry Ponemon Chairman and Founder Ponemon Institute @Ponemon Have You Ever Felt Wandering Eyes Over Your Shoulder? Username:

More information

IDENTITY PROTECTION MEMBER. Protect Your Identity. Security of Personal Information is Our Top Priority

IDENTITY PROTECTION MEMBER. Protect Your Identity. Security of Personal Information is Our Top Priority MEMBER IDENTITY PROTECTION Protect Your Identity Security of Personal Information is Our Top Priority Imagine this Unexpectedly, you get turned down for a loan, you get a call from a collection agency

More information

European ecommerce assessment Maturity of top 200 European e-retailers

European ecommerce assessment Maturity of top 200 European e-retailers European ecommerce assessment Maturity of top 200 European e-retailers R. van de Hoef Bussum, 8 maart 2012 Strategy Operations Assurance www.onlineinnovation.nl www.werkenbijdeloitte.nl Raoul van de Hoef

More information

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security.

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security. Applying the 80/20 approach for Operational Excellence How to combat new age threats, optimize investments and increase security Vinod Vasudevan Agenda Current Threat Landscape The 80/20 Approach Achieving

More information

INTRODUCTION TO PENETRATION TESTING

INTRODUCTION TO PENETRATION TESTING 82-02-67 DATA SECURITY MANAGEMENT INTRODUCTION TO PENETRATION TESTING Stephen Fried INSIDE What is Penetration Testing? Terminology; Why Test? Types of Penetration Testing; What Allows Penetration Testing

More information

Policy for Protecting Customer Data

Policy for Protecting Customer Data Policy for Protecting Customer Data Store Name Store Owner/Manager Protecting our customer and employee information is very important to our store image and on-going business. We believe all of our employees

More information

A Marketing & Sales Dashboard Implementation Lessons Learned & Results

A Marketing & Sales Dashboard Implementation Lessons Learned & Results A Marketing & Sales Dashboard Implementation Lessons Learned & Results Den Haag, 25-05-2011 A short introduction of Leaf and Deloitte AN INTRODUCTION 1 Leaf is one of Europe s most established confectionary

More information

SAFEGUARDING PRIVACY IN A MOBILE WORKPLACE

SAFEGUARDING PRIVACY IN A MOBILE WORKPLACE SAFEGUARDING PRIVACY IN A MOBILE WORKPLACE Checklist for taking personally identifiable information (PII) out of the workplace: q Does your organization s policy permit the removal of PII from the office?

More information

Third Party Security: Are your vendors compromising the security of your Agency?

Third Party Security: Are your vendors compromising the security of your Agency? Third Party Security: Are your vendors compromising the security of your Agency? Wendy Nather, Texas Education Agency Michael Wyatt, Deloitte & Touche LLP TASSCC Annual Conference 3 August 2010 Agenda

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

SECURITY CONSIDERATIONS FOR LAW FIRMS

SECURITY CONSIDERATIONS FOR LAW FIRMS SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,

More information

Physical Security Assessments. Tom Eston Spylogic.net

Physical Security Assessments. Tom Eston Spylogic.net Physical Security Assessments Tom Eston Spylogic.net Topics Convergence of Physical and Logical Assessment Methodologies Planning the Assessment Team Structure Reconnaissance Penetration Phase Walk Through

More information

Cyber intelligence exchange in business environment : a battle for trust and data

Cyber intelligence exchange in business environment : a battle for trust and data Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building

More information

Course Title: Penetration Testing: Network & Perimeter Testing

Course Title: Penetration Testing: Network & Perimeter Testing Course Title: Penetration Testing: Network & Perimeter Testing Page 1 of 7 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Crime Prevention: A Guide for Small Businesses

Crime Prevention: A Guide for Small Businesses Crime Prevention: A Guide for Small Businesses Text File Slide 1 Crime Prevention: A Guide for Small Businesses Welcome to SBA s online training program, Crime Prevention: A Guide for Small Businesses.

More information

Integrated Business Services (IBS) Next generation of high performance Shared Services. Deloitte Consulting GmbH February 2016

Integrated Business Services (IBS) Next generation of high performance Shared Services. Deloitte Consulting GmbH February 2016 Integrated Business (IBS) Next generation of high performance Shared Deloitte Consulting GmbH February 2016 Go ?? Business leaders are recognizing the benefits of leveraging Shared and outsourcing consistently

More information

Security Services Policy and Procedures

Security Services Policy and Procedures and Procedures January 2011 Contents Heading Page Policy Policy Statement: 3 Procedures Aims and objectives: 3 Responsibilities: 4 Introduction: 6 Security Service management remit: 6 Overall aims of the

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

CASE STUDY OF INDUSTRIAL ESPIONAGE THROUGH SOCIAL ENGINEERING

CASE STUDY OF INDUSTRIAL ESPIONAGE THROUGH SOCIAL ENGINEERING CASE STUDY OF INDUSTRIAL ESPIONAGE THROUGH SOCIAL ENGINEERING Ira S. Winkler National Computer Security Association 10 South Courthouse Avenue Carlisle, Pennsylvania 17013 winkler@ncsa.com (717) 258-1816

More information

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

ITEC441- IS Security. Chapter 15 Performing a Penetration Test 1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and

More information

Penetration Testing Services. Demonstrate Real-World Risk

Penetration Testing Services. Demonstrate Real-World Risk Penetration Testing Services Demonstrate Real-World Risk Penetration Testing Services The best way to know how intruders will actually approach your network is to simulate a real-world attack under controlled

More information

EMEA TMC client conference Using global tax management systems to improve visibility and enhance control. The Crystal, London 9-10 June 2015

EMEA TMC client conference Using global tax management systems to improve visibility and enhance control. The Crystal, London 9-10 June 2015 EMEA TMC client conference Using global tax management systems to improve visibility and enhance control The Crystal, London 9-10 June 2015 1 Agenda Managing global compliance and reporting Why are people

More information

IASB proposes amendments to IFRS 2 related to the classification and measurement of share-based payment. transactions. Published on: December 1, 2014

IASB proposes amendments to IFRS 2 related to the classification and measurement of share-based payment. transactions. Published on: December 1, 2014 Published on: December 1, 2014 IASB proposes amendments to IFRS 2 related to the classification and measurement of share-based payment 1 IASB proposes amendments to IFRS 2 related to the classification

More information

Recent Developments in PCI DSS. PCI in the Headlines Risks to Higher Education PCI DSS Version 1.2

Recent Developments in PCI DSS. PCI in the Headlines Risks to Higher Education PCI DSS Version 1.2 Recent Developments in PCI DSS PCI in the Headlines Risks to Higher Education PCI DSS Version 1.2 1 2009 Breach Investigation Who did it? 74% external parties 20% insiders 32% implicated business partners

More information

Physical Security Policy

Physical Security Policy Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security

More information

The enemies ashore Vulnerabilities & hackers: A relationship that works

The enemies ashore Vulnerabilities & hackers: A relationship that works The enemies ashore Vulnerabilities & hackers: A relationship that works Alexandros Charvalias, Manager CISSP, CISA, ACDA Assurance & Enterprise Risk Services Cyber security maturity model How effectively

More information

Best Practices Top 10: Keep your e-marketing safe from threats

Best Practices Top 10: Keep your e-marketing safe from threats Best Practices Top 10: Keep your e-marketing safe from threats Months of work on a marketing campaign can go down the drain in a matter of minutes thanks to an unforeseen vulnerability on your campaign

More information

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints

More information

Penetration Testing //Vulnerability Assessment //Remedy

Penetration Testing //Vulnerability Assessment //Remedy A Division Penetration Testing //Vulnerability Assessment //Remedy In Penetration Testing, part of a security assessment practice attempts to simulate the techniques adopted by an attacker in compromising

More information

Australian business and immigration solutions Planning is your best protection

Australian business and immigration solutions Planning is your best protection Australian business and immigration solutions Planning is your best protection Australia welcomes investors with capital and business skills who want to migrate to Australia to establish a business, or

More information

Data and Information Security Policy

Data and Information Security Policy St. Giles School Inspire and achieve through creativity School Policy for: Date: February 2014 Data and Information Security Policy Legislation: Policy lead(s) The Data Protection Act 1998 (with consideration

More information

WHITE PAPER: INFORMATION-CENTRIC SECURITY

WHITE PAPER: INFORMATION-CENTRIC SECURITY WHITE PAPER: INFORMATION-CENTRIC SECURITY PROTECTING YOUR DATA FROM THE INSIDE- OUT Despite the growing number of high profile data breaches and the anxiety they re causing organizations, too much information

More information

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...

More information

Introduction to Penetration Testing Graham Weston

Introduction to Penetration Testing Graham Weston Introduction to Penetration Testing Graham Weston March 2014 Agenda Introduction and background Why do penetration testing? Aims and objectives Approaches Types of penetration test What can be penetration

More information

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network. Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part

More information

How To Protect Your Data From Theft

How To Protect Your Data From Theft Understanding the Effectiveness of a Data Protection Program IIA: Almost Free Seminar 21 June 2011 Agenda Data protection overview Case studies Ernst & Young s point of view Understanding the effectiveness

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

Take the right steps 9 principles for building the Risk Intelligent Enterprise

Take the right steps 9 principles for building the Risk Intelligent Enterprise Take the right steps 9 principles for building the Risk Intelligent Enterprise Contents 9 principles for building a Risk Intelligent Enterprise 2 The Risk Intelligent Framework 4 1. Is risk a threat or

More information

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING

RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING U.S. Department of Homeland Security Arlington, VA 22202 RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING Recurrent FSSA Training for Flight School Employees and independent Certified Flight

More information

ARE YOU READY FOR A DISASTER? THE ROAD TO PHYSICAL SECURITY

ARE YOU READY FOR A DISASTER? THE ROAD TO PHYSICAL SECURITY ARE YOU READY FOR A DISASTER? THE ROAD TO PHYSICAL SECURITY Dr. David A. Cook Stephen F. Austin State University cookda@sfasu.edu 1 Page 1 Critical Aspects of Security Physical Security Personnel Security

More information

Usher Mobile Identity for Higher Education Institutions. Rebecca Parks Associate Product Manager, MicroStrategy

Usher Mobile Identity for Higher Education Institutions. Rebecca Parks Associate Product Manager, MicroStrategy Usher Mobile Identity for Higher Education Institutions Rebecca Parks Associate Product Manager, MicroStrategy Agenda Overview of Mobile Identity Verify Personal ID Login to University Systems Unlock Doors

More information

Information Technology Security Review April 16, 2012

Information Technology Security Review April 16, 2012 Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing

More information

Sprint with Scrum and get the work done. Kiran Honavalli, Manager Deloitte Consulting LLP March 2011

Sprint with Scrum and get the work done. Kiran Honavalli, Manager Deloitte Consulting LLP March 2011 Sprint with Scrum and get the work done Kiran Honavalli, Manager Deloitte Consulting LLP March 2011 Contents About Deloitte Consulting 3 Executive summary 4 About Scrum 5 Scrum phases 8 Lessons learned

More information

APT Advanced Persistent Threat Time to rethink?

APT Advanced Persistent Threat Time to rethink? APT Advanced Persistent Threat Time to rethink? 23 November 2012 Gergely Tóth Senior Manager, Security & Privacy Agenda APT examples How to get inside? Remote control Once we are inside Conclusion 2 APT

More information

Identity Theft Prevention Committee Updates and Discussions: 3/15. Team,

Identity Theft Prevention Committee Updates and Discussions: 3/15. Team, Identity Theft Prevention Committee Updates and Discussions: 3/15 Team, We will be meeting on Monday, March 19 th to move forward with the Identity Theft Prevention Program. Please bring the packet that

More information

HR Business Partnering A Custom Approach

HR Business Partnering A Custom Approach HR Business Partnering A Custom Approach Human Resources is at a turning point CEO s expect the Human Resources function to play a much more active role in enabling business strategies. For a decade now,

More information

Deloitte Discovery Caribbean & Bermuda Territory Guide

Deloitte Discovery Caribbean & Bermuda Territory Guide Deloitte Discovery Caribbean & Bermuda Territory Guide Deloitte Discovery Overview The complexity and volume of data in today s corporate climate means businesses in the Caribbean & Bermuda Countries (

More information

The Top Web Application Attacks: Are you vulnerable?

The Top Web Application Attacks: Are you vulnerable? QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions jburroughs@uk.ibm.com Agenda Current State of Web Application Security Understanding

More information

ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose

ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE TYPE OF PROCEDURE: ADMINISTRATIVE EQUIPMENT PROCEDURE Title: Installation and Use of Video Surveillance Equipment Procedures Related

More information

Brand Ambassadors From pre-foundation to advanced recruitment process through Social Media

Brand Ambassadors From pre-foundation to advanced recruitment process through Social Media Brand Ambassadors From pre-foundation to advanced recruitment process through Social Media Jean-Marc Mickeler, Partner and Responsible for Employer Branding Deloitte France 28 th June 2012 Our People Promise:

More information

Rosemary M. Amato, CISA Deloitte Accountants B.V.

Rosemary M. Amato, CISA Deloitte Accountants B.V. Rosemary M. Amato, CISA Deloitte Accountants B.V. ABOUT THE PRESENTER Rosemary M. Amato ramato@deloitte.nl Director within the Netherlands member firm of Deloitte, based in Amsterdam Program Director for

More information

Acceptable Usage Guidelines. e-governance

Acceptable Usage Guidelines. e-governance Acceptable Usage Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

PCI (Payment Card Industry) Compliance For Healthcare Offices By Ron Barnett

PCI (Payment Card Industry) Compliance For Healthcare Offices By Ron Barnett PCI (Payment Card Industry) Compliance For Healthcare Offices By Ron Barnett Dr. Svenson thought he was doing both his patients and his practice a big favor when he started setting up monthly payment arrangements

More information

Identity Theft: Prevention & Survival

Identity Theft: Prevention & Survival Identity Theft: Prevention & Survival Crime of the Century Provide By: Nick Sabetta Don t t Let Someone Steal Your Good Name What is Identity Theft? When someone uses your personal information without

More information

Cyber Security for Businesses

Cyber Security for Businesses Cyber Security for Businesses Computer crimes involve the illegal use of or the unauthorized entry into a computer system to tamper, interfere, damage, or manipulate the system or information stored in

More information

Network/Cyber Security

Network/Cyber Security Network/Cyber Security SCAMPS Annual Meeting 2015 Joe Howland,VC3 Source: http://www.information-age.com/technology/security/123458891/how-7-year-old-girl-hacked-public-wi-fi-network-10-minutes Security

More information

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

SECURITY IN TRUCKING

SECURITY IN TRUCKING SECURITY IN TRUCKING A CHECKLIST FOR FLEET OPERATORS SECURITY IN TRUCKING A CHECKLIST FOR FLEET OPERATORS This checklist for fleet security has been compiled by the Private Motor Truck Council of Canada

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity

More information