Physical penetration testing using social engineering

Size: px
Start display at page:

Download "Physical penetration testing using social engineering"

Transcription

1 Physical penetration testing using social engineering Trajce Dimkov, Andre van Cleeff, Wolter Pieters, Pieter Hartel University of Twente, The Netherlands

2 In a bold, systematic hit on a landmark Ventura Boulevard office building, burglars stole scores of computers from at least 60 of the 80 businesses there, taking machines containing sensitive legal documents, credit card numbers and the tax information of thousands of people, police said Saturday. Several business owners said they were taken aback by the brazenness of the theft, which deprived them of their computers but left behind other valuable equipment, including monitors, faxes, copiers and printers. Several concluded that the thieves' target must have been the information contained on their hard drives, not property Police Lt. Jay Roberts said investigators are looking at people familiar with the building and its security system. Late Saturday, police were still determining the extent of the crime. The thieves did not ransack or damage the building. No one was injured. "They systematically got into the offices," Abrams said. "It looks like they had a superkey. "It had to be somebody who knows that building," said Mary Hatcher, who runs several companies at the site. "It wasn't forced entry.

3

4 Information is stolen by a combination of physical access and social engineering How can we perform a complete (physical digital social) vulnerabilityassessment assessment ofanorganization? organization? 1. Without disturbing the work flow process. 2. Withouthurting/stressing hurting/stressing anyone. 3. In a quantitative, reportable way. 4. With minimum tests.

5 The R* Requirements Realistic employees should act normally, as they would in everyday life. Respectful the test is done ethically, byrespectingtheemployeesandthe mutual trust between employees. Reliable eabe the epenetrationet test doesnotcause ot productivity ty lossofemployees. o e p oyees Repeatable the same test can be repeated several times and if the environmentdoesnotchange not change, the results should bethesame same. Reportable the outcome of the test should be in a form that permits a meaningful and actionable documentation offindings andrecommendations.

6 Environment Focused Methodology: Actors Security officer an employee responsible for thesecurity of the organization. The security officer orchestrates the penetration test. Custodian an employee in possessionofof theassets assets, setsupandmonitors the penetration test. Penetration tester an employee or a contractor trying to gain possession of the asset without being caught. Employee person in the organization who has none of the roles above.

7 Environment Focused Methodology Setup Execution Closure Initialize Setup environment Scout Custodian approval Security approval Monitor Report Debrief Sign documents Execute Time

8 Validation 3 penetration tests in University of Twente

9 Lessons learned and ethical implications Security officer Respect Deception Penetration tester Custodian Employee 1. The attack scenarios should ldbe flexible. 2. The methodology does not respect the trust relationship between the custodian and the employees. 3. During the penetration test, separating the custodian from the employees is hard. 4. Debriefing proved to be difficult.

10 Custodian Focused Methodology: Actors Security officer an employee responsible for the security of the organization. Coordinator an employee or contractor responsible for the experiment and the behavior of the penetration tester. The coordinator orchestrates the whole penetration test. Penetration tester an employee or contractor who attempts to gain possession of the asset without ih bi being caught. Contact person an employee who provides logistic support in the organization and a person to be contacted in case of an emergency. Custodian an employee at whose office the asset resides. The custodian should not be aware of the penetration test. Employee person in the organization who has none of the roles above. The employee should not be aware of the penetration test.

11 Custodian Focused Methodology Setup Execution Closure Initialize Sign documents Scout Coordinator approval Security approval Execute Contain Collect equipment Debrief Select contact people Select custodians Distribute information Collect logs Report Time

12 Validation 12 penetration tests in University of Twente and Technical University of Eindhoven.

13 Validation 12 penetration tests in University of Twente and Technical University of Eindhoven.

14 Validation 12 penetration tests in University of Twente and Technical University of Eindhoven.

15 Lessons learned and ethical implications Security officer Respect Deception Coordinator Penetration tester Contact person Custodian Employee 1. It should be specified in advance which information the penetration tester is allowed to use. 2. Panic situations need to be taken into consideration in the termination conditions 3. The penetration test cannot be repeated many times. 4, The tester should leave a note after stealing the laptop.

16 Comparison Requirment EF Methodology CF Methodology Reliable Repeatable Reportable Respectful: actors ++ + Respectful: trust relationships ++ Realistic + +++

17 Questions?

Social Engineering: Hunt for the digital crown jewels using a door handle

Social Engineering: Hunt for the digital crown jewels using a door handle Social Engineering: Hunt for the digital crown jewels using a door handle TJ Dimkov Deloitte Netherlands 31 st of January 2012 A new member Defending my PhD thesis at University of Twente in February.

More information

Free Article PHYSICAL PENTESTING A WHOLE NEW STORY IN PENETRATION TESTING 2/2011. by Trajce Dimkov & Wolter Pieters

Free Article PHYSICAL PENTESTING A WHOLE NEW STORY IN PENETRATION TESTING 2/2011. by Trajce Dimkov & Wolter Pieters Free Article 2/2011 PHYSICAL PENTESTING A WHOLE NEW STORY IN PENETRATION TESTING by Trajce Dimkov & Wolter Pieters FREE ARTICLE Physical Penetration Testing A Whole New Story In Penetration Testing Physical

More information

Two methodologies for physical penetration testing using social engineering

Two methodologies for physical penetration testing using social engineering Two methodologies for physical penetration testing using social engineering Trajce Dimkov, Wolter Pieters, Pieter Hartel Distributed and Embedded Security Group University of Twente, The Netherlands {trajce.dimkov,

More information

Two methodologies for physical penetration testing using social engineering

Two methodologies for physical penetration testing using social engineering Two methodologies for physical penetration testing using social engineering Trajce Dimkov, Wolter Pieters, Pieter Hartel Distributed and Embedded Security Group University of Twente, The Netherlands {trajce.dimkov,

More information

Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations 1

Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations 1 Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations Trajce Dimkov, Wolter Pieters, Pieter Hartel Distributed and Embedded Security Group University of Twente,

More information

Policy for Protecting Customer Data

Policy for Protecting Customer Data Policy for Protecting Customer Data Store Name Store Owner/Manager Protecting our customer and employee information is very important to our store image and on-going business. We believe all of our employees

More information

Preventing Identity Theft National City Bank. How to protect your identity

Preventing Identity Theft National City Bank. How to protect your identity Preventing Identity Theft National City Bank How to protect your identity Understanding and Preventing Identity Theft Identity Theft is the fastest growing crime in America 500,000 people fall victim to

More information

Cyber crime. lingua house. 1 Internet crime. Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + Match the following words to their correct definitions:

Cyber crime. lingua house. 1 Internet crime. Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + Match the following words to their correct definitions: A A GENERAL ENGLISH Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + 1 Internet crime Match the following words to their correct definitions: 1. hacker a. a computer program which can make copies of itself

More information

Physical Security Assessments. Tom Eston Spylogic.net

Physical Security Assessments. Tom Eston Spylogic.net Physical Security Assessments Tom Eston Spylogic.net Topics Convergence of Physical and Logical Assessment Methodologies Planning the Assessment Team Structure Reconnaissance Penetration Phase Walk Through

More information

Welcome. 1. Agenda. 2. Ground Rules. 3. Introductions. Keep It Safe 2

Welcome. 1. Agenda. 2. Ground Rules. 3. Introductions. Keep It Safe 2 Keep It Safe Welcome 1. Agenda 2. Ground Rules 3. Introductions Keep It Safe 2 Objectives Recognize how federal deposit insurance protects deposits Recognize how to guard against identity theft Recognize

More information

OPM3. Project Management Institute. OPM3 in Action: Pinellas County IT Turns Around Performance and Customer Confidence

OPM3. Project Management Institute. OPM3 in Action: Pinellas County IT Turns Around Performance and Customer Confidence Project Management Institute OPM3 case study : OPM3 in Action: Pinellas County IT Turns Around Performance and Customer Confidence OPM3 Organizational Project Management Maturity Model Project Management

More information

Preventing Burglaries

Preventing Burglaries Preventing Burglaries By Captain Binder The United States is one of the wealthiest countries in the world, home to some very affluent communities. Not surprisingly, some of the wealthiest cities are located

More information

COUNTERINTELLIGENCE VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA

COUNTERINTELLIGENCE VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA COUNTERINTELLIGENCE VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA 09/1 8/2009 version UNCLASSIFIED//FOR OFFICIAL USE ONLY Cl VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA DEFINING COUNTERINTELLIGENCE

More information

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy An Introduction to Identity Theft Your Free Copy DO I NEED IDENTITY THEFT INSURANCE? Necessary Coverage or False Sense of Security? Identity theft has become a national concern, with 10 million victims

More information

Introduction to Cyber Defense Competition. Module 16

Introduction to Cyber Defense Competition. Module 16 Introduction to Cyber Defense Competition Module 16 Objectives of the CDC Establish a safe and functional environment that: Encourages students to discover the applied meaning of information/cyber security

More information

RELEASE OF INFORMATION

RELEASE OF INFORMATION ***For Immediate Release to Castle Hills Residents*** On August 23, 2014, at approximately 11:33 pm, officers from the Lewisville Police Department responded to a robbery call in the 2400 block of Hollow

More information

Quantitative Penetration Testing with Item Response Theory

Quantitative Penetration Testing with Item Response Theory Quantitative Penetration Testing with Item Response Theory Florian Arnold*, Wolter Pieters t and Marielle Stoelinga* * Formal Methods & Tools Group, Department of Computer Science University of Twente,

More information

Learning English with CBC Radio Living in Alberta. Identity Theft

Learning English with CBC Radio Living in Alberta. Identity Theft Learning English with CBC Radio Living in Alberta Identity Theft by Maroro Zinyemba Project Manager: Justine Light Daylight Consulting Inc. Integration Enhancement Lesson: Identity Theft CLB Level: 6 CLB

More information

INTEGRATED SKILLS TEACHER S NOTES

INTEGRATED SKILLS TEACHER S NOTES TEACHER S NOTES INTEGRATED SKILLS TEACHER S NOTES LEVEL: Pre-intermediate AGE: Teenagers / Adults TIME NEEDED: 90 minutes + project LANGUAGE FOCUS: Linking words, understand vocabulary in context, topic

More information

White Paper. Top Five Ways to Cheat a Truck Scale. How To Prevent it from Happening to You

White Paper. Top Five Ways to Cheat a Truck Scale. How To Prevent it from Happening to You White Paper Top Five Ways to Cheat a Truck Scale How To Prevent it from Happening to You Theft, forgery and credit card fraud. Those are all ways that criminals cheat the system for their own personal

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Spillemyndigheden s Certification Programme Instructions on Penetration Testing

Spillemyndigheden s Certification Programme Instructions on Penetration Testing SCP.04.00.EN.1.0 Table of contents Table of contents... 2 1 Objectives of the... 3 1.1 Scope of this document... 3 1.2 Version... 3 2 Certification... 4 2.1 Certification frequency... 4 2.1.1 Initial certification...

More information

http://www.guido.be/intranet/enqueteoverview/tabid/152/ctl/eresults...

http://www.guido.be/intranet/enqueteoverview/tabid/152/ctl/eresults... 1 van 70 20/03/2014 11:55 EnqueteDescription 2 van 70 20/03/2014 11:55 3 van 70 20/03/2014 11:55 4 van 70 20/03/2014 11:55 5 van 70 20/03/2014 11:55 6 van 70 20/03/2014 11:55 7 van 70 20/03/2014 11:55

More information

WASHINGTON ASSOCIATION OF SHERIFFS AND POLICE CHIEFS Model Policy on Identity Theft Policy, Procedures, and Victim Referral Information

WASHINGTON ASSOCIATION OF SHERIFFS AND POLICE CHIEFS Model Policy on Identity Theft Policy, Procedures, and Victim Referral Information WASHINGTON ASSOCIATION OF SHERIFFS AND POLICE CHIEFS Model Policy on Identity Theft Policy, Procedures, and Victim Referral Information Definition - Identity theft is the wrongful appropriation of an individual

More information

count is Criminal Possession of Stolen Property in the Fourth Degree.

count is Criminal Possession of Stolen Property in the Fourth Degree. CRIMINAL POSSESSION OF STOLEN PROPERTY FOURTH DEGREE (E Felony) (By Collateral Loan Broker or Dealer in Property) PENAL LAW 165.45(3) (Committed on or after Nov. 1, 1986) The count is Criminal Possession

More information

DUOLINGO USABILITY TEST: MODERATOR S GUIDE

DUOLINGO USABILITY TEST: MODERATOR S GUIDE DUOLINGO USABILITY TEST: MODERATOR S GUIDE Contents: Preparation Checklist Introductory Remarks Task Instructions and Post- Task Questions o Task #1: Beginning the onboarding procedure and selecting a

More information

BBC LEARNING ENGLISH 6 Minute Grammar Active and passive voice

BBC LEARNING ENGLISH 6 Minute Grammar Active and passive voice BBC LEARNING ENGLISH 6 Minute Grammar Active and passive voice This is not a word-for-word transcript Hello and welcome to 6 Minute Grammar with me,. And me,. And in today s programme we re talking about

More information

Identity Theft. The Most Pervasive Financial Crime Today. Presented by; Wells Fargo Corporate Security. Wells Fargo All Rights Reserved 1

Identity Theft. The Most Pervasive Financial Crime Today. Presented by; Wells Fargo Corporate Security. Wells Fargo All Rights Reserved 1 Identity Theft The Most Pervasive Financial Crime Today Presented by; Wells Fargo Corporate Security Wells Fargo All Rights Reserved 1 It s so very simple to be anyone you please, on any given morning

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning

More information

ONE TO ONE LAPTOP PROGRAMME POLICY

ONE TO ONE LAPTOP PROGRAMME POLICY ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...

More information

Minimizing the Risk of Identity Theft. John and Kris Clagett Q4 Wealth Management, Inc.

Minimizing the Risk of Identity Theft. John and Kris Clagett Q4 Wealth Management, Inc. Minimizing the Risk of Identity Theft John and Kris Clagett Q4 Wealth Management, Inc. Introduction and Agenda What is identity theft? How does it happen? How can you tell if it s happening to you? How

More information

Submission to the parliament of Australia Joint Committee Management and Integrity of Electronic Information in the Commonwealth

Submission to the parliament of Australia Joint Committee Management and Integrity of Electronic Information in the Commonwealth Submission to the parliament of Australia Joint Committee Management and Integrity of Electronic Information in the Commonwealth Submitted By Gary Bigelow Sales and Marketing Manager Business Security

More information

3600 South Yosemite Street, Suite 828 Denver, CO 80237 MEMORANDUM

3600 South Yosemite Street, Suite 828 Denver, CO 80237 MEMORANDUM 3600 South Yosemite Street, Suite 828 Denver, CO 80237 MEMORANDUM To: From: Re: Firm Client Peter E. Muccio, Esq. Tenant Deaths Firm clients frequently inquire as to the procedures that should be followed

More information

FLIP IDENTITY THEFT. (Financial Literacy in Practice) February 2015. ACTIVITY 1 What do thieves want? STUDENT WORKSHEET

FLIP IDENTITY THEFT. (Financial Literacy in Practice) February 2015. ACTIVITY 1 What do thieves want? STUDENT WORKSHEET FLIP (Financial Literacy in Practice) IDENTITY THEFT February 2015 ACTIVITY 1 What do thieves want? There are many documents that thieves could use to steal your identity. Government departments, financial

More information

Multi-Factor Authentication

Multi-Factor Authentication Making the Most of Multi-Factor Authentication Introduction The news stories are commonplace: Hackers steal or break passwords and gain access to a company s data, often causing huge financial losses to

More information

Chapter 6. Identity Theft

Chapter 6. Identity Theft Chapter 6 49 The United States Department of Justice defines identity theft as a crime in which someone wrongfully obtains or uses another person s personal data in some way that involves fraud or deception,

More information

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09 IDENTITY THEFT WHAT YOU NEED TO KNOW Created by GL 04/09 Table of Contents 1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do

More information

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints

More information

April 16th, 2009. By John Tabor Corporate Security Director National Retail Systems Inc.

April 16th, 2009. By John Tabor Corporate Security Director National Retail Systems Inc. April 16th, 2009 By John Tabor Corporate Security Director National Retail Systems Inc. In my former position as loss prevention executive for a major retailer, an important responsibility was designing

More information

Langara College Spring 2007 - archived

Langara College Spring 2007 - archived Course: Criminal Justice 217 INSTRUCTOR: Mr. Laurie Lowes Phone: Office: 323-5482 Work: 272-7115 (Voice Mail) Home: 597-4373 OFFICE HOURS: 7:30 am - 8:30 am Thursday and Friday (Also by appointment) COURSE

More information

15 Bad Things Identity Thieves Can Do With Your Identity

15 Bad Things Identity Thieves Can Do With Your Identity This free ebook is provided to help you protect yourself from fraud and identity theft by LeMay Mobile Shredding. LeMay Mobile Shredding offers mobile document shredding to help you destroy old tax forms,

More information

Certified Red Flag Specialist (CRFS) Program Overview & Curriculum

Certified Red Flag Specialist (CRFS) Program Overview & Curriculum CRFS Overview The Certified Red Flag Specialist (CRFS) program is designed and administered by Identity Management Institute (IMI) to train employees, consultants and auditors of companies affected by

More information

FLIP IDENTITY THEFT. (Financial Literacy in Practice) February 2015 OVERVIEW TEACHER NOTES TEACHER NOTES

FLIP IDENTITY THEFT. (Financial Literacy in Practice) February 2015 OVERVIEW TEACHER NOTES TEACHER NOTES FLIP (Financial Literacy in Practice) February 2015 IDENTITY THEFT OVERVIEW This resource complements the material in Operation Financial Literacy. It has been written to address current issues which specifically

More information

PENETRATION TESTING GUIDE. www.tbgsecurity.com 1

PENETRATION TESTING GUIDE. www.tbgsecurity.com 1 PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a

More information

UNODC-UNECE Manual on Victimization Surveys: Content

UNODC-UNECE Manual on Victimization Surveys: Content UNODC-UNECE Manual on Victimization Surveys: Content The structure 10 chapters and 4 Appendices Extensive use of examples / boxes from victimization surveys carried out in different countries, including

More information

identity theft: How To Safeguard Your Privacy and Keep Your Good Name

identity theft: How To Safeguard Your Privacy and Keep Your Good Name identity theft: How To Safeguard Your Privacy and Keep Your Good Name Do you know anyone who has been the victim of identity theft? If not, odds are you will soon. According to the Federal Trade Commission,

More information

Vulnerability Assessment & Compliance

Vulnerability Assessment & Compliance www.pwc.com Vulnerability Assessment & Compliance August 3 rd, 2011 Building trust through Information security* Citizen-Centric egovernment state Consultantion workshop Agenda VAPT What and Why Threats

More information

Home Invasion Safety. Protecting Your Family

Home Invasion Safety. Protecting Your Family Home Invasion Safety Protecting Your Family Point of Entry and Confrontation A home invasion is when robbers force their way into an occupied home, apartment or hotel room to commit a robbery or other

More information

Protecting your identity

Protecting your identity Protecting your identity Though it might not seem like it, your identity is one of the most precious things you possess. Criminals who are able to steal your identifying information can pretend to be you,

More information

ACCEPTABLE USE OF COMPUTERS IN WILTSHIRE LIBRARIES

ACCEPTABLE USE OF COMPUTERS IN WILTSHIRE LIBRARIES ACCEPTABLE USE OF COMPUTERS IN WILTSHIRE LIBRARIES Policy Statement Introduction 1. Wiltshire Libraries provide access to the Internet and other computer facilities to support the educational, recreational

More information

Table of Contents. 1. Specifications of your laptop:

Table of Contents. 1. Specifications of your laptop: Parent/Student Laptop Manual 2012-2013 Table of Contents 1. Specifications of your laptop: 2. Terms of Use: a. Title b. Loss or Damage c. Repossession d. Use and Maintenance Fees e. Network Use f. Internet

More information

IDENTITY THEFT AND PHISHING SCAMS

IDENTITY THEFT AND PHISHING SCAMS Grades 9-12 Lesson 10 IDENTITY THEFT AND PHISHING SCAMS Key concepts: Consumer protection of financial records, protection of one s identity through paper and online Summary: This lesson introduces students

More information

White Paper: Are there Payment Threats Lurking in Your Hospital?

White Paper: Are there Payment Threats Lurking in Your Hospital? White Paper: Are there Payment Threats Lurking in Your Hospital? With all the recent high profile stories about data breaches, payment security is a hot topic in healthcare today. There s been a steep

More information

Security Services Policy and Procedures

Security Services Policy and Procedures and Procedures January 2011 Contents Heading Page Policy Policy Statement: 3 Procedures Aims and objectives: 3 Responsibilities: 4 Introduction: 6 Security Service management remit: 6 Overall aims of the

More information

MONEY MISTAKES. Consolidated Credit 5701 West Sunrise Boulevard Fort Lauderdale, FL 33313 1-800-210-3481 www.consolidatedcredit.

MONEY MISTAKES. Consolidated Credit 5701 West Sunrise Boulevard Fort Lauderdale, FL 33313 1-800-210-3481 www.consolidatedcredit. MONEY MISTAKES Consolidated Credit 5701 West Sunrise Boulevard Fort Lauderdale, FL 33313 1-800-210-3481 www.consolidatedcredit.org Congratulations on taking this important step to learn about issues dealing

More information

Pacific Islands Telecommunications Association

Pacific Islands Telecommunications Association Pacific Islands Telecommunications Association 8 th Fl, Dominion Hse PHONE : (679) 331 1638 PO BOX 2027, Govt Bldg FAX : (679) 330 8750 SUVA, FIJI Islands E-mail: pita@connect.com.fj www.pita.org.fj INVITATION

More information

Lesson Design and Planning

Lesson Design and Planning Lesson Design and Planning In preparing for battle I have always found that plans are useless, but planning is indispensable. Dwight D. Eisenhower By: Bob Harrison Effective lesson design is approached

More information

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security Next-Generation Penetration Testing Benjamin Mossé, MD, Mossé Security About Me Managing Director of Mossé Security Creator of an Mossé Cyber Security Institute - in Melbourne +30,000 machines compromised

More information

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Cyber Security. A professional qualification awarded in association with University of Manchester Business School ICA Advanced Certificate in Cyber Security A professional qualification awarded in association with University of Manchester Business School An Introduction to the ICA Advanced Certificate In Cyber Security

More information

THE PARTICLE THAT PROTECTS YOUR VEHICLE

THE PARTICLE THAT PROTECTS YOUR VEHICLE THE PARTICLE THAT PROTECTS YOUR VEHICLE DataDots - DNA for your car. FACT Over 170,000 cars were stolen in Canada in 2001, including 27,250 in Montreal. Almost one out of every 100 cars is stolen every

More information

White Paper Performance Testing Methodology

White Paper Performance Testing Methodology White Paper Performance Testing Methodology by Johann du Plessis Introduction One of the main concerns with a performance testing project is how much value the testing adds. Is performance testing worth

More information

Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks

Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks Dawn M. Cappelli Andrew P. Moore CERT Program Software Engineering Institute Carnegie Mellon University 04/09/08 Session Code:DEF-203

More information

Standard 9: The student will identify and explain consumer fraud and identity theft.

Standard 9: The student will identify and explain consumer fraud and identity theft. TEACHER GUIDE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Priority Academic Student Skills Personal Financial

More information

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 616 Securing Windows Infrastructure. Make The Difference CAST.

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 616 Securing Windows Infrastructure. Make The Difference CAST. CENTER FOR ADVANCED SECURITY TRAINING 616 Securing Windows Infrastructure Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape now requires

More information

EL/Civics Lesson Plan

EL/Civics Lesson Plan Program Name Staff Responsible for Lesson MVCTC EL/Civics Program Mary Ann Oatney Date(s) Used 11/2007 Civics Category Civics Objective Time Frame to Complete Lesson EFL(s) II. Civics Participation II.

More information

Identity Theft And Your Social Security Number

Identity Theft And Your Social Security Number Identity Theft And Your Social Security Number Identity Theft And Your Social Security Number Identity theft is one of the fastest growing crimes in America. A dishonest person who has your Social Security

More information

Multi-Factor Authentication (FMA) A new security feature for Home Banking. Frequently Asked Questions 8/17/2006

Multi-Factor Authentication (FMA) A new security feature for Home Banking. Frequently Asked Questions 8/17/2006 Multi-Factor Authentication (FMA) A new security feature for Home Banking Frequently Asked Questions 8/17/2006 1. Why is MFA being added? We take our obligation to protect our members seriously. To make

More information

Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com

Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Matt Malone Fall 2015 Spring 2016 IDENTITY THEFT Identity

More information

CIVIL SERVICE SPORTS COUNCIL (CSSC) QUESTIONS & ANSWERS

CIVIL SERVICE SPORTS COUNCIL (CSSC) QUESTIONS & ANSWERS CIVIL SERVICE SPORTS COUNCIL (CSSC) QUESTIONS & ANSWERS ABOUT THE INCIDENT How did it happen? Related frauds are being investigated by the relevant authorities and criminal proceedings may result so we

More information

LODI POLICE DEPARTMENT David J. Main, Chief of Police

LODI POLICE DEPARTMENT David J. Main, Chief of Police Release Date and Time: 090309 Subject: Avoid the 10 DUI Grant Details: On 08/28/09 the Lodi Police Department conducted a DUI Check Point in the 500 block of E Lockeford. During this check point, LPD arrested

More information

Modern two-factor authentication: Easy. Affordable. Secure.

Modern two-factor authentication: Easy. Affordable. Secure. Modern two-factor authentication: Easy. Affordable. Secure. www.duosecurity.com Your systems and users are under attack like never before The last few years have seen an unprecedented number of attacks

More information

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers. National Unit specification General information Unit code: H9HY 45 Superclass: CC Publication date: September 2015 Source: Scottish Qualifications Authority Version: 02 Unit purpose The purpose of this

More information

I know what is identity theft but how do I know if mine has been stolen?

I know what is identity theft but how do I know if mine has been stolen? What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually.

Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually. April 23, 2014 Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually. What is it? Electronic Protected Health Information There are 18 specific

More information

Cybercrime: risks, penalties and prevention

Cybercrime: risks, penalties and prevention Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

More information

Recent Developments in PCI DSS. PCI in the Headlines Risks to Higher Education PCI DSS Version 1.2

Recent Developments in PCI DSS. PCI in the Headlines Risks to Higher Education PCI DSS Version 1.2 Recent Developments in PCI DSS PCI in the Headlines Risks to Higher Education PCI DSS Version 1.2 1 2009 Breach Investigation Who did it? 74% external parties 20% insiders 32% implicated business partners

More information

FINAL Version 1.0 November 6, 2014

FINAL Version 1.0 November 6, 2014 CENTERS for MEDICARE & MEDICAID SERVICES Enterprise Information Security Group 7500 Security Boulevard Baltimore, Maryland 21244-1850 Risk Management Handbook Volume II Procedure 4.5 FINAL Version 1.0

More information

IDENTITY PROTECTION MEMBER. Protect Your Identity. Security of Personal Information is Our Top Priority

IDENTITY PROTECTION MEMBER. Protect Your Identity. Security of Personal Information is Our Top Priority MEMBER IDENTITY PROTECTION Protect Your Identity Security of Personal Information is Our Top Priority Imagine this Unexpectedly, you get turned down for a loan, you get a call from a collection agency

More information

ACE Advantage PRIVACY & NETWORK SECURITY

ACE Advantage PRIVACY & NETWORK SECURITY ACE Advantage PRIVACY & NETWORK SECURITY SUPPLEMENTAL APPLICATION COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY AND/OR NETWORK SECURITY LIABILITY COVERAGE. Please submit with

More information

Agenda. Creating a Robust Testing Program. Notification Tests. Overview of Testing. Beverly Schulz, CBCP

Agenda. Creating a Robust Testing Program. Notification Tests. Overview of Testing. Beverly Schulz, CBCP Agenda Overview of Testing Notification Tests Tabletop or Walk-through Tests Simulations Technology Outage Tests Third Party Outage Tests Workplace Outage Tests Workforce Outage Tests Reporting Creating

More information

Insurance. for your small. business

Insurance. for your small. business Insurance for your small business @BritishInsurers As an employer, you are legally required to have Employers Liability Insurance. If you use motor vehicles for your business, you are legally required

More information

Contents. Instructions for Using Online HIPAA Security Plan Generation Tool

Contents. Instructions for Using Online HIPAA Security Plan Generation Tool Instructions for Using Online HIPAA Security Plan Generation Tool Contents Step 1 Set Up Account... 2 Step 2 : Fill out the main section of the practice information section of the web site.... 3 The next

More information

California Mandated Reporting Requirements

California Mandated Reporting Requirements California Mandated Reporting Requirements Our Commitment Thistrainingwas created asa a reminder to all employees and contracted providers that California law requires mandatory reporting of known or suspected:

More information

Lesson Plan. Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers.

Lesson Plan. Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers. Lesson Plan Course Title: Principles of IT Session Title: Networks and Hackers Lesson Duration: Lesson length is subjective and will vary from instructor to instructor. Performance Objective: Upon completion

More information

PDSA Special Report. Is your Company s Security at Risk

PDSA Special Report. Is your Company s Security at Risk PDSA Special Report Introduction There is probably no such thing as a completely secure company. However, if you are not thinking about security in your company, you are running a big risk. We are not

More information

INTRODUCTION TO PENETRATION TESTING

INTRODUCTION TO PENETRATION TESTING 82-02-67 DATA SECURITY MANAGEMENT INTRODUCTION TO PENETRATION TESTING Stephen Fried INSIDE What is Penetration Testing? Terminology; Why Test? Types of Penetration Testing; What Allows Penetration Testing

More information

Refund scams come in three basic forms:

Refund scams come in three basic forms: REFUND SCAMS Refunds are recognized throughout the retail industry as the most frequently abused transaction, as well as the number one source of cash losses in the retail industry. Literally tens of billions

More information

Information Security Training for SysAdmins. Center for Education and Research in Information Assurance and Security, Purdue University

Information Security Training for SysAdmins. Center for Education and Research in Information Assurance and Security, Purdue University Information Security Training for SysAdmins Center for Education and Research in Information Assurance and Security, Purdue University Published by: CERIAS, The Center for Education and Research in Information

More information

ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance

ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance ITL BULLETIN FOR JULY 2012 Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance Paul Turner, Venafi William Polk, Computer Security Division, Information

More information

Unipass Identity User Guide & FAQ Document v1.1

Unipass Identity User Guide & FAQ Document v1.1 Unipass Identity User Guide & FAQ Document v1.1 Some background information regarding Unipass Identity and a summary of some of the most commonly asked questions relating to your Unipass Identity. UIdP

More information

HSS Visiting Speaker Program Frank W. Abagnale: Fraud and Theft in the Information Age. October 28, 2009

HSS Visiting Speaker Program Frank W. Abagnale: Fraud and Theft in the Information Age. October 28, 2009 1 of 8 In the United States, the FBI ranks cyber crime and identity theft as the third highest threat, just after terrorism and espionage. In October 2009, the FBI indicted the largest number of defendants

More information

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers Introduction to Ethical Hacking and Network Defense January 14, 2010 MIS 4600 - Abdou Illia Objectives Describe the role of an ethical hacker Describe what can an ethical hacker legally do Describe what

More information

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Information Security in Universities

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Information Security in Universities Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Information Security in Universities Agenda Information Security Management in Universities Recent

More information

www.breaking News English.com Ready-to-Use English Lessons by Sean Banville Level 5 Hospital chains toys to beds to stop thieves

www.breaking News English.com Ready-to-Use English Lessons by Sean Banville Level 5 Hospital chains toys to beds to stop thieves www.breaking News English.com Ready-to-Use English Lessons by Sean Banville 1,000 IDEAS & ACTIVITIES FOR LANGUAGE TEACHERS www.breakingnewsenglish.com/book.html Thousands more free lessons from Sean's

More information

Spillemyndigheden s Certification Programme Instructions on Penetration Testing

Spillemyndigheden s Certification Programme Instructions on Penetration Testing SCP.04.00.EN.1.0 Table of contents Table of contents... 2 1 Introduction... 3 1.1 Spillemyndigheden s certification programme... 3 1.2 Objectives of the... 3 1.3 Scope of this document... 4 1.4 Definitions...

More information

WHITE PAPER. Preventing Wireless Data Breaches in Retail

WHITE PAPER. Preventing Wireless Data Breaches in Retail WHITE PAPER Preventing Wireless Data Breaches in Retail Preventing Wireless Data Breaches in Retail The introduction of wireless technologies in retail has created a new avenue for data breaches, circumventing

More information

Technical Level Lessons Learned Meeting Thematic Focus on Slow Onset Humanitarian Crises. Lessons Identified and Discussion Points - Overview

Technical Level Lessons Learned Meeting Thematic Focus on Slow Onset Humanitarian Crises. Lessons Identified and Discussion Points - Overview EUROPEAN COMMISSION DIRECTORATE-GENERAL HUMANITARIAN AID AND CIVIL PROTECTION - ECHO ECHO.B - Humanitarian and Civil Protection Operations B/1 - Emergency Response Brussels, ECHO.B.1./JA/RK (2013) Technical

More information

UNITED STATES COURT OF APPEALS FOR THE THIRD CIRCUIT. No. 10-1984 UNITED STATES OF AMERICA. KAREN BATTLE, Appellant

UNITED STATES COURT OF APPEALS FOR THE THIRD CIRCUIT. No. 10-1984 UNITED STATES OF AMERICA. KAREN BATTLE, Appellant UNITED STATES COURT OF APPEALS FOR THE THIRD CIRCUIT No. 10-1984 UNITED STATES OF AMERICA v. NOT PRECEDENTIAL KAREN BATTLE, Appellant Appeal from the United States District Court for the Eastern District

More information