Online Social Media Networking and Assessing Its Security Risks
|
|
|
- Blake Sanders
- 10 years ago
- Views:
Transcription
1 Online Social Media Networking and Assessing Its Security Risks Hak J. Kim Hofstra University Abstract Over the past several years, we have seen the emergence of new paradigm in the Internet, online social media networking, which provide Internet users to communicate and collaborate with family, friends, social groups, and other community by using social media tools (i.e., Twitter, Facebook, MySpace, and Youtube). The use of social media for communication is becoming more prevalent worldwide, with people from countries of varying economic development increasingly accessing the Internet to participate in networking sites. Online social media networking today is a great tool to meet and network with people sharing similar business interests. However, they can also pose serious security threats to users and their organizations. This paper presents the security risks of online social media networking and then attempts to develop the model for assessing its security risks. Our model can help security professionals for assessing security risks in the existing information systems and designing new security systems of enterprise. Keywords: Online Social Media, Social Networking, Security Risks, Trust Zone 1. Introduction Today online social networking applications [1] are rapidly growing in use both personally and professionally. The use of social networking is becoming more prevalent worldwide, with people from countries of varying economic development increasingly accessing the Internet to participate in networking sites. With the popularity of mobile devices and applications combined with social networking technologies, communication using online social networking tools is becoming a new way of life to the people [2]. Facebook [3] is one of the strongest growth social networking services and currently more than 500 million users enjoy it for games or sharing information in web applications. Actually social networking is not new. Like traditional social networking in club for party and seminar, online social networking is to communicate between people with similar interests in the Internet [4, 5, 6]. Since most people access social network sites from the comfort and privacy of their home or office, they can be lulled into a false sense of anonymity. Additionally, the lack of physical contact on social network site can lower users' natural defenses, leading individuals into disclosing information they would never think of revealing to a person they just met on a street. Modern enterprises are heavily relying on information systems; for example, timesharing systems over mainframe computers in 1960s and 1970s, networked personal computers and workstations in 1980s, and Internet-based systems in 1990s [7]. But especially over the past several years, we have seen the emergence of new paradigm in communication systems, called online social networking, ranging from MySpace to Facebook, LinkedIn, and Twitter. New enterprise environments, communications with social networking platforms, are emerged [8]. That is, social 11
2 media and online social networking applications are changing the enterprise environment. More than 40% of IBM employees work regularly from customer locations and home rather than on IBM premises [2]. Similarly, Cisco [8] reported more than 60 percent of employees believe that being in the office is no longer needed to be productive. Sturdevant [9] shows that social collaboration tools are poised to increase productivity. Gupta & Carpenter [10] points out that enterprise value is heavily dependent on employees knowledge and their ability to share that knowledge. They also emphasize active employees in social networking for increasing enterprise value. Thus, the enterprise value depends on multiple factors beyond simple activity metrics. Companies often use online social networks for recruitment and publicity campaigns. Consequently, many companies allow employees to access online social networking sites. However, it might not be such a good idea from the perspective of network security. There have been cases of Facebook and MySpace accounts being hijacked and user names and passwords being sold to underground networks. Hackers then use the compromised accounts to run phishing scams. Safeguarding the network from the vulnerabilities prevalent in social networks is a new and growing challenge in the field of cyber security. Then, why do enterprises struggle with social media and online social networking applications? Because they are not just the tools, but how their employees use these tools in the working place. Enterprises are trying to make the most of the advantages of online social networking and keep their employees happy, while at the same time, limiting the dangers posed by the increased exposure of potentially sensitive and exploitable information. Since online social networking by company employees continues to be a security concern, enterprises are prompted to look at the risks of them associated with employees use and examine the information posted on social networking sites [11]. This paper discusses security risks of SNS at the enterprise and then assesses SNS systems risks using the analytic hierarchy process (AHP) approach which is a useful tool to assist decision makers in reducing complexity to solve problems. 2. Social Media Networking As traditional social networking (i.e., club, party, seminar, etc.) communicates between people with similar interests in physical spaces, online social media networking is the same with it except for the place to meet; from physical space to cyberspace, especially the Internet [5]. One of the strongest growth areas has been in the adoption of social networking sites, such as Facebook [3] and currently more than 500 million users in Facebook enjoy games or sharing information in web applications. With the popularity of mobile devices and applications combined with social networking technologies, communication using online social networking tools is becoming a new way of life to the people [2]. Online social network services, such as Youtube, MySpace, Facebook, LinkedIn, and Twitter. involving individual Internet users as well as multiple organizations are emerged as new communication platform in today s dynamic and complicated Internet - based business world. However, with the explosive growth of social media coupled with applications, securing user s information and the related systems is extremely challenging. Figure 1 shows the generic network architecture for online social network services. 12
3 Figure 1. Social Media Network Architecture Figure 2 show the service framework of SNS. It consists of three parts; user applications, social media devices, and network infrastructure. User applications include web services, services, instant messaging services, and other services. Current available devices are mobile phones (i.e., iphone), tablet PC (i.e., ipad), laptop computers, and desktop computers. Network infrastructure includes traditional LAN/WAN, mobile-based wireless networks, and cable networks. Figure 2. Hierarchy of Social Media System Social media can be used in e-business, for example user ratings and reviews, user recommendations and referrals, social shopping (sharing the act of online shopping together), user forums and communities, social media optimization (for e-commerce), and social applications and social ads linked to e-commerce. It also can be used in a firm s business functions, as shown in Table 1. 13
4 Business Customer Relationship Human Resource Production Service Delivery Table 1. Social Media Business Platform Social Media Listen to customer concerns Solve problems Spread best practices Promote company among potential employees Identify/gather information on job candidates Solicit ideas, opinions, and feedback to incorporate them into existing and/or new products and services Enhance collaboration on projects and service engagements Create and share knowledge Collaborate on documentation 3. Security Risks and Trust Zones 3.1. Security Risks Today, many people provide judgment in ensuring trust of social networking while in the Internet; any one or even multiple sets of data can have flaws and impreciseness and still meet the mission of reliable communication. The typical examples of SNS s security risks include account compromise (i.e., by social media), monetary fraud (i.e., a payment platform in devices), and so on. However, the total loss or unavailability of some data can be detrimental to ensuring the trust of social media use. As an example, if personal data (i.e., name, photos, address, schools, etc.) and/or related party communications are rendered altogether unavailable to an SNS providers, there is one less human providing judgment; the controller is one of the most important roles in terms of safe travel in addition to the pilot. Therefore, availability is the most important aspect of security relative to confidentiality and integrity to enable the mission. The next priority is integrity, then confidentiality. Figure 3 shows trust zones are formed around online social media networking systems functions; security boundaries represent all feeds into and out of zones. Each of the three trust zones has very different goals in terms of cyber security and defending against attacks. Figure 3. Security Trust Zones for Social Media Networking 14
5 3.2. Security Trust Zones The Social Applications Trust Zone is comprised of the social network service (SNS) membership registration, SNS applications installation, and SNS processing. Threats in this trust zone include registering criminals obtaining credit card and other personal information for identify fraud and other criminal activities. As a result, encryption, strong identification and authentication, and role based access are incredibly important financial transaction and personal identity activities such as the registering member s identity verification. The Social Media Device Trust Zone will have strong elements of all three aspects of security: confidentiality, integrity, and availability. This trust zone must focus on ensuring that authorized users only have access to devices necessary to perform security functions. Threats include unauthorized users viewing and modifying data, including the insider, and denial of service so authorized users and applications cannot be processed rapidly. Whereas the social media device trust zone ensures all three principles are fully addressed, the Network Infrastructure Trust Zone is focused primarily on ensuring communications and data are available at all times. 4. Assessing Security Risks For assessing SNS s security risks, the analytic hierarchy process (AHP) approach is introduced. AHP is a useful tool to assist decision makers in reducing complexity to solve problems. We attempt to assess security risks based on each trust zone as addressed in the above Analytic Hierarchy Process (AHP) Approach AHP was developed in the 1970 s by Thomas Saaty [12]. It has grown steadily over the last 40 years, and can be applied to many different applications. In information systems security, AHP studies [13, 14, 15] have included guiding information security investment decisions, evaluating antivirus and content filtering products, and using analytic models on security systems. Saaty [12] proposed a process to break down complexity into smaller scope comparisons, assign relative ratings, and analyze the results to determine the best outcome. His method consisted of defining the problem, or what is to be solved; determining the structure using a decision hierarchy, which includes determining the criteria and alternatives; comparing the alternatives and criteria in pairs to determine preferences and priorities; and analyzing the resulting priorities and preferences to determine the best outcome or alternative to choose to solve the problem. Using this process, AHP can assist decision makers and security professionals in group decision making to address a complex problem Applying AHP to SNS The first set to determine the optimum security controls for the SNS trust zone. It considers the mission of the SNS, which is to continue to ensure trust communication. Next, the criteria are established identifying the specific threats and vulnerabilities imperative to be addressed by the alternatives. In applying cyber security risk assessment principles, a threat and vulnerability must be coupled to create a resulting impact. That is, a specific threat must exploit, or otherwise exercise, a vulnerability fo r a successful attack to occur. The criteria (Table 2) are then listed in terms of confidentiality, integrity, and availability for simplifying evaluation. 15
6 Confidentiality (Rating: 1) Integrity (Rating: 2) Availability (Rating: 3) Table 2. Criteria Assessment Intercepted data through unauthorized access (1) Damage to data through Modification of system (3) False readings due to data corruption (3) Unpredictable results due to software bugs (miscalculations) (2) Damage through unauthorized access (3) Loss of communications (3) System damage or crash (denial of service) (3) Disruption of service (3) Finally, the alternatives are established. The alternatives (TABLE 3) are all the possible countermeasures or administrative, logical (or technical) or physical security controls to be considered. The chosen controls are derived from National Institute of Standards and Technology (NIST) Special Publication standard [18]. Confidentiality (Rating: 1) Integrity (Rating: 2) Availability (Rating: 3) Table 3. Alternatives Assessment Encryption in transit (1) Encryption at rest (1) Access controls (1) identification and authentication to ensure confidentiality (1) Check hash values of software, applications, scripts (6) Digital signatures Software testing and validation (2) Timestamps (4) Configuration management (6) Access controls to ensure identity authentication (6) Redundant communications network lines (9) Spread spectrum (9) Multiple sources of data provided (9) High availability servers on certain data sources (9) Contingency planning (9) In considering the complexity of ensuring the SNS mission, all three types of controls must be employed. The sample list is not exhaustive, but rather highlights the more salient controls or classes of controls to be considered. To conduct a full and complete risk assessment, all of the baselines controls referred to in Appendix D of NIST Special Publication might be considered. The security controls are identified terms of the criteria. Each control will address a specific cyber threat/vulnerability vector (as described in terms of impact). 5. Managerial Implication In comparing of availability, confidentiality, and integrity, the nature of SNS data is important. Much of SNS data has a short time to live. Once data have sent, the value of keeping the data confidential is minimal in terms of security attacks. Compared to 16
7 integrity, availability is more important to available data than trust data. So, in our paper, availability is the most important aspect of security relative to confidentiality and integrity to enable the service. The next priority is integrity, then confidentiality. The ratings reflect the priority, with 1 the lowest, and 3 the highest priority. The SNS trust zone risk assessment is the first step of analyzing and determining the security controls of an international airport information systems infrastructure. A similar risk assessment approach is necessary to apply to the other two trust zones as well for completeness. The social media trust zone would be considered in terms of confidentiality to address the financial and personal data involved. Encryption of financial data will weigh into ensuring the confidentiality of this data. The network infrastructure trust zone may be considered in terms of all three security principles, and might require the highest degree of controls to ensure the security of the information systems in Security trust zone. In addition to strong security boundaries with tight firewall rules, monitoring of security personnel and limiting physical access, where possible, will also be important. In applying risk assessment using AHP principles, decision makers might consider the method has impreciseness built in. Preferences to certain controls may consciously or unconsciously bias the results in exercising the methodology. In addition, decision makers might have intentional or unintentional motivating factors such as selfpreservation from unwanted politics and this may be reflected in not choosing unpopular security controls. Another consideration in applying the methodology is security controls or countermeasures can either partially or entirely address threats and vulnerabilities, and may be interdependent. Choosing the impacts to encompass classes of threats and vulnerabilities may assist in minimizing the interdependency. A final consideration in applying this methodology is the cost of the controls. Risk assessment considers cost as a factor in mitigating the impact of a threat-vulnerability pair. If the cost exceeds the willingness to take the risk, the countermeasure or control is not worth the cost to employ. Similarly, in the example the controls mentioned must be considered with the risk. Redundancy of communication lines can be extremely expensive. However, when the risk is losing lives if the communications lines go down, the cost is most likely worthwhile. Assessing the controls in terms of cost and value are also important in employing the methodology. 6. Concluding Remarks The SNS systems are a complex multi layered informational system supporting security, operations, vendors, and travelers. They require high levels of computational power in a secure environment. Risk management of information can be mitigated with a good information security management system. The future of SNSs is going to need for more access for users as technology advances and SNS use new techniques. In summary, applying security risk assessment using the AHP methodology can provide the security professional with a solid approach to complex design of security controls. In SNS systems operations, complexity of diverse business lines coupled with tight regulation add dimensions of complexity that are extremely challenging to any decision maker. Breaking the diverse operations into trust zones and approaching each trust zone with unique criteria and alternatives can tailor security controls. Each trust zone will have threats and vulnerabilities that are specific to the missions and functions, and will vary in impact importance from trust zone to trust zone. The analysis of alternatives will assist decision makers in establishing effective security controls. 17
8 References [1] B. J. Jansen, M. Zhang, K. Sobel and A. Chowdury, Twitter power-tweets as electronic word-of-mouth, Journal of the American Society for Information Science andtechnology, vol. 60, no. 11, (2009), pp [2] S. Hathi, How Social Networking Increases Collaboration at IBM, Strategic Communication Management, vol. 14, no. 1, (2009), pp [3] M. K. Foster, A. Francescucci and B. C. West, Why Users Participate in Online Social Networks, International Journal of e-business Management, vol. 4, no. 1, (2010), pp [4] M. Bulearca and S. Bulearca, Twitter: a Viable Marketing Tool for SMEs?, Global Business & Management Research, vol. 2, no. 4, (2010), pp [5] M. Häsel, OpenSocial: An Enabler for Social Applications on the Web, communications of the ACM, vol. 54, no. 1, (2011), pp [6] K. J. Lacho and C. Marinello, How Small Business Owners Can Use Social Networking to Promote Their Business, Entrepreneurial Executive, vol. 15, (2010), pp [7] M. A. Cusumano, Technology Strategy and Management: Platform Wars Come to Social Media, Communications of the ACM, vol. 54, no. 4, (2011), pp [8] Cisco, Social Media: Cultivate Collaboration and Innovation, white paper, Cisco Inc., (2010). [9] C. Sturdevant, Socializing the Enterprise, eweek, vol. 28, no. 1, (2011), pp [10] P. Gupta and H. Carpenter, Enterprise wide Social Networking Business Intelligence, Siliconindia, vol. 12, no. 3, (2009), pp [11] M. Beckman, Enterprise Security vs. Social Media, System inews, (2010) September, pp [12] T. Saaty, Decision making with the analytic hierarchy process, International Journal of Services Sciences, vol. 1, no. 1, (2008), pp [13] M. Farrokh, Evaluation and selection of an antivirus and content filtering software, Information Management & Computer Security, vol. 10, no. 1, (2002), pp [14] L. Bodin, L. Gordon and M. Loeb, Evaluating information security investments using the analytic hierarchy process, Communications of the ACM, vol. 48, no. 2, (2005), pp [15] S. Kim and H. Lee, A study on decision consolidation methods using analytic models for security systems, Computers & Security, vol. 26, no. 2, (2007), pp [16] T. Scholtz, The structure and content of information security architecture, Report, (2008). [17] J. Wright and J. Harmening, Security Management Systems: Security Controls, In Vacca, J. (Ed.), Computer and Information Security Handbook (2009), Boston, MA: Morgan Kaufmann Publishers. [18] NIST, Recommended Security Controls for Federal Information Systems and Organizations. NIST Special Publication Rev.3, Appendix D, Gaithersburg, MD: National Institute of Standards and Technology, (2009). Hak J. Kim Authors He is an associate professor of the Department of Information Technology and Quantitative Methods (ITQM) in the Zarb School of Business at the Hofstra University. He received his Ph.D. in Information Science from the University of Pittsburgh, a Master's degree in Telecommunications from the University of Colorado, Boulder, and a Bachelor's degree in Business Administration from Korea University. Prior to beginning his academic career, he worked for 6 years in telecom industry as research engineer. His main research areas are social network services in mobile networks, cyberspace and cyber security, radio frequency identification (RFID) in Hospital, and so on. 18
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Security Defense Strategy Basics
Security Defense Strategy Basics Joseph E. Cannon, PhD Professor of Computer and Information Sciences Harrisburg University of Science and Technology Only two things in the water after dark. Gators and
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
Cybersecurity: What CFO s Need to Know
Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction
Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1
APPENDIX A Appendix A Learning Continuum A-1 Appendix A Learning Continuum A-2 APPENDIX A LEARNING CONTINUUM E D U C A T I O N Information Technology Security Specialists and Professionals Education and
UF IT Risk Assessment Standard
UF IT Risk Assessment Standard Authority This standard was enacted by the UF Senior Vice President for Administration and the UF Interim Chief Information Officer on July 10, 2008 [7]. It was approved
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
CORE Security and GLBA
CORE Security and GLBA Addressing the Graham-Leach-Bliley Act with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected] www.coresecurity.com
How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device
Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security
Cybersecurity for the C-Level
Cybersecurity for the C-Level Director Glossary of Defined Cybersecurity Terms A Active Attack An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources,
Information Technology Risk Management
Find What Matters Information Technology Risk Management Control What Counts The Cyber-Security Discussion Series for Federal Government security experts... by Carson Associates your bridge to better IT
SECURITY CONSIDERATIONS FOR LAW FIRMS
SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,
Cyber Security Awareness
Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms
Certified Secure Computer User
Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications
Thomas K. Lee, Executive Director/CIO Human Resources Department (518) 447-2906 Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) The New York State
Top 10 Tips to Keep Your Small Business Safe
Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,
The Hidden Dangers of Public WiFi
WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect
Enterprise Computing Solutions
Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions Security Solutions arrow.com Security Solutions Secure the integrity of your systems and data today with the one company
Is Your IT Environment Secure? November 18, 2015. Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting
Is Your IT Environment Secure? November 18, 2015 Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting Clark Schaefer Consulting Serving elite and emerging companies with practical solutions
Attack Intelligence: Why It Matters
Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 [email protected] www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
Cybersecurity Definitions and Academic Landscape
Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: [email protected]
CYBERSPACE SECURITY CONTINUUM
CYBERSPACE SECURITY CONTINUUM A People, Processes, and Technology Approach to Meeting Cyber Security Challenges in the 21 st Century 1 InterAgency Board 1550 Crystal Drive Suite 601, Arlington VA 22202
Fujitsu s Approach to Cloud-related Information Security
Fujitsu s Approach to Cloud-related Information Security Masayuki Okuhara Takuya Suzuki Tetsuo Shiozaki Makoto Hattori Cloud computing opens up a variety of possibilities but at the same time it raises
Principles of Information Security, Fourth Edition. Chapter 12 Information Security Maintenance
Principles of Information Security, Fourth Edition Chapter 12 Information Security Maintenance Learning Objectives Upon completion of this material, you should be able to: Discuss the need for ongoing
Potential Security Vulnerabilities of a Wireless Network. Implementation in a Military Healthcare Environment. Jason Meyer. East Carolina University
Potential Security Vulnerabilities of a Wireless Network Implementation in a Military Healthcare Environment Jason Meyer East Carolina University Abstract This paper will look into the regulations governing
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Improved Security Required for DHS Networks (Redacted) Notice: The Department of Homeland Security, Office of Inspector General, has redacted
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen 14th Annual Risk Management Convention New York, New York March 13, 2013 Today s Presentation 1)
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
Security Practices for Online Collaboration and Social Media
Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.
Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:
Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services
A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014
A Small Business Approach to Big Business Cyber Security Brent Bettis, CISSP 23 September, 2014 1 First, a Video http://www.youtube.com/watch?v=cj8wakqwlna 2 3 Agenda Threat Landscape Strategic Initiatives
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Certified Secure Computer User
Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
Cyber Security Awareness
Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
8070.S000 Application Security
8070.S000 Application Security Last Revised: 02/26/15 Final 02/26/15 REVISION CONTROL Document Title: Author: File Reference: Application Security Information Security 8070.S000_Application_Security.docx
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems
GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used
Appendix A. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved.
Appendix A Cyber Security 1 Copyright 2012, Oracle and/or its affiliates. All rights Overview This lesson covers the following topics: Define cyber security. List the risks of cyber security. Identify
Cyber Security Solutions:
ThisIsCable for Business Report Series Cyber Security Solutions: A Sampling of Cyber Security Solutions Designed for the Small Business Community Comparison Report Produced by BizTechReports.com Editorial
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Factors Affecting the Online Transactions in the Developing Countries: A Case of E-Commerce Businesses in Nairobi County, Kenya
Factors Affecting the Online Transactions in the Developing Countries: A Case of E-Commerce Businesses in Nairobi County, Kenya Paul Muriku Kanyaru 1 and Josphat K. Kyalo 2 1 BSC [Computer Science], MBA
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
UF Risk IT Assessment Guidelines
Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
INFORMATION TECHNOLOGY POLICY
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT OF PUBLIC WELFARE INFORMATION TECHNOLOGY POLICY Name Of : DPW Information Security and Privacy Policies Domain: Security Date Issued: 05/09/2011 Date Revised: 11/07/2013
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
By David G. Holmberg, Ph.D., Member ASHRAE
The following article was published in ASHRAE Journal, November 2003. Copyright 2003 American Society of Heating, Refrigerating and Air-Conditioning Engineers, Inc. It is presented for educational purposes
CPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How Network Security Is Breached Network Security Policy
How To Secure Your Store Data With Fortinet
Securing Wireless Networks for PCI Compliance Using Fortinet s Secure WLAN Solution to Meet Regulatory Requirements Introduction In the wake of many well-documented data breaches, standards such as the
Mobile Devices and Malicious Code Attack Prevention
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Malicious Code and Mobile Devices: Best Practices for Securing Mobile Environments Sponsored
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Excerpt of Cyber Security Policy/Standard S05-001. Information Security Standards
Excerpt of Cyber Security Policy/Standard S05-001 Information Security Standards Issue Date: April 4, 2005 Publication Date: April 4, 2005 Revision Date: March 30, 2007 William F. Pelgrin Director New
WHITE PAPER. Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology
WHITE PAPER Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology Table of Contents Overview 3 HIPAA & Retina Enterprise Edition 3 Six Steps of Vulnerability Assessment & Remediation
Information Security. Be Aware, Secure, and Vigilant. https://www.gosafeonline.sg/ Be vigilant about information security and enjoy using the internet
Be Aware, Secure, and Vigilant Information Security Use the Internet with Confidence Be vigilant about information security and enjoy using the internet https://www.gosafeonline.sg/ The Smartphone Security
Cyber Security Competency Center
Cyber Security Competency Center Overview February 2014 1 Overview As data and information have become intertwined with our daily life; they can be fairly regarded as the top asset of companies around
Post-Access Cyber Defense
Post-Access Cyber Defense Dr. Vipin Swarup Chief Scientist, Cyber Security The MITRE Corporation November 2015 Approved for Public Release; Distribution Unlimited. 15-3647. 2 Cyber Security Technical Center
Fundamentals of Network Security - Theory and Practice-
Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring
AUTHORED BY: George W. Gray CTO, VP Software & Information Systems Ivenix, Inc. ADDRESSING CYBERSECURITY IN INFUSION DEVICES
AUTHORED BY: George W. Gray CTO, VP Software & Information Systems Ivenix, Inc. ADDRESSING CYBERSECURITY IN INFUSION DEVICES INTRODUCTION Cybersecurity has become an increasing concern in the medical device
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.
TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Microsoft Security Intelligence Report volume 7 (January through June 2009)
Microsoft Security Intelligence Report volume 7 (January through June 2009) Key Findings Summary Volume 7 of the Microsoft Security Intelligence Report provides an in-depth perspective on malicious and
Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
Enterprise Risk Management taking on new dimensions
Enterprise Risk Management taking on new dimensions October 2006 The practice of Enterprise Risk Management (ERM) is becoming more critical and complex every day. There is a growing need for organizations
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"
To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: [email protected] Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
