Result of the Attitude Survey on Information Security

Size: px
Start display at page:

Download "Result of the Attitude Survey on Information Security"

Transcription

1 Presentation Result of the Attitude Survey on Information Security Conducted toward the companies Operating in Thailand February, 2009 Center of the International Cooperation for Computerization of Japan 1

2 About the Survey The survey period : Oct. Nov Target organizations: Companies in Thailand Number of answers received : 512 2

3 Agenda 1. About the Company Profile of the survey 2. The Current Situation of the Information Security Management 3. Recommended Security Controls 3

4 1. About the Company Profile of the Survey 1.1 About the company profile 1.2 About IT system of the companies 4

5 1.1 About the company profile The companies originally coming from A. Local (include majority of JV) :296 B. Japan (include majority of JV) :153 C. Other Asian (include majority of JV) :17 D. America or Europe (include majority of JV) : 38 E. Other country (include majority of JV) : 6 D, 7% E, 1% C, 3% B, 30% A, 58% A B C D E 5

6 1.1 About the company profile The ratio of security vendor, IT vendor, and company using IT A. Company specializing in providing security-related related products or services B. Company specializing in providing IT products or services C. Company using IT A, 3% B, 22% A B C C, 75% 6

7 1.1 About the company profile Number of employee that companies own A. 20 or less B. 21 to 50 9% 10% Small C. 51 to % Medium D. 101 to % The ratio of large, medium, and small sized companies E. 301 to 1,000 27% F. 1,001 to 5,000 G. 5,001 or more 6% 12% Large Small, 19% 0% 5% 10% 15% 20% 25% 30% Large, 44% Small Medium Large Medium, 37% 7

8 1.1 About the company profile The ratio of large, medium, and small sized companies comparing with the number of their administrator LARGE sized companies 1% 17% 81% MEDIUM sized companies 18% 39% 44% A. Have full-time administrators B. Administrators are double as other post C. None SMALL sized companies 19% 33% 47% 0% 20% 40% 60% 80% 100% 8

9 1.1 About the company profile The ratio of large, medium, and small sized companies comparing with the custom of password changing Servers Password Clients Password 58% 57% LARGE sized companies 10% 30% LARGE sized companies 4% 36% 2% 3% MEDIUM sized companies 3% 13% 35% 49% A. Change them frequently B. Use passwords, but do MEDIUM not change sized C. companies Passwords are shared 9% among members D. Not use 11% 29% 50% A. Change them frequently B. Use passwords, but do not change C. Passwords are shared among members D. Not use 16% 16% SMALL sized companies 16% 56% SMALL sized companies 6% 54% 13% 24% 0% 20% 40% 60% 80% 0% 10% 20% 30% 40% 50% 60% 9

10 1.1 About the company profile The ratio of large, medium, and small sized companies comparing with the physical security control LARGE sized companies 14% 19% 30% 37% MEDIUM sized companies 6% 21% 22% 51% A. Use biometrics B. Use ID cards C. Other D. Not controlled SMALL sized companies 2% 13% 13% 72% 0% 10% 20% 30% 40% 50% 60% 70% 80% 10

11 1.1 About the company profile The ratio of large, medium, and small sized companies comparing with establishing their information security policy LARGE sized companies 2% 14% 21% 64% A. Established MEDIUM sized companies 6% 27% 26% 41% B. Planning C. Have no plan, but understand it is important D. Not necessary SMALL sized companies 22% 18% 18% 42% 0% 10% 20% 30% 40% 50% 60% 70% 11

12 1.2 About IT system of the companies Do you have servers in place? No servers, 10% Have their own servers No servers Have their own servers, 90% 12

13 1.2 About IT system of the companies The location of their servers In-house 93% External sites in domestic 16% External sites in overseas 11% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 13

14 1.2 About IT system of the companies The methods of control to enter or exit of the rooms where important equipment such as servers and storages installed A. Use biometrics 9% B. Use ID cards 28% C. Other 25% D. Not controlled 41% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 14

15 1.2 About IT system of the companies Threat due to lack of physical security is still high in Japan Cause of Security Incidents Internal dishonest act 0.9% Taking out without allow 7.9% Loss or Mislay 20.5% Virus 8.3% Lack of Control 20.4% Theft 16.6% Operation Error 18.2% Source: Information Security Incident Survey Japan Network Security Association 15

16 1.2 About IT system of the companies How many client PCs are installed approximately? Client PCs (Average) LARGE sized companies 15% 10% 23% 20% 33% MEDIUM sized companies 3% 0% 17% 31% 49% 49 or less clients 50 to 99 clients 100 to 299 clients 300 to 999 clients 1000 or more clients SMALL sized companies 2% 0% 1% 2% 95% 0% 20% 40% 60% 80% 100% 16

17 1.2 About IT system of the companies About client PCs Which OS are used in the client PCs? Windows 98 17% Windows ME 5% Windows 2000 Windows Vista 25% 26% Windows XP 94% Mac OS 4% Linux 10% Other 4% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 17

18 1.2 About IT system of the companies About Firewall installation Servers with Firewall installed Clients with Personal Firewall No, 12% Yes No Yes, 88% 18

19 1.2 About IT system of the companies 95% of companies use Windows XP. They don t install personal firewall? Anti-Virus Firewall Windows Firewall (the control panel of Windows XP) 19

20 1.2 About IT system of the companies About applying security patch If the Windows Update or new version is released, are they installed? Servers with security patch Clients with security patch No, 22% Yes, 78% Yes No No, 30% Yes, 70% Yes No 20

21 1.2 About IT system of the companies The problem is that security and IT vendor are not fully controlled. led. There is a result that their security situation is worse than general company using IT. Servers with security patch A. Company specializing in providing security-related products or services 30% 70% B. Company specializing in providing IT products or services 14% 86% If the Windows Update or new version is released, they are installed If the Windows Update or new version is released, they are NOT installed C. Company using IT 23% 77% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Clients with security patch A. Company specializing in providing security-related products or services 31% 69% B. Company specializing in providing IT products or services 17% 83% If the Windows Update or new version is released, they are installed If the Windows Update or new version is released, they are NOT installed C. Company using IT 33% 67% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 21

22 1.2 About IT system of the companies If applying the security patches are delayed, the possibility of security incident will be higher. Infection rate You would be infected with a virus You could protect from virus Security patch released Epidemic (Virus) Time 22

23 1.2 About IT system of the companies About the policy of using password A. Change them frequently B. Use passwords, but do not change C. Passwords are shared among members D. Not use Servers with the password Clients with the password C, 12% D, 4% C, 7% D, 10% A, 43% A, 39% B, 41% B, 44% 23

24 1.2 About IT system of the companies Hacker can easily decode your password if they have some time. With 1,000,000 attacks per second.the problem is CPU will be still faster. 6 Characters 7 Characters 8 Characters Alphabet Only 5 minutes 2 hours 2.4 days Alphabet +Number 36 minutes 22 hours 32 days Alphabet +Number +Symbol 27 hours 78 days 14 years 24

25 1.2 About IT system of the companies Strong Password A lot of characters (Ex. 8 characters) Difficult to guess Using Alphabet and Number at the same time Using Capital and Small letters at the same time Using Symbolic letters (Ex. #, $, %, &) Weak Password The same of user ID Easy to guess (Ex. Birthday, Telephone number) A few characters Not Changing frequently 25

26 1.2 About IT system of the companies About servers Are the routines to synchronize the correct date and time in all systems installed? A. Yes B. No B, 29% A B A, 71% 26

27 1.2 About IT system of the companies About servers Are the logging facilities or logging tools installed? A. Yes B. No B, 23% A B A, 77% 27

28 1.2 About IT system of the companies In order to get effective logs chasing attacker, those time stamps must be accurate. They includes network facilities like Gateway, Firewall, IDS, and several kind of servers. You might be able to get evidence where the attacker come from, when he crack the server, and how it is like.. etc. Internet Attacker Attack Route External network Mobile Gateway Attacker s Logs WEB Attack Internal Network FW IDS DNS Mail DMZ Internal Server Clients Wireless LAN 28

29 2. The Current Situation of the Information Security Management 2.1 About company's attitude to the information security management 2.2 About information security policy 2.3 Measures against threats to information 2.4 Others 29

30 2.1 About company's attitude to the information security management ent Do you have something to worry about information security measure? A. Nothing 16% B. Loss or leak of in-house information (trade secrets, personal information and so on) 61% C. Loss or leak of information (trade secrets, personal information and so on) that you received from your business partner (company that outsourced its job to your company) 38% D. Your business partner (your outsourcer) is making (or likely to make) strenuous demands on your company regarding information security measures. 16% E. Loss or leak of information (trade secrets, personal information and so on) that you gave to your business partner (company that outsourced its job to your company) 30% F. Loss of information you hold due to system failure or other accidents 57% G. Negative effects on your business that can be brought by system halt 43% H. Failure of remote application services (SaaS (Software as a Service), ASP and so on) or leak of information through the failure of those services 18% I. Other things to worry 3% 0% 10% 20% 30% 40% 50% 60% 70% 30

31 2.1 About company's attitude to the information security management ent Cause of Security Incidents with the number of personal information leakage in Japan Internal dishonest act 1,234,700 Lack of Control 114,400 Hacking 23,500 According to Cause of Security Incidents, Internal dishonest act accounts for only 0.9%. Comparing with the report, the fact explains that the damage of internal dishonest act becomes extremely high. Bug 19,900 Taking out without allow 9,900 Source: Information Security Incident Survey Japan Network Security Association 31

32 2.1 About company's attitude to the information security management ent What do you think is the challenge for your company in implementing information security? A. No problem 18% B. High installation cost of security-related software and hardware products 57% C. Cannot afford personnel in charge of implementing security measures 17% D. Have no personnel specializing in information security 38% E. Because operation and maintenance control of internal system is outsourced to external company, security measures are not actively implemented by employees within your company 13% F. Difficult to confirm the implementation status of security measures undertaken by the external company where you outsource your job. 17% G. Management is scarcely aware of the need of information security 16% H. Do not know what measures should be taken as regards information security 15% I. Other elements 3% 0% 10% 20% 30% 40% 50% 60% 32

33 2.1 About company's attitude to the information security management ent the total expenditure of information technology for a company in Japan Exchanges Rate 0.39 THB = 1 JPY, Jan Not answered 17.9% Less than 20,000, % More than 400,000, % 20,000,000~ 49,999, % 100,000,000~ 399,999, % 50,000,000~ 99,999, % Source: Information Security Incident Survey IPA 33

34 2.1 About company's attitude to the information security management ent What do you think is necessary for implementing appropriate information security measures? A. Guideline on minimum-required security measures 62% B. Best practices of security measures that are being implemented by other companies in the similar industry and similar size C. Check list on information security measures that can be used to satisfy requests from multiple companies that outsourced their job to your company D. Self-assessment tool that can be used to diagnose where the problems lie within security measures 33% 52% 50% E. Guide on how to make information-security-related technical settings on major software products 44% F. Educational materials on information security that are targeted for your employees 46% G. Others 1% 0% 10% 20% 30% 40% 50% 60% 70% 34

35 2.1 About company's attitude to the information security management ent Recognition on guideline for protection against computer virus in i Japan Not sure 1.0% Understand 7.1% Don t Know 36.5% Read 22.4% Know it 33.0% Source: Information Security Incident Survey IPA 35

36 2.1 About company's attitude to the information security management ent What are the ways for staff training on information security? Internal training External training Seminar None Persons in charge of information security 42% 61% 51% 14% General staff 62% 12% 16% 22% 36

37 2.2 About information security policy Does your company establish information security policy? A. Yes B. Planned C. Have no plan, but understand it is important D. Not necessary D, 6% C, 23% A, 48% A B C D B, 23% 37

38 2.2 About information security policy What are the reference rules to make your information security policy? A. ISO/IEC 27001(ISMS requirements specification (used for certification)) 15% B. ISO/IEC Code of Practice (pragmatic ISMS advice) 10% C. National standard or national guideline 30% D. Standard of IT vendors 17% E. Measures that are requested by the business partner 11% F. Company s own rule 64% G. Other 10% 0% 10% 20% 30% 40% 50% 60% 70% 38

39 2.2 About information security policy How does your company treat a staff who offences the security policy? A. Punish the person as explicitly described in the security policy 18% B. Punish the person based on the company's general rules 45% C. A supervisor warns the person 32% D. Don't do anything special 5% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 39

40 2.3 Measures against threats to information If an incident of the information security occurs, to whom do you report to? A. ThaiCERT (in Thailand) 7% B. IT vendor 24% C. Management top in the company 49% D. Do not report especially 2% E. Other 5% 0% 10% 20% 30% 40% 50% 60% 40

41 2.3 Measures against threats to information Do you know the police unit responsible for computer crime A. Yes B. No B, 39% A, 61% A B 41

42 2.3 Measures against threats to information Were there any information security problems in the company? A. Yes B. No C. Not sure C, 29% A, 21% A B C B, 49% 42

43 2.3 Measures against threats to information What type of incident was it? A. System holt that caused stoppage in business operation and services 14% B. Unauthorized access (such as defacing web pages) 8% C. Leak of information 11% D. Infected by virus or spyware 41% E. Other 2% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 43

44 2.3 Measures against threats to information Experience about computer virus Not Answer 0.6% Infected by virus 12.4% Never found virus nor infected 41.6% Found virus but not infected 45.4% Source: Information Security Incident Survey IPA 44

45 2.3 Measures against threats to information If a company staff takes out files in the mobile PC or USB memory, how does your company handle it? A. Allow if they are encrypted 12% B. Require password authentication when they are opened 15% C. No any special control 56% D. Others 15% 0% 10% 20% 30% 40% 50% 60% 45

46 2.3 Measures against threats to information Cause of Security Incidents with the number of personal information ion leakage in Japan by media/ channel in Japan Because of the big incident (14,430,000) Normally media like USB is the most dangerous cause in Japan PC 790,000 Other 40,000 Not sure 320,000 Document 16,950,000 (2,520,000) Media like USB 11,810,000 Source: Information Security Incident Survey Japan Network Security Association 46

47 2.4 Others Relation with business partners Has your company checked with business partners about their status of information security measures? A. Yes B. No A, 30% A B B, 70% 47

48 2.4 Others Relation with business partners Have your business partners checked with your company about your status of information security measures? A. Yes B. No A, 35% A B B, 65% 48

49 2.4 Others Cause of Security Incidents by channel in Japan Person s own PC 60.5% Business Partner 31.6% retired employee or ex-partner 13.2% Company s own PC 2.6% Other 5.3% Source: The report about information security governance - Ministry of Economy, Trade and Industry 49

50 2.4 Others Evaluation method for the company status of information security In Japan, benchmark testing method is established and open to public. Companies are able to assess their own security level and it is free of charge. Do you want to receive such benchmark testing if it is made available in your country? A. Yes B. Want to know about it more C. Not necessary D. Not interested C, 8% D, 7% A, 26% A B C D More than 85% of companies are interested in security benchmark testing B, 59% 50

51 2.4 Others CSIRT (Computer Security Incident Response Team) is an organization to deal with information security incidents. Recently company s s own CSIRT becomes famous managing these incidents inside and outside of the company. What do you think of company's own CSIRT? More than 70% of companies think CSIRT is necessary A. Already have Company's own CSIRT 19% B. Planning 16% C. Necessary, but not planning 38% D. No Need 27% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 51

52 About CSIRT National CSIRT Dealing with information security incidents National CSIRT Dealing with information security incidents Internet Dealing with information security incidents Internal CSIRT National CSIRT Account Section Sales Section Executive Section Attack 52

53 3. Recommended Security Controls Physical Security For example.. Make clear rules how to deal with physical security area Make appropriate entry controls to ensure that only authorized personnel are allowed access Recognize your staff from the outside Record logs when they come in/ out in your office Source: Benchmark of Information Security Control - IPA 53

54 3. Recommended Security Controls Human resources Security For example.. Make clear sense of responsibility they have to realize Contract confidentiality agreements Make a formal discipline for employees who have break your security rules Return all of their assets including IDs and remove all of access light when employee retire Source: Benchmark of Information Security Control - IPA 54

55 3. Recommended Security Controls System Security For example.. Make clear security requirements for information facilities and systems Monitor system activities and review regularly Get security related logs Protect logging facility and log information Synchronize the clock of all relevant information processing systems with an accurate time source Source: Benchmark of Information Security Control - IPA 55

56 Thank you! ขอบค ณคร บ 56

Network Security Survey of Small Businesses

Network Security Survey of Small Businesses Network Security Survey of Small Businesses July 2006 Copyright All Covered Inc. www.allcovered.com Executive Summary Most small businesses now make use of a network of PCs and servers to run their operations.

More information

Computer Crime & Security Survey

Computer Crime & Security Survey 4 th Japan & US Computer Crime & Security Survey Katsuya Uchida Professor, Ph. D. Institute of Information Security uchida@iisec.ac.jp Graduate School of Information Security 1 Respondents by Number of

More information

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited Practice Good Enterprise Security Management Presented by Laurence CHAN, MTR Corporation Limited About Me Manager Information Security o o o o Policy formulation and governance Incident response Incident

More information

Technical Standards for Information Security Measures for the Central Government Computer Systems

Technical Standards for Information Security Measures for the Central Government Computer Systems Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...

More information

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...

More information

Countermeasures against Unauthorized Access

Countermeasures against Unauthorized Access Countermeasures against Unauthorized Access Is your computer really safe? For PC Users Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ What is Unauthorized Access?

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

Developing Network Security Strategies

Developing Network Security Strategies NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network

More information

NETWORK SECURITY GUIDELINES

NETWORK SECURITY GUIDELINES NETWORK SECURITY GUIDELINES VIRUS PROTECTION STANDARDS All networked computers and networked laptop computers are protected by GST BOCES or district standard anti-virus protection software. The anti-virus

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous

More information

Hengtian Information Security White Paper

Hengtian Information Security White Paper Hengtian Information Security White Paper March, 2012 Contents Overview... 1 1. Security Policy... 2 2. Organization of information security... 2 3. Asset management... 3 4. Human Resources Security...

More information

Paul Nguyen. 2014 CSG Interna0onal

Paul Nguyen. 2014 CSG Interna0onal Paul Nguyen 2014 CSG Interna0onal Security is Top- of- Mind Everywhere High- profile breaches: 2K+ breaches expose nearly 1B records in 2013 Increased regulatory pressure State- sponsored hacking around

More information

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current

More information

Information Disclosure Guidelines for Safety and Reliability of IaaS / PaaS

Information Disclosure Guidelines for Safety and Reliability of IaaS / PaaS Information Disclosure Guidelines for Safety and Reliability IaaS / PaaS Condition 1: Objective information disclosure Information disclosure would be made in a unit each IaaS/PaaS. Condition 2: Definition

More information

Countermeasures against Spyware

Countermeasures against Spyware (2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?

More information

Quarantine Network for Specialised Equipment.

Quarantine Network for Specialised Equipment. Quarantine Network for Specialised Equipment. Using Remote Desktop to get data in and out of the quarantine network V1.2 It is now possible to connect through a gateway or terminal server to PCs connected

More information

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Information Security in Universities

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Information Security in Universities Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Information Security in Universities Agenda Information Security Management in Universities Recent

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Guidelines for Website Security and Security Counter Measures for e-e Governance Project and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

Input and Output of ISM-Benchmark

Input and Output of ISM-Benchmark Information Security Measures Benchmark (ISM-Benchmark) Ms. Yasuko Kanno, Chief Advisor, IT Security Center, Information-technology Promotion Agency (IPA) Japan Abstract This paper presents introduction

More information

How To Manage Your Information Systems At Aerosoft.Com

How To Manage Your Information Systems At Aerosoft.Com Your information systems are at the heart of your businesses daily operation. System down time costs businesses a significant amount of money each year. Most problems that cause down time can be prevented

More information

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration Linux Server Support by Applied Technology Research Center Proxy Server Configuration We configure squid for your LAN. Including transparent for HTTP and proxy for HTTPS. We also provide basic training

More information

The Ministry of Information & Communication Technology MICT

The Ministry of Information & Communication Technology MICT The Ministry of Information & Communication Technology MICT Document Reference: ISGSN2012-10-01-Ver 1.0 Published Date: March 2014 1 P a g e Table of Contents Table of Contents... 2 Definitions... 3 1.

More information

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord Building The Human Firewall Andy Sawyer, CISM, C CISO Director of Security Locke Lord Confidentiality, Integrity, Availability Benchmarks of Cybersecurity: Confidentiality Information is protected against

More information

How are we keeping Hackers away from our UCD networks and computer systems?

How are we keeping Hackers away from our UCD networks and computer systems? How are we keeping Hackers away from our UCD networks and computer systems? Cybercrime Sony's Hacking Scandal Could Cost The Company $100 Million - http://www.businessinsider.com/sonys-hacking-scandal-could-cost-the-company-100-million-2014-12

More information

Information Technology Cyber Security Policy

Information Technology Cyber Security Policy Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please

More information

Online Banking Fraud Prevention Recommendations and Best Practices

Online Banking Fraud Prevention Recommendations and Best Practices Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

Reliance Bank Fraud Prevention Best Practices

Reliance Bank Fraud Prevention Best Practices Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

Computer Crime & Security Survey

Computer Crime & Security Survey 3 rd Japan & US Computer Crime & Security Survey Katsuya Uchida Associate Professor Institute of Information Security uchidak@gol.com Graduate School of Information Security Intentionally blank Respondents

More information

Information Security Report 2014

Information Security Report 2014 Information Security Report 2014 NEC s Approach to Information Security The NEC Group positions information security as an important management activity in our efforts to create new values through Solutions

More information

Network/Cyber Security

Network/Cyber Security Network/Cyber Security SCAMPS Annual Meeting 2015 Joe Howland,VC3 Source: http://www.information-age.com/technology/security/123458891/how-7-year-old-girl-hacked-public-wi-fi-network-10-minutes Security

More information

How To Protect Information Security In Japanese Government Computers

How To Protect Information Security In Japanese Government Computers Study on the Current Situation of Information Security in Cambodia Hitoshi ARAKI JICA Expert Needs of Information Security Use of the Internet is essential and indispensable for any business nowadays;

More information

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING 6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information

More information

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security.

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security. Applying the 80/20 approach for Operational Excellence How to combat new age threats, optimize investments and increase security Vinod Vasudevan Agenda Current Threat Landscape The 80/20 Approach Achieving

More information

INFORMATION SECURITY BASICS. A computer security tutorial for Holyoke Community College

INFORMATION SECURITY BASICS. A computer security tutorial for Holyoke Community College INFORMATION SECURITY BASICS A computer security tutorial for Holyoke Community College I NTRODUCTION This tutorial provides some basic information and practical suggestions for protecting your personal

More information

MAXIMUM PROTECTION, MINIMUM DOWNTIME

MAXIMUM PROTECTION, MINIMUM DOWNTIME MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is

More information

TIPS IN PREVENTING INFORMATION LEAKAGE

TIPS IN PREVENTING INFORMATION LEAKAGE TIPS IN PREVENTING INFORMATION LEAKAGE 1 Presented by Christina Keing and Frankie Fu Information Security Section (ISS), ITSC 5 Sept 2008 AIMS 2 AGENDA Recent incidents What information to protect? How

More information

2012 NCSA / Symantec. National Small Business Study

2012 NCSA / Symantec. National Small Business Study 2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National

More information

05.118 Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

05.118 Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013 05.118 Credit Card Acceptance Policy Authority: Vice Chancellor of Business Affairs History: Effective July 1, 2011 Updated February 2013 Source of Authority: Office of State Controller (OSC); Office of

More information

Agnitum SMB Solutions. Outpost Network Security Version 3.2 Securing your network

Agnitum SMB Solutions. Outpost Network Security Version 3.2 Securing your network Agnitum SMB Solutions Outpost Network Security Version 3.2 Securing your network November 2011 Contents Outpost Network Security 3.2 1. IT threats landscape 2. Solution at a glance 3. Key benefits 4. Why

More information

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations

More information

Keystroke Encryption Technology Explained

Keystroke Encryption Technology Explained Keystroke Encryption Technology Explained Updated February 9, 2008 information@bluegemsecurity.com (800) 650-3670 www.bluegemsecurity.com Executive Summary BlueGem Security is introducing keystroke encryption

More information

Common Remote Service Platform (crsp) Security Concept

Common Remote Service Platform (crsp) Security Concept Siemens Remote Support Services Common Remote Service Platform (crsp) Security Concept White Paper April 2013 1 Contents Siemens AG, Sector Industry, Industry Automation, Automation Systems This entry

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

RightNow November 09 Workstation Specifications

RightNow November 09 Workstation Specifications RightNow November 09 Workstation Specifications This document includes the workstation specifications required for using RightNow November 09. Additional requirements for Outlook Integration, RightNow

More information

Council/ Community Board/ Council Subcommittee/ Board Committee. Medium

Council/ Community Board/ Council Subcommittee/ Board Committee. Medium COVER SHEET Subject IT SECURITY Author Deidre Butler Typed by Harma Freese Submitted to Council/ Community Board/ Council Subcommittee/ Board Committee Name of Board/ Committee/ Subcommittee Audit & Risk

More information

NETWORK AND INTERNET SECURITY POLICY STATEMENT

NETWORK AND INTERNET SECURITY POLICY STATEMENT TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB NETWORK AND INTERNET SECURITY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004

More information

Managing internet security

Managing internet security Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further

More information

Survey on Information Security Countermeasures in Organizations

Survey on Information Security Countermeasures in Organizations Survey on Information Security Countermeasures in Organizations Implementation date: November 2008 Research Representative: Toshihiko Takemura (Postdoctral fellow, Research Center of Socionetwork Strategies,

More information

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination

More information

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security Chapter 12 Network Security Security Policy Life Cycle A method for the development of a comprehensive network security policy is known as the security policy development life cycle (SPDLC). Network Security

More information

mbank Introduces Personal Security Image MFA* for Consumer on-line banking *Multi-Factor Authentication

mbank Introduces Personal Security Image MFA* for Consumer on-line banking *Multi-Factor Authentication mbank Introduces Personal Security Image MFA* for Consumer on-line banking *Multi-Factor Authentication Enhanced security for your on-line banking activities. Beginning 24 January 2007 all mbank clients

More information

The Key to Secure Online Financial Transactions

The Key to Secure Online Financial Transactions Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Promoting Network Security (A Service Provider Perspective)

Promoting Network Security (A Service Provider Perspective) Promoting Network Security (A Service Provider Perspective) Prevention is the Foundation H S Gupta DGM (Technical) Data Networks, BSNL hsgupta@bsnl.co.in DNW, BSNL 1 Agenda Importance of Network Security

More information

What would you like to protect?

What would you like to protect? Network Security What would you like to protect? Your data The information stored in your computer Your resources The computers themselves Your reputation You risk to be blamed for intrusions or cyber

More information

System Security Policy Management: Advanced Audit Tasks

System Security Policy Management: Advanced Audit Tasks System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that

More information

Boston University Security Awareness. What you need to know to keep information safe and secure

Boston University Security Awareness. What you need to know to keep information safe and secure What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately

More information

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview Services > Overview MaaS360 Control Overview Control Over Endpoints Ensure that patches and security software on laptops and distributed PCs are always up to date. Restart applications automatically. Block

More information

Policing Together. A quick guide for businesses to Information Security and Cyber Crime

Policing Together. A quick guide for businesses to Information Security and Cyber Crime Policing Together A quick guide for businesses to Information Security and Cyber Crime This leaflet has been produced by the Surrey and Sussex Cyber Crime Unit Who is this leaflet for? This leaflet will

More information

Stable and Secure Network Infrastructure Benchmarks

Stable and Secure Network Infrastructure Benchmarks Last updated: March 4, 2014 Stable and Secure Network Infrastructure Benchmarks 501 Commons has developed a list of key benchmarks for maintaining a stable and secure IT Infrastructure for conducting day-to-day

More information

Frequently Asked Questions For Investors

Frequently Asked Questions For Investors Frequently Asked Questions For Investors 1. What is trade day (T) and settlement day (T+2)? Trade day (T) means a normal working day for securities trading under the regulation of stock exchange. To a

More information

Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014

Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014 Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014 Presented by Nicholas Davis, CISA, CISSP UW-Madison, Division of Information Technology

More information

Responsible Access and Use of Information Technology Resources and Services Policy

Responsible Access and Use of Information Technology Resources and Services Policy Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong

More information

Basic computer security

Basic computer security Mag. iur. Dr. techn. Michael Sonntag Basic computer security E-Mail: sonntag@fim.uni-linz.ac.at http://www.fim.uni-linz.ac.at/staff/sonntag.htm Institute for Information Processing and Microprocessor Technology

More information

Osterman Research Executive Summary

Osterman Research Executive Summary Osterman Research Executive Summary Report Focus Any email user, IT manager, CIO or network administrator will attest to the fact that threats introduced into an organization through the email system and,

More information

"Industry Side Views of cyber security in Japan"

Industry Side Views of cyber security in Japan "Industry Side Views of cyber security in Japan" Event 2: Cyber Security in East Asia and Policy Cooperation between Japan and the United States USJI-Week, September 7-10, 2010 US-Japan Research Institute

More information

Gabriel Coimbra Research & Consulting Director IDC Portugal. Porto, 29 de Maio 2008. www.idc.com

Gabriel Coimbra Research & Consulting Director IDC Portugal. Porto, 29 de Maio 2008. www.idc.com IT Security Market Overview Gabriel Coimbra Research & Consulting Director IDC Portugal Porto, 29 de Maio 2008 www.idc.com Agenda Market context IT Security context CSO Agenda IT Security market Conclusion

More information

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding

More information

Best Practices For Department Server and Enterprise System Checklist

Best Practices For Department Server and Enterprise System Checklist Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)

More information

IT@DUSON. IT Service Desk

IT@DUSON. IT Service Desk IT@DUSON Technology plays a key role in the learning process for nursing students at Duke. This is your guide to the technology used at the Duke School of Nursing and how to request assistance for all

More information

Business ebanking Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special

More information

Web Security School Final Exam

Web Security School Final Exam Web Security School Final Exam By Michael Cobb 1.) Which of the following services is not required to run a Windows server solely configured to run IIS and publish a Web site on the Internet? a. IIS Admin

More information

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

Name: Position held: Company Name: Is your organisation ISO27001 accredited: Third Party Information Security Questionnaire This questionnaire is to be completed by the system administrator and by the third party hosting company if a separate company is used. Name: Position held:

More information

ICANWK406A Install, configure and test network security

ICANWK406A Install, configure and test network security ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with

More information

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance

More information

HACKING RELOADED. Hacken IS simple! Christian H. Gresser cgresser@nesec.de

HACKING RELOADED. Hacken IS simple! Christian H. Gresser cgresser@nesec.de HACKING RELOADED Hacken IS simple! Christian H. Gresser cgresser@nesec.de Agenda About NESEC IT-Security and control Systems Hacking is easy A short example where we currently are Possible solutions IT-security

More information

Connecting to the Internet. LAN Hardware Requirements. Computer Requirements. LAN Configuration Requirements

Connecting to the Internet. LAN Hardware Requirements. Computer Requirements. LAN Configuration Requirements Connecting to the Internet LAN Hardware Requirements Computer Requirements LAN Configuration Requirements Installation Performed by Time Warner Cable Technician Connecting via Ethernet Connecting via USB

More information

An Introduction on How to Better Protect Your Computer and Sensitive Data

An Introduction on How to Better Protect Your Computer and Sensitive Data An Introduction on How to Better Protect Your Computer and Sensitive Data Common Security Problems Computer users who fail to use strong passwords Constant attacks by viruses, worms, key loggers and bots

More information

2011 NATIONAL SMALL BUSINESS STUDY

2011 NATIONAL SMALL BUSINESS STUDY 2011 NATIONAL SMALL BUSINESS STUDY The National Cyber Security Alliance has conducted a new study with Symantec to analyze cyber security practices, behaviors and perceptions of small businesses throughout

More information

Protect Web Sites from Cyber Attacks

Protect Web Sites from Cyber Attacks www.thales-esecurity.com Protect Web Sites from Cyber Attacks Henry Ng, CISSP-ISSAP CISA ISC2 Authorized Instructor Head of Consulting Services Thales e-security Jan 9, 2015 2 3 Lessons learnt The worst

More information

Coordinated Implementation of Facilities and Information Security Systems

Coordinated Implementation of Facilities and Information Security Systems Coordinated Implementation of Facilities and Information Security Systems HAYANO Shin-ichiro, TANIKAWA Tadashi, KITAKAZE Jiro Abstract In response to the increasing risk of information leakage, this paper

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

INCIDENT RESPONSE CHECKLIST

INCIDENT RESPONSE CHECKLIST INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged

More information

MANAGED WORKSTATIONS: Keeping your IT running

MANAGED WORKSTATIONS: Keeping your IT running MANAGED WORKSTATIONS: Keeping your IT running What state are your PCs in? Systems running slowly? PCs or laptops crashing for no reason? Too much time trying to resolve simple IT issues? Out-of-date software?

More information

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced

More information

ResNet Computer Consultant Job Description

ResNet Computer Consultant Job Description ResNet Computer Consultant Job Description Description: ResNet is the Internet Service Provider within the Residence Halls and Family and Graduate Housing at Montana State University. In addition to providing

More information

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15. NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities

More information

Business continuity. Protecting your systems in today s world

Business continuity. Protecting your systems in today s world Business continuity Protecting your systems in today s world Introduction Lee Drake, OS-Cubed, Inc. Contact: ldrake@os-cubed.com Phone: 585-756-2444 30 years of support LOL Cat warning Warning this presentation

More information

How to complete the Secure Internet Site Declaration (SISD) form

How to complete the Secure Internet Site Declaration (SISD) form 1 How to complete the Secure Internet Site Declaration (SISD) form The following instructions are designed to assist you in completing the SISD form that forms part of your Merchant application. Once completed,

More information

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html

More information

Introduction. PCI DSS Overview

Introduction. PCI DSS Overview Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,

More information

Security Management. Keeping the IT Security Administrator Busy

Security Management. Keeping the IT Security Administrator Busy Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching

More information

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information