Data Loss Prevention
|
|
|
- Dwayne Carson
- 10 years ago
- Views:
Transcription
1 Mag. iur. Dr. techn. Michael Sonntag Data Loss Prevention Institute for Information Processing and Microprocessor Technology (FIM) Johannes Kepler University Linz, Austria Michael Sonntag 2012
2 Agenda What is data loss prevention? Why is it needed? Simple DLP vs. working DLP How useful is it? Potential attacks: Simple Social engineering Where it is almost impossible to prevent Practical examples: Scanning s USB disk restrictions Michael Sonntag Data loss prevention 2
3 What is data loss prevention (DLP)? Prevent data from getting lost : Actually from disclosure Not: Backup, RAID, But: Encrypted storage, scanning all outgoing data, Prevent sensitive data from being exported out of the acceptable location to somewhere/someone else Typically: Prevent storing it on some kind of media and transporting it out of the company, sending it by , web, IM, P2P to the outside Requires and exact definition what is inside, who is authorized to do what with all kinds of data Typically additionally requires: Why, when, from where, how often, logging Other names: Data Information Loss Leak Leakage Prevention Protection Michael Sonntag Data loss prevention 3
4 What is data loss prevention (DLP)? One definition (Securosis): Products that, based on central policies, identify, monitor, and protect data at rest, in motion, and in use through deep content analysis Main aspects: Central policy: Organizational help» Everyone decides for him/herself, hopefully correctly is too error-prone! Data at rest, in motion, and in use» Examples: Incorrect server share/folder, sending as mail attachment, copying via the clipboard Content analysis» The system will identify data itself and not (solely) depend on the user marking it correctly Michael Sonntag Data loss prevention 4
5 Why DLP? Tipping off the press Scandals (environment, less pay for women, spying on employees, ) which might be illegal/immoral/bad publicity Espionage: Less by secret service but competitors Financial information, customer lists, blueprints, Legal requirements: Liability/sanctions on data loss Especially regarding military/state secrets Compliance rules (legal or contractual)» Health, financial (e.g. SOX, PCI-DSS) Data breach notification» USA, but Germany/Austria too; EU soon Michael Sonntag Data loss prevention 5
6 Main application areas Carelessness or ignorance Internal employees try to do something dangerous or forbidden, but don t know the rules, forgot,» DLP can be very helpful there, as no circumvention is tried! Internal attackers DLP may be useful, depending on the expertise Note: You must get it right fast, or trying will set off alarms External attackers DLP is probably not very useful, as they must have managed to get into your system already!» They might use the same way to get out, reconfigure or DLP, Even more dangerous: If the DLP is subverted, you get information where what confidential data exists, and the DLP might even help you collecting this data! Michael Sonntag Data loss prevention 6
7 Simple DLP Assign security permissions on files and assign users to groups who possess rights on them (or not) I.e., normal file server security Install software to scan all s for certain words Or compare attachments to internal documents Prohibit the use of portable media Note: E.g. ipod will often not be recognized as such a device! Ensure employees are not local administrators but normal users and that they cannot install software Use whole disk encryption on file servers Ensure temporary files are not created (or overwritten) All cameras/mobile phones with cameras must be handed in at the entrance Michael Sonntag Data loss prevention 7
8 and working DLP Computer &network security is a requirement Against the administrator there is little protection» Possible, but VERY complex and expensive Two persons required, hardware security modules, or similar! It must be absolutely impossible to install any (!) software Otherwise it could be some kind of encrypting SW! Any used media must be disposed of securely Any transmission must be encrypted Storage must be physically secure or (better: and) encrypted All persons must be identified, authorized, Problems: Huge effort required Difficult to cope with changes (new employees, changing area of work, teleworkers, mobile devices, ) False alarms or easy to subvert Michael Sonntag Data loss prevention 8
9 How useful is it? If DLP is very strict and therefore working, it is very intrusive Privacy concerns must be addressed ( work council)» Everything is monitored! If it hinders the work, it will be circumvented Where does it work well? Military-/Administration-type organizations» Clearly defined hierarchy» Clear division of duty, responsibilities, and permissions» Effective measures to enforce guidelines» Little importance for very quick and agile responses, but big focus on correct procedure» Static organization/work Time for THE solution Centralized data storage and processing» One big file server and server + dumb terminals Not required to work perfectly, just somehow Michael Sonntag Data loss prevention 9
10 Basic workflow Michael Sonntag Data loss prevention 10
11 Enforcing happens where? Numerous different devices to support Bring your own device is especially problematic! All avenues for extrusion must be covered E.g.: SMS gateways, printers, automated paper mail systems, backup (tape stealing), Endpoints Storage Servers Internet Gateway Additionally Mobile Print Server Mail Server Michael Sonntag Data loss prevention 11
12 DLP agents One important kind of DLP is agent-based On every client a watchdog software must be installed Alternative: On server/firewall/listening in the network» Problem: Things might already have happened; encryption» Useable only as an additional layer or enhancement Tasks of these agents: Document what was done with data Informing users through pop-ups (sensibilization) Request user credentials and confirmation Identify all data and assign it to policy classes Block all access to and all activities with data which are not explicitly allowed in the policy» Open file (embedding), write to new file, copy, move, drap&drop, cut&paste, screenshots, (simultaneously open text editor), Send alarms on detected misuse or attempts Automatically encrypt data if policy requires this Michael Sonntag Data loss prevention 12
13 Simple attacks (1) Use a custom encoding ( encryption with your own alg.) Unknown Cannot be scanned Note: This can be programmed by hand in short time and without compilers (need not be unbreakable )!» Office Macro changing e and n to e.g. q$2 and *xx Compress the file and give it a password Send it by mail/im/on disk/» Many protocols (e.g. Skype) allow embedded file transmission! Scanning the content is impossible without breaking the PW!» And preventing is hard (Skype) or undesirable (company use) Use hidden storage devices: USB sticks in toys, Relatively simple to prevent through blocking all USB devices (or only mass storage devices) Michael Sonntag Data loss prevention 13
14 Simple attacks Direct access to hardware: Remove disk from laptop Or replace it: Reinstall operating system Add new computer through your own switch/wlan Note: This is probably suspicious activity if good security is already in place! Use password/device/laptop borrowed from co-worker Password: Found under keyboard or just ask for it Use company laptop for family as well Bring your own keylogger Will copy everything you type Michael Sonntag Data loss prevention 14
15 Attacks: Social engineering Just ask for the password, e.g.: Here is the administrator. Because of a security problem on the mailserver we have to inspect all mail accounts. You must give me your password, or your account will be locked. Create a sweepstake site and ask for users to register» The password will probably be used somewhere else too! Does work astonishingly well! Prerequisite: Know something about company/person» E.g. full name, position, tasks: Can often be found on public web! Other variants: Phishing, dumpster diving Note: Technological measures will not help here! And institutionalized mistrust is economically bad Any export of data will be duly authorized, logged, etc.» But still reach an unintended recipient! Michael Sonntag Data loss prevention 15
16 Attacks: Techniques not reasonable to prevent Make films/photographs of the screen Special hardware preventing this might exist But: Screenshots can be prevented! Non-IT attacks: Bribing the person who has access to data or the one assigning permissions» Can be made difficult, but this is very hard to prevent!» This is something the very best DLP solutions can prevent! Memorising data: Typically rarely useful, except for methods» Note: Every day a little In sum interesting Writing it by hand on paper or dictating it into another device» Requires a long time, easy to observe Looking at foreign screens ( shoulder surfing )» Special foils e.g. for laptop screens do exist Michael Sonntag Data loss prevention 16
17 Content identification Keywords: Scanning the documents for keywords Requires lists (large part will be company dependent!) Easy to implement and fast Inefficient/impossible for data with certain structure, but no determined values (e.g. social security numbers) Regular expressions: Search for patterns Requires patterns (might be difficult to define)» Note: Social security numbers, telephones, etc. are written differently depending on country, language, Hashing: Documents known as secret are hashed Whenever something is sent/moved/ a hash value is calculated and compared to the list of sensitive files Automatic classification possible Everything in this folder» Adding a file automatically leads to addition of hash to DB Michael Sonntag Data loss prevention 17
18 Content identification Partial hashing: Not only the whole file is hashed, but also parts of it (e.g. paragraphs) Small changes won t influence the decision Requires understanding the format (or not so useful) Threshold needed, when a document is still the same Machine learning: Different approaches similar to SPAM Difficult, false positive/negative more common Predefined categories Relies on explicit classification Michael Sonntag Data loss prevention 18
19 Protection: Scanning s Happens on the mail gateway Requires unpacking of all attachments This can be difficult and require time and resources» ZIP-bombs : Tiny files with huge compression ratio Requires understanding all relevant file formats and prohibiting anything else» Just because it looks like a video it doesn t need to be one: The complete file must be decoded and checked whether it actually shows something (and which should not be text!) Typical actions: Block, quarantine, encrypt Works quite well for unintentional disclosure, Accidentally entered the wrong address as recipient Mention a bit of information in a unrelated/private mail but works very bad regarding intentional subversion! Michael Sonntag Data loss prevention 19
20 Protection: Scanning s Problems: Encryption: Must take place on the gateway or requires knowledge of all keys (!!!) Works moderately well for text, but is problematic for images» Scans of paper OCR, image recognition Mail server must be able to identify content as restricted» Often: Dictionaries and RegExp (e.g. social security numbers) Interface for allowed s Un-quarantining Language and character sets» Professional software does cope with this! Example (Cisco IronPort DLP): Germany: The following numbers are detected:» IBAN/BIC, Drivers License, National Identification, Passport» Seems to be more a regulatory issue than real protection Michael Sonntag Data loss prevention 20
21 Protection: Restricting access to USB disks General: Disable USB in BIOS and protect it by password Windows: Potential problem: USB keyboards/mice! Prevent USB storage devices to be installed» Assign the users Deny permissions on %SystemRoot%\Inf\Usbstor.pnf %SystemRoot%\Inf\Usbstor.inf Prevent installed USB storage devices from working» HKLM\SYSTEM\CurrentControlSet\Services\UsbStor: Set Start to 4 Attention: This only blocks storage devices Everything else (or other functionality of a device) will still work! Special software exists to only prevent writing» Still a security issue, as data can be imported to the company! E.g. software, false data, Special software also allows unblocking specific devices» Based on their serial number (which is public) Michael Sonntag Data loss prevention 21
22 Protection: Restricting access to USB disks Linux: Unload the USB storage module» modprobe -r usb_storage» Or: Delete these files And ensure it is not loaded again (blacklist)» E.g. through udev rules Allows also setting permissions, i.e. who is allowed to do this» E.g. /etc/modprobe.conf alias usb_storage off Debian/Ubuntu: Disabling in Grub possible» Add nousb to boot parameters Important: Check which is working for your system first! Michael Sonntag Data loss prevention 22
23 Conclusions DLP was a hype some years ago and still is to some degree What it can do is very limited, unless you invest a huge sum and effort and cope with a lot of restrictions! You need to have a very tight security before DLP can bring any real added value» So better improve general security first! Works reasonably well regarding unintentional disclosure! Preventing accidents of all kinds In some sectors (financial, health) legal regulations require the implementation of some kind of DLP There s no option then But try to use a sensible amount Suggestion: Improve general security and try to improve employee security awareness (social engineering!) Michael Sonntag Data loss prevention 23
24 ??? Questions? Thank you for your attention!??? Michael Sonntag 2012
25 References How to disable USB sticks and limit access to USB storage devices on Windows systems sable_usb_sticks How can I prevent users from connecting to a USB storage device? Michael Sonntag Data loss prevention 25
Understanding and Selecting a DLP Solution. Rich Mogull Securosis
Understanding and Selecting a DLP Solution Rich Mogull Securosis No Wonder We re Confused Data Loss Prevention Data Leak Prevention Data Loss Protection Information Leak Prevention Extrusion Prevention
ITAR Compliance Best Practices Guide
ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Protecting personally identifiable information: What data is at risk and what you can do about it
Protecting personally identifiable information: What data is at risk and what you can do about it Virtually every organization acquires, uses and stores personally identifiable information (PII). Most
THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION. Technology Overview, Business Justification, and Resource Requirements
THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION Technology Overview, Business Justification, and Resource Requirements Introduction to Data Loss Prevention Intelligent Protection for Digital Assets Although
A small leak will sink a great ship: An Empirical Study of DLP solutions
A small leak will sink a great ship: An Empirical Study of DLP solutions Matthias Luft, Thorsten Holz {mluft thorsten.holz}@informatik.uni-mannheim.de Agenda Problem Statement Motivation Key Concepts Evaluation
Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan
The Truth about Data Loss Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan RSA Data Loss Prevention Data Breaches Overview RSA DLP Solution Five Critical Factors
A Buyer's Guide to Data Loss Protection Solutions
A Buyer's Guide to Data Loss Protection Solutions 2010 Websense, Inc. All rights reserved. Websense is a registered trademark of Websense, Inc. in the United States and certain international markets. Websense
Five Tips to Ensure Data Loss Prevention Success
Five Tips to Ensure Data Loss Prevention Success A DLP Experts White Paper January, 2013 Author s Note The content of this white paper was developed independently of any vendor sponsors and is the sole
Data Loss Prevention Program
Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration
Websense Data Security Suite and Cyber-Ark Inter-Business Vault The Power of Integration Websense Data Security Suite Websense Data Security Suite is a leading solution to prevent information leaks; be
AB 1149 Compliance: Data Security Best Practices
AB 1149 Compliance: Data Security Best Practices 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: AB 1149 is a new California
Stop Data Leaks: Active DLP Systems vs. Passive Monitoring Solutions. 1 www.ekransystem.com WHITE PAPER
Stop Data Leaks: Active DLP Systems vs. Passive Monitoring Solutions WHITE PAPER Which one is better to combat theft of intellectual property: an active data leak prevention system (DLP) or a passive monitoring
White paper. Why Encrypt? Securing email without compromising communications
White paper Why Encrypt? Securing email without compromising communications Why Encrypt? There s an old saying that a ship is safe in the harbour, but that s not what ships are for. The same can be said
Sample Data Security Policies
This document provides three example data security policies that cover key areas of concern. They should not be considered an exhaustive list but rather each organization should identify any additional
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
EXIN Information Security Foundation based on ISO/IEC 27002. Sample Exam
EXIN Information Security Foundation based on ISO/IEC 27002 Sample Exam Edition June 2016 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
LSE PCI-DSS Cardholder Data Environments Information Security Policy
LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project
PCI Data Security. Information Services & Cash Management. Contents
PCI Data Security Information Services & Cash Management This self-directed learning module contains information you are expected to know to protect yourself, our patients, and our guests. Target Audience:
Using Data Loss Prevention for Financial Institutions Banks, Credit Unions, Payments
Using Data Loss Prevention for Financial Institutions Banks, Credit Unions, Payments How Data Loss Prevention (DLP) Technology can Protect Sensitive Company & Customer Information and Meet Compliance Requirements,
ELECTRONIC INFORMATION SECURITY A.R.
A.R. Number: 2.6 Effective Date: 2/1/2009 Page: 1 of 7 I. PURPOSE In recognition of the critical role that electronic information systems play in City of Richmond (COR) business activities, this policy
DATA LEAKAGE PREVENTION IMPLEMENTATION AND CHALLENGES
DATA LEAKAGE PREVENTION IMPLEMENTATION AND CHALLENGES From This article focuses on common pitfalls when implementing a DLP solution to secure your organizational information assets. The article also lists
The Information Leak Detection & Prevention Guide
The Information Leak Detection & Prevention Guide Essential Requirements for a Comprehensive Data Leak Prevention System April 2007 GTB Technologies 4685 MacArthur Court Newport Beach, CA 92660 WWW.GTTB.COM
Data Security What are you waiting for? Lior Arbel General Manager Europe Performanta
Data Security What are you waiting for? Lior Arbel General Manager Europe Performanta So, what is a DLP solution? DLP = Data Leakage (loss) Prevention Products that, based on central policies, identify,
Data Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Clearswift SECURE File Gateway
Security solutions for a changing world You wouldn t leave your front door unlocked if you were going out for the day, so why do the same with your business? In today s rapidly evolving business environment,
Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and
KEY STEPS FOLLOWING A DATA BREACH
KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
SecureAge SecureDs Data Breach Prevention Solution
SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal
ENISA s ten security awareness good practices July 09
July 09 2 About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for the European
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
DATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
Information Security. Annual Education 2014. Information Security. 2014 Mission Health System, Inc.
Annual Education 2014 Why? Protecting patient information is an essential part of providing quality healthcare. As Mission Health grows as a health system and activities become more computerized, new information
Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG
Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
The virtual safe: A user-focused approach to data encryption
The virtual safe: A user-focused approach to data encryption Steganos GmbH, 2008 1 The hard disk: a snapshot of our lives The personal computer has never been more personal. We routinely trust it with
Information Security Policy
Information Security Policy Contents Version: 1 Contents... 1 Introduction... 2 Anti-Virus Software... 3 Media Classification... 4 Media Handling... 5 Media Retention... 6 Media Disposal... 7 Service Providers...
Computers and Society: Security and Privacy
1 Chapter 12 Computers and Society: Security and Privacy 2 Chapter 12 Objectives 3 Computer Security: Risks and Safeguards What is a computer security risk? 4 Computer Security: Risks and Safeguards 1
PHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.
NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result
InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?
What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software
BANKING SECURITY and COMPLIANCE
BANKING SECURITY and COMPLIANCE Cashing In On Banking Security and Compliance With awareness of data breaches at an all-time high, banking institutions are working hard to implement policies and solutions
Information Security Policy. Policy and Procedures
Information Security Policy Policy and Procedures Issue Date February 2013 Revision Date February 2014 Responsibility/ Main Point of Contact Neil Smedley Approved by/date Associated Documents Acceptable
How To Set Up A Net Integration Firewall
Net Integration Technologies, Inc. http://www.net itech.com Net Integrator Firewall Technical Overview Version 1.00 TABLE OF CONTENTS 1 Introduction...1 2 Firewall Architecture...2 2.1 The Life of a Packet...2
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Information Security Guide for Students
Information Security Guide for Students August 2009 Contents The purpose of information security and data protection...1 Access rights and passwords...2 Internet and e-mail...3 Privacy protection...5 University
SPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
Ultimate control over data leaks
Ultimate control over data leaks Does your company use various data transmission channels? Are there any sensitive documents your employees have access to? You think all your employees are loyal? SecureTower
7 VITAL FACTS ABOUT HEALTHCARE BREACHES. www.eset.com
7 VITAL FACTS ABOUT HEALTHCARE BREACHES www.eset.com 7 vital facts about healthcare breaches Essential information for protecting your business and your patients Large breaches of Personal Health Information
B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
Professional Ethics for Computer Science
Professional Ethics for Computer Science Chapter 4: Privacy Jie Gao Computer Science Department Stony Brook University Privacy Issues Internet privacy consists of privacy over the media of the Internet:
anomaly, thus reported to our central servers.
Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
Top 10 Features: Clearswift SECURE Email Gateway
Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can
BSHSI Security Awareness Training
BSHSI Security Awareness Training Originally developed by the Greater New York Hospital Association Edited by the BSHSI Education Team Modified by HSO Security 7/1/2008 1 What is Security? A requirement
REGION 19 HEAD START. Acceptable Use Policy
REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions
Two Factor Zero Knowledge Proof Authentication System
Two Factor Zero Knowledge Proof Authentication System Quan Nguyen Mikhail Rudoy Arjun Srinivasan 6.857 Spring 2014 Project Abstract It is often necessary to log onto a website or other system from an untrusted
Data Protection McAfee s Endpoint and Network Data Loss Prevention
Data Protection McAfee s Endpoint and Network Data Loss Prevention Dipl.-Inform. Rolf Haas Principal Security Engineer, S+, CISSP [email protected] January 22, 2013 for ANSWER SA Event, Geneva Position Features
Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data
Data Protection and Information Data - Guidelines for the use of Personal Data Page 1 of 10 Created on: 21/06/2013 Contents 1. Introduction... 3 2. Definitions... 3 4. Physical... 4 5 Electronic... 6 6
Identifying Broken Business Processes
Identifying Broken Business Processes A data-centric approach to defining, identifying, and enforcing protection of sensitive documents at rest, in motion, and in use 6/07 I www.vericept.com Abstract The
CYBERSECURITY POLICY
* CYBERSECURITY POLICY THE CYBERSECURITY POLICY DEFINES THE DUTIES EMPLOYEES AND CONTRACTORS OF CU*ANSWERS MUST FULFILL IN SECURING SENSITIVE INFORMATION. THE CYBERSECURITY POLICY IS PART OF AND INCORPORATED
From Network Security To Content Filtering
Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
XGENPLUS SECURITY FEATURES...
Security Features Table of Contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. XGENPLUS SECURITY FEATURES... 3 3. SERVER LEVEL FEATURES... 5 4. DOMAIN LEVEL FEATURES... 8 5. USER LEVEL FEATURES...
Collecting information
Mag. iur. Dr. techn. Michael Sonntag Collecting information E-Mail: [email protected] http://www.fim.uni-linz.ac.at/staff/sonntag.htm Institute for Information Processing and Microprocessor Technology
Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk
Xerox Litigation Services In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk Your Highest Priority is also Your Greatest Challenge Data breaches are not just
