CSI/FBI 2002 COMPUTER SECURITY SURVEY

Size: px
Start display at page:

Download "CSI/FBI 2002 COMPUTER SECURITY SURVEY"

Transcription

1 Chapter Eleven 1 ONLINE FILE W11.1 CSI/FBI 2002 COMPUTER SECURITY SURVEY The best known and most widely cited annual survey of computer security is conducted by the Computer Security Institute (CSI) and the San Francisco Federal Bureau of Investigation s (FBI) Computer Intrusion Squad. The results from the 2002 survey were based on the responses of 538 security practitioners. Of these respondents, approximately 50 percent worked for organizations that conducted e-commerce on their Web sites. Their responses reinforced patterns that have appeared over the past 5 to 6 years. More specifically (CSI and FBI 2002): 1. Organizations continue to experience cyber attacks from inside and outside of the organization. Of the organizations surveyed, about 90 percent of the respondents indicated that they had detected security breaches over the past 12 months. 2. The types of cyber attacks that organizations experienced were varied. For example, 85 percent detected computer viruses, 78 percent detected Net abuse (unauthorized uses of the Internet) by employees, and 40 percent were the victims of denial-of-service attacks. 3. The financial losses from a cyber attack can be substantial: 80 percent of the respondents acknowledged that they had experienced financial losses due to various cyber attacks. Of these respondents, 44 percent were willing to detail their losses. The combined loss for these respondents was approximately $455 million. As in previous years, the theft of proprietary information and financial fraud accounted for more than half of the losses. 4. It takes more than one type of technology to defend against cyber attacks. Virtually all of the respondents indicated that they employed physical security devices, firewalls, access control, and a number of other techniques and technologies to reduce or thwart cyber attacks from both the inside and outside the organization. In response to the growing incidents of cyber attacks and cyber crime that occurred up to and including 2002, the FBI formed the National Infrastructure Protection Center (NIPC), which is located at FBI headquarters. This is a joint partnership between government and private industry and is designed to prevent attacks and protect the nation s infrastructure telecommunications, energy, transportation, banking and finance, and emergency and governmental operations. The FBI also established Regional Computer Intrusion Squads, which are located at different FBI offices throughout the United States. These are charged with the task of investigating violations of the Computer Fraud and Abuse Act. This Act and the Intrusion Squads activities are focused on intrusions to public switched networks, major computer network intrusions, privacy violations, industrial espionage, pirated computer software, and other cyber crimes. Source: CSI and FBI. Computer Crime and Security Survey gocsi.com (accessed December 2004). Adapted with permission. 1. What is the Computer Security Institute? 2. What units does the FBI have for combating cyber attacks? 3. Based on the 2002 CSI/FBI survey data, what were the major patterns and trends in cyber attacks?

2 2 Part 5 ONLINE FILE W11.2 IT SECURITY SPENDING PATTERNS A survey of 2,196 IT security professionals conducted in 2002 by Information Security Magazine (Briney and Prince 2002) looked specifically at the security practices of organizations of various sizes. The results were surprising: Small organizations (10 to 100 computers). Small organizations tend to be divided into the haves and havenots. The haves are centrally organized, devote a sizeable percentage of their IT budgets to security, spend the most amount of money on security per employee, have well-established incident response plans, and base their security decisions on management-approved policies. Their major problem is that they are dependent on one or two people to manage their IT security. Their success or failure depends on these individuals. In contrast to the haves, the have-nots are basically clueless when it comes to IT security. This makes them extremely vulnerable to cyber attacks and intrusions. Fortunately, for most small organizations, the chance of an attack is lower than it is for other organizations, and the chance of loss also is smaller. Unfortunately, if they do suffer an attack, the results can be catastrophic. Medium organizations (100 to 1,000 computers). The systems of medium-sized organizations are more complex than those of smaller organizations. These organizations rarely rely on managerial policies in making security decisions, and they have little managerial support for their IT policies. Their budgets and staffing are comparatively less than other organizations of any size. The staff they do have is poorly educated and poorly trained. As a consequence, their overall exposure to cyber attacks and intrusion is substantially greater than smaller organizations (70 percent said they suffered damage or loss). Large organizations (1,000 to 10,000 computers). Large organizations have complex infrastructures and substantial exposure on the Internet. Although their aggregate IT security expenditures are fairly large, their security expenditures per employee are low. Where they skimp is on security head count. In general, IT security is part-time and undertrained. As a consequence, a sizeable percentage of the large organizations suffer loss or damage due to incidents. Despite these obstacles, large organizations do base their security decisions on organizational policies. Very large organizations (more than 10,000 computers). The average IT security budget of very large organizations was $6 million, which is substantially greater than those of other organizations. However, the average IT security expenditure per employee is the least. Organizations of this size rely on managerial policies in making IT security decisions, although only a small percentage have a well-coordinated incident response plan. The major difficulty is that these are extremely complex environments that are difficult to manage even with a larger staff. Based on these findings, the survey concluded that while there is increasing security awareness among organizations of all sizes, IT security is still trying to gain a foothold in the day-to-day activities that impact the organization. Even though spending has increased, it has not kept pace with security demands, especially in large, complex organizations. Although most organizations have managementapproved security policies, these policies have little impact on the way in which organizations respond to specific security incidents. Source: Briney, A., and F. Prince ISM Survey. Information Security, September infosecuritymag.com/2002/sep/ 2002survey.pdf (accessed December 2004). Adapted with permission. 1. Based on the Information Security Magazine survey results, what are some of the major differences in security issues facing small, medium, large, and very large organizations? 2. Does the amount of money that an organization spends on security have an impact on the chance of an organization suffering loss or damage due to cyber attacks? Explain.

3 Chapter Eleven 3 ONLINE FILE W11.3 BRUTE FORCE CREDIT CARD ATTACK On September 12, 2002, Spitfire Novelties fell victim to what is called a brute force credit card attack. On a normal day, the Los Angeles-based company generates between 5 and 30 transactions. That Thursday, Spitfire s credit card transaction processor, Online Data Corporation, processed 140,000 fake credit card charges worth $5.07 each. Of these, 62,000 were approved. The total value of the approved charges was around $300,000. Spitfire found out about the transactions only when it was called by a credit card owner who had been checking his statement online and had noticed the $5.07 charge. Brute force credit card attacks require minimal skill. Hackers simply run thousands of small charges through merchant accounts, picking numbers at random. Although the number of valid transactions is likely to be miniscule, when the perpetrator finds a valid credit card number the number can then be sold on the black market. Some modern-day black markets are actually member-only Web sites where hackers trade illicit information such as stolen credit card numbers. A brute force attack rests on the perpetrator s ability to pose as a merchant requesting authorization for a credit card purchase. This requires either a merchant ID, a password, or both. In the case of Online Data s credit card processing services, all a perpetrator needed was a merchant s password in order to request authorization. Online Data is a reseller of VeriSign Inc. credit card gateway services. Although VeriSign actually handles the transactions, Online Data issues passwords to its merchant customers. VeriSign blamed Online Data for the incident. Online Data blamed Spitfire for not changing its initial starter password. Spitfire reported that its password was OnlneAp16501, which was the one Online Data had given it originally. Most likely, many of the other merchants being serviced by Online Data also had failed to change their passwords. At a minimum, Online Data ought to assign strong passwords at the start. In turn, its customers need to modify those passwords frequently. Like Online Data, other credit card processors have fallen prey to similar brute force attacks. In April 2002, hackers got into the Authorize.Net card processing system, executing 13,000 credit card transactions, of which 7,000 succeeded. A number of the merchants that had been victimized indicated that entry into the Authorize.Net system required only a logon name, not a password. Once the hackers obtained the merchant ID, they could test as many credit cards numbers as they wanted. Several thousand merchants use Authorize.Net, performing millions of transactions per month. It is the largest gateway payment system on the Internet. The method used to access the Authorize.Net system really depends on the processes used by the resellers issuing the merchant IDs. Regardless, good security practices dictate that authorization ought to require more than a log-on ID. Even if a merchant s log-on ID and password fall into the hands of a hacker, authorization services such as VeriSign and Authorize.Net should have built in safeguards that recognize brute force attacks. Any time a merchant issues an extraordinary number of requests, it ought to automatically trigger a more extensive authorization process. Repeated requests for small amounts emanating from the same merchant should be an automatic signal that something is amiss. Fortunately for Spitfire, VeriSign halted the transactions before they were settled, saving the merchant $316,000 in charges. The other merchants using the Authorize.Net system were not so lucky. Although the transactions were only for pennies, these merchants were charged $0.35 for each transaction. The only ones who really made out were the criminals perpetrating the assault. The transactions that were approved gave them thousands of valid credit card numbers to sell on the black market. Any type of EC involves a number of players who use a variety of network and application services that provide access to a variety of data sources. The sheer numbers are what make EC security so difficult. A perpetrator needs only a single weakness in order to attack a system. Some attacks require sophisticated techniques and technologies. Most, however, are like the brute force method used in the attack on Spitfire simple techniques preying on poor security practices and human weaknesses. Because most attacks are not sophisticated, standard security risk management procedures can be used to minimize their probability and impact. Sources: Sullivan (2002a, 2002b). 1. What is a brute force credit card attack? 2. How is a brute force credit card attack perpetrated? 3. What was the primary security gap that enabled hackers to break into Spitfire Novelties credit card transaction processor? 4. What sorts of steps could have been taken to avoid the credit card attack on Spitfire Novelties credit card transaction processor?

4 4 Part 5 ONLINE FILE W11.4 BIOMETRIC AUTHENTICATION AT THRIFTWAY In May 2002, West Seattle Thriftway, a privately owned supermarket, deployed biometric technology at its cash registers. Instead of using credit cards or checks, customers could pay with a fingerprint scan. To participate in the Pay By Touch program, customers first registered by filling out various forms; providing a credit card, debit card, or checking account number; selecting a seven-digit passcode (known only to them); and allowing their fingerprint to be scanned. Once they signed up, every time they checked out at a cash register, they simply provided the seven-digit passcode and had their fingerprint scanned. Once the system had verified their identity, the amount of their bill was automatically deducted from their credit card, debit card, or checking account. Indivos, an Oakland, California software company, developed the biometric system used in the Pay By Touch program. The cost to implement the system is between $150 and $200 per sensor. There is one sensor per cash register. The fingerprint scanning system not only speeds the checkout process, but also reduces the interchange fees that the company would pay if customers used their credit cards. Unlike the credit card companies that charge for every transaction, Indivos only charges a fee for every four transactions. The Pay By Touch system is a verification system. In the system, the user makes a claim by entering a passcode number. The fingerprint template associated with that number is then checked against the actual fingerprint scan. This eliminates the need for the system to search through the database of fingerprint templates comparing the actual scan against all the scans in the database. All biometric systems have their problems. The chance that the fingerprints of any two Thriftway customers are the same is infinitesimal. For Thriftway, this means that the probability that one person can falsely charge his or her bill to another person s account is extremely small. However, what happens if a customer has a cut on their finger, a broken finger, or oily or dry hands? These changes can preclude the use of the fingerprint device or can lead the system to reject the customer even though the system should authorize their payment. Thriftway has a number of backups to the system. If the system does not work, the customer can pay by check, credit card, or debit card. The same is true with other biometric systems. Because there is always the possibility of a false rejection, many systems offer fallback authentication, whether to a live operator, a password, or another biometric method. Sources: U.S. Banker (2002) and Alga (2002). 1. Explain how a fingerprint-scanning system works. 2. Why would Thriftway have chosen a verification systems rather than an identification system? 3. What are some of the complications that might arise in using a fingerprint-scanning system to verify a person s identify?

5 Chapter Eleven 5 ONLINE FILE W11.5 IS IT A QUESTION OF COMMON SENSE? On September 9, 2002, the Internet Security Alliance (ISAlliance; isalliance.org) released results from a security survey conducted jointly with the National Association of Manufacturers (NAM) and RedSiren Technologies Inc. (Durkovich 2002). The survey asked 227 information security specialists from North America, Europe, the Middle East, and the Pacific Rim regions to compare their current attitudes toward information security with their attitudes prior to the 2001 terrorist attacks on the World Trade Center and the U.S. Pentagon. Overall, the results showed that information security was crucial to the survival of the organization or business. However, most were still inadequately prepared to meet their current security challenges, and just as importantly, most lacked senior management commitment to address these challenges. The following are some of the specific survey findings: The overwhelming majority (91 percent) recognize the importance of information security. Most of the organizations reported at least one attack in the past year, with approximately 30 percent reporting more than six attacks. Almost half (48 percent) said that the terrorist attacks made them more concerned about information security, while an equal number (48 percent) said there had been no change in their attitudes. Forty-seven percent said that they had increased spending on information security since the attacks. Forty percent said that they had improved their physical security, electronic security, network security, and security policies since the attacks Thirty percent indicated that their companies are still inadequately prepared to deal with security attacks. Based on the results of the survey, the ISAlliance and its partners concluded that it is clear that many organizations need to revise how security risks, threats and costs are identified, measured and managed and that information security specialists must work together to identify and implement more effective ways to communicate these pertinent issues to senior executives and also, to ensure these issues are given adequate visibility and priority in all organizations (Durkovich 2002). Based on the results of this and similar surveys, along with their general knowledge of the security industry, the Best Practices Working Group of the Internet Security Alliance has identified 10 of the highest priority and most frequently recommended practices necessary for implementation of a successful security process. The practices encompass policy, process, people, and technology. They include (ISAlliance 2002): 1. General management. Information security is a normal part of everyone s responsibilities managers and employees alike. Managers must ensure that there are adequate resources, that security policies are well defined, and that the policies are reviewed regularly. 2. Policy. Security policies must address key areas such as security risk management, identification of critical assets, physical security, network security, authentication and authorization, vulnerability and incident management, privacy, and the like. Policies need to be embedded in standard procedures, practices, training, and architectures. 3. Risk management. The impacts of various risks need to be identified and quantified. A management plan needs to be developed to mitigate those risks with the greatest impact. The plan needs to be reviewed on a regular basis. 4. Security architecture and design. An enterprisewide security architecture is required to protect critical information assets. High-risk areas (e.g., power supplies) should employ diverse and redundant solutions. 5. User issues. The user community includes general employees, IT staff, partners, suppliers, vendors, and other parties who have access to critical information systems. Users should be trained to understand and be held accountable for the consequences of their actions. Adequate in-house or outsourced expertise to manage and support all security technologies and policies also is needed. 6. System and network management. The key lines of defense include access control for all network devices and data, encrypted communications and VPNs where required, and perimeter protection (e.g., firewalls) based on security policies. Any software, files, and directories on the network should be verified on a regular basis. Procedures and mechanisms must be put in place that ensure that software patches are applied to correct existing problems; adequate levels of system logging are deployed; systems changes are analyzed from a security perspective; and vulnerability assessments are performed on a periodic basis. Software and data must also be backed up on a regular schedule. 7. Authentication and authorization. Strict policies must be formulated and implemented for authenticating and authorizing network access. Special attention must be given to those employees accessing the network from home and on the road and to partners, contractors, and service providers who are accessing the network remotely. 8. Monitor and audit. Network events and conditions must be monitored, audited, and inspected on a regular basis. (continued)

6 6 Part 5 ONLINE FILE W11.5 (continued) Standards should be in place for responding to suspicious or unusual behavior. 9. Physical security. Physical access to key information assets, IT services, and resources should be controlled by two-factor authentication. 10. Continuity planning and disaster recovery. Business continuity and recovery plans need to be implemented and periodically tested to ensure that they are effective. Increasingly, organizations must cope with a variety of cyber intrusions and losses. Organizations need to learn that security is not a one-time affair, but a continuous process. Information survivability is the key to an effective security process. The best practices recommended by the Internet Security Alliance indicate that there is nothing complex or highly technical about ensuring information survivability. It is more a matter of common sense that requires straightforward procedures and active involvement across the organization. 1. How do the results of the ISAlliance survey compare with the results of the CSI/FBI survey reported in Section 11.1? Explain the similarities and differences. 2. Most of the ISAlliance recommendations seem like common sense. Why do you think that commonsense advice is required? What types of businesses do you think these standards are aimed at? Based on what you know about information security, what other recommendations would you make? 3. Given the breadth of known vulnerabilities, what sort of impact will any set of security standards have on the rise in cyber attacks? 4. For any organization, why is the involvement of senior management crucial to the success of their security information practices? Sources: Durkovich (2002) and ISAlliance (2002).

CSI/FBI 2000 COMPUTER CRIME AND SECURITY SURVEY

CSI/FBI 2000 COMPUTER CRIME AND SECURITY SURVEY CSI/FBI 00 COMPUTER CRIME AND SECURITY SURVEY Statement of intent This survey was conducted by the Computer Security Institute (CSI) in association with the San Francisco Computer Crime Squad of the Federal

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Information Security Policy

Information Security Policy Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current

More information

whitepaper 4 Best Practices for Building PCI DSS Compliant Networks

whitepaper 4 Best Practices for Building PCI DSS Compliant Networks 4 Best Practices for Building PCI DSS Compliant Networks Cardholder data is a lucrative and tempting target for cyber criminals. Recent highly publicized accounts of hackers breaching trusted retailers

More information

Introduction to Online Payment Processing and PayPal Payment Solutions

Introduction to Online Payment Processing and PayPal Payment Solutions Introduction to Online Payment Processing and PayPal Payment Solutions PayPal Helps Bring You New Customers Drivers of Consumer Demand for PayPal Opportunities for Merchants PayPal is: Secure Simple Fast

More information

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital

More information

Case Study: Hiring a licensed Security Provider

Case Study: Hiring a licensed Security Provider Case Study: Hiring a licensed Security Provider Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge computer forensics

More information

Managing internet security

Managing internet security Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Advanced Biometric Technology

Advanced Biometric Technology INC Internet Biometric Security Systems Internet Biometric Security System,Inc.White Papers Advanced Biometric Technology THE SIMPLE SOLUTION FOR IMPROVING ONLINE SECURITY Biometric Superiority Over Traditional

More information

BSA-ISSA Information Security Study Online Survey of ISSA Members

BSA-ISSA Information Security Study Online Survey of ISSA Members BSA-ISSA Information Security Study Online Survey of ISSA Members December 3, 2003 Research Conducted Between October 13 and October 29, 2003 Key Findings I. A majority of security professionals believe

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

Cyber Security Strategies for the Small Business Market

Cyber Security Strategies for the Small Business Market ThisIsCable for Business Report Series Cyber Security Strategies for the Small Business Market White Paper Produced by BizTechReports.com Editorial Director: Lane F. Cooper Research Assistant: Will Frey

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

Five keys to a more secure data environment

Five keys to a more secure data environment Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational

More information

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security

More information

Conquering PCI DSS Compliance

Conquering PCI DSS Compliance Any organization that stores, processes or transmits information related to credit and debit card payments has a responsibility to protect each cardholder s personal data. To help accomplish this goal,

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management

More information

Network/Cyber Security

Network/Cyber Security Network/Cyber Security SCAMPS Annual Meeting 2015 Joe Howland,VC3 Source: http://www.information-age.com/technology/security/123458891/how-7-year-old-girl-hacked-public-wi-fi-network-10-minutes Security

More information

Tenzing Security Services and Best Practices

Tenzing Security Services and Best Practices Tenzing Security Services and Best Practices OVERVIEW Security is about managing risks and threats to your environment. The most basic security protection is achieved by pro-actively monitoring and intercepting

More information

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector New York State Department of Financial Services Report on Cyber Security in the Insurance Sector February 2015 Report on Cyber Security in the Insurance Sector I. Introduction Cyber attacks against financial

More information

Employing Disinformation Security to Protect Corporate Networks with NetBait. A NetBait Whitepaper June 2003

Employing Disinformation Security to Protect Corporate Networks with NetBait. A NetBait Whitepaper June 2003 Employing Disinformation Security to Protect Corporate Networks with NetBait A NetBait Whitepaper June 2003 Employing Disinformation Security to Protect Corporate Networks with NetBait EXECUTIVE OVERVIEW

More information

Managing IT Security with Penetration Testing

Managing IT Security with Penetration Testing Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to

More information

White Paper. April 2006. Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks

White Paper. April 2006. Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks White Paper April 2006 Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks According to a recent Harris Interactive survey, the country s leading business executives consider

More information

Security Best Practices

Security Best Practices White Paper Security Best Practices Maintaining tight security, including using both standard and advanced fraud detection and prevention tools, is crucial to maintaining a successful business. No merchant

More information

PCI Compliance for Healthcare

PCI Compliance for Healthcare PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?

More information

How To Protect Your Credit Card Information From Being Stolen

How To Protect Your Credit Card Information From Being Stolen Visa Account Information Security Tool Kit Welcome to the Visa Account Information Security Program 2 Contents 1. Securing cardholder data is everyone s concern 4 2. Visa Account Information Security (AIS)

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

White Paper. Information Security -- Network Assessment

White Paper. Information Security -- Network Assessment Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer

More information

8/27/2015. Brad Schuette IT Manager City of Punta Gorda [email protected] (941) 575-3354. Don t Wait Another Day

8/27/2015. Brad Schuette IT Manager City of Punta Gorda bschuette@pgorda.us (941) 575-3354. Don t Wait Another Day Brad Schuette IT Manager City of Punta Gorda [email protected] (941) 575-3354 2015 FRWA Annual Conference Don t Wait Another Day 1 SCADA Subsystems Management Physical Connectivity Configuration Mgmt.

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe Agenda Who Is VendorSafe Technologies? It Won t Happen to Me! PCI DSS Overview The VendorSafe Solution Questions

More information

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

PCI DSS COMPLIANCE DATA

PCI DSS COMPLIANCE DATA PCI DSS COMPLIANCE DATA AND PROTECTION EagleHeaps FROM CONTENTS Overview... 2 The Basics of PCI DSS... 2 PCI DSS Compliance... 4 The Solution Provider Role (and Accountability).... 4 Concerns and Opportunities

More information

MANAGED SECURITY SERVICES (MSS)

MANAGED SECURITY SERVICES (MSS) MANAGED SECURITY SERVICES (MSS) The Cyber Security Initiative. Cybercrime is becoming an important factor for CIOs and IT professionals, but also for CFOs, compliance officers and business owners. The

More information

AUTOMATED PENETRATION TESTING PRODUCTS

AUTOMATED PENETRATION TESTING PRODUCTS AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI) EXECUTIVE SUMMARY This paper will help you justify the need for an automated penetration testing product and demonstrate

More information

IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS

More information

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand

More information

Tata Communications Security Outsourcing. A Must-have for Entry into the Global Economy. www.tatacommunications.com. www.tatacommunications.

Tata Communications Security Outsourcing. A Must-have for Entry into the Global Economy. www.tatacommunications.com. www.tatacommunications. Tata Communications Security Outsourcing A Must-have for Entry into the Global Economy www.tatacommunications.com www.tatacommunications.com 2 Tata Communications Security Outsourcing A Must-have for Entry

More information

Managed Security Services for Data

Managed Security Services for Data A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified

More information

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative

More information

ACI Response to FFIEC Guidance

ACI Response to FFIEC Guidance ACI Response to FFIEC Guidance Version 1 July 2011 Table of contents Introduction 3 FFIEC Supervisory Expectations 4 ACI Online Banking Fraud Management 8 Online Banking Fraud Detection and Prevention

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements SolarWinds Security Information Management in the Payment Card

More information

Continuous Network Monitoring

Continuous Network Monitoring Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment

More information

AUTOMATED PENETRATION TESTING PRODUCTS

AUTOMATED PENETRATION TESTING PRODUCTS AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI) EXECUTIVE SUMMARY This paper will help you justify the need for automated penetration testing software and demonstrate

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security

More information

SMALL BUSINESS PRESENTATION

SMALL BUSINESS PRESENTATION STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department

More information

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc. Payment Card Industry Data Security Standard Training Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc. March 27, 2012 Agenda Check-In 9:00-9:30 PCI Intro and History

More information

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009 AIS Webinar Payment Application Security Hap Huynh Business Leader Visa Inc. 1 April 2009 1 Agenda Security Environment Payment Application Security Overview Questions and Comments Payment Application

More information

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014 A Small Business Approach to Big Business Cyber Security Brent Bettis, CISSP 23 September, 2014 1 First, a Video http://www.youtube.com/watch?v=cj8wakqwlna 2 3 Agenda Threat Landscape Strategic Initiatives

More information

How To Secure Your Business

How To Secure Your Business security In our world and in our time, security is a term that places a tremendous responsibility on the people who claim it. You need to be certain that your security partner demonstrates the right values

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

SHARING BEST PRACTICES IN INFORMATION SECURITY PREVENTION TIPS & RESPONSE TECHNIQUES

SHARING BEST PRACTICES IN INFORMATION SECURITY PREVENTION TIPS & RESPONSE TECHNIQUES SHARING BEST PRACTICES IN INFORMATION SECURITY PREVENTION TIPS & RESPONSE TECHNIQUES 2 On June 3, 2009, Plante & Moran attended the Midwest Technology Leaders (MTL) Conference, an event that brings together

More information

INCIDENT RESPONSE CHECKLIST

INCIDENT RESPONSE CHECKLIST INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged

More information

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements A Forrester Consulting Thought Leadership Paper Commissioned By Oracle Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

More information

Media Shuttle s Defense-in- Depth Security Strategy

Media Shuttle s Defense-in- Depth Security Strategy Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among

More information

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Cloud Assurance: Ensuring Security and Compliance for your IT Environment Cloud Assurance: Ensuring Security and Compliance for your IT Environment A large global enterprise has to deal with all sorts of potential threats: advanced persistent threats (APTs), phishing, malware

More information

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's: Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services

More information

Security aspects of e-tailing. Chapter 7

Security aspects of e-tailing. Chapter 7 Security aspects of e-tailing Chapter 7 1 Learning Objectives Understand the general concerns of customers concerning security Understand what e-tailers can do to address these concerns 2 Players in e-tailing

More information

New York State Department of Financial Services. Report on Cyber Security in the Banking Sector

New York State Department of Financial Services. Report on Cyber Security in the Banking Sector New York State Department of Financial Services Report on Cyber Security in the Banking Sector Governor Andrew M. Cuomo Superintendent Benjamin M. Lawsky May 2014 I. Introduction Cyber attacks against

More information

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended

More information

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value. SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA SITA Information Security SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA September, 2012 Contents 1. Introduction... 3 1.1 Overview...

More information

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries

More information

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

defending against advanced persistent threats: strategies for a new era of attacks agility made possible defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been

More information

The Information Assurance Process: Charting a Path Towards Compliance

The Information Assurance Process: Charting a Path Towards Compliance The Information Assurance Process: Charting a Path Towards Compliance A white paper on a collaborative approach to the process and activities necessary to attain compliance with information assurance standards.

More information

SUPPLIER SECURITY STANDARD

SUPPLIER SECURITY STANDARD SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard

More information

Privacy + Security + Integrity

Privacy + Security + Integrity Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels

More information

Information Security: A Perspective for Higher Education

Information Security: A Perspective for Higher Education Information Security: A Perspective for Higher Education A By Introduction On a well-known hacker website, individuals charged students $2,100 to hack into university and college computers for the purpose

More information

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Security Threat Risk Assessment: the final key piece of the PIA puzzle Security Threat Risk Assessment: the final key piece of the PIA puzzle Curtis Kore, Information Security Analyst Angela Swan, Director, Information Security Agenda Introduction Current issues The value

More information

Computer Security Incident Response Planning. Preparing for the Inevitable

Computer Security Incident Response Planning. Preparing for the Inevitable Computer Security Incident Response Planning Preparing for the Inevitable Introduction Computers and computer networks have been part of the corporate landscape for decades. But it s only in the last five

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Managing business risk

Managing business risk Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success

More information

2012 NCSA / Symantec. National Small Business Study

2012 NCSA / Symantec. National Small Business Study 2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National

More information