CSI/FBI 2002 COMPUTER SECURITY SURVEY
|
|
|
- Julius Washington
- 10 years ago
- Views:
Transcription
1 Chapter Eleven 1 ONLINE FILE W11.1 CSI/FBI 2002 COMPUTER SECURITY SURVEY The best known and most widely cited annual survey of computer security is conducted by the Computer Security Institute (CSI) and the San Francisco Federal Bureau of Investigation s (FBI) Computer Intrusion Squad. The results from the 2002 survey were based on the responses of 538 security practitioners. Of these respondents, approximately 50 percent worked for organizations that conducted e-commerce on their Web sites. Their responses reinforced patterns that have appeared over the past 5 to 6 years. More specifically (CSI and FBI 2002): 1. Organizations continue to experience cyber attacks from inside and outside of the organization. Of the organizations surveyed, about 90 percent of the respondents indicated that they had detected security breaches over the past 12 months. 2. The types of cyber attacks that organizations experienced were varied. For example, 85 percent detected computer viruses, 78 percent detected Net abuse (unauthorized uses of the Internet) by employees, and 40 percent were the victims of denial-of-service attacks. 3. The financial losses from a cyber attack can be substantial: 80 percent of the respondents acknowledged that they had experienced financial losses due to various cyber attacks. Of these respondents, 44 percent were willing to detail their losses. The combined loss for these respondents was approximately $455 million. As in previous years, the theft of proprietary information and financial fraud accounted for more than half of the losses. 4. It takes more than one type of technology to defend against cyber attacks. Virtually all of the respondents indicated that they employed physical security devices, firewalls, access control, and a number of other techniques and technologies to reduce or thwart cyber attacks from both the inside and outside the organization. In response to the growing incidents of cyber attacks and cyber crime that occurred up to and including 2002, the FBI formed the National Infrastructure Protection Center (NIPC), which is located at FBI headquarters. This is a joint partnership between government and private industry and is designed to prevent attacks and protect the nation s infrastructure telecommunications, energy, transportation, banking and finance, and emergency and governmental operations. The FBI also established Regional Computer Intrusion Squads, which are located at different FBI offices throughout the United States. These are charged with the task of investigating violations of the Computer Fraud and Abuse Act. This Act and the Intrusion Squads activities are focused on intrusions to public switched networks, major computer network intrusions, privacy violations, industrial espionage, pirated computer software, and other cyber crimes. Source: CSI and FBI. Computer Crime and Security Survey gocsi.com (accessed December 2004). Adapted with permission. 1. What is the Computer Security Institute? 2. What units does the FBI have for combating cyber attacks? 3. Based on the 2002 CSI/FBI survey data, what were the major patterns and trends in cyber attacks?
2 2 Part 5 ONLINE FILE W11.2 IT SECURITY SPENDING PATTERNS A survey of 2,196 IT security professionals conducted in 2002 by Information Security Magazine (Briney and Prince 2002) looked specifically at the security practices of organizations of various sizes. The results were surprising: Small organizations (10 to 100 computers). Small organizations tend to be divided into the haves and havenots. The haves are centrally organized, devote a sizeable percentage of their IT budgets to security, spend the most amount of money on security per employee, have well-established incident response plans, and base their security decisions on management-approved policies. Their major problem is that they are dependent on one or two people to manage their IT security. Their success or failure depends on these individuals. In contrast to the haves, the have-nots are basically clueless when it comes to IT security. This makes them extremely vulnerable to cyber attacks and intrusions. Fortunately, for most small organizations, the chance of an attack is lower than it is for other organizations, and the chance of loss also is smaller. Unfortunately, if they do suffer an attack, the results can be catastrophic. Medium organizations (100 to 1,000 computers). The systems of medium-sized organizations are more complex than those of smaller organizations. These organizations rarely rely on managerial policies in making security decisions, and they have little managerial support for their IT policies. Their budgets and staffing are comparatively less than other organizations of any size. The staff they do have is poorly educated and poorly trained. As a consequence, their overall exposure to cyber attacks and intrusion is substantially greater than smaller organizations (70 percent said they suffered damage or loss). Large organizations (1,000 to 10,000 computers). Large organizations have complex infrastructures and substantial exposure on the Internet. Although their aggregate IT security expenditures are fairly large, their security expenditures per employee are low. Where they skimp is on security head count. In general, IT security is part-time and undertrained. As a consequence, a sizeable percentage of the large organizations suffer loss or damage due to incidents. Despite these obstacles, large organizations do base their security decisions on organizational policies. Very large organizations (more than 10,000 computers). The average IT security budget of very large organizations was $6 million, which is substantially greater than those of other organizations. However, the average IT security expenditure per employee is the least. Organizations of this size rely on managerial policies in making IT security decisions, although only a small percentage have a well-coordinated incident response plan. The major difficulty is that these are extremely complex environments that are difficult to manage even with a larger staff. Based on these findings, the survey concluded that while there is increasing security awareness among organizations of all sizes, IT security is still trying to gain a foothold in the day-to-day activities that impact the organization. Even though spending has increased, it has not kept pace with security demands, especially in large, complex organizations. Although most organizations have managementapproved security policies, these policies have little impact on the way in which organizations respond to specific security incidents. Source: Briney, A., and F. Prince ISM Survey. Information Security, September infosecuritymag.com/2002/sep/ 2002survey.pdf (accessed December 2004). Adapted with permission. 1. Based on the Information Security Magazine survey results, what are some of the major differences in security issues facing small, medium, large, and very large organizations? 2. Does the amount of money that an organization spends on security have an impact on the chance of an organization suffering loss or damage due to cyber attacks? Explain.
3 Chapter Eleven 3 ONLINE FILE W11.3 BRUTE FORCE CREDIT CARD ATTACK On September 12, 2002, Spitfire Novelties fell victim to what is called a brute force credit card attack. On a normal day, the Los Angeles-based company generates between 5 and 30 transactions. That Thursday, Spitfire s credit card transaction processor, Online Data Corporation, processed 140,000 fake credit card charges worth $5.07 each. Of these, 62,000 were approved. The total value of the approved charges was around $300,000. Spitfire found out about the transactions only when it was called by a credit card owner who had been checking his statement online and had noticed the $5.07 charge. Brute force credit card attacks require minimal skill. Hackers simply run thousands of small charges through merchant accounts, picking numbers at random. Although the number of valid transactions is likely to be miniscule, when the perpetrator finds a valid credit card number the number can then be sold on the black market. Some modern-day black markets are actually member-only Web sites where hackers trade illicit information such as stolen credit card numbers. A brute force attack rests on the perpetrator s ability to pose as a merchant requesting authorization for a credit card purchase. This requires either a merchant ID, a password, or both. In the case of Online Data s credit card processing services, all a perpetrator needed was a merchant s password in order to request authorization. Online Data is a reseller of VeriSign Inc. credit card gateway services. Although VeriSign actually handles the transactions, Online Data issues passwords to its merchant customers. VeriSign blamed Online Data for the incident. Online Data blamed Spitfire for not changing its initial starter password. Spitfire reported that its password was OnlneAp16501, which was the one Online Data had given it originally. Most likely, many of the other merchants being serviced by Online Data also had failed to change their passwords. At a minimum, Online Data ought to assign strong passwords at the start. In turn, its customers need to modify those passwords frequently. Like Online Data, other credit card processors have fallen prey to similar brute force attacks. In April 2002, hackers got into the Authorize.Net card processing system, executing 13,000 credit card transactions, of which 7,000 succeeded. A number of the merchants that had been victimized indicated that entry into the Authorize.Net system required only a logon name, not a password. Once the hackers obtained the merchant ID, they could test as many credit cards numbers as they wanted. Several thousand merchants use Authorize.Net, performing millions of transactions per month. It is the largest gateway payment system on the Internet. The method used to access the Authorize.Net system really depends on the processes used by the resellers issuing the merchant IDs. Regardless, good security practices dictate that authorization ought to require more than a log-on ID. Even if a merchant s log-on ID and password fall into the hands of a hacker, authorization services such as VeriSign and Authorize.Net should have built in safeguards that recognize brute force attacks. Any time a merchant issues an extraordinary number of requests, it ought to automatically trigger a more extensive authorization process. Repeated requests for small amounts emanating from the same merchant should be an automatic signal that something is amiss. Fortunately for Spitfire, VeriSign halted the transactions before they were settled, saving the merchant $316,000 in charges. The other merchants using the Authorize.Net system were not so lucky. Although the transactions were only for pennies, these merchants were charged $0.35 for each transaction. The only ones who really made out were the criminals perpetrating the assault. The transactions that were approved gave them thousands of valid credit card numbers to sell on the black market. Any type of EC involves a number of players who use a variety of network and application services that provide access to a variety of data sources. The sheer numbers are what make EC security so difficult. A perpetrator needs only a single weakness in order to attack a system. Some attacks require sophisticated techniques and technologies. Most, however, are like the brute force method used in the attack on Spitfire simple techniques preying on poor security practices and human weaknesses. Because most attacks are not sophisticated, standard security risk management procedures can be used to minimize their probability and impact. Sources: Sullivan (2002a, 2002b). 1. What is a brute force credit card attack? 2. How is a brute force credit card attack perpetrated? 3. What was the primary security gap that enabled hackers to break into Spitfire Novelties credit card transaction processor? 4. What sorts of steps could have been taken to avoid the credit card attack on Spitfire Novelties credit card transaction processor?
4 4 Part 5 ONLINE FILE W11.4 BIOMETRIC AUTHENTICATION AT THRIFTWAY In May 2002, West Seattle Thriftway, a privately owned supermarket, deployed biometric technology at its cash registers. Instead of using credit cards or checks, customers could pay with a fingerprint scan. To participate in the Pay By Touch program, customers first registered by filling out various forms; providing a credit card, debit card, or checking account number; selecting a seven-digit passcode (known only to them); and allowing their fingerprint to be scanned. Once they signed up, every time they checked out at a cash register, they simply provided the seven-digit passcode and had their fingerprint scanned. Once the system had verified their identity, the amount of their bill was automatically deducted from their credit card, debit card, or checking account. Indivos, an Oakland, California software company, developed the biometric system used in the Pay By Touch program. The cost to implement the system is between $150 and $200 per sensor. There is one sensor per cash register. The fingerprint scanning system not only speeds the checkout process, but also reduces the interchange fees that the company would pay if customers used their credit cards. Unlike the credit card companies that charge for every transaction, Indivos only charges a fee for every four transactions. The Pay By Touch system is a verification system. In the system, the user makes a claim by entering a passcode number. The fingerprint template associated with that number is then checked against the actual fingerprint scan. This eliminates the need for the system to search through the database of fingerprint templates comparing the actual scan against all the scans in the database. All biometric systems have their problems. The chance that the fingerprints of any two Thriftway customers are the same is infinitesimal. For Thriftway, this means that the probability that one person can falsely charge his or her bill to another person s account is extremely small. However, what happens if a customer has a cut on their finger, a broken finger, or oily or dry hands? These changes can preclude the use of the fingerprint device or can lead the system to reject the customer even though the system should authorize their payment. Thriftway has a number of backups to the system. If the system does not work, the customer can pay by check, credit card, or debit card. The same is true with other biometric systems. Because there is always the possibility of a false rejection, many systems offer fallback authentication, whether to a live operator, a password, or another biometric method. Sources: U.S. Banker (2002) and Alga (2002). 1. Explain how a fingerprint-scanning system works. 2. Why would Thriftway have chosen a verification systems rather than an identification system? 3. What are some of the complications that might arise in using a fingerprint-scanning system to verify a person s identify?
5 Chapter Eleven 5 ONLINE FILE W11.5 IS IT A QUESTION OF COMMON SENSE? On September 9, 2002, the Internet Security Alliance (ISAlliance; isalliance.org) released results from a security survey conducted jointly with the National Association of Manufacturers (NAM) and RedSiren Technologies Inc. (Durkovich 2002). The survey asked 227 information security specialists from North America, Europe, the Middle East, and the Pacific Rim regions to compare their current attitudes toward information security with their attitudes prior to the 2001 terrorist attacks on the World Trade Center and the U.S. Pentagon. Overall, the results showed that information security was crucial to the survival of the organization or business. However, most were still inadequately prepared to meet their current security challenges, and just as importantly, most lacked senior management commitment to address these challenges. The following are some of the specific survey findings: The overwhelming majority (91 percent) recognize the importance of information security. Most of the organizations reported at least one attack in the past year, with approximately 30 percent reporting more than six attacks. Almost half (48 percent) said that the terrorist attacks made them more concerned about information security, while an equal number (48 percent) said there had been no change in their attitudes. Forty-seven percent said that they had increased spending on information security since the attacks. Forty percent said that they had improved their physical security, electronic security, network security, and security policies since the attacks Thirty percent indicated that their companies are still inadequately prepared to deal with security attacks. Based on the results of the survey, the ISAlliance and its partners concluded that it is clear that many organizations need to revise how security risks, threats and costs are identified, measured and managed and that information security specialists must work together to identify and implement more effective ways to communicate these pertinent issues to senior executives and also, to ensure these issues are given adequate visibility and priority in all organizations (Durkovich 2002). Based on the results of this and similar surveys, along with their general knowledge of the security industry, the Best Practices Working Group of the Internet Security Alliance has identified 10 of the highest priority and most frequently recommended practices necessary for implementation of a successful security process. The practices encompass policy, process, people, and technology. They include (ISAlliance 2002): 1. General management. Information security is a normal part of everyone s responsibilities managers and employees alike. Managers must ensure that there are adequate resources, that security policies are well defined, and that the policies are reviewed regularly. 2. Policy. Security policies must address key areas such as security risk management, identification of critical assets, physical security, network security, authentication and authorization, vulnerability and incident management, privacy, and the like. Policies need to be embedded in standard procedures, practices, training, and architectures. 3. Risk management. The impacts of various risks need to be identified and quantified. A management plan needs to be developed to mitigate those risks with the greatest impact. The plan needs to be reviewed on a regular basis. 4. Security architecture and design. An enterprisewide security architecture is required to protect critical information assets. High-risk areas (e.g., power supplies) should employ diverse and redundant solutions. 5. User issues. The user community includes general employees, IT staff, partners, suppliers, vendors, and other parties who have access to critical information systems. Users should be trained to understand and be held accountable for the consequences of their actions. Adequate in-house or outsourced expertise to manage and support all security technologies and policies also is needed. 6. System and network management. The key lines of defense include access control for all network devices and data, encrypted communications and VPNs where required, and perimeter protection (e.g., firewalls) based on security policies. Any software, files, and directories on the network should be verified on a regular basis. Procedures and mechanisms must be put in place that ensure that software patches are applied to correct existing problems; adequate levels of system logging are deployed; systems changes are analyzed from a security perspective; and vulnerability assessments are performed on a periodic basis. Software and data must also be backed up on a regular schedule. 7. Authentication and authorization. Strict policies must be formulated and implemented for authenticating and authorizing network access. Special attention must be given to those employees accessing the network from home and on the road and to partners, contractors, and service providers who are accessing the network remotely. 8. Monitor and audit. Network events and conditions must be monitored, audited, and inspected on a regular basis. (continued)
6 6 Part 5 ONLINE FILE W11.5 (continued) Standards should be in place for responding to suspicious or unusual behavior. 9. Physical security. Physical access to key information assets, IT services, and resources should be controlled by two-factor authentication. 10. Continuity planning and disaster recovery. Business continuity and recovery plans need to be implemented and periodically tested to ensure that they are effective. Increasingly, organizations must cope with a variety of cyber intrusions and losses. Organizations need to learn that security is not a one-time affair, but a continuous process. Information survivability is the key to an effective security process. The best practices recommended by the Internet Security Alliance indicate that there is nothing complex or highly technical about ensuring information survivability. It is more a matter of common sense that requires straightforward procedures and active involvement across the organization. 1. How do the results of the ISAlliance survey compare with the results of the CSI/FBI survey reported in Section 11.1? Explain the similarities and differences. 2. Most of the ISAlliance recommendations seem like common sense. Why do you think that commonsense advice is required? What types of businesses do you think these standards are aimed at? Based on what you know about information security, what other recommendations would you make? 3. Given the breadth of known vulnerabilities, what sort of impact will any set of security standards have on the rise in cyber attacks? 4. For any organization, why is the involvement of senior management crucial to the success of their security information practices? Sources: Durkovich (2002) and ISAlliance (2002).
CSI/FBI 2000 COMPUTER CRIME AND SECURITY SURVEY
CSI/FBI 00 COMPUTER CRIME AND SECURITY SURVEY Statement of intent This survey was conducted by the Computer Security Institute (CSI) in association with the San Francisco Computer Crime Squad of the Federal
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Information Security Policy
Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current
whitepaper 4 Best Practices for Building PCI DSS Compliant Networks
4 Best Practices for Building PCI DSS Compliant Networks Cardholder data is a lucrative and tempting target for cyber criminals. Recent highly publicized accounts of hackers breaching trusted retailers
Introduction to Online Payment Processing and PayPal Payment Solutions
Introduction to Online Payment Processing and PayPal Payment Solutions PayPal Helps Bring You New Customers Drivers of Consumer Demand for PayPal Opportunities for Merchants PayPal is: Secure Simple Fast
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital
Case Study: Hiring a licensed Security Provider
Case Study: Hiring a licensed Security Provider Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge computer forensics
Managing internet security
Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Advanced Biometric Technology
INC Internet Biometric Security Systems Internet Biometric Security System,Inc.White Papers Advanced Biometric Technology THE SIMPLE SOLUTION FOR IMPROVING ONLINE SECURITY Biometric Superiority Over Traditional
BSA-ISSA Information Security Study Online Survey of ISSA Members
BSA-ISSA Information Security Study Online Survey of ISSA Members December 3, 2003 Research Conducted Between October 13 and October 29, 2003 Key Findings I. A majority of security professionals believe
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Cyber Security Strategies for the Small Business Market
ThisIsCable for Business Report Series Cyber Security Strategies for the Small Business Market White Paper Produced by BizTechReports.com Editorial Director: Lane F. Cooper Research Assistant: Will Frey
Nine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
NATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
Conquering PCI DSS Compliance
Any organization that stores, processes or transmits information related to credit and debit card payments has a responsibility to protect each cardholder s personal data. To help accomplish this goal,
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
Network/Cyber Security
Network/Cyber Security SCAMPS Annual Meeting 2015 Joe Howland,VC3 Source: http://www.information-age.com/technology/security/123458891/how-7-year-old-girl-hacked-public-wi-fi-network-10-minutes Security
Tenzing Security Services and Best Practices
Tenzing Security Services and Best Practices OVERVIEW Security is about managing risks and threats to your environment. The most basic security protection is achieved by pro-actively monitoring and intercepting
New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector
New York State Department of Financial Services Report on Cyber Security in the Insurance Sector February 2015 Report on Cyber Security in the Insurance Sector I. Introduction Cyber attacks against financial
Employing Disinformation Security to Protect Corporate Networks with NetBait. A NetBait Whitepaper June 2003
Employing Disinformation Security to Protect Corporate Networks with NetBait A NetBait Whitepaper June 2003 Employing Disinformation Security to Protect Corporate Networks with NetBait EXECUTIVE OVERVIEW
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
White Paper. April 2006. Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks
White Paper April 2006 Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks According to a recent Harris Interactive survey, the country s leading business executives consider
Security Best Practices
White Paper Security Best Practices Maintaining tight security, including using both standard and advanced fraud detection and prevention tools, is crucial to maintaining a successful business. No merchant
PCI Compliance for Healthcare
PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?
How To Protect Your Credit Card Information From Being Stolen
Visa Account Information Security Tool Kit Welcome to the Visa Account Information Security Program 2 Contents 1. Securing cardholder data is everyone s concern 4 2. Visa Account Information Security (AIS)
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
8/27/2015. Brad Schuette IT Manager City of Punta Gorda [email protected] (941) 575-3354. Don t Wait Another Day
Brad Schuette IT Manager City of Punta Gorda [email protected] (941) 575-3354 2015 FRWA Annual Conference Don t Wait Another Day 1 SCADA Subsystems Management Physical Connectivity Configuration Mgmt.
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber
It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe
It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe Agenda Who Is VendorSafe Technologies? It Won t Happen to Me! PCI DSS Overview The VendorSafe Solution Questions
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
PCI DSS COMPLIANCE DATA
PCI DSS COMPLIANCE DATA AND PROTECTION EagleHeaps FROM CONTENTS Overview... 2 The Basics of PCI DSS... 2 PCI DSS Compliance... 4 The Solution Provider Role (and Accountability).... 4 Concerns and Opportunities
MANAGED SECURITY SERVICES (MSS)
MANAGED SECURITY SERVICES (MSS) The Cyber Security Initiative. Cybercrime is becoming an important factor for CIOs and IT professionals, but also for CFOs, compliance officers and business owners. The
AUTOMATED PENETRATION TESTING PRODUCTS
AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI) EXECUTIVE SUMMARY This paper will help you justify the need for an automated penetration testing product and demonstrate
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance
Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand
Tata Communications Security Outsourcing. A Must-have for Entry into the Global Economy. www.tatacommunications.com. www.tatacommunications.
Tata Communications Security Outsourcing A Must-have for Entry into the Global Economy www.tatacommunications.com www.tatacommunications.com 2 Tata Communications Security Outsourcing A Must-have for Entry
Managed Security Services for Data
A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified
University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template
University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative
ACI Response to FFIEC Guidance
ACI Response to FFIEC Guidance Version 1 July 2011 Table of contents Introduction 3 FFIEC Supervisory Expectations 4 ACI Online Banking Fraud Management 8 Online Banking Fraud Detection and Prevention
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements
SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements SolarWinds Security Information Management in the Payment Card
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
AUTOMATED PENETRATION TESTING PRODUCTS
AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI) EXECUTIVE SUMMARY This paper will help you justify the need for automated penetration testing software and demonstrate
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security
SMALL BUSINESS PRESENTATION
STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department
Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.
Payment Card Industry Data Security Standard Training Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc. March 27, 2012 Agenda Check-In 9:00-9:30 PCI Intro and History
AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009
AIS Webinar Payment Application Security Hap Huynh Business Leader Visa Inc. 1 April 2009 1 Agenda Security Environment Payment Application Security Overview Questions and Comments Payment Application
A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014
A Small Business Approach to Big Business Cyber Security Brent Bettis, CISSP 23 September, 2014 1 First, a Video http://www.youtube.com/watch?v=cj8wakqwlna 2 3 Agenda Threat Landscape Strategic Initiatives
How To Secure Your Business
security In our world and in our time, security is a term that places a tremendous responsibility on the people who claim it. You need to be certain that your security partner demonstrates the right values
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
SHARING BEST PRACTICES IN INFORMATION SECURITY PREVENTION TIPS & RESPONSE TECHNIQUES
SHARING BEST PRACTICES IN INFORMATION SECURITY PREVENTION TIPS & RESPONSE TECHNIQUES 2 On June 3, 2009, Plante & Moran attended the Midwest Technology Leaders (MTL) Conference, an event that brings together
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements
A Forrester Consulting Thought Leadership Paper Commissioned By Oracle Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements
Media Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
Cloud Assurance: Ensuring Security and Compliance for your IT Environment
Cloud Assurance: Ensuring Security and Compliance for your IT Environment A large global enterprise has to deal with all sorts of potential threats: advanced persistent threats (APTs), phishing, malware
Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:
Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services
Security aspects of e-tailing. Chapter 7
Security aspects of e-tailing Chapter 7 1 Learning Objectives Understand the general concerns of customers concerning security Understand what e-tailers can do to address these concerns 2 Players in e-tailing
New York State Department of Financial Services. Report on Cyber Security in the Banking Sector
New York State Department of Financial Services Report on Cyber Security in the Banking Sector Governor Andrew M. Cuomo Superintendent Benjamin M. Lawsky May 2014 I. Introduction Cyber attacks against
Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist
Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended
SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.
SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA
SITA Information Security SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA September, 2012 Contents 1. Introduction... 3 1.1 Overview...
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
The Information Assurance Process: Charting a Path Towards Compliance
The Information Assurance Process: Charting a Path Towards Compliance A white paper on a collaborative approach to the process and activities necessary to attain compliance with information assurance standards.
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
Privacy + Security + Integrity
Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels
Information Security: A Perspective for Higher Education
Information Security: A Perspective for Higher Education A By Introduction On a well-known hacker website, individuals charged students $2,100 to hack into university and college computers for the purpose
Security Threat Risk Assessment: the final key piece of the PIA puzzle
Security Threat Risk Assessment: the final key piece of the PIA puzzle Curtis Kore, Information Security Analyst Angela Swan, Director, Information Security Agenda Introduction Current issues The value
Computer Security Incident Response Planning. Preparing for the Inevitable
Computer Security Incident Response Planning Preparing for the Inevitable Introduction Computers and computer networks have been part of the corporate landscape for decades. But it s only in the last five
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
Managing business risk
Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success
2012 NCSA / Symantec. National Small Business Study
2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National
