Community Security Awareness Training

Size: px
Start display at page:

Download "Community Security Awareness Training"

Transcription

1 Community Security Awareness Training Barbara Endicott-Popovsky, Ivan Orton, Kirk Bailey, Deb Frincke, Member, IEEE West Point 1

2 About the authors.. Barbara Endicott-Popovsky, Lecturer, Seattle University; Ivan Orton, JD, Senior Deputy Prosecuting Attorney with the Fraud Division of the King County Prosecutor's Office in Seattle Kirk Bailey, Chief Information Security Officer, City of Seattle Deb Frincke, Ph.D., Chief Scientist Cybersecurity, Pacific Northwest National Laboratory and Professor (on leave), Computer Science Dept., University of Idaho West Point 2

3 Agora. Forum for airing current issues of concern among IA professionals Meets quarterly in the Northwest Solves problems of unintended consequences from proliferation of digital infrastructure accessing insecure public networks West Point 3

4 Recent Achievements State legislative change regarding cyber stalking, a fast growing Internet crime Responding to a case involving a City of Seattle employee, Agora undertook a two-year project of tracking down, and assisting in, the eventual prosecution of the stalker Became the impetus behind some of the first cyber-stalking legislation in the nation West Point 4

5 Current Focus Vulnerability of personal and private information in Internet accessible systems Bring attention to improving network & data mgmt Influence helpful legislative change West Point 5

6 The Problem West Point 6

7 Widespread Community Problem: Identity Theft Growing problem Affects govt/business infrastructure and individuals 1 in 20 Americans an identity theft victim last year Hundreds of millions of dollars impact to U.S. economy (FTC report) Most institutions cover direct consumer losses Consumers cover coping charges avg. $1000/incident West Point 7 Credit restoration cost

8 Agora Solution: Create security awareness event demonstrating: accessibility of personal/private information thru public networks how little skill is needed to acquire it. Design experiential learning: a Google-Hacking Contest Invite Business and govt. leaders, and the press Enthuse community leaders about exploring possible solutions West Point 8

9 Google-hacking Google-hacking commonly refers to obtaining anything exploitable, including usernames, passwords, credit card numbers and other personal identifiable information using the search engine, Google. West Point 9

10 Why Google Hacking? Search engines can be effective hacking tools Google selected for its wide familiarity Requires little or no programming skills knowledge of a minimal list of Google operators and how to concatenate a Google string. Google hacking info readily available search for "Google hacking" on Google itself! first 3 chapters of Google Hacking by Johnny Long few hours of online practice West Point 10

11 Poorly Configured and Administered Systems at Fault Uneducated folks putting content on the web they think is hidden from the world Example: Directory indexing that exposes file paths and useful files Requires more thoughtfully configured networks: Keep private, sensitive info beyond web crawlers Understand how web crawlers/search engines work West Point 11

12 The Solution West Point 12

13 Community Security Awareness Training Event Purpose: raise community's consciousness about the vulnerability of sensitive information to compromise on systems linked to public network Vehicle: Google Hacking Contest Sponsored by: the Agora and Seattle U March 4, 2005 Seattle, Washington Public invited IA professionals Attorney General, State of Washington Business leaders West Point 13 Faculty, students

14 Reference: NIST Special Publication Recognizes the "people factor" is the weakest link. Standard for developing and implementing security awareness training All IS users be made aware of their roles and responsibilities in maintaining security. Any awareness event should be: designed for the intended audience, built around a message and desired outcomes gain attention. West Point 14

15 NIST Guidelines for Security Awareness Event NIST Guidelines Designed for specific audience Built around a message Built around desired outcomes User awareness of roles / responsibilities Google Hacking Event Attributes Business and community leaders in Seattle "Alarming vulnerability of public and private information to compromise on public networks" Gain attention Influence legislation Event summation focused on roles and responsibilities regarding identity theft West Point 15

16 AGORA S Google Hacking Contest Rules Rule #1: Information Protection All contest participants must be VERY CAREFUL to manage and protect any sensitive information they discover Rule #2: Required Gear for Competitors Teams must bring their own 'stuff ' to play and also at least one standard-size (8½ x 11 ) notepad West Point 16

17 AGORA S Google Hacking Contest Rules (cont d.) Rule #3: Respect Host s Network Access provided by host, Seattle U, for the contest only Rule #4: Judging Each team assigned a Contest Judge to validate their results West Point 17

18 AGORA S Google Hacking Contest Rules (cont d.) Rule #5: Time allowed 45 minutes only Rule #6: Scoring Based on score card (follows) West Point 18

19 Google Hacking Score Card Personally Identifiable Information Name and Social Security Number (SSN) together Name, SSN, Date of Birth (DOB) together Name, Credit Card number (CCN#) together Name, CCN#, Exp. Date, 3-digit security code (CID#) together Name, Bank Account # or Brokerage Account # Name, Bank Account # or Brokerage Account # Name, Bank Account Number and PIN Add l data asso d w/ ea CCN# & SSN #(e.g. address, phone) Name, password, related online account identifier to anything Bonus points for anything above associated with Wa St Citizen Points + an additional 500-point bonus was offered for the "Most Sensitive Document 1 pt 2 pts 1 pt 2 pts 3 pts 1 pt 3 pts 0.5 pt 5 pts 10 pts West Point 19

20 Successful Hacking Approach Limit # of pages to search Narrow searches Concatenate Boolean and advanced operators into queries Yield results West Point 20

21 Useful Advanced Operators Advanced Operator InTitle InURL Cache Filetype Numrange Purpose Restricts search to pages with specified word in its title Restricts search to pages with specified word in its URL Shows the version of a page in Google's cache Searches can be restricted to filetype. (The xls and mbd filetypes are particularly useful.) Searches for results within a given numerical range West Point 21

22 Example Query Strings allintitle: restricted filetype:doc site:gov Searches for pages with all of the following in the title: 'restricted,'.doc files on.gov sites. intitle:"index of" members OR accounts Searches for pages with "index of" in the titles and either member or accounts lists. allintitle: "index of/root" Searches for pages with index of/root in the title. Results in 1490 pages that can be mined for information. allinurl:auth_user_file.txt Searches for pages with lists of user names and passwords allinurl: admin mdb Searches for pages with administrator's access databases containing usernames, passwords and other sensitive information West Point 22

23 The Contest 8 Teams 3 student teams 5 from industry and the professions 8 12 Members each 300 community members observed West Point 23

24 The Results West Point 24

25 Results (Partial List) Credit card numbers of military personnel A million SSN s of recent immigrants, their tax records and addresses Names, birth dates, SSN s, race and religion of deceased military personnel Names, credit card numbers, birth dates and home Ph No s of 388 Americans who ordered pornographic movies from a Brazilian web site Over one hundred million death certificates with SSN s, dates of birth and city of last residence Highly personal information of two individuals, their security clearance level. One was an expert in virology investigations and the other a responder to nuclear emergencies Personal information about people on terrorist watch lists West Point 25

26 Winners! 1 st Prize: 190 million points Team of lawyers and computer security experts Found Db with SSN s of millions of dead people 2 nd Prize: 13 million points Team of penetration testers Local security firm Student teams at the bottom West Point 26

27 Community Awareness Achieved Attendees feedback indicated shock Report made to State s Attorney General Publicity Front Page article Seattle Times Wall St Journal article Syndicated columnist daily blog West Point 27

28 Lessons Learned, Future Work, Conclusions West Point 28

29 Lessons Learned Security awareness training can be effective for educating a community NIST Special Publication guidelines were applicable A Google-Hacking contest communicates effectively to non-technical people Such a contest is easy to stage Notify attendees in advance form teams, work logistics issues (numbers of computers, etc.) familiarize themselves with Google hacking before coming West Point 29

30 Future Work Continue the training effort thru U of Washington Center of Information Assurance and Cyber Security, an NSA Center of Academic Excellence Influence further legislation addressing protection of personal and sensitive data address the inequity of victims bearing coping costs associated with the misuse of personal information West Point 30

31 The Unfairness Principle West Point 31

32 Simple Fairness Principle West Point 32

33 Simple Fairness Principle Restated Individuals should bear inconvenience costs associated with misuse of any personal information that they control Individuals should not bear inconvenience costs associated with misuse of their personal information that they do not control While the fairness proposition appears obvious, it is not reflected in current law West Point 33

34 Conclusions Security awareness event achieved its goals: Alerted community leaders to take appropriate measures to ensure protection of personal and private information stored in databases Began process of influencing legislation to address problems arising from identity theft West Point 34

35 References ComSec, "Google, A Dream Come True," (Retrieved from the Web March 19, 2005). Googledorks. (Retrieved from the Web March 19, 2005). Granneman, S. "The Perils of Googling," Security Focus (Retrieved from the Web March 19, 2005). i-hacked.com, "Google Hacking at its Finest," (Retrieved from the Web April 15, 2005). Long, J., Skoudis, E., van Eijkelenborg, A. (ed.) (2004). Google Hacking, for Penetration Testers. San Francisco: Syngress Publishing, Inc. Kotadia, M. (1977). "Protect yourself from 'Google hacking' ". Silicon.com, Jan. 14, (Retrieved from the Web March 19, 2005). Ong Boon Kiat Google hacking for beginners. Cnet Asia, November 8, (Retrieved from the Web March 19, 2005). West Point 35

by Debasis Mohanty (Orissa, India) www.hackingspirits.com

by Debasis Mohanty (Orissa, India) www.hackingspirits.com by Debasis Mohanty (Orissa, India) www.hackingspirits.com Introduction I have been thinking of publishing this paper since long but due to lack of time I was not able to complete it. I use to add and keep

More information

Security awareness training and education, government guidance, training matrix

Security awareness training and education, government guidance, training matrix Bulletin of Applied Computing and Information Technology Refereed Article A5: Security Awareness Training and Education in Organisations 05:02 2007, Dec Charles Tsui Manukau Institute of Technology, New

More information

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE?

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE? 1. WHAT HAPPENED (2015 UPDATE)? Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 2. WHAT IS THE ARCHDIOCESE DOING ABOUT THIS? 3. WHAT WERE THE RESULTS OF THE INVESTIGATIONS?

More information

Consumer ID Theft Total Costs

Consumer ID Theft Total Costs Billions Consumer and Business Identity Theft Statistics Business identity (ID) theft is a growing crime and is a growing concern for state filing offices. Similar to consumer ID theft, after initially

More information

How child identity theft happens.

How child identity theft happens. How child identity theft happens. Facts you should know about identity theft. What is identity theft? Identity theft is the act of using someone s personal information such as an account number, driver

More information

Evaluation of Google Hacking

Evaluation of Google Hacking Justin Billig Department of Computer Science Northern Kentucky University Highland Heights, KY 41099 (859)572-5320 [email protected] Evaluation of Google Hacking Yuri Danilchenko Department of Computer

More information

Bo Holland is the Founder & CEO of AllClear ID with deep expertise in Identity theft prevention, security, and technology

Bo Holland is the Founder & CEO of AllClear ID with deep expertise in Identity theft prevention, security, and technology AllClear ID (www.allclearid.com) is an identity protection company based in Austin, Texas, and is powered by Debix, a leader in identity protection technology. Our leading technology and customer service

More information

gathering Dave van Stein 9 april 2009

gathering Dave van Stein 9 april 2009 Modern information gathering Dave van Stein 9 april 2009 Who Am I Dave van Stein 34 years Functional tester > 7 years Specializing in (Application) Security Testing Certified Ethical Hacker Agenda Goal

More information

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY by Sazali Sukardi Vice President Research CyberSecurity Malaysia SCOPE INTRODUCTION CYBER SECURITY INCIDENTS IN MALAYSIA CAPACITY BUILDING The Council For

More information

WRITTEN TESTIMONY BY DAVID SNELL FEDERAL BENEFITS SERVICE DIRECTOR NATIONAL ACTIVE AND RETIRED FEDERAL EMPLOYEES ASSOCIATION

WRITTEN TESTIMONY BY DAVID SNELL FEDERAL BENEFITS SERVICE DIRECTOR NATIONAL ACTIVE AND RETIRED FEDERAL EMPLOYEES ASSOCIATION WRITTEN TESTIMONY BY DAVID SNELL FEDERAL BENEFITS SERVICE DIRECTOR NATIONAL ACTIVE AND RETIRED FEDERAL EMPLOYEES ASSOCIATION BEFORE UNITED STATES HOUSE OF REPRESENTATIVES COMMITTEE ON SCIENCE, SPACE, AND

More information

WEBSITE PENETRATION VIA SEARCH

WEBSITE PENETRATION VIA SEARCH WEBSITE PENETRATION VIA SEARCH Azam Zia Muhammad Ayaz Email: [email protected], [email protected] Supervisor: Juha Takkinen, [email protected] Project Report for Information Security Course

More information

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem. Cybersecurity: Minimizing Risk & Responding to Breaches March 5, 2015 Andy Chambers Michael Kelly Jimmie Pursell Scope of Problem Data Breaches A Daily Phenomenon Anthem JP Morgan / Chase Sony Home Depot

More information

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches

More information

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 CHIEF INFORMATION OFFICER October 1, 2015 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF

More information

CRIMINAL ID THEFT: Taking the First Steps to Resolve It

CRIMINAL ID THEFT: Taking the First Steps to Resolve It CRIMINAL ID THEFT: Taking the First Steps to Resolve It A program of the Texas Legal Services Center supported by Grant No. 2007-VF-GX-K032 awarded by the Office for Victims of Crime, Office of Justice

More information

As a precaution, we have arranged with AllClear ID to provide identity protection services to affected clients at no cost for a period of one year.

As a precaution, we have arranged with AllClear ID to provide identity protection services to affected clients at no cost for a period of one year. October 1, 2015 Office of the Attorney General Attn: Security Breach Notification 200 St. Paul Place Baltimore, MD 21202 [email protected] To Whom It May Concern: I am writing on behalf of Scottrade

More information

State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION OF A SECURITY BREACH

State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION OF A SECURITY BREACH State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION Effective August 31, 2007 Publication Name(s): Version #(1): ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES

More information

HOME DEPOT DATA BREACH

HOME DEPOT DATA BREACH HOME DEPOT DATA BREACH This notice contains important information about the data breach announced by Home Depot, affecting some debit and credit cards used at Home Depot stores beginning April 2014. Data

More information

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services Real World Healthcare Security Exposures Brian Selfridge, Partner, Meditology Services 2 Agenda Introduction Background and Industry Context Anatomy of a Pen Test Top 10 Healthcare Security Exposures Lessons

More information

Information Security Organizations trends are becoming increasingly reliant upon information technology in

Information Security Organizations trends are becoming increasingly reliant upon information technology in DATASHEET PENETRATION TESTING SERVICE Sales Inquiries: [email protected] Visit us: http://www.spentera.com Protect Your Business. Get Your Service Quotations Today! Copyright 2011. PT. Spentera. All Rights

More information

3 day Workshop on Cyber Security & Ethical Hacking

3 day Workshop on Cyber Security & Ethical Hacking 3 day Workshop on Cyber Security & Ethical Hacking 1 st day-highlights-hands On Phishing Attack Hammad Mashkoor Lari Freelancer What is Cyber Security? What is Ethical hacking? What is Computer Science?

More information

Leander Police Department 705 Leander Dr Leander, Texas 78641 (512) 528-2800

Leander Police Department 705 Leander Dr Leander, Texas 78641 (512) 528-2800 Leander Police Department 705 Leander Dr Leander, Texas 78641 (512) 528-2800 Identity Theft Information and Affidavit The attached Identity Theft Affidavit packet has been given to you because you may

More information

National Cyber Crime Unit

National Cyber Crime Unit National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme [email protected] Official Problem or opportunity Office for National Statistics In

More information

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions Security Awareness For Server Administrators State of Illinois Central Management Services Security and Compliance Solutions Purpose and Scope To present a best practice approach to securing your servers

More information

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints

More information

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015 Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders

More information

<DATE> <FIRST NAME> <LAST NAME> <ADDRESS LINE 1> <ADDRESS LINE 2> <CITY>, <STATE> <ZIP> Dear <FIRTST NAME> <LAST NAME>:

<DATE> <FIRST NAME> <LAST NAME> <ADDRESS LINE 1> <ADDRESS LINE 2> <CITY>, <STATE> <ZIP> Dear <FIRTST NAME> <LAST NAME>: , Dear : You are receiving this letter because computer thieves or hackers have gained access

More information

Common Security Vulnerabilities in Online Payment Systems

Common Security Vulnerabilities in Online Payment Systems Common Security Vulnerabilities in Online Payment Systems Author- Hitesh Malviya(Information Security analyst) Qualifications: C!EH, EC!SA, MCITP, CCNA, MCP Current Position: CEO at HCF Infosec Limited

More information

Activate ProtectMyID Now in Three Easy Steps. If you have questions or need an alternative to enrolling online, please call 877-441-6943.

Activate ProtectMyID Now in Three Easy Steps. If you have questions or need an alternative to enrolling online, please call 877-441-6943. Mid Atlantic Professionals, Inc. DBA / SSI ( SSI ) had a data breach incident that occurred on or before March 7, 2014. As a result of this incident, some personal identifiable information was exposed

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

The Electronic Arms Race of Cyber Security 4.2 Lecture 7

The Electronic Arms Race of Cyber Security 4.2 Lecture 7 The Electronic Arms Race of Cyber Security 4.2 Lecture 7 ISIMA Clermont-Ferrand / 04-February 2011 Copyright 2011 Dr. Juergen Hirte List of Content Why Process Automation Security? Security Awareness Issues

More information

Advanced Operators. Chapter 6

Advanced Operators. Chapter 6 Chapter 6 Advanced Operators 6.1 Query Modifiers Google supports a set of advanced operators (even more than are available on the Advanced Search page) that you can type in as part of a query in the regular

More information

Establishing a State Cyber Crimes Unit White Paper

Establishing a State Cyber Crimes Unit White Paper Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center

More information

Basic Search Engine Handbook for Recruiters Use Search Engines to identify candidates on the Internet

Basic Search Engine Handbook for Recruiters Use Search Engines to identify candidates on the Internet Basic Search Engine Handbook for Recruiters Use Search Engines to identify candidates on the Internet sourceress.co.uk Brought to you by UK Sourcers uksourcers.co.uk August 2012 [Type text] [Type text]

More information

We are writing to you because of a recent security incident which may have resulted in unauthorized access of your personal information.

We are writing to you because of a recent security incident which may have resulted in unauthorized access of your personal information. EQUIFAX AUTHORIZATION CODE July, 2012 Dear [insert name]: We are writing to you because of a recent security incident which may have resulted in unauthorized access of your personal information. On or

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft About Medical Identity Theft and Health Information Breaches... 1 What is medical identity theft?... 1 What are the dangers of medical identity theft?... 1 How do

More information

The Human Factor of Cyber Crime and Cyber Security

The Human Factor of Cyber Crime and Cyber Security The Human Factor of Cyber Crime and Cyber Security Challenges: September 11th has marked an important turning point that exposed new types of security threats and disclosed how cyber criminals pursuit

More information

Frequently Asked Questions Wellmark s Identity Protection Services Offering Member Q&A

Frequently Asked Questions Wellmark s Identity Protection Services Offering Member Q&A Learn More Frequently Asked Questions Wellmark s Identity Protection Services Offering Member Q&A Enrolling in identity protection services Q1. How can I enroll in identity protection services? A1. Enrollment

More information

Threat Intelligence Pty Ltd [email protected] 1300 809 437. Specialist Security Training Catalogue

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue Threat Intelligence Pty Ltd [email protected] 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?

More information

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen.

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. RECENT DATA BREACHES This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. Data security is a number one priority at Northwest. We take every

More information

GEARS Cyber-Security Services

GEARS Cyber-Security Services Florida Department of Management Services Division of State Purchasing Table of Contents Introduction... 1 About GEARS... 2 1. Pre-Incident Services... 3 1.1 Incident Response Agreements... 3 1.2 Assessments

More information

Aaron V. Rocke Rocke Law Group, PLLC 101 Yesler Way, Suite 603 Seattle, WA 98104 (206) 652-8670 [email protected]

Aaron V. Rocke Rocke Law Group, PLLC 101 Yesler Way, Suite 603 Seattle, WA 98104 (206) 652-8670 aaron@rockelaw.com Aaron V. Rocke Rocke Law Group, PLLC 101 Yesler Way, Suite 603 Seattle, WA 98104 (206) 652-8670 [email protected] EXPERIENCE Managing Partner, Rocke Law Group, PLLC Employment law practice, including

More information

Importance: From: Anthem, Inc. Communications Sent: Thursday, February 26, 2015 4:40 PM Subject: Important message from Anthem, Inc.

Importance: From: Anthem, Inc. Communications Sent: Thursday, February 26, 2015 4:40 PM Subject: Important message from Anthem, Inc. Importance: High From: Anthem, Inc. Communications Sent: Thursday, February 26, 2015 4:40 PM Subject: Important message from Anthem, Inc. An important message from Anthem, Inc. To Members: On January 29,

More information

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Southern California Association for Financial Professionals February 14, 2014 Stan Stahl, Ph.D.

More information

U. S. Attorney Office Northern District of Texas March 2013

U. S. Attorney Office Northern District of Texas March 2013 U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate

More information

About Effective Penetration Testing Methodology

About Effective Penetration Testing Methodology 보안공학연구논문지 (Journal of Security Engineering), 제 5권 제 5호 2008년 10월 About Effective Penetration Testing Methodology Byeong-Ho KANG 1) Abstract Penetration testing is one of the oldest methods for assessing

More information

Social Media and Cyber Safety

Social Media and Cyber Safety Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant [email protected] Social Media and Cyber Safety Our instructor today

More information

FORBIDDEN - Ethical Hacking Workshop Duration

FORBIDDEN - Ethical Hacking Workshop Duration Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once

More information

Penetration Testing in Romania

Penetration Testing in Romania Penetration Testing in Romania Adrian Furtunǎ, Ph.D. 11 October 2011 Romanian IT&C Security Forum Agenda About penetration testing Examples Q & A 2 What is penetration testing? Method for evaluating the

More information

Detecting, Preventing, and Mitigating Identity Theft

Detecting, Preventing, and Mitigating Identity Theft THE RED FLAGS RULE Detecting, Preventing, and Mitigating Identity Theft Training for Ball State University s Identity Theft Protection Program What is the Red Flag Rule? Congress passed the Fair and Accurate

More information

CYBER TRENDS & INDUSTRY PENETRATION TESTING. Technology Risk Supervision Division Monetary Authority of Singapore

CYBER TRENDS & INDUSTRY PENETRATION TESTING. Technology Risk Supervision Division Monetary Authority of Singapore CYBER TRENDS & INDUSTRY PENETRATION TESTING Technology Risk Supervision Division Monetary Authority of Singapore A NEW DAWN New Services / Mobile Application, NFC, FAST Technology / Biometrics, Big Data,

More information

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If

More information

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of

More information

http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html

http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html Identity Theft: Steps to Take if You are a Victim We understand the stress, time and effort required as a result of having your identity stolen and used fraudulently. While there are many resources available

More information

National Initiative for Cybersecurity Education

National Initiative for Cybersecurity Education THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital

More information

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant How Security Testing can ensure Your Mobile Application Security Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant Once More Consulting & Advisory Services IT Governance IT Strategic

More information

SecureNinja. SecureNinja. The CyberSecurity Experts

SecureNinja. SecureNinja. The CyberSecurity Experts Shakeel The Experts Chief Ninja (CEO) The Experts Washington DC The Experts Pentagon Force Protection Agency US Air Force SecureNinj a America Online JP Cigital General Morgan CompUSA Dynamics Fortify

More information

Chris Gates http://carnal0wnage.blogspot.com http://www.learnsecurityonline.com

Chris Gates http://carnal0wnage.blogspot.com http://www.learnsecurityonline.com New School Information Gathering Chris Gates http://carnal0wnage.blogspot.com http://www.learnsecurityonline.com Who Am I? Penetration Tester LearnSecurityOnline.com Security Blogger EthicalHacker.net

More information

Personal Digital Security

Personal Digital Security The following is an excerpt from: Personal Digital Security Protecting Yourself from Online Crime 2016 Revision by Michael Bazzell More information can be found at ComputerCrimeInfo.com Over the past ten

More information

Working with the FBI

Working with the FBI Working with the FBI WMACCA Data Privacy & Security Conference September 17, 2014 Individuals Organized Crime Syndicates Hacktivist Groups Nation States Nation-States Individuals Industry Law Enforcement

More information

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow Anatomy of a Breach: A case study in how to protect your organization Presented By Greg Sparrow Agenda Background & Threat landscape Breach: A Case Study Incident Response Best Practices Lessons Learned

More information

Loophole+ with Ethical Hacking and Penetration Testing

Loophole+ with Ethical Hacking and Penetration Testing Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,

More information

Penetration Testing: Lessons from the Field

Penetration Testing: Lessons from the Field Penetration Testing: Lessons from the Field CORE SECURITY TECHNOLOGIES SCS SERVICES May 2009 1 Agenda: About me: Alberto Soliño Director of Security Consulting Services at Core Security One of first five

More information

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked. This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out

More information

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity

More information

Citi Identity Theft Solutions

Citi Identity Theft Solutions Identity Theft what you need to know Citi Identity Theft Solutions At Citi, we want to keep you informed about all of the issues that can affect your financial life. We re bringing you helpful information

More information

FTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen

FTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen FTC Facts For Consumers Federal Trade Commission For The Consumer August 2005 Identity Crisis... What to Do If Your Identity is Stolen Maybe you never opened that account, but someone else did...someone

More information

Deluxe Provent : Protecting against expanded threats. Providing for expanded opportunities.

Deluxe Provent : Protecting against expanded threats. Providing for expanded opportunities. Deluxe Provent : Protecting against expanded threats. Providing for expanded opportunities. i n t r o d u c t i o n Identity thieves are smarter and more organized than ever before, claiming over 8.1 million

More information