Monitoring Corporate Password Sharing Using Social Network Analysis
|
|
|
- Holly Cameron
- 10 years ago
- Views:
Transcription
1 Monitoring Corporate Password Sharing Using Social Network Analysis Andrew S. Patrick NRC Canada Paper to be presented at the International Sunbelt Social Network Conference, St. Pete Beach, Florida, January 22-27, Abstract Corporations are facing increasing demands to monitor their compliance with policies and regulations. This research demonstrated one type of analysis tool for monitoring corporate security and privacy practices. Using the Enron corpus as an example of corporate communications, the research explored methods to identify instances of password sharing, a practice that should be a security concern to any organization. Social network analysis was able to identify key creators and sharers of passwords, and an analysis of the passwords themselves showed that quality was clearly a problem. The network analysis was also able to reveal interesting communication patterns, such as sharing passwords with external accounts owned by the same person, which might have been useful as indicators of a problem in corporate systems or practices. The research also uncovered cases of possible policy violations, such as the sharing of internal and external accounts. 1. Introduction Corporations are facing increasing demands to monitor their compliance with both internal and external policies and regulations. Externally, corporations are asked to comply with a variety of regulations depending on their location and areas of business. These regulations cover corporate finances (e.g., Sarbanes-Oxley), privacy (e.g., Gramm-Leach-Bliley, PIPEDA, HIPAA), national security (e.g., Patriot Act), etc. Internally, good corporate practices demand effective management, good decision making, clear accountability, effective risk management, corporate integrity, etc. Because of these increasing demands, corporations are turning to automated tools that can assist in monitoring data and processes, and in demonstrating compliance with the various requirements. One area where compliance is especially important is security and privacy. Corporations are coming to realize that protecting their data, and the data of their customers, is essential for their business success. Here too, they are turning to automated tools to assist in the monitoring of their security and privacy practices (e.g., [1, 3]). The purpose of the present research is to demonstrate one type of analysis tool for monitoring corporate security and privacy practices. Social Network Analysis (SNA) focuses on the ties among groups of entities, including people, groups, and even countries. SNA involves creating structures that represent the relationships (usually called ties) between entities (usually called nodes) based on some analysis of behaviors [13]. For example, the relationships between teenagers could be studied by examining the pattern of text messages sent between individuals in a given period of time. It is our belief that SNA can provide a valuable tool for corporations interested in monitoring their security and privacy practices. SNA has proven to be valuable in other security contexts. Valdis Krebs [11], for example, demonstrated the value of relationship analysis for discovering the social structure among the hijackers involved in the 9/11 terrorist attacks. National security agencies, such as the NSA, also use social network analysis to search for current and future threats [4]. One security practice that is important to corporations is access control. The most common access control method today is to assign each individual a username and password. Based on the authentication provided by these pieces of information, different types and levels of access can be given or refused. If the authentication information is shared, however, then the access control measures fail and the corporation can loose control over their assets [17]. Even internal password sharing between colleagues can be dangerous because it can lead to a lack of accountability, errors or omissions by untrained users, inadvertent access to unintended resources, greater opportunities for malicious insider activities, and an environment that is vulnerable to social engineering attacks. As a result, many corporations have, or should have, policies against password sharing. This study used social network analysis to examine cases of password sharing within a corporate environment. A corpus of corporate communications was searched and instances of password sharing that represent potential security problems were recorded. The purpose was to demonstrate the value of this analytic approach, and to suggest topics for future research and development in the area of automated compliance tools for security and privacy Background on the Corpus Enron was a very large U.S. corporation that conducted business in the energy sector from the 1980s until the early 2000s. Enron acted as a broker, buying energy from generators and selling it to customers. With the rapid
2 2 success of the business, Enron soon expanded their scope to include brokerage of a variety of commodities, including advertising time and network bandwidth. Enron grew very quickly and reported huge profits, but in 2001 stories began to emerge about improper accounting practices. The company seemed to be reporting only profits and hiding their losses in a series of related companies. When the scandal became public, the share price of the company collapsed and investors lost millions of dollars. Enron filed for bankruptcy in December 2001 [2, 6]. During the investigations that followed the collapse of the company, the Federal Energy Regulatory Commission collected a large number of corporate messages. This corpus was made available to the public and it was cleaned by researchers at SRI and Carnegie Mellon University [8]. Message integrity issues were resolved and some of the s were deleted at the request of some of the affected employees. The result was a database of 517,431 messages from 151 users distributed in 3500 folders [14]. This database is available for download from CMU, and it has frequently been used by researchers interested in corporate communications, natural language understanding, and social networks (e.g., [7, 12, 15]). 2. Method 2.1. Corpus Cleaning For the present study, the Enron corpus was downloaded from Carnegie Mellon University 1 and unpacked on a PC running Windows XP. A series of Perl scripts were developed to clean the data and search the corpus files. The first cleaning pass involved parsing each message for the date (using the Date: header), the sender (using the From: header), and the recipients (using the To:, Cc:, and Bcc: headers). In cases where there were multiple recipients, each recipient was counted as a separate message for our analyses. There were a number of address aliases in the corpus. For example, employees could be addressed using the pattern [email protected] as well as [email protected] and [email protected]. A list of aliases was developed by examining similarities in the addresses. This list was also refined as the social network analysis was conducted because it sometimes became clear that two closely related entities were actually the same person. The result was a list of 49 aliases that were converted to a canonical form [email protected] for the analyses that follow. Following the alias substitutions, duplicate messages were removed from the corpus by looking for repetitions of the date, sender, and recipient. The result was a total of 250,641 unique messages, which is similar to the 252,759 unique messages reported by [14] who dropped messages based on duplicate messages automatically saved by the system in some of the corpus folders (e.g., "sent_mail" folders). There was a total of 31,718 different addresses found in the database, including both Enron employees and outside correspondents. Most of the addresses (63%) appeared only once in the database, but some addresses (those of prolific Enron employees) were very frequent Searching for Passwords A simple method was used for searching for passwords within the cleaned corpus. Each message was searched using two case-insensitive regular expressions: "password:" and "password is". When a match was found, the next whole word in the message line was recorded as the password. This method did result in some false matches. For example, the sentence "Your password is case sensitive" would result in a recorded password of "case." A list of common false matches was developed (see Table 1) and these passwords were ignored in the analyses. In all other cases, the sender, recipient, and password was recorded and used for later analyses. Table 1: Password False Matches Not Used in Analyses a also as birthdate blank can case-sensitive case completed currently different first for in included issued necessary needed not noted now only our required same the their upper what your travelocity 2.3. Social Network Analysis The instances of password sharing were counted to produce a dataset that was suitable for social network analysis. The direction and frequency of password sharing were tallied, and the results were saved as a Pajek net- 1
3 3 Figure 1: The total network of Enron password sharing. Black nodes represent internal Enron addresses, while white nodes represent external addresses. work file. 2 The Pajek program was used to analyze and visualize the resulting network. In addition, the NetDraw program 3 was used for analyses that were not available in the Pajek program (e.g., faction analysis). 3. Results For the social network analysis, each address was treated as a node and the frequency of password sharing was used to create weighted directional arcs. A total of 642 instances of password sharing involving 500 different addresses were observed. This data resulted in a network of 500 nodes and 500 arcs, as is shown in Figure 1. This network was very sparse, with 418 of the nodes (addresses) only appearing once. The network density was 0.2%, showing that very few of the possible network connections actually occurred. There were also 9 instances of network loops, representing cases where people ed passwords to themselves. There are a number of interesting characteristics observable in the network shown in Figure 1. First, there is clearly a group of relatively well connected nodes at the centre of the network and a large collection of isolated pairs at the periphery. Second, Enron internal addresses are shown as black nodes in the network, while external addresses are shown in white. As might be expected, external addresses were most commonly found in the network periphery, but there were some cases of well connected external nodes. A review of the messages involving those nodes revealed that they were most commonly associated with subscription services, such as the New York Times, that were popular with a variety of Enron employees. In fact, Enron employees were frequent subscribers to a variety of third party news and research services, and a majority of the cases of external password sharing were new subscription passwords being sent to the Enron subscribers. We will return to this finding later
4 4 Figure 2. Faction analysis of the password sharing network. A third observation from the password sharing network shown in Figure 1 is the scarcity of repeated password sharing. The width of the arcs in the diagram represents the frequency of password sharing between the respective nodes. In most cases, a password was only shared once between nodes (thin lines), and very frequent password sharing was very rare. The highest frequency of password sharing between two nodes was 14 instances in one direction and five in the other. We will examine this unusual case below Network Factions To further characterize the network of password sharing, a faction analysis was conducted using the NetDraw tool. This analysis breaks the network into factions based on the number of links between nodes. Nodes with strong connections to each other are placed within the same faction, and a unique color is used to represent each faction in the network. An analysis using three factions resulted in the cleanest separation of the nodes, and this is shown in Figure 2. There are clearly two large factions represented by the white and grey nodes, with frequent connections within the factions and very little overlap. It is obvious that an analysis focusing on the differences between these two groups is required. The black nodes are a residual faction that represents people that are relatively unconnected, often involving pairs of people and small groups. NetDraw has chosen to draw these nodes in two groups, but they really represent one faction of isolated nodes The Network Core To analyze the network core, the NetDraw program was used to remove isolated nodes and pairs (pendants). This was done in two passes, and the resulting core network is shown in Figure 3. This analysis shows the reason behind the two main factions discussed above. There appear to be two nodes (Nodes 1 and 12 in the figure) that are heavily involved with password sharing to nodes that, in turn, are not well connected to each other. For the entire network, Node 12 had the highest degree centrality score of 57 (5.7% of nodes), while Node 1 had the second highest score of 31 (3.1%). The average degree centrality for all nodes was 0.2%.
5 5 Figure 3: The core network after isolated nodes and pairs were removed in two passes. Node 1 in the core network shown in Figure 3 represents an address used by the employee performance management system within Enron. This was an online system that was used to periodically collect performance appraisals about employees. During each of the evaluation periods, a username and password was sent from the Node 1 address to the senior managers of the corporation. In addition, if the managers did not use the system, they were sent reminders and their username and password were repeated. The network surrounding Node 1, then, represents senior managers of the corporation. They received passwords from the performance management system, and they also sometimes shared passwords among themselves. Node 12 in the core network represents a senior manager at Enron Online, the virtual trading arm of the corporation. Even though her personal folders were not included in the corpus, her messages were often found in other employees' mailboxes. This manager appears to have been responsible for setting up accounts for traders who used the online trading system. The network surrounding Node 12, then, represents traders who used the Enron Online service. In most cases, these traders did not share passwords with the corporate managers who are clustered around Node 1. It is also interesting to note the frequent password sharing between Nodes 25 and 94 in Figure 3. These nodes represent an internal (Node 25) and external (Node 94) address used by the same person, a senior manager of research within Enron. The external address was with the AOL Internet service, and this person sent a password from his Enron address to the AOL address 14 times, and received a password from the AOL address 5 times. In most cases, the passwords were to subscription services provided by third parties (e.g., news and research services). A possible reason behind this frequent sharing of passwords to an external address was revealed by a message from the system administrators sent in July This message announced that external access to the corporate Outlook system was now possible. So, it
6 6 is likely that the pattern of sending passwords to an external address may have been necessary in order to work remotely. It is interesting to note that this person continued his self-sharing practices after this announcement, perhaps out of habit or convenience. This pattern of sending passwords to an external address demonstrates one possible value of social network analysis for security and privacy compliance. Had this social network analysis been done during the life of the corporation, the pattern of sending passwords to external addresses could have been detected and remedial measures (e.g., policies, training, message blocking) put in place. Moreover, the root cause of the behavior, an apparent inability to access the internal mail system, could have been addressed sooner. It is also apparent in Figure 3 that Node 25 was also involved with other password sharing (sending to Nodes 57 and 53 and receiving from Nodes 84 and 67). In one case, this person shared a password for a third party service with an internal colleague, and in another case he sent software installation instructions, including a download password, to a group member. These might represent breaches of internal and external security policies, so automatic detection of these messages may have been valuable Password Quality Since Nodes 1 and 12 represent key sources of passwords within the corporation, it may be useful to examine the actual passwords that they sent for repetition and strength [5]. The Node 1 address (the performance management system) was used to send passwords 62 times, and in 39 of those cases the same weak password ("WELCOME") was sent to different people. This means that it would have been very easy for an Enron employee to guess another employee's password, and the password could have been easily cracked using dictionary searches. In other cases, however, a stronger unique password (e.g., "KTDVWCCH") was sent to the managers. These tended to occur in messages that were identical in format and they may have been generated by an automated process. Node 12 in the core network (the Enron Online manager) sent out passwords 74 times, but only 20 different passwords were used. One password ("q#9m#npx"), although apparently strong, was sent 30 times to 30 different recipients. Node 12 also used the password "WELCOME!" 20 times for 15 different recipients, and the password "enron1" 4 times for 4 different recipients. Again, this means that an insider might be able to guess another employee's password based on the one that they received. These password quality findings also demonstrate the value of social network analysis for identifying possible security and privacy issues. They key originators of passwords were identified using the communication patterns found in the corpus, and a content analysis showed poor security and privacy behaviors. Had such an analysis been done during the life of the corporation, remedial training programs and better account management tools and practices could have been put in place to ensure that high-quality, unique passwords were being used The Network Periphery The corpus also contained many instances of password sharing between isolated node pairs and small groups. It may be useful to examine these instances of password sharing to look for any unusual behaviors. As a demonstration, Figure 4 shows the entire password sharing network again, but the coloring of the nodes has been changed. Nodes that are well connected are colored white, and isolated nodes and pairs are colored black. Small isolated groups, representing more than 3 nodes, are shown in a grey color in this figure, and these clusters are the focus of this analysis. This first cluster of interest is the group of 7 nodes colored grey appearing at the 12 o'clock position in Figure 4. These instances of password sharing centre around one Enron employee who stored his passwords in a specific folder. In most cases, this person received passwords from third party services, usually personal services used to purchase auto parts or auto loans. In one case a password was sent from a personal external address (on the MSN service) to the internal Enron address, and this involved a password for an online discussion forum about trucks. These instances might be in violation of policies against conducting personal business at work. Also, in one instance, this employee shared his password to the Enron Online service with an internal colleague, and this might represent a breach of corporate security policies.
7 7 The second cluster of interest is the group of 5 nodes colored grey appearing at 11 o'clock in Figure 4. This cluster was involved in sharing a collection of passwordprotected memos and documents. It is not clear why these documents were being protected, but the behavior appears to be unique to this group and might represent a concern about insider activities or a breach of corporate policies. The third interesting cluster is the group of 4 nodes colored grey appearing at 9 o'clock in Figure 4. This cluster is centered on an Enron employee who received a password for a third party service and shared that password with an internal colleague. This person also twice sent account information for a third party service to a personal address on a local Internet service. Again, this password sharing behavior might be of interest from a corporate security perspective. The fourth cluster of interest is the group of four grey nodes appearing at 8 o'clock in Figure 4. This cluster is centered on an Enron employee who sent her password to an internal help desk so they could diagnose a system problem. She also shared the password to an airline reservation service with an internal group address, and she sent an employee ID number and password to a new employee. These may or may not represent activities that are of interest from a security and privacy perspective. 4. Discussion The purpose of this research was to demonstrate the value of social network analysis for the monitoring of security and privacy issues within an organization. Using the Enron corpus as an example of corporate communications, we were able to develop simple methods to identify instances of password sharing, a practice that should be a security concern to any organization. Social network analysis was able to identify key creators Figure 4: The full password sharing network highlighting isolated clusters involving more than 3 nodes (colored grey). The well connected nodes are colored white, while isolates and pairs are colored light black.
8 8 and sharers of passwords, and an analysis of the passwords themselves showed that quality was clearly a problem. The network analysis was also able to reveal interesting communication patterns, such as sharing passwords with external accounts owned by the same person, which might have been useful as indicators of a problem in corporate systems or practices. We were also able to uncover cases of possible policy violations, such as the sharing of internal and external accounts. In addition, one case of possible insider collusion was found in a pattern of sharing password-protected documents. Although password sharing may be contrary to the goals of keeping information secure, it may be necessary in some situations. If people are asked to work together on documents or systems, for example, and the organization does not provide methods for shared access, then it is inevitable that people will share whatever passwords are necessary to get the job done. Australian researchers recently examined the issue of people sharing bank passwords with friends or family members [16]. Although banks explicitly stated that customers should not share their passwords and they risk losing all financial protections if they do, this study found many cases where password sharing was considered acceptable and necessary. For example, married couples often found it necessary to share access to bank accounts, and such sharing was often seen as an expression of trust in one's partner. Singh et al. [16] also documented password sharing within remote communities where banking services were scarce. Often only one member of a group is able to travel to the bank, so that person might carry many cards and passwords to do the banking for many people. Elderly and disable people may also have to share their banking passwords with family, friends, or caregivers because they cannot visit the bank themselves. Thus, uncovering examples of password sharing is only a first step. Understanding the reasons behind the sharing and the appropriate response is also very important. The major shortcoming of this work is that it has all been done after the fact. In order to be of significant value to a company or organization, the possible security issues would have to be discovered as they occur. Moreover, due to the large amount of data that would have to be monitored, the identification of items of interest would have to be largely automatic. We are currently conducting research and development in these areas [9, 10]. 5. References 1. Ashley, P., Powers, C., & Schunter, M. (2002).From privacy promises to privacy management: A new approach for enforcing privacy throughout an enterprise. Proceedings of the 2002 Workshop on New Security Paradigms, Benston, G.J., & Hartgraves, A.L. (2002). Enron: What happened and what we can learn from it. Journal of Accounting and Public Policy, 21, Bhattacharya, J., Dass, R., Kapoor, V., & Gupta, S.K. (2006). Utilizing network features for privacy violation detection. Proceedings of the First International Conference on Communication System Software and Middleware, Delhi, India, Jan. 8-12, Cauley, L. (2006). NSA has massive database of Americans' phone calls. USA Today. URL: 5. Cisneros, R., Bliss, D., & Garcia, M. (2006). Password auditing applications. Journal of Computing Sciences in Colleges, 21(4), Diesner, J., & Carley, K.M. (2005). Exploration of communication networks from the Enron corpus. Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining, Keila, P.S., & Skillicorn, D.B. (2005). Structure in the Enron dataset. Computational & Mathematical Organization Theory, 11(3), Klimt, B., & Yang, Y. (2004). Introducing the Enron corpus. First Conference on and Anti-Spam (CEAS). URL: /168.pdf 9. Korba, L., Song, R., Yee, G., & Patrick, A.S.. (2006). Automated social network analysis for collaborative work. Proceedings of the Third International Conference on Cooperative Design, Visualization and Engineering (CDVE 2006). Palma de Mallorca, Spain. September Korba, L., Song, R., Yee, G., Patrick, A..S., Buffett, S., Wang, Y., & Geng, L. (2007). Private data management in collaborative environments. To appear in Proceedings of the Third International Conference on Cooperative Design, Visualization and Engineering (CDVE 2007). Shanghai, China. September Krebs, V.E. (2002). Uncloaking terrorist networks. First Monday, 7(4). URL: html 12. McCallum, A., Corrada-Emmanuel, A., & Wang, X. (2005). Topic and role discovery in social networks. Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence, July.
9 9 13. Nooy, W. and Mrvar, A. and Batagelj, V. (2005). Exploratory social network analysis with Pajek. Cambridge University Press. 14. Shetty, J. & Adibi, J. (2004).The Enron dataset database schema and brief statistical report. Technical report, Information Sciences Institute, URL: _Report.pdf 15. Shetty, J., & Adibi, J. (2005). Discovering important nodes through graph entropy: The case of Enron database. Proceedings of the 3rd International Workshop on Link Discovery, Singh, S., Cabraal, A., Demosthenous, C., Astbrink, G., & Furlong, M. (2007). Password sharing: Implications for security design based on social practice. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Wilson, S. (2002). Combating the lazy user: An examination of various password policies and guidelines. SANS Institute. URL: hentication/142.php
Cloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
Strategies for Cleaning Organizational Emails with an Application to Enron Email Dataset
Strategies for Cleaning Organizational Emails with an Application to Enron Email Dataset Yingjie Zhou [email protected] Mark Goldberg [email protected] Malik Magdon-Ismail [email protected] William A. Wallace
INBOX. How to make sure more emails reach your subscribers
INBOX How to make sure more emails reach your subscribers White Paper 2011 Contents 1. Email and delivery challenge 2 2. Delivery or deliverability? 3 3. Getting email delivered 3 4. Getting into inboxes
Vodafone Email Plus. User Guide for Windows Mobile
Vodafone Email Plus User Guide for Windows Mobile 1 Table of Contents 1 INTRODUCTION... 4 2 INSTALLING VODAFONE EMAIL PLUS... 4 2.1 SETUP BY USING THE VODAFONE EMAIL PLUS ICON...5 2.2 SETUP BY DOWNLOADING
RSCCD REMOTE PORTAL TABLE OF CONTENTS: Technology Requirements NOTE
RSCCD REMOTE PORTAL The RSCCD Remote Portal allows employees to access their RSCCD Email (via Outlook Web Access), Department (Public) Folders, Personal (H Drive) Folder, and the District Intranet from
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
Using Data Mining Methods to Predict Personally Identifiable Information in Emails Liqiang Geng 1, Larry Korba 1, Xin Wang, Yunli Wang 1, Hongyu Liu 1, Yonghua You 1 1 Institute of Information Technology,
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
Anti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
Acceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 [email protected] www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
Regulatory Compliance Using Identity Management
Regulatory Compliance Using Identity Management 2015 Hitachi ID Systems, Inc. All rights reserved. Regulations such as Sarbanes-Oxley, FDA 21-CFR-11 and HSPD-12 require stronger security, to protect sensitive
Software Solutions Digital Marketing Business Services. Email Marketing. What you need to know
Software Solutions Digital Marketing Business Services Email Marketing What you need to know Contents Building Your Email List 1 Managing Your Email List. 2 Designing Your Emails 3 Branding Your Emails.....
SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing
EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render
Abused Internet Domain Registration Analysis for Calculating Risk and Mitigating Malicious Activity
2012 Abused Internet Domain Registration Analysis for Calculating Risk and Mitigating Malicious Activity KnujOn.com LLC Brief Version 2/18/2012 Promising Research KnujOn.com LLC is proud to release this
Running the SANS Top 5 Essential Log Reports with Activeworx Security Center
Running the SANS Top 5 Essential Log Reports with Activeworx Security Center Creating valuable information from millions of system events can be an extremely difficult and time consuming task. Particularly
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
Managing Special Authorities. for PCI Compliance. on the. System i
Managing Special Authorities for PCI Compliance on the System i Introduction What is a Powerful User? On IBM s System i platform, it is someone who can change objects, files and/or data, they can access
A User s Guide to Helm
A User s Guide to Helm WebHost Automation Ltd http://www.webhostautomation.com/ January 2006 Doc: HELM300.02.09 Complying with all applicable copyright laws is the responsibility of the user. Without limiting
N-CAP Users Guide. Everything You Need to Know About Using the Internet! How Worms Spread via Email (and How to Avoid That)
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Worms Spread via Email (and How to Avoid That) How Worms Spread via Email (and How to Avoid That) Definitions of: A Virus: is
User guide Business Internet e-mail features
User guide Business Internet e-mail features Page 1 de 1 Table of content Page Introduction 3 1. How do I access my web based e-mail? 3 2. How do I access/alter these enhancements? 3 A. Basic Features
ModusMail Software Instructions.
ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account
Optimizing Network Vulnerability
SOLUTION BRIEF Adding Real-World Exposure Awareness to Vulnerability and Risk Management Optimizing Network Vulnerability Management Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965
USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security
USER S MANUAL Cloud Email Firewall 4.3.2.4 1 Contents 1. INTRODUCTION TO CLOUD EMAIL FIREWALL... 4 1.1. WHAT IS CLOUD EMAIL FIREWALL?... 4 1.1.1. What makes Cloud Email Firewall different?... 4 1.1.2.
CompatibleOne Open Source Cloud Broker Architecture Overview
CompatibleOne Open Source Cloud Broker Architecture Overview WHITE PAPER October 2012 Table of Contents Abstract 2 Background 2 Disclaimer 2 Introduction 2 Section A: CompatibleOne: Open Standards and
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
How To Manage Log Management
: Leveraging the Best in Database Security, Security Event Management and Change Management to Achieve Transparency LogLogic, Inc 110 Rose Orchard Way, Ste. 200 San Jose, CA 95134 United States US Toll
CWBdirect Business Online Banking. User Guide
CWBdirect Business Online Banking User Guide Table of Contents CWBdirect Business Online Banking... 2 Introduction... 2 Convenience... 2 Flexibility... 2 Security... 2 Login... 2 First-time login... 3
1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5
Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. What makes Panda Cloud Email Protection different?... 4 1.1.2. Is it secure?... 4 1.2.
InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?
What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software
WHAT THE FRAUD? A Look at Telecommunications Fraud and Its Impacts
WHAT THE FRAUD? A Look at Telecommunications Fraud and Its Impacts OUTLINE Overview...3 What is Telecom Fraud...4 Different Types of Fraud...5 A Look at the Top 5...6 What is a PBX... 10 PBX Hacking A
FKCC AUP/LOCAL AUTHORITY
FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and
How To Understand The Benefits Of Big Data Analysis
Ioana-Brînduşa Bogdan Masterand Faculty of Mathematics and Informatics Spiru Haret University Bucharest, Romania [email protected] THE BENEFITS OF BIG DATA ANALYTICS Abstract: The wealth of information
DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE
DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE INTRODUCTION RESEARCH IN PRACTICE PAPER SERIES, FALL 2011. BUSINESS INTELLIGENCE AND PREDICTIVE ANALYTICS
700 Fox Glen Barrington, Illinois 60010 ph: [847] 842-9570 fx: [847] 842-0190 www.excaltech.com [email protected]. Webmail System User Guide
700 Fox Glen Barrington, Illinois 60010 ph: [847] 842-9570 fx: [847] 842-0190 www.excaltech.com [email protected] Webmail System User Guide Last Updated November 14, 2013 -2- Table of Contents Welcome
REVIEWER S GUIDE - QURB -
REVIEWER S GUIDE - QURB - INTRODUCTION Industry watchers predict that nearly half of a typical user s Inbox will be spam by 2005. What if you could guarantee that each morning you opened a completely clean
Getting Started with 20/20 Insight TRIAL VERSION
Getting Started with 20/20 Insight TRIAL VERSION 20/20 Insight is a registered trademark of Performance Support Systems, Inc., Newport News, VA. Windows XP, MS Outlook, MS Word, Excel and PowerPoint are
Domains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc.
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Domains All Domains System administrators can use this section
Email Marketing Glossary of Terms
Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to
YOUR HIPAA RISK ANALYSIS IN FIVE STEPS
Ebook YOUR HIPAA RISK ANALYSIS IN FIVE STEPS A HOW-TO GUIDE FOR YOUR HIPAA RISK ANALYSIS AND MANAGEMENT PLAN 2015 SecurityMetrics YOUR HIPAA RISK ANALYSIS IN FIVE STEPS 1 YOUR HIPAA RISK ANALYSIS IN FIVE
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves
MailEnable Web Mail End User Manual V 2.x
MailEnable Web Mail End User Manual V 2.x MailEnable Messaging Services for Microsoft Windows NT/2000/2003 MailEnable Pty. Ltd. 486 Neerim Road Murrumbeena VIC 3163 Australia t: +61 3 9569 0772 f: +61
3 Email Marketing Security Risks. How to combat the threats to the security of your Email Marketing Database
3 Email Marketing Security Risks How to combat the threats to the security of your Email Marketing Database Email Marketing Guide June 2013 Security Threats PROTECTING YOUR EMAIL DATABASE FROM HACKERS
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
Website Security: How to Avoid a Website Breach. Jeff Bell, CISSP, CPHIMS, ACHE Director, IT Security and Risk Services CareTech Solutions
Website Security: How to Avoid a Website Breach Jeff Bell, CISSP, CPHIMS, ACHE Director, IT Security and Risk Services CareTech Solutions www.caretech.com > 877.700.8324 An enterprise s website is now
Webmail Instruction Guide
Webmail Instruction Guide This document is setup to guide your through the use of the many features of our Webmail system. You may either visit www.safeaccess.com or webmail.safeaccess.com to login with
How to Analyze Company Using Social Network?
How to Analyze Company Using Social Network? Sebastian Palus 1, Piotr Bródka 1, Przemysław Kazienko 1 1 Wroclaw University of Technology, Wyb. Wyspianskiego 27, 50-370 Wroclaw, Poland {sebastian.palus,
SIP Service Providers and The Spam Problem
SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation
the barricademx end user interface documentation for barricademx users
the barricademx end user interface documentation for barricademx users BarricadeMX Plus The End User Interface This short document will show you how to use the end user web interface for the BarricadeMX
Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts
Medical Privacy Version 2015.04.13 Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts In order for Lux Scientiae, Incorporated (LuxSci) to ensure the security and privacy of all Electronic
EFFECTIVE SPAM FILTERING WITH MDAEMON
EFFECTIVE SPAM FILTERING WITH MDAEMON Introduction The following guide provides a recommended method for increasing the overall effectiveness of MDaemon s spam filter to reduce the level of spam received
How To Manage Your Spam On Graymail On Pc Or Macodeo.Com
User Guide Revision E SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and
Using WinGate 6 Email. Concepts, Features, and Configurations.
WinGate Feature Guide Using WinGate 6 Email Concepts, Features, and Configurations. Neil Gooden Qbik New Zealand Limited Rev 1.0 December 2004 2 Introduction...3 Basic Email Concepts... 3 Differences in
Spam DNA Filtering System
The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,
WEBSITE PRIVACY POLICY. Last modified 10/20/11
WEBSITE PRIVACY POLICY Last modified 10/20/11 1. Introduction 1.1 Questions. This website is owned and operated by. If you have any questions or concerns about our Privacy Policy, feel free to email us
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
Using Webmail. Document Updated: 11/10. Technical Manual: User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header
Using Webmail Technical Manual: User Guide Webmail is supported in the following browsers: Windows Internet Explorer 6, Internet Explorer 7, Firefox 2, and Firefox 3 Mac OSX Safari 2, Safari 3, Firefox
Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam
Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam DOCUMENT REVISION DATE: October, 2010 Boundary Defense for Email Admin Guide / Table of Contents Page 2 of 34 Table of Contents 1 INTRODUCTION...
INTEGRATION GUIDE MS OUTLOOK 2003 VERSION 2.0
INTEGRATION GUIDE MS OUTLOOK 2003 VERSION 2.0 Document Code: ST_UT_MB_MSO_2.0_18042012 The data and information contained in this document cannot be altered without the express written permission of SecuTech
Using Webmail. Technical Manual: User Guide. Document Updated: 1/07. The Webmail Window. Displaying and Hiding the Full Header.
Using Webmail Technical Manual: User Guide The Webmail Window To save an attachment: 1. Click once on the attachment name. Or, if there are multiple attachments, click the Save icon to save all attachments
http://connectwise.reflexion.net/login?domain=connectwise.net
ConnectWise Total Control: Managed Email Threat Protection Version: 1.5 Creation Date: 11-September-2009 Last Updated: 24-August-2012 LOGGING IN An e-mail will be or has sent with your username and password.
By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224
COUGAR WIRELESS ACCEPTABLE USE POLICY I. INTRODUCTION Cougar Wireless and its various affiliates and subsidiaries (collectively we, us, our ) are committed to being responsible network citizens. To assist
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Process Intelligence: An Exciting New Frontier for Business Intelligence
February/2014 Process Intelligence: An Exciting New Frontier for Business Intelligence Claudia Imhoff, Ph.D. Sponsored by Altosoft, A Kofax Company Table of Contents Introduction... 1 Use Cases... 2 Business
PCRecruiter Internal Email Client
PCRecruiter Internal Email Client The standard email buttons on contact record screens and lists allow PCRecruiter users to send email out to any contact in the database. However, if you are using PCRecruiter
Email Using MSN Hotmail
Email Using MSN Hotmail lab 14 Objectives: Upon successful completion of Lab 14, you will be able to View email messages received in the Inbox Send email messages using the To, Cc, and Bcc fields Reply
Message Archiving User Guide
Message Archiving User Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. [email protected] www.spamsoap.com RESTRICTION ON USE, PUBLICATION,
Outlook Web App McKinney ISD 5/27/2011
Outlook Web App McKinney ISD 5/27/2011 Outlook Web App Tutorial Outlook Web Access allows you to gain access to your messages, calendars, contacts, tasks and public folders from any computer with internet
1) Outsourcing ERP systems helps to lower the cost of software ownership and maintenance. Answer: TRUE Diff: 1 Page Ref: 268
Enterprise Systems for Management, 2e (Motiwalla/Thompson) Chapter 10 Global, Ethics, and Security Management 1) Outsourcing ERP systems helps to lower the cost of software ownership and maintenance. Diff:
CONTENTS. Introduction... 3. Outlook at a glance... 3. Configure Outlook 2010 on-campus... 3. Creating Folders... 4. Sorting Emails...
OFFICE OF INFORMATION TECHNOLOGY Academic Technology Unit Microsoft Outlook 2010 Basics Workbook CONTENTS Introduction... 3 Outlook at a glance... 3 Configure Outlook 2010 on-campus... 3 Creating Folders...
Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology
20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business
How To Analyze Email Activity At Enron
Discovery of Email Communication Networks from the Enron Corpus with a Genetic Algorithm using Social Network Analysis Garnett Wilson and Wolfgang Banzhaf During the legal investigation of Enron Corporation,
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
Evaluating Software Products - A Case Study
LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATION: A CASE STUDY ON GAMES Özge Bengur 1 and Banu Günel 2 Informatics Institute, Middle East Technical University, Ankara, Turkey
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
EMAIL ARCHIVING. Keep a complete email history without breaking the bank. www.exclaimer.in
EMAIL ARCHIVING Keep a complete email history without breaking the bank www.exclaimer.in INTELLIGENTLY PRICED ARCHIVING for Microsoft Exchange Exclaimer Mail Archiver is the simplest and lowest cost solution
Email Protection for your account
User Guide Revision A SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and
National Australia Bank
Background In January 2004 the National Australia Bank (NAB) made the following three public announcements relating to losses from the foreign exchange options transactions: 13 January 2004 an initial
8 Securities Limited ( 8Sec ) reserves the right to update and change the TOS from time to time without notice or acceptance by you.
1. Acceptance of Terms Welcome to s Social Trading (the Social Trading Features ). Social Trading Features provide an integrated solution of equity trading and exploration of interactions among investors
HGC SUPERHUB HOSTED EXCHANGE EMAIL - 2010 / 2007 SMART PANEL USER GUIDE
HGC SUPERHUB HOSTED EXCHANGE EMAIL - 2010 / 2007 SMART PANEL USER GUIDE Table of Contents 1. Login to Smart Panel... 1 2. Account Info... 2 3. User Setup Profile... 3 4. User & Mailbox... 4 5. Domain Name...
EMAIL MARKETING TIPS. From Our InfoUSA Email Experts
EMAIL MARKETING TIPS From Our InfoUSA Email Experts In order to assist you every step of the way while creating an Email Marketing Campaign, our InfoUSA Email Experts have compiled lists of their best
ConvincingMail.com Email Marketing Solution Manual. Contents
1 ConvincingMail.com Email Marketing Solution Manual Contents Overview 3 Welcome to ConvincingMail World 3 System Requirements 3 Server Requirements 3 Client Requirements 3 Edition differences 3 Which
Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions
Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions CORE Security +1 617.399-6980 [email protected] www.coresecurity.com blog.coresecurity.com Preempting
Think about how often you check your own email and find tons of messages with subject lines like this:
Writing Effective Subject Lines By now you are probably getting pretty anxious to get out there and send your first email promotion. You might even have a great idea all ready for a campaign that you re
Threat Modeling Cloud Applications
Threat Modeling Cloud Applications What You Don t Know Will Hurt You Scott Matsumoto Principal Consultant [email protected] Software Confidence. Achieved. www.cigital.com [email protected] +1.703.404.9293
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring. A White Paper from the Experts in Business-Critical Continuity TM
Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring A White Paper from the Experts in Business-Critical Continuity TM Executive Summary With continued efforts to reduce overhead,
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
