Cyber Security Threats Shehzad Mirza Director of the MS ISAC SOC



Similar documents
Public School Teacher Experience Distribution. Public School Teacher Experience Distribution

Three-Year Moving Averages by States % Home Internet Access

Impacts of Sequestration on the States

NON-RESIDENT INDEPENDENT, PUBLIC, AND COMPANY ADJUSTER LICENSING CHECKLIST

Workers Compensation State Guidelines & Availability

MAINE (Augusta) Maryland (Annapolis) MICHIGAN (Lansing) MINNESOTA (St. Paul) MISSISSIPPI (Jackson) MISSOURI (Jefferson City) MONTANA (Helena)

Chex Systems, Inc. does not currently charge a fee to place, lift or remove a freeze; however, we reserve the right to apply the following fees:

Net-Temps Job Distribution Network

Englishinusa.com Positions in MSN under different search terms.

High Risk Health Pools and Plans by State

Licensure Resources by State

State-Specific Annuity Suitability Requirements

American C.E. Requirements

NAIC ANNUITY TRAINING Regulations By State

BUSINESS DEVELOPMENT OUTCOMES

Real Progress in Food Code Adoption

Data show key role for community colleges in 4-year

State Pest Control/Pesticide Application Laws & Regulations. As Compiled by NPMA, as of December 2011

State Tax Information

STATE-SPECIFIC ANNUITY SUITABILITY REQUIREMENTS

State Specific Annuity Suitability Requirements updated 10/10/11

Supplier Business Continuity Survey - Update Page 1

State Tax Information

2014 INCOME EARNED BY STATE INFORMATION

Prepared by : Michael R. Fowlkes CBP / Fraudulent Document Officer San Ysidro Port of Entry 720 E. San Ysidro Blvd. San Ysidro, CA (619)

Real Progress in Food Code Adoption

I have been asked to pose the following questions to the list serve regarding disaster recovery plans

STATISTICAL BRIEF #273

The Obama Administration and Community Health Centers

Use of "Mail Box" service. Date: April 6, [Use of Mail Box Service] [April 6, 2015]

What to Know About State CPA Reciprocity Rules. John Gillett, PhD, CPA Chair, Department of Accounting Bradley University, Peoria, IL

NAIC Annuity Suitability Requirements by State

Verizon Wireless Ranks Highest in Wireless Network Quality Performance in Five Regions; AT&T Ranks Highest in One Region

STATE DATA CENTER. District of Columbia MONTHLY BRIEF

********************

Recruitment and Retention Resources By State List

A/B MAC Jurisdiction 1 Original Medicare Claims Processor

Schedule B DS1 & DS3 Service

State by State Summary of Nurses Allowed to Perform Conservative Sharp Debridement

We do require the name and mailing address of each person forming the LLC.

Question for the filing office of Texas, Re: the Texas LLC act. Professor Daniel S. Kleinberger. William Mitchell College of Law, Minnesota

NAIC Annuity Suitability Requirements by State

In-state Tuition & Fees at Flagship Universities by State Rank School State In-state Tuition & Fees Penn State University Park Pennsylvania 1

Overview of School Choice Policies

Current State Regulations

14-Sep-15 State and Local Tax Deduction by State, Tax Year 2013

Attachment A. Program approval is aligned to NCATE and is outcomes/performance based

NOTICE OF PROTECTION PROVIDED BY [STATE] LIFE AND HEALTH INSURANCE GUARANTY ASSOCIATION

Case Study CCAvenue. ebrandz Appraisal:

Compulsory Auto Insurance and Financial Responsibility Laws State Reporting Programs

Exploring the Impact of the RAC Program on Hospitals Nationwide

recovery: Projections of Jobs and Education Requirements Through 2020 June 2013

Threats to Local Governments and What You Can Do to Mitigate the Risks

IRS Request for Assistance re New EIN and True Owner. Question by: Sarah Steinbeck on behalf of Leslie Reynolds. Date: 5 August 2010

Sample/Excerpts ONLY Not Full Report

Please contact if you have any questions regarding this survey.

Acceptable Certificates from States other than New York

Education Program Beneficiaries

Nurse Aide Training Requirements, 2011

Question by: Karon Beyer. Date: March 28, [LLC Question] [ ]

$7.5 appropriation $ Preschool Development Grants

Impact of the House Full-Year Continuing Resolution for FY 2011 (H.R. 1)

NCSL Capitol Security Survey ( )

LPSC Renewable Energy Pilot y RFPs issued by Utility Companies by Order of Commission, November 2010

States Ranked by Alcohol Tax Rates: Beer (as of March 2009) Ranking State Beer Tax (per gallon)

US Department of Health and Human Services Exclusion Program. Thomas Sowinski Special Agent in Charge/ Reviewing Official

Census Data on Uninsured Women and Children September 2009

Low-Profit Limited Liability Company (L3C) Date: July 29, [Low-Profit Limited Liability Company (L3C)] [July 29, 2013]

THE 2013 HPS SALARY SURVEY

State Individual Income Taxes: Treatment of Select Itemized Deductions, 2006

ADDENDUM TO THE HEALTH INSURANCE MARKETPLACE SUMMARY ENROLLMENT REPORT FOR THE INITIAL ANNUAL OPEN ENROLLMENT PERIOD

Nurse Aide Training Requirements, October 2014

Library ebook Survey hosted by OverDrive

PUBLIC HOUSING AUTHORITY COMPENSATION

Hosted and Cloud-Based VoIP and UC Services Template

THE 2012 HPS SALARY SURVEY

List of State Residual Insurance Market Entities and State Workers Compensation Funds

Broadband Availability in America. With Rural Americans Looking for High-Speed Services, Adequate Broadband Speeds Remain Out of Reach for Many

(In effect as of January 1, 2004*) TABLE 5a. MEDICAL BENEFITS PROVIDED BY WORKERS' COMPENSATION STATUTES FECA LHWCA

STATISTICAL BRIEF #435

GOVERNMENT-FINANCED EMPLOYMENT AND THE REAL PRIVATE SECTOR IN THE 50 STATES

J.D. Power Reports: Strong Network Quality Performance Is Key to Higher Customer Retention for Wireless Carriers

A-79. Appendix A Overview and Detailed Tables

SECTION 109 HOST STATE LOAN-TO-DEPOSIT RATIOS. or branches outside of its home state primarily for the purpose of deposit production.

Consent to Appointment as Registered Agent

U.S. Fish & Wildlife Service. Getting HIP Your Role In Conserving Migratory Birds Through the Harvest Information Program

EMBARGOED UNTIL 6:00 AM ET WEDNESDAY, NOVEMBER 30, 2011

State Tax of Social Security Income. State Tax of Pension Income. State

22 States do not provide access to Chapter 9 Bankruptcy

Model Regulation Service January 2006 DISCLOSURE FOR SMALL FACE AMOUNT LIFE INSURANCE POLICIES MODEL ACT

TOTAL AWARD AMOUNT $119,067, State and Territory Base Awards for Policy and Environmental Change $44,602,383

2015 National Utilization and Compensation Survey Report. Section 3 Billing Rates. Based on Data Collected: 4 th Quarter 2014

Commission Membership

Transcription:

Cyber Security Threats Shehzad Mirza Director of the MS ISAC SOC Will Pelgrin CIS President and CEO MS ISAC Chair

2.6 Billion Internet Users 13% 1% 6% 3% Asia 44% 10% Europe 22.7% 44% North America 13.0% Lat Am / Carib 10.3% 23% Africa 5.7% Middle East 3.3% Oceania / Australia 1.0%

Connectwith constituents Learn new ideas Broadcast public functions live The Internet is a tremendous tool for governments Allows your constituents to register online Pay employees easily

Criminals look for data and state and local governments have a lot of it! From Cradle To Grave And Beyond! Confidential Informants

Leon Panetta, Secretary of Defense The next Pearl Harbor that we confront could very well be a cyber attack that cripples our power systems, our grid, our security systems, our government systems Cyber war could paralyze the US U.S.

Who Is Behind The Threats? Cyber Criminals Hacktivists Nation States

Cyber Threats Hacktivism Mobile Devices Insider Threats & Human Error Phishing Old Infrastructure

Hacktivism

Hacktivism i Attacking corporations, governments, organizations and individuals to make a point Sophos 2012 Hacktivist groups target: Private corporations Federal Government State t Government Local Government Education Law enforcement groups

User Account Compromise Attack Scenario 1. Law Enforcement Association (i.e. Sheriff association, i Police Benevolent Society, etc) gets compromised 2. Attackers gather the stolen credentials and either post to sharing website (i.e. Pastebin) or keep the login information for themselves 3. Either the hackers themselves or other malicious actors then download and use the credentials from sharing website to login and access local and federal law enforcement systems 4. The compromise of the "association" system may lead to the compromise of the SLTT government systems

What Can You Do To Prevent This? Perform regular vulnerabilityassessmentsof assessments all Internet facing systems Remind employees not to re use work passwords Monitor Webmail for: Failed logins Logins from out of the area or country Logins at odd hours

Mobile Devices

Smartphone and Tablet Security Risks Too Many Individuals Still Don t use encryption, passwords, time-out settings or any other security protection Store their sensitive corporate information on smartphones Lose one of these devices at some point

Mobile Devices Targets of Attack The number of variants of malicious software aimed at mobile devices has reportedly risen from about 14,000 to 40,000 or about 185% in less than a year U.S. Government Accountability Office

Leaving your laptop or smartphone unattended d can lead to big problems More than 10,000 laptops are reported lost every week at 36 of the p p p y largest U.S. airports, and 65 percent of those laptops are not reclaimed. Ponemon Institute

Insider Threats and Human Error

Insider Threats are Real Can be intentional or accidental WikiLeaks Hundreds of thousands of confidential documents leaked by military employee Inadvertent posting of the Social Security numbers and birth dates of 22,000 government retirees on a state procurement website Disgruntled city employee tampers with city network to deny access to top administrators i t

Human Error Weak Passwords tomshardware.com

A longer password is a better password Strong passwords should be 9-12 characters and possess a combination of letters, numbers, and special characters.

Example of Strong Password This Is A Better Password Which Would Be Harder To Crack Password = T1@bPwWBH2C

Most Dangerous Cyber Celebrity!!!!

Phishing

Phishing scams entice email recipients into clicking on a link or opening an attachment which is malicious. WELL WRITTEN APPEARS CREDIBLE ENTICING OR SHOCKING SUBJECT APPARENT TRUSTED SOURCE Gone Phishing

Protect Yourself Never click on a link in a suspicious e mail. Open a new web browser and manually go to the vendors website to log into your account. Call your vendor using a phone number from an official source to get the information you need.

Old Infrastructure

Old hardware and software that is beyond the end of its support life is often still inuse today No longer supported by the vendors Using them after end of life places your organization at great risk since any security vulnerability will NOT be fixed, making it easy for hackers to launch a successful cyber attack

Industrial Control Systems

Internet Facing Industrial Control Systems Approximately 7,200 Internet Facing Control System Devices Source: US Department of Homeland Security ICS CERT Monthly Oct Dec2012

Case Studies

South Carolina 2012 More than 3.3 million unencrypted bank account numbers and 3.8 million tax returns were stolen in an attack against the South Carolina Department of Revenue. Data lost: SSNs, bank account numbers and credit card numbers. Breach due to a state employee falling for a phishing attack that enabled hackers to leverage that employee's access rights to gain access to the government entity's systems and databases.

State of Utah 2012 280,000 Social Security numbers were stolen, and another 500,000000 people lost personal information. Eastern European hackers broke into the server maintained by the Utah Department of Technology Services in the spring of 2012 by taking advantage of a misconfiguration.

What Can You Do? Keep your systems patched Have cyber security policies Monitor compliance with the policies i Log and monitor network traffic Backup your systems on a regular basis and check them before storing off site Train employees on good cyber security practices

Zeus Financial Fraud A bank informed a School District that $758,758.70 was to betransferred overseas The School District cancelled the transaction The Bank than asked about the $1,190,400 that was already sent overseas And the $1,862,400 also already sent overseas

What Can You Do? Have a dedicated computer for financial transactions IP Filtering/white list Limit software programs (no java, flash, email, etc.) Set up non privileged user account Take advantage of two factor authentication where available

Stats

Number of Infections All MSS Partners 450 400 350 Dec 12 Jan 13 Feb 13 Mar 13 300 250 200 150 100 50 0

Daily Activity Summary All MSS Partners 350 Dec 12 Jan 13 300 Feb 13 Mar 13 250 200 150 100 50 0 Accepted Inbound Port Scans Peer to Peer Usage SQL Injection Exploit Attempts System File Access Attempts Login Brute Forcing Server Attack: Web Server Spyware Traffic Events

300 Notifications Dec 12 Jan 13 Feb 13 250 Mar 13 200 150 100 50 0 Darknet Keylogger Defacement Credentials

The is here to help!

What is the MS ISAC? The Multi State Information Sharing and Analysis Center (MS ISAC) S C)is the focal point for cyber threat prevention, protection, response and recovery for the nation s state, local, l territorial and tribal (SLTT) governments.

Is Built On A Strong Foundation Federal Government Situational Awareness Homeland Security Advisors SHARE States & US Territories COLLABORATE Local Governments TRUST

AK HI American Samoa S A Trusted Model for Collaboration and Cooperation across All States, Local Governments and Several U.S. Territories Built i ilt on over 10 years of Centralized Outreach, Awareness and Bidirectional Information Sharing.

Local Governments Local Government members represent 33% of the U.S. population

Washington Montana North Dakota MS ISAC Monitoring Partners Maine Oregon Idaho Minnesota Vermont New Hampshire Lane Co. South Dakota Wisconsin New York Massachusetts Wyoming Michigan Rhode Island Connecticutt California Nevada Utah Colorado Nebraska Kansas Iowa Johnson Co. Missouri Illinois Indiana Kentucky Ohio West Virginia Pennsylvania NYC New Jersey Delaware Maryland Virginia North Carolina LAWA Arizona New Mexico Oklahoma Arkansas Tennessee Brentwood Cary South Carolina San Diego Mississippi Alabama Georgia Goodyear Texas Louisiana Florida Alaska Hawaii

Security Operations Center Staff at the NCCIC

24x7 Cyber Security Operations Center Central location to report any cyber security incident, staffed 24x7 24x7 support for: Albert and Managed Security Services Vulnerability Assessments Research and analysis 24x7 analysis and monitoring of: Threats Vulnerabilities Attacks 24x7 reporting: Web Defacements Account Compromises

CERT Capabilities Incident Response Includes on site assistance Malware Analysis Computer Forensics Network Forensics Log Analysis Statistical Data Analysis Netflow Monitoring / Albert Rapid Sensor Deployment Penetration Testing

MS ISAC Intelligence Sources 7x24 Monitoring Analysis of 12 billion logs/records per week Intelligence Partners Federal Government Private Sector Internet Research

Multi-State Information Sharing and Analysis Center Products and Services 24/7 Cyber Security Analysis Center National Webcast Initiative National Cyber Security Cyber Security Alerts and Awareness Month Advisories Monthly Conference Calls Public and Secure Websites Annual Meeting Participation in cyber exercises Common cyber alert level map Ensuring collaboration with all necessary parties

Public Website

Take advantage of our RSS feed! Connect to our Cyber Security Advisories to provide greater awareness to those agencies, organizations and business that frequent your website Connect to our Daily Cyber Security Tip to provide greater awareness for your employees, constituents and others

Monthly Newsletters The distributes the newsletters in a template form so they can be re-branded and distributed broadly throughout states and local governments

Cyber Security Guides

Cyber Security Awareness Toolkit

How can you join?

Summary There ees is no silver bullet for cyber security Don t become complacent Have policies and methodologies in place to monitor compliance Log and monitor all traffic Be a cyber security champion in your organization

Thank You Questions??? Contact Information: brian.calkin@msisac.org or info@msisac.orgorg 1 866 787 4722