Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence



Similar documents
Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Section 12 MUST BE COMPLETED BY: 4/22

Data Security Breach. How to Respond

Information Security Addressing Your Advanced Threats

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Ed Ferrara, MSIA, CISSP Fox School of Business

Hack Proof Your Webapps

Information Security for the Rest of Us

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

SecurityMetrics Vision whitepaper

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Social Engineering. Hacking Human Nature

Where every interaction matters.

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Global Security Report 2011

External Supplier Control Requirements

Locking Down the Cloud for Healthcare. Kurt Hagerman Chief Information Security Officer

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

KEY STEPS FOLLOWING A DATA BREACH

93% of large organisations and 76% of small businesses

Is your Organization SAFE?

CompTIA Security+ (Exam SY0-410)

How To Protect Yourself From A Hacker Attack

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

2012 Data Breach Investigations Report

Cyber Security An Exercise in Predicting the Future

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

Cal Poly PCI DSS Compliance Training and Information. Information Security 1

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

The Business Case for Security Information Management

SECURITY CONSIDERATIONS FOR LAW FIRMS

WEB ATTACKS AND COUNTERMEASURES

CYBERTRON NETWORK SOLUTIONS

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

10 Smart Ideas for. Keeping Data Safe. From Hackers

INFORMATION SECURITY FOR YOUR AGENCY

SESSION 507 Thursday, March 26, 11:15 AM - 12:15 PM Track: Desktop Support

Digital Barracuda Information Security Reports that the Risk from Viruses and Worms is Only the Tip of the Iceberg FACT SHEET

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

How To Protect Yourself From Cyber Threats

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

How a Company s IT Systems Can Be Breached Despite Strict Security Protocols

A Decision Maker s Guide to Securing an IT Infrastructure

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Why The Security You Bought Yesterday, Won t Save You Today

A Systems Engineering Approach to Developing Cyber Security Professionals

Securing Virtual Desktop Infrastructures with Strong Authentication

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

Fraud Threat Intelligence

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Presented by Evan Sylvester, CISSP

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Vulnerability and Threat Management and Prevention

Ethical Hacking Course Layout

CEH Version8 Course Outline

Penetration Testing - a way for improving our cyber security

AUTHOR CONTACT DETAILS

Into the cybersecurity breach

Cyber Security Metrics Dashboards & Analytics

How To Protect Your Data From Being Stolen

CYBERSECURITY HOT TOPICS

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Data Management & Protection: Common Definitions

PCI Compliance Updates

Defensible Strategy To. Cyber Incident Response

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Network/Cyber Security

The 9 Best Practices for Network Security for Banks in Sponsored by April 14, 2009 Gary S. Miliefsky, President NetClarity, Inc.

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

TRAINING SERVICES elearning

TRAINING SERVICES elearning

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Sitefinity Security and Best Practices

Jort Kollerie SonicWALL

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Certified Ethical Hacker Exam Version Comparison. Version Comparison

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

Chapter 6: Fundamental Cloud Security

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

A Network Administrator s Guide to Web App Security

How To Perform An External Security Vulnerability Assessment Of An External Computer System

Jumpstarting Your Security Awareness Program

Guide to Preventing Social Engineering Fraud

Penetration testing & Ethical Hacking. Security Week 2014

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

A Rackspace White Paper Spring 2010

AUDIT TAX SYSTEMS ADVISORY

GFI White Paper PCI-DSS compliance and GFI Software products

Information Security and Risk Management

Passing PCI Compliance How to Address the Application Security Mandates

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

BYOD: End-to-End Security

Transcription:

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

About ERM

About The Speaker Information Security Expert at ERM B.S. Software Engineering and Information Technology Recently Passed the CISSP Core Experience: Penetration Testing Regulatory Compliance and Standards Technical Security Assessment Social Engineering - University of Miami

Agenda Our Institutions Under Attack How it Works Compliance vs. Security Protecting Your Institution of Excellence

Money Is The Motive Tons of Sensitive Information Confidential Research Identity Theft

University Attacks in the News Team GhostShellclaimed credit for breaking into servers at 100 major universities from around the world Included U.S. News Top 10 universities A month ago, a large university reported that confidential files containing personal information on 72,000 people were hacked. A month ago, a major academic intution s Internet technology database was hacked and school officials made an announcement suggesting students and staff reset their passwords.

Types of Attacks Network Attack Physical Layer Social Engineering

NETWORK ATTACKS

DDoS Distributed Denial of Service Masters -system that is initially exploited due to a vulnerability Slaves Infected with malware distributed by the master Goal is to overload the network or a targeted application

Software Weaknesses SQL Injection Insertion of malicious SQL statements into an entry field Attacker attempts to dump the database contents to the attacker Zero-Day Exploits Exploits that exist in software in which patches have not yet been developed

BYOD (Bring-Your-Own-Device) Mobile Devices Access to sensitive information is authenticated by device Lost or Stolen Device Data Breach

Rouge Access Points BYOD part deux Bring your own wireless access point to campus Allow an attacker to see all traffic

PHYSICAL ATTACKS

Active Ports An attacker attempts to gain access to the wired network by testing for active Ethernet ports

Tailgating / Piggybacking Attempting to gain access to a secure premise through the exploitation of common courtesy or carelessness.

Dumpster Diving The act of searching through trash bins to discover sensitive information.

SOCIAL ENGINEERING

Social Engineering The art of manipulating people into performing actions or divulging confidential information. Relies on people s inability to keep up with a culture that relies heavily on information technology. Use your own employees to defeat your security controls and practices.

Social Engineering Attacks Phishing Malicious Email Attachment Click the link Fake Website Baiting Shoulder Surfing

Academic Institution Attack Scenario: Target DB Administrators and Finance AND you have 2 weeks Information Gathering: Google / LinkedIn: Name of all people in both departments Institution s Website: Lay out of entire building including desk location; Used PeopleSoft Application; Emails of identified staff; Dean s contact information, signature, and sample emails Attack: Phishing: Crafted a spoofed email pretending from the dean to the victims for a PeopleSoft training that they must take with a link to the site Fake Website: Victims entered their PeopleSoft credentials; took those credentials and logged into the institution s PeopleSoft site which happens to be externally facing.

Compliance vs. Security Annual grind is to become compliant with the numerous regulations Compliance and security are VERY DIFFERENT!! Implement security from the very foundation

Cloud Computing All about VENDOR MANAGEMENT Compliance is key Ensure that cloud computing companies comply with regulations (e.g. HIPAA, PCI, and GLBA) Compliance risk assessment

COUNTERMEASURES

Fight the DDoS Load Balancing Throttling Honeypots

Breach Health Check-ups Timely checkups for security breaches Bring in professionals who will analyze your network Large Organizations -> Once a quarter Smaller Organizations -> At least every six months

Data Assurance Data Destruction Origin of Data Data in Transit Identify and track the life cycle of information in the organization Ensure it is properly secured throughout the entire life cycle Data leakage prevention

Audits and Assessments Regular penetration testing Configuration assessments Patches, patches, patches!! Social Engineering Tests Physical Intrusion Tests Preventative Policies

Security Awareness Training

You re Not Alone Educause FBI College and University Security Effort (CAUSE) Multiple Tools

THE SECURITY OF YOUR ENTIRE INSTITUTION IS AS GOOD AS YOUR WEAKEST LINK!

Your go to advisors for all matters in information security. 800 S Douglas Road #940 Coral Gables, FL 33134 Phone: 305-447-6750 Email: info@emrisk.com www.emrisk.com