Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One



Similar documents
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One

Phishing Scams Security Update Best Practices for General User

Identity Theft Protection

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

WEB ATTACKS AND COUNTERMEASURES

Wireless Network Best Practices for General User

What you need to know to keep your computer safe on the Internet

Retail/Consumer Client. Internet Banking Awareness and Education Program

2012 NCSA / Symantec. National Small Business Study

ENISA s ten security awareness good practices July 09

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Common Cyber Threats. Common cyber threats include:

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Learn to protect yourself from Identity Theft. First National Bank can help.

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Secure Your Information and Communication Technology Devices

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Information Security It s Everyone s Responsibility

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Information Security in Universities

National Cyber Security Month 2015: Daily Security Awareness Tips

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Student Tech Security Training. ITS Security Office

The Top Web Application Attacks: Are you vulnerable?

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

Information Security

Secure Your Mobile Workplace

How To Protect Yourself From Cyber Threats

Protecting against Mobile Attacks

Protect yourself online

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

The Key to Secure Online Financial Transactions

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

Tips for Banking Online Safely

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

HIPAA Security Education. Updated May 2016

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Cybercrime Prevention and Awareness

Mobile Security Framework; Advances in Mobile Governance in Korea. TaeKyung Kim

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy

Securing mobile devices in the business environment

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO

10 Quick Tips to Mobile Security

Hot Topics in IT Security PREP#28 May 1, David Woska, Ph.D. OCIO Security

Cybersecurity Workshop

External Supplier Control Requirements

2012 Global Threats and Trends

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Three

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Guideline on Safe BYOD Management

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

10 Smart Ideas for. Keeping Data Safe. From Hackers

CLEAR LAKE BANK & TRUST COMPANY Internet Banking Customer Awareness & Education Program For Businesses

10 best practice suggestions for common smartphone threats

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

FAKE ANTIVIRUS MALWARE This information has come from - a very useful resource if you are having computer issues.

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

I ve been breached! Now what?

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Open an attachment and bring down your network?

Internet threats: steps to security for your small business

INCIDENT RESPONSE CHECKLIST

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

PCI Data Security Standard 3.0

Cyber Security. Securing Your Mobile and Online Banking Transactions

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Information Security Policy. Policy and Procedures

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

How-To Guide: Cyber Security. Content Provided by

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Administrator's Guide

Introduction to Computer Security

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

Information Security Policy

Transcription:

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures

Agenda Security News and Trends Data Loss Social Engineering Application Vulnerabilities Organisation Data Leakage and Privacy Infringement Countermeasures in Response End User Data Loss Prevention Fighting against Social Engineering Organisation Level Policies and Procedures 1

NEWS 2

Security News Data loss through network: Sony s Case Issue Online Entertainment PC games network outdated database was hacked Date May 2011 Consequences Personal details of 77 million customers were stolen The gaming site, along with Sony's cloud music subscription service was suspended Share price of Sony dropped by 4% Vulnerabilities Lack of comprehensive planning and effective monitoring Weak security environment designed for credit card database 3

Security News Data loss through portable media: Western Michigan University lost hard drive containing student information Issue Lost hard drive containing student information Date March 2011 Consequences Names and social security numbers of current and former students and faculty members were lost Identity theft Vulnerabilities Insufficient controls over general physical security Inadequate controls on data backup and restoration 4

Security News Social Engineering: Using Facebook as a hook Issue Victims received message on Facebook from "friend" inviting them to view a video While starting the video, the users were requested to update their computer by downloading unknown software Date July 2011 Consequences The downloaded malware elicited active data transfer and stole information from the victims computer Vulnerabilities Insufficient user education Insufficient malware protection 5

Security News Social Engineering: Lack of Awareness Issue During a security event, calls pretending to be from the IT dept were made to certain large corporations Employee were asked to hand over data and visit certain websites Date Aug 2011 Consequences Many of the Oracle staff comply willingly, handing over corporate information and visited the websites Vulnerabilities Lack of staff awareness against social engineering 6

Security News Application vulnerability: Sydney University leaked student details via a web application hole Issue Web application security loophole allowed access to student accounts with no password Student information leaked via the web application Date January 2011 Consequences Students personal data were openly available on the Internet Vulnerabilities Lack of systematic monitoring over web applications Lack of appropriate testing before production launch 7

Security News Organisation data leakage and privacy infringement: Local Hospital Issue Clerical staff member of a hospital lost a personal USB flash drive containing one-off data file backup No encryption was done when the file was transferred to the USB flash drive Date April 2011 Consequences Names and ID numbers of 19 paediatric patients were lost Disciplinary action was taken against the clerical staff concerned Vulnerabilities Lack of data encryption Inappropriate use of personal USB flash drive for sensitive data Inadequate user information security awareness of sensitive data handling 8

IT SECURITY TRENDS 9

IT Security Trends Security attacks brought by Cloud Computing 3 Major Security Trends Social networkbased scams Mobile devices compromise data security 10

IT Security Trends Security attacks brought by Cloud Computing The Threat The majority of cloud computing providers surveyed do not view the security of their cloud services as a competitive advantage Cloud computing providers may not consider security as one of their most important responsibilities How to avoid? Ensure passwords are properly assigned, protected and changed Gain information about cloud service providers and other involved third parties which could potentially access your organisation s data Check reliability of cloud services and exception monitoring systems 11

IT Security Trends Social network-based scams The Threat The most rapid growth in online attacks comes from social networks 20% of all Facebook users are active targets of malware Cross-site scripting (XSS) and cross-site request forgery (CSRF) vulnerabilities are quickly translating into massive security outbreaks How to avoid? Do not respond to any social networking postings from unknown sources Use of malware-detection application (e.g.: SafeGo scans user s account profile for any suspicious links and notify them when a threat is detected) 12

IT Security Trends Mobile devices compromise data security The Threat In Mar 2011, more than 50 third-party applications on Google's official Android Market are discovered to contain a Trojan called DroidDream How to avoid? Avoid installing mobile OS from unknown source (e.g. Jailbroken ios for apple devices) 1. User runs a mobile app containing Trojan released by hacker 2. Trojan extracts data saved on Smartphone and transfers them to hackers PC Avoid installing any applications from unknown sources Install mobile antivirus apps 13

COUNTERMEASURES 14

Countermeasures in Response End user data loss prevention Back-up data files regularly Encrypt and protect sensitive files with strong password Install anti-malware software and perform regular security update Understand the risks associated and the necessary procedures before using portable storage devices DO NOT attempt to override controls implemented by IT department 15

Countermeasures in Response Fighting against social engineering Common types of social engineering Social engineering by phone Hackers pretending someone of authority Persuade users into providing sensitive information Impersonate a phone company representative or a bank representative Dumpster diving A hacker searches for sensitive information (e.g., bank statements, pre-approved credit cards and student loans) in the garbage 16

Countermeasures in Response Fighting against social engineering Common types of social engineering Online social engineering Trick users into providing sensitive information via email or social networking sites Example: A hacker will send a fraudulent email claiming to be a banking institution and request the users to verify their user names and passwords by clicking on a link that directs to a fake website and fill in forms 17

Countermeasures in Response Fighting against social engineering Common types of social engineering Social engineering by USB drive Hackers distribute USB flash memories as souvenir or promotion items These USB flash memories are infected with a virus or Trojan It provides hackers with logins, passwords, and login information of the users computer 18

Countermeasures in Response Fighting against social engineering Against social engineering by phone Be skeptical of suspicious calls Verify caller s identity before providing sensitive information Against dumpster diving Shred physical documents Sanitise electronic storage media 19

Countermeasures in Response Fighting against social engineering Against online social engineering Verify the identity of websites before sending over sensitive information Website certificate Known domain name Avoid opening and responding to suspicious email Centralise reporting of suspicious activities Limit information being disclosed Against social engineering by USB Do not use USB devices from unknown source Scan USB devices regularly and before use 20

Countermeasures in Response Organisation level policies and procedures Preventive measures Detective measures Responsive measures Educate users about the best practices Strengthen the security controls Monitor network for fraudulent variations Notify management of suspicious activities Establish mechanism to report lost devices Alert users upon occurrence of security incidents 21

Countermeasures in Response Security Policy An effective security policy should be established by the management and IT team, which include the following: General guidance on security roles and responsibilities Infrastructure security Password management Procedures for disposal and re-allocation of computing resources Data classification and protection Incident reporting Change management 22

Summary IT Security officer should be kept up-to-date with security vulnerabilities and hacking techniques. Consistent assessment of the university s own system and security measures and reporting to management the assessment result is recommended. A rigid security policy should be strictly enforced throughout the whole university since data loss can cost the university a significant amount, both in monetary and nonmonetary terms. Regular user awareness session should be conducted to maintain the awareness of general users. 23

Q&A? 24

Copyright Statement All material in this document is, unless otherwise stated, the property of the Joint Universities Computer Centre ( JUCC ). Copyright and other intellectual property laws protect these materials. Reproduction or retransmission of the materials, in whole or in part, in any manner, without the prior written consent of the copyright holder, is a violation of copyright law. A single copy of the materials available through this document may be made, solely for personal, noncommercial use. Individuals must preserve any copyright or other notices contained in or associated with them. Users may not distribute such copies to others, whether or not in electronic form, whether or not for a charge or other consideration, without prior written consent of the copyright holder of the materials. Contact information for requests for permission to reproduce or distribute materials available through this document is listed below: copyright@jucc.edu.hk Joint Universities Computer Centre Limited (JUCC), Room 223, Run Run Shaw Building, c/o Computer Centre, The University of Hong Kong, Pokfulam Road, Hong Kong 25