Community Security Awareness Training



Similar documents
by Debasis Mohanty (Orissa, India)

Security awareness training and education, government guidance, training matrix

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE?

Consumer ID Theft Total Costs

How child identity theft happens.

Evaluation of Google Hacking

Bo Holland is the Founder & CEO of AllClear ID with deep expertise in Identity theft prevention, security, and technology

gathering Dave van Stein 9 april 2009

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

WRITTEN TESTIMONY BY DAVID SNELL FEDERAL BENEFITS SERVICE DIRECTOR NATIONAL ACTIVE AND RETIRED FEDERAL EMPLOYEES ASSOCIATION

WEBSITE PENETRATION VIA SEARCH

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

CRIMINAL ID THEFT: Taking the First Steps to Resolve It

As a precaution, we have arranged with AllClear ID to provide identity protection services to affected clients at no cost for a period of one year.

State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION OF A SECURITY BREACH

HOME DEPOT DATA BREACH

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Information Security Organizations trends are becoming increasingly reliant upon information technology in

3 day Workshop on Cyber Security & Ethical Hacking

Leander Police Department 705 Leander Dr Leander, Texas (512)

National Cyber Crime Unit

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

<DATE> <FIRST NAME> <LAST NAME> <ADDRESS LINE 1> <ADDRESS LINE 2> <CITY>, <STATE> <ZIP> Dear <FIRTST NAME> <LAST NAME>:

<March XX, 2015> <FIRST NAME> <LAST NAME> <ADDRESS LINE 1> <ADDRESS LINE 2> <CITY>, <STATE> <ZIP> Dear <FIRST NAME> <LAST NAME>:

Common Security Vulnerabilities in Online Payment Systems

Activate ProtectMyID Now in Three Easy Steps. If you have questions or need an alternative to enrolling online, please call

National Cyber Security Month 2015: Daily Security Awareness Tips

The Electronic Arms Race of Cyber Security 4.2 Lecture 7

Advanced Operators. Chapter 6

Establishing a State Cyber Crimes Unit White Paper

Basic Search Engine Handbook for Recruiters Use Search Engines to identify candidates on the Internet

We are writing to you because of a recent security incident which may have resulted in unauthorized access of your personal information.

Protecting Yourself from Identity Theft

The Human Factor of Cyber Crime and Cyber Security

Frequently Asked Questions Wellmark s Identity Protection Services Offering Member Q&A

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen.

GEARS Cyber-Security Services

Aaron V. Rocke Rocke Law Group, PLLC 101 Yesler Way, Suite 603 Seattle, WA (206)

Importance: From: Anthem, Inc. Communications Sent: Thursday, February 26, :40 PM Subject: Important message from Anthem, Inc.

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age

U. S. Attorney Office Northern District of Texas March 2013

About Effective Penetration Testing Methodology

Social Media and Cyber Safety

FORBIDDEN - Ethical Hacking Workshop Duration

Penetration Testing in Romania

Detecting, Preventing, and Mitigating Identity Theft

CYBER TRENDS & INDUSTRY PENETRATION TESTING. Technology Risk Supervision Division Monetary Authority of Singapore

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS


National Initiative for Cybersecurity Education

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

SecureNinja. SecureNinja. The CyberSecurity Experts

Chris Gates

Personal Digital Security

Working with the FBI

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Loophole+ with Ethical Hacking and Penetration Testing

Penetration Testing: Lessons from the Field

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

Citi Identity Theft Solutions

FTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen

Deluxe Provent : Protecting against expanded threats. Providing for expanded opportunities.

Transcription:

Community Security Awareness Training Barbara Endicott-Popovsky, Ivan Orton, Kirk Bailey, Deb Frincke, Member, IEEE West Point 1

About the authors.. Barbara Endicott-Popovsky, Lecturer, Seattle University; Ivan Orton, JD, Senior Deputy Prosecuting Attorney with the Fraud Division of the King County Prosecutor's Office in Seattle Kirk Bailey, Chief Information Security Officer, City of Seattle Deb Frincke, Ph.D., Chief Scientist Cybersecurity, Pacific Northwest National Laboratory and Professor (on leave), Computer Science Dept., University of Idaho West Point 2

Agora. Forum for airing current issues of concern among IA professionals Meets quarterly in the Northwest Solves problems of unintended consequences from proliferation of digital infrastructure accessing insecure public networks West Point 3

Recent Achievements State legislative change regarding cyber stalking, a fast growing Internet crime Responding to a case involving a City of Seattle employee, Agora undertook a two-year project of tracking down, and assisting in, the eventual prosecution of the stalker Became the impetus behind some of the first cyber-stalking legislation in the nation West Point 4

Current Focus Vulnerability of personal and private information in Internet accessible systems Bring attention to improving network & data mgmt Influence helpful legislative change West Point 5

The Problem West Point 6

Widespread Community Problem: Identity Theft Growing problem Affects govt/business infrastructure and individuals 1 in 20 Americans an identity theft victim last year Hundreds of millions of dollars impact to U.S. economy (FTC report) Most institutions cover direct consumer losses Consumers cover coping charges avg. $1000/incident West Point 7 Credit restoration cost

Agora Solution: Create security awareness event demonstrating: accessibility of personal/private information thru public networks how little skill is needed to acquire it. Design experiential learning: a Google-Hacking Contest Invite Business and govt. leaders, and the press Enthuse community leaders about exploring possible solutions West Point 8

Google-hacking Google-hacking commonly refers to obtaining anything exploitable, including usernames, passwords, credit card numbers and other personal identifiable information using the search engine, Google. West Point 9

Why Google Hacking? Search engines can be effective hacking tools Google selected for its wide familiarity Requires little or no programming skills knowledge of a minimal list of Google operators and how to concatenate a Google string. Google hacking info readily available search for "Google hacking" on Google itself! http://johnny.ihackstuff.com/ first 3 chapters of Google Hacking by Johnny Long few hours of online practice West Point 10

Poorly Configured and Administered Systems at Fault Uneducated folks putting content on the web they think is hidden from the world Example: Directory indexing that exposes file paths and useful files Requires more thoughtfully configured networks: Keep private, sensitive info beyond web crawlers Understand how web crawlers/search engines work West Point 11

The Solution West Point 12

Community Security Awareness Training Event Purpose: raise community's consciousness about the vulnerability of sensitive information to compromise on systems linked to public network Vehicle: Google Hacking Contest Sponsored by: the Agora and Seattle U March 4, 2005 Seattle, Washington Public invited IA professionals Attorney General, State of Washington Business leaders West Point 13 Faculty, students

Reference: NIST Special Publication 800-50 Recognizes the "people factor" is the weakest link. Standard for developing and implementing security awareness training All IS users be made aware of their roles and responsibilities in maintaining security. Any awareness event should be: designed for the intended audience, built around a message and desired outcomes gain attention. West Point 14

NIST Guidelines for Security Awareness Event NIST Guidelines Designed for specific audience Built around a message Built around desired outcomes User awareness of roles / responsibilities Google Hacking Event Attributes Business and community leaders in Seattle "Alarming vulnerability of public and private information to compromise on public networks" Gain attention Influence legislation Event summation focused on roles and responsibilities regarding identity theft West Point 15

AGORA S Google Hacking Contest Rules Rule #1: Information Protection All contest participants must be VERY CAREFUL to manage and protect any sensitive information they discover Rule #2: Required Gear for Competitors Teams must bring their own 'stuff ' to play and also at least one standard-size (8½ x 11 ) notepad West Point 16

AGORA S Google Hacking Contest Rules (cont d.) Rule #3: Respect Host s Network Access provided by host, Seattle U, for the contest only Rule #4: Judging Each team assigned a Contest Judge to validate their results West Point 17

AGORA S Google Hacking Contest Rules (cont d.) Rule #5: Time allowed 45 minutes only Rule #6: Scoring Based on score card (follows) West Point 18

Google Hacking Score Card Personally Identifiable Information Name and Social Security Number (SSN) together Name, SSN, Date of Birth (DOB) together Name, Credit Card number (CCN#) together Name, CCN#, Exp. Date, 3-digit security code (CID#) together Name, Bank Account # or Brokerage Account # Name, Bank Account # or Brokerage Account # Name, Bank Account Number and PIN Add l data asso d w/ ea CCN# & SSN #(e.g. address, phone) Name, password, related online account identifier to anything Bonus points for anything above associated with Wa St Citizen Points + an additional 500-point bonus was offered for the "Most Sensitive Document 1 pt 2 pts 1 pt 2 pts 3 pts 1 pt 3 pts 0.5 pt 5 pts 10 pts West Point 19

Successful Hacking Approach Limit # of pages to search Narrow searches Concatenate Boolean and advanced operators into queries Yield results West Point 20

Useful Advanced Operators Advanced Operator InTitle InURL Cache Filetype Numrange Purpose Restricts search to pages with specified word in its title Restricts search to pages with specified word in its URL Shows the version of a page in Google's cache Searches can be restricted to filetype. (The xls and mbd filetypes are particularly useful.) Searches for results within a given numerical range West Point 21

Example Query Strings allintitle: restricted filetype:doc site:gov Searches for pages with all of the following in the title: 'restricted,'.doc files on.gov sites. intitle:"index of" members OR accounts Searches for pages with "index of" in the titles and either member or accounts lists. allintitle: "index of/root" Searches for pages with index of/root in the title. Results in 1490 pages that can be mined for information. allinurl:auth_user_file.txt Searches for pages with lists of user names and passwords allinurl: admin mdb Searches for pages with administrator's access databases containing usernames, passwords and other sensitive information West Point 22

The Contest 8 Teams 3 student teams 5 from industry and the professions 8 12 Members each 300 community members observed West Point 23

The Results West Point 24

Results (Partial List) Credit card numbers of military personnel A million SSN s of recent immigrants, their tax records and addresses Names, birth dates, SSN s, race and religion of deceased military personnel Names, credit card numbers, birth dates and home Ph No s of 388 Americans who ordered pornographic movies from a Brazilian web site Over one hundred million death certificates with SSN s, dates of birth and city of last residence Highly personal information of two individuals, their security clearance level. One was an expert in virology investigations and the other a responder to nuclear emergencies Personal information about people on terrorist watch lists West Point 25

Winners! 1 st Prize: 190 million points Team of lawyers and computer security experts Found Db with SSN s of millions of dead people 2 nd Prize: 13 million points Team of penetration testers Local security firm Student teams at the bottom West Point 26

Community Awareness Achieved Attendees feedback indicated shock Report made to State s Attorney General Publicity Front Page article Seattle Times Wall St Journal article Syndicated columnist daily blog West Point 27

Lessons Learned, Future Work, Conclusions West Point 28

Lessons Learned Security awareness training can be effective for educating a community NIST Special Publication 800-50 guidelines were applicable A Google-Hacking contest communicates effectively to non-technical people Such a contest is easy to stage Notify attendees in advance form teams, work logistics issues (numbers of computers, etc.) familiarize themselves with Google hacking before coming West Point 29

Future Work Continue the training effort thru U of Washington Center of Information Assurance and Cyber Security, an NSA Center of Academic Excellence Influence further legislation addressing protection of personal and sensitive data address the inequity of victims bearing coping costs associated with the misuse of personal information West Point 30

The Unfairness Principle West Point 31

Simple Fairness Principle West Point 32

Simple Fairness Principle Restated Individuals should bear inconvenience costs associated with misuse of any personal information that they control Individuals should not bear inconvenience costs associated with misuse of their personal information that they do not control While the fairness proposition appears obvious, it is not reflected in current law West Point 33

Conclusions Security awareness event achieved its goals: Alerted community leaders to take appropriate measures to ensure protection of personal and private information stored in databases Began process of influencing legislation to address problems arising from identity theft West Point 34

References ComSec, "Google, A Dream Come True," (Retrieved from the Web March 19, 2005). http://www.governmentsecurity.org/comsec/googletut1.txt Googledorks. (Retrieved from the Web March 19, 2005).http://johnny.ihackstuff.com/index.php?module=prodreviews Granneman, S. "The Perils of Googling," Security Focus (Retrieved from the Web March 19, 2005). http://www.theregister.co.uk/2004/03/10/the_perils_of_googling/ i-hacked.com, "Google Hacking at its Finest," (Retrieved from the Web April 15, 2005). http://www.i-hacked.com/content/view/23/42/ Long, J., Skoudis, E., van Eijkelenborg, A. (ed.) (2004). Google Hacking, for Penetration Testers. San Francisco: Syngress Publishing, Inc. Kotadia, M. (1977). "Protect yourself from 'Google hacking' ". Silicon.com, Jan. 14, 2005. (Retrieved from the Web March 19, 2005). http://networks.silicon.com/webwatch/0,39024667,39127080,00.htm. Ong Boon Kiat Google hacking for beginners. Cnet Asia, November 8, 2004. (Retrieved from the Web March 19, 2005). http://www.zdnet.co.uk/zdnetuk/comment/other/0,39020682,39172957,00.htm West Point 35