jake bartlett francis lam masha pryamkova muna siddiqi

Post on 25-Dec-2015

217 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Jake BartlettFrancis Lam

Masha PryamkovaMuna Siddiqi

2

1. Introduction Risk definition Why IT Security and Privacy are important Types of risks List of most common risks

2. Case Studies The Secret Healthcare Company Visa ChoicePoint

3. Summary of Best Practices

3

A risk can be defined as a function of three variables:◦ the probability that there's a threat◦ the probability that there are any vulnerabilities◦ the potential impact

A threat is anything (man made or act of nature) that has the potential to cause harm

A vulnerability is a weakness that could be used to endanger or cause harm to an informational asset

4Source: 18

5

Risks

Vulnerabilities• Flaws in hardware, software, or network elements• Security is constantly playing catch-up to technology• Internet was designed to be open• Systems operating close to capacity

• Increasing use of off-the-shelf software • Lack of centralized control• Critical Infrastructure interdependencies• Standardization of products• Expansion of Internet

Threats

User Error

Natural Disasters Hostile Nations

/ Groups

Spies / Snoops

Other Infrastructure Disruptions

Activists CriminalsPrankstersTerrorists

Potential Damage

Customer Confidenc

e Lost

Customer Confidenc

e LostCritical

Operations Halted

Critical Operations Halted

Services Interrupte

d

Services Interrupte

dData

Corrupted

Data Corrupte

dAssets Lost

Assets Lost

Source: 1

CSI Computer Crime and Security Survey Published by Computer Security Institute since

1995 494 respondents (anonymous) Data for 2007 report is based on2006 calendar year

6Source: 14

7

Average annual loss from IT Security incidents reported in 2007 - $345,000 per respondent

2007: 494 respondents

Source: 14

8

46% of the organizations experienced a security incident in the past 12 months

Source: 14

61% of the companies said that their organizations allocated 5 percent or less of their overall IT budget to information security

9Source: 14

Internal External

Human Non-Human

Intentional Accidental

Disclosure, Modification, Destruction, Denial of Use

10Source: 4

11

12Source: 18

13*Top 15 types of incidents

Source: 14

1414

A Fortune 50 company Offers a broad range of medical and

specialty products Has approximately 34 million medical

members Manages extensive Public Health

Information (PHI) This requires high security focus

15

40% of all the health care organizations are not compliant with HIPAA

50% faced attacks from e-mail viruses

Encryption of data is limited 48% do not encrypt data during transmission

69% do not encrypt stored data or devices

16Source: 3

Viruses Identity theft (Organized crime) Offshore hacking Spam Phishing –fraudulent information requests

Associate carelessness and malicious activity -

inappropriate sharing of PHI Configuration errors –software or hardware

17

18

Data is collected in large volumes The regulatory environment is highly

charged and sensitive Service providers / partner exposures –

outsourcing or delegated work Privacy is a signature issue

19

Information Security Obligation HIPAA Breach Notification Statues Section 5 of FTC Act Gramm-Leach-Bliley

20

1. Health Industry Paying All Attorneys

2. Highly Intricate Paperwork in Abundant Amounts

3. High Income Potential for Aggressive Attorneys

4. Huge Increase in Paperwork and Aggravation Act

5. Health Insurance Portability and Accountability Act

What does HIPAA stands for?

21

Developed by the Department of Health and Human Services (HHS)

Introduces a set of requirements and standards for the use and dissemination of health care information

Requires Health Care Companies to develop information security systems

5 components: The Privacy Rule --- Protection of PHI, paper and

electronic The Transactions and Code Sets Rule--- used for claim filing The Security Rule --- Electronic The Unique Identifiers Rule The Enforcement Rule

22Source: 18

Administrative Safeguards Physical Safeguards Electronic Safeguards

23

The Company does not allow:

Unnecessary exposure to PHI and protected information Sharing user ID’s or leaving them in view Leaving any PHI in view

Disposal and destruction of media containing electronic data is strictly monitored

Facility security plans, maintenance records, and visitor sign-in and escorts are highly controlled

Contractors or agents are also fully trained on their

physical access responsibilities

24

The Company does not: Allow any non certified software on the computers

Sell advertisement space on the internet portals

Allow direct public access to update the database

Allow opening e-mails from unknown people or entities

and clicking on links or attachments

Allow visiting internet retail and information sharing sites

The Company constantly monitors for suspicious or unusual activities –the incident response team quickly eliminates, isolates, and manage any threats

25

Chief Information Security Officer

Policy Management

Team

Security Risk Management

Team

Access Security

Team

InfrastructureSecurity

Team

ApplicationSecurity

Team

Program Management

Team

•Policy Development

•Training

•Security Education

•Process Development

•Risk Coordination and Reporting

•Data Handling Risk

•Vendor Risk management

•Incident Response

•Encryption operation

•Access Risk Assessment

•Account Administration

•Protection against Antivirus/Spam

•Network Protection

•Security application development

•Database Security

•Integrated Planning

•Financial Management

•Communications

26

Budget for IT: 14.3 million Security Budget: 1.2 million, 8%

27

Validation Proactive Monitoring

Security Audits

Technology Secured

Infrastructure, Application and

Tools

Technology Secured

Infrastructure, Application and

Tools

Process Appropriate Comprehensive

Policies, Standards and Training

Process Appropriate Comprehensive

Policies, Standards and Training

Organization Information

Security Team

Organization Information

Security Team

Secured Environment

Secured Environment

Physical Security ProtocolsPhysical Security Protocols28

Large companies have higher security budget (more than $1 million), have more technology in place, follow more strategic practices, but

The larger companies suffer more security breaches and bigger losses

According to IT Policy Compliance Group Research, 75% of all data breaches were caused by human errors

29

The Secret Healthcare Company lost an unencrypted CD holding personal and medical information of 75,000 members while sending it to a contractor firm

30

What could the company do to prevent data leak?

1. Continue to Develop and Deliver Security Awareness, Training and Education

2. Redesign Policies and Standards Framework and Content

3. Expand Processes and Methodologies to Integrate Security into the Enterprise

4. Create and Deploy Data Protection Practices and Solutions

5. Implement Vendor Management Oversight of Data Management and Contract Compliance

6. Develop Incident Handling Protocols and Manage Responses

31

Continue to apply the right organization model

Having consistent policies, procedures, and standards in place

Providing ongoing security training Looking for better ways to secure the

technology Strengthening the information integrity

in more proactive ways Executing the information security

strategy

32

'Credit card fraud' is one of many form of Bank fraud that involve credit cards, charge cards, or debit cards

34Source: 18

The fraud begins with either the theft of the physical card or the compromise of the account information

The compromise can occur by many common routes, including something as simple as a store clerk copying sales receipts

A) B)

35

The rapid growth of credit card use on the Internet has made database security lapses particularly costly; in some cases, millions of accounts have been compromised

40% of U.S. and European consumers have stopped an online transaction due to security concerns

36Source: 23

Since 2005, credit card fraud in the UK and America has increased by 350% on average according to Reuters

With credit card crime occurring across state lines, criminals often are never prosecuted because the dollar amounts are too low for local law enforcement to pay for extradition

37Source: 24

The cost of credit and charge card fraud - to card holders and to card companies alike - may be as high as $500 million a year

Everyone pays for credit and charge card fraud in higher prices, whether or not they are personally defrauded

38Source: 25

“12 commandments” PCI Standard “Verified by Visa” Contactless cards Zero Liability Policy

Components of Visa’s Security Components of Visa’s Security SystemSystem

39

In 2000, Visa trumpeted a list of security "best practices" for e-merchants that accept Visa cards

◦ It also announced its intention to verify merchants’ compliance

In October 2007 Visa introduced a new set of Payment Application Security Mandates

◦ Merchants now have time till July, 2010 to comply

40Source: 6, 17

1. Install and maintain a working firewall2. Keep application and operating system security patches up

to date3. Encrypt stored credit card data4. Encrypt data sent across the network5. Use and regularly update antivirus software6. Don't use vendor supplied defaults for password security 7. Assign a unique user ID to each person with computer

access 8. Track access to data, including read only, by unique ID9. Regularly test security systems and processes10. Restrict access to data on a business "need to know" basis11. Have a management or human resources policy that

addresses security in the workplace, such as doing background checks

12. Restrict physical access to authorized employees

41Source: 6

PCI DSS stands for Payment Card Industry Data Security Standard

A security standard accepted by all major credit card companies

Originally began with 5 different programs, including Visa’s

Visa requires its merchants to comply with both PCI and 12 Commandments

42Source: 18

Starting October 2007, Visa introduced penalties for non-compliance with PCI

Merchant’s volume of transactions

Penalty Effective Date

Impact on user

> 1 million Visa transactions per year

Acquirers for these merchants will see their interchange rate raised a tier

October 2007

Acquirers pass their interchange costs on to their merchant clients as part of the discount rate

At least 6 million Visa transactions per year

Separate monthly fines to the acquirers of noncompliant merchants

October 2007

Acquirers will pass their fine costs along to merchants as well1 to 6 million Visa

transactions per year

Separate fines January 2008

43Source: 2

In addition to other security measures (PIN, 3-digit security code, address matching etc) Visa introduced "Verified by Visa” for online transactions

Unique passwords or codes are required during Internet transactions to verify the user's identity

According to Visa's own research, 76% of customers wanted a password protected system to enable them to shop on the internet with total peace of mind, and this is the reason we have introduced Verified by Visa"

44

Standard cards Feature a static card

verification value written into the magnetic stripe

This number is not known to the user and is designed to verify that the card is present during a transaction

However, because it never changes, criminals can use stolen data from the magnetic stripe to produce cloned cards that would work until the issuer reissued the card

45

Contactless Visa cards Feature embedded

microchips that generate a unique code whenever the cards are used

The code is unique to each transaction, which means that criminals who manage to skim card data during a single transaction to create counterfeit cards would have only an old code

Source: 13, 21

Customer-oriented policy that ensures complete liability protection for all card transactions that take place on the Visa system

i. e “You owe nothing in fraudulent transactions”

46Source: 22

Identity Theft is a crime where a criminal assumes someone else's identity in order to profit by fraudulent means

Not the same as Credit Card Fraud

48Source: 8

Identity theft is one of the fastest growing crimes in the United States

Identity Theft costs almost $53 billion between business and individual victims for all types of reported identity theft ◦ Business victims experienced a total loss of $47.5

billion or an average of $4,800 per business victim per year

◦ Individual victims account for a total loss of $5 billion and $500 per victim annually

Americans spent 300 million hours resolving issues related to identity theft

49Source: TBD

Stealing personal information in computer databases (hacking or using Trojan horses)

Dumpster diving Phishing Social Engineering Browsing social network

sites (MySpace, Facebook etc) for personal details that have been posted by users

50

Universities often become victims of data breaches!

51

Company / Institution Date made public

Number of records

Fidelity National Information Services, Certegy Check Services Inc.

July 3, 2007 8.5 million

Yale University Aug 8, 2007 10,000

California Public Employees' Retirement System (CalPERS)

Aug 22, 2007 445,000

Monster.com Aug 23, 2007 1.6 million

University of Michigan School of Nursing Sep 19, 2007 8,585

Gap, Inc. Sep 28, 2007 800,000

Commerce Bank Oct 10, 2007 20

Source: 10, 19

52

A data aggregation company based in Alpharetta, near Atlanta, Georgia

Acts as a private intelligence service to government and industry: combines personal data sourced from multiple public and private databases for sale to the government and the private sector

Maintains more than 17 billion records of individuals and businesses, which it sells to an estimated 100,000 clients, including 7,000 federal, state and local law enforcement agencies

Source: 8

In February 2005 ChoicePoint revealed that sensitive information for at least 114,000 (some sources say 163,000) people had been compromised

The breach occurred earlier in 2004, when criminals posed as customers to obtain data

No direct technology breach occurred, butmedia characterized the incident as if one had

At least 750 (some sources say 5,000) cases of identity theft as a result of the breach

Similar scam perpetrated in 2000 resulted in at least $1 million in fraudulent purchases

53Source: 7, 8, 20

A number of investigations including congress people, the Federal Trade Commission, the US Securities and Exchange Commission and US state attorneys general as well as personal lawsuit

ChoicePoint has agreed to pay $15 million:◦ $ 10 billion fine◦ $ 5 billion as a fund to help the victims of the identity

theft Company must overhaul its security program

and submit to independent audits of security procedures every 2 years for the next 20 years

54Source: 11

In April 2007 a Gartner Analyst told USA Today that "ChoicePoint transformed itself from a poster child of data breaches to a role model for data security and privacy practices“

◦ Some of the preventive steps included abandoning a line of business worth $20 million because of its potential to risk a future data breach

55Source: 7, 16

5-step action plan for securing data and privacy system proposed by ChoicePoint’s CIO:

1. Governance – Chief Privacy Officer reports to a board that governs privacy and public responsibility

2. Clearly define expected behavior and provide tools to simplify compliance for employees

3. Create data breach response policies and procedures

4. Determine the credentials of those you work with and those who work for you

5. Embrace openness

56Source: 12

57

58

Security Policy

Organizational Security

Access Classification and Control

Compliance

Physical Security

Business Continuity Management

Access Control

Physical and Environmental Security

System Development and Maintenance

Communications and Operations Management

Legend:

Organizational Aspect

Technical Aspect

Physical Aspect

Source: 9

Journal Articles 1. Goles et al., “Dark Screen: An Exercise in Cyber Security” MIS Quarterly Executive, Vol. 4, 2, 20052. Green, J., “Merchants Face a Double Whammy” Cards & Payments, Vol 20,10, 20073. Holmes, A., "The Global State of Information Security 2006; Some things are getting better, slowly,

but security practices are still immature and, in some cases, regressing”, CIO, Vol. 19.23, 2006, p.1 4. Loch, K., Carr, H., Warkentin, M., “Threats to Information Systems: Today's Reality, Yesterday's

Understanding” MIS Quarterly, Executive, Vol. 16, 2, 19925. Luftman, J., and McLean, E., “Key Issues for IT Executives,” MIS Quarterly Executive, Vol. 4, 2, 2006,

pp. 81-99, 269-2866. Messmer, E., “Online Card Fraud Targeted” Network World Vol. 17-34, 2000  7. McNulty, E., Lee, J., Boni, B., Coghlan, J., Foley, J. “Boss, I Think Someone Stole Our Customer Data”,

Harvard Business Review; Vol. 85. 9, 2007, pp.37-508. Miller, M., “Why Europe is Safe from ChoicePoint: Preventing Commercialized Identity Theft Through

Strong Data Protection and Privacy Laws” The George Washington International Law Review, Vol. 39, 2, 2007, p.395

9. Saint-Germain, R., “Information Security Management Best Practice Based on ISO/IEC 17799” The Information Management Journal, Vol. 39, 4, 2005, pp 60-66.

10.Swartz, N., “ID Thieves Targeting Universities” Information Management Journal, VOl 41, 2, 2007, p. 7

11.Swartz, N., “Data Breach Costs Broker $15 Million” Information Management Journal, Vol. 40,3, 2006, p10.  

12.Swartz, N., “ChoicePoint Lessons Learned” , Information Management Journal; Vol 41, 5, 2007, p. 24

13.Wolfe, D., “Visa Security Idea: Mag Strripe with 'Dynamic' Code” American Banker, Vol. 172, 48, 2007

60

Electronic publications14.Richardson, R., “CSI Computer Crime and Security Survey 2007”,

http://www.gocsi.com/forms/csi_survey.jhtml;jsessionid=W3MH0WN1ZFW0SQSNDLOSKHSCJUNN2JVN, viewed October 1, 2007

15. “An Introduction to Computer Security: The NIST Handbook”, http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf, viewed November 4, 2007

16.Swartz, J., and Acohido, B., “Who's guarding your data in the cybervault?” USA Today , http://www.usatoday.com/tech/news/computersecurity/infotheft/2007-04-01-choicepoint_N.htm, viewed November 1, 2007

17.Vijayan, J.,”What New Visa Security Mandates Mean to You”, PC World, http://www.pcworld.com/businesscenter/article/139048/what_new_visa_security_mandates_mean_for_you.html, viewed November 1, 2007

Websites14.Wikipedia

15.http://www.privacyrights.org/ar/ChronDataBreaches.htm, viewed November 1, 2007

16.http://jurist.law.pitt.edu/paperchase/2006/01/ftc-imposes-record-fine-on-choicepoint.php, viewed November 1, 2007

17.http://www.informationweek.com/security/showArticle.jhtml?articleID=183702491, viewed November, 1

18.http://www.congressionalfcu.org/aboutus/securitycenter/ZeroLiabilityPolicy.pdf, viewed November, 1

61

Websites19.http://marketwire.com 

20.http://today.reuters.com

21.http://techweb.com/wire/security/

22.(Creditsourceonline.com) 

23.(About.com)

24.(identitytheft.gov)

62

63Source: 14

top related