recognizing, detecting and preventing cyber security threats...•now known to hackers as a victim...
TRANSCRIPT
![Page 1: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/1.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 1
2017AnnualGovernmentalAccounting&AuditingUpdateConference
RutgersBusinessSchoolByMarcPfeiffer,AssistantDirectorBlousteinLocalGovernmentResearchCenter
RutgersUniversity
Recognizing,DetectingandPreventingCyberSecurityThreats
![Page 2: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/2.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 2
BOTTOMLINE▪ Criminalstrytomanipulatepeopleinto
divulgingpersonalorbusinessinformationortrickthemintoschemestodefraud
▪ Criminalscanbeindividualsorpartofindustrialized,cybercrimebusinesses
Nosinglefixsincethethreatskeepchanging;It’saperpetutalbattle
![Page 3: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/3.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 3
WHYSHOULDICARE?
•60%ofemployeeswillclickaphishinglink
•30%ofthemwillactuallygiveuporganizationcredentials
•20%statedtheywouldselltheirorganizationalpassword
REALITY:thebulkofsuccessfulattackscomebecauseanemployeeclickedon
somethingtheyshouldn’thave
TypesofAttacksandThreats• TargetedAttacks– Governmentagenciesaregenerallytargets– Italsohappensifsomethinggoeswrong
• MassAttacks– Thisstemsfromsuccessfulemailphishing,socialengineering,plus“bruteforce”attacksonnetworks
• Man-in-the-MiddleAttack:– Alinktoalog-insitethatlookslegit,butisfraudulentandwillstealyourcredentials
• Unsecurehumans– Clickingonthewronglink/openingthewrongfile– Anemployeewhostealsdataforresaleorillegaluse
![Page 4: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/4.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 4
SomeCommonTerms
Malware
Destructiveformofcomputersoftwaretransmittedbyemailandwebsitelinks
Viruses,Trojans.Rootkits.Worms.Spyware.Crimeware. Adware
![Page 5: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/5.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 5
Phishingaformofsocialengineeringthatappearsasemailoratextmessagethatattackersusetogainlogincredentialsoraccountinformation
Anditsevilcousin,thetargetedSpear-PhishorVish,usingvoicetofoolyou
PHISHINGEMAILSEXAMPLES
Phishingemailposesasanimportantemailfromatrustedorganization
– Anotificationfromthepostoffice,UPS,FedExshippinginformingtherecipientofadelivery
– Amessagefromautilityproviderorretaileraboutanoverduebill
– Analertabouttherecipient’staxreturn– Invoicesornoticesforgoodsandservices(Amazon,Costco)
– Fakecreditcardrewardschemes– Directionfromyouremployer,i.e.,needtolog-inbecauseyoulostsomepermission
Eachvariationreliesonourinstincttoactonmessagesthatappeartobeurgent
![Page 6: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/6.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 6
• Clickingonanattachmentoralinkembeddedinasuspiciousemaillaunchesaprogramthatencrypts(orrewrites)yourfiles.
![Page 7: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/7.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 7
THISISRANSOMWARE!SOWHATHAPPENS?
• Thefilesareheldforransom;thehackerwhosenttheemailwillrequireapaymentfromyoubeforetheywill(hopefully)sendyouthekey(alineofcomputercode)thatdecryptsthefilesandrestorethem.
• Hopeyouhavebackupstorestoreyoursystem;otherwiseyoupay!
• Nowknowntohackersasavictimandwillbesubjecttofutureattacks
![Page 8: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/8.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 8
WHEN EMAIL TURNS EVIL!!!
EMAILASSOURCEOFMALWARE?
- Embedded,butfakelinksenticeyoutoopenharmfulwebsites
- Spoofed“from”addresses
- Attachmentscanhaveembeddedvirusesormalware;MSOfficedocumentscanhavemaliciousmacrosinthemorrequeststolinktootherfilesfromafileyoudownloaded.Otherattachmentsincludehtmlandzip.
- Couponsandadvertisementswith“hiddenagendas”
- Alwayswithsuggestionthatyouneedsomething,orcouldgetsomethingforabargain.
![Page 9: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/9.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 9
PROTECTYOURSELFFROMEVILEMAIL
![Page 10: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/10.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 10
• Learntohoverandreadlinks!
• Besuspiciousofunexpectedemails
• Donotdownloadoropenattachmentsyouarenotexpecting:• Confirmfirstwiththesenderifitlooksimportant• Orjustdeleteit
• Alwaysbesuspicious(donotletyourguarddown)
• Ifitdoesn’tlookright,it’snotright
• Donotlogintoanaccountfromanemaillinkunlessyouverifyit’salegitemailandsite
• Neverunsubscribefromagroupthatyouareunfamiliarwithordidnotsubscribeto
![Page 11: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/11.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 11
• Usestrongpasswordsorbetteryetpass-phrases; donotusenames,dateofbirths,oranythingknownaboutyou.Andvarythem.– Particularlyforfinancialsites,siteswithyourcreditcardinformation,andemail.
– Changethemperiodically(annuallyforkeyones)• Donotsharepasswords!– Anythingthathappensonthataccountgetstreatedasifyoudidit.
– Ifyoudoshareapasswordchangeittosomethinggenericbeforeandbacktosomethingcomplexafter;orchangeitafterit’suse
• Useapersonalpasswordmanager
MakingandManagingStrongPasswords
![Page 12: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/12.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 12
SAFEWEBBROWSING
![Page 13: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/13.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 13
HTTP
HTTPS
![Page 14: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/14.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 14
http://masterupdate.net/.....
Ifyouareunsureaboutthistypeofpop-up,searchfor“flashupdate”andgotoanadobe.com sitetocheck.Don’tdownloadfromapop-upthat’snotfromtheadobe.comwebsite.
![Page 15: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/15.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 15
• DONOTCLICKONsuspiciouspop-upsorunexpectedmessageswhenbrowsing!– Ifatwork,callIT;ifathome,closethewindowor,disconnect
fromnetwork
– Workiswork,nothome!
– Rememberyourwebbrowsingactivitiesaretracked(evenifyouclearthebrowserhistory)!
– DON’TCLICKonthatpop-up!
– DON’TCALLthenumberonthescreen
SafeBrowsing:@Workand@Home
• Thingsthataretoogoodtobetrue,aren’ttrue.Don’tclickonthemordeletethem
• Caughtinaloop?Shutdownandreboot
• StaySafe:Browsetrusted sites:• Knowtheaddress:HTTPvs.HTTPS,andnopasswordsonnon-https sites
• Usetwo-factorauthenticationwhenoffered• Don’tdownload“toolbars”orcleaners,unlessknownorcheckedout.Youprobablydon’tneedthem
KEEPYOURCOMPUTERUPTODATEKeepwindows,antivirus,andbrowser
updatedwithlatestversions
![Page 16: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/16.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 16
FormsofSocialEngineering
• In-person• Phone• Digital
![Page 17: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/17.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 17
BEWAREOF……phonecallersaskingforconfidentialemployeror
personalinformation,eveniftheyclaimtobefromIToravendor.ReferthemtoITsupportorhangup.
'Canyouhearme?'phonescamAdangerousnewphonescamisspreadingacrossthecountry,withfauxtelemarketersaskingunwillingvictimstorespondwithasinglewordto"Canyouhearme?"
{ }
![Page 18: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/18.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 18
UNFORGETTABLES
• Donotlogonandoffacomputerwhenaskedbyanotheremployeeoroutsideperson–unlessidentityisverified
• CallerIDcanbe“spoofed”• Usetwo-factorauthenticationtransactionswheneveritsavailable
• FiscalandHRpeople:POSTIVELYconfirmallemaileddirectionsforanything(especiallyforpersonnelinformationandpaymentdirection)
• Usepasscodeonmobiledevices35
![Page 19: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/19.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 19
• Nosystemis100%perfect- sincethreatsarealwayschanging
• Stayaware:stop,think,thenconnect• CallyourITsupportpersonwhenindoubt• Athome:www.malwarebytes.com ifyougetinfected
UH,NOPE
PUTTINGITALLTOGETHER
• Don’tbecurious– justdon’tclick• Online;freeisneverfree• Besuspicious– hoverfirstandcheckitout• Ifyoudidn’taskforit,youdon’tneedit• Never openattachmentsfromunknownpeople• Don’tinstinctivelyopenfilesfrompeopleyouknowbutwerenotexpecting;checkwiththemfirst
• LockyourPCwhenawayfromyourdesk– “Ctrl+Alt+Del>Enter”or“Windows+L”
• Testyourself:searchfor“PewCybersecurityQuiz”• www.pewinternet.org/quiz/cybersecurity-knowledge/
![Page 20: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/20.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 20
Youknowwhattheysay…
Formoreinformationforworkorhomeorschool:www.stopthinkconnect.org
![Page 21: Recognizing, Detecting and Preventing Cyber Security Threats...•Now known to hackers as a victim and will be subject to future attacks. ... •No system is 100% perfect -since threats](https://reader033.vdocuments.site/reader033/viewer/2022042910/5f3eed015667e52a5d7c13f1/html5/thumbnails/21.jpg)
CyberHygienePractices 11/30/17
Bloustein Local Government ResearchCenter 21
Forfurtherdiscussionandcomments
MarcPfeiffer,AssistantDirectorBloustein LocalGovernmentResearchCenterBloustein SchoolofPlanningandPublicPolicyRutgersUniversityMarc.Pfeiffer@rutgers.edu
• SeetheTechnologyRiskManagementPapersbysearchingfor“Bloustein TechnologyRisk”