sec and ethics presentation

15
SECURITY RISKS RELATED TO HUMAN ERROR DARREN MCMANUS, ÉANNA HEGERTY, DONAGH MCINTYRE

Upload: darren-mcmanus

Post on 28-Oct-2014

123 views

Category:

Documents


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Sec and ethics presentation

SECURITY

RISKS R

ELATE

D

TO H

UMAN ERROR

DA

RR

EN

MC

MA

NU

S, É

AN

NA

HE

GE

RT

Y, D

ON

AG

H M

CI N

TY

RE

Page 2: Sec and ethics presentation

OVERVIEW• News stories every day – exposure of private

company information

• Not advanced technology or genius hackers but…

• “Human Beings, Being Human”

2

Page 3: Sec and ethics presentation

RISKS STEMMING FROM…

3

A. Careless Use Of E-Mail

B. Other Aspects of Human Error

Page 4: Sec and ethics presentation

A. CARELESS USE OF EMAIL1. Employee Vulnerablility to Spear Phishing Attacks

Fraudulent email intent on gaining data/information - much more focused than traditional Phishing

Example: 2008 District Court Subpoena Scam

Solutions:

• Education

• Messaging Intelligence

• Phishing Filter

• Avoiding Embedded Links

• Increased Sensitivity of Spam Filters

4

Page 5: Sec and ethics presentation

A. CARELESS USE OF EMAIL2. Use of Company Account for Personal Use (and Vice-Versa)

Lack of distinction between the company account and personal account can lead to embarrassing or disastrous consequences

5

Example: Anonymous - Sarah Palin, 2008

Solutions:• Policy of separate accounts for

personal and work use• Ban on internal “chain mail” on

company accounts• If absolutely necessary to use personal

account for work purposes, encryption must be used

Page 6: Sec and ethics presentation

A. CARELESS USE OF EMAIL3. Avoidable Loss of Old E-mails

It’s often assumed that once an e-mail is stored in an account that it is safe forever.

However e-mail accounts can crash leading to loss of all data which hasn’t been backed up.

6

Example: G-Mail Mishap, 2006

Solutions:• Manual e-mail backup on cd/storage device

with strict back up schedule.• Purchase of automated backup software to

take care of backups automatically

Page 7: Sec and ethics presentation

A. CARELESS USE OF EMAIL4. Mis-use of the “Reply All” Button

One of the most common mistakes made by individuals regarding e-mail error which can result in sensitive or embarrassing information being sent to unintended recipients.

7

Example: LA Police Dept. Controversy, 2012

Solutions:Many e-mail providers offer a number of preventative means, e.g. Outlook:• Option to remove “Reply All” button• Option of 30 second lag on all e-mails• Option of an alert warning the user that

“Reply All” has been selected

Page 8: Sec and ethics presentation

A. CARELESS USE OF EMAIL5. Over-Dependence on E-mail (especially for discussion of sensitive info)

E-mail is often seen as an “easy way out” communication tool providing a quick fix. The short term relief, however, does not outweigh the potential problems including clogging of internal email systems.

Also problematic is the use of e-mail for sensitive corrospondence more suited to a phone call or face to face meeting.

8

Example: Navio Computer’s Clogged Email System, 2011

Solutions:• Ban on unnecessary internal e-mails• Alternative cloud-based collaboration

tools• FtF meetings and phone calls to discuss

sensitive info• Encryption if sensitive info MUST be sent

via e-mail

Page 9: Sec and ethics presentation

B. OTHER ASPECTS OF HUMAN ERROR1. Loss Of Laptop/Other Device (Containing Unencrypted Data)

Theft/Loss of a computer or other data storage medium made up 35% of all data breaches in 2012. Such theft/loss can cost a company hugely in monetary terms as well as image, competitive advantage and consumer trust.

9

Example: Dept. of Veteran Affairs Database Theft, 2006

Solutions:

• Education of employees around device and password security

• Immediate notification of loss or theft

• Encryption of all sensitive company data/info

• Device Management Consoles – monitor, set , enforce polices & remotely wipe devices

Page 10: Sec and ethics presentation

B. OTHER ASPECTS OF HUMAN ERROR2. Failure To Erase Data When No Longer Required/Permitted

It is generally good practice to destroy old info/data that is no longer required, to free up disk space.

More importantly, many sectors are governed by laws prohibiting retention of certain info after a specific time period.

10

Example: Affinity Health Care Digital Copier Mishap, 2010Solutions:• Policies regarding deletion of old emails, messages,

call logs & files• Strict reviews of data on all devices on regular

continual basis• Education of staff around safe destruction of old data• Device Management Consoles (again) for remote

wiping of lost/stolen devices

Page 11: Sec and ethics presentation

B. OTHER ASPECTS OF HUMAN ERROR3. Sharing of User Account Details and Passwords

Password sharing - convenient & cost saving in relation to certain systems.

Can widen potential for unauthorised access, especially when people leave the company.

It also prohibits mgmt from knowing who logged into what and when (audit trail).

11

Example: Lincoln National Securities Affiliate Access, 2010

Solutions:

• Assign usernames and PW’s specific to individual users & grant/revoke permissions depending on what these users require

• Policies demanding ‘strong’ PW’s & mandatory routine for changing PW’s

• PW’s should be changed when duties are reassigned or employees leave

Page 12: Sec and ethics presentation

B. OTHER ASPECTS OF HUMAN ERROR4. Data Theft By Employees/Former Employees

Employees gain access to numerous systems through their employment including email accounts, HR payroll systems, etc.

Often Companies do not prioritise the practice of updating user access & privileges when employees leave the company, opening the door to data theft by disgruntled former employees.

12

Example: Fidelity National Information Services Data Theft, 2007

Solutions:

• Policy of updating access and privileges when employees leave the company

• Purchase of systems to simplify the user provisioning process

Page 13: Sec and ethics presentation

B. OTHER ASPECTS OF HUMAN ERROR5. Use of company laptops outside of work / personal laptops in the workplace

Ideally should never use the same device for both – if company laptop MUST be used, they should never be left unattended or connected to unsecure networks.

13

Example: Saudi Aramco Virus Infection, 2012

Solutions:• Separate laptops for home and work

except when absolutely necessary• Password protection & no sharing• Deletion of sensitive information when no

longer needed• Restrictions of the type of data allowed

outside the workplace• Encryption of all sensitive information• Restrictions on connection to unprotected

networks

Page 14: Sec and ethics presentation

B. OTHER ASPECTS OF HUMAN ERROR6. General Simple Human Carelessness

By our nature, humans will suffer lapses in concentration or oversights.

In business, carelessness like failure to double check standards or erroneous publication of data may have disastrous consequences.

14

Example: AOL Release of Search Data, 2006

Solutions:• Education of employees about their

responsibilities regarding data security and the use of technology to avoid data breaches

• Preparation & implementation of data breach policies and response plans

Page 15: Sec and ethics presentation

CONCLUSION• Data breaches not necessarily associated with new

technologies and genius hackers

• Reality: Many can be associated with human error

• Ponemon: 78% - “human negligence or maliciousness”

• Many breaches can easily be avoided

15

• Precautions can be aided by technology but old familiar security fundamentals are key:

• Training & Education

• Policies, Revisions & Analysis

• Data Encryption

• Common Sense & Sound Judgement