• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Identity Theft
 

Identity Theft

on

  • 438 views

 

Statistics

Views

Total Views
438
Views on SlideShare
437
Embed Views
1

Actions

Likes
0
Downloads
13
Comments
0

1 Embed 1

http://www.slideshare.net 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Identity Theft Identity Theft Presentation Transcript

    • Who am I? Who am I? • Well over 30 years in telecom • 26 years in the Naval Air Reserve • Top Secret clearance • Responsible for proper operation of all in‐flight Responsible for proper operation of all in flight  communication and navigation equipment • Former Central Region Adtran, AFC Territory Sales Manager • L Long time member of the  MNTA and NDTA organizations ti b f th MNTA d NDTA i ti • Project manager – County oif Sacramento telecom project • Visiting faculty at DePaul University in Chicago • Founder of SimpleTel, Inc. – manufacturer’s representative
    • The ABC’s of f Identity Th ft Id tit Theft Part One in a multi part series of  overviews on Disaster  Part One in a multi‐part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery
    • Objectives • Security Overview • Define “identity theft” • Evaluate criminal methodologies Evaluate criminal methodologies • Consider “protective” solutions Consider protective solutions
    • During the 2nd half of 2008,  g , 70 of the top 100 websites  were found to have been  were found to have been compromised or contained  links to malicious sites. links to malicious sites
    • Interesting information… • 25 million new strains of malware are  presented in just one year • 23 new malware samples per minute • Banker trojans make up 66% of all malware • 95% of the bits and bytes sent across the 95% of the bits and bytes sent across the  internet consists of “unstructured” data • PDF • JPG/GIF • MPEG SOURCE:  Infoweek TechWeb Webcast of 2/17/2010
    • Interesting information (cont)… The most alarming sources of malware  attacks come from: • Social Networking @ 31% • Web sites @ 29% • Email @ 17% SOURCE:  Infoweek TechWeb Webcast of 2/17/2010
    • Interesting information (cont)… • Facebook receives 15 million requests for  service PER SECOND • 49 % of companies polled allow their staff  to access Facebook to access Facebook What happens when Facebook What happens hen Facebook becomes a tool of evil people SOURCE:  Infoweek TechWeb Webcast of 2/17/2010
    • Potential Threat Vectors… • Web site attacks on browsers • Social networks Social networks • Email accounts • Wireless access points
    • “Vectors” of choice… “ ” f h i
    • A new site to watch (or not)… • Reported in Sunday’s New York Times CHATROULETTE Only three months old and has grown to  Only three months old and has grown to tens of thousands of users
    • A recent Oracle survey… • Security threats are poorly understood • 33% of those polled stated identity theft  was a potential barrier to online purchasing • 42% were worried that personal details  might be intercepted might be intercepted • 30% stated they didn’t trust web site  security measures
    • Fringe sites… The problems only  p y occur after the user  decides to click the  link!
    • Identity Th ft Id tit Theft
    • Identity theft in its simplest  y p form is the compromise and  use of your personal data  use of your personal data for the purpose of  committing a fraudulent  committing a fraudulent act.
    • • It isn’t about credit card receipts • It doesn’t always come from those  unsolicited credit card company invitations li i d di d i i i • It doesn’t happen from people looking It doesn t happen from people looking  over your shoulder at the ATM
    • What they want… • DOB • SSN/National ID number / • Online banking information • Email address and passwords • Mailing address • Telephone number
    • Why they do it… • Access to your bank accounts Access to your bank accounts • Access to your credit card accounts y • Use of your personal data to secure  credit • Use of your personal data to obtain Use of your personal data to obtain  fraudulent  identification papers
    • Criminal Methodologies g
    • Cybercrime today has solid roots in  Romania, Bulgaria and Russia.   Their “take” amounts to hundreds  of thousands of dollars per day.  
    • • IP Address • Email Address Email Address • Facebook
    • How they do it… • Overt “hacking” • Malware • Key loggers Key loggers • Phishing/scam emails g/
    • Hacking • Remote access of private areas of the company  Remote access of private areas of the company server environment Primarily access over the web 1) access into the company home page 2) access into sensitive files areas • Unlawful or malicious removal of sensitive  information Internal/local access  Internal/local access 1)  USB drives 2)  CD burners 3)  Rogue wireless devices  )
    • Three forms of  “malware”… “malware” • Trojans • Worms • Viruses
    • How malware propagates… “botnet” is a term associated primarily with the  negative aspects of malware distribution, though  negative aspects of malware distribution, though botnets are often used in research as a collection of  computers all working simultaneously on a given  problem.
    • One Support Website One Pharmacy Billions of One Merchant Account Messages 10-15 Unique Site Designs 100’s Web 1,000’s URLs Servers 10,000’s Message 100,000’s Zombies Variants
    • Spotting malware activity… • Malware morphs • IRC ffi i IRC traffic increases across the common ports h • Increases in antivirus file changes Increases in antivirus file changes • Outbound SMTP traffic increases • Host file modification
    • Key Loggers Beware! These executables have the ability  to record ALL your password  entries and then send them off to a  entries and then send them off to a specific address without you  knowing it. knowing it.
    • “Phishing” and scam emails Emails that solicit the recipient to  divulge key information in order to  gain access to specific data.
    • What looks  “innocent”  really isn t.   really isn’t. Would you  provide this  provide this information  to a  stranger?
    • So, do you   think this  looks  official and  legitimate?
    • The problems only  The problems only occur when the user  decides to click the  link!
    • Protection Options p
    • 10 typical security mistakes… • Sending sensitive date in an unencrypted e‐mail • Using “security” questions whose answers are     easily discovered easily discovered • Imposing password restrictions that are too strict • Letting vendors define “good security” • Underestimating req ired sec rit e pertise Underestimating required security expertise • Underestimating the importance of review • Overestimating the importance of secrecy • Requiring easily forged identification • Unnecessarily reinventing the wheel • Giving up the means of your security in exchange Giving up the means of your security in exchange  for a feeling of security
    • 10 Wi‐fi i f R d W i i 10 Wi fi tips for Road Warrioirs … • Turn off the wi‐fi clients when not in use • Verify that the SSID actually represents the  provider’s wi‐fi network • Make sure that a software firewall is running on Make sure that a software firewall is running on  your laptop • Disable Window’s file and printer sharing • Avoid sensitive online transactions when using Avoid sensitive online transactions when using  open wi‐fi networks • Keep you laptop’s OS up to date • Secure any personal, banking, or credit card details • Use secure and anonymous web surfing techniques • Use VPN technology when necessary Use VPN technology when necessary • Use remote access applications for security
    • Anti‐virus update… • Symantec (Norton) will leave the business • McAfee is strengthening its position • Kaspersky Labs could be the next best • EMC/RSA i i i h EMC/RSA is winning huge projects j • Sendio Barracuda Red Condor AVG etc Sendio, Barracuda, Red Condor, AVG, etc…
    • Protection methods… • Firewall • Resident Antivirus app Individual • Spyware/Malware app • Endpoint sec rit Endpoint security Corporate • Forensics
    • Firewalls… Whitelisting and Blacklisting
    • Firewalls…
    • Resident antivirus protection… • SPAM filtering/elimination • BOT/Malware detection BOT/Malware detection • Cookies, Adware, etc… Filtering by Contact DB Filtering by content
    • Spybot . . .   “bot” detection & elimination
    • Secunia . . . One method is not enough
    • Endpoint  security  is  used to  control,  t l secure and  monitor all  monitor all methods of  data transfer
    • Using the “cloud”…
    • The solution can be on  premise or in the “cloud”… i i th “ l d” • Premise‐based solutions Premise based solutions • Cloud‐based solutions
    • Your individual solution requires a  “blended” approach… blended approach… • Your firewall • Some sort of hardware or software “monitor” Your corporate solution requires a  Your corporate solution requires a “blended” approach as well… • Your firewall • Some sort of hardware or software “monitor” • Endpoint security with forensics
    • The problems only  The problems only occur when the user  occur when the user decides to click the  link!
    • Business Continuity and Disaster Recovery Part Two in a multi part series of  overviews on Disaster  Part Two in a multi‐part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery
    • Compliance: HIPAA, HITECH, PCI, Sarbanes-Oxley Sarbanes Oxley Part Three in a multi part series of  overviews on Disaster  Part Three in a multi‐part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery
    • Larry Pyrz SimpleTel, Inc. SimpleTel, Inc. www.simpletel.biz larry@simpletel.biz 773‐728‐3315 Larry Pyrz @larrypyrz Larry Pyrz