SlideShare a Scribd company logo
1 of 15
Download to read offline
Information Security & Internet Snooping




Jerry Justice
What is security?

 Wikipedia: Security is the degree of protection against danger,
  damage, loss, and crime.
 Security is not an absolute or any single mechanism.
 “Is that secure?” From what? Fire, theft, flood, loss..?
 My goal:
        Knowledge to make an informed choice and to have you
        think differently about security.


Ex: You lock your house + you add an alarm system = reducing your
risk.
What is the impact related to
               technology?
   Expanding and distributed nature of Internet
   Explosion of mobile devices and apps
   24/7/365 accessibility from anywhere
   Information more digital (i.e. Healthcare)
   Identity Theft and Personal Information (PI)
   Huge storage capacity, small devices

Ex: Think about what a library used to be and the accessibility to
books. Simple access now with less physical constraints (i.e. -
Kindle).
Where is my information?


 What exists already (public records) + what you give
  (credit apps, driver license, mortgages, taxes, bank
  accounts, etc…) + ……….
Where else do they get info about me?
 Websites – Tracking, history, postings, search analytics, computer
  cookies…
 Device use - smartphones, iPads, iPods, Xbox, home and work
  computers, paperwork, dumpsters, etc…
 Apps – “Is it ok if I use all your FB information so you can play this
  game?”
 Social Engineering (leveraging human behavioral responses) –
  phone calls, co-workers, relatives..
 “Free” services – Google, Facebook, LinkedIn, etc...
 Identity Theft (direct or indirect)
 Purchase (legit and not legit)
 Email ‐SPAM and Phishing responses
 Legit 3rd parties who sell, lose or expose information (i.e. –
  Heartland, TJX)
 Illegally – sniffing, phishing, key loggers, hacking, malware…

     Ex: So which is safer, mailing a check or paying online?
What do they do with it?
   Provide service to you
   Store it for later
   Sell it to third parties (or use “internally”)
   Use it for target marketing, trending analysis
   Identity Theft
   Expose it to others (improperly secured or poor processes)
   Aggregators (i.e. ‐spokeo.com) – combine and sell
   Increasingly more “360” views, connecting once disparate
    information sources (“login with your FB account”). Build a profile
    on who you are, based on a variety of content: browsing habits,
    searches, shopping, click-through, etc…

Ex: Insurance companies using credit reporting for rate
“alignment”, Google Ads, etc…
Information Security Tools & Tactics
 Awareness
   – Example 1: Unknown person is walking around your office,
     Ask “Who are you?”
   – Example 2: Unsolicited phone caller asks for personal
     information, “Can I get a number to call you back at?”
   – Example 3: Email that asks you to alert everyone you know
     about a scam they just discovered. DELETE. This may actually
     be a scam.

 Common Sense – If it appears suspect, probably is
 Be stingy with your information (especially PI)
 Limit your exposure – protect your home wireless, do not share
  account info, avoid simple passwords, etc…
 Know where you are going online – “mouse over” email links
 Computer acting “weird” – ex: incorrect start page
Info Security Tools & Tactics (cont.)
 Clean up after yourself ‐ Use appropriate malware, virus and
  Trojan protection tools and cleaners (CCleaner, Ad-Aware,
  Symantec). Note: ISPs, Google have own user history and have
  provided in legal matters (similar to phone company subpoenas).
 Avoid being the cause ‐“pass this on” email chains, don’t forward
  to IT (you could be forwarding a trojan/virus)
 Use a non‐primary email for random and one‐off needs
 Use secure channels for online purchases and payments (HTTPS)
 Monitor your personal transactions ‐bank, CC, mortgages, etc...
 Secure your smartphone and mobile devices!

Ex: CCleaner. Bank of America purchase alerts on smartphone.
Securing your business (broad)
   Prevent data loss ‐ DLP (data loss prevention) tools, network security
    controls and protocols, staff policies, monitoring, encrypt all drives, etc...
   Secure your data – know where it is, who touches it and the associated
    value/risk of each piece. Make a data map/plan then look at surrounding
    processes.
   Limit your exposure – shred work papers, remove printed items from
    copiers/printers at night, lock cabinets that contain papers with PI.
   Review compliance requirements – HIPPA, SEC, PCI DSS, etc… (not
    directly correlated to security)
   Have a PI policy and train staff on it. Proactive position.
   Establish a mobility policy for staff (smartphones, BYOT trends)
   Understand data security “in the cloud” is a paradigm shift (not
    necessarily bad but different control points)
   Use secure communications (VPNs, HTTPS, etc…)
   Protect data “at‐rest” (thumb drives, backups) AND in transit (email with
    PI), encrypt PC drives. Question: Where do you think most security
    breaches occur? (Opportunity)
   Third party security review
   Use secure PDFs for document delivery (email)
   Use a layered security approach
   Reduce opportunity theft – keep things in control or out of sight
Summary

 Security Take-away
   – Common sense, awareness, limiting your exposure and
     asking questions will take you a long way in protecting
     your information/assets and reducing your security
     risks.
   – Ask yourself “if this was my information, how would I
     like it handled?”
   – Effective security is an ongoing process.

 References
   http://www.privacyrights.org/
   https://www.pcisecuritystandards.org/
   http://www.piriform.com/ccleaner
   http://www.symantec.com/
   http://www.lavasoft.com/
   http://www.sans.org/security‐resources/
Connecting…

 jjustice@ssandg.com
 http://www.linkedin.com/in/jerryjustice
 Twitter - @jerrymjustice

More Related Content

What's hot

Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Atika Zaimi
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipcrw526
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Nawanan Theera-Ampornpunt
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal PrivacyEmerson Bryan
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attackPankaj Dubey
 
Social Engineering
Social Engineering Social Engineering
Social Engineering Mirna Hanna
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?JamRivera1
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Cyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer ApplicationCyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer ApplicationTENZING LHADON
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityDon Edwards
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Eric Vanderburg
 
Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test CampaignInfographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test CampaignPratum
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOAPeter Henley
 
Most Important Issues
Most Important IssuesMost Important Issues
Most Important Issuesashleycolleen
 

What's hot (20)

Social engineering
Social engineeringSocial engineering
Social engineering
 
Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
 
Social engineering
Social engineering Social engineering
Social engineering
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Social Engineering
Social Engineering Social Engineering
Social Engineering
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Cyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer ApplicationCyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer Application
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
 
Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test CampaignInfographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
Most Important Issues
Most Important IssuesMost Important Issues
Most Important Issues
 
Lift Asia09 Morin
Lift Asia09 MorinLift Asia09 Morin
Lift Asia09 Morin
 

Similar to IMA Meeting 03222012

cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Michele Chubirka
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for NonprofitsNPowerCR
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptxTapan Khilar
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverPJStarr
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextBrian Pichman
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats07Deeps
 
Chap 8
Chap 8Chap 8
Chap 8GTU
 
Book 3 chap-8
Book 3 chap-8Book 3 chap-8
Book 3 chap-8GTU
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centurygracestearns
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centurygracestearns
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)Patrick Garrett
 

Similar to IMA Meeting 03222012 (20)

cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for Nonprofits
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
Mobile security
Mobile securityMobile security
Mobile security
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take next
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Chap 8
Chap 8Chap 8
Chap 8
 
Book 3 chap-8
Book 3 chap-8Book 3 chap-8
Book 3 chap-8
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

IMA Meeting 03222012

  • 1. Information Security & Internet Snooping Jerry Justice
  • 2. What is security?  Wikipedia: Security is the degree of protection against danger, damage, loss, and crime.  Security is not an absolute or any single mechanism.  “Is that secure?” From what? Fire, theft, flood, loss..?  My goal: Knowledge to make an informed choice and to have you think differently about security. Ex: You lock your house + you add an alarm system = reducing your risk.
  • 3. What is the impact related to technology?  Expanding and distributed nature of Internet  Explosion of mobile devices and apps  24/7/365 accessibility from anywhere  Information more digital (i.e. Healthcare)  Identity Theft and Personal Information (PI)  Huge storage capacity, small devices Ex: Think about what a library used to be and the accessibility to books. Simple access now with less physical constraints (i.e. - Kindle).
  • 4. Where is my information?  What exists already (public records) + what you give (credit apps, driver license, mortgages, taxes, bank accounts, etc…) + ……….
  • 5. Where else do they get info about me?  Websites – Tracking, history, postings, search analytics, computer cookies…  Device use - smartphones, iPads, iPods, Xbox, home and work computers, paperwork, dumpsters, etc…  Apps – “Is it ok if I use all your FB information so you can play this game?”  Social Engineering (leveraging human behavioral responses) – phone calls, co-workers, relatives..  “Free” services – Google, Facebook, LinkedIn, etc...  Identity Theft (direct or indirect)  Purchase (legit and not legit)  Email ‐SPAM and Phishing responses  Legit 3rd parties who sell, lose or expose information (i.e. – Heartland, TJX)  Illegally – sniffing, phishing, key loggers, hacking, malware… Ex: So which is safer, mailing a check or paying online?
  • 6.
  • 7.
  • 8. What do they do with it?  Provide service to you  Store it for later  Sell it to third parties (or use “internally”)  Use it for target marketing, trending analysis  Identity Theft  Expose it to others (improperly secured or poor processes)  Aggregators (i.e. ‐spokeo.com) – combine and sell  Increasingly more “360” views, connecting once disparate information sources (“login with your FB account”). Build a profile on who you are, based on a variety of content: browsing habits, searches, shopping, click-through, etc… Ex: Insurance companies using credit reporting for rate “alignment”, Google Ads, etc…
  • 9. Information Security Tools & Tactics  Awareness – Example 1: Unknown person is walking around your office, Ask “Who are you?” – Example 2: Unsolicited phone caller asks for personal information, “Can I get a number to call you back at?” – Example 3: Email that asks you to alert everyone you know about a scam they just discovered. DELETE. This may actually be a scam.  Common Sense – If it appears suspect, probably is  Be stingy with your information (especially PI)  Limit your exposure – protect your home wireless, do not share account info, avoid simple passwords, etc…  Know where you are going online – “mouse over” email links  Computer acting “weird” – ex: incorrect start page
  • 10. Info Security Tools & Tactics (cont.)  Clean up after yourself ‐ Use appropriate malware, virus and Trojan protection tools and cleaners (CCleaner, Ad-Aware, Symantec). Note: ISPs, Google have own user history and have provided in legal matters (similar to phone company subpoenas).  Avoid being the cause ‐“pass this on” email chains, don’t forward to IT (you could be forwarding a trojan/virus)  Use a non‐primary email for random and one‐off needs  Use secure channels for online purchases and payments (HTTPS)  Monitor your personal transactions ‐bank, CC, mortgages, etc...  Secure your smartphone and mobile devices! Ex: CCleaner. Bank of America purchase alerts on smartphone.
  • 11.
  • 12.
  • 13. Securing your business (broad)  Prevent data loss ‐ DLP (data loss prevention) tools, network security controls and protocols, staff policies, monitoring, encrypt all drives, etc...  Secure your data – know where it is, who touches it and the associated value/risk of each piece. Make a data map/plan then look at surrounding processes.  Limit your exposure – shred work papers, remove printed items from copiers/printers at night, lock cabinets that contain papers with PI.  Review compliance requirements – HIPPA, SEC, PCI DSS, etc… (not directly correlated to security)  Have a PI policy and train staff on it. Proactive position.  Establish a mobility policy for staff (smartphones, BYOT trends)  Understand data security “in the cloud” is a paradigm shift (not necessarily bad but different control points)  Use secure communications (VPNs, HTTPS, etc…)  Protect data “at‐rest” (thumb drives, backups) AND in transit (email with PI), encrypt PC drives. Question: Where do you think most security breaches occur? (Opportunity)  Third party security review  Use secure PDFs for document delivery (email)  Use a layered security approach  Reduce opportunity theft – keep things in control or out of sight
  • 14. Summary  Security Take-away – Common sense, awareness, limiting your exposure and asking questions will take you a long way in protecting your information/assets and reducing your security risks. – Ask yourself “if this was my information, how would I like it handled?” – Effective security is an ongoing process.  References http://www.privacyrights.org/ https://www.pcisecuritystandards.org/ http://www.piriform.com/ccleaner http://www.symantec.com/ http://www.lavasoft.com/ http://www.sans.org/security‐resources/