SlideShare a Scribd company logo
1 of 84
IT Security For Librarians:
Outrunning The Bear
@ Your Library
Blake Carver
LYRASIS Systems Administrator
Week One
•Passwords: L E N G T H & Unique
•Paranoia: Think Before You Click
•BackuPs: Frequent and Automatic
•Patches: Set to Auto
•Ponder Before Posting
Intro
Last Week
• Privacy
 Surveillance Is The Business Model Of The
Internet
• Carry A Safe, Not A Suitcase
• Email
• Browsers
• Public Wi-Fi
• Social Media
• Mobile Devices
• Backups
This Week
Everything You Need To Know
Lock Things Down
Grant Least Privilege
Whitelisting - Patches – Limit Admins
Build a Defensible Library
Threat Modeling
Everything With An IP Address Matters
Training
New Instincts
Never Without The WHY
“An iCloud scam that may be worse than
ransomware”
https://blog.malwarebytes.org/mac/2016/03/an-icloud-scam-that-may-be-worse-than-ransomware/
The Danger of Apps that Die
About three years ago there was an iPhone app named Kinotopic.
According to their website, which is still up, “Kinotopic allows you to
create, share, and store short video moments and make them more
expressive – in the form of animated pictures and cinemagraphs.”
Past users of Kinotopic may be interested to learn that there is currently
a MongoDB database that appears to belong to Kinotopic sitting out
on the open internet with no protection whatsoever. This derelict
MongoDB instance contains, among other things, the email addresses,
usernames, and hashed passwords for, what appear to be, over
198,000 previous Kinotopic users.
https://mackeeper.com/blog/post/197-the-danger-of-apps-that-die
In Cloquet, email and SmartBoards were affected, along with
phones, school bell and food service systems. The middle
school has a one-to-one device program for students that was
affected.
From: Geraldo Spence <SpenceGeraldo89626@powernet.bg>
To: <somone@example.com>
Subject: FW: Order Status #001204
Date: Tue, 22 Mar 2016 07:01:47 +0300
Dear someone,
We would like to thank you for your recent order.
Order Status updated on: 21/03/2016
Your Customer ID: 001204
Your Order ID: 4081F78D45-M-2016
Invoice Number: 5978299
Delivery Note:
We received your order and payment on 17/03/2016
Your order details are attached.
Best regards,
Geraldo Spence
Chief Executive Officer - Food Packaging Company
Libraries Live Below
The Security Poverty Line(Wendy Nather)
We simply can't afford to reach a great level of security
Few or no IT People
Few or no Security People
Hard to keep up with technology and security
Maintenance, planning, strategy are 2nd to OMG
Depend on consultants, vendors, family, patrons,
friends, volunteers, etc...
This leaves us in a bad place
 Defaults
 Old and outdated
 Workarounds
 Not much control
 No time to focus
 "We'll fix it later"
We ain't got
 Budget
 People
 Time
 Hardware
 Software
 Expertise
So what can we do?
 Budget?
 Buy things that are more secure?
 Question our vendors and partners on
security?
 Use our consortia?
 Outsourcing?
So what can we do?
 Develop a good Threat Model
 Set achievable security goals
 Learning, Planning & Training
 Develop IT- and security-focused
community groups for the exchange of
ideas, information and known security
threats.
 http://security4lib.org/
The perfect is not the enemy
of the good
Make Your Library Defensible
Able To Be Defended
• Defensible does not mean secure
• There are more things to defend than there
are resources to defend with
• Defensibility focuses on what, why, how,
when and from whom
Attackers are economically rational – they
take scarce resources and apply them
efficiently to achieve a desired outcome. As
a defender, making the target less attractive
or too expensive for that economically
rational actor means they will go after
something else. “It’s like the old saying:
you don’t have to outrun the
bear. You just have to outrun
your friend.”
Defensible Libraries
• A change in mindset
• Awareness of limitations & weaknesses
• Awareness of threats
• An admission of inconvenience
• A lot of hard, detailed and
underappreciated work.
So Let’s Think About…
• What do we have to secure?
• Who wants it?
• How could they acquire it?
• How could they benefit from its use?
–Can they sell it?
–Can they hold it hostage?
–Can they use & abuse it?
• How damaging would the loss of data be?
• How would this effect library operations?
• How secure do we really need to be?
But We’re Just A Library
IT Security For Libraries
We Are All Targets
IT Security For Libraries
Every access point to the
internet is potential breach.
83% targets of opportunity
92% of attacks were easy
85% were found by a 3rd party
IT Security For Libraries
Verizon Data Breach Investigations Report
84% were found by a 3rd party
Bad guys were in for 175 days before
they were discovered.
Trustwave Global Security Report
IT Security For Libraries
It’s Easy Being Bad
IT Security For Libraries
Security Is Hard
IT Security For Libraries
The attacker only needs to
succeed once...
IT Security For Libraries
While we need to catch every
single thing...
IT Security For Libraries
Staying safe takes more than
just a firewall & AV/AM...
IT Security For Libraries
Passwords
Your security software /
hardware is a seat belt – not a
force field.
IT Security For Libraries
When we protect our library,
we protect our patrons
• People come to us and want things to be
easy and free and fun
• They don’t think about security (Ever)
• Information Literacy
Complexity is the Enemy of Security
• We have no shortage of access points
• We deal with any number of vendors
• Threats come from outside the libraries
• Threats come from inside the libraries
•Our libraries are full of people
IT Security For Libraries
Security will forever be a
moving target
So What Can We do?
• Stop Ignoring it
• Prepare – Threat Modeling
• Prepare - Training
IT Security For Libraries
Ignoring it and thinking you're safe
“If It Ain’t Broke...”
• The vast majority of attacks…
–Won’t be targeted
–Will Be Easily Avoidable
Do something.... Do Anything!
IT Security For Libraries
Don't Make Things Easy
What Does A Library Need To
Protect?
IT Security For Libraries
Your Employees Homes / Phones / etc...?
OPAC / ILS
Staff Computers
Databases
Printers / Copiers
Website
Servers
Backups
Printers
Cell Phones
Wi-Fi Routers
Routers
Cell Phones
Ipads
Laptops
Printers??
Light Bulbs??
Cameras??
There are more things to
defend than there are
resources to defend with
Not every asset in your
organization is equally
valuable
An attacker will always pick
the weakest point of entry…
…but you can't know which
point that is
The Weakest Point In A Library?
Public Access Computers
IT Security For Libraries
Public Access Computers
Staying Safe On This Computer:
–Make Sure You Log Out
–Don’t Access Sensitive Sites
–Beware of the "remember me" option
–Don't send personal or financial information
via email or insecure websites
IT Security For Libraries
Public Access Computers
This Week’s Stay Safe Tips
–Never Trust Email
–Learn About Phishing
–Attend Our Security Class
–Always Check For A Secure Connection
IT Security For Libraries
Most exploits used “old” issues
that have been patched
There is no longer a window to
patch when a vulnerability or
exploit is discovered, in public or
private.Brad Arkin, Adobe
Locking Down Public Access
Computers
• Patching and Updating
–OS and *ALL* Applications
• Whitelisting
• BIOS passwords
• EMET - microsoft.com/emet
• SteadyState / DeepFreeze / SmartShield
• Check for USB additions
• Don’t use Windows?
• Don’t use IE?
IT Security For Libraries
35 Strategies to Mitigate Targeted Cyber Intrusions
Change your mindset – YOU are
the attacker
• What are you library’s most valuable
assets? Where are these assets? How can
they be accessed?
• If you were the attacker how would you
spread malware? And who are the most
‘vulnerable’ targets in the organization?
• Do you have a view on the ‘normal’
behavior of your organization (people,
behavior, locations and systems)?
Level the playing field…
Hack Your library!
Library Information Security System
Assessment Model (LISSAM)
Awareness Creation
Administrative Tools and Methods
Procedures and Control
Information Security Policy
Technological Security Foundation
CIS and CCS introduced the Cyber
Hygiene Campaign
Count: Know what’s connected to and running on
your network
Configure: Implement key security settings to help
protect your systems
Control: Limit and manage admins
Patch: Regularly update all apps, software, and
operating systems
Repeat: Regularly revisit the Top Priorities
https://www.cisecurity.org/about/CHToolkits.cfm
Six Steps to Stronger Security

 1. Keep an accurate hardware inventory
 2. Keep an accurate software inventory
 3. Actively manage configurations
 4. Remediate vulnerabilities quickly
 5. Automate endpoint defenses
 6. Control administrative access
https://www.sans.org/reading-room/whitepapers/awareness/steps-stronger-security-smbs-36037
Don’t Forget
• Check the internets for usernames/passwords
for your library (e.g. pastebin)
• HTTPS
• Is your domain name going to expire?
• Is you SSL Cert going to expire?
• Typo Squatters?
IT Security For Libraries
Thumb Drives
IT Security For Libraries
Training
Building Cybersecurity Champions
Training does not work
It's not worth it because someone will
still mess up
People already know what to do
This stuff us easy / obvious
Training
Train A Security Mindset
Quickly forgotten without practice and
reminders
Regular low level of training and awareness
IT Security For Libraries
Good security awareness
programs help all employees
know where to get help
Who they should call when there is trouble
Where they can look for guidance & policies
They should know that they will not be looked
down on for making a mistake
Someone’s job is to help them through
whatever difficulty they are having
We can't make everyone
an expert
We do NOT need to train the non-technical
employees about what the deep level geek
employees already know.
Building Good Habits
“Being secure” is something that is learned
over time and eventually becomes a habit.
Make the security mindset the default
Consistent reinforcement of the importance of
IT Security
What about training UP?
How do we communicate up?
Is your boss/director/board/dean/whatever aware of IT Security? If they
were, would that help make the library more secure? It may be up to you to
help everyone at your library become Security Literate.
So how do you do it?
Start talking & training.
Make sure everyone understands that we are all targets.
If they ask “How secure are we?”…
the answer will most likely scare them.
NEVER without the ‘WHY?’
Understanding awareness, training,
and development
What we want is policies that reinforce good
security principles that will foster over time a
new instinct in people, a new way of
looking at things, a new way of acting in
a more secure way.
This will require a huge amount of patience
and buy in from every at your library.
IT Security For Libraries
Carver, Blake Name
123456 ID Number
00123456 User ID
carver Password
05/01/2012 End Date
Training
• Phishing
• Social Engineering
• Privacy
• Passwords
• Email Attachments
• Virus Alerts
• Social Networking
• Updates
IT Security For Libraries
What we want is policies that reinforce good
security principles that will foster over time a
new instinct in people, a new way of
looking at things, a new way of acting in
a more secure way.
The goal is to make doing
things the right way become
the default in your library
Training…. Patrons?
• Your patrons don't care much for security
• Their habits are inviting malware
• Look for ways to make things safer in ways
that don't interfere with people's everyday
tasks as much as possible.
• Principle of Least Privilege
IT Security For Libraries
http://www.pewinternet.org/files/2015/09/2015-09-15_libraries_FINAL.pdf
Offer Training At Your Library
Library Security Mantra
• Security
• Privacy
• Confidentiality
• Integrity
• Availability
• Access
(based on Net Sec 101 Ayre and Lawthers 2001)
IT Security For Libraries
Remember:
This about your library’s security and
protecting your library’s brand and
reputation and your patrons.
The only way this can happen is if security
and risk management become regular
parts of library conversation.
Preparation - Practical Resources
• SANS 20 Critical Security Controls
– http://sans.org
• Securing Library Technology: A How-To-Do-It Manual
– Earp & Wright
• Strategies to Mitigate Targeted Cyber Intrusions
– Australian Signals Directorate
• Library Information Security System Assessment Model (LISSAM)
– Malaysian Journal of Library & Information Science, Vol. 16, no. 2
 Virtual Privacy Lab from the San José Public Library
https://www.sjpl.org/privacy
 Library Freedom Project
https://libraryfreedomproject.org/
IT Security For Libraries
Next Week
Week Four: The Web – Sites & Servers
How & why websites get hacked
Web Servers
Servers in general
Some Hacker Tools
Review
IT Security For Librarians:
Outrunning The Bear
@ Your Library
Blake Carver
LYRASIS Systems Administrator

More Related Content

What's hot

Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Michele Chubirka
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Deepak Khari
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSECSean Whalen
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSecureState
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
 
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Sean Whalen
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
 

What's hot (20)

INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Hacking
HackingHacking
Hacking
 
Information Security Engineering
Information Security EngineeringInformation Security Engineering
Information Security Engineering
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Introduction to Raspberry Pi
Introduction to Raspberry PiIntroduction to Raspberry Pi
Introduction to Raspberry Pi
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 

Similar to An Introduction To IT Security And Privacy In Libraries

Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityClaus Cramon Houmann
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...James Mulhern
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and HealthcareJonathon Coulter
 
Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Claus Cramon Houmann
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber SecurityAllen Zhang
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011Xavier Mertens
 
[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actorsOWASP EEE
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Claus Cramon Houmann
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcareNicholas Davis
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSlick Cyber Systems
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 

Similar to An Introduction To IT Security And Privacy In Libraries (20)

Carver IT Security for Librarians
Carver IT Security for LibrariansCarver IT Security for Librarians
Carver IT Security for Librarians
 
Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
 
Janitor vs cleaner
Janitor vs cleanerJanitor vs cleaner
Janitor vs cleaner
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber Security
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
 
[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Declaration of malWARe
Declaration of malWAReDeclaration of malWARe
Declaration of malWARe
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need It
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

An Introduction To IT Security And Privacy In Libraries

  • 1. IT Security For Librarians: Outrunning The Bear @ Your Library Blake Carver LYRASIS Systems Administrator
  • 2. Week One •Passwords: L E N G T H & Unique •Paranoia: Think Before You Click •BackuPs: Frequent and Automatic •Patches: Set to Auto •Ponder Before Posting Intro
  • 3. Last Week • Privacy  Surveillance Is The Business Model Of The Internet • Carry A Safe, Not A Suitcase • Email • Browsers • Public Wi-Fi • Social Media • Mobile Devices • Backups
  • 4. This Week Everything You Need To Know Lock Things Down Grant Least Privilege Whitelisting - Patches – Limit Admins Build a Defensible Library Threat Modeling Everything With An IP Address Matters Training New Instincts Never Without The WHY
  • 5.
  • 6.
  • 7. “An iCloud scam that may be worse than ransomware” https://blog.malwarebytes.org/mac/2016/03/an-icloud-scam-that-may-be-worse-than-ransomware/
  • 8.
  • 9. The Danger of Apps that Die About three years ago there was an iPhone app named Kinotopic. According to their website, which is still up, “Kinotopic allows you to create, share, and store short video moments and make them more expressive – in the form of animated pictures and cinemagraphs.” Past users of Kinotopic may be interested to learn that there is currently a MongoDB database that appears to belong to Kinotopic sitting out on the open internet with no protection whatsoever. This derelict MongoDB instance contains, among other things, the email addresses, usernames, and hashed passwords for, what appear to be, over 198,000 previous Kinotopic users. https://mackeeper.com/blog/post/197-the-danger-of-apps-that-die
  • 10.
  • 11. In Cloquet, email and SmartBoards were affected, along with phones, school bell and food service systems. The middle school has a one-to-one device program for students that was affected.
  • 12. From: Geraldo Spence <SpenceGeraldo89626@powernet.bg> To: <somone@example.com> Subject: FW: Order Status #001204 Date: Tue, 22 Mar 2016 07:01:47 +0300 Dear someone, We would like to thank you for your recent order. Order Status updated on: 21/03/2016 Your Customer ID: 001204 Your Order ID: 4081F78D45-M-2016 Invoice Number: 5978299 Delivery Note: We received your order and payment on 17/03/2016 Your order details are attached. Best regards, Geraldo Spence Chief Executive Officer - Food Packaging Company
  • 13. Libraries Live Below The Security Poverty Line(Wendy Nather) We simply can't afford to reach a great level of security Few or no IT People Few or no Security People Hard to keep up with technology and security Maintenance, planning, strategy are 2nd to OMG Depend on consultants, vendors, family, patrons, friends, volunteers, etc...
  • 14. This leaves us in a bad place  Defaults  Old and outdated  Workarounds  Not much control  No time to focus  "We'll fix it later"
  • 15. We ain't got  Budget  People  Time  Hardware  Software  Expertise
  • 16. So what can we do?  Budget?  Buy things that are more secure?  Question our vendors and partners on security?  Use our consortia?  Outsourcing?
  • 17. So what can we do?  Develop a good Threat Model  Set achievable security goals  Learning, Planning & Training  Develop IT- and security-focused community groups for the exchange of ideas, information and known security threats.  http://security4lib.org/
  • 18. The perfect is not the enemy of the good
  • 19. Make Your Library Defensible
  • 20. Able To Be Defended • Defensible does not mean secure • There are more things to defend than there are resources to defend with • Defensibility focuses on what, why, how, when and from whom
  • 21. Attackers are economically rational – they take scarce resources and apply them efficiently to achieve a desired outcome. As a defender, making the target less attractive or too expensive for that economically rational actor means they will go after something else. “It’s like the old saying: you don’t have to outrun the bear. You just have to outrun your friend.”
  • 22. Defensible Libraries • A change in mindset • Awareness of limitations & weaknesses • Awareness of threats • An admission of inconvenience • A lot of hard, detailed and underappreciated work.
  • 23. So Let’s Think About… • What do we have to secure? • Who wants it? • How could they acquire it? • How could they benefit from its use? –Can they sell it? –Can they hold it hostage? –Can they use & abuse it? • How damaging would the loss of data be? • How would this effect library operations? • How secure do we really need to be?
  • 24. But We’re Just A Library IT Security For Libraries
  • 25. We Are All Targets IT Security For Libraries
  • 26. Every access point to the internet is potential breach.
  • 27. 83% targets of opportunity 92% of attacks were easy 85% were found by a 3rd party IT Security For Libraries Verizon Data Breach Investigations Report
  • 28. 84% were found by a 3rd party Bad guys were in for 175 days before they were discovered. Trustwave Global Security Report IT Security For Libraries
  • 29. It’s Easy Being Bad IT Security For Libraries
  • 30. Security Is Hard IT Security For Libraries
  • 31. The attacker only needs to succeed once... IT Security For Libraries
  • 32. While we need to catch every single thing... IT Security For Libraries
  • 33. Staying safe takes more than just a firewall & AV/AM... IT Security For Libraries
  • 35. Your security software / hardware is a seat belt – not a force field. IT Security For Libraries
  • 36. When we protect our library, we protect our patrons • People come to us and want things to be easy and free and fun • They don’t think about security (Ever) • Information Literacy
  • 37. Complexity is the Enemy of Security • We have no shortage of access points • We deal with any number of vendors • Threats come from outside the libraries • Threats come from inside the libraries •Our libraries are full of people IT Security For Libraries
  • 38. Security will forever be a moving target
  • 39. So What Can We do? • Stop Ignoring it • Prepare – Threat Modeling • Prepare - Training IT Security For Libraries
  • 40. Ignoring it and thinking you're safe “If It Ain’t Broke...” • The vast majority of attacks… –Won’t be targeted –Will Be Easily Avoidable Do something.... Do Anything! IT Security For Libraries
  • 42. What Does A Library Need To Protect? IT Security For Libraries Your Employees Homes / Phones / etc...? OPAC / ILS Staff Computers Databases Printers / Copiers Website Servers Backups Printers Cell Phones Wi-Fi Routers Routers Cell Phones Ipads Laptops
  • 44. There are more things to defend than there are resources to defend with Not every asset in your organization is equally valuable
  • 45. An attacker will always pick the weakest point of entry… …but you can't know which point that is
  • 46. The Weakest Point In A Library?
  • 47. Public Access Computers IT Security For Libraries
  • 48. Public Access Computers Staying Safe On This Computer: –Make Sure You Log Out –Don’t Access Sensitive Sites –Beware of the "remember me" option –Don't send personal or financial information via email or insecure websites IT Security For Libraries
  • 49. Public Access Computers This Week’s Stay Safe Tips –Never Trust Email –Learn About Phishing –Attend Our Security Class –Always Check For A Secure Connection IT Security For Libraries
  • 50. Most exploits used “old” issues that have been patched
  • 51. There is no longer a window to patch when a vulnerability or exploit is discovered, in public or private.Brad Arkin, Adobe
  • 52. Locking Down Public Access Computers • Patching and Updating –OS and *ALL* Applications • Whitelisting • BIOS passwords • EMET - microsoft.com/emet • SteadyState / DeepFreeze / SmartShield • Check for USB additions • Don’t use Windows? • Don’t use IE? IT Security For Libraries
  • 53. 35 Strategies to Mitigate Targeted Cyber Intrusions
  • 54. Change your mindset – YOU are the attacker • What are you library’s most valuable assets? Where are these assets? How can they be accessed? • If you were the attacker how would you spread malware? And who are the most ‘vulnerable’ targets in the organization? • Do you have a view on the ‘normal’ behavior of your organization (people, behavior, locations and systems)?
  • 55. Level the playing field… Hack Your library!
  • 56.
  • 57.
  • 58. Library Information Security System Assessment Model (LISSAM) Awareness Creation Administrative Tools and Methods Procedures and Control Information Security Policy Technological Security Foundation
  • 59. CIS and CCS introduced the Cyber Hygiene Campaign Count: Know what’s connected to and running on your network Configure: Implement key security settings to help protect your systems Control: Limit and manage admins Patch: Regularly update all apps, software, and operating systems Repeat: Regularly revisit the Top Priorities https://www.cisecurity.org/about/CHToolkits.cfm
  • 60. Six Steps to Stronger Security   1. Keep an accurate hardware inventory  2. Keep an accurate software inventory  3. Actively manage configurations  4. Remediate vulnerabilities quickly  5. Automate endpoint defenses  6. Control administrative access https://www.sans.org/reading-room/whitepapers/awareness/steps-stronger-security-smbs-36037
  • 61. Don’t Forget • Check the internets for usernames/passwords for your library (e.g. pastebin) • HTTPS • Is your domain name going to expire? • Is you SSL Cert going to expire? • Typo Squatters? IT Security For Libraries
  • 63. IT Security For Libraries Training Building Cybersecurity Champions
  • 64. Training does not work It's not worth it because someone will still mess up People already know what to do This stuff us easy / obvious
  • 65. Training Train A Security Mindset Quickly forgotten without practice and reminders Regular low level of training and awareness IT Security For Libraries
  • 66. Good security awareness programs help all employees know where to get help Who they should call when there is trouble Where they can look for guidance & policies They should know that they will not be looked down on for making a mistake Someone’s job is to help them through whatever difficulty they are having
  • 67. We can't make everyone an expert We do NOT need to train the non-technical employees about what the deep level geek employees already know.
  • 68. Building Good Habits “Being secure” is something that is learned over time and eventually becomes a habit. Make the security mindset the default Consistent reinforcement of the importance of IT Security
  • 69. What about training UP? How do we communicate up? Is your boss/director/board/dean/whatever aware of IT Security? If they were, would that help make the library more secure? It may be up to you to help everyone at your library become Security Literate. So how do you do it? Start talking & training. Make sure everyone understands that we are all targets. If they ask “How secure are we?”… the answer will most likely scare them.
  • 70. NEVER without the ‘WHY?’
  • 71. Understanding awareness, training, and development What we want is policies that reinforce good security principles that will foster over time a new instinct in people, a new way of looking at things, a new way of acting in a more secure way. This will require a huge amount of patience and buy in from every at your library.
  • 72.
  • 73. IT Security For Libraries
  • 74. Carver, Blake Name 123456 ID Number 00123456 User ID carver Password 05/01/2012 End Date
  • 75. Training • Phishing • Social Engineering • Privacy • Passwords • Email Attachments • Virus Alerts • Social Networking • Updates IT Security For Libraries
  • 76. What we want is policies that reinforce good security principles that will foster over time a new instinct in people, a new way of looking at things, a new way of acting in a more secure way.
  • 77. The goal is to make doing things the right way become the default in your library
  • 78. Training…. Patrons? • Your patrons don't care much for security • Their habits are inviting malware • Look for ways to make things safer in ways that don't interfere with people's everyday tasks as much as possible. • Principle of Least Privilege IT Security For Libraries
  • 80. Library Security Mantra • Security • Privacy • Confidentiality • Integrity • Availability • Access (based on Net Sec 101 Ayre and Lawthers 2001) IT Security For Libraries
  • 81. Remember: This about your library’s security and protecting your library’s brand and reputation and your patrons. The only way this can happen is if security and risk management become regular parts of library conversation.
  • 82. Preparation - Practical Resources • SANS 20 Critical Security Controls – http://sans.org • Securing Library Technology: A How-To-Do-It Manual – Earp & Wright • Strategies to Mitigate Targeted Cyber Intrusions – Australian Signals Directorate • Library Information Security System Assessment Model (LISSAM) – Malaysian Journal of Library & Information Science, Vol. 16, no. 2  Virtual Privacy Lab from the San José Public Library https://www.sjpl.org/privacy  Library Freedom Project https://libraryfreedomproject.org/ IT Security For Libraries
  • 83. Next Week Week Four: The Web – Sites & Servers How & why websites get hacked Web Servers Servers in general Some Hacker Tools Review
  • 84. IT Security For Librarians: Outrunning The Bear @ Your Library Blake Carver LYRASIS Systems Administrator

Editor's Notes

  1. Email from Walmart, a footprint I left behind and forgot about.
  2. Digital footprints, we leave them behind in the form of old logins, and also in the trackers and cookies that follow us.
  3. This was a phisihing email that WORKED recently. Training would hopefully show that this is clearly a fake.
  4. http://idoneous-security.blogspot.com/2011/12/security-poverty-line-and-junk-food.html
  5. We’re short staffed and out gunned so it’s important we know that there are things we can do that WILL help.
  6. We can do things that WILL help keep us more secure.
  7. There's something called "Threat Modeling" in IT Security. I like to think of it as just taking a step back and looking at the big picture.   It doesn't necessarily take an expert, but it takes time, and patience and some training.   In libraries, it helps us align our limited resources, work, money, defenses with the threats that pose the greatest risk. That is, those threats that are the most likely to occur and those that could be the hardest to recover from.   Our risks need ranking, and working through some Threat Modeling lets us do that. Sure, we need to lower all risks, but all risks aren't equal. We want to know what our biggest threats are. Those that are likely to be attacked and those that are easy to be exploited. What's most valuable and hardest to recover from. We need to make sure we know what's around and how it can be exploited.    Where do we focus? Where do we even start. It's probably not easy, and looks overwhelming. We need to find ALL the things to defend and decide how to best defend them. Then, take a look at what we  have and rank them. All those things on your list are not equal. Start with the highest risks. The things most easily exploited. The most valuable things.    We have limited time/people/money we need to have priorities because there is SO much to worry about, so we need to know our threats RANKED and how we're going to defend them. We want to make sure we're able to focus what we have in the right place, and that's what this is about. Going from overwhelmed, to a starting point, a place to focus. All the many threats we face are not equally dangerous, and our defenses are not all equal. A good starting point is knowing what's been hit before. What caused that breach/exploit/hack (Patches, social engineering, passwords, misconfiguration).   How do we rank all these things?   What do we have to protect? Everything with an IP Everything isn't equal How likely is each thing to be attached? It's been attacked before? Common Device? Attack surface? Easy to run common tools to test for exploits? how easy is this thing to find/exploit? Does it contain PII or CC#s or anything that can be sold?   Has it ALREADY been exploited in this OR another library? Can people touch this thing? Work up scenarios. How hard is this thing to defend? Replace with another thing? How much work is involved? Work up scenarios. Who is going to attempt to attack it?  Location? Remote / Local? Capabilities? Talented / Beginner? Bot / Automated / Human?   Work up scenarios. What happens when it is compromised?  What do you lose? How hard to recover? How much damage? How many people are impacted? How important is this thing? Work up scenarios. Let's not over look people! Training / Planning Can they rank threats?  Do they know the top 5 threats? ANY threats?   So now what? - Research & Learn - Collect & count - Rank - Plan - Put defenses in place - Train - Review - Repeat      
  8. The bad guys are always one step ahead. They’re always looking for new ways in.
  9. http://www.zdnet.com/article/hand-on-with-kali-linux-rolling/ A nice write up of Kali
  10. http://arxiv.org/ftp/arxiv/papers/1301/1301.5386.pdf Also worth doing some Google Scholar (or real DB) searches on this, lots of good cites out there.
  11. What’s your library policy on Thumb Drives?? They ar likely infected.
  12. Or at least building people who are careful and understand the risks.
  13. People will complain :-D
  14. Make sure people know WHY this matters. How common it is. What will happen.
  15. If we look at something we know, something we’re an expert about, then it looks different. I know bikes, I know all about that bike just by looking at it. This is how we want everyone to look at a bad site, or a phising email.
  16. So what should we traing? All the things we outline here.