SlideShare a Scribd company logo
Information Security & Internet Snooping




Jerry Justice
What is security?

 Wikipedia: Security is the degree of protection against danger,
  damage, loss, and crime.
 Security is not an absolute or any single mechanism.
 “Is that secure?” From what? Fire, theft, flood, loss..?
 My goal:
        Knowledge to make an informed choice and to have you
        think differently about security.


Ex: You lock your house + you add an alarm system = reducing your
risk.
What is the impact related to
               technology?
   Expanding and distributed nature of Internet
   Explosion of mobile devices and apps
   24/7/365 accessibility from anywhere
   Information more digital (i.e. Healthcare)
   Identity Theft and Personal Information (PI)
   Huge storage capacity, small devices

Ex: Think about what a library used to be and the accessibility to
books. Simple access now with less physical constraints (i.e. -
Kindle).
Where is my information?


 What exists already (public records) + what you give
  (credit apps, driver license, mortgages, taxes, bank
  accounts, etc…) + ……….
Where else do they get info about me?
 Websites – Tracking, history, postings, search analytics, computer
  cookies…
 Device use - smartphones, iPads, iPods, Xbox, home and work
  computers, paperwork, dumpsters, etc…
 Apps – “Is it ok if I use all your FB information so you can play this
  game?”
 Social Engineering (leveraging human behavioral responses) –
  phone calls, co-workers, relatives..
 “Free” services – Google, Facebook, LinkedIn, etc...
 Identity Theft (direct or indirect)
 Purchase (legit and not legit)
 Email ‐SPAM and Phishing responses
 Legit 3rd parties who sell, lose or expose information (i.e. –
  Heartland, TJX)
 Illegally – sniffing, phishing, key loggers, hacking, malware…

     Ex: So which is safer, mailing a check or paying online?
What do they do with it?
   Provide service to you
   Store it for later
   Sell it to third parties (or use “internally”)
   Use it for target marketing, trending analysis
   Identity Theft
   Expose it to others (improperly secured or poor processes)
   Aggregators (i.e. ‐spokeo.com) – combine and sell
   Increasingly more “360” views, connecting once disparate
    information sources (“login with your FB account”). Build a profile
    on who you are, based on a variety of content: browsing habits,
    searches, shopping, click-through, etc…

Ex: Insurance companies using credit reporting for rate
“alignment”, Google Ads, etc…
Information Security Tools & Tactics
 Awareness
   – Example 1: Unknown person is walking around your office,
     Ask “Who are you?”
   – Example 2: Unsolicited phone caller asks for personal
     information, “Can I get a number to call you back at?”
   – Example 3: Email that asks you to alert everyone you know
     about a scam they just discovered. DELETE. This may actually
     be a scam.

 Common Sense – If it appears suspect, probably is
 Be stingy with your information (especially PI)
 Limit your exposure – protect your home wireless, do not share
  account info, avoid simple passwords, etc…
 Know where you are going online – “mouse over” email links
 Computer acting “weird” – ex: incorrect start page
Info Security Tools & Tactics (cont.)
 Clean up after yourself ‐ Use appropriate malware, virus and
  Trojan protection tools and cleaners (CCleaner, Ad-Aware,
  Symantec). Note: ISPs, Google have own user history and have
  provided in legal matters (similar to phone company subpoenas).
 Avoid being the cause ‐“pass this on” email chains, don’t forward
  to IT (you could be forwarding a trojan/virus)
 Use a non‐primary email for random and one‐off needs
 Use secure channels for online purchases and payments (HTTPS)
 Monitor your personal transactions ‐bank, CC, mortgages, etc...
 Secure your smartphone and mobile devices!

Ex: CCleaner. Bank of America purchase alerts on smartphone.
Securing your business (broad)
   Prevent data loss ‐ DLP (data loss prevention) tools, network security
    controls and protocols, staff policies, monitoring, encrypt all drives, etc...
   Secure your data – know where it is, who touches it and the associated
    value/risk of each piece. Make a data map/plan then look at surrounding
    processes.
   Limit your exposure – shred work papers, remove printed items from
    copiers/printers at night, lock cabinets that contain papers with PI.
   Review compliance requirements – HIPPA, SEC, PCI DSS, etc… (not
    directly correlated to security)
   Have a PI policy and train staff on it. Proactive position.
   Establish a mobility policy for staff (smartphones, BYOT trends)
   Understand data security “in the cloud” is a paradigm shift (not
    necessarily bad but different control points)
   Use secure communications (VPNs, HTTPS, etc…)
   Protect data “at‐rest” (thumb drives, backups) AND in transit (email with
    PI), encrypt PC drives. Question: Where do you think most security
    breaches occur? (Opportunity)
   Third party security review
   Use secure PDFs for document delivery (email)
   Use a layered security approach
   Reduce opportunity theft – keep things in control or out of sight
Summary

 Security Take-away
   – Common sense, awareness, limiting your exposure and
     asking questions will take you a long way in protecting
     your information/assets and reducing your security
     risks.
   – Ask yourself “if this was my information, how would I
     like it handled?”
   – Effective security is an ongoing process.

 References
   http://www.privacyrights.org/
   https://www.pcisecuritystandards.org/
   http://www.piriform.com/ccleaner
   http://www.symantec.com/
   http://www.lavasoft.com/
   http://www.sans.org/security‐resources/
Connecting…

 jjustice@ssandg.com
 http://www.linkedin.com/in/jerryjustice
 Twitter - @jerrymjustice

More Related Content

What's hot

Social engineering
Social engineeringSocial engineering
Social engineering
Vishal Kumar
 
Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1
Atika Zaimi
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
IWMW
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
crw526
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
Nawanan Theera-Ampornpunt
 
Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
Emerson Bryan
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
Pankaj Dubey
 
Social Engineering
Social Engineering Social Engineering
Social Engineering
Mirna Hanna
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
JamRivera1
 
Social engineering
Social engineeringSocial engineering
Social engineering
ankushmohanty
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Cyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer ApplicationCyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer Application
TENZING LHADON
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
Laguna State Polytechnic University
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
Don Edwards
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Eric Vanderburg
 
Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test CampaignInfographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
Pratum
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
Peter Henley
 
Most Important Issues
Most Important IssuesMost Important Issues
Most Important Issuesashleycolleen
 
Lift Asia09 Morin
Lift Asia09 MorinLift Asia09 Morin
Lift Asia09 Morin
University of Geneva
 

What's hot (20)

Social engineering
Social engineeringSocial engineering
Social engineering
 
Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
 
Social engineering
Social engineering Social engineering
Social engineering
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Social Engineering
Social Engineering Social Engineering
Social Engineering
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Cyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer ApplicationCyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer Application
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
 
Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test CampaignInfographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
Most Important Issues
Most Important IssuesMost Important Issues
Most Important Issues
 
Lift Asia09 Morin
Lift Asia09 MorinLift Asia09 Morin
Lift Asia09 Morin
 

Similar to IMA Meeting 03222012

cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
Tapan Khilar
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
Michele Chubirka
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
Dinesh582831
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for Nonprofits
NPowerCR
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
Kevin Wharram
 
Mobile security
Mobile securityMobile security
Mobile security
Tapan Khilar
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
Aswani34
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
Tapan Khilar
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverPJStarr
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take next
Brian Pichman
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
Abdul Manaf Vellakodath
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats07Deeps
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
Muhammad Umar Farooq
 
Chap 8
Chap 8Chap 8
Chap 8
GTU
 
Book 3 chap-8
Book 3 chap-8Book 3 chap-8
Book 3 chap-8
GTU
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centurygracestearns
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
gracestearns
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)Patrick Garrett
 

Similar to IMA Meeting 03222012 (20)

cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for Nonprofits
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
Mobile security
Mobile securityMobile security
Mobile security
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take next
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Chap 8
Chap 8Chap 8
Chap 8
 
Book 3 chap-8
Book 3 chap-8Book 3 chap-8
Book 3 chap-8
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
The downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_centuryThe downfall to_computers_in_the_21st_century
The downfall to_computers_in_the_21st_century
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

IMA Meeting 03222012

  • 1. Information Security & Internet Snooping Jerry Justice
  • 2. What is security?  Wikipedia: Security is the degree of protection against danger, damage, loss, and crime.  Security is not an absolute or any single mechanism.  “Is that secure?” From what? Fire, theft, flood, loss..?  My goal: Knowledge to make an informed choice and to have you think differently about security. Ex: You lock your house + you add an alarm system = reducing your risk.
  • 3. What is the impact related to technology?  Expanding and distributed nature of Internet  Explosion of mobile devices and apps  24/7/365 accessibility from anywhere  Information more digital (i.e. Healthcare)  Identity Theft and Personal Information (PI)  Huge storage capacity, small devices Ex: Think about what a library used to be and the accessibility to books. Simple access now with less physical constraints (i.e. - Kindle).
  • 4. Where is my information?  What exists already (public records) + what you give (credit apps, driver license, mortgages, taxes, bank accounts, etc…) + ……….
  • 5. Where else do they get info about me?  Websites – Tracking, history, postings, search analytics, computer cookies…  Device use - smartphones, iPads, iPods, Xbox, home and work computers, paperwork, dumpsters, etc…  Apps – “Is it ok if I use all your FB information so you can play this game?”  Social Engineering (leveraging human behavioral responses) – phone calls, co-workers, relatives..  “Free” services – Google, Facebook, LinkedIn, etc...  Identity Theft (direct or indirect)  Purchase (legit and not legit)  Email ‐SPAM and Phishing responses  Legit 3rd parties who sell, lose or expose information (i.e. – Heartland, TJX)  Illegally – sniffing, phishing, key loggers, hacking, malware… Ex: So which is safer, mailing a check or paying online?
  • 6.
  • 7.
  • 8. What do they do with it?  Provide service to you  Store it for later  Sell it to third parties (or use “internally”)  Use it for target marketing, trending analysis  Identity Theft  Expose it to others (improperly secured or poor processes)  Aggregators (i.e. ‐spokeo.com) – combine and sell  Increasingly more “360” views, connecting once disparate information sources (“login with your FB account”). Build a profile on who you are, based on a variety of content: browsing habits, searches, shopping, click-through, etc… Ex: Insurance companies using credit reporting for rate “alignment”, Google Ads, etc…
  • 9. Information Security Tools & Tactics  Awareness – Example 1: Unknown person is walking around your office, Ask “Who are you?” – Example 2: Unsolicited phone caller asks for personal information, “Can I get a number to call you back at?” – Example 3: Email that asks you to alert everyone you know about a scam they just discovered. DELETE. This may actually be a scam.  Common Sense – If it appears suspect, probably is  Be stingy with your information (especially PI)  Limit your exposure – protect your home wireless, do not share account info, avoid simple passwords, etc…  Know where you are going online – “mouse over” email links  Computer acting “weird” – ex: incorrect start page
  • 10. Info Security Tools & Tactics (cont.)  Clean up after yourself ‐ Use appropriate malware, virus and Trojan protection tools and cleaners (CCleaner, Ad-Aware, Symantec). Note: ISPs, Google have own user history and have provided in legal matters (similar to phone company subpoenas).  Avoid being the cause ‐“pass this on” email chains, don’t forward to IT (you could be forwarding a trojan/virus)  Use a non‐primary email for random and one‐off needs  Use secure channels for online purchases and payments (HTTPS)  Monitor your personal transactions ‐bank, CC, mortgages, etc...  Secure your smartphone and mobile devices! Ex: CCleaner. Bank of America purchase alerts on smartphone.
  • 11.
  • 12.
  • 13. Securing your business (broad)  Prevent data loss ‐ DLP (data loss prevention) tools, network security controls and protocols, staff policies, monitoring, encrypt all drives, etc...  Secure your data – know where it is, who touches it and the associated value/risk of each piece. Make a data map/plan then look at surrounding processes.  Limit your exposure – shred work papers, remove printed items from copiers/printers at night, lock cabinets that contain papers with PI.  Review compliance requirements – HIPPA, SEC, PCI DSS, etc… (not directly correlated to security)  Have a PI policy and train staff on it. Proactive position.  Establish a mobility policy for staff (smartphones, BYOT trends)  Understand data security “in the cloud” is a paradigm shift (not necessarily bad but different control points)  Use secure communications (VPNs, HTTPS, etc…)  Protect data “at‐rest” (thumb drives, backups) AND in transit (email with PI), encrypt PC drives. Question: Where do you think most security breaches occur? (Opportunity)  Third party security review  Use secure PDFs for document delivery (email)  Use a layered security approach  Reduce opportunity theft – keep things in control or out of sight
  • 14. Summary  Security Take-away – Common sense, awareness, limiting your exposure and asking questions will take you a long way in protecting your information/assets and reducing your security risks. – Ask yourself “if this was my information, how would I like it handled?” – Effective security is an ongoing process.  References http://www.privacyrights.org/ https://www.pcisecuritystandards.org/ http://www.piriform.com/ccleaner http://www.symantec.com/ http://www.lavasoft.com/ http://www.sans.org/security‐resources/