SlideShare a Scribd company logo
OVERVIEW
•   News stories every day – exposure of private company
    information
•   Not advanced technology or genius hackers but…
•   “Human Beings, Being Human”




                                                           2
RISKS STEMMING FROM…

       A. Careless Use
           Of E-Mail
     B. Other Aspects of
         Human Error
A. CARELESS USE OF EMAIL
1. Employee Vulnerablility to Spear Phishing Attacks
Fraudulent email intent on gaining data/information - much more focused
than traditional Phishing


Example: 2008 District Court Subpoena Scam


Solutions:
•   Education
•   Messaging Intelligence
•   Phishing Filter
•   Avoiding Embedded Links
•   Increased Sensitivity of Spam Filters




                                                                          4
A. CARELESS USE OF EMAIL
2. Use of Company Account for Personal Use (and Vice-Versa)
Lack of distinction between the company account and personal
account can lead to embarrassing or disastrous consequences

Example: Anonymous - Sarah Palin, 2008

Solutions:
• Policy of separate accounts for personal and
  work use
• Ban on internal “chain mail” on company
  accounts
• If absolutely necessary to use personal
  account for work purposes, encryption must
  be used




                                                               5
A. CARELESS USE OF EMAIL
3. Avoidable Loss of Old E-mails
It‟s often assumed that once an e-mail is stored in an account that it is
safe forever.
However e-mail accounts can crash leading to loss of all data which
hasn‟t been backed up.
Example: G-Mail Mishap, 2006

Solutions:
• Manual e-mail backup on cd/storage device with
  strict back up schedule.
• Purchase of automated backup software to take
  care of backups automatically




                                                                            6
A. CARELESS USE OF EMAIL
4. Mis-use of the “Reply All” Button
One of the most common mistakes made by individuals regarding e-
mail error which can result in sensitive or embarrassing information
being sent to unintended recipients.

Example: LA Police Dept. Controversy, 2012

Solutions:
Many e-mail providers offer a number of preventative
means,
e.g. Outlook:
• Option to remove “Reply All” button
• Option of 30 second lag on all e-mails
• Option of an alert warning the user that “Reply All”
   has been selected




                                                                       7
A. CARELESS USE OF EMAIL
5. Over-Dependence on E-mail (especially for discussion of
sensitive info)
E-mail is often seen as an “easy way out” communication tool providing a
quick fix. The short term relief, however, does not outweigh the potential
problems including clogging of internal email systems.
Also problematic is the use of e-mail for sensitive corrospondence more
suited to aNavio Computer‟s to face meeting. System,
Example: phone call or face Clogged Email
2011

Solutions:
•   Ban on unnecessary internal e-mails
•   Alternative cloud-based collaboration tools
•   FtF meetings and phone calls to discuss sensitive
    info
•   Encryption if sensitive info MUST be sent via e-
    mail


                                                                             8
B. OTHER ASPECTS OF HUMAN ERROR
1. Loss Of Laptop/Other Device (Containing Unencrypted Data)
Theft/Loss of a computer or other data storage medium made up 35%
of all data breaches in 2012. Such theft/loss can cost a company
hugely in monetary terms as well as image, competitive advantage and
consumer trust.
Example: Dept. of Veteran Affairs Database Theft, 2006


Solutions:
•   Education of employees around device and password
    security
•   Immediate notification of loss or theft
•   Encryption of all sensitive company data/info
•   Device Management Consoles – monitor, set , enforce
    polices & remotely wipe devices




                                                                       9
B. OTHER ASPECTS OF HUMAN ERROR
2. Failure To Erase Data When No Longer Required/Permitted
It is generally good practice to destroy old info/data that is no longer
required, to free up disk space.
More importantly, many sectors are governed by laws prohibiting retention
of certain info after a specific time period.
Example: Affinity Health Care Digital Copier Mishap,
2010
Solutions:
• Policies regarding deletion of old emails, messages,
   call logs & files
• Strict reviews of data on all devices on regular
   continual basis
• Education of staff around safe destruction of old
   data
• Device Management Consoles (again) for remote
   wiping of lost/stolen devices




                                                                            10
B. OTHER ASPECTS OF HUMAN ERROR
3. Sharing of User Account Details and Passwords
Password sharing - convenient & cost saving in relation to certain
systems.
Can widen potential for unauthorised access, especially when people
leave the company.

Example: Lincoln National knowing whoAffiliate into what and when
It also prohibits mgmt from Securities   logged
(audit trail).
Access, 2010
Solutions:
• Assign usernames and PW‟s specific to
   individual users & grant/revoke permissions
   depending on what these users require
• Policies demanding „strong‟ PW‟s & mandatory
   routine for changing PW‟s
• PW‟s should be changed when duties are
   reassigned or employees leave




                                                                      11
B. OTHER ASPECTS OF HUMAN ERROR
4. Data Theft By Employees/Former Employees
Employees gain access to numerous systems through their employment
including email accounts, HR payroll systems, etc.
Often Companies do not prioritise the practice of updating user access &
privileges when employees leave the company, opening the door to data theft by
disgruntled former employees.
Example: Fidelity National Information Services Data
Theft, 2007
Solutions:
•   Policy of updating access and privileges when
    employees leave the company
•   Purchase of systems      to   simplify   the   user
    provisioning process




                                                                             12
B. OTHER ASPECTS OF HUMAN ERROR
5. Use of company laptops outside of work / personal laptops in the
workplace
Ideally should never use the same device for both – if company laptop MUST
be used, they should never be left unattended or connected to unsecure
Example: Saudi Aramco Virus Infection, 2012
networks.

Solutions:
• Separate laptops for home and work except when
  absolutely necessary
• Password protection & no sharing
• Deletion of sensitive information when no longer
  needed
• Restrictions of the type of data allowed outside the
  workplace
• Encryption of all sensitive information
• Restrictions on connection to unprotected
  networks




                                                                             13
B. OTHER ASPECTS OF HUMAN ERROR
6. General Simple Human Carelessness
By our nature, humans will suffer lapses in concentration or oversights.
In business, carelessness like failure to double check standards or erroneous
publication of data may have disastrous consequences.

Example: AOL Release of Search Data, 2006

Solutions:
• Education      of    employees      about   their
  responsibilities regarding data security and the
  use of technology to avoid data breaches
• Preparation & implementation of data breach
  policies and response plans




                                                                                14
CONCLUSION
• Data breaches not necessarily associated with new technologies
  and genius hackers
• Reality: Many can be associated with human error
• Ponemon: 78% - “human negligence or maliciousness”
• Many breaches can easily be avoided
• Precautions can be aided by technology but
  old familiar security fundamentals are key:
  • Training & Education
  • Policies, Revisions & Analysis
  • Data Encryption
  • Common Sense & Sound Judgement




                                                                   15

More Related Content

What's hot

IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
Paige Rasid
 
Security awareness
Security awarenessSecurity awareness
Security awareness
Josh Chandler
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
David Menken
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterAtlantic Training, LLC.
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
Dooremoore
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
Thanuja Seneviratne
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
Cyber Security Infotech
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
Denis kisina
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813
Kinetic Potential
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
hubbargf
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Enterprise Management Associates
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
zdooly
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
Marc Vael
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
Bill Gardner
 

What's hot (20)

IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 

Similar to MS810 Information Security and Ethics Assignment

7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
Daniel Rivas
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
SmartCompliance
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD Worldmkeane
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
gppcpa
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
Rocket Matter, LLC
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
Meg Weber
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
gemaherd
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
MTG IT Professionals
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
Praveenkumar Hosangadi
 
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big data
IBM Analytics
 
Seclud it polesc_sjuly7
Seclud it polesc_sjuly7Seclud it polesc_sjuly7
Seclud it polesc_sjuly7
Sergio Loureiro
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device
CooperTechnologiesInc
 
Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011
Atlantic Security Conference
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
Dark data by Worapol Alex Pongpech
Dark data by Worapol Alex PongpechDark data by Worapol Alex Pongpech
Dark data by Worapol Alex Pongpech
BAINIDA
 
How Much Do You Trust Email?
How Much Do You Trust Email?How Much Do You Trust Email?
How Much Do You Trust Email?
Echoworx
 
Physician Office Presentation
Physician Office PresentationPhysician Office Presentation
Physician Office Presentation
franbodh
 

Similar to MS810 Information Security and Ethics Assignment (20)

7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
 
Dark data
Dark dataDark data
Dark data
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big data
 
Seclud it polesc_sjuly7
Seclud it polesc_sjuly7Seclud it polesc_sjuly7
Seclud it polesc_sjuly7
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device
 
Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Dark data by Worapol Alex Pongpech
Dark data by Worapol Alex PongpechDark data by Worapol Alex Pongpech
Dark data by Worapol Alex Pongpech
 
How Much Do You Trust Email?
How Much Do You Trust Email?How Much Do You Trust Email?
How Much Do You Trust Email?
 
Physician Office Presentation
Physician Office PresentationPhysician Office Presentation
Physician Office Presentation
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 

MS810 Information Security and Ethics Assignment

  • 1.
  • 2. OVERVIEW • News stories every day – exposure of private company information • Not advanced technology or genius hackers but… • “Human Beings, Being Human” 2
  • 3. RISKS STEMMING FROM… A. Careless Use Of E-Mail B. Other Aspects of Human Error
  • 4. A. CARELESS USE OF EMAIL 1. Employee Vulnerablility to Spear Phishing Attacks Fraudulent email intent on gaining data/information - much more focused than traditional Phishing Example: 2008 District Court Subpoena Scam Solutions: • Education • Messaging Intelligence • Phishing Filter • Avoiding Embedded Links • Increased Sensitivity of Spam Filters 4
  • 5. A. CARELESS USE OF EMAIL 2. Use of Company Account for Personal Use (and Vice-Versa) Lack of distinction between the company account and personal account can lead to embarrassing or disastrous consequences Example: Anonymous - Sarah Palin, 2008 Solutions: • Policy of separate accounts for personal and work use • Ban on internal “chain mail” on company accounts • If absolutely necessary to use personal account for work purposes, encryption must be used 5
  • 6. A. CARELESS USE OF EMAIL 3. Avoidable Loss of Old E-mails It‟s often assumed that once an e-mail is stored in an account that it is safe forever. However e-mail accounts can crash leading to loss of all data which hasn‟t been backed up. Example: G-Mail Mishap, 2006 Solutions: • Manual e-mail backup on cd/storage device with strict back up schedule. • Purchase of automated backup software to take care of backups automatically 6
  • 7. A. CARELESS USE OF EMAIL 4. Mis-use of the “Reply All” Button One of the most common mistakes made by individuals regarding e- mail error which can result in sensitive or embarrassing information being sent to unintended recipients. Example: LA Police Dept. Controversy, 2012 Solutions: Many e-mail providers offer a number of preventative means, e.g. Outlook: • Option to remove “Reply All” button • Option of 30 second lag on all e-mails • Option of an alert warning the user that “Reply All” has been selected 7
  • 8. A. CARELESS USE OF EMAIL 5. Over-Dependence on E-mail (especially for discussion of sensitive info) E-mail is often seen as an “easy way out” communication tool providing a quick fix. The short term relief, however, does not outweigh the potential problems including clogging of internal email systems. Also problematic is the use of e-mail for sensitive corrospondence more suited to aNavio Computer‟s to face meeting. System, Example: phone call or face Clogged Email 2011 Solutions: • Ban on unnecessary internal e-mails • Alternative cloud-based collaboration tools • FtF meetings and phone calls to discuss sensitive info • Encryption if sensitive info MUST be sent via e- mail 8
  • 9. B. OTHER ASPECTS OF HUMAN ERROR 1. Loss Of Laptop/Other Device (Containing Unencrypted Data) Theft/Loss of a computer or other data storage medium made up 35% of all data breaches in 2012. Such theft/loss can cost a company hugely in monetary terms as well as image, competitive advantage and consumer trust. Example: Dept. of Veteran Affairs Database Theft, 2006 Solutions: • Education of employees around device and password security • Immediate notification of loss or theft • Encryption of all sensitive company data/info • Device Management Consoles – monitor, set , enforce polices & remotely wipe devices 9
  • 10. B. OTHER ASPECTS OF HUMAN ERROR 2. Failure To Erase Data When No Longer Required/Permitted It is generally good practice to destroy old info/data that is no longer required, to free up disk space. More importantly, many sectors are governed by laws prohibiting retention of certain info after a specific time period. Example: Affinity Health Care Digital Copier Mishap, 2010 Solutions: • Policies regarding deletion of old emails, messages, call logs & files • Strict reviews of data on all devices on regular continual basis • Education of staff around safe destruction of old data • Device Management Consoles (again) for remote wiping of lost/stolen devices 10
  • 11. B. OTHER ASPECTS OF HUMAN ERROR 3. Sharing of User Account Details and Passwords Password sharing - convenient & cost saving in relation to certain systems. Can widen potential for unauthorised access, especially when people leave the company. Example: Lincoln National knowing whoAffiliate into what and when It also prohibits mgmt from Securities logged (audit trail). Access, 2010 Solutions: • Assign usernames and PW‟s specific to individual users & grant/revoke permissions depending on what these users require • Policies demanding „strong‟ PW‟s & mandatory routine for changing PW‟s • PW‟s should be changed when duties are reassigned or employees leave 11
  • 12. B. OTHER ASPECTS OF HUMAN ERROR 4. Data Theft By Employees/Former Employees Employees gain access to numerous systems through their employment including email accounts, HR payroll systems, etc. Often Companies do not prioritise the practice of updating user access & privileges when employees leave the company, opening the door to data theft by disgruntled former employees. Example: Fidelity National Information Services Data Theft, 2007 Solutions: • Policy of updating access and privileges when employees leave the company • Purchase of systems to simplify the user provisioning process 12
  • 13. B. OTHER ASPECTS OF HUMAN ERROR 5. Use of company laptops outside of work / personal laptops in the workplace Ideally should never use the same device for both – if company laptop MUST be used, they should never be left unattended or connected to unsecure Example: Saudi Aramco Virus Infection, 2012 networks. Solutions: • Separate laptops for home and work except when absolutely necessary • Password protection & no sharing • Deletion of sensitive information when no longer needed • Restrictions of the type of data allowed outside the workplace • Encryption of all sensitive information • Restrictions on connection to unprotected networks 13
  • 14. B. OTHER ASPECTS OF HUMAN ERROR 6. General Simple Human Carelessness By our nature, humans will suffer lapses in concentration or oversights. In business, carelessness like failure to double check standards or erroneous publication of data may have disastrous consequences. Example: AOL Release of Search Data, 2006 Solutions: • Education of employees about their responsibilities regarding data security and the use of technology to avoid data breaches • Preparation & implementation of data breach policies and response plans 14
  • 15. CONCLUSION • Data breaches not necessarily associated with new technologies and genius hackers • Reality: Many can be associated with human error • Ponemon: 78% - “human negligence or maliciousness” • Many breaches can easily be avoided • Precautions can be aided by technology but old familiar security fundamentals are key: • Training & Education • Policies, Revisions & Analysis • Data Encryption • Common Sense & Sound Judgement 15