SlideShare a Scribd company logo
1 of 28
Session # 48
Security on Your Campus: How
to Protect Privacy Information
Robert Ingwalson
2
3
We Implement Security
Based on Cost vs. Risk
4
Protecting personal information is
Everybody’s Job!
Personally Identifiable Information (PII):
Information about an individual including but not limited to,
Education, Employment, Financial Transactions, Medical History,
and Criminal Background information which can be used to
distinguish or trace and individual’s identity, such as their name,
social security number, date and place of birth, mother’s maiden
name, biometric records, etc, including any other personal
information that can be linked to an individual.
Don’t become a headline!
5
• In the Office
• On the System
• Data Transfers
• Remote Users
• Assess Your Security
Protecting Personally Identifiable Information
6
• In the Office
– Document handling and
storage
– Phones and Faxes
– Land Shipments
– Physical Office Security
– Personnel Security
– Policy and Training
Protecting Personally Identifiable Information
7
• In the Office
– Document Handling
and Storage
• Limit printing of PII
• Clean Desk
• Sensitivity Identification
• Shredding
• Monitoring
• Secure storage
Protecting Personally Identifiable Information
8
• In the Office
– Phones
• Limit PII conversations
• Don’t leave PII voicemails
• Prevent listeners
– Faxes
• Limit faxing of PII
• Confirm fax number
• Two way communication before
sending and upon receipt
• Monitor the Fax
• Safeguard document
Protecting Personally Identifiable Information
9
• In the Office
– Land Shipments
• Limit shipments of PII
• Encrypt sent media
• Double package
• Send by reputable shipping
agent
• Include a manifest inside
the package.
• Communicate shipment
with receiver
Protecting Personally Identifiable Information
10
• In the Office
– Physical Office Security
• Staffed reception counter
• After hours?
– Card/key access
– Change combinations & keys
– Logs
• Added Security
– Cameras
– Entry and exit checks
Protecting Personally Identifiable Information
11
• In the Office
– Personnel Security
• Know who should be there
– Challenge others
• Personnel background checks
– Criminal
– Employment history
– Credit
• Train shortly after
employment begins and then
refresh periodically
Protecting Personally Identifiable Information
12
• In the Office
– Personnel Security
• Know who should be there
– Challenge others
• Personnel background checks
– Criminal
– Employment history
– Credit
• Train shortly after
employment begins and then
refresh periodically
Protecting Personally Identifiable Information
13
• In the Office
– Policy and Training
• Policy provides basis for
controls and a roadmap
to follow
• Based on requirements
and good practice
• Individuals need
training on policy -
Include in Personnel
training
Protecting Personally Identifiable Information
14
• On the System (Defense in
Depth)
– Policy
– Personnel Security
– Physical Security
– Network Security
– Host based Security
– Application Security
Protecting Personally Identifiable Information
www.macroview.com/solutions/infosecurity/
15
• On the System
– Policy
• Technical, Managerial, Operational control
requirements
• Tells what needs to be done, not how
–Procedures provide the road maps on how
to comply with policy
• Covers all other aspects of Security
–Personnel
–Physical
–Network Security
–Host based Security
–Application Security
Protecting Personally Identifiable Information
16
• On the System
– Personnel Security
• The same as in the office:
– Know who should be there
» Challenge others
– Personnel background checks
» Criminal
» Employment History
» Credit
– Train shortly after employment begins and then
refresh periodically
Protecting Personally Identifiable Information
17
• On the System
– Physical Security
• Includes environmental Security
• Access control
– Badges / Keycards
– Access lists and entry logs
– Escorted access
– Higher level of control for some areas
– Metal detectors and scanners
• Backup power
• Cameras
Protecting Personally Identifiable Information
18
• On the System
– Network Security
• Firewalls
• NIDs (Network Intrusion Detection)
• Auditing
• IPS (Intrusion Prevention System)
• Honeypots
Protecting Personally Identifiable Information
19
• On the System
– Host based Security
• Configuration compliance
• Internal Firewalls
• Access control
• HIDs (Host Based Intrusion Detection)
• Anti-Virus and Anti-Spyware
• Patch management
• Logging
Protecting Personally Identifiable Information
20
• On the System
– Application Security
• Develop Application Security Plan
• Test for known vulnerabilities prior to
implementation
• Authorize access
• Rules of behavior
• Secure Web interface
• Limit PII entries and displays
Protecting Personally Identifiable Information
21
• Data Transfers
– Electronic File Transfers
– Tapes and CDs
– Thumb Drives
– Email
– *Laptops
Protecting Personally Identifiable Information
22
• Data Transfers
– Encryption
• Encrypt with strong Algorithms
– AES, Advance Encryption Standard or Triple DES,
Data Encryption Standard
– Use large key length, 256 or greater
– If passwords are used: make them strong
» Complex with a mixture of numbers, upper and
lower alpha characters, and special characters
» 8-12 characters in length
» No dictionary words or names
» Send separate from the data transfer
» Mask entry
Protecting Personally Identifiable Information
23
• Remote Users
– Two types of remote users: Students and Staff
– Problem
• Work from personal or public PCs and laptops
• Data downloads need to be monitored
• Infected with viruses and spyware
• Open to phishing and pharming
• *Subject to Keylogger attacks
– Resolution
• Limit PII displayed or entered on the screen
• Employ two factor authentication for application access
• Provide Web site notices
• Offer assistance
Protecting Personally Identifiable Information
24
• Remote Users
– Keylogger attacks
• What are Keyloggers?
• Why are we singling this threat out?
• What can be done about the Keylogger threat?
– Limit the amount of PII entered or displayed on the web site.
– Make sure that user passwords are changed frequently.
– Limit privileged users remote access.
– Use Two Factor authentication.
– Include warning banners on your web sites that provide a
warning and instructions for prevention.
– Let users know not to use computers with unknown security.
Cyber Cafes and other publicly accessible computers should
be avoided when accessing PII.
Protecting Personally Identifiable Information
25
• Assess Your Security
– Identify data sensitivities for CIA
– Identify Likelihood
• Likelihood = threat*motivation
– Identify security risks
• Risk level = Impact*Likelihood
– Controls = level of risk
– Identify test methods based on risk level
• Documentation reviews
• Interviews
• Observations
• Technical tests (network, OS and
application scans, log reviews, penetration
testing, password cracking)
– Use Baseline Security Requirements
– Complete testing and identify
weaknesses / unmitigated vulnerabilities
– Create remediation plan
Protecting Personally Identifiable Information
26
Protecting personal information is
Everybody’s Job!
Personally Identifiable Information (PII):
Information about an individual including but not limited to,
Education, Employment, Financial Transactions, Medical History,
and Criminal Background information which can be used to
distinguish or trace and individual’s identity, such as their name,
social security number, date and place of birth, mother’s maiden
name, biometric records, etc, including any other personal
information that can be linked to an individual.
Don’t become a headline!
27
Resources
Vulnerabilities:
– OWASP (http://www.owasp.org)
– SANS Top 20 (www.sans.org/top20)
– National Vulnerability Database (http://nvd.nist.gov)
– cgisecurity (http//www.cgisecurity.com)
Guidance:
– National Institute of Standards and Technology (NIST)
Computer Security Resource Center
(http://csrc.nist.gov/publications/nistpubs/)
– Center for Internet Security (CIS) (http://www.cisecurity.org/)
– Educause
(http://connect.educause.edu/term_view/Cybersecurity)
28
Contact Information
We appreciate your feedback and
comments. We can be reached
at:
Bob Ingwalson
• Phone: 202.377.3563
• Email: robert.ingwalson@ed.gov
• Fax: 202.275.0907

More Related Content

Similar to Session4807.ppt

Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to ComplianceSecurity Innovation
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...David Cunningham
 
educational content,educational content,educational content,
educational content,educational content,educational content,educational content,educational content,educational content,
educational content,educational content,educational content,Olajide Kuku
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.IGN MANTRA
 
Database Security And Authentication
Database Security And AuthenticationDatabase Security And Authentication
Database Security And AuthenticationSudeb Das
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdfNdheh
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales DeckEvan Francen
 
Information Security
Information SecurityInformation Security
Information Securityvadapav123
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016centralohioissa
 
Presentation2 (2)
Presentation2 (2)Presentation2 (2)
Presentation2 (2)ITNet
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlSecureAuth
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015T. J. Saotome
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityLenin Aboagye
 

Similar to Session4807.ppt (20)

Need for cybersecurity
Need for cybersecurityNeed for cybersecurity
Need for cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Security Imeprative for iOS and Android Apps
Security Imeprative for iOS and Android AppsSecurity Imeprative for iOS and Android Apps
Security Imeprative for iOS and Android Apps
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...
 
educational content,educational content,educational content,
educational content,educational content,educational content,educational content,educational content,educational content,
educational content,educational content,educational content,
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
 
Database Security And Authentication
Database Security And AuthenticationDatabase Security And Authentication
Database Security And Authentication
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales Deck
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 
Information Security
Information SecurityInformation Security
Information Security
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
 
security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptx
 
Presentation2 (2)
Presentation2 (2)Presentation2 (2)
Presentation2 (2)
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 
DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015DRC -- Cybersecurity concepts2015
DRC -- Cybersecurity concepts2015
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
 

Recently uploaded

办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一A SSS
 
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一2s3dgmej
 
Ioannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfIoannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfjtzach
 
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...RegineManuel2
 
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
Application deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfApplication deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfCyril CAUDROY
 
Kindergarten-DLL-MELC-Q3-Week 2 asf.docx
Kindergarten-DLL-MELC-Q3-Week 2 asf.docxKindergarten-DLL-MELC-Q3-Week 2 asf.docx
Kindergarten-DLL-MELC-Q3-Week 2 asf.docxLesterJayAquino
 
定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一z zzz
 
Ethics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptEthics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptShafqatShakeel1
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改yuu sss
 
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一Fs
 
Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyOrtega Alikwe
 
Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Riya Pathan
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012sapnasaifi408
 
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量sehgh15heh
 
Final Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipFinal Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipSoham Mondal
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCRdollysharma2066
 
Gray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdfGray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdfpadillaangelina0023
 
MIdterm Review International Trade.pptx review
MIdterm Review International Trade.pptx reviewMIdterm Review International Trade.pptx review
MIdterm Review International Trade.pptx reviewSheldon Byron
 

Recently uploaded (20)

办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
 
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
 
Ioannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfIoannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdf
 
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
 
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
 
Application deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfApplication deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdf
 
Kindergarten-DLL-MELC-Q3-Week 2 asf.docx
Kindergarten-DLL-MELC-Q3-Week 2 asf.docxKindergarten-DLL-MELC-Q3-Week 2 asf.docx
Kindergarten-DLL-MELC-Q3-Week 2 asf.docx
 
定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一
 
Ethics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptEthics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.ppt
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
 
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort ServiceYoung Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
 
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
 
Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary Photography
 
Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
 
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
 
Final Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipFinal Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management Internship
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
 
Gray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdfGray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdf
 
MIdterm Review International Trade.pptx review
MIdterm Review International Trade.pptx reviewMIdterm Review International Trade.pptx review
MIdterm Review International Trade.pptx review
 

Session4807.ppt

  • 1. Session # 48 Security on Your Campus: How to Protect Privacy Information Robert Ingwalson
  • 2. 2
  • 3. 3 We Implement Security Based on Cost vs. Risk
  • 4. 4 Protecting personal information is Everybody’s Job! Personally Identifiable Information (PII): Information about an individual including but not limited to, Education, Employment, Financial Transactions, Medical History, and Criminal Background information which can be used to distinguish or trace and individual’s identity, such as their name, social security number, date and place of birth, mother’s maiden name, biometric records, etc, including any other personal information that can be linked to an individual. Don’t become a headline!
  • 5. 5 • In the Office • On the System • Data Transfers • Remote Users • Assess Your Security Protecting Personally Identifiable Information
  • 6. 6 • In the Office – Document handling and storage – Phones and Faxes – Land Shipments – Physical Office Security – Personnel Security – Policy and Training Protecting Personally Identifiable Information
  • 7. 7 • In the Office – Document Handling and Storage • Limit printing of PII • Clean Desk • Sensitivity Identification • Shredding • Monitoring • Secure storage Protecting Personally Identifiable Information
  • 8. 8 • In the Office – Phones • Limit PII conversations • Don’t leave PII voicemails • Prevent listeners – Faxes • Limit faxing of PII • Confirm fax number • Two way communication before sending and upon receipt • Monitor the Fax • Safeguard document Protecting Personally Identifiable Information
  • 9. 9 • In the Office – Land Shipments • Limit shipments of PII • Encrypt sent media • Double package • Send by reputable shipping agent • Include a manifest inside the package. • Communicate shipment with receiver Protecting Personally Identifiable Information
  • 10. 10 • In the Office – Physical Office Security • Staffed reception counter • After hours? – Card/key access – Change combinations & keys – Logs • Added Security – Cameras – Entry and exit checks Protecting Personally Identifiable Information
  • 11. 11 • In the Office – Personnel Security • Know who should be there – Challenge others • Personnel background checks – Criminal – Employment history – Credit • Train shortly after employment begins and then refresh periodically Protecting Personally Identifiable Information
  • 12. 12 • In the Office – Personnel Security • Know who should be there – Challenge others • Personnel background checks – Criminal – Employment history – Credit • Train shortly after employment begins and then refresh periodically Protecting Personally Identifiable Information
  • 13. 13 • In the Office – Policy and Training • Policy provides basis for controls and a roadmap to follow • Based on requirements and good practice • Individuals need training on policy - Include in Personnel training Protecting Personally Identifiable Information
  • 14. 14 • On the System (Defense in Depth) – Policy – Personnel Security – Physical Security – Network Security – Host based Security – Application Security Protecting Personally Identifiable Information www.macroview.com/solutions/infosecurity/
  • 15. 15 • On the System – Policy • Technical, Managerial, Operational control requirements • Tells what needs to be done, not how –Procedures provide the road maps on how to comply with policy • Covers all other aspects of Security –Personnel –Physical –Network Security –Host based Security –Application Security Protecting Personally Identifiable Information
  • 16. 16 • On the System – Personnel Security • The same as in the office: – Know who should be there » Challenge others – Personnel background checks » Criminal » Employment History » Credit – Train shortly after employment begins and then refresh periodically Protecting Personally Identifiable Information
  • 17. 17 • On the System – Physical Security • Includes environmental Security • Access control – Badges / Keycards – Access lists and entry logs – Escorted access – Higher level of control for some areas – Metal detectors and scanners • Backup power • Cameras Protecting Personally Identifiable Information
  • 18. 18 • On the System – Network Security • Firewalls • NIDs (Network Intrusion Detection) • Auditing • IPS (Intrusion Prevention System) • Honeypots Protecting Personally Identifiable Information
  • 19. 19 • On the System – Host based Security • Configuration compliance • Internal Firewalls • Access control • HIDs (Host Based Intrusion Detection) • Anti-Virus and Anti-Spyware • Patch management • Logging Protecting Personally Identifiable Information
  • 20. 20 • On the System – Application Security • Develop Application Security Plan • Test for known vulnerabilities prior to implementation • Authorize access • Rules of behavior • Secure Web interface • Limit PII entries and displays Protecting Personally Identifiable Information
  • 21. 21 • Data Transfers – Electronic File Transfers – Tapes and CDs – Thumb Drives – Email – *Laptops Protecting Personally Identifiable Information
  • 22. 22 • Data Transfers – Encryption • Encrypt with strong Algorithms – AES, Advance Encryption Standard or Triple DES, Data Encryption Standard – Use large key length, 256 or greater – If passwords are used: make them strong » Complex with a mixture of numbers, upper and lower alpha characters, and special characters » 8-12 characters in length » No dictionary words or names » Send separate from the data transfer » Mask entry Protecting Personally Identifiable Information
  • 23. 23 • Remote Users – Two types of remote users: Students and Staff – Problem • Work from personal or public PCs and laptops • Data downloads need to be monitored • Infected with viruses and spyware • Open to phishing and pharming • *Subject to Keylogger attacks – Resolution • Limit PII displayed or entered on the screen • Employ two factor authentication for application access • Provide Web site notices • Offer assistance Protecting Personally Identifiable Information
  • 24. 24 • Remote Users – Keylogger attacks • What are Keyloggers? • Why are we singling this threat out? • What can be done about the Keylogger threat? – Limit the amount of PII entered or displayed on the web site. – Make sure that user passwords are changed frequently. – Limit privileged users remote access. – Use Two Factor authentication. – Include warning banners on your web sites that provide a warning and instructions for prevention. – Let users know not to use computers with unknown security. Cyber Cafes and other publicly accessible computers should be avoided when accessing PII. Protecting Personally Identifiable Information
  • 25. 25 • Assess Your Security – Identify data sensitivities for CIA – Identify Likelihood • Likelihood = threat*motivation – Identify security risks • Risk level = Impact*Likelihood – Controls = level of risk – Identify test methods based on risk level • Documentation reviews • Interviews • Observations • Technical tests (network, OS and application scans, log reviews, penetration testing, password cracking) – Use Baseline Security Requirements – Complete testing and identify weaknesses / unmitigated vulnerabilities – Create remediation plan Protecting Personally Identifiable Information
  • 26. 26 Protecting personal information is Everybody’s Job! Personally Identifiable Information (PII): Information about an individual including but not limited to, Education, Employment, Financial Transactions, Medical History, and Criminal Background information which can be used to distinguish or trace and individual’s identity, such as their name, social security number, date and place of birth, mother’s maiden name, biometric records, etc, including any other personal information that can be linked to an individual. Don’t become a headline!
  • 27. 27 Resources Vulnerabilities: – OWASP (http://www.owasp.org) – SANS Top 20 (www.sans.org/top20) – National Vulnerability Database (http://nvd.nist.gov) – cgisecurity (http//www.cgisecurity.com) Guidance: – National Institute of Standards and Technology (NIST) Computer Security Resource Center (http://csrc.nist.gov/publications/nistpubs/) – Center for Internet Security (CIS) (http://www.cisecurity.org/) – Educause (http://connect.educause.edu/term_view/Cybersecurity)
  • 28. 28 Contact Information We appreciate your feedback and comments. We can be reached at: Bob Ingwalson • Phone: 202.377.3563 • Email: robert.ingwalson@ed.gov • Fax: 202.275.0907