1 / 30

PRESENTED BY DN S. B. BAMIDELE, CISM, CGEIT, CSOXP, CCGP, CISA Work Experience :

Information Management Security A Necessary Pre-requisite for ICT Deployment for National Development in Nigeria. PRESENTED BY DN S. B. BAMIDELE, CISM, CGEIT, CSOXP, CCGP, CISA Work Experience : NIGERIA - NB plc and Lagos State Government USA - KPMG, EDS, HP and Control Solutions AT

jola
Télécharger la présentation

PRESENTED BY DN S. B. BAMIDELE, CISM, CGEIT, CSOXP, CCGP, CISA Work Experience :

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Management SecurityA Necessary Pre-requisite for ICT Deployment for National Development in Nigeria PRESENTED BY DN S. B. BAMIDELE, CISM, CGEIT, CSOXP, CCGP, CISA Work Experience: NIGERIA - NB plc and Lagos State Government USA - KPMG, EDS, HP and Control Solutions AT “eNigeria 2010” International Conference and Exhibition 18TH MAY, 2010

  2. Information Management SecurityOrganization of Presentation I. The Critical Nature of Information Security II. Wrong Perspectives to Information Security III. Information Security Attacks and Hackers IV. E-Payment Attack Scenarios (Examples of Security Challenges) V. Countermeasures (Organization, Personnel, Technology, Processes VI. Information Security Objectives VII. Way Forward & Recommendations VIII. Discussion & Conclusion

  3. Information Management SecurityThe Critical Nature of Information Security INTRODUCTION Government and Enterprises have increasingly become dependent on IT to facilitate business operations in this era of global economy, cross-organization collaboration, online trade and E-payment adoption. The speed, accuracy, and integrity of information is critical to the business. It's the difference between having doubts about financial statements and being confident of their accuracy. Information Management Security is therefore critical to an entity’s ability not only to survive, but also to thrive and, more than ever, that businesses have “gone global” as a result of expanding e-commerce capabilities.

  4. Information Management SecurityThe Critical Nature of Information Security CONCEPT OF E-COMMERCE - eNIGERIA As applications fuel businesses, and increasingly complex applications and their information are the lifeblood of today's fast paced e-commerce businesses. That means, the health and viability of an e-commerce business is heavily dependent on the strength and security of the ICT systems. And as such, Information Management Security is a Necessary Pre-requisite for ICT Deployment for National Development in Nigeria, especially for the success of our “ICT4D plan and Global E-Payment Adoption”. Therefore to achieve our national development program of Seven Point Agenda and vision 20-2020, ICT security must be accorded the necessary priority by all.

  5. Information Management SecurityThe Critical Nature of Information Security DEFINITIONS “Information security provides the assurance for trust, confidentiality, integrity, availability of business transactions and information; and ensure critical confidential information is withheld from those who should not have access to it.” - ISACA All measures used to protect information assets from deliberate or inadvertent unauthorized acquisition, damage, disclosure, manipulation, modification, loss, or use. – COBIT

  6. Information Management SecurityThe Critical Nature of Information Security CARDHOLDER DATA SECURITY – E-PAYMENT • The Payment Card Industry (PCI’s) developed Data Security Standard (DSS) enhances cardholder data security and facilitate the broad adoption of consistent data security measures globally. • The PCI DSS security requirements apply to all system components that is included in or connected to the cardholder data environment: • Network • Server • Applications

  7. Information Management SecurityWrong Perspectives to Information Security SOME SOURCES OF EXPOSURE FOR EXECUTIVES Failure to mandate the right security culture. Failure to implement effective control framework. Inability to embed risk management into corporate strategy. Not being able to detect what the most critical & significant security weaknesses are and where they exist within the organization. Risk management investments not well monitored. Failure to measure performance of investments in information security initiatives and, know what residual security risks remains.

  8. Information Management SecurityWrong Perspectives to Information Security SOME SOURCES OF EXPOSURE ORGANIZATION-WIDE That security is someone else’s responsibility. No collaborative effort to link the security program to business goals. Exact role of information security not clearly defined. Enterprises too often view information security in isolation. Some view it as solely a technical discipline. Businesses still struggle to keep up with regulatory requirements, economic conditions and risk management.

  9. Information Management SecurityWrong Perspectives to Information Security My ISP will protect me!!! SOME POPULAR FALLACIES If I never log off then my computer can never get a virus. I got this disc from my (IT department, manager, boss, mother, friend, spouse) so it must be okay. But I only downloaded one file. I am too smart to fall for a scam. My friend... who knows a lot about computers showed me this really cool site… My vendor will protect me. It is easy therefore for these compartmentalized approach to lead to weaknesses in security management, possibly resulting in serious exposure.

  10. Information Management SecurityInformation Security Attacks POTENTIAL SECURITY ISSUES Denial of Service (DoS) Attacks Website Defacement or Modification Viruses and Worms Data Sniffing, Phishing, Spoofing, SMishing Malicious Code and Trojans Port-scanning and Probing Wireless Attacks Theft of Confidential Information System Sabotage Internal Staff Abusing Access Financial Fraud Through Deception Theft of Computer Equipment

  11. Information Management SecurityInformation Security Attacks

  12. Information Management SecurityInformation Security Attacks TYPES OF E-FRAUD Identity Theft Extortion (reputation) Salami Slice Funds Transfer Electronic Money Laundering

  13. Information Management SecurityInformation Security Attacks IDENTITY THEFT FOR E-PAYMENT FRAUD Identity theft is when your personal information is stolen and used illegally, especially for E-payment. • Keep financial data secret from unauthorized parties (privacy) • CRYPTOGRAPHY • Verify that messages have not been altered in transit (integrity) • HASH FUNCTIONS • Non-denial that a party engaged in a transaction (non-repudiation) • DIGITAL SIGNATURES • Verify identity of users (authentication) • PASSWORDS, PIN NUMBERS, SEURITY KEYS, DIGITAL CERTIFICATES

  14. Information Management SecurityE-Payment Attack Scenarios • Problem: ATM and Credit Card Frauds - a banking client case study • Some of Our Findings: • Identity theft by impersonation with fake email phishing, SMS SMishing and website spoofing. Phishing email examples; • Your ABC bank account was temporarily suspended • Protect your ABC bank account • Update on your ABC bank account • ABC bank identity theft solutions • Identity theft by Packet sniffing to illegally capture packets of data like passwords, IP addresses, protocols, etc, to break into the network and databases. • Identity theft through internal staff releasing customer information to friends and other collaborators. • Hacking by breaking into computer network, databases and servers to retrieve information.

  15. Information Management SecurityE-Payment Attack Scenarios Problem: ATM and Credit Card Frauds - a banking client case study Security Solutions Offered: “Email Security Code”, with name, last 4 digit of card and last log-in date, in all emails to help customers verify that the email was sent by the bank. “Confirm your identity”, based on some factors, requires user to receive an “identification code” via voice, text or e-mail on file. User to enter code before a successful log-in to account. Secure Sockets Layer (SSL) encrypts, or scrambles, user Ids, passwords and account information en route and decode it at the other end.

  16. Information Management SecurityE-Payment Attack Scenarios Problem: ATM and Credit Card Frauds - a banking client case study Security Solutions Offered: Use of GRC authorization and Segregation of Duties tools to minimize abuse of user access to incompatible combination of sensitive customer account information. Implement appropriate logging controls to check user abuses. Use of a new account on the bank’s website payment processing link requires verification with a small deposit and a small withdrawal to be confirmed by the user. Protection with firewalls, specialized hardware & software to control all communications with the network.

  17. Information Management SecurityE-Payment Attack Scenarios Problem: ATM and Credit Card Frauds - a banking client case study • Security Solutions Offered: • Using Dynamic Security Key, which creates random temporary security codes on the go, in addition to pin and card at the ATM machine. It comes in 2 types: • Token Security Key, a small car-remote sized device. • Mobile phone security key for receiving security code as SMS on the go. • Constant monitoring of the security tools to detect or proactively prevent security breaches. • Result: Customers increased by 86% in three months as a consequence of increased trust in the bank’s security measures.

  18. Information Management SecurityE-Payment Attack Scenarios • Problem: Revenue leakages – an Energy, Oil & Gas client case study • Some of Our Findings: • Financial Fraud Through Deception: Customers with overdue invoices were undetected and continue to owe more from new purchases. • Unauthorized and Inappropriate Access to Systems:Processing and collection of bad debts by unauthorized personnel. • Security Solutions Offered • System controls to block sales orders until overdue invoices are resolved. • System generated alert use for credit control management • Followed by appropriate recovery measures (dunning). Result: Over $1.4m increase in revenue after two months.

  19. Information Management SecurityE-Payment Attack Scenarios • Problem: Fictitious contracts & overpayments–a Public sector client case study • Some of Our Findings • Financial Fraud: • Duplicate invoice numbers exist for a vendor/contractor, and/or duplicate order numbers exist for a contract. • Goods receipt are below or exceed the quantity in the reference PO. • Invoice amount do not match goods receipt and/or quantity listed on the reference PO. • Unauthorized and Inappropriate Access to Systems: • New or changed POs and contracts that contain invalid service exist.

  20. Information Management SecurityE-Payment Attack Scenarios • Problem: Fictitious contracts & overpayments–a Public sector client case study • Security Solutions Offered • System controls to prevent processing of duplicate invoice numbers for same vendor/contractor. • System controls to prevent processing of receiving quantities less or greater than listed in the reference PO. • System controls to perform a 3-way matching of purchase orders, goods receipts, and invoices within a defined tolerance limit before posting to the GL. • Use of GRC authorization and Segregation of Duties tools to minimize abuse of user access to incompatible combination of functions between requisition, purchasing, receiving, invoicing and processing vendors’ payments. Result: More than $2.5m savings in expenditure after 5 months.

  21. Information Management SecurityE-Payment Attack Scenarios • Problem: Risks and security concerns with Cloud Computing • Recommendations • Reputation, history & sustainability are factors to be considered in choosing a provider. • Business continuity and disaster recovery plans must be well documented and periodically tested. • Options to minimize impact if provider’s service is interrupted. • Agreed-upon service levels (SLA) with the provider. • Define Backups and Recovery time objectives. • Proper classification and labeling of data for ease of identification and to ensure data are not merged with competitors’. • Transparency and a robust assurance approach of the cloud provider’s security and control environment.

  22. Information Management Security Countermeasures SUGGESTED SECURITY BEST PRACTICES • Complete reliance on the strength of IT based access controls. • Security policies, procedures and standards • Application and data ownership • Segregation of Duties • Logical and physical security • Super user privilege management • Compliant User provisioning with access approval • User based role management (unique access based on need to know) and security administration • Virus protection • Authentication with any combination of ID, password, pin, card, security code key on the go, biometric, etc

  23. Information Management Security Countermeasures INFORMATION MANAGEMENT SECURITY ROAD MAP Effective risk management requires a strong balance of; • Organizational support • Dedicated management • People • Staff members play a critical role in protecting the integrity, confidentiality, and availability of IT systems and networks • Training, Awareness, Enforcement and Compensation • Selection of appropriate technology. • Firewalls • Intrusion Detection • Virus Protection • Authentication and Authorization • Encryption • Data and Information Backup

  24. Information Management Security Countermeasures INFORMATION MANAGEMENT SECURITY ROAD MAP • Effective & well controlled processes The PCI Security Standards Council’s required process to mitigate emerging e-payment security risks has help a lot: • Build & Maintain a Secure Network • Security goals – operating, financial and strategic objectives • Risk factors impact analysis – internal and external • Evaluate and improve on existing security practices • Protect Cardholder Data • Maintain a Vulnerability Management Program • Implement Strong Access Control Measures • Regularly Monitor and Test Networks • Maintain an Information Security Policy Each interacts with, impacts and supports the other, often in complex ways, and if any one is deficient, information security is diminished.

  25. Information Management SecurityInformation Security Objectives • Identification • Authorization • Integrity • Availability • Reliability • Authentication • Authorization • Access Control • Data Integrity • Confidentiality • Non-repudiation

  26. Information Management SecurityInformation Security Objectives BENEFITS OF SECURED E-PAYMENT ENVIRONMENT • Privacy to fight or stop identity theft. • Preventive measures to help stop ATM machine, online, e-payment, bank account, etc, frauds. • Enhanced confidence in e-payment transactions. • Alert to potential victims of online frauds. • Strong measures that help protect online purchases. • Secure online banking transactions.

  27. Information Management SecurityWay Forward GOVERNMENT’S ROLE • Political Will • In the US, Sarbanes-Oxley Act was passed by congress and signed into law by the President on 30 July 2002. • It’s Section 404 requires senior management of public companies and their auditors to annually assess and report on the design and effectiveness of internal controls over financial reporting. • Fundamentally changed business and regulatory environment. • Enhances corporate governance through strong internal checks and reporting. • Enforcement with high monetary & legal sanctions for non compliance • Collaboration with States and other stakeholders • Massive awareness campaign • More work for NITDA and other relevant organs

  28. Information Management SecurityWay Forward EXECUTIVE MANAGEMENTS’ ROLE • IT professionals, especially those in executive positions, need to be well versed in internal control frameworks and standards. • Government Officials, CEOs, CIOs and other executives responsible for the implementation and management of Information security must comply and take on the challenges of: • Enhancing their knowledge of security & internal controls. • Understanding their organization’s overall Security needs • Developing and implementing an effective information security & controls program. • Integrating this plan into the overall IT & corporate strategies.

  29. Information Management Security Conclusion • Most would agree that the reliability of financial reporting is heavily dependent on a well-controlled IT environment. • Security of systems, data and infrastructure components are critical to e-commerce and e-payment for ICT deployment. • Legislative and regulatory measures are very critical to the success of ICT deployment. • Organizations must have comprehensive plan to develop the information security standards and ensure sustainability. • Effectively managed ICT security can support the achievement of business goals and objectives.

  30. Information Management SecurityConclusion Questions, Discussions, ….

More Related