1 / 61

Protecting Confidential Client Data!

Protecting Confidential Client Data!. Presented by: [Insert Your Name Here]. Agenda. Background Sizing Up the Problem The Fix! Human Aspects Technology Local Remote Sharing Disposing of Old Data. Background:. Sensational Headlines…daily!.

baris
Télécharger la présentation

Protecting Confidential Client Data!

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Protecting Confidential Client Data! Presented by: [Insert Your Name Here]

  2. Agenda • Background • Sizing Up the Problem • The Fix! • Human Aspects • Technology • Local • Remote • Sharing • Disposing of Old Data

  3. Background:

  4. Sensational Headlines…daily! • Cyber-thieves shift nearly $450,000 from Carson,CA city coffers (May 2007) using keylogger software. • T.J. Maxx data theft (some 45 million credit and debit card numbers) likely due to wireless ‘wardriving‘, i.e. thief with a laptop, a telescope antenna, and a wireless LAN adapter (December 2006).

  5. Sensational Headlines…Daily! • Veterans Administration announces confidential information of 26.5 million service personnel was stolen when employee’s home laptop was stolen (June 2006). • Over 600,000 laptop thefts occurred in 2004, totaling an estimated $720 million in hardware losses and $5.4 billion in theft of proprietary information.

  6. The Times are a Changing • Over the next 3 years employees equipped with Notebooks or Tablet PCs will grow from 35% to 50% • 95% will be wirelessly enabled. • Knowledge workers will be mobile 50% of the time working from home, office, hotels, airports, customer sites, etc. • Iny 2008 75% of business cell phones will be smart phones (Blackberry, Treo, Communicator, etc.) • Most have removable memory cards. • In their present state they do not offer adequate security (file encryption, “device kill”, firewalling, authentication, tracking and logging).

  7. The Times are a Changing • Increase in mobility with devices “roaming wild” will cause a major upsurge in breaches: • Breaches may go undetected or undiscovered for long periods of time. • Problem could easily become overwhelming (identity theft will look like child’s play).

  8. Information Security Management“Short List” • Router/IP addressing • Firewall • Patches • Anti- • Virus • Spam • Spyware • Passwords / Passphrases • Unprotected Shares • Personal Firewall • Web-based e-mail/file sharing • Wireless • Physical Access • Backups

  9. Goals of IT Security Confidentiality • Data is only available to authorized individuals Integrity • Data can only be changed by authorized individuals Availability • Data and systems are available when needed

  10. OVERALL GOAL: Reduce Risk to an Acceptable Level • Just because it can happen doesn’t mean it will. • Put threats into perspective by assessing: • Probability of attack • Value of business assets put at risk • Business cost and consequence of attack • REMEMBER – no policy, procedure, or measure can provide 100% security

  11. Sizing Up the Problem:

  12. What’s Confidential? • Social Security # • Credit/debit card numbers • Driver’s license number • Bank account numbers • Birth dates • PIN codes • Medical records • Mother’s maiden name?

  13. Where Is Confidential Data Stored? In-House Systems • Physically secure? • Network access restricted to only authorized individuals? Backup Media • Physical location? • Format? Remote Users • Laptops, home computers & memory sticks?

  14. Who Has Access? • Data access restricted to authorized individuals? • Shared passwords = shared data and no accountability • Wide open network = information free-for-all

  15. The Fix:

  16. The Fix! • In short… Restrict access and/or Make it unreadable • Data is made “unreadable” using encryption technology.

  17. The Fix! Encryption • Process of transforming information to make it unreadable to anyone except those possessing special key (to decrypt). Ciphers • Algorithm or code used to encrypt/decrypt information.

  18. The Fix! Ciphers Classical Rotor Machines Modern Substitution Transposition Private Key Public Key Stream Block • Encryption Ciphers

  19. The Fix! Things to remember about encryption… • Use modern, public standards! • Longer key lengths are always better (increased computing power has made shorter keys vulnerable to cracking in shorter time) • Private keys are optimal

  20. Human Aspects Policy • Who is allowed access? • When is access allowed? • What users are allowed to do? • Where is data permitted to be… • Accessed from (devices & locations?) • Stored • Network servers • Desktops • Laptops (data is now mobile) • Thumb drives

  21. Human Aspects – Mitigating Risk Acceptable Use Policies • Business data access rules: who, where, when and what • Supported mobile devices and operating systems • Required security measures and configurations • Process for usage monitoring, auditing and enforcement (check your state and local laws) Non-Disclosure Agreements (NDA)? Training & Communication – regular and often? Social Engineering • “Click here” to download key logger! • Phishing attacks are still highly effective for stealing • Personal information • Login information – can then be used to access systems contain confidential data

  22. Technology – Local Physical security • Sensitive data located on secure systems • Locked server room • Locker server cage(s)

  23. Storage Media Hard drive encryption – Software-based • Windows Encrypting File System (EFS) • Supported on NTFS volumes (W2K, XP & Vista) • Encrypt/decrypt files and/or folders in real time • Uses certificate issued by Windows

  24. Storage Media Hard drive encryption – Software-based • Vista BitLocker • Encrypts entire Windows Operating System volume • Available with: • Vista Ultimate • Vista Enterprise • Third party, commercial encryption software • TrueCrypt • PGP Desktop Home

  25. Storage Media Hard drive encryption – Hardware-based • Seagate Technology Momentus 5400 FDE.2 laptop drive features built-in (hardware) encryption (March 2007) • Heart of the new hardware-based system is a special chip, built into the drive, that will serve to encode and decode all data traveling to or from the disk. • Requires password to boot machine • Disk is useless/inaccessible to others

  26. Storage Media “Phone home” software • Software that monitors machines and notifies system administrators regarding: • Who is using • Where machine is located • What hardware and/or software changes are made • Example: • CompuTrace

  27. Storage Media USB Thumb Drives • Most older drives completely insecure • If you want to store/transfer secure data on USB thumb drive, look for device that can… • Encrypt data • Authenticate user

  28. USB anti-copy products • Prevents data theft / data leakage and introduction of malware • Manage removable media and I/O devices – USB, Firewire, WiFi, Bluetooth, etc. • Audits I/O Device usage • Blocks Keyloggers (both PS2 and USB) • Encrypts removable media • Enables Regulatory Compliance Products • Device Lock • Sanctuary • DeviceWall • Safe End Port Protector

  29. Authentication Authentication Factors • What you know • Passwords/passphrases • What you have • Tokens, digital certificates, PKI • Who you are • Biometrics (finger, hand, retina, etc.) Two factor authentication will become increasingly important.

  30. Authentication • APC BIOMETRIC PASSWORD MANAGER fingerprint reader - USB by APC ($35 - $50) • Hundreds of devices like this ranging from $25 - $300.

  31. Application Software In general, application passwords are poor protection (since most can be broken) • e.g. Passware (www.lostpassword.com) • Unlock 25 different applications including Windows, Office, Quick Books, Acrobat, Winzip, etc.

  32. Mitigating Unsafe User Behavior Managed services – key piece of security puzzle • Spam, virus, content management and filtering, spyware, etc. • Benefits • Easier on the user • Easier on IT Mobile devices should be periodically reviewed: • Currency of software and patches • Health of machine • User logs • Recommendation: Quarterly or Trimester

  33. VPN (Virtual Private Network) • A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real-world connection such as leased line, a VPN uses "virtual" connections routed through the Internet from the company's private network to the remote site or employee.

  34. Overview

  35. VPN (Virtual Private Network) Benefits • Extend geographic connectivity • Reduce transit time and transportation costs for remote users • Provide telecommuter support • Improve security • Reduce operational costs versus traditional WAN • Improve productivity • Direct printing to office • Direct connect to network drives

  36. VPN • Use 3rd-party VPN service, e.g. HotSpotVPN, JiWire Spot Lock, Public VPN or WiTopia Personal VPN

  37. Host-Based Computing Remote Control • GoToMyPC - $14-34/month • LogMeIn • Symantec pcAnywhere • VNC

  38. Host-based Computing • Windows Terminal Server

  39. Digital Certificates • Implement digital certificates for internally hosted corporate web resources or web-presence, e.g. E-mail, CRM, B2? site, etc. This allows all traffic to be encrypted via SSL (Secure Sockets Layer). • Pad lock indicates traffic is being encrypted and the web site owner’s identity can be verified (by certificate authority).

  40. Wireless Security – Network Side • DON’T do a plug-n-play install! • Password protect administrative setup • Encryption: • WEP (good) – remember to change keys regularly • WPA (better) • WPA2 (best) • Enter authorized MAC addresses on WAP • Use VPN or IPSec to encrypt all traffic • Walk perimeter to determine whether rogue WAPs are active

  41. Wireless Security - End Users • No unprotected shares – all shares turned off • Ensure all mobile devices are updated with the latest security patches • Only use SSL websites when sending/entering sensitive data (credit cards and personal identity information) • Digitally sign data to make it difficult for hackers to change data during transport • Encrypt documents that contain sensitive data that will be sent over the Internet

  42. Wireless Security - End Users • As a general rule (while not always possible) use WiFi for Internet surfing only • Disable or remove wireless devices if they are not being used. This includes: • WiFi – 802.11a/b/g/n • Bluetooth • Infrared • Cellular • Avoid hotspots where it is difficult to tell who is connected • Ad-hoc/peer-to-peer setting should be disabled

  43. WiFi Security - End Users WiFi Best Practices • Use broadband wireless access (EvDO, 3G/GPRS, EDGE, UMTS) to make wireless connections: • Verizon and Sprint Broadband services are very fast - $59.99/month – unlimited access • Wireless carriers offer fairly good encryption and authentication

  44. Wireless Recommendations • Consider using specialized security software to help mobile users detect threats and enforce company policies • Example - http://www.airdefense.net

  45. Sharing Confidential Data Options: • E-mail • FTP / Secure FTP • Secure transmission programs • Customer portal / extranet • 3rd Party Hosted Data Exchange • Digital Rights Management (DRM)

  46. Sharing Confidential Data E-mail • As a general rule, e-mail is insecure! • In order to secure: • Digital Certificates / PKI • PGP • Verisign

  47. Sharing Confidential Data Secure FTP • Secure FTP utilizes encryption to transfer files in a secure manner. • Can use a number of different strategies/approaches to accomplish. • Due to complexity, not often utilized for sharing data with clients.

More Related