510 likes | 699 Vues
Introduction to Business Information Systems. Prof. Dr. Roland M. Müller, Berlin School of Economics and Law. Agenda. Security concepts Counter Measures Some recent incidences Malware How can you protect yourself? Phishing Skimming Identity Fraud Trends. What Is Security?.
E N D
Introduction to Business Information Systems Prof. Dr. Roland M. Müller, Berlin School of Economics and Law Intro. BIS, IBMAN
Agenda • Security concepts • Counter Measures • Some recent incidences • Malware • How can you protect yourself? • Phishing • Skimming • Identity Fraud • Trends
What Is Security? Management of Information Security, 3rd Edition • Security is defined as “the quality or state of being secure, to be free from danger” • Security is often achieved by means of several strategies, undertaken simultaneously, or used in combination with one another • Information Security is the protection of information and its three dimensions or critical elements: confidentiality, integrity, and availability (CIA Triangle). • Information Security includes the systems and hardware that use, store, and transmit that information
Key Concepts of Information Security Management of Information Security, 3rd Edition • Confidentiality • The characteristic of information whereby only those with sufficient privileges may access certain information • Measures used to protect confidentiality • Information classification • Secure document storage • Application of general security policies • Education of information custodians and end users
Key Concepts of Information Security (cont’d.) Management of Information Security, 3rd Edition • Integrity • The quality or state of being whole, complete, and uncorrupted • Information integrity is threatened If exposed to corruption, damage, destruction, or other disruption of its authentic state. • Corruption can occur while information is being compiled, stored, or transmitted .
Key Concepts of Information Security (cont’d.) Management of Information Security, 3rd Edition • Availability • The characteristic of information that enables user access to information in a required format, without interference or obstruction • A user in this definition may be either a person or another computer system. • Availability does not imply that the information is accessible to any user. • Implies availability to authorized users
Security aspects / elements • Confidentiality • Integrity • Availability • Posession • Utility • Authenticity Which aspect is most impotant for (and why) - Banks - Government - Airlines
Threats • Malicious • Malicious software (Virus, Worm, Trojan horse, …) • Spoofing • Scanning • Snooping • Scavenging • Unintentional • Malfunction • Human error • Physical • Fire • Water • Power loss • Vandalim
Attackers • Script-kiddies • Professionals, criminals • (Ex-)Employees • Competitors • Intelligence agency • Students
Virus, Worms, Trojan Horses 1) Computer Virus: • Needs a host file • Copies itself • Executable 2) Network Worm: • No host (self-contained) • Copies itself • Executable 3) Trojan Horse: • No host (self-contained) • Does not copy itself • Imposter Program
Using Web Addresses to Stay Safe • LEGITIMATE: • www.bankofamerica.com • www.bankofamerica.com/smallbusiness • SUSPICIOUS: • bankofamerica.xyz.com • www.xyz.com/bankofamerica
https://www.bankofamerica.com. https://
Open WLAN • Everybody can listen! • Session hijacking • Video: http://www.youtube.com/watch?v=ZtZPR-TAEZw • Use VPN • Use https • Use ForceTLS • Don‘t use it for login-in services
Session hijacking:Don‘t try this at home (or here) • § 202a StGB Spying out data:Up to 3 years in prison! • § 202b StGB Interception of data:Up to 2 years in prison! • § 202c StGB Preparing for Spying out or Interception of data:Up to 1 year in prison!
Phishing • http://www.youtube.com/watch?v=7MtYVSGe1ME
Phishing test • Phishing test: http://www.sonicwall.com/phishing/
Agenda • Security concepts • Counter Measures • Some recent incidences • Malware • How can you protect yourself? • Phishing • Skimming • Identity Fraud • Trends
Skimming • http://www.youtube.com/watch?v=m3qK46L2b_c
Agenda • Security concepts • Counter Measures • Some recent incidences • Malware • How can you protect yourself? • Phishing • Skimming • Identity Fraud • Trends
Attack 3: Identity theft • Financial Identity Theftusing another's name and SSN to obtain goods and services • Criminal Identity Theftposing as another when apprehended for a crime • Identity Cloningusing another's information to assume his or her identity in daily life • Business/Commercial Identity Theftusing another's business name to obtain credit
Attack 3: Identity fraud • Michelle Brown • Filled in rental form • Over $ 50,000 in goods and services were procured in her name • The ‘other’ Michelle was engaged in drug trafficking • Damaged credit profile • Warrant out for arrest • Prison record • Testified before the US Senate Committee Hearing on Identity Theft. • Film: The Michelle Brown story
Financial Losses Related to Identity Theft 10 million new victims per year $76 billion in losses for 2009 Average “take” from Identity Theft is almost 10 times greater than from an armed robbery Average incident cost $4,800 to businesses involved $500 to consumer involved 200-600 hours of consumer time 2009 275,284 Internet fraud complaints $276 million Internet fraud loss
Financial Losses Related to Identity Theft (cont’d.) 2007 to 2008: a rise of $25 million or 33%
What is Identity Theft? Name + Non-public information Social security number Credit card number Medical information Drivers license Credit bureau information Non-public information used to commit fraud or other crimes Low risk, high reward - it’s all about money Directly to use your accounts or identity To resell your accounts or identity on the black market
Identity Theft Web Sites – How easy is it to acquire information? People Finder License Plate Drivers License Social Security Card College Degree Credit Card Collector
Video • http://www.wired.com/techbiz/people/magazine/17-01/ff_max_butler?currentPage=all • http://link.brightcove.com/services/player/bcpid1815813330?bctid=5310498001
Videos for Executives, Employees, and Customers Federal Trade Commission’s Educational Phishing Video http://www.ftc.gov/bcp/edu/multimedia/ecards/phishing/ Federal Deposit Insurance Corporation (FDIC) (Video) Don’t Be an Online Victim: How to Guard against Internet Thieves and Electronic Scans http://edgecastcdn.net/00003F/anon.vodium/fdic/identitytheft/index.html Contact the FDIC Call Center 1-877-ASKFDIC (877-275-3342); TDD: 1-800-925-4618
Trends • Hacking is more and more a criminal profession • Internet fraud rise • Identity fraud (internal, external) • Regulations become more important • Dependency on the Internet is high, point of no return has been passed • Outsourcing