InformationSecurity–CreatingAwareness,EducatingStaff,andProtectingInformationSession46ChrisAidan,CISSPInformationSecurityManagerPearsonTopicsCoveredDataPrivacySpyware&AdwareSPAM&SPIMPhishingPasswordsSocialEngineeringEmail&ChatServicesSecuringWorkstationsDataBackupsEquipmentDisposalDataRecoveryDemoDataDisposalAccessRightsPhysicalSecurityEmergingThreatsIncidentResponseCreatingAwarenessQuestionsUsefulLinksWhySecurity?LiabilityPrivacyConcernsCopyrightViolationsIdentityTheftResourceViolationsReputationProtectionMeetExpectationsLaws&RegulationsUnderstandingThreatsWhatisvaluable?Whatisvulnerable?Whatcanwedotosafeguardandmitigatethreats?Whatcanwedotoprepareourselves?MostbelievetheywillwinlotterybeforegettinghitbymaliciouscodeProtectingInformationlike:SocialSecurityNumberDriverslicensenumberInsurancenumbersPasswordsandPIN’sBankinginformationKeepSensitiveDataPrivateTerminologyHackers–whitehat–greyhat–blackhatDOS&DDOS1337(Leet)speakWarezScriptkiddiesSpyware&Adware(Scumware)Spyware-ApplicationsthatmonitoractivitywithoutexpresspermissionAdware-Applicationsthatmonitoractivitywithexpresspermission–ReadtheEULASPAM&SPIMSPAM-–JunkemailSPIM-SPAMhascometoInstantMessaging–Uncontrolledviewing(pop-upwindows)–BotgeneratedPhishingPhishingisacomputerscamthatusesSPAM,SPIM&pop-upmessagestotrickusintodisclosingprivateinformation(SocialSecurityNumber,CreditCards,bankingdata,passwords,etc)–Oftensentfromsomeonethatwe“trust”orareinsomewayassociatedwithus–Appearstobealegitimatewebsite–Embeddedinlinksemails&pop-upmessage–PhishingemailsoftencontainspywaredesignedtogiveremotecontroltoourcomputerortrackouronlineactivitiesSelectagoodone–Atleast7characters–Mixtureofupperandlowercasecharacters–Mixtureofalphaandnumericcharacters–Don’tusedictionarywordsKeeppasswordssafeChangethemoftenDon’tshareorreusepasswordsTwo-factorauthenticationPasswordsSocialEngineeringSocialEngineeringistheartofpryinginformationoutofsomeoneelsetoobtainaccessorgainimportantdetailsaboutaparticularsystemthroughtheuseofdeceptionEmail&ChatServicesEmailandchataresentincleartextovertheInternetDatacaneasilybecapturedandreadbysavvycomputerusersandsystemsadministratorsSafeguardsshouldbeputintoplacepriortousingtheseprogramsforsending/receivingsensitiveinformationlikeSocialSecurityNumbersEnhanceOurWorkAreaSecuritySecureworkstations–Lockoursystems(Ctrl-Alt-Delete)–Shutdown–Runuptodatevirusscanningsoftware–Passwordprotectfiles–Applysoftwarepatches–Installcablelocks–RunadesktopfirewallIsOurDataBeingBackedUp?TestbackupsSecurelystorebackupmedia(offsite)RestrictaccesstowhocanperformrestorationEquipmentDisposalWhathappenstooldcomputerwhentheyarereplaced?Dothosesystemscontainsensitiveinformation?SeveralprogramstosecurelyremovedatafromcomputersystemsarecommerciallyavailableDataRecoveryDEMODumpsterDivingWeneverknowwhoislookinginourtrashShredsensitivedocumentsSecureshredbarrels,andmakesurethatproperhandlingproceduresareinplaceAccessRightsOnlyallowaccessthatisabsolutelyrequiredDon’tgrantaccountsbasedonthefactthataccess“may”berequiredUseleastprivilegeaccesspoliciesthatstateaccesswillonlybegrantedifrequired,notbydefaultAreaccountsremovedandpasswordschangedwhensomeonechangesjobsoristerminated?Perf...