GetCompliant.GetTraceSecurity.InformationSecurityDNREmployeeAwarenessTrainingAndrewC.JohnsonWhatisInformationSecurity?Protectstheconfidentiality,integrity,andavailabilityofimportantdataControlscanbePhysicalorTechnicalLocksandsafes–encryptionandpasswordsTechnologyhasmadeourliveseasierinmanyways,butthisconveniencehasalsoincreasedourexposuretothreatsThievesandattackerscanalsoworkmoreeffectivelyWhyShouldICare?TheftisbecomingincreasinglydigitalEaseofidentity,account,andcredentialtheftmakeseveryoneanidealtargetAppliestoorganizationsthathousesuchdataorindividualsthemselvesCompromisemayaffectcustomers,coworkers,friends,andfamilyHistoricalPerspectiveManyhistoricalmethodsofmonetarytheftStagecoachRobberiesTrainHijackingArmedAssault“InsideJobs”Lossesfromtensofthousandsofdollars,upintothemillionsToday,mostbanksdonothouse“millionsofdollars”on-premisesLiquideconomyDataisthenewcommodityIn2006therewere7,272“robberies”totalingover$72,687,678Statistics$239.1million(2007)TotaldollarlossfromallreferredcasesoffraudIncreasedfrom$198.4millionin2006MalecomplainantsreportedgreaterlossthanfemalesHighestdollarlosseswerefoundamonginvestmentandcheckfraudvictimsEmailandwebpagesstillprimarymechanismsbyhowthefraudulentactionhappened*FederalBureauofInvestigationInternetCrimeComplaintCenter-CrimeReportfor2007ModernThreatsViruses,Trojans,Worms,andRootKitsAdware/SpywareSpam,Phishing,andotherEmailattacksIdentityTheftSocialEngineeringVirusesVirusesaremaliciousprogramsthathidethemselvesonyourcomputerUsuallyverysmallMayhaveaccesstoviewordeleteyourinformationOftencontractedthroughawebsite,email,orp2papplicationsMaydestroyyourdocuments,formatyourharddrive,sendemailsfromyourcomputeroravarietyofothernefariousactions–itjustdependsonthestrain!VirusesarecreatedforthesolepurposeofcausingtroubleTakingrevenge,politicalstatements,etc…Mostmodernvirusesarefinanciallymotivated–mayholddataforransomorstealinformationJustlikerealviruses,computervirusesspreadtoothers…OthercomputersonthenetworkSendingoutemailreplicationsofitselfAlwaysuseanti-virusprotection!Famousviruses:LoveBugCodeRedWorms,Trojans,andRootKitsTrojanappearsasalegitimateprogramPossibletorepackageTrojanswithlegitimateprogramsWormsareself-replicatingTypicallypropagatethroughun-patchedsystemsBlasterSasserRootKitsLowlevelprogramsthatembedthemselvesintheoperatingsystemitselfDifficultifnotimpossibletodetectAdware/SpywareSomemalwareisdesignedtosolicityou,orgatherinformationaboutyourcomputinghabitsWhichwebsitesyouvisit?When?Whattimes?Whatareyoupurchasing?Howlongdospendsurfingthewebsite?Howorwhatdoyouuseyourcomputerfor?Example:Sony“RootKit”Intendedfor“MarketingPurposes”Commonlyinstalledwithp2porfreesoftwareMaybeonlyanannoyanceandcausenoharmWhatelsemaybeinstalledalongsideadware?EmailCommonAttacksPhishingMaliciousattachmentsHoaxesSpamScams(offerstoogoodtobetrue)BestPracticesDon’topensuspiciousattachmentsDon’tfollowlinksDon’tattemptto“unsubscribe”PhishingDeceptiveemailstogetuserstoclickonmaliciouslinksEntersensitiveinformationRunapplicationsLookidenticaltolegitimateemailsYourBankPayPalGovernmentVariantsVishing–sameconceptbutwithvoiceUserinstructedtocallintosystemTextmessagesandpostalmailP...