220 likes | 236 Views
Explore how human error leads to security incidents in a technology-oriented civilization, with insights on social engineering, the exploits, building a human firewall, and effective countermeasures to enhance cybersecurity awareness.
E N D
Introduction • 75% of security incidents caused by human error • Technology oriented civilization • General ignorance in all layers of the civilization
Work environment • Employees often clueless about security improvements. • Incidents often caused by : • Configuration error • Misinterpretation • Intentionally action
Design issue • Techies needs vs business needs • Business function vs security • User-friendly vs security • The strength of the design is often the downfall to it. Regular users do not think as those who designed it • Design should identify human and societal need
Technology • Technology rapidly changes resulting in inability to manage • Technology often ties us to our work and instead making it easier it gets worse • Top notch technology is expensive and does not guarantee security. • Implementers often external, could leave insecure traces, purposely or by error
Social engineering • Art of deception or persuasion • The exploits • Human based social engineering • Technology based social engineering
Social engineeringThe Exploits • Diffusion of responsibility • Trust relationships • Moral duty • Guilt • Desire to be helpful • Cooperation
Human basedSocial engineering • Impersonation • The VIP approach • Shoulder surfing • Dumpster diving • Piggy backing • Third party approach
TechnologySocial engineering • Popup windows • Mail attachments • Spam, Spim, chain emails, hoaxes • Websites
CountermeasuresBuilding a human firewall • Convince top management • Top down approach • Prove security is business enabler not a cost enabler only. • According to Gartner the executive board has 3 mayor questions when confronted with security issues: • Is our security policy enforced fairly and consistently? • Would employees, contractors and partners know if a security violation occurred? • Would the company know how to handle and react if they recognize a security violation?
CountermeasuresBuilding a human firewall • Assign and clarify roles/responsibilities • Separation of duties, do people have the authority • Careful with overlapping duties • Clear statements from management
CountermeasuresBuilding a human firewall • Define an action plan linked to a budget • Assessment of relative value of information assets • Use a risk assessment approach • Prioritize asset values to simplify budgetting • Involve all units
CountermeasuresBuilding a human firewall • Develop/update the policy framework • Policies evolve just as the law in real life • Written in language everyone can understand • Align with business goals, constraining or contradictory policies end up in the forgotten list
CountermeasuresBuilding a human firewall • Develop incident response program • Reduce damage • Recover quick and efficient • Keep a trace of the security event, learn from it
CountermeasuresBuilding a human firewall • Develop a security awareness program • Conduct a survey to find the weak and strong domains • Repetition is the key to success • Events happening in the world could be the initiator • It should not be limited to a one shot. Use any means possible such as quiz, posters, intranet, mails etc..
CountermeasuresBuilding a human firewall • Develop a security awarenessprogram • Senior management • Mid management • Staff • Technical staff
CountermeasuresTarget audience • Develop a security awareness program • Senior management • Focus on key elements, risk level, loss • Numerical or statistical approach • Examples of real life
CountermeasuresTarget audience • Develop a security awareness program • Mid management • Granular approach on policies, procedures,… • In charge of mapping it to different departments • Use business examples
CountermeasuresTarget audience • Develop a security awareness program • Staff • Repetition = key to success • Split into job related groups • Stress on the importance of his/her job and the security related issues involved
CountermeasuresTarget audience • Develop a security awareness program • Technical Staff • Audit trails often see as work control • Often integrate security after everything is running • Convince them security protects also their work environment
CountermeasuresBuilding a human firewall • Measure your security awareness efforts • A quiz is an excellent tool to measure • Security event statistics can indicate weak spots • Evaluation forms to gain knowledge current issues and where to improve
The Human Factor Q & A