330 likes | 526 Views
Mobile Device Security. Dr. Charles J. Antonelli Information Technology Security Services School of Information The University of Michigan 2008. Roadmap. Introduction: Securing private data Threats to data Securing data Demonstration. Demo participation. Laptop
E N D
Mobile Device Security Dr. Charles J. AntonelliInformation Technology Security ServicesSchool of Information The University of Michigan2008
Roadmap • Introduction: Securing private data • Threats to data • Securing data • Demonstration
Demo participation • Laptop • Windows with Admin authority • Native boot, or • Via VMware Server or Player • No network connectivity required • Flash drive • Lexar Jump Drive Secure II • MAIS logo optional
Demo prerequisites • Required • Basic Windows user skills • Nice to have • Windows Power User or better • System administration experience
Meet the instructor • Research in distributed systems, file systems, and security • At U-M Center for Information Technology Integration since 1989 • Faculty in SI & EECS • Teaching • ITS 101 Theory and Practice of Campus Computer Security • SI 630 Security in the Digital World, SI 572 Database Applications Programming • EECS 280 C++ Programming, 482 Operating Systems, 489 Computer Networks; ENGR 101 Programming and Algorithms; SI 654 Database Applications Programming • DCE Internals, SHARE UNIX filesystem tours, … • Research • Advanced packet vault • SeRIF secure remote invocation framework
Meet the class • Name • Unit • How many GB do you have on mobile devices? • How many of those GB are sensitive data?
Motivation • Protecting the confidentiality, integrity, and availability of the University information assets is not only good business … … it is required by federal and state laws and by contractual requirements
Information Security Regulations • Family Educational Rights and Privacy Act (FERPA) • Gramm-Leach-Bliley Act (GLBA) • Health Insurance Portability and Accountability Act (HIPAA) • Payment Card Industry Data Security Standard (PCI-DSS) • State Notification Laws • Sarbanes-Oxley Act (SOX) • Federal Information Security Management Act (FISMA)
Private Personal Information • What is PPI? • Information that can be used to individually identify, contact, or locate a person, or may enable disclosure of this information • Aggregation may expose PPI – name and home address; SSN and bank account number; unique name and date of birth • Requirements relating to PPI • Non-public (“sensitive”) information that can be linked to an individual must be appropriately protected and handled on a “need to know” basis • Unauthorized disclosure of non-public PPI may harm an individual or the University • Regulatory requirement • Data Classification Guidelines https://www.itss.umich.edu/umonly/dataClass.php
PPI Examples (GLBA) • Social Security Number • Credit Card Number • Account Numbers • Account Balances • Any Financial Transactions • Tax Return Information • Driver’s License Number • Date/Location of Birth
PPI Examples (FERPA) • Grades / Transcripts • Class lists or enrollment information • Student Financial Services information • Athletics or department recruiting information • Credit Card Numbers • Bank Account Numbers • Wire Transfer information • Payment History • Financial Aid • Grant information / Loans • Student Tuition Bills • Ethnicity • Advising records • Disciplinary records
PPI Examples (HIPAA) • Patient Names • Street Address, City, Country, Zip Code • Dates related to individuals • Phone Numbers • Social Security Number • Account Numbers • Patient admission date • Patient discharge date • Medical record number • Patient number: Facility assigned • Unique patient number: ORS assigned • Procedure dates • Carrier codes (Insurance/HMO Name) • Patient zip‐code • Health care professional ID • Health care facility ID • Fax number • Health plan beneficiary numbers • Email addresses • Internet Protocol Address Numbers (IP addresses) • Web Universal Resource Locators (URLs) • Device identifiers and serial numbers • Certificate/License numbers • Vehicle identification numbers and serial numbers • Full face photographic images and any comparable images • Biometric identifiers such as finger and voice prints • Any other unique identifying number, characteristic, or code.
Threats • Fundamental threats • Loss of data • Compromise of data • Basic vulnerabilities • To the data • To the device where the data reside • To the data in transit
Threats to data • Type of data • Patient • Administrative • Research • Image • Threats • Corruption • Compromise • Online (malware) • Lost encryption key • ITAR/outlawed encryption
Threats to mobile devices • Devices • Laptops/tablets • Flash drives • PDAs • Cell phones • Digital cameras • Threats • Loss • Coercion • Confiscation • Theft
More motivation http://www.privacyrights.org/ar/ChronDataBreaches.htm
Countermeasures • Protect data at rest • Encryption • Protect data in transit • Encryption • Protect the mobile device • Physical security http://safecomputing.umich.edu/MDS/
Protecting data at rest • Data in permanent storage • Disk, tape, flash, optical • Standards-based solution: • Strong symmetric encryption • Accept no substitutes • Issue: key management • Key distribution • Key escrow
Secret-Key (Symmetric Encryption) Alice Bob k k sender receiver encryption decryption P C C P Ek Dk
Protecting data at rest • Free & built-in encryption: • Windows • Bitlocker • Encrypting File System (EFS) • Mac OS X • Encrypted disk image (Disk Utility) • FileVault • Linux • TrueCrypt (some assembly required)
Protecting data at rest • Some suggested third-party products: • Pointsec for PC and Pointsec for Pocket PC: Encryption software for PCs and Pocket PC devices. File, folder and full disk encryption. • SecureDoc and SecureDoc PDA: Encryption software for PCs and Pocket PC devices. File, folder and full disk encryption • DESlock+: File and folder encryption for PCs. • NMS for PC: File, folder and disk encryption for PCs. • PKWARE SecureZIP: File and folder encryption for PCs and Unix/Linux. • SafeBoot: File, folder and disk encryption for PCs. • PGP Desktop: File, folder (and optionally, disk encryption on PCs) encryption for PCs, Macs, and Unix/Linux. • GNU Privacy Guard (http://www.gnupg.org/) http://www.stanford.edu/group/security/securecomputing/mobile_devices.html
Protecting data in transit • Free & built-in encryption • VPN • Cisco VPN client (ITCom) • Mac OS X VPN client • SSH & SCP • SSH Secure Shell (U-M Blue Disk) • Data encryption • See “protecting data at rest”
Protect the mobile device • Secure the device • Lock it up, lock it down, out of sight • Secure the data on the device • Password protect a laptop • Remote wiping of data • DataDefense (Iron Mountain) • Data encryption • See “protecting data at rest” • Be aware of travel-related restrictions • Exporting crypto (ITAR) • Inpection & confiscation
Securing data on Flash Drives • Encrypted container on the flash drive • Software on flash drive encrypts and decrypts data in the container on the fly • User-supplied password • Demonstration: Lexar Jump Drive Secure II http://www.safecomputing.umich.edu/tools/download/securityshorts_encrypt_thumbdrive.pdf