170 likes | 305 Views
Data Privacy & Security - 2013 S -. Clinton E. White, Jr Professor of Accounting & MIS Lerner College of B&E University of Delaware. Google Privacy. What is the big deal about Google’s new privacy policy?. Google Privacy. What can you do about Google’s new privacy policy?. Mashups.
E N D
Data Privacy & Security- 2013 S - Clinton E. White, Jr Professor of Accounting & MIS Lerner College of B&E University of Delaware
Google Privacy • What is the big deal about Google’s new privacy policy?
Google Privacy • What can you do about Google’s new privacy policy?
Mashups • Greasemonkey: • JavaScript for customizing & mashing up Web sites:
Conficker • Conficker (November 2008) • The holy grail of botnets • Sept 2008 • Chinese hackers create & market a bot • Exploits Microsoft OSs • Uses port 445 • Executes a buffer overflow • Oct 2008 • Microsoft (out-of-band) patch • A flashing neon sign to hackers
Conficker • MS OSs • 65,000 + ports • Listening points in an OS • Port 445 • Triggers RPC (Remote Procedure Call) • Leads to administrator privileges • Buffer overflow technique • Code arrives & execution begins • Execution is interrupted & put in a temp stack with a pointer • The interruption overflows the buffer, overwrites the pointer & calls the malware
Conficker • The holy grail of botnets • Conficker A: • Downloads daily from 250 randomly generated domains • Conficker B: • Downloads daily from 250 domains over 8 TLDs • Disables AutoUpdates • Conficker C: • Conficker D: • Conficker E:
Security • Honeynets • Clusters of computers on the Internet monitoring, capturing, dissecting, and writing code to prevent malware • The Conficker Cabal • MS, Afilias, Neustar, ICANN, McAfee, Semantec, & others
Conficker • The holy grail of botnets • January 2009: • Estimated 15 million infected computers • Damage: • French Navy network … UK Ministry of Defense … Bundeswehr … City of Manchester … UK House of Commons • Mid-2012; • Estimated 1.7 million infected computers
The Crimeware Landscape • Viruses … Worms … Phishing … Identity Theft … Keyloggers … Injections • FBI • Credit card theft, intellectual property theft, net work intrusions - 1 million victims every day
Hacktivists • Hacktivists: • For fun and national pride • Anonymous • Collaborative hactivists • Saudi-Israeli • Credit cards • LulzSec team • Sony Pictures (2011), CIA website • Poison team • Anti-US, Israeli, UN, Facebook, …
TJ Maxx • Jan 2007: • Estimated 94 M credit & debit accounts
TJ Maxx • As internal and external auditors, what can we learn from this debacle?
The Problem • What if? • You could execute a cyberattack that crippled a country’s internet connection? • You could execute a cyberattack that would sabotage specific machines • You could execute a cyberattack to skim bank accounts • You could attack:
The Problem • The black hats • The good guys
Authentication • Question: • How would you authenticate a person doing an important transaction like a large financial transaction from a cell phone?
The “data breach” • Question: • How do you protect your IS from someone getting inside and accessing your data? • What can you do about it?