1.13k likes | 1.38k Views
University of Arizona Security Awareness Campaign. Kelley Bogart University Information Security Coordinator. Gil Salazar Network Administrator University of Arizona. Agenda. Why Awareness Challenges Solutions Benefits Costs Initiatives Demonstration. Why Awareness?
E N D
University of Arizona Security Awareness Campaign Kelley Bogart University Information Security Coordinator Gil Salazar Network Administrator University of Arizona
Agenda • Why Awareness • Challenges • Solutions • Benefits • Costs • Initiatives • Demonstration
Why Awareness? Campus Policy, Standards & Guidelines • Privacy Guidelines • Acceptable Use Policy • Security Policy – Draft • Supporting Security Standards & Guidelines • Business Continuity & Disaster Recovery • Incident Reporting • Management Responsibilities for Security • Networked Device Security
Why Awareness? (cont) • Heightened Activity • Regulatory Drivers • FERPA • HIPPA • GLBA • State Legislation (House Bills) • Online Privacy Statement • Misuse of State of Arizona Equipment • Many more to come
Why Awareness? (cont.) • Relationship of Privacy & Security • Roles and Responsibilities
Where to start and how? • Step 1: Where are we now? Current Situation Assessment • Step 2. Where do we want to be? Strategic Direction • Step 3 - How do we plan to get there? Implementation Planning • Step 4 - How will we monitor progress? Monitoring
Goal: Set the stage for all security efforts by bringing about a change in attitudes, which will change the campus culture. University of Arizona Characteristics Level 5 CONTINUOUS IMPROVEMENT Threats are continually reevaluated based on changing threat population and security incidents. Additional or more cost effective alternatives are continually identified. The practice of Security is considered a component of the campus culture. Security Awareness is viewed as a business enabler. Level 4 COMMON PRACTICE The integration of Security programs and services in the campus departments is complete. Security is involved at the onset of projects. U of A is considered as a Security Awareness Best Practice campus. General acceptance of campus-wide standards based on Security Infrastructure and displayed through noticeable behavior change. Staff, faculty and students actively and visibly participate in the programs and services. Security incidents are reported immediately to the appropriate area. Level 3 INTEGRATION Level 2 ACKNOWLEDGEMENT Realization that existing Information Security processes are fragmented. Executive level support and involvement is visible. Some Security Awareness interventions are implemented and are ongoing. Level 1 COMPLACENCY Security Policies & Standards are minimal and may or may not be documented. Security Incidents are viewed as someone else's problem. Existing programs and services are perceived as sufficient. Security is viewed as an enforcer.
Challenges • Funding & Resources • Diversity and Decentralization • Varied Audiences • Administrators • Students • Staff • Faculty • Technical vs. Non-technical
Solutions • Message vs. Delivery Method • Timeline / Opportunities • Surveys • Include WIIFM - What’s in it for me? • Include Knowledge, Skill and Attitude • The What, How & Why or Want to do
The following three slides are a consistent message we communicate or incorporate in our awareness / education efforts to help reinforce the message that Security is Everyone's responsibility! That technology alone cannot keep us secure. People are the last layer of defense.
The key to security is embedded in the word security. U - R - IT SEC--Y YOU ARE IT!
If not you, who? If not now, when?
During your typical day, you may be exposed to situations where you become aware of an attempt to breach an area of security. You need to be prepared to: Protect Detect React
Benefits • Heightened Awareness • Key Partnerships formed • Campus wide understanding, acknowledgement and support • Recognition of Security Office • Increased reporting & requests
Costs • Pamphlets • Security Awareness Day • Dedicated Staff • Posters
Initiatives • Monthly “Brown Bag” Presentations • Customized group presentations • Redesigned Security Page security.arizona.edu • Campus Security Awareness Day security.arizona.edu/awarenessday.html • New Employee Orientation Handout
Initiatives (cont.) • Pamphlets • Privacy Basics - Guide to Protecting Personal Information • Risk Reduction - Computer Protection and Prevention • Security Basics - Guide for Protecting Your Computer • Computer Security and Privacy Information - What everyone needs to know • Security Awareness Posters security.arizona.edu/posters.html
Goal: Set the stage for all security efforts by bringing about a change in attitudes, which will change the campus culture. University of Arizona Characteristics Level 5 CONTINUOUS IMPROVEMENT Threats are continually reevaluated based on changing threat population and security incidents. Additional or more cost effective alternatives are continually identified. The practice of Security is considered a component of the campus culture. Security Awareness is viewed as a business enabler. Level 4 COMMON PRACTICE The integration of Security programs and services in the campus departments is complete. Security is involved at the onset of projects. U of A is considered as a Security Awareness Best Practice campus. General acceptance of campus-wide standards based on Security Infrastructure and displayed through noticeable behavior change. Staff, faculty and students actively and visibly participate in the programs and services. Security incidents are reported immediately to the appropriate area. Level 3 INTEGRATION Level 2 ACKNOWLEDGEMENT Realization that existing Information Security processes are fragmented. Executive level support and involvement is visible. Some Security Awareness interventions are implemented and are ongoing. Level 1 COMPLACENCY Security Policies & Standards are minimal and may or may not be documented. Security Incidents are viewed as someone else's problem. Existing programs and services are perceived as sufficient. Security is viewed as an enforcer.
§ ¦ µ Gil Salazar UA Network Administrator Kelley Bogart Information Security Coordinator
Agenda • State of the Internet today • Viruses, Worms & Spies! • How to Protect Yourself
State of the Internet Today Internet goes thru your computer
Some Local StatisticsUniversity of Arizona Campus Cyber attacks per day # of outside to inside attacks : 64,959 # of Inside to outside attacks : 60,040 # of Inside to Inside attacks : 6,941 Total of related victim machines : 593,734
Threat Follows Value The 1950s American bank robber Willie Sutton was asked why he robbed banks. He said he robbed banks because, “That’s where the money is.” Today, the money is in Cyberspace! The Internet provides for criminals the two capabilities most required for the conduct of criminal activities: Anonymity & Mobility
Do The Math • Spam mailed to over 100 million inboxes • If 10% read the mail and clicked the link • = 10 million people • If 1% of people who went to site signed up for 3-days free trial • = (100,000 people) x ($0.50) = $50,000 • If 1% of free trials sign up for 1 year • = (1,000 people) x ($144/yr) = $144,000/yr
Situation: It is getting scary! Most attacks occur here Why does this gap exist? Product ship Vulnerability Discovered | Potential attack Software Modified Patch released Patch deployed at home/office
exploitcode patch 331 180 151 1 ZoTob 25 Nimda SQL Slammer Welchia/ Nachi Blaster Exploit Timeline • Days From Patch to Exploit • The average is now nine days for a system to be reverse-engineered Why does this gap exist? Days between patch and exploit
Exploit Survival Time • The SANS Institute has studied what it calls the "survival time" of an unprotected computer hooked up to the Internet. • A year ago, the average time before it was compromised was about 55 minutes. • Today it's 20 minutes. • On the UA campus it can be less then ONE MINUTE.
State of the Internet Questions? • Why do criminals use the internet today? • To be Anonymous & Mobile
Virus: • Old “traditional” viruses usually required human interaction • You have to save it, run it, share floppy disks • E-mailing a program / document, without knowing it is infected • Typically just attach themselves to programs & documents, and then depend on humans to propagate • This is changing…
How It Spreads • E-mail • Instant Messenger • Networks • P2P/Filesharing software • Downloads • Floppy disks, Flash Drives. CDs, etc.
Sample E-Mail................... This has a virus attached! • To: user@email.arizona.eduSubject: Notify about your e-mail account utilization. From: support@arizona.edu • Dear user of Arizona.edu gateway e-mail server, • Your e-mail account will be disabled because of improper using in next three days, if you are still wishing to use it, please, resign your account information. For further details see the attach. For security reasons attached file is password protected. The password is "03406". Best wishes, The Arizona.edu team http://www.arizona.edu
Questions? Virus: • What is the most common way viruses are spread today? • E-Mail
Worms: • Sub-class of Virus • Replicated Automatically without human help • Example is e-mail address book attack • Bogs down networks and Internet • Zotob, Blaster are examples
Worms: • Scary part – you don’t have to do anything but turn your computer on! • Or make a simple click.
Trojan Horse • Program that appears to be a “good” program, but really isn’t • Might do what it is supposed to, plus a whole lot more! • programs installed in this category use several methods to enter the computer; • Web, e-mail, spyware
Botnets or “Zombies” • Botnets are networks of captive computers (often called zombies) that are created by trojans or worms that have infected unprotected PCs. • These networks are frequently used to send spam and initiate distributed denial of service (DDoS) attacks.
Questions? Worms: • What is it called when a program sneaks onto your computer? • A Trojan
Have you ever received an email that says something like this? “We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity.” OR “During our regular verification of accounts, we couldn’t verify your information.Please click here to update and verify your information.”