290 likes | 482 Views
Image from this Site. ( 2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers. Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson, Benjamin Nikolay. What Occurred. UWM discovered Malware Infection, May 25, 2011 Affected Server was I mmediately Shutdown
E N D
Image from this Site (2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson, Benjamin Nikolay
What Occurred • UWM discovered Malware Infection, May 25, 2011 • Affected Server was Immediately Shutdown • Authorities were called in to investigate Image from this Site ("Information on Computer," 2011)
What was Found • UWM found Malware had access to SSNs, June 30, 2011 • No evidence of Identity Theft was found • No suspects were found View TMJ News Video - http://www.todaystmj4.com/news/local/127459218.html ("Information on Computer," 2011)
Notification and Plan • UWM notified effected individuals, August 10, 2011 • They were asked to monitor their credit reports • UWM updated security on Servers Image from this Site ("Information on Computer," 2011)
EASy Project - CobiT Evaluate Analyze Synthesize
5.1 Manage Security Measures • UWM Objective Failure • Security was updated in reaction to Breach • Risk Management Training • Re-evaluation of IS roles and responsibilities • Risk Assessment • Regular Business/IT Management Meetings • Cost = $8118 Image from this Site Analyze Synthesize
5.2 Identify, Auth., and Access • UWM Objective Failed • Inferred malware access obtained via weak Admin password • Dictionary Attack • Use Radom Password Generator • Setup automated Password Expiration • Password History • ACL Access Limitation • Hardware and Port Lockdown • Cost = $minimal Image from this Site Analyze Synthesize
5.3 Security of Online Access to Data • UWM Objective Passed • UWM has a solid “Admin Access” policy • No Recommendations Needed Image from this Site Analyze Synthesize
5.4 User Account Management • UWM Objective Passed • UWM requires use of “Strong” Passwords • Multiple characters types required • No Recommendations Needed Image from this Site Analyze Synthesize
5.5 Management Rev. of User Accounts • UWM Objective Passed • UWM requires use of “Strong” Passwords • Auditing of Passwords is performed randomly • No Recommendations Needed Image from this Site Analyze Synthesize
5.6 User Control of User Accounts • UWM Objective Failed • Inferred - Server Admin. Account Compromised • Delay in recognition of illicit activity • Provide users history of prev. activity at login. • Implement Active Directory Audit Tool (AD Audit Plus) • Cost = $7680 annually Image from this Site Analyze Synthesize
5.7 Security Surveillance • UWM Objective Failed • Insufficient audit trail to catch the intruders • Far too much elapsed time before those affected were notified • Verify existing configuration / make changes (Windows Group Policy / Auditing tools) • Research and assess possible 3rd party tools • Cost – Variable or minimal, depending on option selected Analyze Synthesize
5.8 Data Classification • UWM Objective Passed • Sensitive data classifications do exist • Data was separated and housed on different systems • No Recommendations needed Analyze Synthesize
5.9 Central Identity And Access Rights Management • UWM Objective Passed • Scalability as an enterprise level network • Thousands of user accounts and various types • No Recommendations needed Analyze Synthesize
5.10 Violation and Security Activity Reports • UWM Objective Failed • Security activity was insufficiently logged • Inability to track/catch the attacker • Checked and escaladed on a regular basis? • Refer to 5.7 recommendations • “Common Sense Security Auditing” • Cost – Variable, depending on route taken Analyze Synthesize
5.11 Incident Handling • UWM Objective Failed • Attackers were never caught • 2 months had elapsed before notifying those affected • Continuously evaluate system/audit security on a regular basis • Evaluate/revise procedures and auditing as necessary • Cost – variable to minimal Analyze Synthesize
5.12 Reaccreditation • UWM Objective Passed • UWM will setup times to perform audits on their network • No Recommendations Needed Analyze Synthesize
5.13 Counterpart Trust • UWM Objective Failed • Hacker gained access through open firewall ports • Purchase and install a new firewall • SonicWall NSA E7500 • Features Next-Generation Firewall, & Intrusion Prevention. • Cost = $35,339 Image from this Site Analyze Synthesize
5.14 Transaction Authorization • UWM Objective Failed • UWM’s spyware failed to deny the outside attacker from gaining access. • Purchase security add-ons to the NSA E7500 firewall. • Included is anti-virus and spyware, and application intelligence on the firewall. • Cost = $14,514 for 3 years. Analyze Synthesize
5.15 Nonrepudiation • UWM Objective Irrelevant • There were no transactions or digital signatures needed in this type of security breach. • No Recommendations Needed Analyze Synthesize
5.16 Trusted Path • UWM Objective Passed • UWM has a excellent records and retention policy to explain how to transfer data. • No Recommendations Needed Analyze Synthesize
5.17 Protection of Security Functions • UWM Objective Passed • Malware bypassed tamperproof security measures • Security design of infrastructure kept confidential • No Recommendations Needed Analyze Synthesize
5.18 Cryptographic Key Management • UWM Objective Failed • Cryptography Encryption Keys were not used • Unlikely attackers accessed data • Implement asymmetric database encryption • Use DSS encryption technology with private and public keys • Cost - $12,500 Analyze Synthesize
5.19 Malicious Software Prev., Detect. And Corr. • UWM Objective Failed • Failed to prevent the malware to install • Physical firewall and configuration remained private • Symantec Endpoint Protection 12.1 • SEPM Training for IT department • Policy and Procedure creation and implementation • Cost - $40.89 per device per year $3761.57 for training Analyze Synthesize
5.20 Firewall Arch. And Connect. With Public Networks. • UWM Objective Passed • No data was transmitted to the WAN • Firewall did not play a role in this incident • No Recommendations Needed Analyze Synthesize
5.21 Protection of Electronic Value • UWM Objective Irrelevant • Integrity of physical mechanisms maintained • Unrelated to physical access or authentication of foreign devices. • No Recommendations Needed Analyze Synthesize
End of Presentation EASy as Pie!
End of Presentation EASy as Pie!
End of Presentation EASy as Pie!