the user domain

16
The User Domain Kelly Corning & Julie Sharp

Upload: elmo-osborne

Post on 30-Dec-2015

39 views

Category:

Documents


0 download

DESCRIPTION

The User Domain. Kelly Corning & Julie Sharp. User Domain. The assets over which the users have control The people that have the control Domain of the AUP. Risks, Threats, & Vulnerabilities. Social Engineering Negligence Disgruntled Employee Attacks Lack of User Awareness - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: The User Domain

The User DomainKelly Corning & Julie Sharp

Page 2: The User Domain

User Domain

• The assets over which the users have control

• The people that have the control

• Domain of the AUP

Page 3: The User Domain

Risks, Threats, & Vulnerabilities

• Social Engineering

• Negligence

• Disgruntled Employee Attacks

• Lack of User Awareness

• Physical Security

• Security Policy Violations

Page 4: The User Domain

Social Engineering

Definition: A collection of malicious techniques used to manipulate people into performing actions or sharing information.

Examples:• Tailgating

• Phishing emails

• Pretexting

• Dumpster Diving

Think before you act!

Page 5: The User Domain

Negligence

• Prevent negligent hiring

• Retention

• Supervision

• Training

Employees need a reason to care!

Page 6: The User Domain

Disgruntled Employee Attacks

• The Exploit

• Attack Processo Reconnaissanceo Scanningo Exploiting the Systemo Keeping Accesso Covering Tracks

• Incident Handling Process

Keep your employees happy!

Page 7: The User Domain

Lack of User Awareness

• Ignorance of Policieso Employees need an appropriate level of awareness

for their position

• Apathy towards Policies

If people don't know the policies, how can they follow them?

Page 8: The User Domain

Lack of User Awareness

According to NIST...

• "Understand their roles and responsibilities related to the organizational mission"

• "Understand the organization’s IT security policy, procedures, and practices"

• "Possess at least adequate knowledge of the various management, operational, and technical controls required and available to protect the IT resources for which they are responsible."

Page 9: The User Domain

Lack of User Awareness

Levels of Awareness:

• Awarenesso Allows individuals to recognize security concerns and respond correctly

o Broad audience

• Trainingo Teaches skills to allow an employee to perform a specific function

• Educationo Integrates skills and competencies to allow an employee to see the big picture

and respond to an incident proactively

• Certificationo Involves testing to show that an employee has a specific level of knowledge on

a given topic

Page 10: The User Domain

Lack of User Awareness

Common Problems:• Teaching an old dog, new tricks

• Security is an information technology problem, not mine

• Implementation of new technology

• One-size-fits-all

• Too much information

• Lack of organization

• Failure to follow-up

• Lack of management support

• Lack of resources

• No explanation of why

• Social engineering

Page 11: The User Domain

Physical Security

• Deterrenceo Convince attackers that the consequences of getting caught

are not worth the potential payoff

• Access Controlo Gates, doors, locks

• Detectiono Alarm systems, motion sensors, contact sensors

• Identificationo Video monitoring

• Human Responseo Guards, emergency response personnel

Page 12: The User Domain

Physical Security

Quick tips:

• Don't leave confidential/sensitive information out in the open

• Protect portable devices

• Disable drives & ports to prevent copying

• Shred extras

• Lock doors

• Protection from environmental factors

• Record security camera video, keep videos

Don't make it easy for the bad guy!

Page 13: The User Domain

Security Policy Violations

• Be aware of incidents o Yourselfo Others

• Report incidents

• See that necessary action is taken

Don't ignore the problem!

Page 14: The User Domain

Acceptable Use Policy

1.Overview

2. Purpose

3. Scope

4. Policya. General Use & Ownership

b. Security & Proprietary Information

c. Unacceptable Use

i. System & Network Activities

ii. Email & Communications Activities

d. Blogging

Page 15: The User Domain

Acceptable Use Policy

6. Enforcement

7. Disclosure

8. Definitions

9. Revision History

5. Inappropriate Behavior

Page 16: The User Domain

ReferencesAcceptable Usage Policy Template. (2005, April 22). Retrieved March 24, 2013, from First:

www.first.org/_assets/resources/guides/aup_generic.doc

InfoSec Acceptable Use Policy. (2006). Retrieved March 7, 2013, from SANS: http://www.sans.org/security-resources/policies/Acceptable_Use_Policy.pdf

User Domain. (2007, August 25). Retrieved March 7, 2013, from http://c2.com/cgi/wiki?UserDomain

Negligence. (2012, November 21). Retrieved March 23, 2013, from Wikipedia: http://en.wikipedia.org/wiki/Negligence_in_employment

Childress, J. (2013, March). CS5493(CS7493) Secure System Administration and Certification . Retrieved March 8, 2013, from utulsa: http://personal.utulsa.edu/~james-childress/cs5493/cs5493.html

Giallombardo, A. (2012, September 25). Sample Acceptable Use Policy Template. Retrieved March 24, 2013, from Mafia Securtiy: https://www.mafiasecurity.com/disaster-recovery/sample-acceptable-use-policy-template/

Kratt, H. (2004, December 8). The Inside Story: A Disgruntled Employee Gets His Revenge. Retrieved March 23, 2013, from SANS: http://www.sans.org/reading_room/whitepapers/engineering/story-disgruntled-employee-revenge_1548

Russell, C. (2002, October 25). Security Awareness - Implementing an Effective. Retrieved March 23, 2013, from SANS: http://www.sans.org/reading_room/whitepapers/awareness/security-awareness-implementing-effective-strategy_418

Wilson, M., & Hash, J. (n.d.). INFORMATION TECHNOLOGY SECURITY AWARENESS, TRAINING, EDUCATION, AND CERTIFICATION. Retrieved March 25, 2013, from National Institute of Standards and Technology: http://www.itl.nist.gov/lab/bulletns/bltnoct03.htm