cybersecurity solutions
play

Cybersecurity Solutions Jessie Pudelek Kevin Hill This manuscript - PowerPoint PPT Presentation

FERMILAB-SLIDES-19-037-CD End-User Security: A Cornerstone of Defense-in-Depth Cybersecurity Solutions Jessie Pudelek Kevin Hill This manuscript has been authored by Fermi Research Alliance, LLC under Contract No. DE-AC02-07CH11359 with the


  1. FERMILAB-SLIDES-19-037-CD End-User Security: A Cornerstone of Defense-in-Depth Cybersecurity Solutions Jessie Pudelek Kevin Hill This manuscript has been authored by Fermi Research Alliance, LLC under Contract No. DE-AC02-07CH11359 with the U.S. Department of Energy, NLIT 2019 Office of Science, Office of High Energy Physics

  2. Speakers • Jessie Pudelek • Kevin Hill Fermilab Fermilab Cybersecurity Analyst Cybersecurity Analyst • Contact: • Contact: kevinh@fnal.gov jpudelek@fnal.gov 630-840-2068 630-840-5464 2 5/1/2019

  3. Outline • Background on the importance of cybersecurity awareness as part of end-user security and defense-in-depth • Review of Fermilab’s upgraded cybersecurity awareness platform • Discussion on how Fermilab’s Cybersecurity Team is evaluating the effectiveness of the upgraded awareness platform 3 5/1/2019

  4. Statistics regarding the targeting of end-users • 98% of cyber attacks rely on social engineering • 91% of cyber attacks start with a phishing email • Credential compromise rose 70% in 2018 compared to 2017 • Business Email Compromise (BEC) scams account for over $12 billion in losses • 15% of people successfully phished will be targeted at least once more time within the year https://www.knowbe4.com/hubfs/PhishingandSocialEngineeringin2018.pdf https://www.darkreading.com/endpoint/91--of-cyberattacks-start-with-a-phishing-email/d/d-id/1327704 https://www.proofpoint.com/us/security-awareness/post/latest-phishing-first-2019 https://retruster.com/blog/2019-phishing-and-email-fraud-statistics.html 4 5/1/2019

  5. Example: Alamogordo, New Mexico • July 2018 • Procurement officer for city of Alamogordo received a legitimate-looking email from an agent representing the Cooperative Education Exchange (CES), a real co-op that the city works with • The email said that CES banking info needed to be changed to pay outstanding invoices • The only phishing indicator was an outdated version of the CES logo • The email was forwarded to the Finance Department, who paid the requested $250,000 • Scam was discovered when the real CES inquired about a real payment that the city thought it had already paid • Two scams: Procurement officer and finance department https://blog.knowbe4.com/250000-ceo-fraud-in-a-municipal-finance-department 5 5/1/2019

  6. Humans are an easy target • General attacker goals: – Monetary gain – Steal credentials – Run malicious code – Use computer as part of a botnet • Social engineering is the easiest way for attackers to achieve their goals • Social engineering is used because it works; humans still fall for these schemes Until attackers stop targeting humans, the need for cybersecurity awareness remains. 6 5/1/2019

  7. Social engineering and Fermilab • June 2017 Fermilab Cybersecurity sent the first test phishing email to the lab community • Standard UPS package delivery scam • 2748 mailboxes received the message • 27% clicked on the ‘malicious’ link • 28 users reported the message 7 5/1/2019

  8. Cybersecurity Team addresses the problem • New security awareness website – Blog articles – Printable handouts – Video lessons – Suspicious Emails of the Week page • New branding – Logo and slogan – User-friendly contact information • Updated events – Cybersecurity Awareness Day – Cyber Sleuths Phishing Awareness Campaign – Outreach 8 5/1/2019

  9. Security Awareness Website • One central location for all cybersecurity awareness materials • Dynamic content • Materials include: – Articles – Suspicious Emails of the Week – Resources – Video series securityawareness.fnal.gov 9 5/1/2019

  10. Resources – Suspicious emails of the week • Resource to highlight phishing emails that are circulating at the lab for that week • Contains a screenshot, short description, and date it was reported • Intended to help Fermilab community identify phishing emails • Secondary benefit: encourages reporting • Related resource: Legitimate emails page 10 5/1/2019

  11. Resources – Printable handouts • Available from the left-hand menu on securityawareness.fnal.gov • Contains pdf handouts with detailed information for how to identify phishing emails • PDFs can be saved and/or printed for future use 11 5/1/2019

  12. Resources – Video series • Multi-modal security awareness platform • Irwin’s Cybersecurity Corner is a quirky video series featuring Fermilab CISO Irwin Gaines • Covers many topics from IOT to phishing scams • https://www.youtube.com/watch ?v=uTQT53hrWrU 12 5/1/2019

  13. New branding and slogan • Computer Security Team becomes Cybersecurity Team • New logo represents the partnership between the Cybersecurity Team (CST), lab management, users to keep the lab cyber secure • New email address to simplify reporting • Slogan drives home this point: Cybersecurity is everyone’s responsibility! 13 5/1/2019

  14. New branding continued Lock-shaped contact cards provide details on all cybersecurity awareness resources and contact information. front back 14 5/1/2019

  15. Events – Cybersecurity Awareness Day • Yearly event with cybersecurity training and presentations • Theme: Cybersecurity Starts with You! • Updated materials • Collaboration for presentations • Cartoon Irwin selfie station and video series 15 5/1/2019

  16. Events – Cyber Sleuths • October DHS Cybersecurity Awareness Month • Sleuths = mascots of phishing awareness • Materials included: – Video lesson on phishing – Posters – Blog articles – Weekly tips 16 5/1/2019

  17. Events - Outreach Goal: Consistently remind members of the Fermilab community what they do matters, and they have an active role in cybersecurity. • Increased cyber training presentations to various groups in the lab community • Special training for summer students and interns • Participation in STEM outreach • Remedial phishing training 17 5/1/2019

  18. Evaluating new awareness program • Phishing assessment metrics dropped – 10/17 FedEx Tracking Email: 13% clickthrough rate – 07/18 UPS Notification Email: 13% clickthrough rate • Reporting metrics rose – 10/17 FedEx Tracking Email: 110 reports – 07/18 UPS Notification Email : 141 reports • People are engaged in cybersecurity awareness – Positive feedback on Irwin video series – Positive feedback on Cyber Sleuths 18 5/1/2019

  19. Evaluation continued • Phishing assessments based off real phishing reports and broken into categories to evaluate clickthrough trends – PayPal assessment: 1% – Facebook assessment: 6% – LinkedIn request assessment: 11% • Reporting increasing in general – Increased level of questions – Increased number of people asking for email reviews 19 5/1/2019

  20. Moving forward…awareness and training • Continued research on psychology of clicking • Continued investigation of phishing categories and targeted phishing groups • Continued outreach and education based on current events and results of phishing assessments • Continued education on all topics in cybersecurity to help people at work but also at home 20 5/1/2019

  21. Moving forward…technical improvements • Multi-modal security awareness platform extending to technical solutions • Training is important, but not the only way Fermilab is working to secure users • Enter the PhishAlarm button – Simplifies reporting for Outlook users and increases reporting – Performs automated analysis – Integrates into our security controls for automatic black-hole routing 21 5/1/2019

  22. Overview of Beholder • Beholder is a custom system at Fermilab to coordinate system scanning and blocking – Networking systems notify Beholder when new system is connected to network – New systems are scanned with multiple scanners – Scan results are analyzed for blockable vulnerabilities – Vulnerable systems are blocked, users are notified – User can fix issue and request access via Service Now tickets 22 5/1/2019

  23. Overview of Phish Reporting • Traditionally people manually forwarded suspected phish to cybersecurity • Cybersecurity primary would manually review and block as necessary • Report Phish Add-in adds button to report suspected phish in outlook clients on Windows, Mac and Android 23 5/1/2019

  24. Phish Reports Phish reports include useful information: • Phishing certainty • Domains that handled the emails • Links in the email 24 5/1/2019

  25. Analyzing Phish Reports • Traditionally the phishing reports have to be reviewed manually • Suspect URLs need to be blocked • Can we remove this delay? • Yes! 25 5/1/2019

  26. Integrating Phish Reports into Beholder • Phishing analysis reports are emailed to account that filters via procmail Listserv • Procmail recognizes phishing analysis reports and hands email to a python script Procmail • Python script extracts hostnames in the Python phishing links • Hostnames are added to beholder via http api Beholder call 26 5/1/2019

  27. Interpreting Imported URLs • Phishing reports list all links in the phish emails, not just suspected malicious links – Need to make sure we don’t block google.com, URL shorteners, OneDrive, etc. • Imported hostnames get tagged as potential phishing links in Beholder • Someone from Cybersecurity Team either blocks or whitelists the hostnames as necessary • Will automate process once the number of new whitelist entries drops 27 5/1/2019

  28. Questions? 28 5/1/2019

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend