people the last line of defence in cybersecurity
play

People the last line of defence in cybersecurity? Cristian-Mihai - PowerPoint PPT Presentation

People the last line of defence in cybersecurity? Cristian-Mihai Amarandei, B.Eng. (Hons), PhD cristian.amarandei@tuiasi.ro People the fjrst line of defence in cybersecurity? Cristian-Mihai Amarandei, B.Eng. (Hons), PhD


  1. People – the last line of defence in cybersecurity? Cristian-Mihai Amarandei, B.Eng. (Hons), PhD cristian.amarandei@tuiasi.ro

  2. People – the fjrst line of defence in cybersecurity? Cristian-Mihai Amarandei, B.Eng. (Hons), PhD cristian.amarandei@tuiasi.ro

  3. Motivation to break into systems ● Industrial espionage ● Financial gain ● Revenge ( disgruntled actual/former employees) ● Status ● ...

  4. Threats to Network Security ● Hackers ● Disgruntled employees ● Organizations: suported by some governements as spying technique, organized crime, terorrists ● Virues, trojan program, malware ... ● Social engineering: - the people factor ● ...

  5. Verizon 2016 Data Breach Investigations Report

  6. What can we secure? ● The network ● Block potential attackers and known means of attack ● secure connectivity with trusted users ● Activities that require secure connectivity ● Remote access to the internal network ● Access to applications and services (e-mail, web …)

  7. Social Engineering: the people factor ● Attackers can try to gain access through users ● Employees can be tricked to provide data access to resources ● Protect the end-user ● Organizations need a security policy and rigorous training program

  8. how ? ● Security Policies / Usage guidelines ● Purchase of specialized equipment and software ● Educate the end-user !!

  9. Spam detected in e-mails 40000 35000 30000 25000 20000 Mail Virus Spam 15000 10000 5000 0 01/10/17 02/10/17 03/10/17 04/10/17 05/10/17 06/10/17 07/10/17 08/10/17 09/10/17 10/10/17 11/10/17 12/10/17 13/10/17 14/10/17 15/10/17 16/10/17 17/10/17 18/10/17 19/10/17 20/10/17 21/10/17 22/10/17 23/10/17 24/10/17 25/10/17 26/10/17 27/10/17 28/10/17 29/10/17 30/10/17 31/10/17

  10. Some more details …. 100 90 80 70 60 50 Virus% Spam% 40 30 20 10 0 01/10/17 02/10/17 03/10/17 04/10/17 05/10/17 06/10/17 07/10/17 08/10/17 09/10/17 10/10/17 11/10/17 12/10/17 13/10/17 14/10/17 15/10/17 16/10/17 17/10/17 18/10/17 19/10/17 20/10/17 21/10/17 22/10/17 23/10/17 24/10/17 25/10/17 26/10/17 27/10/17 28/10/17 29/10/17 30/10/17 31/10/17 ● Total number of messages – 624,022 ● Detected spam 452,163 – 72,5%

  11. after spam detection and delivery of messages .. ● How many of the messages detected as spam contained possible attack vectors? ● How many of the messages that passed the detection system had potential attack vectors? − Where and from what devices have messages been read? − What did the user do?

  12. Security policy ● Is necessary if ● employees work with confjdential information ● data loss could result in severe financial loss ● organization has trade secrets ● the internet is used daily ● organization is subject to regulation for information security and privacy ( GDPR !)

  13. Security Policy ● Gives users guidelines on how to handle sensitive information ● Gives IT stafg instructions on what defensive systems to confjgure ● Reduces the risk of legal liability ● A good security policy is comprehensive and also fmexible ● Is a group of documents instead of a single document

  14. Security policy ● too complex – no one will follow ● fails if afgects productivity ● should state clearly what can and cannot be done in the organization network or on equipment and property ● must include generalized clauses ● people need to know why the security policy is importat ● and specifjc consequences for violating the policy !!

  15. Security policy ● must involve representatives of all departments ● needs support from the highest level of the company management ● employees must sign a document acknowledging the policy and agreement to abide by it ● updated with current technologies and consistent with applicable laws

  16. How do we know if the policies are well done? ● International standards and guidelines are available ● ISO/IEC 27002:2013 ● Payment Card Industry Data Security Standard (PCI DSS) - https://www.pcisecuritystandards.org ● National Institute of Standards and Technology (NIST) Cybersecurity Framework - https://www.nist.gov/cyberframework ● IASME - https://www.iasme.co.uk/

  17. What about the end-user? ● All employees / users must be educated about security dangers and security policies ● rigorous training program !! ● Employees are most likely to detect security breaches ● or then cay cause one ( accidentally !?) ● they can observe suspicious activities ● Enforcing the security policy !!

  18. People – the first or the last line of defence?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend