Top Banner
The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery
59

The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Dec 16, 2015

Download

Documents

Prosper Poole
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

The ABC’s of

Identity TheftPart One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery

Page 2: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Objectives

• Security Overview • Define “identity theft”

• Evaluate criminal methodologies

• Consider “protective” solutions

Page 3: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.
Page 4: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.
Page 5: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.
Page 6: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.
Page 7: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.
Page 8: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.
Page 9: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.
Page 10: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

SOURCE: Infoweek TechWeb Webcast of 2/17/2010

Page 11: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Interesting information (cont)…• The most alarming sources of malware attacks come from:

• Social Networking @ 31%• Web sites @ 29%• Email @ 17%

SOURCE: Infoweek TechWeb Webcast of 2/17/2010

Page 12: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Interesting information (cont)…• Facebook receives 15 million requests for service PER SECOND• 49 % of companies polled allow their staff to access Facebook

SOURCE: Infoweek TechWeb Webcast of 2/17/2010

Page 13: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Potential Threat Vectors…

• Wireless access points

• Email accounts

• Social networks

• Web site attacks on browsers

Page 14: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.
Page 15: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

“Vectors” of choice…

Page 16: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

A new site to watch (or not)…• Reported in Sunday’s New York Times

CHATROULETTE

Only three months old and has grown to tens of thousands of users

Page 17: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.
Page 18: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

During the 2nd half of 2008, 70 of the top 100 websites were found to have been

compromised or contained links to malicious sites.

Page 19: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

A recent Oracle survey…• Security threats are poorly understood• 33% of those polled stated identity theft was a potential barrier to online purchasing• 42% were worried that personal details might be intercepted• 30% stated they didn’t trust web site security measures

Page 20: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Fringe sites…

The problems only occur after the user decides to click the

link!

Page 21: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Identity Theft

Page 22: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Identity theft in its simplest form is the compromise and

use of your personal data for the purpose of

committing a fraudulent act.

Page 23: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

• It isn’t about credit card receipts

• It doesn’t always come from those unsolicited credit card company invitations

• It doesn’t happen from people looking over your shoulder at the ATM

Page 24: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

What they want…• DOB• SSN/National ID number• Online banking information• Email address and passwords• Mailing address• Telephone number

Page 25: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

• Access to your bank accounts

• Access to your credit card accounts

• Use of your personal data to secure credit • Use of your personal data to obtain fraudulent identification papers

Why they do it…

Page 26: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Criminal Methodologie

s

Page 27: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Cybercrime today has solid roots in Romania, Bulgaria and Russia.

Their “take” amounts to hundreds of thousands of dollars per day.

Page 28: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.
Page 29: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.
Page 30: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.
Page 31: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.
Page 32: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

• IP Address• Email Address• Facebook

Page 33: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.
Page 34: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

How they do it…• Overt “hacking”

• Trojans

• Key loggers

• Phishing/scam emails

Page 35: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Hacking• Remote access of private areas of the company server environment

Primarily access over the web 1) access into then company home page 2) access into sensitive files areas

• Unlawful or malicious removal of sensitive information

Internal/local access 1) USB drives 2) CD burners 3) Rogue wireless devices

Page 36: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Trojans

Potentially malicious executable files that access critical areas or files in your network or computer.

Page 37: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Key Loggers

Beware!

These executables have the ability to record ALL your password entries and then send them off to a specific address without you knowing it.

Page 38: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

“Phishing” and scam emails

Emails that solicit the recipient to divulge key information in order to gain access to specific data.

Page 39: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

How malware propagates…“botnet” is a term associated primarily with the negative aspects of malware distribution

Page 40: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

10,000’s Message Variants

10-15 Unique Site Designs

1,000’s URLs100’s Web

Servers

One Support Website

One Pharmacy

One Merchant AccountBillions of Messages

100,000’s Zombies

Page 41: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

The problems only occur when the user decides to click the

link!

Page 42: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.
Page 43: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

What looks “innocent” really isn’t. Would you provide this information

to a stranger?

Page 44: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

So, do you think this looks official and legitimate?

Page 45: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.
Page 46: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.
Page 47: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Protection Options

Page 48: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Anti-virus update…• Symantec (Norton) will leave the business

• McAfee is strengthening its position

• RSA is winning huge projects

• Sendio, Red Condor, AVG, etc…

Page 49: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

“Security” regulations…• HIPAA - Health Information Portability and Accountability Act

• HITECH - Health Information Technology for Economic and Clinical Health Act

• PCI - Payment Card Industry

• Sarbanes-Oxley

Page 50: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Protection methods…• Firewall

• Resident Antivirus app

• Spyware/Malware app

• Endpoint security

• Forensics

Individual

Corporate

Page 51: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Firewalls…• Use them

• Whitelists and blacklists

• Monitor the common ports

Page 52: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Resident antivirus protection…• BOT detection• Malware detection• Hidden executable file detection

Spyware/Malware protection…• BOT detection• Malware detection• Hidden executable file detection

Page 53: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Endpoint security is

used to control,

secure and monitor all methods of

data transfer

Page 54: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Spotting malware activity…• Malware morphs

• IRC traffic increases across the common ports

• Increases in antivirus file changes

• Outbound SMTP traffic increases

• Host file modification

Page 55: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Using the “cloud”…

Page 56: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

The solution can be on premise or in the “cloud”…• Premise-based solutions

• Cloud-based solutions

Page 57: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Your individual solution requires a “blended” approach…• Your firewall• Some sort of hardware or software “monitor”

Your corporate solution requires a “blended” approach as well…• Your firewall• Some sort of hardware or software “monitor”• Endpoint security with forensics

Page 58: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

The problems only occur when the user decides to click the

link!

Page 59: The ABC’s of Identity Theft Part One in a multi-part series of overviews on Disaster Avoidance, Business Continuity and Disaster Recovery.

Larry PyrzSimpleTel, Inc.

www.simpletel.biz

[email protected]

773-728-3315