Professional Documents
Culture Documents
SGGSC
SGGSC
Potential Vulnerabilities
Methods used to obtain Critical Information:
Unprotected communications
Sharing too much with strangers HUMINT Observations Technology Trash Media Email Web pages Social Networking Sites
Social Networking
Social Networking Sites (SNS) allow people to network, interact and collaborate to share information, data and ideas without geographic boundaries.
technology is essential..
All the policies and processes in the world wont effectively protect an organization without the right technology in place. To that end, the organization must use security solutions that scan traffic for malware, data leakage, and other suspicious activity. And it must actively monitor the environment.
connections, etc.) are in place? Are there authentication procedures? What authentication protocols are used for local area networks, wide area networks and dialup servers? Who has the responsibility for security administration? What type of network media, for example, cables, switches, and routers, are used? What type of security do they have? Is security implemented on file and print servers? Does your organization make use of encryption and cryptography for use over the Internet, Virtual Private Networks (VPNs), e-mail systems, and remote access? Does the organization conform to networking standards?
The Danger:
Bad guys use it, too:
Stalkers Thieves Terrorist Hackers Phishers/Scammers Enemy organizations Pedophiles And the list goes on
SOCIAL NETWORKING
DOs
Remember Computer Security
Do not be an easy target for computer crimes
Hacking Theft Planted code
DOs
Verify All Friend Requests Social engineering and conning starts with a friend request
Adversaries can get the data from: Free people search engines Other SNSs Your posts/profile Your friends posts/profile
DOs
Utilize All Available Privacy Settings
Customize available settings to be as secure as possible
Everyone may be accessed by anyone with access to the internet
How many security settings are available on Facebook?
DOs
Verify Links & Files Before Executing
Would you follow a link in e-mail? Would you download and run an attachment? Then why do you do these things on SNSs?
Phishing scams Malicious coding Viruses Scareware
DOnts
Dont Use the Same Passwords
Hackers count on users using the same passwords for multiple accounts Password1 is not a strong password
DOnts
Dont Depend on SNSs Security Settings
But its set to private right?
Hackers Incorrect or incomplete settings Sale of data Upgrades/site changes Risks inherent in sharing information USE AT YOUR OWN RISK. We do not guarantee that
DOnts
DOnts
Dont: Grant the Same Access to Everyone
Dont treat all Friends equally Control & customize individual access Do create groups
Poker club Family
DOnts
Dont: Discuss Details
Never post anything you
would not tell directly to the enemy Never post private or personal information- no matter how secure you think your settings are Assume the information you share will be made public
A User-Server-Agent Model
USER
View Audition Log
SERVER
A User-Server-Agent Model
Server audits users activities Log in time, duration, IP addresses, access information Users can view activities
Audits all access information
of specified accounts
A User-Server-Agent Model
Accepts Investigation Requests Step I Provides Results to User
A User-Server-Agent Model
What a user sees
Kevins visit Bellas visit Saras visit Mikes visit Daves visit . . .
USER
A User-Server-Agent Model
Agent receives decrypted request from user
Alice sends request for concern about Kevins activities Agent will see 03tn90a and 01ad53h in stead of Alice and
A User-Server-Agent Model
What action can an agent perform?
Use combined policies to detect unusual activities: IP address,