Title: Information Security Overview
1Information Security Overview
- Tony Letts
- Team Lead Information Security and Networks
2Agenda
- Who is Chick-fil-A?
- What is information security?
- Why should I care?
- What are some trends for the future?
- What can I do?
- Questions?
3Who is Chick-fil-A?
4Chick-fil-A Business Overview
- Our Corporate Purpose
- To glorify God by being a faithful steward of all
that is entrusted to us. - To be a positive influence on all that come in
contact with Chick-fil-A - Key Words
- Glorify God
- Stewardship
- Positive Influence on People
5Chick-fil-A Business Overview
- Founded by Truett Cathy
- 1st to Market with the Chicken Sandwich
- 1070 Restaurants in 35 states
- 1.37 Billion in revenue last year
- Owner/Operator model
S. Truett Cathy Founder and Chairman
6Chick-fil-A Business Overview
- 2 Primary Roles of the Home Office
- Support Restaurants
- Services (Accounting, Purchasing, I.T., etc.)
- Products (systems, marketing materials, etc.)
- Open New Restaurants
- 2 per week (on average)
- 60-80 active deals in the pipeline
- 180 day cycle
- 1/3 of home office staff
7What is security?
- Merriam-Webster
- the quality or state of being secure
- freedom from fear or anxiety
- measures taken to guard against espionage or
sabotage, crime, attack, or escape
8What is information security?
- Webopedia defines it as techniques for ensuring
that data stored in a computer cannot be read or
compromised.
9Ten Domains of Security ISC2
- Security Management Practices
- Access Control Systems
- Telecommunications and Network Security
- Cryptography
- Security Architecture and Models
- Operations Security
- Applications and Systems Development
- Business Continuity Planning and Disaster
Recovery - Law, Investigations, and Ethics
- Physical Security
10What is information security?
- Integrity
- The protection of information from intentional,
unauthorized, or accidental changes. - Confidentiality
- The protection of information from unauthorized
access. - Availability
- The assurance that information and resources are
accessible by authorized users as needed.
11Why should I care?
- Its only kids hacking for credit cards and
defacing websites, right? - Hackers like these things but there is a bigger
picture. - Worms
- Economic Crimes
- Hacking Recreation
12Worms
- Self-replicating unlike viruses
- Exploit a vulnerabilities
- Force their victims to search out other
vulnerable systems. - Examples Slapper, Code Red, Nimda, Leaves, Lion
13Slapper Worm
- Slapper Worm victimized over 30,000 systems
- 1 (339) of these victims were used to attack a
US intelligence agency - The agency was down for 26 hours
- Over 1,000,000 packets of data per second
- They only came back up because the hacker decided
to stop
14Code Red and Nimda
- Both of these worms exploited Microsoft IIS.
- 150,000 to 300,000 victims
- Clean-up costs were around 80 million in direct
labor. 300-600 per system. - Left back doors that could be used by any hacker.
15Financial Crimes
- Credit Card Theft
- System break-in nets hackers 8 million credit
card numbers ComputerWorld 2/24/03 - FBI warns e-commerce sites about organized
hacker groups in Russia and the Ukraine
InfoWorld 3/9/01
16Financial Crimes
- Identity Theft
- The FTC received reports of over 120,000 cases of
identity theft in 2001. The numbers continue to
grow. - Website manipulation (not defacement)
- Posting false information
- Compromise of consumer trust
17Hacker Recreation
- Website defacement
- Loss of privacy
18A hacker is watching this guy through his web cam
19(No Transcript)
20Privacy
- They can read all your e-mail
- Send e-mails to anyone posing as you.
- Look at personal files on your computer
- Delete files from your computer.
21I should care because
- Major costs for organizations
- Worms and DDoS attacks
- Economic crimes - extortion
- Web defacement
- Loss of privacy
- It is not just a problem for Corporate America
it can strike at home too.
22What are some future trends?
- Web Application Attacks
- Super Worms
23Web Application Attacks
- Why are Web Applications Targets?
- Typically worse with regards to security than
shrink-wrapped applications -- WOW! - Usually not tested as thoroughly
- Payoff is big, lots of valuable
personal/financial information
24Brute Force Authentication
- Attack
- There are free tools available to automate the
guessing of passwords - Defense
- Educate users on selecting strong passwords
- Log failed attempts and check logs regularly
25SQL Injection
- Attack
- This technique attempts to manipulate a back-end
database using the web applications itself by
adding information to a SQL statement.
26SQL Injection
- Attack
- A web app typically takes user input and places
it into a SQL statement - select field from table where variable
value - update table set ltvariablegt ltvaluegt
- Once the hacker has targeted a user input string
they use standard database logic and start having
fun. Dropping tables, updating tables, querying,
etc...
User Input
27SQL Injection
- Defense
- Server side filters. Define what characters are
OK and filter everything else - Client side filters can be bypassed.
- Search your entire application for
vulnerabilities. - It only takes one screen to give the hacker a way
in.
28Super Worms
- Worms to date have only exploited one
vulnerability and have been isolated to one
platform - SQL Slammer
- SQL vulnerability
- Microsoft
- Slapper
- Apache
- Linux
29Super Worms
- Next Generation worms
- Multi-exploit
- Multi-platform
- Zero Day
- Polymorphic
- Fast spreading
- Metamorphic
- Nasty Payload
30What are some future trends?Summary
- A new focus on web applications.
- Data gathering
- Fraud
- Malicious intent
- Just for fun
- Super worms
- The internet will likely be down for a couple of
days Internet snow days ?
31What can I do?
- Be a responsible Internet user
- Dont open e-mail from users you dont know
- Always save e-mail attachments to your hard drive
first and scan for viruses before opening. - Anti-virus software is a must! Keep it updated!
- Dont click on URL links inside of e-mails The
code behind the link may take you to a malicious
site. - When downloading software from websites, check
other sites and compare. Hackers are targeting
software distribution sites.
32What can I do?
- Be a responsible employee
- Does your computer have antivirus software on it?
(Hopefully you Information Security department
has done its job) - Use the internet for business purposes. Browsing
for fun is when you get in trouble. - Choose difficult to guess passwords
33What can I do?
- Be a responsible IT professional
- Build secure applications. Think about security
in the beginning, dont tack it on later. - Databases should include security in the design
phase. Create layers of security that will keep
users accountable for the information they
attempt to access.
34Within an organization information security is
only as strong as its weakest link. Dont be a
weak link!
35References
- SANS' Information Security Reading
Roomhttp//rr.sans.org - The Open Web Application Security Project is a
great resource for creating secure web
applicationshttp//www.owasp.org - General Security Newshttp//www.securityfocus.com
36Questions?