Title: Department of Revenue
1Department of Revenue
H_at_king! Lessons for Management by Department
of Revenue Internal Audit
2Presentation Objectives
- Identify Electronic Intruders
- Demonstrate their methods
- Propose a plan of defense
3Systems involved
- Unix/Linux Systems
- Microsoft NT Networks
- Novell Network
- Mainframe Systems
4Protection Methods
- Login ID and Password.
- Encryption
- Secure transmission
5Why secure systems/data?
- Maintain Data Integrity by preventing
- unauthorized modifications
- data corruption (viruses, etc)
- Prevent Theft
- privacy violation
- information theft (SS, credit card, etc)
- Maintain Service
6How is data accessible?
- Internet
- Dialup Access
- Physical Connection (Network Outlet)
7Identifying the Electronic Intruders
- Disgruntled employees
- Contractors
- Hackers
- Insufficiently trained employees
8Forms of Attack
- Sniffing
- Password cracking
- Syncflood
- Ping of Death
- Feature Exploitation
- Port Scanning
- Social Engineering
9Demonstrations
10Vulnerabilities
- Passwords too short/simple/obvious
- Login accounts of people no longer in the
organization being left activated - Lack of Data Encryption
- Lack of system monitoring tools
- Insufficiently trained security/audit personnel
11Vulnerabilities (continued)
- Shared login accounts (passwords)
- Dialup login password is a general password
- Not using screen savers
12PreventionManagement Perspective
- Tone at the top
- Organizational structure
- Budgeting
- External Review (Penetration Tests)
- Recovery Plan
13PreventionTechnical Perspective
- Reliable data backup (including testing the
backed-up data) - Hardware redundancy/clustering
- System monitoring/sniffing
- Diligent maintenance of accounts (user, admin,
and system accounts) - Physically restrict core systems
14Conclusion
There is no such thing as 100 secure. However,
it is important that we at least not carelessly
leave doors unlocked. The greater importance
is not how to keep an intruder out, but is to
assume that an intruder can get in. Efforts
should be focused on addressing all possible
damages that an intruder can inflict. We need to
develop an Insurance Policy that can restore
anything lost or damaged. Then, we need to
be able to say that we took reasonable
precautions.
15Thank you
This has been a presentation by the Department
of Revenues Internal Audit Section. We hope you
found this presentation educational
and insightful. Surf and be safe