Writing tips and writing guidelines for students,case study samples, admission essay examples, book reviews, paper writing tips, college essays, research proposal samples
Tuesday, June 4, 2019
Data leakage
Data fountainData leakage is the unauthorized or unintentional exposure, disclosure, or loss of handsome tuition (GAO, 2007, p.2). Many businesses hurl in their control sensitive entropy about their organisation, employees and customers. The Information Commissioner (ICO) in a recent insistency statement (ICO,2010) is alarmed with the unacceptable number of information leakages within the modern world and leave alone issue fines for major s lavatorydalizees to commence in 2010.In addition to our markets, the safety and security of our information could not be assumed either. (Verizon Business, 2009 p.2). In 2008 thither sees to be a link between the turn of the recession and an increase in reported entropy leakages. Research conducted by Verizon Business (2009) showed that the number of reported compromised records was more than the previous four stratums combined as shown below in Figure 1.1.Figure 1.1 Number of records compromised per year in breaches investigated by Verizon Business (2009) deep down this study (Verizon Business, 2009) it was found that the industries with the highest number of entropy leakages were in retail (31%) and financial services (30%).As employees exit, so does somatic information (Ponemon Institute, 2009, p.1). A survey conducted (Ponemon Institute, 2009) showed 59% of employees who left a business (including voluntarily and those asked to leave) stole info. It is difficult to measure the entire impact of a info leakage. Data Breaches Are Frequent, but Evidence of Resulting Identity Theft Is Limited However, the Full Extent Is Unknown. (GAO, 2007, p.1.) The financial impact on a business per breach according to the Ponemon Institute (2006) is on average $4.8 million. Breaches bed not only be financially costing to a business but in like manner passing damaging to a companys reputation, this study (Ponemon Institute, 2006) showed that 60% of customers terminated or considered terminating contracts after a secur ity breach. accord to Verizon Business (2009) in 2008 91% of all compromised records were conjugated to organize criminal groups. Examples of occult data that criminal groups may wish to obtain are companys financial information, customers sensitive data and credit card details. in that location are many federal agencys in which data leakage potful occur, some of which will be discussed in the following chapter of this report. 1.2 Data Leakage in the MediaThe media is one of the most influencing ways of communicating issues globally. Data leakage appears to be increasingly more popular in the media as the reported breaches increase. The ICO stated that there were 434 organisations that reported data security breaches in 2009, the previous year had 277 reported (Unacceptable level of data loss, 2009). This evidence supports the theory of there cosmos an increase in breaches during the recession but what must be taken into account is that there is an increase in the reported cases. It may be that more businesses are fair aware of data leakages where previously they were oblivious to breaches committed or did not disclose the known leakages. Reported in the media, a Nationwide employees laptop was stolen from their menage containing private customer data (FSA,2007). 11 million Nationwide customers were said to be at risk of identity crime at the time. The FSA (Financial Services Authority) were alerted by the breach and it was found that the Nationwide did not start an investigation until 3 weeks after the theft took place. The firm were fined 980,000 by the City watchdog for the security violation. other example in the media (Previous Cases of Missing Data, 2009) is the Minis audition of Defence data security breaches. The Ministry of Defence admitted to losing or having stolen 121 memory finds in a four year period. According to this press release (Previous Cases of Missing Data, 2009) Defence Secretary Des Browne said 747 laptops had been stolen of those only 32 welcome been recovered. 1.3 Data Loss Prevention (DLP)The protection of sensitive data, to avoid data breaches, should be a vital part of a business day to day operations. Yet organisations rarely have adequate profile or control of their data (Broom, cited in When financial data goes missing, 2008).From the research conducted (Verizon Business, 2008) out of all the data leakages that occurred in the year 87% were preventable with simple or intermediate controls. This suggests that many businesses are not putting in adequate controls to prevent leakages. The Date Protection Act (DPA) is a good example to ensure that personal information is handled properly (ICO, The Basics, no date). One of the principles of the act is, it is the responsibility of the business to secure the sensitive data it withholds. The DPA have the right to accuse and unless exempt, all businesses have to abide by this act. The difficulty faced by many businesses is to manage the risk witho ut affecting their productivity and to manage risk in a new and challenging environment (CFO Research Services and Crowe Chizek and Company LLC , 2008, p.2).The important factors to consider when implementing a DLP plan is the alignment of process, technology and people as a unit. developing a robust security policy and ensuring that all employees fully understand their role and obligations(Broom, cited in When financial data goes missing, 2008). Broom also stated that users need high-quality training and good communication regarding information security concerns. Chapter 2 Types of ThreatsThreats to the protection of data can be split into two spacious categories Internal and External threats. Internal threats are from within the business itself and majorly centred on employees actions. Attacks from impertinent of the business are known as external threats. Examples include hackers, organized crime groups and government entities (p.8, Verizon Business, 2009)According to Verizon B usiness (2008 or 2009) 20% of reported data breaches are ca utilise by insiders whilst 39% of the breaches involved multiple parties, thus proving the grandness of a combination of internal and external controls. 2.2 External ThreatsAccording to Verizon Business, 2008 saw more tar owned, cutting edge, complex, and clever cybercrime attacks than seen in previous years (p5 2009). The fact that attacks appear to be increasingly more sophisticated is a concern for many organisations to ensure they have adequate control measures in place.One of the most general external threats to data security is Malware. According to Easttom (p6 Computer Secuirty Fundamentals) Malware is the Generic term for package that has a malicious purpose. Malware can be used to steal confidential data from a personal calculating machine to a global interlock. A virus is a small program that replicates and hides itself in other programs, usually without your acquaintance (Symantec,2003) through Computer secu rity fundamentals p6.) A Trojan Horse is a useful or apparently useful program containing hidden command that, when invoked, performs some un treasured function. (P48 info sec pipkin). Trojans must spread through user interaction such as opening an e-mail attachment. It looks legitimate and so users are tricked into executing the malicious program. The Trojan can then potentially in effectualate files, steal data and spread other malware. They can also be created to suffer back doors to give hackers find to the system. (http//www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html) An example of a dangerous Trojan is the Dmsys Trojan. According to (http//www.2-spyware.com/trojans-remova) and (http//www.uninstallspyware.com/uninstallDmsysTrojan.html) it steals users confidential information by infecting instant messengers. It uses a keystroke logging technique to steal passwords and private conversations. This information is stored in a log file and then sent to the h acker. and so conquering the malicious user to have access to potentially, confidential information. There are various tools online that can dispose of this Trojan automatically, but if a user wanted to do it manually they would need to delete the files dmsysmail.eml and dat.log. Manually Deleting MalwareEach program consists of files. Evenspyware, a virus or a different parasite all have their own files( http//www.2-spyware.com/news/post203.html ) To remove a parasite usually means to delete all its files. According to this website, it is not always this simple, as files being used by active applications can not be deleted and some of the Malwares files may be set to invisible. Following this sites guidelinesOpen Windows Task Manager and select finale Process but only works if you know what processes should be running and those that look suspicious. Once you have stopped the process it is now possible to try and delete the malicious files. Locate the folder you believe the pro gram to be (eg My Computer) and ensure all hidden and protected files are visible (Tools, Folder Options, View, advance(a) Settings).There may still be files that are invisible, now type cmd into run to access the Command Prompt. Within the Command Prompt enter dir /A folder_name. any files within this folder will be listed including all hidden files. To delete these files within the cmd enter the command cd folder_name to locate the folder. Then enter del file_name to delete the file. Ensure the Recyle Bin is also emptied. http//www.2-spyware.com/news/post203.html steps on how to manually remove Malware. Preventing Malware attacksSince new viruses are introduced daily (p49 info sec pipkin) an up-to-date valid anti-virus software is essential to avoid data leakages via Malware.Vulnerability patching firewallsA combination of the mentioned attacks can be catastrophic to the security of data hacking gets the criminal in the door, but malware gets him the data (p20 verizon) It is critical that a blend of the above security measures are put into place. 2.1 Internal ThreatsWhether knowingly or unknowingly, innocently or maliciously, employees consume in behaviours that heighten the risk of data loss.( Cisco data leakage find page)According to a study conducted by cisco data leakage 46% of employees admitted to transferring files between work and personal computers and approximately 1 in 4 admitted sharing sensitive information with friends, family, or even strangers. According to the representative Information Commissioner David Smith (http//news.bbc.co.uk/1/hi/uk_politics/8354655.stm) Unacceptable amounts of data are being stolen, lost in transit or mislaid by staff. on the hook(predicate) numbers of personal data is still being needlessly stored on unencrypted laptops and USB sticks.if they do not think about security, users can start to cause sooner a few problems p37 computer insecurity book. bar chart 5 ponemon 2009 page8 info kept after leaving char t 7 ponemon 2009 page 9 According to Ponemon (2009), only 11% of the respondents who took part in this research had permission from their supervisor to keep this information. in figure . An alarming percentage of the above transfers may have been avoided with appropriate controls, which will be discussed later in this report. It can often be hard to detect data leakages, such an employee copying confidential data to a USB device. more often, the information is left just as it was so that the theft is not quickly discovered p59 info sec pipkin. utilise a Data Leakage Prevention tool can instigate in monitoring and blocking users risky actions to avoid leakages. In this report digital Guardian by Verdasys will be used to demonstrate some examples of how a DLP tool can be used to assist in the competitiveness of information security. Chapter 3 Verdasys digital Guardian SoftwareIntroductionDigital Guardian is a comprehensive and proven data security solution for defend and tracking the flow of critical data anywhere in the world. (Verdasys, 2006) (http//www.daman.it/wp/dg/Digital_Guardian_DS.pdf ) According to Verdasys (2006) Digital Guardian (DG) can help to prevent the loss of data by identifying hard to detect user actions. The tool can block unauthorized access, copying, printing, and other user actions. The DG platform consists of a central horde and control console to communicate with remote agents deployed to desktops, laptops and hordes where data inevitably protection. It is an agent based (Endpoint) Data Loss Prevention (DLP) tool. These agents operate silently and report swayers violations, inveterate to operate even when a device is removed from the network. (Verdasys, 2006 http//www.daman.it/wp/dg/Digital_Guardian_DS.pdf ). The DG server is accessed via a web-based interface to the image Console. Figure DG Management /Control Console The above figure is the web-based management console. This tool can be implemented on both Windows and Lin ux machines. For this project Windows machines have been used.CapabilitiesDigital Guardian can monitor or block various risky actions users are taking. Whether it be users abuse or accidental operations. There are many actions that the software can perform some of which will be shown in the following.. Rules can be created within the software and then applied to policies which are deployed to machines chosen. These approach patterns can generate warnings to the user and also email alerts to administrators upon policy breach. Reports can be generated to allow for auditing and drilldown summaries of use of data and users actions. Along with being able to completely block particular proposition actions DG can also ask for justification from a user which is a form of Soft Blocking (DG, 2006). This type of DLP can also allow for a monitoring only approach, which according to ( http//www.networkcomputing.com/ radio/time-to-take-action-against-data-loss.php) can be more successful than a blocking solution. It can be used assist in computer forensics investigations whether it would be monitoring triggered rules by prohibited actions that breach corporate policy or more sinister illegal activity. According to (http//www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php) The beginning of the investigative process is to find out what was being sent, where, and by whom. Is it legitimate business reasons? Maliciously? They didnt know any better? Blocking may keep the data safe, but it wont answer those questions. (http//www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php) There are functions within the tool that can block the removal of confidential data via clipboard actions (cut/paste/print screen). add on features such as mail/file encryption and content inspection by Autonomy (company name) (Verdasys 2006)Figure () shows the capabilities of the software, How the software works Digital Guardian installs drivers that tie int o the Operating System (O/S) at a very low level within the kernel. When an application wants to save a file, it calls a function within the application that does this, and that the O/S handles the task, right down to the kernel that does the hard work, without application writers having to know the details.DG ties into that kernel, detects these events happening, extract useful details (like the filename and size etc), and then send the details onto the DG server. The advantage of this is that any application saving a file will have to get the O/S to do it, so tying in at that very low level ensures it works for virtually all applications. Any more Installation oh god try and remember Installation details of .. appendix. windows server, SQL Server, DG Server, DG Agents, Hardware and Software pre , key etc. Detailed in the . Digital Guardian files. Limitations - FIND some Digital Guardian is mainly used for insider threats and doesnt lessen external threats by intruders or malicio us attacks. It also does not embrace server and network vulnerabilities. (http//www.software.co.il/data-security/17-data-loss-prevention-shoppers-guide.html)No functionality to actually block users downloading applications (CHECK THIS) and running them if not already blocked within coating Management. The software has to be installed on the network to be able to block the use of it. check No rule to be able to block all attachments sent via emailcheckScalability challenge of maintaining classifications of Windows shares/content(http//www.software.co.il/data-security/17-data-loss-prevention-shoppers-guide.html)Chapter 4 Testing and Implementation Policy Exception USBEncrypt Email PromptEncrypt Mail RuleEncrypted Email PasswordApplication ManagementApplication Management ExceptionsApplication Management ExceptionsBlock of Applications PromptUpload Via WebmailUpload via Webmail PromptBlock upload via webmail sites. This rule controls users access. Instead of completely blocking the ir access to certain sites. Can access the specified sites but can not upload to these sites. For example social networking sites like Facebook. Stops the sending of attachments via webmail. If laptop accessed from outside of network these rules will still function..NEED BETTER SCREEN SHOT THAN THISIS THERE A COMPONENT RULE FOR THIS?Control of USB Devices Block non-approved USB devices Within DG it is possible to block all uploads to all USB devices, thus preventing all users from removing any data from the network. It is also possible to block uploads to USB devices with the exception of predefined USB devices. For example if a business provides users with an encrypted USB device (such as Kingston.) a rule is created to say block all USB device if stated device is not listed in the component rule associated. The USB device is recognised by its Product ID and Vendor ID. These IDs can be discovered by using a simple tool such as .Block non approved USBs Above is the control rule ca lled Block non approved USBs. This rule is set to block any File Copy/Move/SaveAs to a removable device that is not listed within the function (component control rule) approved usb device. Component rule for USB Approved Within the approved usb device component rule is the Vendor Id and Product Id for the approved USB device(s). USB Block Prompt If the USB device inserted does not match the predefined approved removable device then the above make is triggered. This prompt is flexible and any message the administrator wishes to set will be displayed. Once Close is selected no data can then be transferred to the device. This way if the USB device is lost/stolen it is encrypted so would be extremely difficult to view any sensitive contents on the device without knowing the password. This rule could be useful for businesses where their employees have to travel regularly (eg Sales) and so data needs to be easily transportable. Obviously this rule does not stop users from stealing the da ta but does assist with accidental loss. The software could still be used to monitor who/what/how much data is being transferred to these devices. BETTER SCREEN SHOT capability inspection rules. Look intoTRY AND CRACK/BREAK THESE RULES.Manually blocking USB within the Registry It is possible to manually block all USB devices via the register. The following steps were taken from Microsofts Support site (http//support.microsoft.com/kb/823732). Before manually adapting the registry it is strongly recommended that a backup of the registry is make as any errors made within the registry can cause severe problems. To enter the registry of the computer from the Start menu click Run and enter regedit. Find the registry key HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesUsbStor. On the right hand side double click Start as highlighted in figure. Ensure Hexadecimal is highlighted and enter 4 within Value data. This will now block all USB devices being used on this machine. When a device i s plugged into the machine the device will not be acknowledged. To re-enable USB devices follow the same steps above but change the Value data back to the default value of 3. Chapter 5 analytic thinking of results founded by Digital Guardian. Digital Guardian Technology ANY IMPROVEMENTS FOR DGChapter 6 Critical review of other productsHaving assessed an Endpoint (agent based) DLP tool, secondary research was conducted on a Network DLP tool, Websense Data Security, for comparison. Figure below is a table of brief pros and cons for different DLP measures available, taken from informationweek.com . Analyse table Taken from (http//www.informationweek.com/1163/163ss_impactassessment690.jhtmljsessionid=WA0XH3S4GN0CTQE1GHPSKH4ATMY32JVN) WhenDLPvendors are being honest, theyll readily admit they cant stop the serious and skilled insider from getting data out. (http//www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php)Their real significance is in finding employees w ho are haply leaking data, those who dont know its against policy or who are taking risky shortcuts to get their jobs done.Websense Data Security is a network based DLP tool with forward proxy. According to a review by (http//www.software.co.il/data-security/17-data-loss-prevention-shoppers-guide.html) it is typically used for monitoring email traffic and quarantining suspect messages. It requires placing an application-layer proxy next to an Exchange server or server agent. With a network based DLP such as Websense it avoids having to install an agent onto every machine, and instead involving installing network taps. As data passes through these it is checked, and events stack away that way.According to(http//www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php) Network-based solutions have the potential to be more vulnerable to an insider threat. An insider can steal data out via thenetwork, using encryption or steganography (where data is embedded within another data format).Unlike DG a network-based tool would not prevent a user plugging in a USB stick and copying files, it also would not log that this event had even occurred. TYPE UP MORE COMPARISONSStill, an even somewhat paranoid but unskilled insider can use a cell phone or digital camera to photograph documents on the screen. No form ofDLPcan protect against that. (http//www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php) Installing a DLP tool is not the be all and end all protection against threats and as emphasised earlier in this report a combination of measures needs to be addressed. Chapter 7 Conclusion and Future Work. Highlight any deficiencies etc Ethical Traking employees? ANY IMPROVEMENTS FOR DG .Many different aspects to considerLink intro with conclusion. Verizon other factors p3 . The top hat security technology in the world wont produce a good return on investment without the foundation of security processes, policies, and education. P 8 Cisco data leakage. if you have never experienced a security incident, does this mean that you are secure? Or does it just mean that, so far, you have been lucky? computer insecurity book in short no one is immune computer insecurity book More..GlossaryBibliographyOnline SourcesICO. (2010), Press Release Data Breaches to suffer up to 500,000 penalty, Online. Available at Accessed 31st January 2010. (2009),Unacceptable Level of Data Loss, Online. Available at Accessed 1st February 2010. FSA. (2007), Final Notice to Nationwide Building Society, Online. Available at Accessed 26th January 2010 (2009), Previous Cases of Missing Data Online. Available at Accessed 12th January 2010 Broom, A. (2008),When financial data goes missing.Online. Available at Accessed 3rd February 2010ICO. (date unknown), The Basics . Online Available at Accessed 2nd February 2010JournalsGAO. (2007), What GAO Found, Report to Congressional Requesters Verizon Business (2009), Data Breach investigations Re portPonemon Institute. (2009), As Employees Exit so does Corporate Data, Data Loss Risks During DownsizingPonemon Institute. (2006), 2006 annual Study Cost of a Data BreachCFO Research Services, Crowe Chizek and Company LLC. (2008), The Changing Landscape of Risk ManagementAppendices
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment