Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

40
Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services

Transcript of Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Page 1: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Avoiding Identity Theft

Benjamin KirchmeierInformation Technology Services

Page 2: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Protect University Employees and

Customers

Identity Theft

Page 3: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Protecting UI Customers

•Take Stock

•Scale Down

•Lock It

•Destroy It

•Plan Ahead•Source: Federal Trade Commission: Avoid ID Theft•http://www.ftc.gov/bcp/edu/microsites/idtheft/

Page 4: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Take Stock

•What Sensitive Personal Information (SPI) data to you use?

•Where is SPI?•Electronic•Physical

•Who has access to SPI?

•How is SPI used?

• FERPA (Family Educational Rights and Privacy Act)

Page 5: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Scale Down

•Ensure a business need exists.

•SPI data should only be maintained using University sanctioned systems and procedures

•Consider a retention policy for SPI

•Securing and Destroying SPI•Administrative Procedures Manual: 30.12 UI Computer Use Policy

•http://www.uihome.uidaho.edu/default.aspx?pid=97510

Page 6: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Lock It

• Physical Security

• Electronic Security

• Password Management

• Laptop Security

• Firewalls

• Wireless and Remote Access Networking

• Breach Detection

• Employee Training

• Security Practices of Contractors and Vendors

Page 7: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Physical Security

•Office security

•Access Controls/Restricted Spaces

•SPI document transfer policy

Page 8: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Electronic Security•Store all SPI on the University’s

filesystem

•Antivirus software must be installed

•Encrypt SPI - EncryptOnClick

•Proactively peruse valid security websites

•Disable unused services

Page 9: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Encrypt-On-Click•Free!

•Military-grade encryption (256-bit AES)

•No ‘backdoor’ to files in an .eoc archive

Download:http://www.2brightsparks.com/assets/software/

EncryptOnClick_Setup.exe

Page 10: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Password Management• Longer passwords are safer

• Ensure employees never share passwords with anyone, including ITS

• Require password-activated screen savers

• Never use your University password with another vendor

• Save your passwords in a safe location

• KeePass E-Wallet - Not a Word or Excel file

• Paper copy locked in safe - Not under the keyboard

Page 11: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Laptop Security

•Restrict use of portable devices

•Never save SPI on a laptop

•Consider cords and locks to secure laptops

•https://support.uidaho.edu/FAQ/Laptop Security/

Page 12: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Laptop Security – Task Manager

Service name Display nameEnterprise Client desktop/laptop

Standalone desktop/laptop

Alerter Alerter Disabled Disabled

ClipSrv ClipBook Disabled Disabled

Browser Computer Browser Not Defined Disabled

Fax Fax Not Defined Disabled

MSFtpsvr FTP Publishing Disabled Disabled

IISADMIN IIS Admin Disabled Disabled

cisvc Indexing Service Not Defined Disabled

Messenger Messenger Disabled Disabled

mnmsrvc NetMeeting® Remote Desktop Sharing Disabled Disabled

RDSessMgr Remote Desktop Help Session Manager Not Defined Disabled

RemoteAccess Routing and Remote Access Disabled Disabled

SNMP SNMP Service Disabled Disabled

SNMPTRAP SNMP Trap Service Disabled Disabled

SSDPSrv SSDP Discovery Service Disabled Disabled

Schedule Task Scheduler Not Defined Disabled

TlntSvr Telnet Disabled Disabled

TermService Terminal Services Not Defined Disabled

Upnphost Universal Plug and Play Device Host Not Defined Disabled

W3SVC World Wide Web Publishing Disabled Disabled

http://www.sans.org/top20/#s2

Page 13: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Laptop Security - Encryption• No official recommendation or support from ITS

• Research products prior to using on production machines

• TrueCrypt•http://www.truecrypt.org/

• PGP Whole Disk Encryption•http://www.pgp.com/products/wholediskencryption/

• BitLocker•http://technet.microsoft.com/en-us/windows/aa905065.aspx

• FileVault•http://www.apple.com/macosx/security/

Page 14: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

ITS Sophos Firewall• By default, installs only for AD bound machines

• Server-based firewall exceptions

• Set to allow only file sharing access to known ITS services (Netbios)

• Remote Desktop only allowed from 129.101.0.0/16 addresses (e.g. VPN required)

• Temporary exceptions allowed for application installation; settings will reset

• Permanent exceptions should be requested through ITS Help Desk

• Custom firewall policies can be applied to a prefix group

• Windows 7 will be supported in a forthcoming release

Page 15: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

ITS Firewalls - Managed Security Network

• Managed Security Network (MSN) - For all users who handle SPI

• Firewall Policy Summary

• Deny access to non-ITS managed Infrastructure services, such as File sharing, Email, Database, and Directory services

• Allow all other network communication initiated by hosts in the network

• Allows select network communication initiated by ITS-Managed Infrastructure and Application servers

• Allows RDP access from other MSN Networks and ITS-Managed VPN users

• Deny all other network communication initiated from outside the network

Page 16: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

ITS Firewalls - MSN Lite (Proposed)

• MSN Lite - For all academic and administrative user networks that do not have servers

• Firewall Policy Summary

• Allow all network communication initiated by hosts in the network

• Allow select network communication initiated by ITS-Mangaed Infrastructure and Application servers

• Allow RDP access from UI Networks

• Deny all other network communication initiated from outside the network

Page 17: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

ITS Firewalls - Public• Public - For all residence and wireless access

networks.

• Firewall Policy Summary

• Allow all network communication initiated by hosts in the network

• Allows select network communication initiated by ITS-Managed Infrastructure and Application servers

• Deny all network communication initiated from outside the network

Page 18: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Wireless and Remote Access Networking

•AirVandalGold v. AirVandal

• ITS VPN Solution

•The 64-bit quandary

•Native functionality in Snow Leopard

•Remote Desktop Protocol (RDP)

•Vulnerable to Man-in-the-Middle Attacks (pre-v.6.0)

Page 19: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Employee Training• FERPA Training

• Employee Separation - restrict access

• Keep employees up-to-date on new vulnerabilities

• Request sponsored accounts for TH employees

• APM 30.16: Managing Systems for Employee Turnover

Page 20: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

3rd Party Contractor and Vendor Security

•Identify what data is sent to vendors

•Address all inconsistencies

•Require vendors notify the University of any security incidents

•Confirm any security incident on campus with affected vendors

Page 21: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Destroy It•University forms, CDs,

receipts, expired credit cards

•Use Shred-it bins

•Ensure employees apply similar practices, at home and elsewhere

•Surplus old technology -- remove hard disks or properly delete data

Page 22: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Plan Ahead•Disconnect

compromised computers immediately

•Report any security incidents immediately

•Seek advice from ITS

•Consider developing a Computer Lifecycle Plan

Page 23: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Plan Ahead - ITS Services

• Proofpoint Messaging Security Appliance

• Monitoring email for credential breaches

• BadAttachment rules

• All University email (in or out) is scanned

• University border firewall

• DNS restrictions (Zlob)

• SMTP Mail (Port 25)

• MSSQL

Page 24: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Protect Yourself

Identity Theft

Page 25: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Secure Sensitive Documents•Safeguard your

Social Security card and birth certificate

•Use these documents only when absolutely necessary

•Consider using a safe deposit box for original documents

Page 26: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Destroy Unused Information•Shred junk mail, personal documents,

medical records, or other data.

•Use a post office box or mail slot for secure mail delivery

•Consider using Opt Out to reduce junk mail

•https://www.optoutprescreen.com/

• (888) 567-8688

Page 27: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Identify Frauds and Scams•Do not reply to any

electronic communication asking for personal information

•Enter URLs manually

•Use known phone numbers from statements or valid phone directory

•Verify vendor’s identity

Page 28: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Unique Passwords•15+ passphrases = 400 day expiration!

•Never use UI credentials with an external account

•Leverage unique intricate passwords for each account you hold

•Password management software

Page 29: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Peer-to-Peer Filesharing (p2p)•Default program settings

can be insecure

•Files downloaded may include a nefarious payload or be mislabeled

•Only download software from trusted locations

•Legal and Copyright violationshttps://support.uidaho.edu/

p2p/

Page 30: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Install [Sophos] Antivirus•Symantec licenses have expired!

•Sophos available at no cost

•Lower overhead, more frequent updates

•Keep the software current

•Support for major operating systems

•Auto updates

Page 31: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Uh-oh, you’ve been victimized!•Review credit reports and

place Fraud Alerts on them

•Close all accounts in question

•File a complaint with the Federal Trade Commission

•File a police report in the community the theft took place

Page 32: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Fraud Alerts• 90-day Alert (if you suspect you’re a victim)

• Extended Alert (requires Identity Theft Report)

• Seven year lifespan

• Eligible for two free credit reports per year

• Removed from prescreened marketing lists (5 years)

• Businesses may still check your credit report

• Businesses must contact you or use reasonable policies and procedures to verify identity

• Mainly effective against new credit accounts

Page 33: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Credit Freezes•Prevents third parties from accessing

your credit report

•Useful if you have been, or believe to be, a victim•All existing accounts still have access

•Still eligible for your annual credit report

Page 34: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Credit Freezes•Enacted in Idaho - July 1, 2008

•All consumers eligible

•No fee for victims with a police report

•$6 fee (per agency) to place or lift a freeze otherwise

•$10 PIN replacement fee

•Freeze is permanent until consumer acts

Page 35: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Credit Freeze Caveats

•Does not protect existing accounts

•New accounts created without a credit check are possible

Page 36: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Close Accounts•Contact the Security or Fraud

section of each creditor

•Followup in writing (certified mail; return receipt)

•Include copies of supporting documents and fraudulent charges

Page 37: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

File ID Theft Report• Assists the Federal Trade Commission (FTC)

in assessing nationwide scams

• Helps to permanently block false information from appearing on your credit report

• Ensures debts do not reappear

• Prevents companies from trying to collect fraudulent debts

• Required to file an Extended Fraud Alert

• Details the incident(s) for local police

Page 38: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Identity Theft Insurance•Will not deter identity thieves

•Aids in minimizing losses

•Research benefits of any plan

•Some may require a Limited Power of Attorney

•Many only save time by acting on your behalf (applying Credit Freezes, Fraud Alerts, etc.)

Page 39: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Thank YouQuestions?

Page 40: Avoiding Identity Theft Benjamin Kirchmeier Information Technology Services.

Resources• Federal Trade Commission: http://www.ftc.gov/bcp/edu/microsites/idtheft/

• University of Idaho APM 30.12: http://www.uiweb.uidaho.edu:80/policy/

• Encrypt-On-Click: http://www.2brightsparks.com/assets/software/EncryptOnClick_Setup.exe

• SANS Institute - Windows Services: http://www.sans.org/top20/#s2

• UI ITS Laptop Security: https://support.uidaho.edu/FAQ/Laptop Security/

• University of Idaho APM 30.16: http://www.uihome.uidaho.edu/default.aspx?pid=97509

• Splunk>: http://www.splunk.com/

• Proofpoint: http://www.proofpoint.com/

• Opt Out Coalition: https://www.optoutprescreen.com/

• UI ITS Peer-to-peer FAQ: https://support.uidaho.edu/p2p/