it governance and risk oversight of ngo boards...•step 1: sniff and learn ... –social networking...

47
IT Governance and Risk Oversight of NGO Boards Bernard Kan Senior Consultant HKCERT

Upload: others

Post on 03-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

IT Governance and Risk Oversight

of NGO Boards

Bernard Kan

Senior Consultant

HKCERT

Page 2: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Hong Kong Computer Emergency Response Team Coordination Centre

•Established in 2001

•Funded by the HKSAR Government

•Operated by Hong Kong Productivity Council

(香港生產力促進局)

•Mission

–As the coordination of local cyber security incidents,

serving Internet Users and SMEs in Hong Kong

–As the Point of Contact of cyber security incidents

across the border

香港電腦保安事故協調中心

Page 3: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

HKCERT Services

• Incident Report

• Security Watch and Warning

• Cross-border collaboration

• Awareness education and guideline

24-hr Hotline: 8105-6060

Free subscription

Page 4: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Internet

Infrastructure

Universities IT and Security

Vendors

Local Security

Researchers Internet Users,

Enterprise &

Critical Org.

APCER

T FIRST

HKPF

CSTCB

As the Coordination Centre

International point of contact

Global

Researchers

Page 5: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Agenda

•Corporate Governance, IT Governance & IT Security

Governance

•Recent Cyber Threats for Enterprises

•Cyber Security Concepts

•Best Cyber Security Practices

•Takeaway

Page 6: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Corporate Governance vs

IT Governance

Corporate Governance: Leadership by corporate

directors in creating and presenting value for all

stakeholders

IT Governance: Ensure the alignment of IT with

enterprise objectives

•Responsibility of the board of directors and executive

management

Page 7: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

IT Governance Objectives

• IT delivers value to the business

• IT risk is managed

Processes include:

•Equip IS functionality and address risk

•Measure performance of delivering value to the business

•Comply with legal and regulatory requirements

Page 8: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Information Security Importance

•Organizations are dependent upon and are driven by information

–Software = information on how to process

–Data, graphics retained in files

• Information & computer crime has escalated

•Therefore information security must be addressed and supported at highest levels of the organization

•Traditional term “Information Security” is now replaced by “Cyber Security”.

Page 9: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Recent Cyber Threats for

Enterprises

Page 10: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

WannaCry Ransomware

10

Page 11: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

WannaCry reports (May 2017)

• 500+ enquiries

• 30+ infection reports, cause of infection

– no timely patching

– direct connection to the Internet without

firewall or router

Page 12: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

•Business attacks: Change of Bank Account

•Personal attacks: Overseas relative require urgent

money

Page 13: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Surge of CEO Email Scam

Page 14: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

•Step 1: Sniff and Learn (via malware or hacked email

account)

•Step 2: Launch attack when CEO is on business trip

CEO Email Scam (with malware)

“Urgent”

Page 15: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Email scams compared

General phishing email

•Untargeted

• Spam email using spoofed sender

•Trick users to phishing website for credentials

CEO email scam

•Targeted

•Malware monitor email for a period silently

•Trick one side to transfer money / goods to scammer account

Page 16: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Cyber Security Concepts

Page 17: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

CIA Triad of Information Security

Attack on Confidentiality (保密性)

• Leaking confidential data

Attack on Integrity (完整性)

• Data contaminated

• Forged transaction

• System compromised

• Identity spoofed

Attack on Availability (可用性)

• System service not accessible (DDoS)

• Data destroyed or not accessible (ransomware)

Page 18: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Threat Actor

威脅者

System

vulnerability

Human

vulnerability

Sensitive Data /

Service

Attack

攻擊

漏洞

Data

Control

Threat, Attack & Vulnerability

Page 19: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Attacks targeting Human

Page 20: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Who are you really talking to?

Social Engineering uses a lot of spoofing

Page 21: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Email: Identity spoofing

•Email protocol (SMTP) is open to spoof

Page 22: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Phishing attack

•Target general group

•Lure to enter

credentials

Image from cover of the book “Phishing” by Rachael

Lininger and Russell Dean Vines (2005)

Page 23: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

•Malicious URL

Social Network

23 @Copyright 2016 Not to be reproduced

without prior written consent of the organizer

Page 24: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Human vulnerabilities

TRUST FEAR

URGENCY

AUTHORITY

GREED CARELESSNESS

HELPFULNESS

SPOOFING

Page 25: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Attack on Systems

Page 26: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Top system vulnerabilities in 2016

26

Flash – Adobe multimedia player

Silverlight – Microsoft multimedia platform

Browser is frontline for attack

Page 27: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Unsupported software –

Vulnerable systems

WinXP

17%

6%

Win7

Win10

33%

47%

Page 28: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Malware Propagation channels

•Fake security

software

•Fake video

player codec

Executables Document

Malware Website

Page 29: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Malware - Propagation channels

Executables Document

Malware

Embedded malware

in PDF or Office files

Botnet served PDF

malware

Website

Image by Websense

Page 30: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Malware - Propagation channels

Executables Document

Malware Website

Legitimate and

trusted websites

compromised

Web admin

incapable to detect

and mitigate the

risks

Page 31: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Exploits imported from other servers via iframes, redirects

When compromised, dropper download and install the actual bot malware

Attack via Visiting Websites Exploit server Web server (injected) Malware Hosting

Victim’s

Browser

Web request

Page 32: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Page 32

Botnet Hacker’s IT Infrastructure

DDoS attack

Up: Data

Down: Command

Bot Herder

PC PC PC PC PC

Up: Data

Down: Command

C&C C&C

victim victim

Page 33: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

33

Information Leakage

•Loss of

–Disks / USB Thumb Drive

–Mobile Devices

•Leakage on the Internet

–Search Engine (Google)

–Wi-Fi

–Social networking website (Facebook)

–Peer-to-peer sharing software (Foxy)

Page 34: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

34

Loss of USB thumb drive

Page 35: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

35

22 July 2013

Leakage on the Internet (by Foxy)

Page 36: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

36

Leakage on the Internet (hacking)

26 Feb 2014

Page 37: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Best Cyber Security

Practices

37

Page 38: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Obstacles to Stronger Cyber Security

People – Key to Success in Cyber

Security

38 Source: 2017 Cybersecurity Trend Spotlight Report, (ISC)2

Page 39: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Steps to Tackle Cyber Threats

• Critical business data / services • Order routing system

• Surveillance system

• Critical IT services • Remote Access

• Privileged Access

• Data classification

• Risk Assessment

Page 40: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Steps to Tackle Cyber Threats

Access Control • Firewall, Network segmentation

• Remote access management

• Privileged access management

Protective Technology • Antivirus, (Client protection)

• 2-factor authentication

Data Security • Backup, Encryption

Info. protection and procedure • Password policy

Maintenance • Patch management

Awareness education • Cyber security training

Page 41: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Steps to Tackle Cyber Threats

• Intrusion detection

Suspicious trading location

Suspicious trading pattern

• Centralized logging

• Security Information Event

Management (SIEM)

• Situational awareness,

Intelligence

Page 42: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Steps to Tackle Cyber Threats

• Build a Security incident response

team & plan

• Contact List

• Data breach notification

• Account intrusion lockout

• Cyber Drill Exercise

Page 43: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Steps to Tackle Cyber Threats

• Disaster Recovery Plan

• Post-event review and

improvement

Page 44: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Takeaway

•IT governance need to address Cyber security issues in

order to achieve organization goals

•Senior management buy-in is crucial

•Success of cyber security is about PEOPLE

•General users awareness

•Systematic approach to handle cyber security threats

Page 45: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Q&A

45

Page 46: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

Coming Event: Information Security Summit

15-16 August 2017

46

https://www.issummit.org

Free to participants

Page 47: IT Governance and Risk Oversight of NGO Boards...•Step 1: Sniff and Learn ... –Social networking website (Facebook) –Peer-to-peer sharing software (Foxy) 34 Loss of USB thumb

HKCERT Hotline: 81056060

www.hkcert.org

47