16
Bad Hackers Turned Good By: Craig Vining, Margaret Shea, & Karli Story

Bad Hackers Turned Good

  • Upload
    bayard

  • View
    33

  • Download
    0

Embed Size (px)

DESCRIPTION

Bad Hackers Turned Good. By: Craig Vining, Margaret Shea, & Karli Story. Knowledgeable Gatekeepers. Accountants should be knowledgeable of security threats & control techniques Gatekeepers to financial data Users, managers, designers, & evaluators. Top Security Concerns for an AIS. - PowerPoint PPT Presentation

Citation preview

Page 1: Bad Hackers Turned Good

Bad Hackers Turned GoodBy: Craig Vining, Margaret Shea,

& Karli Story

Page 2: Bad Hackers Turned Good

Knowledgeable Gatekeepers

Accountants should be knowledgeable of security threats & control techniques

Gatekeepers to financial data Users, managers, designers, & evaluators

Page 3: Bad Hackers Turned Good

Top Security Concerns for an AIS

Physical security Authentication Virus protection Backup

Page 4: Bad Hackers Turned Good

Physical Security & AIS Most important First line of defense Single point of entry Keys or access cards Equipment kept in

locked offices Wireless security

Page 5: Bad Hackers Turned Good

Authentication to AIS

Password management Incorrect attempts before lock out Using special characters Change password every x days

What kind of access should employee have?

Page 6: Bad Hackers Turned Good

Virus Protection & AIS Major threat that can bring down entire system Top 3 Antivirus Programs (PCWorld.com):

1. Symantec Norton Antivirus2. BitDefender Antivirus3. G-Data Antivius

Norton detected 98.7% malware

Page 7: Bad Hackers Turned Good

Backup & AIS

Make sure proper back up of accounting information

Can redeem correct data in emergency

Page 8: Bad Hackers Turned Good

Social Engineering Threats

Rather than attacking firewalls head on, breach by social engineering

Spear phishing All employees need education to avoid

theses attacks

Page 9: Bad Hackers Turned Good

Who is Responsible?

Ultimately it falls onto management Responsibilities:

Documentation, testing, and assessment of general IT controls Program development Program changes Computer operations Access to programs/data

Page 10: Bad Hackers Turned Good

New Trend

Management pushing HR to hire hackers Three types of hackers:

White hat hackers Black hat hackers And…..

Page 11: Bad Hackers Turned Good

Grey Hat Hackers

Bad hackers turned good or vice versa Able to think like a bad guy Preventative Countermeasure

Test physical security Authentication Virus protection Backup procedures

Page 12: Bad Hackers Turned Good

Jeff Moss (Dark Tangent) Black hat hacker throughout high school “You can only stand by and watch so many

people you know get busted. Sooner or later you catch onto that…there’s a limited life span to doing this kind of stuff”

Founder of Black Hat and DefCon Worked for Ernst & Young In 2009 was appointed by President Obama

to serve on the Homeland Security Advisory Council

Currently ICANN Chief Security Officer

Page 13: Bad Hackers Turned Good

Mixter Linked to the massively destructive and

effective DDoS attacks in early 2000 Shut down major websites (Yahoo!, Buy.com,

eBay, Amazon, and many more) His tool, the “Tribal Flood Network” was used

in the attacks causing an estimated $1.7 billion in damages

Currently a computer security specialist and author of Hacktivismo’s Six/Four System The software is a censorship resistant network proxy. Works by using “trusted peers” to relay network connections over SSL

encrypted links First product of a hacker group to receive approval from the US

Department of Commerce for export of strong encryption

Page 14: Bad Hackers Turned Good

Other Grey Hat Hackers

Florian Rohrweck- Google

Peter Hajas- Apple

Peiter Zatko- DARPA

Page 15: Bad Hackers Turned Good

Current Events

Lockheed Martin hack in 2011 Secure ID tags obtained by hackers Quick discovery to avoid disaster

New Laws and Regulations Payment Card Industry- Data Security

Sandard (PCI-DSS) TJX data breach

Page 16: Bad Hackers Turned Good

In Conclusion Accountants must be aware of security

threats and control strategies It is management’s responsibility to

achieve security More and more companies are hiring

hackers to keep up with security issues

“If you can’t beat them, join them.”