<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; tbowers</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/author/tbowers/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Expanding the scope of security testing</title>
		<link>http://www.experian.com/blogs/data-breach/2012/02/15/expanding-the-scope-of-security-testing/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/02/15/expanding-the-scope-of-security-testing/#comments</comments>
		<pubDate>Wed, 15 Feb 2012 18:37:33 +0000</pubDate>
		<dc:creator>tbowers</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[cloud services]]></category>
		<category><![CDATA[continual testing]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[PII]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=967</guid>
		<description><![CDATA[Continual testing is one of the main tenants of data breach prevention. Your network has to remain secure to ward off attacks. The typical security test, known as a penetration test, provides a point-in-time view of your security, limiting your scope of analysis.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F02%2F15%2Fexpanding-the-scope-of-security-testing%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,cloud+services,continual+testing,Cyber+Security,Data+Security,hackers,PII&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/02/secure_network2.jpg"><img class="aligncenter size-full wp-image-976" title="Secure Network" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/02/secure_network2.jpg" alt="" width="432" height="324" /></a></p>
<p><em>Our guest blogger this week is Tom Bowers. While well-known for years as the Managing Director of </em><a title="Security Constructs" href="http://www.securityconstructs.com/" rel="nofollow" target="_blank" class="broken_link"><em>Security Constructs LLC</em></a><em>, he is now the Chief Information Security Officer (CISO) for the Virginia Community College System.</em></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Continual testing is one of the main tenants of data breach prevention. Your network has to remain secure to ward off attacks. The typical security test, known as a penetration test, provides a point-in-time view of your security, limiting your scope of analysis.</p>
<p>To broaden that scope, today security and risk professionals are taking a cue from software engineers and using a type of testing known as attack surface analysis. Rather than focusing on a specific point in time like the penetration test, this test views the network as a fluid system.</p>
<p>Attack surface analysis uses an entry and exit point framework to identify the full extent of a system’s attack surface.  This analysis is done on either computing or business process resources. In either instance, the entry/exit points of a system are the ways through which data (or hackers) enters or leaves a system and are the basis for attacks.</p>
<p>Some attacks may even use both computing process and business process entry/exit points. For example, a hacker goes to a department store and applies for a job. While there, he inserts a USB thumb drive loaded with malware or auto-execute code into an unprotected USB slot on a nearby computer.</p>
<p>The malicious code executes and gives him a foothold into the enterprise systems that he can then exploit remotely. In this scenario, the hacker has essentially completed an attack surface analysis on the store’s business process and located an unprotected USB slot. He has also done the same for the computing process though, in this scenario, he has created a new attack surface rather than using part of the existing one.</p>
<p>As a CISO, I identify the most important data sets and map the attack surfaces to those data sets. For example, the personally identifiable information (PII) of your employees may be of primary concern to your enterprise. To conduct an attack surface analysis, I would look at the systems that contain this data AND how and by whom that data is used. Is the data static or does it move between enterprise systems? If so, what are the business processes that require this data movement and what are the pipelines through which it moves? Viewed in this fashion I see a more fluid attack surface with connected entry and exit points – not just a single one at a time.</p>
<p>Fortunately there are tools to assist with the process. As more and more enterprises use cloud-based or Web-based services, we can take advantage of the Open Web Application Security Project (OWASP) framework for Web applications. <a title="Open Web Application Security Project" href="https://www.owasp.org/index.php/Main_Page" rel="nofollow" class="broken_link">OWASP</a> is highly respected in the information security space. Its open source tools identify all entry points into a program but do so in a well-structured manner that encourages analysis. It maps both roles and resources to each entry point. It is designed to be used throughout the lifecycle of the system under review. I use the concepts of OWASP to map roles and resources for the supporting business processes of these same applications.</p>
<p>For a more risk-based view of attack surface analysis, I use the Open Source Security Testing Methodologies Manual (OSSTMM) tool, run by Pete Herzog and his team in Spain. It is exactly what it states – an open source community providing an entire security testing framework. OSSTMM is the tool created and maintained by the Institute for Security and Open Methodologies (<a title="Institute for Security and Open Methodologies Manual" href="http://www.isecom.org/research/osstmm.html" rel="nofollow" class="broken_link">ISECOM</a>). I&#8217;ve personally used this framework for many years in a wide range of enterprises. Its beauty is the completeness of the OSSTMM with framework, templates worksheets and Risk Assessment Value (RAV) spreadsheet.</p>
<p>The RAV is what assists us in attack surface analysis. The RAV provides a mechanism where you can place risk values for all of the computing and business process attack entry/exit points. The RAV spreadsheet then provides an overall risk score that aids in prioritizing your attack surface resolution action plan. While the risk scores may not be perfect at times, it is an excellent tool to guide your actions and give you a more holistic view of your system and its weaknesses.</p>
<p> <div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Data Breach 24 Hour Checklist by Experian" href="http://www.experian.com/data-breach/landing/first-24-hours.html?WT.srch=ecd_dbres_blog_021512_article ">Download this free checklist to learn what steps to take when it&#8217;s go-time for data breach response. </a></div></div></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/02/15/expanding-the-scope-of-security-testing/&via=Experian_DBR&text=Expanding the scope of security testing&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/02/15/expanding-the-scope-of-security-testing/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Resources for managing your enterprise security and privacy risk in the new year</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/03/resources-for-managing-your-enterprise-security-and-privacy-risk-in-the-new-year/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/03/resources-for-managing-your-enterprise-security-and-privacy-risk-in-the-new-year/#comments</comments>
		<pubDate>Tue, 03 Jan 2012 08:00:57 +0000</pubDate>
		<dc:creator>tbowers</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Security Breaches]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=901</guid>
		<description><![CDATA[Here’s a look at some of the resources I find useful in testing and training for a data breach.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F03%2Fresources-for-managing-your-enterprise-security-and-privacy-risk-in-the-new-year%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,data+privacy,Data+Security,hackers,National+Cyber+Security+Awareness+Month,PII,Security+Breaches&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/data_security.jpg"><img class="aligncenter size-full wp-image-902" title="Data locked" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/data_security.jpg" alt="" width="518" height="337" /></a></p>
<p><em>Our guest blogger this week is Tom Bowers. While well-known for years as the Managing Director of <a title="Security Constructs" rel="”nofollow” nofollow" href="http://www.securityconstructs.com/about.htm" target="_blank" class="broken_link">Security Constructs LLC</a>, he is now the Chief Information Security Officer (CISO) for the Virginia Community College System.</em></p>
<p>I&#8217;ve been actively involved in InfraGard for many years. InfraGard is a public/FBI partnership with a primary mission of protecting critical infrastructure.  Because of this partnership, I began to wonder if the U.S government had anything I could leverage in my own business operations. The answer is, “yes.”</p>
<p>I&#8217;ve used the guidelines from the National Institute of Standards and Technology (NIST) for many years as a basis for building information security programs around the world. While these are excellent building blocks, they don&#8217;t address my training needs in preparing for a cyber attack. So I also leverage resources from the Department of Homeland Security (DHS) and other agencies.</p>
<p>Here’s a look at some of the resources I find useful in testing and training for a data breach:</p>
<p><strong>NIST Computer Security Handling Guide </strong><br />
In the back of this document (special publication 800-61) are table-top exercises to help train your incident response team.<br />
While a bit limited in scope, they are an excellent starting point at no cost to you.</p>
<p><strong>DHS/FEMA Certified Cyber Security Training</strong><br />
The online Domestic Preparedness Campus is a portal for<br />
10 courses that address three demographics of your enterprise: Non-technical, Technical and Business Professional. While they are perhaps a bit broad and general at times, they are an excellent starting point for your enterprise.</p>
<p>The different courses include:</p>
<ul>
<li>Information Security for Everyone</li>
<li>Cyber Ethics</li>
<li>Cyber Law and White Collar Crime</li>
<li>Information Security Basics</li>
<li>Secure Software</li>
<li>Network Assurance</li>
<li>Digital Forensics Basics</li>
<li>Business Information Continuity</li>
<li>Information Risk Management</li>
<li>Cyber Incident Analysis and Response</li>
</ul>
<p><strong>Homeland Security Exercise and Evaluation Program </strong></p>
<p>This program from the DHS provides a standardized method of creating cyber security exercises. You work with a member of the DHS team to create and ultimately execute a testing program. My organization is currently setting up a tabletop exercise with DHS for all 23 of our organizational Information Security Officers next spring. For your company, I expect that the Training Exercises portion will prove the most valuable.</p>
<p>In total, they offer seven exercise types broken down into training and operational exercises.</p>
<p><em>Training Exercises</em><br />
1. Seminar &#8211; A seminar is an informal discussion designed to orient participants to new or updated plans, policies or procedures.<br />
2. Workshop &#8211; A workshop resembles a seminar but is employed to build specific products, such as a draft plan or policy.<br />
3. Tabletop Exercise (TTX) &#8211; A table top exercise involves key personnel discussing simulated scenarios in an informal setting.<br />
4. Games &#8211; A game is a simulation of operations that often involves two or more teams, usually in a competitive environment using rules, data and procedure designed to depict an actual or assumed real-life situation.</p>
<p><em>Operations-based Exercises </em><br />
5. Drill &#8211; A drill is a coordinated, supervised activity usually employed to test a specific operation or function within a single entity.<br />
6. Functional Exercise (FE) &#8211; A functional exercise examines and/or validates the coordination, command, and control between various multi-agency coordination centers. A functional exercise does not involve any &#8220;boots on the ground.&#8221;<br />
7. Full-Scale Exercises (FSE) &#8211; A full-scale exercise is a multi-agency, multi-jurisdictional, multi-discipline exercise involving functional and &#8220;boots on the ground&#8221; response.</p>
<p><em>Cyber Storm</em><br />
<a title="Cyber Storm" rel="”nofollow” nofollow" href="http://www.dhs.gov/files/training/gc_1204738275985.shtm" target="_blank" class="broken_link">Cyber Storm</a> is a biennial exercise that provides the framework for a government-sponsored cybersecurity exercise. It is a combination of international government agencies, national and state government agencies and private industry. Its stated aims are to:</p>
<ul>
<li> “Examine organizations’ capability to prepare for, protect from, and respond to cyber attacks’ potential effects</li>
<li>Exercise strategic decision making and interagency coordination of incident response(s) in accordance with national level policy and procedures</li>
<li>Validate information sharing relationships and communications paths for collecting and disseminating cyber incident situational awareness, response and recovery information</li>
<li>Examine means and processes through which to share sensitive information across boundaries and sectors without compromising proprietary or national security interests.”</li>
</ul>
<p>Cyber Storm III was used to hone and tune the latest U.S National Cyber Incident Response Plan released early in 2011. The 2010 exercise had 60 companies participating across many industry sectors.It also tested the newly formed National Cybersecurity and Communications Integration Center, which is the &#8220;boots on the ground&#8221; hub for national <a title="Cyber Security Facts" href="http://www.experian.com/data-breach/cyber-security.html" target="_blank">cybersecurity</a> coordination.</p>
<p>Managing your enterprise security and <a title="Data Breach Resources" href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">privacy</a> risk posture can be a daunting task at times. Hackers are more sophisticated and coordinated in their attacks. It’s pretty tough out there right now but new tools, processes and procedures will ultimately gain the upper hand. You are not alone. There are a wide range of resources freely available to help build the skill sets of our teams. I remain encouraged and look forward to the battle with new hope and fortitude.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/03/resources-for-managing-your-enterprise-security-and-privacy-risk-in-the-new-year/&via=Experian_DBR&text=Resources for managing your enterprise security and privacy risk in the new year&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/03/resources-for-managing-your-enterprise-security-and-privacy-risk-in-the-new-year/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Counter competitive intelligence: Combating hackers in 7 steps</title>
		<link>http://www.experian.com/blogs/data-breach/2011/09/12/counter-competitive-intelligence-combating-hackers-in-7-steps/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/09/12/counter-competitive-intelligence-combating-hackers-in-7-steps/#comments</comments>
		<pubDate>Mon, 12 Sep 2011 20:51:12 +0000</pubDate>
		<dc:creator>tbowers</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[hackers]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=767</guid>
		<description><![CDATA[After an in-depth analysis on how hackers find their targets, security and risk professionals can learn 7 key ways to strengthen their infrastructure and reduce risk profiles.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F09%2F12%2Fcounter-competitive-intelligence-combating-hackers-in-7-steps%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,hackers&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><em><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/09/Cyber-Security.jpg"><img class="aligncenter size-full wp-image-769" title="Cyber Security" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/09/Cyber-Security.jpg" alt="" width="425" height="282" /></a></em></p>
<p><em>Our guest blogger this week is</em><em> Tom Bowers, Managing Director, <a href="http://www.securityconstructs.com/about.htm" rel="”nofollow” nofollow" target="_blank" class="broken_link">Security Constructs LLC</a> –</em> <em>a security architecture, data leakage prevention and global enterprise information consulting firm.</em></p>
<p>In my last <a href="http://www.experian.com/blogs/data-breach/2011/09/06/how-hackers-find-their-targets/" target="_blank">post</a>, I discussed how hackers choose their targets and the steps that companies can take to reduce that risk.  I&#8217;d like to continue this thought stream by offering a slightly different view on how we as security and risk professionals should be responding.  I call it Counter Competitive Intelligence (CCI), though CI professionals may disagree with that name.</p>
<p>CCI has two major advantages:</p>
<p>First, it forces you to understand your own business.  We&#8217;re not simply looking for how your company generates revenues but what the supporting business operation looks like as well.  This analysis forces us to build security as a business risk and not merely as a technology driven risk.</p>
<p>Second, this process assists us in offering business enabling security/risk structures instead of gate-keeping structures. You know the structures I mean, where we security and risk professionals are seen as the team that always says “no” to various lines of business (gatekeepers).</p>
<p>Combined, these two advantages of CCI enable unit heads within an enterprise to view us as business partners.</p>
<p>So how do we accomplish this miracle of security/risk management?  Through seven key steps:</p>
<p>1. Conduct competitive intelligence (CI) on your own company.  CI is a well-known and well-respected part of doing business, enabling you to understand your market, customer demographics, competitors, and political climate.  Start with your competitors, and then look at your own company, building a competitive profile that includes your firm’s strengths, weaknesses and growth areas.  Who are the movers and shakers in the enterprise and what various lines of business does your company pursue?  Read the past couple of annual reports to study your company’s financial health, top management changes, and strategic direction.</p>
<p>2. Now that you have taken a fresh look at your business, focus on the amount and location of information that is publicly available about the company.  Was the information found with a simple search query or did you find it on an employee&#8217;s blog posting?  What information is getting out in places such as Yahoo&#8217;s financial chat rooms? Conducting operational analysis here can lead to some breathtaking insight on unintended information loss.</p>
<p>3. Next, understand whether active disinformation is being used.  Some companies seed chat rooms and blogs with misleading information to throw off CI professionals from their competitors. The best advice here is to verify your sources and look for other evidence to support your conclusions.</p>
<p>4. Now for the response process.  Start by asking if a new policy might help in guiding employees while preventing critical data leakage.  While many companies have created policies concerning social media sites for just this reason, a great number of them fail to realize that “old school” chat rooms and discussion boards are still being used to damaging effect.</p>
<p>5. Ask yourself, can we modify our business processes to mitigate these leakage points?  Should we implement <a href="http://www.webopedia.com/TERM/S/SSL.html" rel="”nofollow” nofollow" target="_blank" class="broken_link">SSL</a> between our business partners?  Do we update our contracts to include explicit language about third party information disclosure?  Should we have a formal review process for all conference sessions given by our employees?</p>
<p>6. Other questions to explore: can you leverage existing business/security/risk technology to help mitigate information leakage?  Have you considered using your anti-virus policy server to conduct application audits or assist in investigations?  Anti-virus servers touch nearly every endpoint on your system and contain a wide range of workstation information.  How about using your security operation center event data stream to give feedback on business application usage (type and location) and perhaps create an improved business process?</p>
<p>7. Finally, review new technologies both near and mid-term that may assist you in mitigating information loss.  Data leakage protection or content protection, enterprise digital rights management or encryption products are some examples.</p>
<p>I will not pretend that this is an easy process.  In fact, the first time I really tackled CCI it took me four years to build the business relationships required in-house to accomplish this process.  The payoff, however, was that we became the “go-to” security organization for business enabling architecture.</p>
<p>The process does work, and security and risk professionals find themselves hailed as heroes when it does.</p>
<p>Lastly, click <a href="http://www.experian.com/data-breach/wp-security-as-business-risk.html?wT.srch=ecd_dbcsdanl_securitywp" target="_blank">here</a> to download my white paper, <strong><em>Security as Business Risk: How Data Breaches Impact Bottom Lines.</em></strong> Security is a business risk which must be accounted for in every organization’s enterprise risk management plan. This white paper illustrates how to view data breaches from a business risk perspective by using real world examples and the major consequences of these breaches.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Data Breach Response Guide" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_091211_article  ">Download your free Data Breach Response Guide! </a></div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/09/12/counter-competitive-intelligence-combating-hackers-in-7-steps/&via=Experian_DBR&text=Counter competitive intelligence: Combating hackers in 7 steps&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/09/12/counter-competitive-intelligence-combating-hackers-in-7-steps/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How hackers find their targets</title>
		<link>http://www.experian.com/blogs/data-breach/2011/09/06/how-hackers-find-their-targets/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/09/06/how-hackers-find-their-targets/#comments</comments>
		<pubDate>Tue, 06 Sep 2011 17:51:33 +0000</pubDate>
		<dc:creator>tbowers</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[competitive intelligence]]></category>
		<category><![CDATA[Google alert]]></category>
		<category><![CDATA[hackers]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=760</guid>
		<description><![CDATA[The rash of large-scale data breaches in the news this year begs many questions, one of which is this: how do hackers select their victims? ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F09%2F06%2Fhow-hackers-find-their-targets%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,competitive+intelligence,Google+alert,hackers&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><em><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/09/pic-privacy.jpg"><img class="aligncenter size-full wp-image-761" title="pic-privacy" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/09/pic-privacy.jpg" alt="" width="448" height="330" /></a></em></p>
<p><em>Our guest blogger this week is</em><em> Tom Bowers, Managing Director, <a href="http://www.securityconstructs.com/about.htm" rel="”nofollow” nofollow" target="_blank" class="broken_link">Security Constructs LLC</a> –</em> <em>a security architecture, data leakage prevention and global enterprise information consulting firm.</em></p>
<p>The rash of large-scale data breaches in the news this year begs many questions, one of which is this: how do hackers select their victims?</p>
<p>The answer: research.</p>
<p>Hackers do their homework; in fact, an actual hack typically takes place only after many hours of first studying the target.</p>
<p>Here’s an inside look at a hacker in action:</p>
<ol>
<li>Using search queries through such resources as Google and job sites, the hacker creates an initial map of the target’s vulnerabilities.  For example, job sites can offer a wealth of information such as hardware and software platform usage, including specific versions and its use within the enterprise.</li>
<li>The hacker fills out the map with a complete intelligence database on your company, perhaps using public sources such as government databases, financial filings and court records. Attackers want to understand such details as how much you spend on security each year, other breaches you&#8217;ve suffered, and whether you’re using <a href="http://www.webopedia.com/TERM/L/LDAP.html" rel="”nofollow” nofollow" target="_blank" class="broken_link">LDAP</a> or <a href="http://www.openaselect.org/trac/openaselect/wiki/FederatedAuthentication" rel="”nofollow” nofollow" target="_blank" class="broken_link">federated authentication systems</a>.</li>
<li>The hacker tries to identify the person in charge of your security efforts.  As they research your Chief Security Officer or Chief Intelligence Security Officer (who they report to, conferences attended, talks given, media interviews, etc.) hackers can get a sense of whether this person is a political player or a security architect, and can infer the target&#8217;s philosophical stance on security and where they&#8217;re spending time and attention within the enterprise.</li>
<li>Next, hackers look for business partners, strategic customers and suppliers used by the target.  Sometimes it may be easier to attack a smaller business partner than the target itself.  Once again, this information comes from basic search engine queries; attackers use job sites and corporate career sites to build a basic map of the target&#8217;s network.</li>
<li>Once assembled, all of this information offers a list of potential and likely egress points within the target.</li>
</ol>
<p>While there is little you can do to prevent hackers from researching your company, you can reduce the threat this poses by conducting the same research yourself.  Though the process is a bit tedious to learn, it is free to use; you are simply conducting competitive intelligence upon your own enterprise.  By reviewing your own information, you can draw similar conclusions to the attackers, allowing you to strengthen those areas of your business that may be at risk.</p>
<p>For example, if you want to understand which of your web portals may be exposed to hackers, use the following search term in Google: “site:yourcompanyname.com – www.yourcompanyname.com”</p>
<p>This query specifies that you want to see everything on your site except WWW sites.  Web portals do not typically start with WWW and this query will show “eportal.yourcompanyname, ecomm.yourcompanyname.”</p>
<p>Portals are a great place to start as they usually contain associated user names and passwords;   this means that a database is storing these credentials, which is a potential goldmine for attackers.  You can set up a <a href="http://www.google.com/alerts" rel="”nofollow” nofollow" target="_blank" class="broken_link">Google Alert</a> to constantly watch for new portals; simply type in your query, select how often you want updates, and Google will send you an alert every time a new portal shows up in its results.</p>
<p><a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">Knowledge</a> is power.  The more you know about your own business, the better you can protect it from becoming prey to hacker-hawks circling in cyberspace.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Data Breach Response Guide" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_090611_article_cta">Download Your Free Data Breach Response Guide</a>!</div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/09/06/how-hackers-find-their-targets/&via=Experian_DBR&text=How hackers find their targets&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/09/06/how-hackers-find-their-targets/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>As organized crime goes virtual, the law cyber-saddles up</title>
		<link>http://www.experian.com/blogs/data-breach/2011/07/26/as-organized-crime-goes-virtual-the-law-cyber-saddles-up/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/07/26/as-organized-crime-goes-virtual-the-law-cyber-saddles-up/#comments</comments>
		<pubDate>Tue, 26 Jul 2011 15:52:11 +0000</pubDate>
		<dc:creator>tbowers</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[data breach prevention]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[organized crime]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=688</guid>
		<description><![CDATA[Cyber criminals have been so successful in recent years that they have seemed unstoppable, leaving federal law enforcement struggling with the fast pace of attacks and ever-changing tactics.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F07%2F26%2Fas-organized-crime-goes-virtual-the-law-cyber-saddles-up%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber+crime,data+breach+prevention,FBI,NATO,organized+crime&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><em><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/07/cyber-criminal.jpg"><img class="aligncenter size-full wp-image-691" title="cyber criminal" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/07/cyber-criminal.jpg" alt="" width="448" height="282" /></a></em></p>
<p><em>Our guest blogger this week is</em><em> Tom Bowers, Managing Director, <a rel="”nofollow” nofollow" href="http://www.securityconstructs.com/about.htm" target="_blank" class="broken_link">Security Constructs LLC</a> –</em> <em>a security architecture, data leakage prevention and global enterprise information consulting firm.</em></p>
<p>Back in the days of Prohibition, organized crime burst into the national consciousness with the “ka-pow” of a Tommy gun, capturing a sometimes romantic fascination that continues to this day.  The public face of organized crime may have morphed somewhat over the years, from Al Capone and Bugsy Siegal to Vito Corleone and Tony Soprano, but the mugshots have been generally similar and the contours of “the life” familiar.</p>
<p>With the advent of technology, however, organized crime has flocked to new outlaw opportunities that depart wildly from the old stomping grounds.  Today, cyber crime is the hot modern racket, with <a rel="”nofollow” nofollow" href="http://scamfraudalert.wordpress.com/2011/02/27/fbi-2010-cybercrime-statistics/" target="_blank" class="broken_link">offenses</a> ranging from the seemingly mundane (non-delivery of payment or merchandise top the list at 14.4% of all online crime), to the daring (scams impersonating the FBI, which come in second place at 13.2%), to the now well-known standbys (identity theft, rounding out third place at 9.8%).  At the center of the cyber crime explosion is organized crime, often formed into <a rel="”nofollow” nofollow" href="http://www.washingtonpost.com/wp-dyn/content/article/2009/04/15/AR2009041501196.html" target="_blank" class="broken_link">global gangs</a> (frequently based in Eastern Europe), ever more sophisticated, and comprising a new kind of operation that doesn’t look anything like the movies.</p>
<p>Indeed, cyber criminals have been so successful in recent years that they have seemed unstoppable, leaving federal law enforcement struggling with the fast pace of attacks and ever-changing tactics.  The FBI gained headway &#8211; and large-scale arrests in the U.S. &#8211; with the hiring of more agents with computer science, business and operational analysis backgrounds, but cyber criminals responded by <a rel="”nofollow” nofollow" href="http://www.reuters.com/article/2010/03/24/us-technology-scareware-idUSTRE62N29T20100324" target="_blank" class="broken_link">outsourcing</a> their operations to countries with weak computer crime laws and law enforcement capabilities.  Investigations across borders were bogged down by legal proceedings, arrests and convictions were slow to materialize, and negative public outcry placed pressure on governments around the world.</p>
<p>But now the tide has changed.  The three-year-old <a rel="”nofollow” nofollow" href="http://www.impact-alliance.org/home/index.html" target="_blank" class="broken_link">International Multilateral Partnership Against Cyber Threats (IMPACT)</a> is the world’s first not-for-profit comprehensive global public-private partnership against cyber threats, bringing together academia, industry experts and governments from more than 120 partner countries.  The <a rel="”nofollow” nofollow" href="http://www.theregister.co.uk/2011/05/25/uk_ratifies_cybercrime_convention/" target="_blank" class="broken_link">Budapest Convention on Cybercrime</a>, an effort to synchronize national cyber security laws, has been joined by more than 30 different countries.  The European Union, U.S and NATO are working together to tackle cyber crime and have announced the formation of a <a rel="”nofollow” nofollow" href="http://www.pcworld.com/businesscenter/article/211297/eu_us_and_nato_to_work_together_on_cyber_defense.html" target="_blank" class="broken_link">new cybercrime center</a>, to be operational by 2013.</p>
<p>As international agreements begin to take shape, global law enforcement benefits from common frameworks for cooperation.  Accordingly, countries are beginning to share enforcement officers, time and talent…and <a rel="”nofollow” nofollow" href="http://www.pcworld.com/businesscenter/article/235390/uk_claims_cybercrime_victory_after_phishing_gang_sentencing.html" target="_blank" class="broken_link">cyber crime arrests</a> are on the rise.  Clearly, a mobilized, globalized and flexible law enforcement response to cyber criminal activity – combined with <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">best practices</a> for data breach prevention – are the best ways to keep today’s mob offline and on the run.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/07/26/as-organized-crime-goes-virtual-the-law-cyber-saddles-up/&via=Experian_DBR&text=As organized crime goes virtual, the law cyber-saddles up&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/07/26/as-organized-crime-goes-virtual-the-law-cyber-saddles-up/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>