Cyber-security and Encryption

Download Report

Transcript Cyber-security and Encryption

Cyber-security and Encryption
©
Sergeant Paul Johnstone LLB MLitt
Garda Bureau of Fraud Investigation
What is Encryption?
Encryption is an electronic method used to protect the integrity
of devices, data and communications by scrambling the
contents preventing its use by persons who don't have the
decryption code needed to unscramble it again.
Conversion of electronic data into another form (ciphertext)
which is not readable without an appropriate key.
Development of encryption

Ancient encryption
replaced letters by
known numbers

Enigma Machine used a
group of selected rotors
used to replace selected
letters. The rotors are
replaced periodically


Modern Encryption using
ASymmetric method –
public to lock and private
key to unlock data
Later Encryption used
Symmetric method –
same key
(algorithm/cipher) to lock
and unlock
Why is it important?






Secure data and information exchange – authorised use
Prevents data loss or manipulation – internal and external*
Enables secure browsing - WiFi
Enables secure access to emails and content
Legal and ethical obligation to protect sensitive data
Protects client and YOU
Censure from Professional Bodies
Censure from Political or Governmental Bodies – DPC etc
Prevents Civil claim by clients
Prevents reputational damage
•
Its available and relatively easy to use
Problems with Encryption
1)
2)
3)
4)
5)
6)
7)
some
Slows down browsing and file exchange as the file is
transferred encrypted and then decrypted at the other
end.
If you forget the decryption key the data is lost. If you
lose the device, the data is lost
Which one to use – large number of suppliers
Not secure from attack – SQL injection or Java Exploit
Human Error – is it totally secure?*
Applications with access to encrypted data can be
infected with sniffing malware etc
The can be cracked by reverse engineering or...Truecrypt
Types of Encryption
1. Whole Disk encryption
2. Partition Encryption
3. Volume Encryption
4. Folder Encryption
5. File Encryption
7. E-mail Encryption
6. Mobile Data Encryption
8 Application Encryption
Security of Devices

Offline devices – not on internal network
Security of Devices
Online networks
Wired
Wireless
Home
Encryption Examples
PGP – Communications/files/email
 FileVault II – MAC Devices
 BitLocker – Windows Devices
 VeraCrypt – Disks/volumes/files/systems
 GPG (GNU Privacy Guard)- files/folders
 BestCrypt – Files/Folders
 TrueCrypt - now compromised

Encryption to 256bit. ‘Unbreakable’. Can upgrade to 512 Military.
When needed?
Devices Stolen
 Network compromised or hacked
 Insecure networks – open wifi etc
 Media lost
 BYOD
 Email intrusion – malware
 Data sent to wrong recipient

Level Needed

No correct answer - Depends on
a. The data
b. Your needs
c. The risks – real or perceived
Policies on Encryption
i.
ii.
iii.
iv.
v.
vi.
vii.
viii.
Law Society – Ireland & UK
HSE – Ireland
Bar Council UK
NUI Galway
An Garda Síochána – secure access and mobile devices
Government Departments – mobile device data
Etc......
Your policy should be your policy
Security of Communications








SMS and emails messages are susceptible to intercept
Open WiFi in cafe or hotel etc – phone seeks and connects
Hacker uses laptop with WAP running and stronger signal that
WiFi in premises.
My device will automatically seek the stronger signal and
connect
I send message over internet using phone and WiFi
Hacker sets his network to reject MMS (secure messaging)
My network reverts to SMS plain text messaging
Hacker has my messages and attachments and if he
connects malware to phone – he has access to my account
etc...
Home Networks






Connected to home WiFi network - secure
Previously connected to open WiFi
Car outside war-driving with strong open WiFi
Device connects to stronger open signal
Access to computer, malware injection,
contents etc
Disable WiFi scanning when at home and
encrypt
People
One of the most significant risks of data loss
User Mistakes
Simple Passwords
Password Sharing
Password abuse/theft
Same password used for
everything
Network/Data Intrusions
Memory stick manipulation
 Stick dropped outside
 Connected to network
 Second pin removed
 Windows machines = keyboard
 Malware = full access
 BYOD – not good policy

Online security



Accessing from public WiFi – credentials captured and email accessed
Opening insecure attachments
Browser History – site running awstats: captures visits, IP logs and activity
on site*.
Social Media
Apart from recognised risks – spamming,
cyberbullying, personation, trolling etc....
 Know your friends
 Beware of profiles that stay logged in*

Online Passwords

Search on Pastebin.com for ‘barrister’
Passwords contd...
Identifying threats
Know your system
 Know your users
 Know your devices
 Use encryption
 Use secure email
 Vary and change passwords
 Unknown source – DELETE
 Disable WiFi scanning after connection

Security
Security is your concern – its your data
 Its as secure as you make it
 Antivirus, malware protection, passwords
 System intrusion testing and updates
 Intrusion detection software
 If in doubt consult IT specialists
Grant Thornton – Ritz - Critical Data – Mazars - Mandiant – RMS –

Espion – Ward Solutions – eSentire – Digicore - etc
Homework
•
If you have a website run the following Google tests against it at
home
‘filetype:docs site:pauljohnstone.ie’
‘info:pauljohnstone.ie’
•
•
•
Is there access to a private members area on a publically accessible
system? – subject to interception.
Is your internal network and internet access through same
machine? – subject to interception
Is your WiFi open – www.wigle.net maps open wireless networks
Sgt Paul Johnstone
Computer Crime Investigation Unit
An Garda Síochána
Harcourt Street
Dublin 2
D02 PT89
Tel: +353 1 6663796
Mob: +363 86 8281889
Email: [email protected]