44
2 United States Department of Education Privacy Technical Assistance Center Mike Tassey Privacy Technical Assistance Center FERPA Considerations: Data Security Higher Education Institutions March 13, 2018

FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education

Privacy Technical Assistance Center

Mike Tassey

Privacy Technical Assistance Center

FERPA ConsiderationsData SecurityHigher Education InstitutionsMarch 13 2018

2United States Department of Education Privacy Technical Assistance Center2

FERPA amp Data Security

What specific technology controls does FERPA require for your IT systems

2

2United States Department of Education Privacy Technical Assistance Center3

FERPA amp Data Security

Yuphellip Nadahellip Nothinghellip Zilchhellip

2United States Department of Education Privacy Technical Assistance Center4

FERPA amp Data Security

Why doesnrsquot FERPA tell me howto protect student records

4

2United States Department of Education Privacy Technical Assistance Center5

FERPA amp Data Security

bull FERPA was written in 1974hellip

bull Initially focused on the protection of paper records and information

bull This is both a blessing and a curse

bull FERPA deals addresses data security through the concept of ldquoReasonable Methodsrdquo

5

2United States Department of Education Privacy Technical Assistance Center6

FERPA amp Data Security

We generally interpret reasonable methods to mean a set of security controls that are in line with current accepted security and privacy best practices for data of similar sensitivity

6

reamiddotsonmiddotamiddotble methmiddotodˈrēz(ə)nəb(ə)l ˈmeTHəd

2United States Department of Education Privacy Technical Assistance Center77

Cyber budget = $67 Billion Cyber Budget = Gym Teacher

FERPA amp Data Security

2United States Department of Education Privacy Technical Assistance Center8

bullTechnology

bullPolicies

bullTraining

FERPA amp Data Security

2United States Department of Education Privacy Technical Assistance Center9

The Facts - 2017

bull Over 100 data security incidents

bull gt11 Million records breached

bull gt 3000 records per day

bull Loss includes

bull SSN

bull Names

bull Addresses

bull Grades

bull Emails

bull Employee data

bull Discipline records

bull Tax data

2United States Department of Education Privacy Technical Assistance Center10

The Causes

Credit Card Fraud

Lost hardware

Unknown

Insider

Physical Theft

Portable drive loss

Hacking

Unintended Disclosure

2United States Department of Education Privacy Technical Assistance Center11

The Facts - 2018

California College of the Arts CA

Wallace Community College Selma AL

University of Wisconsin - Superior WI

Thomas Edison State University NJ

Midland School District IA

Livingston County Schools KY

Mississippi State University MS

Saginaw Valley State University MI

San Diego County Office of Education CA

Monticello Central School District NY

Broward College FL

Oklahoma State University Center for Health Sciences OK

Columbia Falls School District MT

Montana State University Billings MT

331512 Records

AR Map

2United States Department of Education Privacy Technical Assistance Center12

FERPA amp Data Security

bull ldquoSecurerdquo doesnrsquot exist

bull Data security is all about managing risk

bull No one is 100 patched

bull Nobody can predict the 0-day attack

12

2United States Department of Education Privacy Technical Assistance Center13

Problems in ED Data Systems

bull A ton of old or unpatched software

bull IoT devices in schools include

bull Server room cameras amp sensors

bull School surveillance systems

bull Access card readers

bull Modems (UPnP hackable)

bull HVAC Boilers

bull Hundreds of forgotten servers computers

2United States Department of Education Privacy Technical Assistance Center14

Why me

a hackerrsquos best friend

14

OK Googlehellip Find me some passwords

2United States Department of Education Privacy Technical Assistance Center15

2United States Department of Education Privacy Technical Assistance Center16

Out of Date-a-bases5152-community

5026

5149-community

5549-0ubuntu014041

5556-MariaDB

5536-log

5026

5549-0ubuntu014041

2United States Department of Education Privacy Technical Assistance Center17

2United States Department of Education Privacy Technical Assistance Center18

Database Exposure

2United States Department of Education Privacy Technical Assistance Center19

MongoDB Instances (No Authentication)

2United States Department of Education Privacy Technical Assistance Center20

Extortion as a result of misconfigured service

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 2: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center2

FERPA amp Data Security

What specific technology controls does FERPA require for your IT systems

2

2United States Department of Education Privacy Technical Assistance Center3

FERPA amp Data Security

Yuphellip Nadahellip Nothinghellip Zilchhellip

2United States Department of Education Privacy Technical Assistance Center4

FERPA amp Data Security

Why doesnrsquot FERPA tell me howto protect student records

4

2United States Department of Education Privacy Technical Assistance Center5

FERPA amp Data Security

bull FERPA was written in 1974hellip

bull Initially focused on the protection of paper records and information

bull This is both a blessing and a curse

bull FERPA deals addresses data security through the concept of ldquoReasonable Methodsrdquo

5

2United States Department of Education Privacy Technical Assistance Center6

FERPA amp Data Security

We generally interpret reasonable methods to mean a set of security controls that are in line with current accepted security and privacy best practices for data of similar sensitivity

6

reamiddotsonmiddotamiddotble methmiddotodˈrēz(ə)nəb(ə)l ˈmeTHəd

2United States Department of Education Privacy Technical Assistance Center77

Cyber budget = $67 Billion Cyber Budget = Gym Teacher

FERPA amp Data Security

2United States Department of Education Privacy Technical Assistance Center8

bullTechnology

bullPolicies

bullTraining

FERPA amp Data Security

2United States Department of Education Privacy Technical Assistance Center9

The Facts - 2017

bull Over 100 data security incidents

bull gt11 Million records breached

bull gt 3000 records per day

bull Loss includes

bull SSN

bull Names

bull Addresses

bull Grades

bull Emails

bull Employee data

bull Discipline records

bull Tax data

2United States Department of Education Privacy Technical Assistance Center10

The Causes

Credit Card Fraud

Lost hardware

Unknown

Insider

Physical Theft

Portable drive loss

Hacking

Unintended Disclosure

2United States Department of Education Privacy Technical Assistance Center11

The Facts - 2018

California College of the Arts CA

Wallace Community College Selma AL

University of Wisconsin - Superior WI

Thomas Edison State University NJ

Midland School District IA

Livingston County Schools KY

Mississippi State University MS

Saginaw Valley State University MI

San Diego County Office of Education CA

Monticello Central School District NY

Broward College FL

Oklahoma State University Center for Health Sciences OK

Columbia Falls School District MT

Montana State University Billings MT

331512 Records

AR Map

2United States Department of Education Privacy Technical Assistance Center12

FERPA amp Data Security

bull ldquoSecurerdquo doesnrsquot exist

bull Data security is all about managing risk

bull No one is 100 patched

bull Nobody can predict the 0-day attack

12

2United States Department of Education Privacy Technical Assistance Center13

Problems in ED Data Systems

bull A ton of old or unpatched software

bull IoT devices in schools include

bull Server room cameras amp sensors

bull School surveillance systems

bull Access card readers

bull Modems (UPnP hackable)

bull HVAC Boilers

bull Hundreds of forgotten servers computers

2United States Department of Education Privacy Technical Assistance Center14

Why me

a hackerrsquos best friend

14

OK Googlehellip Find me some passwords

2United States Department of Education Privacy Technical Assistance Center15

2United States Department of Education Privacy Technical Assistance Center16

Out of Date-a-bases5152-community

5026

5149-community

5549-0ubuntu014041

5556-MariaDB

5536-log

5026

5549-0ubuntu014041

2United States Department of Education Privacy Technical Assistance Center17

2United States Department of Education Privacy Technical Assistance Center18

Database Exposure

2United States Department of Education Privacy Technical Assistance Center19

MongoDB Instances (No Authentication)

2United States Department of Education Privacy Technical Assistance Center20

Extortion as a result of misconfigured service

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 3: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center3

FERPA amp Data Security

Yuphellip Nadahellip Nothinghellip Zilchhellip

2United States Department of Education Privacy Technical Assistance Center4

FERPA amp Data Security

Why doesnrsquot FERPA tell me howto protect student records

4

2United States Department of Education Privacy Technical Assistance Center5

FERPA amp Data Security

bull FERPA was written in 1974hellip

bull Initially focused on the protection of paper records and information

bull This is both a blessing and a curse

bull FERPA deals addresses data security through the concept of ldquoReasonable Methodsrdquo

5

2United States Department of Education Privacy Technical Assistance Center6

FERPA amp Data Security

We generally interpret reasonable methods to mean a set of security controls that are in line with current accepted security and privacy best practices for data of similar sensitivity

6

reamiddotsonmiddotamiddotble methmiddotodˈrēz(ə)nəb(ə)l ˈmeTHəd

2United States Department of Education Privacy Technical Assistance Center77

Cyber budget = $67 Billion Cyber Budget = Gym Teacher

FERPA amp Data Security

2United States Department of Education Privacy Technical Assistance Center8

bullTechnology

bullPolicies

bullTraining

FERPA amp Data Security

2United States Department of Education Privacy Technical Assistance Center9

The Facts - 2017

bull Over 100 data security incidents

bull gt11 Million records breached

bull gt 3000 records per day

bull Loss includes

bull SSN

bull Names

bull Addresses

bull Grades

bull Emails

bull Employee data

bull Discipline records

bull Tax data

2United States Department of Education Privacy Technical Assistance Center10

The Causes

Credit Card Fraud

Lost hardware

Unknown

Insider

Physical Theft

Portable drive loss

Hacking

Unintended Disclosure

2United States Department of Education Privacy Technical Assistance Center11

The Facts - 2018

California College of the Arts CA

Wallace Community College Selma AL

University of Wisconsin - Superior WI

Thomas Edison State University NJ

Midland School District IA

Livingston County Schools KY

Mississippi State University MS

Saginaw Valley State University MI

San Diego County Office of Education CA

Monticello Central School District NY

Broward College FL

Oklahoma State University Center for Health Sciences OK

Columbia Falls School District MT

Montana State University Billings MT

331512 Records

AR Map

2United States Department of Education Privacy Technical Assistance Center12

FERPA amp Data Security

bull ldquoSecurerdquo doesnrsquot exist

bull Data security is all about managing risk

bull No one is 100 patched

bull Nobody can predict the 0-day attack

12

2United States Department of Education Privacy Technical Assistance Center13

Problems in ED Data Systems

bull A ton of old or unpatched software

bull IoT devices in schools include

bull Server room cameras amp sensors

bull School surveillance systems

bull Access card readers

bull Modems (UPnP hackable)

bull HVAC Boilers

bull Hundreds of forgotten servers computers

2United States Department of Education Privacy Technical Assistance Center14

Why me

a hackerrsquos best friend

14

OK Googlehellip Find me some passwords

2United States Department of Education Privacy Technical Assistance Center15

2United States Department of Education Privacy Technical Assistance Center16

Out of Date-a-bases5152-community

5026

5149-community

5549-0ubuntu014041

5556-MariaDB

5536-log

5026

5549-0ubuntu014041

2United States Department of Education Privacy Technical Assistance Center17

2United States Department of Education Privacy Technical Assistance Center18

Database Exposure

2United States Department of Education Privacy Technical Assistance Center19

MongoDB Instances (No Authentication)

2United States Department of Education Privacy Technical Assistance Center20

Extortion as a result of misconfigured service

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 4: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center4

FERPA amp Data Security

Why doesnrsquot FERPA tell me howto protect student records

4

2United States Department of Education Privacy Technical Assistance Center5

FERPA amp Data Security

bull FERPA was written in 1974hellip

bull Initially focused on the protection of paper records and information

bull This is both a blessing and a curse

bull FERPA deals addresses data security through the concept of ldquoReasonable Methodsrdquo

5

2United States Department of Education Privacy Technical Assistance Center6

FERPA amp Data Security

We generally interpret reasonable methods to mean a set of security controls that are in line with current accepted security and privacy best practices for data of similar sensitivity

6

reamiddotsonmiddotamiddotble methmiddotodˈrēz(ə)nəb(ə)l ˈmeTHəd

2United States Department of Education Privacy Technical Assistance Center77

Cyber budget = $67 Billion Cyber Budget = Gym Teacher

FERPA amp Data Security

2United States Department of Education Privacy Technical Assistance Center8

bullTechnology

bullPolicies

bullTraining

FERPA amp Data Security

2United States Department of Education Privacy Technical Assistance Center9

The Facts - 2017

bull Over 100 data security incidents

bull gt11 Million records breached

bull gt 3000 records per day

bull Loss includes

bull SSN

bull Names

bull Addresses

bull Grades

bull Emails

bull Employee data

bull Discipline records

bull Tax data

2United States Department of Education Privacy Technical Assistance Center10

The Causes

Credit Card Fraud

Lost hardware

Unknown

Insider

Physical Theft

Portable drive loss

Hacking

Unintended Disclosure

2United States Department of Education Privacy Technical Assistance Center11

The Facts - 2018

California College of the Arts CA

Wallace Community College Selma AL

University of Wisconsin - Superior WI

Thomas Edison State University NJ

Midland School District IA

Livingston County Schools KY

Mississippi State University MS

Saginaw Valley State University MI

San Diego County Office of Education CA

Monticello Central School District NY

Broward College FL

Oklahoma State University Center for Health Sciences OK

Columbia Falls School District MT

Montana State University Billings MT

331512 Records

AR Map

2United States Department of Education Privacy Technical Assistance Center12

FERPA amp Data Security

bull ldquoSecurerdquo doesnrsquot exist

bull Data security is all about managing risk

bull No one is 100 patched

bull Nobody can predict the 0-day attack

12

2United States Department of Education Privacy Technical Assistance Center13

Problems in ED Data Systems

bull A ton of old or unpatched software

bull IoT devices in schools include

bull Server room cameras amp sensors

bull School surveillance systems

bull Access card readers

bull Modems (UPnP hackable)

bull HVAC Boilers

bull Hundreds of forgotten servers computers

2United States Department of Education Privacy Technical Assistance Center14

Why me

a hackerrsquos best friend

14

OK Googlehellip Find me some passwords

2United States Department of Education Privacy Technical Assistance Center15

2United States Department of Education Privacy Technical Assistance Center16

Out of Date-a-bases5152-community

5026

5149-community

5549-0ubuntu014041

5556-MariaDB

5536-log

5026

5549-0ubuntu014041

2United States Department of Education Privacy Technical Assistance Center17

2United States Department of Education Privacy Technical Assistance Center18

Database Exposure

2United States Department of Education Privacy Technical Assistance Center19

MongoDB Instances (No Authentication)

2United States Department of Education Privacy Technical Assistance Center20

Extortion as a result of misconfigured service

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 5: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center5

FERPA amp Data Security

bull FERPA was written in 1974hellip

bull Initially focused on the protection of paper records and information

bull This is both a blessing and a curse

bull FERPA deals addresses data security through the concept of ldquoReasonable Methodsrdquo

5

2United States Department of Education Privacy Technical Assistance Center6

FERPA amp Data Security

We generally interpret reasonable methods to mean a set of security controls that are in line with current accepted security and privacy best practices for data of similar sensitivity

6

reamiddotsonmiddotamiddotble methmiddotodˈrēz(ə)nəb(ə)l ˈmeTHəd

2United States Department of Education Privacy Technical Assistance Center77

Cyber budget = $67 Billion Cyber Budget = Gym Teacher

FERPA amp Data Security

2United States Department of Education Privacy Technical Assistance Center8

bullTechnology

bullPolicies

bullTraining

FERPA amp Data Security

2United States Department of Education Privacy Technical Assistance Center9

The Facts - 2017

bull Over 100 data security incidents

bull gt11 Million records breached

bull gt 3000 records per day

bull Loss includes

bull SSN

bull Names

bull Addresses

bull Grades

bull Emails

bull Employee data

bull Discipline records

bull Tax data

2United States Department of Education Privacy Technical Assistance Center10

The Causes

Credit Card Fraud

Lost hardware

Unknown

Insider

Physical Theft

Portable drive loss

Hacking

Unintended Disclosure

2United States Department of Education Privacy Technical Assistance Center11

The Facts - 2018

California College of the Arts CA

Wallace Community College Selma AL

University of Wisconsin - Superior WI

Thomas Edison State University NJ

Midland School District IA

Livingston County Schools KY

Mississippi State University MS

Saginaw Valley State University MI

San Diego County Office of Education CA

Monticello Central School District NY

Broward College FL

Oklahoma State University Center for Health Sciences OK

Columbia Falls School District MT

Montana State University Billings MT

331512 Records

AR Map

2United States Department of Education Privacy Technical Assistance Center12

FERPA amp Data Security

bull ldquoSecurerdquo doesnrsquot exist

bull Data security is all about managing risk

bull No one is 100 patched

bull Nobody can predict the 0-day attack

12

2United States Department of Education Privacy Technical Assistance Center13

Problems in ED Data Systems

bull A ton of old or unpatched software

bull IoT devices in schools include

bull Server room cameras amp sensors

bull School surveillance systems

bull Access card readers

bull Modems (UPnP hackable)

bull HVAC Boilers

bull Hundreds of forgotten servers computers

2United States Department of Education Privacy Technical Assistance Center14

Why me

a hackerrsquos best friend

14

OK Googlehellip Find me some passwords

2United States Department of Education Privacy Technical Assistance Center15

2United States Department of Education Privacy Technical Assistance Center16

Out of Date-a-bases5152-community

5026

5149-community

5549-0ubuntu014041

5556-MariaDB

5536-log

5026

5549-0ubuntu014041

2United States Department of Education Privacy Technical Assistance Center17

2United States Department of Education Privacy Technical Assistance Center18

Database Exposure

2United States Department of Education Privacy Technical Assistance Center19

MongoDB Instances (No Authentication)

2United States Department of Education Privacy Technical Assistance Center20

Extortion as a result of misconfigured service

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 6: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center6

FERPA amp Data Security

We generally interpret reasonable methods to mean a set of security controls that are in line with current accepted security and privacy best practices for data of similar sensitivity

6

reamiddotsonmiddotamiddotble methmiddotodˈrēz(ə)nəb(ə)l ˈmeTHəd

2United States Department of Education Privacy Technical Assistance Center77

Cyber budget = $67 Billion Cyber Budget = Gym Teacher

FERPA amp Data Security

2United States Department of Education Privacy Technical Assistance Center8

bullTechnology

bullPolicies

bullTraining

FERPA amp Data Security

2United States Department of Education Privacy Technical Assistance Center9

The Facts - 2017

bull Over 100 data security incidents

bull gt11 Million records breached

bull gt 3000 records per day

bull Loss includes

bull SSN

bull Names

bull Addresses

bull Grades

bull Emails

bull Employee data

bull Discipline records

bull Tax data

2United States Department of Education Privacy Technical Assistance Center10

The Causes

Credit Card Fraud

Lost hardware

Unknown

Insider

Physical Theft

Portable drive loss

Hacking

Unintended Disclosure

2United States Department of Education Privacy Technical Assistance Center11

The Facts - 2018

California College of the Arts CA

Wallace Community College Selma AL

University of Wisconsin - Superior WI

Thomas Edison State University NJ

Midland School District IA

Livingston County Schools KY

Mississippi State University MS

Saginaw Valley State University MI

San Diego County Office of Education CA

Monticello Central School District NY

Broward College FL

Oklahoma State University Center for Health Sciences OK

Columbia Falls School District MT

Montana State University Billings MT

331512 Records

AR Map

2United States Department of Education Privacy Technical Assistance Center12

FERPA amp Data Security

bull ldquoSecurerdquo doesnrsquot exist

bull Data security is all about managing risk

bull No one is 100 patched

bull Nobody can predict the 0-day attack

12

2United States Department of Education Privacy Technical Assistance Center13

Problems in ED Data Systems

bull A ton of old or unpatched software

bull IoT devices in schools include

bull Server room cameras amp sensors

bull School surveillance systems

bull Access card readers

bull Modems (UPnP hackable)

bull HVAC Boilers

bull Hundreds of forgotten servers computers

2United States Department of Education Privacy Technical Assistance Center14

Why me

a hackerrsquos best friend

14

OK Googlehellip Find me some passwords

2United States Department of Education Privacy Technical Assistance Center15

2United States Department of Education Privacy Technical Assistance Center16

Out of Date-a-bases5152-community

5026

5149-community

5549-0ubuntu014041

5556-MariaDB

5536-log

5026

5549-0ubuntu014041

2United States Department of Education Privacy Technical Assistance Center17

2United States Department of Education Privacy Technical Assistance Center18

Database Exposure

2United States Department of Education Privacy Technical Assistance Center19

MongoDB Instances (No Authentication)

2United States Department of Education Privacy Technical Assistance Center20

Extortion as a result of misconfigured service

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 7: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center77

Cyber budget = $67 Billion Cyber Budget = Gym Teacher

FERPA amp Data Security

2United States Department of Education Privacy Technical Assistance Center8

bullTechnology

bullPolicies

bullTraining

FERPA amp Data Security

2United States Department of Education Privacy Technical Assistance Center9

The Facts - 2017

bull Over 100 data security incidents

bull gt11 Million records breached

bull gt 3000 records per day

bull Loss includes

bull SSN

bull Names

bull Addresses

bull Grades

bull Emails

bull Employee data

bull Discipline records

bull Tax data

2United States Department of Education Privacy Technical Assistance Center10

The Causes

Credit Card Fraud

Lost hardware

Unknown

Insider

Physical Theft

Portable drive loss

Hacking

Unintended Disclosure

2United States Department of Education Privacy Technical Assistance Center11

The Facts - 2018

California College of the Arts CA

Wallace Community College Selma AL

University of Wisconsin - Superior WI

Thomas Edison State University NJ

Midland School District IA

Livingston County Schools KY

Mississippi State University MS

Saginaw Valley State University MI

San Diego County Office of Education CA

Monticello Central School District NY

Broward College FL

Oklahoma State University Center for Health Sciences OK

Columbia Falls School District MT

Montana State University Billings MT

331512 Records

AR Map

2United States Department of Education Privacy Technical Assistance Center12

FERPA amp Data Security

bull ldquoSecurerdquo doesnrsquot exist

bull Data security is all about managing risk

bull No one is 100 patched

bull Nobody can predict the 0-day attack

12

2United States Department of Education Privacy Technical Assistance Center13

Problems in ED Data Systems

bull A ton of old or unpatched software

bull IoT devices in schools include

bull Server room cameras amp sensors

bull School surveillance systems

bull Access card readers

bull Modems (UPnP hackable)

bull HVAC Boilers

bull Hundreds of forgotten servers computers

2United States Department of Education Privacy Technical Assistance Center14

Why me

a hackerrsquos best friend

14

OK Googlehellip Find me some passwords

2United States Department of Education Privacy Technical Assistance Center15

2United States Department of Education Privacy Technical Assistance Center16

Out of Date-a-bases5152-community

5026

5149-community

5549-0ubuntu014041

5556-MariaDB

5536-log

5026

5549-0ubuntu014041

2United States Department of Education Privacy Technical Assistance Center17

2United States Department of Education Privacy Technical Assistance Center18

Database Exposure

2United States Department of Education Privacy Technical Assistance Center19

MongoDB Instances (No Authentication)

2United States Department of Education Privacy Technical Assistance Center20

Extortion as a result of misconfigured service

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 8: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center8

bullTechnology

bullPolicies

bullTraining

FERPA amp Data Security

2United States Department of Education Privacy Technical Assistance Center9

The Facts - 2017

bull Over 100 data security incidents

bull gt11 Million records breached

bull gt 3000 records per day

bull Loss includes

bull SSN

bull Names

bull Addresses

bull Grades

bull Emails

bull Employee data

bull Discipline records

bull Tax data

2United States Department of Education Privacy Technical Assistance Center10

The Causes

Credit Card Fraud

Lost hardware

Unknown

Insider

Physical Theft

Portable drive loss

Hacking

Unintended Disclosure

2United States Department of Education Privacy Technical Assistance Center11

The Facts - 2018

California College of the Arts CA

Wallace Community College Selma AL

University of Wisconsin - Superior WI

Thomas Edison State University NJ

Midland School District IA

Livingston County Schools KY

Mississippi State University MS

Saginaw Valley State University MI

San Diego County Office of Education CA

Monticello Central School District NY

Broward College FL

Oklahoma State University Center for Health Sciences OK

Columbia Falls School District MT

Montana State University Billings MT

331512 Records

AR Map

2United States Department of Education Privacy Technical Assistance Center12

FERPA amp Data Security

bull ldquoSecurerdquo doesnrsquot exist

bull Data security is all about managing risk

bull No one is 100 patched

bull Nobody can predict the 0-day attack

12

2United States Department of Education Privacy Technical Assistance Center13

Problems in ED Data Systems

bull A ton of old or unpatched software

bull IoT devices in schools include

bull Server room cameras amp sensors

bull School surveillance systems

bull Access card readers

bull Modems (UPnP hackable)

bull HVAC Boilers

bull Hundreds of forgotten servers computers

2United States Department of Education Privacy Technical Assistance Center14

Why me

a hackerrsquos best friend

14

OK Googlehellip Find me some passwords

2United States Department of Education Privacy Technical Assistance Center15

2United States Department of Education Privacy Technical Assistance Center16

Out of Date-a-bases5152-community

5026

5149-community

5549-0ubuntu014041

5556-MariaDB

5536-log

5026

5549-0ubuntu014041

2United States Department of Education Privacy Technical Assistance Center17

2United States Department of Education Privacy Technical Assistance Center18

Database Exposure

2United States Department of Education Privacy Technical Assistance Center19

MongoDB Instances (No Authentication)

2United States Department of Education Privacy Technical Assistance Center20

Extortion as a result of misconfigured service

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 9: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center9

The Facts - 2017

bull Over 100 data security incidents

bull gt11 Million records breached

bull gt 3000 records per day

bull Loss includes

bull SSN

bull Names

bull Addresses

bull Grades

bull Emails

bull Employee data

bull Discipline records

bull Tax data

2United States Department of Education Privacy Technical Assistance Center10

The Causes

Credit Card Fraud

Lost hardware

Unknown

Insider

Physical Theft

Portable drive loss

Hacking

Unintended Disclosure

2United States Department of Education Privacy Technical Assistance Center11

The Facts - 2018

California College of the Arts CA

Wallace Community College Selma AL

University of Wisconsin - Superior WI

Thomas Edison State University NJ

Midland School District IA

Livingston County Schools KY

Mississippi State University MS

Saginaw Valley State University MI

San Diego County Office of Education CA

Monticello Central School District NY

Broward College FL

Oklahoma State University Center for Health Sciences OK

Columbia Falls School District MT

Montana State University Billings MT

331512 Records

AR Map

2United States Department of Education Privacy Technical Assistance Center12

FERPA amp Data Security

bull ldquoSecurerdquo doesnrsquot exist

bull Data security is all about managing risk

bull No one is 100 patched

bull Nobody can predict the 0-day attack

12

2United States Department of Education Privacy Technical Assistance Center13

Problems in ED Data Systems

bull A ton of old or unpatched software

bull IoT devices in schools include

bull Server room cameras amp sensors

bull School surveillance systems

bull Access card readers

bull Modems (UPnP hackable)

bull HVAC Boilers

bull Hundreds of forgotten servers computers

2United States Department of Education Privacy Technical Assistance Center14

Why me

a hackerrsquos best friend

14

OK Googlehellip Find me some passwords

2United States Department of Education Privacy Technical Assistance Center15

2United States Department of Education Privacy Technical Assistance Center16

Out of Date-a-bases5152-community

5026

5149-community

5549-0ubuntu014041

5556-MariaDB

5536-log

5026

5549-0ubuntu014041

2United States Department of Education Privacy Technical Assistance Center17

2United States Department of Education Privacy Technical Assistance Center18

Database Exposure

2United States Department of Education Privacy Technical Assistance Center19

MongoDB Instances (No Authentication)

2United States Department of Education Privacy Technical Assistance Center20

Extortion as a result of misconfigured service

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 10: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center10

The Causes

Credit Card Fraud

Lost hardware

Unknown

Insider

Physical Theft

Portable drive loss

Hacking

Unintended Disclosure

2United States Department of Education Privacy Technical Assistance Center11

The Facts - 2018

California College of the Arts CA

Wallace Community College Selma AL

University of Wisconsin - Superior WI

Thomas Edison State University NJ

Midland School District IA

Livingston County Schools KY

Mississippi State University MS

Saginaw Valley State University MI

San Diego County Office of Education CA

Monticello Central School District NY

Broward College FL

Oklahoma State University Center for Health Sciences OK

Columbia Falls School District MT

Montana State University Billings MT

331512 Records

AR Map

2United States Department of Education Privacy Technical Assistance Center12

FERPA amp Data Security

bull ldquoSecurerdquo doesnrsquot exist

bull Data security is all about managing risk

bull No one is 100 patched

bull Nobody can predict the 0-day attack

12

2United States Department of Education Privacy Technical Assistance Center13

Problems in ED Data Systems

bull A ton of old or unpatched software

bull IoT devices in schools include

bull Server room cameras amp sensors

bull School surveillance systems

bull Access card readers

bull Modems (UPnP hackable)

bull HVAC Boilers

bull Hundreds of forgotten servers computers

2United States Department of Education Privacy Technical Assistance Center14

Why me

a hackerrsquos best friend

14

OK Googlehellip Find me some passwords

2United States Department of Education Privacy Technical Assistance Center15

2United States Department of Education Privacy Technical Assistance Center16

Out of Date-a-bases5152-community

5026

5149-community

5549-0ubuntu014041

5556-MariaDB

5536-log

5026

5549-0ubuntu014041

2United States Department of Education Privacy Technical Assistance Center17

2United States Department of Education Privacy Technical Assistance Center18

Database Exposure

2United States Department of Education Privacy Technical Assistance Center19

MongoDB Instances (No Authentication)

2United States Department of Education Privacy Technical Assistance Center20

Extortion as a result of misconfigured service

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 11: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center11

The Facts - 2018

California College of the Arts CA

Wallace Community College Selma AL

University of Wisconsin - Superior WI

Thomas Edison State University NJ

Midland School District IA

Livingston County Schools KY

Mississippi State University MS

Saginaw Valley State University MI

San Diego County Office of Education CA

Monticello Central School District NY

Broward College FL

Oklahoma State University Center for Health Sciences OK

Columbia Falls School District MT

Montana State University Billings MT

331512 Records

AR Map

2United States Department of Education Privacy Technical Assistance Center12

FERPA amp Data Security

bull ldquoSecurerdquo doesnrsquot exist

bull Data security is all about managing risk

bull No one is 100 patched

bull Nobody can predict the 0-day attack

12

2United States Department of Education Privacy Technical Assistance Center13

Problems in ED Data Systems

bull A ton of old or unpatched software

bull IoT devices in schools include

bull Server room cameras amp sensors

bull School surveillance systems

bull Access card readers

bull Modems (UPnP hackable)

bull HVAC Boilers

bull Hundreds of forgotten servers computers

2United States Department of Education Privacy Technical Assistance Center14

Why me

a hackerrsquos best friend

14

OK Googlehellip Find me some passwords

2United States Department of Education Privacy Technical Assistance Center15

2United States Department of Education Privacy Technical Assistance Center16

Out of Date-a-bases5152-community

5026

5149-community

5549-0ubuntu014041

5556-MariaDB

5536-log

5026

5549-0ubuntu014041

2United States Department of Education Privacy Technical Assistance Center17

2United States Department of Education Privacy Technical Assistance Center18

Database Exposure

2United States Department of Education Privacy Technical Assistance Center19

MongoDB Instances (No Authentication)

2United States Department of Education Privacy Technical Assistance Center20

Extortion as a result of misconfigured service

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 12: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center12

FERPA amp Data Security

bull ldquoSecurerdquo doesnrsquot exist

bull Data security is all about managing risk

bull No one is 100 patched

bull Nobody can predict the 0-day attack

12

2United States Department of Education Privacy Technical Assistance Center13

Problems in ED Data Systems

bull A ton of old or unpatched software

bull IoT devices in schools include

bull Server room cameras amp sensors

bull School surveillance systems

bull Access card readers

bull Modems (UPnP hackable)

bull HVAC Boilers

bull Hundreds of forgotten servers computers

2United States Department of Education Privacy Technical Assistance Center14

Why me

a hackerrsquos best friend

14

OK Googlehellip Find me some passwords

2United States Department of Education Privacy Technical Assistance Center15

2United States Department of Education Privacy Technical Assistance Center16

Out of Date-a-bases5152-community

5026

5149-community

5549-0ubuntu014041

5556-MariaDB

5536-log

5026

5549-0ubuntu014041

2United States Department of Education Privacy Technical Assistance Center17

2United States Department of Education Privacy Technical Assistance Center18

Database Exposure

2United States Department of Education Privacy Technical Assistance Center19

MongoDB Instances (No Authentication)

2United States Department of Education Privacy Technical Assistance Center20

Extortion as a result of misconfigured service

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 13: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center13

Problems in ED Data Systems

bull A ton of old or unpatched software

bull IoT devices in schools include

bull Server room cameras amp sensors

bull School surveillance systems

bull Access card readers

bull Modems (UPnP hackable)

bull HVAC Boilers

bull Hundreds of forgotten servers computers

2United States Department of Education Privacy Technical Assistance Center14

Why me

a hackerrsquos best friend

14

OK Googlehellip Find me some passwords

2United States Department of Education Privacy Technical Assistance Center15

2United States Department of Education Privacy Technical Assistance Center16

Out of Date-a-bases5152-community

5026

5149-community

5549-0ubuntu014041

5556-MariaDB

5536-log

5026

5549-0ubuntu014041

2United States Department of Education Privacy Technical Assistance Center17

2United States Department of Education Privacy Technical Assistance Center18

Database Exposure

2United States Department of Education Privacy Technical Assistance Center19

MongoDB Instances (No Authentication)

2United States Department of Education Privacy Technical Assistance Center20

Extortion as a result of misconfigured service

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 14: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center14

Why me

a hackerrsquos best friend

14

OK Googlehellip Find me some passwords

2United States Department of Education Privacy Technical Assistance Center15

2United States Department of Education Privacy Technical Assistance Center16

Out of Date-a-bases5152-community

5026

5149-community

5549-0ubuntu014041

5556-MariaDB

5536-log

5026

5549-0ubuntu014041

2United States Department of Education Privacy Technical Assistance Center17

2United States Department of Education Privacy Technical Assistance Center18

Database Exposure

2United States Department of Education Privacy Technical Assistance Center19

MongoDB Instances (No Authentication)

2United States Department of Education Privacy Technical Assistance Center20

Extortion as a result of misconfigured service

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 15: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center15

2United States Department of Education Privacy Technical Assistance Center16

Out of Date-a-bases5152-community

5026

5149-community

5549-0ubuntu014041

5556-MariaDB

5536-log

5026

5549-0ubuntu014041

2United States Department of Education Privacy Technical Assistance Center17

2United States Department of Education Privacy Technical Assistance Center18

Database Exposure

2United States Department of Education Privacy Technical Assistance Center19

MongoDB Instances (No Authentication)

2United States Department of Education Privacy Technical Assistance Center20

Extortion as a result of misconfigured service

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 16: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center16

Out of Date-a-bases5152-community

5026

5149-community

5549-0ubuntu014041

5556-MariaDB

5536-log

5026

5549-0ubuntu014041

2United States Department of Education Privacy Technical Assistance Center17

2United States Department of Education Privacy Technical Assistance Center18

Database Exposure

2United States Department of Education Privacy Technical Assistance Center19

MongoDB Instances (No Authentication)

2United States Department of Education Privacy Technical Assistance Center20

Extortion as a result of misconfigured service

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 17: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center17

2United States Department of Education Privacy Technical Assistance Center18

Database Exposure

2United States Department of Education Privacy Technical Assistance Center19

MongoDB Instances (No Authentication)

2United States Department of Education Privacy Technical Assistance Center20

Extortion as a result of misconfigured service

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 18: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center18

Database Exposure

2United States Department of Education Privacy Technical Assistance Center19

MongoDB Instances (No Authentication)

2United States Department of Education Privacy Technical Assistance Center20

Extortion as a result of misconfigured service

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 19: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center19

MongoDB Instances (No Authentication)

2United States Department of Education Privacy Technical Assistance Center20

Extortion as a result of misconfigured service

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 20: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center20

Extortion as a result of misconfigured service

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 21: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center21

Is it hot in here

Internet of Things (IoT) and Industrial Control System (ICS) attacks

bull University Baseball Stadium

bull School thermostats

bull IP cameras

bull Access control stations (door controls badge swipe etc)

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 22: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center22

The Reality is

Attackers only have to get lucky oncehellip

22

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 23: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center23

Threats to Data

Internal

External

bull Mistakes bull Intentional misconductbull Curiosity

bull Hackersbull Social engineering attacksbull Malware

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 24: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center24

Understanding the Threat

Key points to understand

1 Data will get breached

2 You will never have enough resources to be ldquosecurerdquo

3 It is about how you prepare

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 25: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center25

Social Engineering

ldquoThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposesrdquo

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 26: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center26

Social Engineering

bull Phishing emails

bull Spear Phishing amp Whaling

bull Telephone calls SMS messages

bull Baiting

bullWatering hole attacks

bull Scareware

Nearly every successful intrusion involves some form of Social Engineering

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 27: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center27

Phishing Awareness - Example

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 28: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center28

Feeling Guilty

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 29: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center29

Phishing Awareness

Most phishing e-mails are easy to notice Here are some things a sophisticated hacker to do to gain access to your systems

1 Locate Staff Directory (yes itrsquos there)

2 Send Phishing E-mail to targeted employees infecting the unwary user

3 Locate and exfiltrate data pwn everything

4 Profit

29

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 30: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center30

2017 W-2 Phishing

bull Now targeting Schools and Education Institutions

bull Spear-Phishing through email

bull Focus on HR Payroll staff

bull Goal is to obtain employee data to file false returns

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 31: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center31

2018 W-2 Phishing

Attacker

WWW

bull Key peoplebull Positionsbull Email addressesAttacker

masquerades as a person of authority

(CEO or boss)

HR Payroll Employees

Fraudulent Tax Filing

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 32: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center32

Combating Social Engineering

bull Train users on information security annually

bull Training should include phishing safe browsing habits likebull Being wary of unsolicited email from untrusted

sources

bull Ensuring connections are secure

bull Validating links before clicking

bull Make sure employees know who to contact in the event of an issue

bull Do not rely on technology alone

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 33: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center33

What to do - Organizationally

bull Make good reasonable policy that is backed by leadership

bull Do a risk assessment determine your risk threshold

bull Training coupled with security awareness updates

bull Develop an incident response plan

bull Train staff on the plan

bull Test the plan

bull Think like a hacker

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 34: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center34

Security Tips for Users

Enterprise controls only extend to the network boundary Users take their devices on the road to the airport and the local coffee shop Here are what users can do to protect themselves when away from the office

bull Be aware of common threats affecting users

bull Take steps to reduce risk

34

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 35: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center35

What to do - Individually

bull Use encryption SSLTLS VPN Full-disk file level

bull Verify website are secure by visually checking

bull Treat all WiFi as untrusted WiFi

bull Check links in emails and documents before clicking through them

bull Never plug in a strange flash drive

bull Set a screen lock

bull Patch and update regularly especially for third party applications

bull Use strong passwords

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 36: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center36

Passwords How good is this password

bull zQ4abui

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 37: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center37

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 38: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center38

How about this Password

bull I L0ve my M0m

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 39: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center39

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 40: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center40

Security Tips for Users

Wi-Fi can be convenient but using free Wi-Fi carries some risks

bull Fake access points can lure you into connecting to a hackerrsquos system

bull Man-in-the-middle attacks can expose sensitive data in transit

40

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 41: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center41

Security Tips for Users

bull

41

Internet

Wireless User Attacker

The user is connected to their local free wireless access point called ldquoFreeWiFirdquo

The attacker sends a spoofed message pretending to be the access point instructing the Userrsquos computer to disconnect

The Attacker then creates his own access point with the same Service Set Identifier (SSID)

De-Authenticate

FreeWiFi

ldquoHey there I am FreeWiFi Connect to merdquo

The Clientrsquos computer then reconnects to what it thinks is the same ldquoFreeWiFirdquo network

The Attacker is now the service provider for the User and is able to see and manipulate the Userrsquos network traffic

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 42: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center42

Security Tips for Users

bull Avoid using untrusted networks to do sensitive things

bull If you must use Virtual Private Network (VPN) technologies to secure your access

bull Donrsquot join wireless networks automatically or just turn off Wi-Fi unless you need it

bull Be wary of odd behavior on free Wi-Fi networks like frequent disconnects slow performance or certificate warnings

bull Employ strong WPA2 encryption for your own wireless networks with a long and complex passphrase

42

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 43: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center43

Questions

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073

Page 44: FERPA Considerations security.pdf · Combating Social Engineering •Train users on information security annually. •Training should include phishing / safe browsing habits like:

2United States Department of Education Privacy Technical Assistance Center44

CONTACT INFORMATION

United States Department of Education

Privacy Technical Assistance Center

(855) 249-3072

(202) 260-3887

privacyTAedgov

httpstudentprivacyedgov

(855) 249-3073