Unseemly Use of IT Resources and How to Monitor .


82 views
Uploaded on:
Description
Unseemly Utilization of IT Assets and How to Screen . Kevin Savoy, CPA, CISA, CISSP Executive of Data Innovation Reviews Brian Daniels, CISA, GCFA Senior IT Evaluator. Plan. Current Status Law Strategy Specialized Angles Systems Checking. Explicit entertainment Examinations.
Transcripts
Slide 1

Unseemly Use of IT Resources and How to Monitor Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Slide 2

Agenda Current Status Law Policy Technical Aspects Procedures Monitoring

Slide 3

Pornography Investigations Commonwealth law and UVA Policy disallow state representatives survey and downloading of sexually unequivocal material through state assets. The Audit Department does not make a special effort to search for this action. We act when it is accounted for to us. Must have consent from the President or Vice President of the zone to audit somebody\'s PC exercises.

Slide 4

Morality Police? I and my staff are not here to uphold ethical quality. What representatives do at home (unless criminal) that does not impact UVA is not my issue to worry about.

Slide 5

Past 14 months Ten examinations of staff/workforce. Nine (9) representatives have left the establishment. Heinous situations where workers were downloading a large number of pictures/films. Some utilizing distributed document imparting to clients around the globe. Some utilizing "pagesucker" programming to download entire sites.

Slide 6

What are the dangers? Potential for Hostile Workplace claims. Deplete on IT assets (data transfer capacity, drive space). Erotic entertainment is notorious as a way to tempt clients to locales that are ready with security dangers, for example, infections, Trojan steed indirect access programming and so on. Criminal action, for example, youngster explicit entertainment.

Slide 7

It\'s an issue… . SexTracker, a porn industry consultancy expresses that around 70% of all Web activity to Internet erotica destinations happens between 9 a.m. furthermore, 5 p.m. The quantity of porn locales has vaulted eighteen overlay, to 1.3 million, since 1998, says the National Research Council.

Slide 8

CODE OF VIRGINIA 2.2-2827 . Limitations on state worker access to data framework. But to the degree required in conjunction with a true blue, organization affirmed look into venture or other office endorsed undertaking, no office representative might use office claimed or office rented PC hardware to get to, download, print or store any data foundation records or administrations having sexually express substance . Organization endorsements should be given in composing by office heads, and any such endorsements might be accessible to general society under the arrangements of the Virginia Freedom of Information Act (§ 2.2-3700 ).

Slide 9

Definition of sexually express We stick to the law\'s meaning of sexually unequivocal. (2.2-2827 and 18.2-390) This definition can be found at: http://leg1.state.va.us/cgi-receptacle/legp504.exe?000+cod+18.2-390

Slide 10

UVA Policy Mirrors the Commonwealth\'s Code of Virginia: http://www.itc.virginia.edu/approach/moreobscene.html

Slide 11

Degrees of Pornography Audit Department understands that proof of sexually express material can be abandoned from incidental hit of a sexually unequivocal site or got spontaneous by means of email. We calculate that our examinations.

Slide 12

Technical Issues – Peer to Peer File Sharing (P2P) University condition is a sharing situation. We do NO substance separating. P2P permits clients to download parts of records from each other. Your PC may have 10 percent of a document whatever is left of the world is searching for. Therefore you turn into a server for those clients.

Slide 13

P2P proceeded with It works extraordinary and was planned so everybody would not need to hit only one webpage to download a film or whatever and along these lines overpower it. Two people were utilizing it to gather and circulate grown-up erotic entertainment from UVA. It can be made into a computerized procedure where you write the obsession that you are occupied with and you start to download and exchange documents with other Internet clients.

Slide 14

P2P dangers Potential is there to download and exchange motion pictures and pictures that you are ignorant of. Generally, UVA or any business could turn into a server for kid obscenity if not cautious.

Slide 15

Page Sucker and Vampire Examples of programming that permit one to download most of the substance of a site so it is put away and saw disconnected. One individual observed. The client supposition is that they won\'t be gotten through Internet logs.

Slide 16

Generic log ins Many PCs have bland logins so it turns out to be difficult to track insulting gatherings. In any case, wherever conceivable it is best to initiate individualized logins for accountably. (Nobody likes to be rebuked as once huge mob for another client\'s careless activities).

Slide 17

Procedures Allegations of mishandle ought to be made to Internal Audit or UVA Police (on the off chance that it seems criminal). IT Audit and UVA Police are working firmly together when criminal exercises might be available. Divisions: DO NOT ATTEMPT to examine all alone as this may venture on proof and in a most dire outcome imaginable make it invalid for HR as well as criminal court procedures.

Slide 18

Local Support Partner (LSP\'s part) A couple cases were conveyed to our consideration when a LSP went to his administrator to express that a client\'s framework had sexually unequivocal material on it. For those situation\'s the worker griped that his framework was moderate. (That will happen when you store 1000\'s of porn motion pictures and pictures on your framework!!)

Slide 19

LSP\'s part According to the UVA General Counsel\'s office, representatives of the University for the most part are not at danger of individual obligation for revealing potential legitimate and arrangement infringement, if taking after set strategy in compliance with common decency.

Slide 20

Warning signs… Monitor situated so that no easygoing spectator can perceive what is on the screen. Clients who need to control all lab machines. Booting up in the morning and checking "things out" before letting others on the machine and so forth. Visit debasement of the client\'s machine. ***Disclaimer : not all clients with the above traits are seeing explicit entertainment!

Slide 21

We don\'t simply do Porn! We are an equivalent open door shop. So explicit entertainment is only one territory that this introduction applies. Frequently brought into confirm provocation charges, running private organizations, making deceitful exchanges and so forth

Slide 22

One last cautioning to anybody.. The Internet is not mysterious. Trails of where you have been are everywhere. Your own PC Web website PC Search motor PC Internet Service Provider PC Firewall server E-mail server Even switch syslogs if actualized

Slide 23

Our Approach We have an agenda we have concocted for these examinations DOS scan for watchwords, for example, sex, porn, young lady, kid, and so on… Turn on Windows inquiry to incorporate shrouded records – survey Internet Cache and history If criminal movement is associated make a criminological duplicate with the hard drive first!! We have utilities to reestablish erased records, for example, erased JPEGs We have utilities to change secret key to get into Window framework We have utilities to survey Apple Internet Cache Use hex editors to audit at the byte level Use keylogger or observing programming for stealth examinations DOCUMENT, DOCUMENT, DOCUMENT Create report

Slide 24

To go Stealthy or not Each case is distinctive If the individual is aware of the claim we may audit frameworks on location. All the more frequently we go in twilight to survey or make a double duplicate unbeknownst to the client. In the event that we need to survey on going conduct we go to key logging/observing.

Slide 25

Other uses for checking In one of our cases an examination was non-decisive. Some proof indicated approval of the mysterious affirmation. Because of the reality of the affirmation, the representative was informed that a state of their proceeded with business would be the observing of their PC utilization.

Slide 26

Legal Implications of Monitoring Need to watch State Laws and Policies Look for particular arrangement with respect to observing of representative\'s PCs. It ought to be authoritatively expressed that there is No Expectation of Privacy when utilizing state machines

Slide 27

Legal Implications of Monitoring cont. Proviso about observing ought to be incorporated into a worthy utilize arrangement so workers approve that they comprehend that checking might be done and there is no desire of security. Yearly survey of the adequate utilize strategy could be obligatory with the goal that representatives know.

Slide 28

Virginia DHRM Policy No client ought to have any desire of protection in any message, record, picture or information made, sent, recovered or got by utilization of the Commonwealth\'s gear as well as get to…

Slide 29

Virginia DHRM Policy proceeded with … Agencies have a privilege to screen all parts of their PC frameworks including, however not restricted to, locales, texting frameworks, talk gatherings, or news bunches went to by organization clients, material downloaded or transferred by office clients, and email sent or got by office clients. Such observing may happen whenever, without notice, and without the client\'s authorization ...

Slide 30

Virginia DHRM Policy proceeded with … what\'s more, electronic records might be liable to the Freedom of Information Act (FOIA) and, in this manner, accessible for open dissemination.

Slide 31

Legal Implications of Monitoring cont. In spite of the arrangements, in the event that you are checking, you ought to get endorsement from high positioning worker that can be confided ahead of time. This may secure you not far off.

Slide 32

Key Logging/Monitoring Hardware Keyloggers still well known. Actually record enter strokes into blaze memory from any USB console, up to 2,000,000 keystrokes. http://www.keyghost.com/usb%20keylogger/KeyGhost-USB-Keylogger.jpg

Slide 33

Problems with physical keylogging Can be identified by clients in the event that they snoop around their USB associations. Must place on the framework without exciting doubt.

Slide 34

Keylogging/Monitoring Software Generally imperceptible programming that shrouds somewhere down in memory while running. Combi

Recommended
View more...