There are an infinite number of ways for bad things to happen to your data and accounts. For example, someone may inadvertently publish their AWS access keys to GitHub, allowing attackers to easily rack up $100,000 in charges mining cryptocurrencies on expensive GPU-enabled machines. Or “account support” phones with a message claiming your account contains ridiculous charges, but they can be removed after your credit card information is verified. Fake software upgrades exist that steal bank account information. Not to mention account information leaked from one of your online services, including your banking site, sent to your work email with a link to “log in and verify access.” Although there are many reasons for account disclosure, they can be divided into two categories: intentional intent and unexpected leakage.
The one you generally hear about in the press and from service providers is malicious intent. Account databases are compromised, phishing emails fool users into disclosing personal information, and phony “service” calls claim your computer is infected. Almost often, the goal is to separate you from your money. They want your bank account information to transfer money or your credit card information to purchase products such as gift cards, which is a common way for stolen money to be cleaned.
Accidental leaks, or “oops,” as detailed in Red Hat’s Security Detail episode on insider risks, have similar impacts to intentional attacks but are caused by entirely unrelated factors. The most typical “oops” are commits to public code repositories, but they can also be an inadvertent email, a faulty paste into chat, or any other method a perfectly genuine person accidentally places their data somewhere it shouldn’t be.
Both causes rely on someone granting access to their data, but the distinction is entirely in the purpose.
However, the overall procedure for dealing with all of these occurrences is the same, and you may even apply these processes in your personal life to plan for and respond to incidents involving exposed data. These are the steps:
Have a security plan
Scope the problem
Stop the bleeding
Recover
Take steps to prevent future problems
Let’s look at two examples, one personal and one business, to understand how this strategy works.
A “support specialist” purporting to be from your credit card provider calls and obtains your credit card number or a company that stores your card is hacked and your card is exposed.
Many people have probably dealt with this previously, and it all sounds rather regular. When awful things happen, the procedure of dealing with leaks is primarily common sense and not panicking.
You’re working on a project that creates and manages cloud instances automatically. You ‘git adds’ your credentials to the repo in haste and push them to your public source. A few hours later, one of your coworkers finds the credentials in the source.
The main difference between these two catastrophes is how they are prevented. Social engineering takes advantage of our desire to help and our natural trust in persons who appear to be informed. Defending against this requires primary training and critical thinking, as well as instruments such as spam-blocking software and well-defined protocols to protect us from giving out the information we shouldn’t.
The failure to have systems in place to assist catch the mistakes that we all make magnifies “oops” incidents. You can train people and provide them with protocols, but it’s all too simple for them to make a costly mistake that costs tens or hundreds of thousands of dollars. The objective is to give developers a “safe base” that can assist avert a little problem from becoming a big disaster.
Gain insight into the principles of data and technologies that frame and define cybersecurity, its language and the integral role of cybersecurity professionals in protecting enterprise data and infrastructure by joining our ISACA Cyber Security Fundamentals Certification training.
Here at CourseMonster, we know how hard it may be to find the right time and funds for training. We provide effective IT training programs that enable you to select the training option that best meets the demands of your company.
For more information, submit and enquiry at www.coursemonster.com or one of our course advisers today: training@coursemonster.com