Intro
Welcome back! This is episode 37 of The Insider Threat podcast, for the week of April 16th, 2018.
Spring is in the air
Weather isn't getting much better
RSA is going on right now and many companies are ramping up for their big announcements
No I won't be there
Infosec Trivia Question
It's time for your Infosec Trivia Question, where Google is king and the prize is nonexistent!
The question last episode was "Steve Wozniak, a co-founder of Apple, went back to school at UC Berkely and graduated with his engineering degree in 1986, barely anyone recognized him. That's because his diploma had a different name listed. What was the name he used when he finished his studies?"
The answer was "Rocky Clark".
"I never dropped out of college," he said. "I simply took a year off to earn money for my fourth year of school. And then my career kept going up."
http://articles.latimes.com/1986-05-14/news/vw-53891steve-wozniak
Congratulations to Philipp from Glenbranter, Gabrielle from Delisle, Alex from Laurel, and Aaron rom Perth for getting the correct answer.
Here's your question for this episode: "The term "hacker" originated at MIT where very skilled people programmed in older languages like FORTRAN. When did this take place?""
Send your response to InfosecAnswer@gmail.com. Be sure to include your first name, location, and the hashtag "Centenial".
Discussion Topic for the Episode
This episode’s discussion topic is Social Media
In light of recent events with Facebook
Overview of the issue
Facebook made user data available to Cambridge Analytica
Cambridge Analytica uses this information for political analysis
NOT a breach - it was designed that way
Aleksandr Kogan made an app that used the Facebook API (link between information)
Loophole in API made it so Kogan could collect data on users of the app and all their friends
I especially liked watching Zuckerberg's testimony before congress
Many people don't see a problem
"I don't care if they get my information"
Amount of information gathered
Could even be used to help sway voters and win an election
Best practices
Limit the amount of data you put in social media - if you wouldn't shout it as loud as you can in the mall, you shouldn't post it (this includes private messages)
Make your profile private (very important)
When you decide to stop using a particular social media profile, make sure it is deleted (sometimes takes a special request)
Check to see what information is being stored (available on both Twitter and Facebook)
Crafting messages to entice you to buy something, vote for someone, or think a certain way is a form of social engineering
Always remember - If the product is free, you are the product
News
Former airline employee hacks flight reservation system
Thanks to some VPN logs, Suzette Kugler was caught by federal authorities
Claims that Suzette "wreaked havoc" on the flight reservation system for 2 days
"Station information is the airport specific portal for PenAir employees to access Sabre," documents reveal. "This deletion prevented employees in any of those eight airports from being able to book, ticket, modify, or board any flight until the stations were rebuilt in the system."
No flight delays were experienced because staff figured out what was going on and worked all night to recreate the data
We've seen big penalties for this type of thing, but Suzette was only sentenced to 250 hours of community service and five years probation
The interesting thing here is she wasn't fired - she retired
Make sure you do a full review of system access after someone in IT leaves the company, especially if it was on bad terms
Closing Thought
Our closing thought for this episode comes from Henry Ford. He said, "Anyone who stops learning is old, whether at twenty or eighty. Anyone who keeps learning stays young. The greatest thing in life is to keep your mind young."
Outro
Thank you for listening to episode 37 of The Insider Threat podcast. Please remember to subscribe and review in your favorite podcast app, and also share with everyone you know! Those reviews are key to building this out and improving for later episodes, so please feel free to leave suggestions.
You can contact me on twitter @stevehigdon or send an email to steve@theinsiderthreatpodcast.com. Go to our website, www.theinsiderthreatpodcast.com, to find the show notes for this and every other episode, as well as links to the topics we've covered. You can also go to the website to find a link to the Patreon page and subscribe to the newsletter to get up-to-date information on current episodes and news for the show. Call and leave a voicemail at (443) 292-2287 to have a conversation, get a comment added to the show, or even ask a question.
Thanks again and I'll see you folks next time!
Contact information:
Call in number: (443) 292-2287
Email - steve@theinsiderthreatpodcast.com
Blog - http://www.stephenhigdon.com
Twitter - https://twitter.com/stevehigdon
LinkedIn - https://www.linkedin.com/in/stevehigdon-infosec/
Comentarios