Module LV Page | 3877 Ethical Hacking and Countermeasures v6 Copyright © by EC-CouncilAll Rights Reserved.. Module LV Page | 3878 Ethical Hacking and Countermeasures v6 Copyright © by EC
Trang 1Module LV Page | 3877 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
Ethical Hacking and CountermeasuresVersion 6
Module LVPreventing Data Loss
Ethical Hacking and Countermeasures v6
Module LV: Preventing Data Loss
Exam 312-50
Trang 2Module LV Page | 3878 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
News
Source: http://ap.google.com/
News
Personal Data Lost on 650,000 Credit Card Holders
A data loss has been reported by GE Money, which maintains credit card operations for JC Penney and many other retailers The missing information includes Social Security numbers of more than 150,000 people
The credit card information that was stored on a backup computer tape, stored at a warehouse run by Iron Mountain Inc., was found missing
But according to Richard C Jones, a spokesman for GE Money, there was "no sign of theft or anything of that kind happened," and no proof of fraudulent activity on the accounts has been found
Trang 3Module LV Page | 3879 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Module Objective
• Data Loss
• Causes of Data Loss
• How to Prevent Data Loss
• Impact Assessment for Data Loss Prevention
• Tools to Prevent Data Loss
This module will familiarize you with:
Module Objective
This module will familiarize you with:
Causes of Data Loss
How to Prevent Data Loss
Impact Assessment for Data Loss Prevention
Tools to Prevent Data Loss
Trang 4Module LV Page | 3880 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Module Flow
Causes of Data Loss
Tools to Prevent Data Loss
Impact Assessment for Data Loss Prevention How to Prevent Data Loss
Data Loss
Module Flow
Trang 5Module LV Page | 3881 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Introduction: Data Loss
Data loss refers to the unexpected loss of data or information
Backup and recovery schemes must
be developed to restore lost data
Data loss refers to the unexpected loss of data or information Data can be lost by any one number of issues, such as application errors in the software, configuration errors, physical damage of the system, or the accidental deletion of data by the user
Organizations should follow the policy of backing up their critical data at regular intervals A backup and recovery policy should be implemented within the organization so that employees follow the procedure to safely retrieve the lost data in the event of a disaster
Trang 6Module LV Page | 3882 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Causes of Data Loss
• Intentional deletion of a file or program
• Power failure, resulting in data not being saved to permanent memory
• Hardware failure, such as a head crash in a hard disk
• A software crash or freeze, resulting in data not being saved
• Software bugs or poor usability, such as not confirming a file delete command
• Data corruption, such as filesystem corruption or database corruption
Failure
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Causes of Data Loss (cont’d)
• Theft, hacking, sabotage, etc.
• A malicious act, such as a worm, virus, hacker, or theft
The data can be lost due to some failures in the system or any corruption in the files Data can be lost due
to the following failures in the system:
When the data is in the process of saving and the power is off
Hardware failure when there is a headcrash in the hard disk
An operating system failure that results in file system corruption or invalid file directories
Any software failure due to some bugs or improper installation
Trang 7Module LV Page | 3883 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
Trang 8Module LV Page | 3884 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
How to Prevent Data Loss
• Back-up critical files: Backup regularly using windows in-built backup utilities or use any backup tool
• Run Anti-Virus Program: Install Anti-Virus Software and run them regularly to cleanup your Computer System from Viruses & Trojans
• Use power surge protectors: A power surge, is one of the most common occurrences that can damage data and potentially cause a hard drive failure
• Experience required: Never attempt any operation, like hard drive installations or hard drive repairs, if you do not have such skills
• Shut down your computer: Always quit programs before shutting down the computer
• Never shake or remove the covers on hard drives or tapes
• Store your backup data offsite: Use Tape Drives, Compact Disk(CD),and Floppy Drives to Store your backups
• Be aware of your surroundings: Keep your computers and servers in safest and secure locations
Tips to prevent Data loss:
When the data is lost, there are some recovery techniques, which, if followed, will help in retrieving the lost data
The tips to prevent data loss are as follows:
Backup the critical files: Backup critical files at regular intervals using inbuilt software in the OS
or external third party applications
Run antivirus to check for viruses and Trojans: Run antivirus programs to check the sanity of the data and other system files
Use power surge protectors: There is a chance of hard disk being corrupted incase of power fluctuations Use power surge protectors to protect the computer from such power failures
Experience required: Always seek expert advice while installing any applications or modifying the files It is recommended that an expert should be called in to sort out issues related to operating systems
Shut down your computer: Ensure that the programs/applications running on the system are closed before you shut down the computer
Avoid physical shocks on the system while it is switched on
Store your backup data offsite: An alternative of storing the backup data other than system are devices such as compact disks (CDs), floppy drives, or removable devices
Be aware of your surroundings: Keep the system and server in a secured and safe location away from the heat
Trang 9Module LV Page | 3885 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Impact Assessment for Data Loss
Prevention
Source: http://www.informationweek.com/
Trang 10Module LV Page | 3886 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
EC-Council Copyright © by
EC-Council All Rights Reserved Reproduction is Strictly Prohibited
Tools to Prevent Data Loss
Trang 11Module LV Page | 3887 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Security Platform
BorderWare Security Platform removes the need to deploy a new device to protect against new messaging applications by integrating Email, IM, and Web security with a single policy and single security platform
It is a content monitoring and filtering tool which prevents data leakage
• Consolidated content monitoring and filtering to prevent data leakage
• Comprehensive, stronger security for Email, IM, and Web
• Reduced time, effort, and costs with a set-and-forget policy management approach
• On-demand scalability and flexible deployment
• Modular approach enables enterprises to buy what they need now and add
Comprehensive, stronger security for email, IM, and web
Reduces time, effort, and costs with a set-and-forget policy management approach
Consolidated content monitoring and filtering to prevent data leakage, enforce corporate compliance, and ensure acceptable web use
Trang 12Module LV Page | 3888 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Check Point Software: Pointsec
Source: http://www.checkpoint.com/products/datasecurity/index.html
Pointsec data encryption solutions by Check Point provide data protection on laptops, PCs, mobile devices, and removable media By leveraging a strong and efficient blend of full disk encryption, access control, port management, and removable media encryption, Pointsec solutions deliver comprehensive data security
Trang 13Module LV Page | 3889 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Trang 14Module LV Page | 3890 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
Trang 15Module LV Page | 3891 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Content Inspection Appliance
The Code Green Network’s line of Content Inspection Appliances is a solution for protecting customer data and safeguarding intellectual property
It provides a complete solution for preventing the loss of personal information across the network
• Monitors, enforces, and audits all popular Internet communication channels including email, WebMail, IM, FTP, and online collaboration tools (such as Blogs and Wikis)
• Automatically encrypts sensitive email messages according to policy
• Deploys quickly with pre-defined policy templates
• Demonstrates and manages compliance using policy and incident management capabilities
Features:
Code Green Networks line of Content Inspection monitors, enforces, and audits all popular Internet communication channels including email, web mail, IM, FTP, and online collaboration tools (such as blogs and wikis)
It automatically encrypts sensitive email messages according to the policy
It deploys quickly with pre-defined policy templates
It demonstrates and manages compliance using policy and incident management capabilities
Trang 16Module LV Page | 3892 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
CrossRoads Systems: DBProtector
It provides database security at a logical business policy level and stops 'authorized misuse' of database information
DBProtector provides policy-based intrusion detection, prevention, and compliance auditing
DBProtector sits in the data path and inspects SQL statements before they reach the database
• Inspects database activities
• Enforces security policies
• Alerts on suspicious activities
• Captures audit trails for compliance reporting, security forensics, and electronic discovery
• Provides separation of duty between security personnel and database/network administrators ensuring regulatory compliance
Features:
Crossroads Strongbox DBProtector inspects database activities
It enforces security policies
It gives alerts on suspicious activities
It captures audit trails for compliance reporting, security forensics, and electronic discovery
It provides separation of duty between security personnel and database/network administrators ensuring regulatory compliance
Trang 17Module LV Page | 3893 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
Trang 18Module LV Page | 3894 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
DeviceWall
• Preventing the transfer of files to or from unauthorized portable devices
• Automatically encrypting data copied to approved devices
• Providing complete audit trails of device and file accesses
DeviceWall protects data, both on and off the network, by:
DeviceWall prevents unwanted data transfer to or from portable devices such as USB flash drives, iPods, PDAs, and wireless connections by automatically enforcing security policies
User access can be blocked, limited to read-only, or left unrestricted according to individual’s security privileges and device type in use
Source: http://www.devicewall.com/pro/
DeviceWall protects the data, both on and off the network, by:
Preventing the transfer of files to or from unauthorized portable devices
Automatically encrypting the data copied to approved devices
Providing complete audit trails of device and file accessed
Trang 19Module LV Page | 3895 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
Trang 20Module LV Page | 3896 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Exeros Discovery
Exeros Discovery software automates discovery and maintenance of business rules, transformations, hidden sensitive data, and data inconsistencies across structured data sources
It uses a unique technology of data-driven mapping to replace the traditional manual process of analyzing source data and mapping it to another data set
• Discovery Studio: A graphical user interface for data analyst to view data, maps, and transformations discovered by Discovery and to edit, test, and approve any remaining data maps and business rules
• Discovery Engine: Multiple, scalable, and high-performance engines that automatically discover business rules, transformations, sensitive data, and data inconsistencies
Exeros Discovery has two main components:
Source: http://www.exeros.com/html/products.asp
Exeros Discovery software automates the discovery and maintenance of business rules, transformations, hidden sensitive data, and data inconsistencies across structured data sources It uses a unique technology
of data-driven mapping to replace the traditional manual process of analyzing source data and mapping it
to another data set Using Discovery, there is involvement of lower risk and costs, faster deployment, and greater completeness and accuracy for any data relationship management project
It has two main components:
Discovery Studio: A graphical user interface for the data analyst to view data, maps, and transformations discovered by Discovery and to edit, test, and approve any remaining data maps and business rules
Discovery Engine: Multiple, scalable, and high-performance engines that automatically discover business rules, transformations, sensitive data, and data inconsistencies
Trang 21Module LV Page | 3897 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
Trang 22Module LV Page | 3898 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
• Media players, including iPods, Creative Zen, and others
• USB drives, Compact Flash, memory cards, CDs, floppies, and other portable storage devices
• PDAs, BlackBerry handhelds, mobile phones, smart phones, and similar communication devices
• Network cards, laptops, and other network connections
GFI EndPointSecurity allows administrators to actively manage user access and log the activity of:
Source: http://www.gfi.com/endpointsecurity/
GFiEndPointSecurity prevents data leakage/theft by comprehensively controlling access to portable storage devices with minimal administrative effort It prevents the introduction of malware and unauthorized software on the network It gives administrators greater control as they are able to block devices by class, file extensions, physical port, or device ID It allows administrators to grant temporary device or port access for a stipulated timeframe
It allows administrators to actively manage user access and log the activity of:
Media players, including iPods, creative Zen, and others
USB drives, CompactFlash, memory cards, CDs, floppies, and other portable storage devices
PDAs, BlackBerry handhelds, mobile phones, smart phones, and similar communication devices
Network cards, laptops, and other network connections
Trang 23Module LV Page | 3899 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
Trang 24Module LV Page | 3900 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
Trang 25Module LV Page | 3901 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
GuardianEdge Data Protection
Platform
GuardianEdge Data Protection Platform consists of GuardianEdge applications for hard disk encryption, removable storage encryption, and device control
Framework also provides a common infrastructure and common administration of services
Features:
Whole-disk encryption Transparent to end-users Enterprise-ready
It delivers strong pre-boot user authentication and full-disk encryption
It provides access and usage control for PC peripheral ports and removable media outlets
It encrypts flash memory cards, portable hard drives, and other storage devices
Trang 26Module LV Page | 3902 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
ProCurve Identity Driven Manager (IDM)
ProCurve Identity Driven Manager configures security and performance settings based on user, device, location, time, and client system state
IDM provides network administrators with the ability to centrally define and apply policy-based network access rights that allow network to automatically adapt to the needs of users and devices as they connect
It allows network administrators to efficiently manage the users and devices connecting to their network
Source: http://www.hp.com/rnd/products/management/idm/overview.htm
ProCurve Identity Driven Manager, a plug-in to ProCurve Manager Plus, dynamically configures security and performance settings based on user, device, location, time, and client system state IDM provides network administrators with the ability to centrally define and apply policy-based network access rights that allow the network to automatically adapt to the needs of users and devices as they connect, thereby enforcing network security while providing appropriate access to network users and devices IDM is a powerful tool that allows network administrators to efficiently manage the users and devices connecting
to their network
Trang 27Module LV Page | 3903 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council
All Rights Reserved Reproduction is Strictly Prohibited.