University Business - August 2007 - (Page 22)

VIEWPOINT rensic engineering team observed a pattern emerging, a pattern which determined the following: • The worm entered the system when someone using the financial system used it to run a web browser and surf to a website that had an infected page. Accessing the page allowed the worm to download. • The worm exploited a security weakness that had not been fixed with a security patch that was, in fact, readily available. • Once the worm activated within the server, it sought and found what it thought were credit card records. • The software in use by the university did, in fact, encrypt the credit card data on the main files, but it also maintained an unencrypted copy (unbeknownst to users of the system). Unfortunately, instead of being kept for a limited period of time, the copy had every credit card transaction going back for years. • Upon finding the records, the worm called out to a compromised server at an Asia-based university and downloaded additional code, known as a “payload.” In this case, the payload was a credit card parsing engine, which is software specifically designed to find and prepare credit card data for transmission to hackers. • The worm assembled the data from a quarter of a million credit card records and was prepared to send it out to the hackers when it encountered a problem. By delving through extreme detail provided in the logs, investigators could see the worm’s attempts to connect over the internet to a series of delivery addresses. Even better, they could tell that it was unable to establish a successful connection due to internal errors and the fact that some of the delivery addresses were no longer in operation. Therefore, the credit card data never actually left the university’s server. THE NOTIFICATION OPTION While the forensic analysis was being per- formed, the university and specialists in data breach remediation began to discuss victim notification, if the forensics found that a breach had actually occurred. A primary challenge was to navigate the different states’ varying notification requirements. Some have specific language parameters; others require multiple notices to designated agencies. The data breach remediation team was able to work with the university’s counsel to carve out which While issues such as unencrypted data and inappropriate site surfing had to be addressed, the darker cloud had lifted. requirements would have to be met, and under what time frames required by those laws. Then the logistics associated with validating cardholder information, identifying deceased cardholders, and producing and mailing hundreds of thousands of letters—as well as the related administrative issues—were used to develop a response action plan, which, fortunately, did not have to be used in this case. Another issue to be considered was how best to manage questions that would surface from the notification. Experience from handling hundreds of data breach cases over the years indicates that people who receive notification of a breach often want to talk with someone personally. Fielding such a range of calls and reactions is not an undertaking for unprepared staff. Individuals whose data has been compromised typically need reassurance in addition to information about the incident and the solution the college or university has chosen. Callers must be treated professionally, sensitively, and uniformly. Institutional leaders must be certain that promises are not made that conflict with the remediation plan and that callers are not given inaccurate information. For this reason, many, if not most, organizations victimized by data breaches choose not to direct callers to their own phones. Rather, they opt for a dedicated customer care center, where trained professionals with a successful track record are ready to calm and clarify. When a care center specialist using sensitive yet targeted discussion determines a caller may actually have been victimized, the call is immediately relayed to a licensed investigator. This triage enables the team to provide efficient and effective service to all callers. LESSONS LEARNED Ultimately, the computer forensic team was able to advise the university team that while there were issues to be addressed— unencrypted data, absent security patches, and inappropriate site-surfing—the darker cloud had lifted. There was no need to notify either the 250,000 credit-card holders or anyone else, since no breach had occurred. The university dodged the bullet, although not by much. The lessons learned in all these cases lead us to make a few recommendations: • Don’t assume that it can’t happen to you. In today’s environment, the reality is that it can—and may. • Put a plan in place so that when the crisis hits you won’t be trying to figure out what to do. Part of this involves identifying the resources you will want available. • Establish a working group that will have the authority to permit necessary and required work. From a technical viewpoint, you may want to have your preselected network forensic resources spend a little time with your technology staff to determine what logs should be kept, for how long, and how they should be secured if an incident is suspected. Even in the best of circumstances, a potential data breach is traumatic. But with proper planning, the incident can be rapidly analyzed, understood, and worked through in a systematic manner. 22 | August 2007 universitybusiness.com http://universitybusiness.com

Table of Contents for the Digital Edition of University Business - August 2007

Contents
College Index
Company Index
Advisory Board
Editor's Note
People Watch
Sense of Place
Viewpoint
Admissions
On the Hill
Future Shock
Independent Outlook
Facility Focus
Wanted: Foreign Students
Service With a Star
Beneficial Benefits
Addition By Subtraction
Report from EduComm 2007
Report Card
Internet Technology
What's New
Calendar of Events
Direct Connect
End Note

University Business - August 2007

https://www.nxtbook.com/pmg/UB/UB_0520
https://www.nxtbook.com/pmg/UB/UB_0320
https://www.nxtbook.com/pmg/UB/UB_0120
https://www.nxtbook.com/pmg/UB/UB_1119
https://www.nxtbook.com/pmg/UB/UB_1019
https://www.nxtbook.com/pmg/UB/UB_0819
https://www.nxtbook.com/pmg/UB/UB_0719
https://www.nxtbook.com/pmg/UB/UB_0619
https://www.nxtbook.com/pmg/UB/UB_0419
https://www.nxtbook.com/pmg/UB/UB_0319
https://www.nxtbook.com/pmg/UB/UB_0119
https://www.nxtbook.com/pmg/UB/UB_1218
https://www.nxtbook.com/pmg/UB/UB_1118
https://www.nxtbook.com/pmg/UB/UB_1018
https://www.nxtbook.com/pmg/UB/UB_0918
https://www.nxtbook.com/pmg/UB/UB_0818
https://www.nxtbook.com/pmg/UB/UB_0718
https://www.nxtbook.com/pmg/UB/UB_0618
https://www.nxtbook.com/pmg/UB/UB_0518
https://www.nxtbook.com/pmg/UB/UB_0418
https://www.nxtbook.com/pmg/UB/UB_0318
https://www.nxtbook.com/pmg/UB/UB_0218
https://www.nxtbook.com/pmg/UB/UB_0118
https://www.nxtbook.com/pmg/UB/UB_1217
https://www.nxtbook.com/pmg/UB/UB_1117
https://www.nxtbook.com/pmg/UB/UB_1017
https://www.nxtbook.com/pmg/UB/UB_0917
https://www.nxtbook.com/pmg/UB/UB_0817
https://www.nxtbook.com/pmg/UB/UB_0717
https://www.nxtbook.com/pmg/UB/UB_0617
https://www.nxtbook.com/pmg/UB/UB_0517
https://www.nxtbook.com/pmg/UB/UB_0417
https://www.nxtbook.com/pmg/UB/UB_0317
https://www.nxtbook.com/pmg/UB/UB_0217EPUB
https://www.nxtbook.com/pmg/UB/UB_0217
https://www.nxtbook.com/pmg/UB/UB_0117
https://www.nxtbook.com/pmg/UB/UB_1216
https://www.nxtbook.com/pmg/UB/UB_1116
https://www.nxtbook.com/pmg/UB/UB_1016
https://www.nxtbook.com/pmg/UB/UB_0916
https://www.nxtbook.com/pmg/UB/UB_0816
https://www.nxtbook.com/pmg/UB/UB_0816CG
https://www.nxtbook.com/pmg/UB/UB0716
https://www.nxtbook.com/pmg/UB/GlobalSellSheet
https://www.nxtbook.com/pmg/UB/UB_0616
https://www.nxtbook.com/pmg/UB/UB_0516
https://www.nxtbook.com/pmg/UB/UB0416
https://www.nxtbook.com/pmg/UB/UB0316
https://www.nxtbook.com/pmg/UB/UB_0216r2
https://www.nxtbook.com/pmg/UB/UBGuide
https://www.nxtbook.com/pmg/UB/UB0116
https://www.nxtbook.com/pmg/UB/UB
https://www.nxtbook.com/nxtbooks/pmg/ub201511
https://www.nxtbook.com/nxtbooks/pmg/ub201510
https://www.nxtbook.com/nxtbooks/pmg/ub201509
https://www.nxtbook.com/nxtbooks/pmg/ub201508
https://www.nxtbook.com/nxtbooks/pmg/ub201508_ConsultantsGuide
https://www.nxtbook.com/nxtbooks/pmg/ub201507
https://www.nxtbook.com/nxtbooks/pmg/ub201506
https://www.nxtbook.com/nxtbooks/pmg/ub201506_AudioVisualSolutions
https://www.nxtbook.com/nxtbooks/pmg/ub201505
https://www.nxtbook.com/nxtbooks/pmg/ub201504
https://www.nxtbook.com/nxtbooks/pmg/ub201503
https://www.nxtbook.com/nxtbooks/pmg/ub201502
https://www.nxtbook.com/nxtbooks/pmg/ub201501
https://www.nxtbook.com/nxtbooks/pmg/ub201501_FinancialServicesGuide
https://www.nxtbook.com/nxtbooks/pmg/ub201412
https://www.nxtbook.com/nxtbooks/pmg/ub201411
https://www.nxtbook.com/nxtbooks/pmg/ub201410
https://www.nxtbook.com/nxtbooks/pmg/ub201409
https://www.nxtbook.com/nxtbooks/pmg/ub201408
https://www.nxtbook.com/nxtbooks/pmg/ub201408_ConsultantsGuide
https://www.nxtbook.com/nxtbooks/pmg/ub201407
https://www.nxtbook.com/nxtbooks/pmg/ub201406
https://www.nxtbook.com/nxtbooks/pmg/ub201406_AudioVisualSolutions
https://www.nxtbook.com/nxtbooks/pmg/ub201405
https://www.nxtbook.com/nxtbooks/pmg/ub201404
https://www.nxtbook.com/nxtbooks/pmg/ub201403
https://www.nxtbook.com/nxtbooks/pmg/ub201402
https://www.nxtbook.com/nxtbooks/pmg/ub201401
https://www.nxtbook.com/nxtbooks/pmg/ub201401_FinancialServicesGuide
https://www.nxtbook.com/nxtbooks/pmg/ub201312
https://www.nxtbook.com/nxtbooks/pmg/ub201311
https://www.nxtbook.com/nxtbooks/pmg/ub201310
https://www.nxtbook.com/nxtbooks/pmg/ub201309
https://www.nxtbook.com/nxtbooks/pmg/ub201308
https://www.nxtbook.com/nxtbooks/pmg/ub201308_ConsultantsGuide
https://www.nxtbook.com/nxtbooks/pmg/ub201307
https://www.nxtbook.com/nxtbooks/pmg/ub201306_AudioVisualSolutions
https://www.nxtbook.com/nxtbooks/pmg/ub201306
https://www.nxtbook.com/nxtbooks/pmg/ub201305
https://www.nxtbook.com/nxtbooks/pmg/ub201304
https://www.nxtbook.com/nxtbooks/pmg/ub201303
https://www.nxtbook.com/nxtbooks/pmg/ub201302
https://www.nxtbook.com/nxtbooks/pmg/ub201301
https://www.nxtbook.com/nxtbooks/pmg/ub201301_FinancialServicesGuide
https://www.nxtbook.com/nxtbooks/pmg/ub1212
https://www.nxtbook.com/nxtbooks/pmg/ub1112
https://www.nxtbook.com/nxtbooks/pmg/ub1012
https://www.nxtbook.com/nxtbooks/pmg/ub0912
https://www.nxtbook.com/nxtbooks/pmg/ub_cg12
https://www.nxtbook.com/nxtbooks/pmg/ub070812
https://www.nxtbook.com/nxtbooks/pmg/ub0612
https://www.nxtbook.com/nxtbooks/pmg/ub_avguide0612
https://www.nxtbook.com/nxtbooks/pmg/ub0512
https://www.nxtbook.com/nxtbooks/pmg/ub0412
https://www.nxtbook.com/nxtbooks/pmg/ub0312
https://www.nxtbook.com/nxtbooks/pmg/ub0212
https://www.nxtbook.com/nxtbooks/pmg/ub_financeguide0112
https://www.nxtbook.com/nxtbooks/pmg/ub1211
https://www.nxtbook.com/nxtbooks/pmg/ub1011
https://www.nxtbook.com/nxtbooks/pmg/ub0911
https://www.nxtbook.com/nxtbooks/pmg/ub_cg11
https://www.nxtbook.com/nxtbooks/pmg/ub0711
https://www.nxtbook.com/nxtbooks/pmg/ub0611_av
https://www.nxtbook.com/nxtbooks/pmg/ub0611
https://www.nxtbook.com/nxtbooks/pmg/ub0511
https://www.nxtbook.com/nxtbooks/pmg/ub0411
https://www.nxtbook.com/nxtbooks/pmg/ub0311
https://www.nxtbook.com/nxtbooks/pmg/ub0211
https://www.nxtbook.com/nxtbooks/pmg/ub0111
https://www.nxtbook.com/nxtbooks/pmg/ub_financeguide0111
https://www.nxtbook.com/nxtbooks/pmg/ub1110
https://www.nxtbook.com/nxtbooks/pmg/ub1010
https://www.nxtbook.com/nxtbooks/pmg/ub0910
https://www.nxtbook.com/nxtbooks/pmg/ub_2010financeguide
https://www.nxtbook.com/nxtbooks/pmg/ub_2010consultants
https://www.nxtbook.com/nxtbooks/pmg/ub_2010avguide
https://www.nxtbook.com/nxtbooks/pmg/ub0710
https://www.nxtbook.com/nxtbooks/pmg/ub0610
https://www.nxtbook.com/nxtbooks/pmg/ub0510
https://www.nxtbook.com/nxtbooks/pmg/ub0410
https://www.nxtbook.com/nxtbooks/pmg/ub0310
https://www.nxtbook.com/nxtbooks/pmg/ub0210
https://www.nxtbook.com/nxtbooks/pmg/ub0110
https://www.nxtbook.com/nxtbooks/pmg/ub1109
https://www.nxtbook.com/nxtbooks/pmg/ub1009
https://www.nxtbook.com/nxtbooks/pmg/ub0909
https://www.nxtbook.com/nxtbooks/pmg/ub0709
https://www.nxtbook.com/nxtbooks/pmg/ub_fg09
https://www.nxtbook.com/nxtbooks/pmg/ub0609
https://www.nxtbook.com/nxtbooks/pmg/ub0509
https://www.nxtbook.com/nxtbooks/pmg/ub0409
https://www.nxtbook.com/nxtbooks/pmg/ub0309
https://www.nxtbook.com/nxtbooks/pmg/ub0209
https://www.nxtbook.com/nxtbooks/pmg/ub0109
https://www.nxtbook.com/nxtbooks/pmg/ub1208
https://www.nxtbook.com/nxtbooks/pmg/ub1108
https://www.nxtbook.com/nxtbooks/pmg/ub1008
https://www.nxtbook.com/nxtbooks/pmg/ub0908
https://www.nxtbook.com/nxtbooks/pmg/ub0808
https://www.nxtbook.com/nxtbooks/pmg/ub0708
https://www.nxtbook.com/nxtbooks/pmg/ub0608
https://www.nxtbook.com/nxtbooks/pmg/ub0508
https://www.nxtbook.com/nxtbooks/pmg/ub0408
https://www.nxtbook.com/nxtbooks/pmg/ub0308
https://www.nxtbook.com/nxtbooks/pmg/ub0208
https://www.nxtbook.com/nxtbooks/pmg/ub0907
https://www.nxtbook.com/nxtbooks/pmg/ub0807
https://www.nxtbook.com/nxtbooks/pmg/ub0707
https://www.nxtbook.com/nxtbooks/pmg/ub0607
https://www.nxtbook.com/nxtbooks/pmg/ub0507
https://www.nxtbook.com/nxtbooks/pmg/ub0407
https://www.nxtbook.com/nxtbooks/pmg/ub0307
https://www.nxtbook.com/nxtbooks/pmg/ub0207
https://www.nxtbook.com/nxtbooks/pmg/ub0107
https://www.nxtbook.com/nxtbooks/pmg/ub1206
https://www.nxtbook.com/nxtbooks/pmg/ub1106
https://www.nxtbook.com/nxtbooks/pmg/ub1006
https://www.nxtbook.com/nxtbooks/pmg/ub0906
https://www.nxtbook.com/nxtbooks/pmg/ub0806
https://www.nxtbook.com/nxtbooks/pmg/ub0706
https://www.nxtbook.com/nxtbooks/pmg/ub0606-GG
https://www.nxtbook.com/nxtbooks/pmg/ub0606
https://www.nxtbook.com/nxtbooks/pmg/ub0506
https://www.nxtbook.com/nxtbooks/pmg/ub0406
https://www.nxtbookmedia.com