Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Anatomy of a security breach in Education (Released)

Protect your school with the power of Intel(R) Security
by

Andrew Henry

on 23 September 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Anatomy of a security breach in Education (Released)

The infected network performs a
Let’s look into how Intel® Technology could help to prevent against this type of attack.
1. No computer system can provide absolute security. Requires an Intel® Identity Protection Technology-enabled system, including an enabled Intel® processor, enabled chipset, firmware, software, and Intel® integrated graphics (in some cases) and participating website/service. Intel® assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visithttp://ipt.intel.com/
Consult your system manufacturer and/or software vendor for more information.

2. No computer system can provide absolute security. Requires an enabled Intel® processor, enabled chipset, firmware, software and may require a subscription with a capable service provider (may not be available in all countries). Intel® assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. Consult your Service Provider for availability and functionality. For more information, visit http://www.intel.com/go/anti-theft
Consult your system manufacturer and/or software vendor for more information.

3. No computer system can provide absolute security. Requires an enabled Intel® processor and software optimized for use of the technology. Consult your system manufacturer and/or software vendor for more information.

4. The information in this document is provided only for educational purposes and for the convenience of McAfee customers. The information contained herein is subject to change without notice, and is provided “AS IS” without guarantee or warranty as to the accuracy or applicability of the information to any specific situation or circumstance. To learn more visit: http://www.mcafee.com/us/business-home.aspx

5. Intel®, the Intel® logo and McAfee are trademarks of Intel® Corporation in the U.S. and/or other countries. *Other names and brands may be claimed as the property of others.
with the power of Intel® Security.
A brighter world
SCHOOL X
Let's look into the anatomy of a Personal Information Breach in Education at School X
A student at School 'X' ...
... connects their personal
laptop to the school network
Click to connect to the network
Marcus
"Son"
Roberta
"Mom"
Roberta, receives a text message from her son ...
Mom, are you there?
Yes son, what's up?
I WON A PRIZE :-) :-)
What do you mean!?
Got a call from a company, they have all our info, and asked me to come over and claim our prize!
Son, this is a SCAM. Call me IMMEDIATELY when you get out of class!
Roberta is concerned with her child’s safety, moreover,
how did this company gain access to her son's personal information?
12
3
6
9
IT ROOM
Server
- School X -
is leaked and gets posted on a

public web-site

Database
Database
The personal data of hundreds of students at School X
McAfee Data Loss Prevention
Last in line defense to limit external transfer of sensitive data [4]
McAfee Network Security Platform
Helps prevents ex-filtration by inspecting outgoing traffic, helps detect and protect against botnets [4]
Data and full
disk encryption Leveraging Intel® Data Protection Technology with AES-NI

Helps Improve performance for encryption [3]
For more information please visit:
http://IntelSecurity.com
infects
the network
Unbeknownst to the student, the laptop is full of

malware
and

IT Administrators at School X
Recommendations for:
McAfee Enterprise Security Manager
Aggregates logs and events and correlates to help detect
attacks [4]
McAfee Host
Intrusion
Prevention System
Combines Desktop Firewall with host IPS to help protect against zero-day and unknown threats, and known application vulnerabilities [4]
IT Administrators at School X
Recommendation for:
McAfee
LiveSafe™
helps protect
your data and
your identity
on all of your
devices [4]
Global Threat Intelligence

Real Time Lookups
for known bad
senders, files, and
networks [4]
McAfee ActiveProtection™
helps to detect, quarantine, and
block malware [4]
.
McAfee
SiteAdvisor®
Free web protection that helps you to make better decisions about what you click and download [4]
McAfee Next Generation Firewall
Helps block flow of data to known Malicious
Servers [4]
McAfee Network Security Platform
Helps detect and
prevent attacks
in the network [4]

McAfee Email Protection
Helps prevent
Phishing
attacks [4]

McAfee Click Protect
Double checks email web links to help provide safety at time user clicks link. Emulates suspect
websites to see if it
will do anything
malicious [4]
McAfee Advanced
Threat Defense
Static and dynamic analysis
on email attachments. Sandboxes suspect
attachments to see if it
will do anything
malicious [4]

School or district deployed devices
Students
with BYOD devices
McAfee
SiteAdvisor®
Free web protection that helps you to make better decisions about what you click and download [4]
McAfee Global
Threat Intelligence

Real Time Lookups
for known bad
senders, files, and
networks [4]
Recommendations for:
Same as students
with BYOD devices
Personal data

IT
Administrators
Intel® Trusted Execution Technology
Build trusted infrastructure based
on hardware root-of-trust-enhanced measured boot [2]
Intel® IPT with
Public Key Infrastructure:
Hassle-free integration of hardened certificate and token based authentication [1]
Intel® IPT with
Multi Factor
Authentication:

Enabling aggregation
of multiple ways to
seamlessly authenticate
users to devices
and networks [1]
and
SCHOOL X
12
3
6
9
.
McAfee
LiveSafe™
helps protect
your data and
your identity
on all of your
devices [4]
McAfee ActiveProtection™
helps to detect, quarantine, and
block malware [4]
Intel®
Identity
Protection Technology[1]
Intel® IPT with
One Time
Password:

Deters unauthorized access to services when user names/passwords are compromised [1]
Privilege Escalation Attack
Intel® Trusted Execution Technology
Build trusted infrastructure based on hardware root -of- trust-enhanced measured
boot [2]
Full transcript