SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
OTA 2013 Response and Remediation

Malvertising Response & Remediation Guide
Overview
The Response and Remediation Guide is one of a series of best practices that OTA has
published to help protect businesses and to respond effectively to the threat landscape and
online fraud battlefield. One of the ways in which malware perpetrators attempt to infiltrate
online advertising networks is by creating fraudulent advertisers or advertising agencies that
appear to represent legitimate brands. The frequency of malicious advertising insertions
continues to grow with increased precision and payload capabilities.
The following guidelines have been developed to aid the advertising and marketing
communities in effectively preparing for and responding to malvertising and related incidents.

1. Organize a Response Team
Form and train a dedicated team to oversee responsibility for the problem. Team members
should act as in-house subject matter experts on threats and vulnerabilities, and provide
guidance to management team about risks in the advertising landscape.
2. Create a Communication Plan
Create an internal communication piece to educate other employees about the problem. Help
other employees understand how to handle a “bad ad” when witnessed in the wild. Let others
know what information is helpful for the response team (screenshots, call flows, etc.)
Encourage the use of tools such as AdMagic, Ghostery and AdChoices to help identify ad
sources.
3. Understand Different Complaint Types
Identify and define the different complaint types and create a response plan for each type. For
example, handling a viewer complaint about a pop-up ad will require a different set of steps than
handling a complaint about a fake anti-virus ad. Understanding the different complaint
categories will also help provide metrics to management.
4. Gain Agreement on Immediate Steps
Predefine immediate steps and gather buy in from affected parties before an incident takes
place, as making decisions under pressure can cause unwarranted stress and delays.
Considerations:






Shut off all advertising?
Shut off only ad network advertising?
Run house ads only?
Run tests in a test environment?
Other?

5. Ongoing Scanning and Screening
Scan all tags regularly using a tag or site screening system. While no system can guarantee
the safety of every single ad impression when served by a third party, they can provide peace of
mind to the team that there is at least some visibility to the ad traffic.

© 2013 Online Trust Alliance (OTA) All Rights Reserved

https://otalliance.org

Page 1
OTA 2013 Response and Remediation

6. Gather Emergency Contact Information during Onboarding Process
Allow only authorized ad networks and providers to run on your site. Gather emergency contact
names and phone numbers to use when a questionable ad appears on your site. Work with the
ad networks to understand their own remediation plan when a problem occurs. Be sure that to
record and document network violations for malvertising. Determine if your organization should
set up a “three strikes” policy or some other penalties for repeated problems.
7. Create an Incident Response Plan & Communication Plan
As malvertising, data loss incidents and breaches are an increasing occurrence targeting the ad
supply chain and interactive marketers, the creation and testing of a response plan is key. All
businesses need to proactively develop a plan to minimize data collection, enhance data
protection and to create a customer-centric incident response plan. A key component of a plan
is setting up emergency contact notification templates to help communicate to your business
partners and customers. Defining a process, call tree and team responsibilities in advance, can
help minimize partner issues and the business impact resulting from malvertising and related
incidents. By planning, businesses of all sizes can minimize their risks, costs and the impact.
For more information see 2013 OTA Data Protection & Incident Readiness Guide.
https://otalliance.org/breach.html

For related resources and updates to this document visit https://otalliance.org/malvertising.html.

Send comments and suggestions to staff @ otalliance.org.

About The Online Trust Alliance (OTA) https://www.otalliance.org/
OTA is an independent non-profit with a mission to develop and advocate best practices and
public policies which mitigate emerging privacy, identity and security threats to online services,
organizations and consumers, thereby enhancing online trust and confidence. By facilitating an
open dialog with industry, business and governmental agencies to work collaboratively, OTA is
making progress to address various forms of online abuse, threats and practices that threaten
to undermine online trust and the vitality of online services and commerce.

© 2013 Online Trust Alliance. All rights reserved.
Material in this publication is for educational and informational purposes only. Neither the publisher, the
Online Trust Alliance (OTA), its members nor the authors assume any liability for any errors or omissions
nor how this publication or its contents are used or interpreted or for any consequences resulting directly
or indirectly from the use of this publication. OTA makes no assertions or endorsements regarding the
security or business practices of companies who may choose to adopt such recommendations outlined.
For legal or other advice, please consult your attorney or other appropriate professional. The views
expressed in this publication do not necessarily reflect the views of OTA member companies or affiliated
organizations.
OTA MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN
THIS DOCUMENT. No part of this publication may be reproduced or distributed in any form or by any
means, or stored in a database, web site or retrieval without the written consent of OTA.
Revised 3/11/2013

© 2013 Online Trust Alliance (OTA) All Rights Reserved

https://otalliance.org

Page 2

Mais conteúdo relacionado

Semelhante a Anti-Malvertising Guidelines

ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
Craig Taggart MBA
 
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
Craig Taggart
 

Semelhante a Anti-Malvertising Guidelines (20)

ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
 
Social Web Policy Guide
Social Web Policy GuideSocial Web Policy Guide
Social Web Policy Guide
 
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
 
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
 
Reputation Guards
Reputation GuardsReputation Guards
Reputation Guards
 
Reputation-guards
Reputation-guardsReputation-guards
Reputation-guards
 
Reputation-guards.com
Reputation-guards.comReputation-guards.com
Reputation-guards.com
 
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
 
Social Media
Social MediaSocial Media
Social Media
 
Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud Policy
 
Experion Data Breach Response Excerpts
Experion Data Breach Response ExcerptsExperion Data Breach Response Excerpts
Experion Data Breach Response Excerpts
 
White-Paper-Four-Keys-to-Creating-a-Vendor-Risk-Management-Program.pdf
White-Paper-Four-Keys-to-Creating-a-Vendor-Risk-Management-Program.pdfWhite-Paper-Four-Keys-to-Creating-a-Vendor-Risk-Management-Program.pdf
White-Paper-Four-Keys-to-Creating-a-Vendor-Risk-Management-Program.pdf
 
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay Fraud
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
 
3-I to manage issues and risks associated to software and IT services
3-I to manage issues and risks associated to software and IT services3-I to manage issues and risks associated to software and IT services
3-I to manage issues and risks associated to software and IT services
 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red Flags
 
FDA Presentation: How Pharma Marketers Should Use Social Media
FDA Presentation: How Pharma Marketers Should Use Social MediaFDA Presentation: How Pharma Marketers Should Use Social Media
FDA Presentation: How Pharma Marketers Should Use Social Media
 
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
 
2020 vrm expert reference guide
2020   vrm expert reference guide2020   vrm expert reference guide
2020 vrm expert reference guide
 

Mais de - Mark - Fullbright

Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
- Mark - Fullbright
 

Mais de - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Último

Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Anti-Malvertising Guidelines

  • 1. OTA 2013 Response and Remediation Malvertising Response & Remediation Guide Overview The Response and Remediation Guide is one of a series of best practices that OTA has published to help protect businesses and to respond effectively to the threat landscape and online fraud battlefield. One of the ways in which malware perpetrators attempt to infiltrate online advertising networks is by creating fraudulent advertisers or advertising agencies that appear to represent legitimate brands. The frequency of malicious advertising insertions continues to grow with increased precision and payload capabilities. The following guidelines have been developed to aid the advertising and marketing communities in effectively preparing for and responding to malvertising and related incidents. 1. Organize a Response Team Form and train a dedicated team to oversee responsibility for the problem. Team members should act as in-house subject matter experts on threats and vulnerabilities, and provide guidance to management team about risks in the advertising landscape. 2. Create a Communication Plan Create an internal communication piece to educate other employees about the problem. Help other employees understand how to handle a “bad ad” when witnessed in the wild. Let others know what information is helpful for the response team (screenshots, call flows, etc.) Encourage the use of tools such as AdMagic, Ghostery and AdChoices to help identify ad sources. 3. Understand Different Complaint Types Identify and define the different complaint types and create a response plan for each type. For example, handling a viewer complaint about a pop-up ad will require a different set of steps than handling a complaint about a fake anti-virus ad. Understanding the different complaint categories will also help provide metrics to management. 4. Gain Agreement on Immediate Steps Predefine immediate steps and gather buy in from affected parties before an incident takes place, as making decisions under pressure can cause unwarranted stress and delays. Considerations:      Shut off all advertising? Shut off only ad network advertising? Run house ads only? Run tests in a test environment? Other? 5. Ongoing Scanning and Screening Scan all tags regularly using a tag or site screening system. While no system can guarantee the safety of every single ad impression when served by a third party, they can provide peace of mind to the team that there is at least some visibility to the ad traffic. © 2013 Online Trust Alliance (OTA) All Rights Reserved https://otalliance.org Page 1
  • 2. OTA 2013 Response and Remediation 6. Gather Emergency Contact Information during Onboarding Process Allow only authorized ad networks and providers to run on your site. Gather emergency contact names and phone numbers to use when a questionable ad appears on your site. Work with the ad networks to understand their own remediation plan when a problem occurs. Be sure that to record and document network violations for malvertising. Determine if your organization should set up a “three strikes” policy or some other penalties for repeated problems. 7. Create an Incident Response Plan & Communication Plan As malvertising, data loss incidents and breaches are an increasing occurrence targeting the ad supply chain and interactive marketers, the creation and testing of a response plan is key. All businesses need to proactively develop a plan to minimize data collection, enhance data protection and to create a customer-centric incident response plan. A key component of a plan is setting up emergency contact notification templates to help communicate to your business partners and customers. Defining a process, call tree and team responsibilities in advance, can help minimize partner issues and the business impact resulting from malvertising and related incidents. By planning, businesses of all sizes can minimize their risks, costs and the impact. For more information see 2013 OTA Data Protection & Incident Readiness Guide. https://otalliance.org/breach.html For related resources and updates to this document visit https://otalliance.org/malvertising.html. Send comments and suggestions to staff @ otalliance.org. About The Online Trust Alliance (OTA) https://www.otalliance.org/ OTA is an independent non-profit with a mission to develop and advocate best practices and public policies which mitigate emerging privacy, identity and security threats to online services, organizations and consumers, thereby enhancing online trust and confidence. By facilitating an open dialog with industry, business and governmental agencies to work collaboratively, OTA is making progress to address various forms of online abuse, threats and practices that threaten to undermine online trust and the vitality of online services and commerce. © 2013 Online Trust Alliance. All rights reserved. Material in this publication is for educational and informational purposes only. Neither the publisher, the Online Trust Alliance (OTA), its members nor the authors assume any liability for any errors or omissions nor how this publication or its contents are used or interpreted or for any consequences resulting directly or indirectly from the use of this publication. OTA makes no assertions or endorsements regarding the security or business practices of companies who may choose to adopt such recommendations outlined. For legal or other advice, please consult your attorney or other appropriate professional. The views expressed in this publication do not necessarily reflect the views of OTA member companies or affiliated organizations. OTA MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database, web site or retrieval without the written consent of OTA. Revised 3/11/2013 © 2013 Online Trust Alliance (OTA) All Rights Reserved https://otalliance.org Page 2