Top Banner
Security is Like a Chain... as Strong as The Weakest link 90% cyber security implementation is inconsistent... :’( XecureIT © PT IMAN Teknologi Informasi The Security Weakest Links v2.0
25

03. The Security Weakest Links

Nov 28, 2014

Download

Technology

This presentation presentated by Gildas Deograt Lumy "Simulasi Scirital Information Infrastructure Protection (CIIP)" , Bandung, Indonesia 10th September 2013 on #IISF2013
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 03. The Security Weakest Links

Security is Like a Chain...as Strong as The Weakest link

90% cyber security implementation is inconsistent... :’(

XecureIT

© PT IMAN Teknologi InformasiThe Security Weakest Links v2.0

Page 2: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

People: Unaware and Ignorance“Amateur hacks the systems. Professional hacks the people.”

Page 3: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

People: Unaware and Ignorance“Amateur hacks the systems. Professional hacks the people.”

Page 4: 03. The Security Weakest Links

Policies and Procedures

InconsistentInconsistent

UnclearUnclear

Page 5: 03. The Security Weakest Links

Technology Implementation

Completely Wrong :’(

Page 6: 03. The Security Weakest Links

Technology Implementation

Complete Failure :’(

Page 7: 03. The Security Weakest Links

Physical Cable Weakness

Page 8: 03. The Security Weakest Links

Technology Weakness

Border Gateway Protocol (BGP) Poisoning

Page 9: 03. The Security Weakest Links

Technology Vulnerability“We are like sitting duck.”

Page 10: 03. The Security Weakest Links

Anti Malware is Ineffective“Updated anti malware is ineffective.”

Page 11: 03. The Security Weakest Links

Anti Malware is Ineffective“Malware is more stealthy.”

Page 12: 03. The Security Weakest Links

Targeted Attack“Updated anti malware is useless.”

Page 13: 03. The Security Weakest Links

Government and Business Cooperation

Page 14: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

Government and Business Cooperation

Page 15: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

BackdoorVendors: “Backdoors are critical vulnerabilities.”

Page 16: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

BackdoorVendors: “Discovered hidden key is a critical vulnerability.”

Page 17: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

BackdoorVendors: “Discovered hidden key is a critical vulnerability.”

Page 18: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

BackdoorFirmware

Page 19: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

BackdoorKill Switch

Page 20: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

End-PointMalware in The Browser and ATM

Page 21: 03. The Security Weakest Links

Insider AttackThe enemy is “brought” inside by authorized people :’(

Page 22: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

The History of War

Page 23: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

The Cyberwar

Page 24: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

Mobile Device

Page 25: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

Mobile Device