Managing Security of the Grid in the Cloud

Size: px
Start display at page:

Download "Managing Security of the Grid in the Cloud"

Transcription

1 Managing Security of the Grid in the Cloud Raoul Chiesa, Senior Advisor on Cybercrime ECU Emerging Crimes Unit, UNICRI United Nations Interregional Crime and Justice Research Institute (UNICRI)

2 Disclaimer The information contained in this presentation does not break any intellectual property, nor does it provide detailed information that may be in conflict with actual known laws. Registered brands and logos belong to their legitimate owners. The opinion here represented are our personal ones and do not necessary reflect the United Nations nor UNICRI views.

3 Agenda # whois What s all about A look inside SCADA & ICS The SOVEMA case study The Cloud and SCADA: shared issues The BAD news Be SECURE! To zoom in. Contacts, t Q&A

4 #whois

5 Raoul Nobody Chiesa Old-school Hacker from 1986 to 1995 Mediaservice.net (Est. 1997) Supporting UNICRI since 2004; Cybercrime Advisor since 2005 ENISA PSG, Advisor Italian MoD OSN/CASD CyberWorld WG: Group Leader OSSTMM Key Contributor; HPP Project Manager; ISECOM International a Trainer Member of CLUSIT, AIP/OPSI, TSTF.net (Telecom Security Task Force), APWG, ICANN, CyberDefcon, HostExploit, WINS, etc; I work worldwide (so I don t get bored ;) My areas of interest: Pentesting, SCADA/DCS/PLC, National Citi Critical linfrastructures, t Security R&D+Exploiting weird stuff,, Security People, X.25, PSTN/ISDN, Hackers Profiling, Cybercrime, Information Warfare & CyberWar, Security methodologies, vertical hard-core Trainings.

6 UNICRI UNICRI was created in 1968 to assist intergovernmental, governmental and non- governmental organizations in formulating and implementing improved policies in the field of crime prevention and criminal justice. WHQ is in Turin, Italy, inside the United Nations International Training i Campus (ITC/ILO). In a rapidly changing world, UNICRI s major goals today are advancing security, serving justice and building peace. Our key areas of focus: Applied Research Capacity Building Technical Co-operation Emerging Crimes Unit (ECU): deals with cyber crimes, counterfeiting, environmental crimes, trafficking in stolen works of art Fake Bvlgari &Rolex, but also Guess how they update each others? Water systems with sensors Viagra & Cialis (aka SPAM) , chat&im, Skype

7 Cybercrime turnover? 2011 Cybercrime financial turnover apparently scored up more than Drugs dealing, Human Trafficking and Weapons Trafficking turnovers Various sources (UN, USDOJ, INTERPOL -2010/2011) Financial Turnover, estimation: 6-12 BLN USD$/year Source: Group IB Report 2011

8 IEEE Hacking Matrix

9 NCIs and Nation State attacks "In the very near future many conflicts will not take place on the open field of battle, but rather in spaces on the Internet, fought with the aid of information soldiers, that is hackers. This means that t a small force of hackers is stronger than the multi-thousand force of the current armed forces. Former Duma speaker Nikolai Kuryanovich, 2007

10 What s all about

11 What s all about We ve got 3 different worlds here (just to make things easier ;) Logical Security Cloud SCADA/Industrial Automation

12 What s all about /2 Logical Security Since our today s society is (nearly) totally depending on IT, Security become a mandatory and strategic issue Thus, we re not able to rule it yet -> New challenges everyday, new trends (technologies) Public vulns (both Full or Responsible disclosure ones) 0-Days -> Black Market -> Underground Economy Cybercrime,, Information Warfare,, CyberWar (?) GOVs & MILs entering in the game Overall, already on its own it s a very complex world Cloud A really fresh, brand new technology. The InfoSec community & Industry is missing: Its backgrounds, history and field use -> InfoSec experts need time to learn from mistakes Incidents are already happening It calls for answers: best practices and security standards (CSA will help out here) SCADA/Industrial Automation Old technology Different views, needs and priorities when compared to InfoSec (i.e.: CIA vs AIC) Security aspects were not a priority A security bugs tsunami (i.e. 100 SCADA bugs in 100 days) Increasing attention from Bug Hunters (Security Researchers) and Hackers (crackers?) Much more will come Strategical asset -> Interest from the Information Warfare perspective

13 A look inside

14 What s this Cloud? The very official, serious term: Cloud Computing Wikipedia: Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). Henry J. Sienkiewicz DISA (Defense Information Systems Agency) A style of computing where massively scalable (and elastic) IT-related capabilities are provided as a service to external customers using Internet technologies.

15 Cloud /2 IaaS: Infrastructure As-a-Service Processing, networking, storage, virtualization PaaS: Platform-As-a-Service Applications development, platforms to develop and test and study SaaS applications. Intended for sw developers communities. SaaS: Software-As-a-Service Pay-per-Use your application through the Web XaaS: Whatever-As-a-Service: Data-As-a-Service a (on-line storage or DaaS) Cracking-As-a-Service? DDoS-aaS?

16 History played back

17 Cloud s fans and opponents (PROs/CONs) Cloud sucks because... Cloud is cool because... It doesn t have security IDC/Gartner/whoever said it s the I want to manage my stuff on my own future I don t go for cloud cause I don t have It s SO trendy any stuff on cloud and I never will I don t cloud cause I already have my I save money The son of a friend of mine runs a Facebook page with friends cloud: it s my datacenter, close to my and dtold me that tcloud di is a must- town If it s gonna rain, I ll lose my data have Because everything is on the Internet t On cloud they would steal my data and the USA would read my s

18 SCADA & ICS

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48 The Cloud and SCADA: shared issues

49 Known issues /1 Recording Logging? Which h type of fl logs? And what about the data-retention and privacy laws? Where s my data, in which country? Access Who can access my data? What if ICAN T access my own data?? Backups and safeties What is backuped? When? How long (data retention, again) Compliance Which kind of Security Audits are allowed to be run? What about Penetration Tests? Who will legally authorise the pentesters?

50 Known issues /2 Lawful Interception TLC Service providers must be compliance with LIS laws Laws are pretty similar, il both into UE and extra-eu countries ti Legal Where eest is the edatacenter te located? Local laws (i.e. Privacy) Cloud Provider VS data management (privacy, once again) Transferring this data abroad.? DLP (Data Loss Prevention) How can I monitor what is happening to my boxes/applications/services? what about Digital Forensics?!? Insurance ss aspect (break-ins)?? Hidden costs Is there anything billed in an hidden way? CPU? Data Traffic? Disk space & Backups quotas?

51 The bad news

52 First, fresh problems September 8th, 2001 Google Docs stopped working. 30 minutes black-out Those data people was working on, got lost And, people wasn t able to work btw!! While this news is from 2001, in the last 10 years a lot of similar incidents have happened

53 Unknown issues DDoS attacks Running on cloud can be extremely helpful when mitigating DDoS attacks These attacks would not be as much easy to mitigate within your standard infrastructure On the other hand, from an attacker s point of view, the cloud infrastructure itself would represent a very powerful shotgun

54 Unknown issues /2 Password cracking Attackers already have abused Cloud s ISPs resources in order to run password cracking software: WPA-Protected-WiFi-in-Six-Minutes.html Roth was able to crack passwords per second nt-security/ /researcher-overcomes-legal-setback-over- cloud-cracking-suite.html Apparent mis-translation by a German newspaper of English-speaking reports on researcher's Amazon EC2- based password-cracking tool led to raid, frozen bank account 11 Jan 2011 Researcher cracks Wi-Fi passwords with Amazon cloud... computers available for 28 cents per minute, the cost of the crack came to just $ g/

55 Be SECURE!

56 Be SECURE! A good start from the folks at NIST & ENISA NIST Releases Secure Cloud Computing Guidelines (September 15, 2011) Read the article on Infosec Island! ( NIST Cloud Computing Standards Roadmap (NIST SP ): search.cfm?pub_id= The full document: computing/pub/cloudcomputing/standardsroadmap/nist_sp_ _jul5a.pdf ENISA, Cloud Computing - Benefits, risks and recommendations for information security, November risk-assessment ENISA, Cloud Computing - SME Survey, November survey ENISA, Cloud Computing Information Assurance Framework, November information-assuranceframework f

57 To zoom in

58 A gift for you all here! Get your own, FREE copy of F3 (Freedom from Fear, the United Nations magazine) issue #7, totally focused on Cybercrimes! DOWNLOAD: Or, me and I will send you the full PDF (10MB)

59 Know your Enemy Profiling Hackers: the Science of Criminal Profiling as applied to the World of Hacking ISBN:

60 Questions? Contacts, Q&A Raoul Chiesa Thanks folks! UNICRI Cybercrime Home Page: UNICRI Cybercrime Initiatives: i it/ i i / i /i iti ti /

Intro The Speaker. Raoul Chiesa

Intro The Speaker. Raoul Chiesa Cloud Security, from an Hacker s Perspective ( 从 专 业 视 角 看 云 安 全 ) Raoul Nobody Chiesa Founder, Partner, Security Brokers Principal, Cyberdefcon Ltd. Founder, Owner, @ Mediaservice.net Perugia, July 23,

More information

Data Breaches, Data Leaks, Web Defacements: why secure coding is important.

Data Breaches, Data Leaks, Web Defacements: why secure coding is important. Data Breaches, Data Leaks, Web Defacements: why secure coding is important. Raoul «Nobody» Chiesa Founder, President, Security Brokers The speaker President, Founder, The Security Brokers Principal, CyberDefcon

More information

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald About DN-Systems Global Consulting and Technology Services Planning Evaluation Auditing Operates own Security Lab Project Management Integral

More information

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment

More information

Robert Malmgren. Smart Grid. Security Challenges - Legacy and Infrastructure Burdens

Robert Malmgren. Smart Grid. Security Challenges - Legacy and Infrastructure Burdens Robert Malmgren Smart Grid Security Challenges - Legacy and Infrastructure Burdens Short bio Robert Malmgren Independent consultant that have worked with utility companies regarding IT- and info sec since

More information

Walking the talk. Marnix Dekker. about the EC as cloud customer. CISO team, European Commission

Walking the talk. Marnix Dekker. about the EC as cloud customer. CISO team, European Commission Walking the talk about the EC as cloud customer Marnix Dekker CISO team, European Commission ENISA: "Security is a driver for cloud" Many technical security opportunities when "going cloud" 1. Geographic

More information

Cloud Computing. What is Cloud Computing?

Cloud Computing. What is Cloud Computing? Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk

More information

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant How Security Testing can ensure Your Mobile Application Security Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant Once More Consulting & Advisory Services IT Governance IT Strategic

More information

Big Data, Big Risk, Big Rewards. Hussein Syed

Big Data, Big Risk, Big Rewards. Hussein Syed Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data

More information

Managing your Information Assets in the Cloud

Managing your Information Assets in the Cloud Managing your Information Assets in the Cloud Nick Loy, Director, Portfolio Management Documents BancTec Certified Information Professional Enterprise Content Management Practioner Prior to BancTec, was

More information

Cloud Security. DLT Solutions LLC June 2011. #DLTCloud

Cloud Security. DLT Solutions LLC June 2011. #DLTCloud Cloud Security DLT Solutions LLC June 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) [email protected] www.dlt.com/cloud Your Hosts Van Ristau Chief Technology Officer, DLT Solutions

More information

Auditing the Hacker s mind: the Hacker s Profiling Project 2.0. Raoul Chiesa, Senior Advisor on Cybercrime at ECU Emerging Crimes Unit, UNICRI

Auditing the Hacker s mind: the Hacker s Profiling Project 2.0. Raoul Chiesa, Senior Advisor on Cybercrime at ECU Emerging Crimes Unit, UNICRI Auditing the Hacker s mind: the Hacker s Profiling Project 2.0 Raoul Chiesa, Senior Advisor on Cybercrime at ECU Emerging Crimes Unit, UNICRI United Nations Interregional Crime and Justice Research Institute

More information

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers Introduction to Ethical Hacking and Network Defense January 14, 2010 MIS 4600 - Abdou Illia Objectives Describe the role of an ethical hacker Describe what can an ethical hacker legally do Describe what

More information

CLOUD COMPUTING OVERVIEW

CLOUD COMPUTING OVERVIEW 2110414 - Large Scale Computing Systems 1 CLOUD COMPUTING OVERVIEW 2110414 Large Scale Computing Systems Natawut Nupairoj, Ph.D. Outline 2 Overview Cloud Approaches Real-World Case Study 2110414 - Large

More information

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected]. Agenda. Security Cases What is Cloud? Road Map Security Concerns

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH VORAPOJ.L@G-ABLE.COM. Agenda. Security Cases What is Cloud? Road Map Security Concerns BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected] Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad

More information

Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )

Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken ) 23.11.2015 Jan Philipp Manager, Cyber Risk Services Enterprise Architect Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken ) Purpose today Introduction» Who I am

More information

CHAPTER 10: COMPUTER SECURITY AND RISKS

CHAPTER 10: COMPUTER SECURITY AND RISKS CHAPTER 10: COMPUTER SECURITY AND RISKS Multiple Choice: 1. In a survey of more than 500 companies and government agencies, percent detected computer security breaches. A. 20 B. 75 C. 85 D. 99 Answer:

More information

Cloud Security & Risk. Adam Cravedi, CISA Senior IT Auditor [email protected]

Cloud Security & Risk. Adam Cravedi, CISA Senior IT Auditor acravedi@compassitc.com Cloud Security & Risk Adam Cravedi, CISA Senior IT Auditor [email protected] Agenda About Compass Overcast - Cloud Overview Thunderheads - Risks in the Cloud The Silver Lining - Security Approaches

More information

Cloud Security An Overview OWASP. The OWASP Foundation http://www.owasp.org

Cloud Security An Overview OWASP. The OWASP Foundation http://www.owasp.org Cloud Security An Overview Presented by, Ezhil Arasan Babaraj [email protected] CSS Corp Labs CSS Corp Pvt Ltd. Copyright The Foundation Permission is granted to copy, distribute and/or modify

More information

Cloud Computing Now and the Future Development of the IaaS

Cloud Computing Now and the Future Development of the IaaS 2010 Cloud Computing Now and the Future Development of the IaaS Quanta Computer Division: CCASD Title: Project Manager Name: Chad Lin Agenda: What is Cloud Computing? Public, Private and Hybrid Cloud.

More information

Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB

Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB Why Private Cloud? O P E R A T I O N S V I E W Nenad BUNCIC EPFL, SI-EXHEB 1 What Exactly Is Cloud? Cloud technology definition, as per National Institute of Standards and Technology (NIST SP 800-145),

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

Training Employees to Recognise & Avoid Advanced Threats

Training Employees to Recognise & Avoid Advanced Threats Training Employees to Recognise & Avoid Advanced Threats Joe Ferrara, President & CEO, Wombat Security Technologies Rashmi Knowles, Chief Security Architect EMEA, RSA The Security Division of EMC Session

More information

Top 10 Cloud Risks That Will Keep You Awake at Night

Top 10 Cloud Risks That Will Keep You Awake at Night Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com .. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com

More information

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director

More information

What legal aspects are needed to address specific ICT related issues?

What legal aspects are needed to address specific ICT related issues? What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]

More information

Evolution of Penetration Testing

Evolution of Penetration Testing Alexander Polyakov, QSA,PA-QSA CTO Digital Security (dsec.ru) Head of DSecRG (dsecrg.com) ERPSCAN Architect (erpscan.com) Head of OWASP-EAS Pentests? Again? Why? Many companies are doing this Many companies

More information

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Computing Governance & Security. Security Risks in the Cloud Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud

More information

New Zealand Company Six full time technical staff Offices in Auckland and Wellington

New Zealand Company Six full time technical staff Offices in Auckland and Wellington INCREASING THE VALUE OF PENETRATION TESTING ABOUT YOUR PRESENTER Brett Moore Insomnia Security New Zealand Company Six full time technical staff Offices in Auckland and Wellington Penetration Testing Web

More information

On Premise Vs Cloud: Selection Approach & Implementation Strategies

On Premise Vs Cloud: Selection Approach & Implementation Strategies On Premise Vs Cloud: Selection Approach & Implementation Strategies Session ID#:10143 Prepared by: Praveen Kumar Practice Manager AST Corporation @Praveenk74 REMINDER Check in on the COLLABORATE mobile

More information

Introduction to Cloud Services

Introduction to Cloud Services Introduction to Cloud Services (brought to you by www.rmroberts.com) Cloud computing concept is not as new as you might think, and it has actually been around for many years, even before the term cloud

More information

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Executive Summary As cloud service providers mature, and expand and refine their offerings, it is increasingly difficult for

More information

Is it Time to Trust the Cloud? Unpacking the Notorious Nine

Is it Time to Trust the Cloud? Unpacking the Notorious Nine Is it Time to Trust the Cloud? Unpacking the Notorious Nine Jonathan C. Trull, CISO, Qualys Cloud Security Alliance Agenda Cloud Security Model Background on the Notorious Nine Unpacking the Notorious

More information

The Cloud Opportunity: Italian Market 01/10/2010

The Cloud Opportunity: Italian Market 01/10/2010 The Cloud Opportunity: Italian Market 01/10/2010 Alessandro Greco @Easycloud.it In collaboration with easycloud.it Who is easycloud.it? Easycloud.it is a Consultant Company based in Europe with HQ in Italy.

More information

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014 Security Testing Vulnerability Assessment vs Penetration Testing Gabriel Mihai Tanase, Director KPMG Romania 29 October 2014 Agenda What is? Vulnerability Assessment Penetration Testing Acting as Conclusion

More information

Attacks from the Inside

Attacks from the Inside Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The

More information

About me & Submission details

About me & Submission details About me & Submission details Parveen Yadav Security Researcher aka Ethical Hacker. Working as a Freelancer. White Hat Hacking work. Few Recognitions :- Got listed my name in Google Hall of fame,amazon,paypal,adobe

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Introduction to Computer Networking: Trends and Issues

Introduction to Computer Networking: Trends and Issues Introduction to Computer Networking: Trends and Issues Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Indo-US Collaboration in Engineering Education (IUCEE) Webinar,

More information

BUSINESS MANAGEMENT SUPPORT

BUSINESS MANAGEMENT SUPPORT BUSINESS MANAGEMENT SUPPORT Business disadvantages using cloud computing? Author: Maikel Mardjan [email protected] 2010 BM-Support.org Foundation. All rights reserved. EXECUTIVE SUMMARY Cloud computing

More information

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot

More information

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime? Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies

More information

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Computing; What is it, How long has it been here, and Where is it going? Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where

More information

CS573 Data privacy and security in the cloud. Slide credits: Ragib Hasan, Johns Hopkins University

CS573 Data privacy and security in the cloud. Slide credits: Ragib Hasan, Johns Hopkins University CS573 Data privacy and security in the cloud Slide credits: Ragib Hasan, Johns Hopkins University What is Cloud Computing? Let s hear from the experts 2 What is Cloud Computing? The infinite wisdom of

More information

Security and Privacy in Cloud Computing

Security and Privacy in Cloud Computing Security and Privacy in Cloud Computing Ragib Hasan Johns Hopkins University en.600.412 Spring 2010 Lecture 1 01/25/2010 Welcome to the class Administrative details When? : Monday 3pm-3.50pm Where?: Shaffer

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C. Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.

More information

Novel Network Computing Paradigms (I)

Novel Network Computing Paradigms (I) Lecture 4 Novel Network Computing Paradigms (I) Part B Cloud Computing Graduate Course, Hosei U., J. Ma 1 Computing Paradigm Evolution Personal PC Client Server Cloud Computing Hardware Centric Software

More information

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc. Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value

More information

The SMB Cyber Security Survival Guide

The SMB Cyber Security Survival Guide The SMB Cyber Security Survival Guide Stephen Cobb, CISSP Security Evangelist The challenge A data security breach can put a business out of business or create serious unbudgeted costs To survive in today

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

Cybercrime: risks, penalties and prevention

Cybercrime: risks, penalties and prevention Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

More information

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies

More information

Penetration Testing Is A Bad Idea. Anton Aylward, CISSP, CISA System Integrity

Penetration Testing Is A Bad Idea. Anton Aylward, CISSP, CISA System Integrity Penetration Testing Is A Bad Idea Anton Aylward, CISSP, CISA System Integrity What are you trying to test? Can hackers break in? You can t prove a -ve Your firewall works? But is it configured? Your IDS

More information

Vinny Hoxha Vinny Hoxha 12/08/2009

Vinny Hoxha Vinny Hoxha 12/08/2009 Ethical Hacking and Penetration Testing Vinny Hoxha Vinny Hoxha 12/08/2009 What is Ethical Hacking? Types of Attacks Testing Approach Vulnerability Assessments vs. Penetration Testing Testing Methodology

More information

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station What is Cloud Computing? http://www.agent-x.com.au/ Wikipedia - the use of computing resources (hardware and software)

More information

Security Chasm! Dr. Anton Chuvakin

Security Chasm! Dr. Anton Chuvakin Security Chasm! Hack in The Box Amsterdam, The Netherlands July 2010 Why Are We Here? Risk of DEATH vs Risk of $60 fine? WTH is security? How we got here? Outline Security and/or/=/vs Compliance? Security

More information

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @ Agenda Review the

More information

Cybercrime in Canadian Criminal Law

Cybercrime in Canadian Criminal Law Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime

More information

Cyber Security. John Leek Chief Strategist

Cyber Security. John Leek Chief Strategist Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity

More information

Big Data and Security: At the Edge of Prediction

Big Data and Security: At the Edge of Prediction Big Data and Security: At the Edge of Prediction Mark Seward Splunk Inc. Fred Wilmot Splunk Inc. Session ID: Session Classification: SPO2-T17 Intermediate The Way Cyber Adversaries Think Where is the most

More information

LESSON 13 VIRTUALIZATION AND CLOUD COMPUTING

LESSON 13 VIRTUALIZATION AND CLOUD COMPUTING LESSON 13 VIRTUALIZATION AND CLOUD COMPUTING 2 WARNING The Hacker High School Project is a learning tool and as with any learning tool there are dangers. Some lessons, if abused, may result in physical

More information

Penetration Testing in Romania

Penetration Testing in Romania Penetration Testing in Romania Adrian Furtunǎ, Ph.D. 11 October 2011 Romanian IT&C Security Forum Agenda About penetration testing Examples Q & A 2 What is penetration testing? Method for evaluating the

More information

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute

More information

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown 1 Protected networks are continuously being successfully attacked

More information

Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Grid-Interop 2012

Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Grid-Interop 2012 Cloud Computing 101 Dissipating the Fog 2012/Dec/xx Why the interest in Clouds? A method to avoid/defer CAPEX/OPEX and possibly accelerating implementation 2 It all started here - Timeshare Computers and

More information

How to procure a secure cloud service

How to procure a secure cloud service How to procure a secure cloud service Dr Giles Hogben European Network and Information Security Agency Security in the cloud contracting lifecycle Can cloud meet your security requirements Choose the provider

More information

Attribution: The Holy Grail or Waste of Time? Billy Leonard Google Should this be the end, our Holy Grail? How s that picture going to help you now? But, the pictures make me safer! We can do better. Our

More information

COB 302 Management Information System (Lesson 8)

COB 302 Management Information System (Lesson 8) COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this

More information

Privacy, Security and Identity in the Cloud. Giles Hogben ENISA

Privacy, Security and Identity in the Cloud. Giles Hogben ENISA Privacy, Security and Identity in the Cloud Giles Hogben ENISA What s new about Cloud Computing? Isn t it just old hat? Larry Ellison, CEO, Oracle The interesting thing about cloud computing is that we

More information