Building Secure: Payment Systems & Applications. By: Sarath Geethakumar
|
|
|
- Alaina Quinn
- 10 years ago
- Views:
Transcription
1 Building Secure: Payment Systems & Applicatins By: Sarath Geethakumar Sarath Geethakumar 24 September
2 Abut Me Security Researcher Sr. Directr, Infrmatin Security, Visa Mbile Security Enthusiast C-Authr: Hacking Expsed Mbile Develper by passin Sarath Geethakumar 24 September
3 Cntents IEEE Tp 10 Scariest Threats 2013/14 Breach Recap Payment Systems/Applicatin Overview Security Life Cycle Building Security IN Sarath Geethakumar 24 September
4 IEEE survey results: Tp 10 Threats New threats emerge every day. Which d yu think are the Tp 10 scariest security threats this year? Attacks against cryptcurrency exchanges Ransmware Gvernment spying Retail data breaches Mbile malware Heartbleed vulnerabilities Massive Russian hacker database Vulnerabilities in hme netwrk ruters Airplane cmmunicatins systems flaws Vulnerabilities in USBs What is the real threat? Sarath Geethakumar (@sarathgk) 24 September
5 Breaches 2013/2014 Recap f KNOWN & PUBLICIZED breaches: Retail Stres Restaurants Health Care Banks Target Neiman Marcus Hme Dept PF Chang Cmmunity Health Systems JP Mrgan Chase Are there mre? Sarath Geethakumar (@sarathgk) 24 September
6 Wh, What, Hw and Wh is affected: Large enterprises, retailers, manufacturers and mre Cmmn man!!! What is the impact: Encmpass every realm f day t day life! Hw did it happen: 3 rd Party HVAC prvider, 3 rd party sftware, platfrm etc Web applicatin vulnerability, Missing patches Phishing and targeted attacks Why? Same vectrs re-used again and again Sarath Geethakumar (@sarathgk) 24 September
7 Payment System: Overview POS Sarath Geethakumar 24 September
8 Breach Analysis Explit: Malware/Phishing/Drive-by-dwnlads Vulnerable applicatins and systems Pst-explitatin : Weak security architecture Weak secure sftware develpment Lack vulnerability management Nn-existent security mnitring Mst rganizatins affected by breach were cmpliant t regulatry requirements!!! Feature Review Requirements Design Develpment Quality Assurance Release Mgmt. Sarath Geethakumar (@sarathgk) 24 September
9 Security Strategy Define Strategy & Gvernance Security Mnitring & Incident Respnse Establish Security Standards & Guidelines Security Assurance Benchmark - Sec. Capabilities Security Validatin Establish Risk Based Security Assessment Secure Develpment Standards Security Architecture & Framewrks Sarath Geethakumar (@sarathgk) 24 September
10 Security Life Cycle Security Levels/Stages Security & Privacy Review Secure Design/Arch. Review Secure Sftware Develpment Security Validatin & Verificatin Security Assurance Sec. Mnitring Security Activities Perfrm requirement and use case review, cmpliance review, privacy review, prduct risk assessment Perfrm Threat mdeling, Architectural risk assessment, Asset mapping and generate Security Requirement Matrix Prvide Training, Chse Develpment framewrks & Libraries, Perfrm differential cde review, Checkpints Perfrm Cde Review, Static Analysis & Dynamic Analysis f develped cde Cnduct Penetratin Testing, RED Team exercises, Security Patching Incident Respnse, SIEM, Data Analytics Analyze Design Develp Implement Testing Finalize Security & Privacy Review Secure Design/Arch. Review Secure Sftware Develpment Security Validatin & Verificatin Security Assurance Sec. Mnitring Sarath Geethakumar (@sarathgk) 24 September
11 Building Security int N Abslute Security Security = Defense in Depth 80% reductin in security findings Reduced n. f penetratin tests N critical/high findings pst develpment Enables agile develpment Secure Sftware/System develpment Micrsft SDL BSIMM Sarath Geethakumar (@sarathgk) 24 September
12 Questins? Sarath Sarath Geethakumar 24 September
Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012
Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.
Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013
Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,
HIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012
Research Reprt Abstract: Security Management and Operatins: Changes n the Hrizn By Jn Oltsik, Senir Principal Analyst With Kristine Ka and Jennifer Gahm July 2012 2012, The Enterprise Strategy Grup, Inc.
COURSE DETAILS. Introduction to Ethical Hacking. FootPrinting. What is Hacking. Who is a Hacker. Skills of a Hacker.
COURSE DETAILS Intrductin t Ethical Hacking What is Hacking Wh is a Hacker Skills f a Hacker Types f Hackers Reasns fr Hacking Wh are at the risk f Hacking attacks Effects f Cmputer Hacking n an rganizatin
Creating an Ethical Culture and Protecting Your Bottom Line:
Creating an Ethical Culture and Prtecting Yur Bttm Line: Best Practices fr Crprate Cdes f Cnduct Nte: The infrmatin belw and all infrmatin n this website is nt meant t be taken as legal advice. Please
AHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy
AHLA C. Big Data, Clud Cmputing and the New Wrld Order fr Health Care Privacy Marti Arvin Chief Cmpliance Officer UCLA David Geffen Schl f Medicine Ls Angeles, CA Kirk J. Nahra Wiley Rein LLP Washingtn,
ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor
ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library
MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER
MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER This Audit Cmmittee Charter has been amended as f July 17, 2015. The Audit Cmmittee shall review and reassess this Charter annually and recmmend
Session 9 : Information Security and Risk
INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin
WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy
WHAT YOU NEED TO KNOW ABOUT Prtecting yur Privacy YOUR PRIVACY IS OUR PRIORITY Credit unins have a histry f respecting the privacy f ur members and custmers. Yur Bard f Directrs has adpted the Credit Unin
Network Security Monitoring: Beyond Intrusion Detection. By: rewtninja
Netwrk Security Mnitring: Beynd Intrusin Detectin By: rewtninja Agenda Overview f NSM Benefits f NSM NSM vs IDS Limitatins f NSM Free slutins fr implementing NSM DEMO Whami? Security enthusiast SecOps
Vantiv eprotect iframe Technical Assessment Paper Prepared for:
Vantiv eprtect iframe Technical Assessment Paper Prepared fr: Octber 13, 2015 P a g e 2 Cntents EXECUTIVE SUMMARY...3 OVERVIEW... 3 ABOUT VANTIV EPROTECT... 4 OPERATIONAL FLOW... 5 TECHNICAL ASSESSMENT...6
1 GETTING STARTED. 5/7/2008 Chapter 1
5/7/2008 Chapter 1 1 GETTING STARTED This chapter intrduces yu t the web-based UIR menu system. Infrmatin is prvided abut the set up necessary t assign users permissin t enter and transmit data. This first
Junos Pulse Instructions for Windows and Mac OS X
Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.
2012 Small and Medium Businesses Mobile Solutions Study
2012 Small and Medium Businesses Mbile Slutins Study April, 2012 Sanjeev Aggarwal Laurie McCabe Brent Leary Arjun Aggarwal 4/10/2012 Cpyright SMB Grup 1 Why is Mbility Slutins Imprtant? In the next 3-4
AMWA Chapter Subgroups on LinkedIn Guidance for Subgroup Managers and Chapter Leaders, updated 2-12-15
AMWA Chapter Subgrups n LinkedIn Guidance fr Subgrup Managers and Chapter Leaders, updated 2-12-15 1. Chapters may nt have an independent grup n LinkedIn, Facebk, r ther scial netwrking site. AMWA prvides
BAMS Third Party Service Providers (TPSPs) FAQs
BAMS Third Party Service Prviders (TPSPs) FAQs 1) What is the Third Party Service Prvider (TPSP) Agent Registratin Prgram? The TPSP Agent Registratin Prgram is a Card Brand (Visa USA Inc and MasterCard
Bachelor & Master of Business Administration Business Information Management. What? Why? Who?
Bachelr & Master f Business Administratin Business Infrmatin Management What? Why? Wh? Why? Why? Business IT Why? Business IT Management IT What? It s abut Business! Fcus n Business Infrmatin Systems Business
Systems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets
CSAT Account Management
CSAT Accunt Management User Guide March 2011 Versin 2.1 U.S. Department f Hmeland Security 1 CSAT Accunt Management User Guide Table f Cntents 1. Overview... 1 1.1 CSAT User Rles... 1 1.2 When t Update
Help Desk Level Competencies
Help Desk Level Cmpetencies Level 1 Take user calls and manage truble tickets Ability t staff and manage the rganizatins helpdesk and effectively respnd t rutine custmer calls Ability t use prper grammar
9 ITS Standards Specification Catalog and Testing Framework
New Yrk State ITS Standards Specificatin Develpment Guide 9 ITS Standards Specificatin Catalg and Testing Framewrk This chapter cvers cncepts related t develpment f an ITS Standards Specificatin Catalg
POSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position
Psitin Title I.T Prject Officer Classificatin Higher Educatin Wrker, Level 7 Respnsible t The Psitin I.T Manager The psitin assists with the cmpletin f varius IT prjects intended t enable the nging administratin
WEB APPLICATION SECURITY TESTING
WEB APPLICATION SECURITY TESTING Cpyright 2012 ps_testware 1/7 Intrductin Nwadays every rganizatin faces the threat f attacks n web applicatins. Research shws that mre than half f all data breaches are
Revised October 27, 2011 Page 1 of 6
Keystne STARS Accreditatin Applicatin Philsphy The Keystne STARS prgram is Pennsylvania s QRIS which began in 2002. There are fur quality levels frm STAR 1 t STAR 4, each level building n the prir levels;
G-CLOUD FRAMEWORK SERVICE DEFINITION. Oracle Technology Service for Agile Cloud Projects. Copyright: 2014 6point6 Ltd
G-CLOUD FRAMEWORK SERVICE DEFINITION Oracle Technlgy Service fr Agile Clud Prjects Cpyright: 2014 6pint6 Ltd G-Clud Service Definitin Oracle Technlgy 1. SERVICE OVERVIEW The 6pint6 Oracle Technlgy Service
Audit Committee Charter
Audit Cmmittee Charter Membership The Audit Cmmittee (the "Cmmittee") f the Bard f Directrs (the "Bard") f Philip Mrris Internatinal Inc. (the "Cmpany") shall cnsist f at least three directrs all f whm
101 E-Commerce Start-up Checklist
101 E-Cmmerce Start-up Checklist 1. Wh are yu and what d yu want t d? (1) Define yur business activity (r what yur business is). (2) What are yu three main business bjectives? (3) Wh are yur custmers?
ISO Management Systems. Guidance on understanding the benefits of an ISO Management System
ISO Management Systems Guidance n understanding the benefits f an ISO Management System Welcme & Intrductins 4031 University Drive, 206, Fairfax, VA 22030 3 Grant Square, 243, Hinsdale, IL 60521 www.radiancmpliance.cm
Zscaler Cloud Update NEW FEATURES
Zscaler Clud Update FALL 2014 RELEASE UPDATE SUMMARY This release intrduces a new unified user interface that features redesigned Plicy and Administratin tabs integrated with the Dashbard and Analytics.
HIPAA 5010 Implementation FAQs for Health Care Professionals
HIPAA 5010 Implementatin FAQs fr Health Care Prfessinals Updated September 27, 2012 Key Messages In January 2009, the Department f Health and Human Services published the final rule cntaining the requirements
Vision and Draft Findings
Nebraska Bradband Plan Visin and Draft Findings Draft March 2014 Visin Nebraska s bradband visin is that residents, businesses, gvernment entities, cmmunity partners, and visitrs have access t affrdable
State of Wisconsin. File Server Service Service Offering Definition
State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm
Securely Managing Cryptographic Keys used within a Cloud Environment
Securely Managing Cryptgraphic Keys used within a Clud Envirnment Dr. Sarbari Gupta [email protected] 703-437-9451 ext 12 2012 NIST Cryptgraphic Key Management Wrkshp September 10-11, 2012 Intrductin
G-CLOUD FRAMEWORK SERVICE DEFINITION. Solution Architecture for Cloud Service. Copyright: 2014 6point6 Ltd
G-CLOUD FRAMEWORK SERVICE DEFINITION Slutin Architecture fr Clud Service Cpyright: 2014 6pint6 Ltd G-Clud Service Definitin Slutin Architecture fr Clud Service 1. SERVICE OVERVIEW 6pint6 is an innvative
Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S
Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...
Case Study. Sonata develops. comprehensive BI Application for a leading provider of Animal Nutrition Solutions. Ananthakrishnan
Case Study Ananthakrishnan Snata develps J Architect, Snata Sftware cmprehensive BI Applicatin fr a leading prvider f Animal Nutritin Slutins Snata Sftware Limited www.snata-sftware.cm www.snata-sftware.cm
Cyber Security Legislation Privacy Protections are Substantially Similar
Cyber Security Legislatin Privacy Prtectins are Substantially Similar By Rb Strayer and David Beardwd The fur mst prminent cyber security legislative prpsals the Obama administratin s legislative text;
Network Security Trends in the Era of Cloud and Mobile Computing
Research Reprt Abstract: Netwrk Security Trends in the Era f Clud and Mbile Cmputing By Jn Oltsik, Senir Principal Analyst and Bill Lundell, Senir Research Analyst With Jennifer Gahm, Senir Prject Manager
PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK
Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs
Adobe Sign. Enabling Single Sign-On with SAML Reference Guide
Enabling Single Sign-On with SAML Reference Guide 2016 Adbe Systems Incrprated. All Rights Reserved. Prducts mentined in this dcument, such as the services f identity prviders Micrsft Active Directry Federatin,
2. When logging is used, which severity level indicates that a device is unusable?
Last updated by Admin at March 3, 2015. 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput messages
JADU UNIVERSE SPECIALIST CLOUD SERVICES: DEVELOPMENT
JADU UNIVERSE SPECIALIST CLOUD SERVICES: DEVELOPMENT Sftware develpment fr gvernment digital services, web applicatins and payment transactins, by Jadu Jadu Limited Universe Huse 1 Merus Curt Leicester
How to Build Pay Grades and Salary Ranges
Hw t Build Pay Grades and Salary Ranges Mykkah Herner, MA, CCP Cmpensatin Cnsultant, PayScale, Inc. Laura Richardsn Client Executive, PayScale, Inc. www.payscale.cm 13,000 Psitins 2500 Custmers 35 Millin
GUIDANCE FOR BUSINESS ASSOCIATES
GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.
Vulnerability Management:
Vulnerability Management: Creating a Prcess fr Results Kyle Snavely Veris Grup, LLC Summary Organizatins increasingly rely n vulnerability scanning t identify risks and fllw up with remediatin f thse risks.
CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT
CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT Plicy Number: 2.20 1. Authrity Lcal Gvernment Act 2009 Lcal Gvernment Regulatin 2012 AS/NZS ISO 31000-2009 Risk Management Principles
Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite
Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in This
CMS Eligibility Requirements Checklist for MSSP ACO Participation
ATTACHMENT 1 CMS Eligibility Requirements Checklist fr MSSP ACO Participatin 1. General Eligibility Requirements ACO participants wrk tgether t manage and crdinate care fr Medicare fee-fr-service beneficiaries.
Data Abstraction Best Practices with Cisco Data Virtualization
White Paper Data Abstractin Best Practices with Cisc Data Virtualizatin Executive Summary Enterprises are seeking ways t imprve their verall prfitability, cut csts, and reduce risk by prviding better access
UBC Incident Response Plan V1.5
UBC Incident Respnse Plan V1.5 Cntents 1. Ratinale... 2 2. Objective... 2 3. Applicatin... 2 4. Reprting a Cmputer Security Incident... 2 5. Managing the Security Incident... 2 5.1. All Incidents... 2
INTEGRATION OVERVIEW. Introduction... 1. Authentication methods... 2. Learning management system (LMS) integration methods... 2. AICC standard...
INTEGRATION OVERVIEW Cntents Intrductin... 1 Authenticatin methds... 2 Learning management system (LMS) integratin methds... 2 AICC standard... 2 LTI standard... 3 Applicatin prgramming interface (API)
Completing the CMDB Circle: Asset Management with Barcode Scanning
Cmpleting the CMDB Circle: Asset Management with Barcde Scanning WHITE PAPER The Value f Barcding Tday, barcdes are n just abut everything manufactured and are used fr asset tracking and identificatin
Cloud Services Frequently Asked Questions FAQ
Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like
FAQs for Webroot SecureAnywhere Identity Shield
FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere Identity Shield?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is the Webrt
Level 1 Technical. RealPresence Web Suite and Web Suite Pro. Contents
Level 1 Technical RealPresence Web Suite and Web Suite Pr Cntents 1 - Glssary... 2 2 Features... 3 RealPresence Platfrm integratin... 3 RealPresence Web Suite Sftware... 3 Sftware Keys... 3 3 - Web Client
TECHNICAL BULLETIN. Title: Remote Access Via Internet Date: 12/21/2011 Version: 1.1 Product: Hikvision DVR Action Required: Information Only
Title: Remte Access Via Internet Date: 12/21/2011 Versin: 1.1 Prduct: Hikvisin DVR Actin Required: Infrmatin Only The fllwing steps will guide yu thrugh the steps necessary t access yur Hikvisin DVR remtely
Practice Incentives Program (PIP) ehealth Incentive. Requirement 1 - Integrating Healthcare Identifiers into Electronic Practice Records
Practice Incentives Prgram (PIP) ehealth Incentive Requirement 1 - Integrating Healthcare Identifiers int Electrnic Practice Recrds 2013 Health Cmmunicatin Netwrk Level 4, 201 Pacific Highway, St Lenards,
Backups and Backup Strategies
IT Security Office Versin 2.3 02/19/10 Backups and Backup Strategies IT managers need t plan fr backups in terms f time and space required. Hwever, mst mdern backup sftware can cmpress the backup files
DEPARTMENTAL WEBSITE REDESIGN PROJECT PROJECT PLAN
DEPARTMENTAL WEBSITE REDESIGN PROJECT PROJECT PLAN May & June 2015 Table f Cntents Faculty f Arts & Science Departmental Website Redesign Prject Backgrund... 3 Needs... 3 Objective... 4 Target Audiences...
Conference Theme: EHR: Practice Transformation and Reengineering Becoming the EHR Administrator
Cnference Theme: EHR: Practice Transfrmatin and Reengineering Becming the EHR Administratr SCHEDULE FOR Thursday, Nvember 17, 2011 8:00 10:00am Keynte: EHR: Where are we tday? Rn Sterling 10:00 10:30am
Capabilities Statement CONNECT WITH US:
Capabilities Statement CONNECT WITH US: Hitek Cnsulting, LLC Since 2005, we have becme the mst affrdable cmmercial service prvider f custm website, mbile app and sftware develpment. We als prvide website
