Mobile Security Framework; Advances in Mobile Governance in Korea. TaeKyung Kim
|
|
|
- Philippa Bennett
- 10 years ago
- Views:
Transcription
1 Mobile Security Framework; Advances in Mobile Governance in Korea TaeKyung Kim
2 I. e-banking in Korea 1. e-banking? BIS (Bank for International Settlements) - e-finance(electronic banking) refers to the provision of retail and small value banking products and services through electronic channels FFIEC (Federal Finance Institutions Examination Council, US) - e-banking is defined as the automated delivery of new and traditional banking products and services directly to customers through electronic, interactive communication channels - Customers access e-banking services using an intelligent electronic device, such as a personal computer (PC), personal digital assistant (PDA), automated teller machine (ATM), kiosk, or Touch Tone telephone
3 I. e-banking in Korea 2. Features of e-banking Electronic Increasing convenience Paperless Increasing profit Increasing IT s role Raising the risk on IT Open networks Security and customer protection
4 I. e-banking in Korea 3. Banking Environments Broadband User 77.2% of total households (36 million subscribers) Mobile User 97% of total population (48 million users) Digital Certificates 30% of total population (15 million certificates) Online banking Users Real time money transfer to any other banks is widely possible in Korea Bank-1 FINS (Financial Information Network System) Bank-2... Bank-n Securities & Others
5 I. e-banking in Korea 1. Internet banking in Korea (Number of Users) Internet banking users are 47 Million Mobile banking users are 5.7 Million 12 Million digital certificates issued U sers (M illion) M ar 0 5 ' Jun S ep D ec M ar 0 6 ' Jun S ep D ec M ar 0 7 ' Jun S ep D ec M ar 0 8 '
6 I. e-banking in Korea 1. Internet banking in Korea (Amount of Transfers) Daily transfers hit 21 Million (Number of Transfers) Daily transfers reach 22 Billion USD (Approx.) 25 Am ount of Daily Transfer (Bilion) Q 2Q 3Q 4Q 1Q
7 I. e-banking in Korea 2. Transaction portion for each channel CD/ATM s are the most popular channel Internet banking transactions (transfers) are increasing(24.4%) * Inquiry only in internet banking reaches 56.8% 50.0% 45.0% 40.0% 35.0% Percentage 30.0% 25.0% 20.0% 15.0% 10.0% 5.0% O ffline C D/ATM Tele banking Internet banking 0.0% M ar 06' Jun Sep Dec M ar 07' Jun S ep Dec M ar 08'
8 I. e-banking in Korea 3. Security programs in internet banking(1) Anti-Keylog / AntiVirus / Encryption should be provided
9 I. e-banking in Korea 3. Security programs in internet banking(2) Digital certificate
10 I. e-banking in Korea 3. Security programs in internet banking(3) Security Card (Random Number)
11 I. e-banking in Korea 3. Security programs in internet banking(4) OTP (One Time Password) : Valid only for 1 minute
12 I. e-banking in Korea 4. Related Law & Policy(1) Backgrounds of Electronic Financial Transaction Act - Absence of regulation on the electronic transactions - Need customer safeguards due to the increasing incident. Hard to prove the responsibility for the incident. Heavy responsibility to the customers - Rack of supervise to the companies dealing with electronic transactions which is not a financial company Supervise more electronic financial services More responsibility to the incidents Protect the Customers
13 I. e-banking in Korea 4. Related Law & Policy(2) Electronic Financial Transaction Act (Article 9) - Financial Institutions are basically responsible for transaction incidents except the user s intention and negligence - Financial Institutions must prove user s negligence Electronic Financial Transaction Act (Article 22) - Financial institutions should store related logs to trace and search the transaction within 5 years
14 I. e-banking in Korea 4. Related Law & Policy(3) Transaction limit for each security level (08 April) Security Level Level 1 Level 2 Security Measure OTP + Certificate HSM(Certificate) + Security Card Security Card + Certificate + 2 Channel Authentication Security Card + Certificate + SMS Notice Transfer Limit (USD, approximately) Each A Day 100, ,000 50, ,000 Level 3 Security Card + Certificate 10,000 50,000
15 I. e-banking in Korea 5. Strength of Collaboration Model Cost-effectiveness - Collaboration center prevents the duplicate investment - Massive use may lead to reduce the retail cost of OTP devices The benefit of the user s convenience - Only one OTP device can be used in many financial companies Security enhancement - Managed and operated by security professionals in OTP center - 2FA can provide stable and secure electronic financial service
16 II. Incident Cases 1. Pharming with Malware Malware distributed through portal site Unlatched PCs are infected, hosts file was modified for pharming Host site was storing 4,000 certificates No economical loss due to quick response
17 II. Incident Cases 2. Internet payment incident Internet payment system(v3d-secure) should check CVC code 111 Credit card number were used for 6 month Had about 100,000 USD loss in a institution that didn t check the CVC Password for the payment were guessed easily
18 II. Incident Cases 3. Card Duplication ATM owner installed a duplication reader in the ATM Passwords were recorded with hidden camera Stored card information was used to duplicate for fraudulent withdrawal
19 III. New threats 1. Memory Forgery Malware is also able to alter memory of IE allocation So that the hacker modifies account number which will be transferred But the HTML screen prompts that the transfer was successful [Memory] 0x : x a : x b : Account Number 34******972 will be changed to the hacker s account number 60******677 on clicking OK.
20 III. New threats 2. COM Hooking Almost every online software use ActiveX based on MS Windows COM(component object model) ActiveX is one of the technology that uses COM IUnKnown interface IUnKnown interface can be monitored so that the hacker can forge account information
21 III. New threats 3. Keyboard Logging Even though anti-keylog software protects many key loggers from logging the passwords New hacking technology bypasses security technology It is necessary to monitor the technology and trends to develop complementary security measures
22 IV. Countermeasures 1. Countermeasures Recommend kernel level end-to-end encryption to prevent COM hooking and Memory forgery User Bank Anti-Keylog PKI
23 IV. Countermeasures 2. Countermeasures Research and recommend security solutions such as - Two channel authentication - Secure keypad - Secure image (Captcha) - Virtualization
24 V. Smartphone Security Status and Major Issues 1. Kind of smartphone Apple - IPhone OS(OS X) Google Android Microsoft - Windows Mobile iphone OS(OS X) Android Windows Mobile
25 V. Smartphone Security Status and Major Issues 2. The proliferation of smartphones In the entire mobile phone market, smart phones are expected to increase by 40 percent in < 2009 The first quarter, Gartner Research >
26 V. Smartphone Security Status and Major Issues 3. Smartphone security threats Platform attack Attacks on smartphone OS and pl atform-specific vulnerabilities Viruses and malicious code Keyboard hacking SMS Hooking Processes and memory(dump) hacking Application attack Unlike viruses, attacks on applica tion Fishing Program Changes in data and executable files Reverse Engineering DoS and DDoS Storage attack Confidential information extraction att acks on internal/external memory and file system Access and extraction of Smartphone's int ernal storage Extracting the active and deleted confiden tial information
27 V. Smartphone Security Status and Major Issues 4. Smartphone Security Technology Platform threat response Anti-virus program Code signing for licensed software Apply encryption to protect data Detection and control of processes and memory access API Application threat response Apply Anti-Reversing technology Using verified encryption algorithm Storage threat response Apply encryption to prevent information leakage Remove confidential information(wiping)
28 V. Smartphone Security Status and Major Issues 5. Mobile Malware, by Platform Source: McAfee Labs, "McAfee Threats Report: First Quarter 2011"
29 V. Smartphone Security Status and Major Issues 6. Example of mobile malware 1 Android/DrdDream Family - To comprise a variety of legitimate games and apps that have been injected with malicious code Two root exploits - Exploit/Lvedu - Exploit/DiutesEx They were initially used by users trying to gain legitimate root access to their own devices(rooting) For mobile devices - Malware has required user interaction at present - Mobile exploits will allow automatic malware installation in the future
30 V. Smartphone Security Status and Major Issues 7. Example of mobile malware 2 Android/Drad Family - To be made up of maliciously modified applications This family sends device information to an attacker-controlled site - Android/Drad listens for commands from the attacker - The malware can also download additional software, though it stops short of being a full-fledged mobile botnet
31 V. Smartphone Security Status and Major Issues 8. Total Mobile Malware Samples Source: McAfee Labs, "McAfee Threats Report: First Quarter 2011"
32 V. Smartphone Security Status and Major Issues 9. Mobile Malware Growth by Quarter Increased by 46%(Q ~ Q3 2010) Source: McAfee Labs, "McAfee Threats Report: Fourth Quarter 2010"
33 VI. Conclusion There s no perfect security Consistent efforts to cover the weakness are necessary Emphasis user the importance of security Financial institutions should do their best to care its customer safe Lead PC users to install security patches automatically - 50~60% are patched - Produce Flash animations, Patch site for financial customers
34 Reference 성재모8 "Environmental change and security of electronic financial services, technology trends", FSA, 2010, "Efforts to Secure Electronic Financial Transactions in Korea", 20th FIRST Annual Conference, FSA,
35
Current counter-measures and responses by CERTs
Current counter-measures and responses by CERTs Jeong, Hyun Cheol [email protected] April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security March 14, 2013 About: Daniel Security researcher for almost a decade
Studying Security Weaknesses of Android System
, pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced
An Innovative Two Factor Authentication Method: The QRLogin System
An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,
If you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
The Mobile Malware Problem
The Mobile Malware Problem Eddy Willems Security Evangelist G Data Security Labs Director Security Industry Relationships - EICAR [email protected] Introduction Security Evangelist at G Data: Privately
Keystroke Encryption Technology Explained
Keystroke Encryption Technology Explained Updated February 9, 2008 [email protected] (800) 650-3670 www.bluegemsecurity.com Executive Summary BlueGem Security is introducing keystroke encryption
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank
Fraud Detection and Prevention Timothy P. Minahan Vice President Government Banking TD Bank Prevention vs. Detection Prevention controls are designed to keep fraud from occurring Detection controls are
Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee
Web 2.0 and Data Protection Paul Tsang Security Consultant McAfee Criminal Motivators For Profit Targeted Attacks Cyber Warfare (Credit Cards, PII, Criminal Infrastructure) (Nation-State Secrets, Trade
Online Cash Management Security: Beyond the User Login
Online Cash Management Security: Beyond the User Login Sonya Crites, CTP, SunTrust Anita Stevenson-Patterson, CTP, Manheim February 28, 2008 Agenda Industry Trends Government Regulations Payment Fraud
Information Security Threat Trends
Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: [email protected] 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing
INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!
INFOCOMM SEC RITY is INCOMPLETE WITHOUT Be aware, responsible secure! U HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD FASTEN UP!
Threat Events: Software Attacks (cont.)
ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
Hard vs. Soft Tokens Making the Right Choice for Security
Hard vs. Soft Tokens Making the Right Choice for Security HSTE-NB0012-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com
Practical Attacks against Mobile Device Management Solutions
Practical Attacks against Mobile Device Management Solutions Michael Shaulov, CEO [email protected] Daniel Brodie, Sr Security Researcher [email protected] About: Daniel Security researcher for nearly
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
Protect Yourself in the Cloud Age
Protect Yourself in the Cloud Age Matthew Wu Consultant Hong Kong Computer Emergency Response Team Coordination Centre About HKCERT HKCERT ( 香 港 電 腦 保 安 事 故 協 調 中 心 ) Established in 2001 Funding & Operation
Security Evaluation CLX.Sentinel
Security Evaluation CLX.Sentinel October 15th, 2009 Walter Sprenger [email protected] Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel.+41 55-214 41 60 Fax+41 55-214 41
10 best practice suggestions for common smartphone threats
10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
EC Council Certified Ethical Hacker V8
Course Code: ECCEH8 Vendor: Cyber Course Overview Duration: 5 RRP: 2,445 EC Council Certified Ethical Hacker V8 Overview This class will immerse the delegates into an interactive environment where they
Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer
Advanced Online Threat Protection: Defending Your Online Banking Customers Against Modern Malware and Fraud Andrew Bagnato Senior Systems Engineer Agenda Modern malware a targets Account credentials Financial
CEH Version8 Course Outline
CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information
Spam in Q1 2014. Contents. Fake notifications from mobile applications. Darya Gudkova
Spam in Q1 2014 Darya Gudkova Contents Fake notifications from mobile applications... 1 Hot topics in spam: the Olympic games... 5 Spammer tricks: creating background noise with HTML tags... 6 Statistics...
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
Cyber Security. Maintaining Your Identity on the Net
Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD
Online Banking : Benefits and Related Issues. (By : Anju Dagar, Assistant professor, Ad- hoc, Delhi University)
Online Banking : Benefits and Related Issues (By : Anju Dagar, Assistant professor, Ad- hoc, Delhi University) Abstract The World Wide Web has permeated virtually every aspect of modern life. If you have
IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA
IT TRENDS AND FUTURE CONSIDERATIONS Paul Rainbow CPA, CISA, CIA, CISSP, CTGA AGENDA BYOD Cloud Computing PCI Fraud Internet Banking Questions The Mobile Explosion Mobile traffic data in 2011 was nearly
Bitrix Software Security. Powerful content management with advanced security features
Bitrix Software Security Powerful content management with advanced security features Internet Security 2009 Quick Facts* 210,000 websites are attacked every month on the Internet $234,244 is your approx.
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Feature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to
It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions
It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud
AARP can help you Spot & Report Fraud Fraud Fighter Call Center: Talk to a volunteer trained in how to spot and report fraud. Call the Fraud Fighter Call Center at (877) 908-3360 Fraud Watch Campaign What
SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE
SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE Michael CLICK TO Albek EDIT MASTER - SecureDevice SUBTITLE STYLE 2011 Driven by changing trends and increasing globalization, the needs of
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices
Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices Daniel V. Hoffman, CISSP, CEH, CHFI Chief Technology Officer Page 1 Global Threat Center Exploit Research and Development
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013
Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Bootstrapping Secure Channels of Communication Over Public Networks
Bootstrapping Secure Channels of Communication Over Public Networks Human Interaction Security Protocols (HISPs) offer an entirely new way of authenticating teams to create robust security where none exists.
Whitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
How-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more
The dramatic growth in mobile device malware continues to escalate at an ever-accelerating pace. These threats continue to become more sophisticated while the barrier to entry remains low. As specific
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected]
Cyber Security & Role of CERT-In Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected] Web Evolution Web Sites (WWW) 1993 Web Invented and implemented 130 Nos. web sites 1994 2738 Nos.
Online Banking Risks efraud: Hands off my Account!
Online Banking Risks efraud: Hands off my Account! 1 Assault on Authentication Online Banking Fraud Significant increase in account compromises via online banking systems Business accounts are primary
Implementing two-factor authentication: Google s experiences. Cem Paya ([email protected]) Information Security Team Google Inc.
Implementing two-factor authentication: Google s experiences Cem Paya ([email protected]) Information Security Team Google Inc. Google services and personalization Identity management at Google 1. Internal
GlobalSign Malware Monitoring
GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
G Data Mobile MalwareReport. Half-Year Report July December 2013. G Data SecurityLabs
G Data Mobile MalwareReport Half-Year Report July December 2013 G Data SecurityLabs Contents At a glance... 2 Android malware: share of PUPs increasing significantly... 3 Android.Application consists of
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM [email protected]
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM [email protected] Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Prevent Malware attacks with F5 WebSafe and MobileSafe. Alfredo Vistola Security Solution Architect, EMEA
Prevent Malware attacks with F5 WebSafe and MobileSafe Alfredo Vistola Security Solution Architect, EMEA Malware Threat Landscape Growth and Targets % 25 Of real-world malware is caught by anti-virus Malware
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
Secure USB Flash Drive. Biometric & Professional Drives
Secure USB Flash Drive Biometric & Professional Drives I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE FLASH DRIVE... 3 DESCRIPTION... 3 IV. MODULES OF SECURE
Student Tech Security Training. ITS Security Office
Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with
93% of large organisations and 76% of small businesses
innersecurity INFORMATION SECURITY Information Security Services 93% of large organisations and 76% of small businesses suffered security breaches in the last year. * Cyber attackers were the main cause.
Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security
Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security The IT Security Office (ITSO) What We Do? Risk Assessment Network and System Security Monitoring Vulnerability Scanning
Real World and Vulnerability Protection, Performance and Remediation Report
Real World and Vulnerability Protection, Performance and Remediation Report A test commissioned by Symantec Corporation and performed by AV-Test GmbH Date of the report: September 17 th, 2014, last update:
Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
Botnets: The Advanced Malware Threat in Kenya's Cyberspace
Botnets: The Advanced Malware Threat in Kenya's Cyberspace AfricaHackon 28 th February 2014 Who we Are! Paula Musuva-Kigen Research Associate Director, Centre for Informatics Research and Innovation (CIRI)
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals Ae Chan Kim 1, Won Hyung Park 2 and Dong Hoon Lee 3 1 Dept. of Financial Security, Graduate School of Information Security,
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director [email protected]
The Fundamental Failures of End-Point Security Stefan Frei Research Analyst Director [email protected] Agenda The Changing Threat Environment Malware Tools & Services Why Cybercriminals Need No 0-Days
Exactly the Same, but Different
Exactly the Same, but Different 1 Shayne Champion, CISSP, CISA, GSEC, ABCP Program Manager GO Cyber Security TVA v1.0 Agenda Define Mobile Device Security o o Similarities Differences Things you Should
Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012
Report on Consumer Behaviors and Perceptions of Mobile Security Presented by NQ Mobile & NCSA January 25, 2012 Methodology Online survey of 1,158 consumers. Participants had to own a smartphone. Respondents
