SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
ID Theft

Security Meeting
Agenda
  1. ID Theft
     • Introduction
     • Types
     • Techniques
     • Causes
  2. Compliance
  3. Approach
     • Service
     • Features
     • IT Integration
  4. Q & A
11/05/2012              Security Meeting May 2012   2
ID Theft
  Definition (Wikipedia):

  Identity theft is a form of stealing someone's identity
  in which someone pretends to be someone else by
  assuming that person's identity, typically in order to
  access resources or obtain … other benefits in that
  person's name.

  AKA: Impersonating - meaning the person whose
  identity has been assumed by the identity thief.
11/05/2012             Security Meeting May 2012            3
Some Types
  •      Finantial
  •      Governamental
  •      Social Network
  •      Child
  •      Smart Phone




11/05/2012                Security Meeting May 2012   4
Some Techniques
  • Stealling
    o IT Equipment
    o Credit Cards
    o (…)
  • Impersonating
  • Brute force attack weak passwords
  • Explore security breaches (browser flaws,
    malware, spyware) to steal information from
    computer


11/05/2012         Security Meeting May 2012      5
Some Techniques (I)
  •      Hacking systems (servers, networks, databases,
         firewalls)
  •      Improper privileges to company's employees,
         resulting in unauthorized access to sensitive data
         from      these   privileged    users    (internal
         unauthorized access)
  •      (…)




11/05/2012                Security Meeting May 2012           6
Some Causes
  Organizations:
     • Don’t have an adequate security policy
     • Fail to preserve computer security
     • Fail to ensure network security (Firewall
        Management)
     • Fail do identify risks (Risk Management)
     • Relaxed access control policy
     • (…)



11/05/2012          Security Meeting May 2012      7
Risk Management




11/05/2012       Security Meeting May 2012   8
Compliance
  • Help protect business from risk
  • Increase IT Security
  • Used as benchmark to protect information
  • Automating compliance decrease audit time and
    stress
    o Keep configurations up- to-date (monitoring)
    o Detects undesirable changes
  • (…)



11/05/2012          Security Meeting May 2012        9
Compliance




11/05/2012       Security Meeting May 2012   10
Approach
  Traditional
     • Vendor solution
     • Go in, implement, customize & go out
     • Assistance & support
  Service
     • Configuration control
     • Compliance policy management
     • Change auditing
     • Real-time analysis of changes
     • Remediation, Reconciliation
     • Reporting
11/05/2012           Security Meeting May 2012   11
Approach




11/05/2012       Security Meeting May 2012   12
Approach
  Features
     • Provides compliance policies do manage user
        Ids
        o e.g. password strength and complexity
            checks
     • Proactive monitor IT security infrastructure
        (firewalls).




11/05/2012           Security Meeting May 2012        13
Approach




11/05/2012       Security Meeting May 2012   14
Approach
        • Continuous compliance
          o File integrity monitoring by detecting any
             change to a file or system setting.
          o Automating the repair of configurations
             that intentionally or accidentally fall from
             secure and compliant states
        • Generate an audit trail that logs the state of
          physical and virtual infrastructure, along with
          any actions taken to remediate out-of-
          compliance infrastructure.
11/05/2012               Security Meeting May 2012          15
Approach
  IT Infrastructure Integration
      • Supports a variety of IT Technology
      • OS with agent (HPUX, Solaris, RHEL, Windows)
      • Direct monitor Databases
         o Microsoft SQL Server
         o Oracle Database Server
         o Sybase Database Server
         o DB2 Database Server
         o (…)


11/05/2012           Security Meeting May 2012         16
Approach
        •    Direct monitor Directory Servers (Microsoft,
             Novell, Sun, Generic LDAP…)
        •    Network devices (Cisco, F5 BigIP, HP Procurve,
             Juniper, Nortel, …)
        •    Supports others devices not listed (Agent less
             mode - with ssh)




11/05/2012                 Security Meeting May 2012          17
How we do it




11/05/2012       Security Meeting May 2012   18
How we do it




11/05/2012       Security Meeting May 2012   19
Q&A


  Thank You!

  Luís Martins
   luis.martins@glintt.com

Mais conteúdo relacionado

Mais procurados

3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security EngineeringSam Bowne
 
2. Asset Security
2. Asset Security2. Asset Security
2. Asset SecuritySam Bowne
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security EngineeringSam Bowne
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesSam Bowne
 
CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)Sam Bowne
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Scott Carlson
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreSeclore
 
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...PECB
 
Norm Barber At-a-Glance 2015
Norm Barber At-a-Glance 2015Norm Barber At-a-Glance 2015
Norm Barber At-a-Glance 2015Norm Barber
 
Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security Seclore
 
Insider Threat Protection | Seclore
Insider Threat Protection | SecloreInsider Threat Protection | Seclore
Insider Threat Protection | SecloreSeclore
 
SPSTC18 Laying Down the Law - Governing Your Data in O365
SPSTC18  Laying Down the Law - Governing Your Data in O365SPSTC18  Laying Down the Law - Governing Your Data in O365
SPSTC18 Laying Down the Law - Governing Your Data in O365David Broussard
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsDan Michaluk
 

Mais procurados (18)

3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
Data security
Data securityData security
Data security
 
2. Asset Security
2. Asset Security2. Asset Security
2. Asset Security
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
 
CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
 
Bitcoin and IoT
Bitcoin and IoTBitcoin and IoT
Bitcoin and IoT
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | Seclore
 
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
 
Not IF, but WHEN
Not IF, but WHENNot IF, but WHEN
Not IF, but WHEN
 
Norm Barber At-a-Glance 2015
Norm Barber At-a-Glance 2015Norm Barber At-a-Glance 2015
Norm Barber At-a-Glance 2015
 
SHIP Brochure
SHIP BrochureSHIP Brochure
SHIP Brochure
 
Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security
 
Secure Islands Case Study - Financial Firm Implements Enhanced DLP
Secure Islands Case Study - Financial Firm Implements Enhanced DLPSecure Islands Case Study - Financial Firm Implements Enhanced DLP
Secure Islands Case Study - Financial Firm Implements Enhanced DLP
 
Insider Threat Protection | Seclore
Insider Threat Protection | SecloreInsider Threat Protection | Seclore
Insider Threat Protection | Seclore
 
SPSTC18 Laying Down the Law - Governing Your Data in O365
SPSTC18  Laying Down the Law - Governing Your Data in O365SPSTC18  Laying Down the Law - Governing Your Data in O365
SPSTC18 Laying Down the Law - Governing Your Data in O365
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 

Semelhante a Security meeting 2012 ID Theft

Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile SecuritySantosh Satam
 
IT Security Guest Lecture
IT Security Guest LectureIT Security Guest Lecture
IT Security Guest LectureMurthinty
 
Security Testing: Fuzzing
Security Testing: FuzzingSecurity Testing: Fuzzing
Security Testing: FuzzingAndrei Rubaniuk
 
Information Assurance And Security - Chapter 2 - Lesson 4
Information Assurance And Security - Chapter 2 - Lesson 4Information Assurance And Security - Chapter 2 - Lesson 4
Information Assurance And Security - Chapter 2 - Lesson 4MLG College of Learning, Inc
 
Building a Mobile Security Program
Building a Mobile Security ProgramBuilding a Mobile Security Program
Building a Mobile Security ProgramDenim Group
 
Computer Fraud - Eric Vanderburg - China Resource Network Conference
Computer Fraud - Eric Vanderburg - China Resource Network ConferenceComputer Fraud - Eric Vanderburg - China Resource Network Conference
Computer Fraud - Eric Vanderburg - China Resource Network ConferenceEric Vanderburg
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesNetIQ
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteEdgar Alejandro Villegas
 
Sensitive Data Exposure
Sensitive Data ExposureSensitive Data Exposure
Sensitive Data Exposureabodiford
 
Large Scale Search, Discovery and Analytics in Action
Large Scale Search, Discovery and Analytics in ActionLarge Scale Search, Discovery and Analytics in Action
Large Scale Search, Discovery and Analytics in ActionGrant Ingersoll
 
Building a Security Operations Center
Building a Security Operations CenterBuilding a Security Operations Center
Building a Security Operations CenterLymanAlphaBlob
 
Building+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.pptBuilding+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.pptAzim191210
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013 Troy C. Fulton
 
Mobile Threats and Owasp Top 10 Risks
Mobile Threats  and Owasp Top 10 RisksMobile Threats  and Owasp Top 10 Risks
Mobile Threats and Owasp Top 10 RisksSantosh Satam
 
Top 10 Things Logs Can Do for You, Today
Top 10 Things Logs Can Do for You, TodayTop 10 Things Logs Can Do for You, Today
Top 10 Things Logs Can Do for You, TodaySolarWinds
 

Semelhante a Security meeting 2012 ID Theft (20)

Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
IT Security Guest Lecture
IT Security Guest LectureIT Security Guest Lecture
IT Security Guest Lecture
 
Security Testing: Fuzzing
Security Testing: FuzzingSecurity Testing: Fuzzing
Security Testing: Fuzzing
 
Information Assurance And Security - Chapter 2 - Lesson 4
Information Assurance And Security - Chapter 2 - Lesson 4Information Assurance And Security - Chapter 2 - Lesson 4
Information Assurance And Security - Chapter 2 - Lesson 4
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 
Building a Mobile Security Program
Building a Mobile Security ProgramBuilding a Mobile Security Program
Building a Mobile Security Program
 
Computer Fraud - Eric Vanderburg - China Resource Network Conference
Computer Fraud - Eric Vanderburg - China Resource Network ConferenceComputer Fraud - Eric Vanderburg - China Resource Network Conference
Computer Fraud - Eric Vanderburg - China Resource Network Conference
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
 
Sensitive Data Exposure
Sensitive Data ExposureSensitive Data Exposure
Sensitive Data Exposure
 
Large Scale Search, Discovery and Analytics in Action
Large Scale Search, Discovery and Analytics in ActionLarge Scale Search, Discovery and Analytics in Action
Large Scale Search, Discovery and Analytics in Action
 
Building+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.pptBuilding+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.ppt
 
Building a Security Operations Center
Building a Security Operations CenterBuilding a Security Operations Center
Building a Security Operations Center
 
Building+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.pptBuilding+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.ppt
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
 
Mobile Threats and Owasp Top 10 Risks
Mobile Threats  and Owasp Top 10 RisksMobile Threats  and Owasp Top 10 Risks
Mobile Threats and Owasp Top 10 Risks
 
Top 10 Things Logs Can Do for You, Today
Top 10 Things Logs Can Do for You, TodayTop 10 Things Logs Can Do for You, Today
Top 10 Things Logs Can Do for You, Today
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 

Último

Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 

Último (20)

Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 

Security meeting 2012 ID Theft

  • 2. Agenda 1. ID Theft • Introduction • Types • Techniques • Causes 2. Compliance 3. Approach • Service • Features • IT Integration 4. Q & A 11/05/2012 Security Meeting May 2012 2
  • 3. ID Theft Definition (Wikipedia): Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain … other benefits in that person's name. AKA: Impersonating - meaning the person whose identity has been assumed by the identity thief. 11/05/2012 Security Meeting May 2012 3
  • 4. Some Types • Finantial • Governamental • Social Network • Child • Smart Phone 11/05/2012 Security Meeting May 2012 4
  • 5. Some Techniques • Stealling o IT Equipment o Credit Cards o (…) • Impersonating • Brute force attack weak passwords • Explore security breaches (browser flaws, malware, spyware) to steal information from computer 11/05/2012 Security Meeting May 2012 5
  • 6. Some Techniques (I) • Hacking systems (servers, networks, databases, firewalls) • Improper privileges to company's employees, resulting in unauthorized access to sensitive data from these privileged users (internal unauthorized access) • (…) 11/05/2012 Security Meeting May 2012 6
  • 7. Some Causes Organizations: • Don’t have an adequate security policy • Fail to preserve computer security • Fail to ensure network security (Firewall Management) • Fail do identify risks (Risk Management) • Relaxed access control policy • (…) 11/05/2012 Security Meeting May 2012 7
  • 8. Risk Management 11/05/2012 Security Meeting May 2012 8
  • 9. Compliance • Help protect business from risk • Increase IT Security • Used as benchmark to protect information • Automating compliance decrease audit time and stress o Keep configurations up- to-date (monitoring) o Detects undesirable changes • (…) 11/05/2012 Security Meeting May 2012 9
  • 10. Compliance 11/05/2012 Security Meeting May 2012 10
  • 11. Approach Traditional • Vendor solution • Go in, implement, customize & go out • Assistance & support Service • Configuration control • Compliance policy management • Change auditing • Real-time analysis of changes • Remediation, Reconciliation • Reporting 11/05/2012 Security Meeting May 2012 11
  • 12. Approach 11/05/2012 Security Meeting May 2012 12
  • 13. Approach Features • Provides compliance policies do manage user Ids o e.g. password strength and complexity checks • Proactive monitor IT security infrastructure (firewalls). 11/05/2012 Security Meeting May 2012 13
  • 14. Approach 11/05/2012 Security Meeting May 2012 14
  • 15. Approach • Continuous compliance o File integrity monitoring by detecting any change to a file or system setting. o Automating the repair of configurations that intentionally or accidentally fall from secure and compliant states • Generate an audit trail that logs the state of physical and virtual infrastructure, along with any actions taken to remediate out-of- compliance infrastructure. 11/05/2012 Security Meeting May 2012 15
  • 16. Approach IT Infrastructure Integration • Supports a variety of IT Technology • OS with agent (HPUX, Solaris, RHEL, Windows) • Direct monitor Databases o Microsoft SQL Server o Oracle Database Server o Sybase Database Server o DB2 Database Server o (…) 11/05/2012 Security Meeting May 2012 16
  • 17. Approach • Direct monitor Directory Servers (Microsoft, Novell, Sun, Generic LDAP…) • Network devices (Cisco, F5 BigIP, HP Procurve, Juniper, Nortel, …) • Supports others devices not listed (Agent less mode - with ssh) 11/05/2012 Security Meeting May 2012 17
  • 18. How we do it 11/05/2012 Security Meeting May 2012 18
  • 19. How we do it 11/05/2012 Security Meeting May 2012 19
  • 20. Q&A Thank You! Luís Martins luis.martins@glintt.com