SlideShare uma empresa Scribd logo
1 de 25
Алекс Бреннен
Криптография, защита данных и
безопасность для стартапов в «пост-
сноуденовской» эпохе
Консультант
About Me...
* Cypherpunk (1990's Definition)
* Consultant (ProtonMail, various others...)
* MIT SysAdmin (10+ years)
* Last Time I Gave A Talk About Computer Security I Was Not Invited Back
Watching MIT presentations taught me: When presenting... don't get too technical.
Instead, massively challenge everyones' thinking (you'll energize and motivate
them).
• Views and opinions presented during this presentation are my own and do not reflect my current or previous employer's
• (in fact they may conflict with them)
A Russian Painting
Countess Mordvinov's Forest (1891) by Ivan Shishkin
What Snowden (And Others) Revealed
* Unencrypted Communications Are Intercepted
* Cryptographic Standards And Systems Have Been Subverted
* Uncompromised Cryptographic Systems Are Attacked Directly (SIM Attack)
* Systems and Networks Are Attacked Directly
* US Government Works Closely With Vendors
* Data Is Collected And Warehoused Indefinitely On Everyone
* Large Cache of Hacking Tools And Vulnerabilities
Snowden Showed How Bad Things Are
* US Government Has Made “Cyber” Capability a Priority
* Subverting Open Standards (Cryptography/Protocols/Etc)
* Purchasing Vulnerabilities and Perhaps Creating/Introducing Them
* Large USD (Billions) Budget For Offensive Research
* Evidence of Use of CyberAttacks in International Disputes
* A Untargeted Drag Net (Fear of Missing the Next Big One)
* Primary Source of US Intelligence is Now “Cyber” Capabilities
* NSA Growth Unparalleled In Last Decade
* “Golden Age Of Intellegence” - GEN Michael Hayden, Frm. Dir. NSA
* Widespread Adoption of Cell Phones and Social Media by People
* Global Corporate Pivot to “Big Data”
NSA/State Actor Capabilities vs Other Hackers
Due to Legal Support and Massive Budget NSA/State Actors Will Always Be in Own
Class
Unmatched Primary Capabilities
* Telecommunications Intercepts
* Telecommunication Injections
* Cryptographic Infrastructure Subversion
Hacking/Compromise
* Traditional Methods (Buffer Overflows, etc)
* Algorithm/Cryptographic System Compromise (SSH/DH - POISONNUT)
* Tools and Techniques are Leaking!
But, We've Been Getting Better Right?
Virtualization/Compartmentalization
* Virtualized Dynamic Memory Environments (Java, etc)
* Virtual Machines (Operating System Images)
* Containers (Sub-OS Application Images)
* VPNs/VLANs
Helpful, but...
* Systems Still Need To Talk To Each Other
* New Class of HyperVisor Attacks
Engineering Lesson: We Cannot Stop Them
We need to engineer our systems with the expectation that we cannot stop hackers
from penetrating them.
30 Years Ago: Buffer Overflows, Off-By-1, SQL Injection, etc.
20 Years Ago: Buffer Overflows, Off-By-1, SQL Injection, etc.
10 Years Ago: Buffer Overflows, Off-By-1, SQL Injection, etc.
Today: Buffer Overflows, Off-By-1, SQL Injection, etc.
Tomorrow: (More of the Same).
Engineering Lesson: No Really, We Cannot Stop Them
● Seriously, We Cannot Stop Them
● Almost No One Was Protected From HeartBleed
* Maybe there was one or two Active Firewalls?
* They got OpenBSD!
Patches Can Take A Long Time
Zeroday Bugs Can Exist For Years Before Discovery
* A Study Found Linux Kernel Bugs Take Average Of 857 Days After Discovery to Be
Fixed.
* The Same Study Found Windows Core OS Vulnerabilities Take 375 Days After
Discovery To Be Fixed.
Zerodays Can Exist For Years, or Even Decades, Before Discovery
* Linux Has Seen Exploitable Security Flaws Exists For As Long As 11 Years With Out
Detection and Correction
Patching Can Be Difficult Or Impossible For End Users
* Equifax (Apache Struts)
* Unmaintained OpenSource Software
Study By TrustWave (2012)
TrustWave 2012 OS Vulnerability Study
So What Should We Do?
* Encrypt Valuable Data
* Aggressively Limit Account Privilege
* Limit What You Store
* Eliminate Single Points of Security Failure
* Metrics, Metrics, Metrics
* Backups
Encrypt Valuable Data
Attackers Are Most Often After Data
* Identity Data/Financial Data (Equifax, etc)
* E-Mail/Text/Photo Leaks (Sony, Celebrities, etc.)
* Industrial Espionage (Big 5 Defense Contractors, Oracle, Akamai, Hedge Funds, etc.)
Companies Aren't Encrypting Yet
* Some Large Companies Are Just Now Starting To Do Encryption At Rest
* Encryption Can Be Hard (For Example: Password Storage)
Don't Let Your Compromise Be Your Customer's Compromise
* Be Able to Lose Your Systems With Out Losing Customer Data
Encryption Doesn't Have to Be Difficult! Use An OpenSource Toolkit.
Encryption Best Practices
OK System
* Data Encryption With Company Controlled Key (AES128/AES256/ECC)
* Encryption of All Data During Transit (TLS 1.2/TLS 1.3)
* One Way Hashing Of Unneeded Data (Blake2, etc)
Good System
* Data Encryption With Company Managed Customer Controlled Key
(openPGP/AES128/AES256/ECC)
* Encryption of All Data During Transit with PFS (TSL 1.2/TLS 1.3)
* One Way Hashing of Unneeded Data (Blake2, etc)
Great System
* Data Encryption With Customer Controlled Key (AES128/AES256/ECC)
* Encryption of All Data During Transit with PFS (TSL 1.2/TLS 1.3)
* One Way Hashing of Unneeded Data (Blake2, etc)
Aggressively Limit Account Privilege
SQL Dump - Most Common Way For Compromised Data To Circulate
Prevent SQL Dumps
* Have Granular Role Accounts (Authentication/Metadata/Customer Data)
Shell Accounts Are Always A Danger
* Avoid Using/Sharing Root Account (Create Role Accounts, Use sudo)
* Use Binary Programs When Possible (sudo to limit access)
Database Accounts And Application Accounts Should Also Be Limited
* The Principal of Least Privilege
* Limit Database Account Privilege To Minimum Necessary (Read Only)
* Even Internally In Your Own Applications
Limit What You Store And Collect
If You Do Not Have The Data, Hackers Will Not Come For It
Avoid Storing Personal Data When Ever Possible
* For Example: If Using SMS Verification, Store Salted Hash of Verified Phone Number (aka
“Selector”)
* Third Party Vendor For Credit Cards, Bank Account Details, etc.
Aggressively Expire Data After You No Longer Need It
* Liability Laws Will Probably Be Next For Ukraine (After Criminal)
When Storing Data Encrypt It
* Symmetric Encryption With Key Stored In Code (OK)
* Symmetric Encryption With Key Stored In Protected RAM/File/HSM (Better)
* PGP Public/Private Keypair With Private Key Air Gapped (Best)
Eliminate Single Points of Security Failure
No Single Compromised System or Piece of Software Should Compromise Your Entire
Infrastructure
Firewall and VPN Isolation is Important
Consider Security Carefully When Building or Deploying A DevOps System
Different Authentication Credentials (Passwords, Two Factor Code, etc) on Everything
Full Access Is Efficient. Efficiency Is Dangerous.
Monitoring and Metrics, Metrics, Metrics
The State of The Art in Monitoring is Active Kill Systems.
For Start-Ups Best Practice is Monitoring and Metrics
* Put Monitoring on Everything (OpenFlow, Log Analysis, Bandwidth, Account Activity)
* Use Statistics and Metrics to Catch Potential Problems
* Bandwidth Usage Abnormality – Possible Data Exfiltration
* Disk I/O Abnormality – Possible Ransomware Infection
* Unusual Traffic From Certain IPs – Botnet Activity
* Unusual Account Activity – Possible Employee Compromise
Monitoring Your Systems Is Critical To End Point Security.
Barrier For Proof Of Work
Cryptographic Systems Will Eventually Be Broken
Some Systems May Already Be Broken (Historically The Case)
The Idea is to Create a Barrier that Stops Hackers and Companies From Accessing Data
They Shouldn't. Not Necessarily State Actors.
DDoS Attacks
Attacks Have Become Large Enough To Knock Entire Countries Off Line For Extended
Periods
* Consider Upstream Fiber Capacity of Any Networking Infrastructure
* Infrastructure Is Changing (Architecture, Throttling, Traffic Analysis, etc)
Any Large Site Will Need To Deploy A BGP Based Traffic Scrubber
Think About API DDoS Possibilities When You Design API's, Communication Systems,
and Even Basic Systems Like Search
DDoS Attacks Are Frequently A Distraction From Another Attack
A Large DDoS Can Quickly Bankrupt Your Company.
Start-Up Revenue Models
There Are Workable Alternatives To AdRev!
Subscription Model
* Pay Monthly (Recurring Fee Covers Resource Usage. Example: ProtonMail)
The Utility Model
* Pay For Resource Usage (Storage, Network, CPU. Example: AWS)
Alt-AdRev Broadly Targeted/CPA (Cost Per Actions)
* This Worked For Early Internet and For Decades With TV and Radio
The Snowden revelations likely changed what is possible in terms of business
models.
Will They Work For Ukrainian Start-Ups?
Most Common Areas of Competition Are In Local Language Verticals
* Company X for Country Y or Language Z (Examples Yandex, VK)
Current Incentives Are Around Ease of Use And Cultural Fit
Consider Building Companies and Products That Offer Security and Privacy Incentives
* A Good Product With Good Enough Incentive May Break Out of Geography
* Local Laws May Be Used For Arbitrage
In Summary...
* End to End Encryption - If Possible
* But, At Least Client Side Encryption
* Decentralized/Ephemeral Keys and Primitives
* Data Retention As Risk Rather Than Reward
* Auto-expiration/Auto-wipe
Cultural Change is Already Happening!
Alex Brennen
vab@protonmail.ch
Thank you, for your attention!
(Спасибо за внимание!)

Mais conteúdo relacionado

Mais procurados

Understanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case StudyUnderstanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case Studysecurityxploded
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngVõ Thái Lâm
 
Palestra Filipi Pires - Ransomware – Existe proteção para isso?
Palestra Filipi Pires - Ransomware – Existe proteção para isso?Palestra Filipi Pires - Ransomware – Existe proteção para isso?
Palestra Filipi Pires - Ransomware – Existe proteção para isso?BHack Conference
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic conceptsKhoa Nguyen
 
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...AlienVault
 
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Andrew Morris
 
APT - Hunting 0Day Malware
APT - Hunting 0Day MalwareAPT - Hunting 0Day Malware
APT - Hunting 0Day MalwareMustafa Qasim
 
Defending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecurityDefending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecuritySophos Benelux
 
Breaking the cyber kill chain!
Breaking the cyber kill chain!Breaking the cyber kill chain!
Breaking the cyber kill chain!Nahidul Kibria
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry moreBHack Conference
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...HackIT Ukraine
 
Cybersecurity during real WAR [English version]
Cybersecurity during real WAR [English version]Cybersecurity during real WAR [English version]
Cybersecurity during real WAR [English version]Vladyslav Radetsky
 
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....Shah Sheikh
 
Why are you still getting CryptoLocker?
Why are you still getting CryptoLocker?Why are you still getting CryptoLocker?
Why are you still getting CryptoLocker?Aaron Lancaster
 
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
CSF18 - The Digital Threat of the Decade (Century) - Sasha KranjacCSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
CSF18 - The Digital Threat of the Decade (Century) - Sasha KranjacNCCOMMS
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomwareSophos Benelux
 
CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziNCCOMMS
 

Mais procurados (20)

Threat Hunting with Cyber Kill Chain
Threat Hunting with Cyber Kill ChainThreat Hunting with Cyber Kill Chain
Threat Hunting with Cyber Kill Chain
 
Understanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case StudyUnderstanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case Study
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
 
Palestra Filipi Pires - Ransomware – Existe proteção para isso?
Palestra Filipi Pires - Ransomware – Existe proteção para isso?Palestra Filipi Pires - Ransomware – Existe proteção para isso?
Palestra Filipi Pires - Ransomware – Existe proteção para isso?
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
 
Network Security
Network  SecurityNetwork  Security
Network Security
 
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
 
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
 
APT - Hunting 0Day Malware
APT - Hunting 0Day MalwareAPT - Hunting 0Day Malware
APT - Hunting 0Day Malware
 
Defending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecurityDefending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen Security
 
Breaking the cyber kill chain!
Breaking the cyber kill chain!Breaking the cyber kill chain!
Breaking the cyber kill chain!
 
WannaCry? No Thanks!
WannaCry? No Thanks!WannaCry? No Thanks!
WannaCry? No Thanks!
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry more
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
 
Cybersecurity during real WAR [English version]
Cybersecurity during real WAR [English version]Cybersecurity during real WAR [English version]
Cybersecurity during real WAR [English version]
 
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
 
Why are you still getting CryptoLocker?
Why are you still getting CryptoLocker?Why are you still getting CryptoLocker?
Why are you still getting CryptoLocker?
 
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
CSF18 - The Digital Threat of the Decade (Century) - Sasha KranjacCSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael Narezzi
 

Semelhante a "Cryptography, Data Protection, and Security For Start-Ups In The Post Snowden Era", Alex Brennen

The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatDuo Security
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024Michael Noel
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to InfrastructureJorge Orchilles
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...Michael Noel
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)Avansa Mid- en Zuidwest
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
 
Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesJavier González
 
Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Dinis Cruz
 
Chapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docxChapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docxmccormicknadine86
 
Crypto Hot Cases – One Year Backward
Crypto Hot Cases – One Year BackwardCrypto Hot Cases – One Year Backward
Crypto Hot Cases – One Year BackwardPositive Hack Days
 
Microcontroller mayhem - ECTF & USSS 2011
Microcontroller mayhem - ECTF & USSS 2011Microcontroller mayhem - ECTF & USSS 2011
Microcontroller mayhem - ECTF & USSS 2011warezjoe
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesJayanth Dwijesh H P
 
SGSB Webcast 3: Smart Grid IT Systems Security
SGSB Webcast 3: Smart Grid IT Systems SecuritySGSB Webcast 3: Smart Grid IT Systems Security
SGSB Webcast 3: Smart Grid IT Systems SecurityAndy Bochman
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...DefCamp
 

Semelhante a "Cryptography, Data Protection, and Security For Start-Ups In The Post Snowden Era", Alex Brennen (20)

The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
Iot Security
Iot SecurityIot Security
Iot Security
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to Infrastructure
 
Cyber Security in Power Systems
Cyber Security in Power SystemsCyber Security in Power Systems
Cyber Security in Power Systems
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal Devices
 
Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)
 
Chapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docxChapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docx
 
Crypto Hot Cases – One Year Backward
Crypto Hot Cases – One Year BackwardCrypto Hot Cases – One Year Backward
Crypto Hot Cases – One Year Backward
 
Microcontroller mayhem - ECTF & USSS 2011
Microcontroller mayhem - ECTF & USSS 2011Microcontroller mayhem - ECTF & USSS 2011
Microcontroller mayhem - ECTF & USSS 2011
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
 
SGSB Webcast 3: Smart Grid IT Systems Security
SGSB Webcast 3: Smart Grid IT Systems SecuritySGSB Webcast 3: Smart Grid IT Systems Security
SGSB Webcast 3: Smart Grid IT Systems Security
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
 

Mais de HackIT Ukraine

"CyberGuard — проект государственно-частного партнерства по созданию киберцен...
"CyberGuard — проект государственно-частного партнерства по созданию киберцен..."CyberGuard — проект государственно-частного партнерства по созданию киберцен...
"CyberGuard — проект государственно-частного партнерства по созданию киберцен...HackIT Ukraine
 
"В поисках уязвимостей мобильных приложений", Алексей Голубев
"В поисках уязвимостей мобильных приложений", Алексей Голубев"В поисках уязвимостей мобильных приложений", Алексей Голубев
"В поисках уязвимостей мобильных приложений", Алексей ГолубевHackIT Ukraine
 
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
"Безопасность и надежность ПО в техногенном мире", Владимир ОбризанHackIT Ukraine
 
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий КайдаловHackIT Ukraine
 
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
"Безопасные Биткоин-транзакции без специального оборудования", Алексей КаракуловHackIT Ukraine
 
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
"Growth hack в маркетинге и бизнесе", Максим МирошниченкоHackIT Ukraine
 
"Как ловят хакеров в Украине", Дмитрий Гадомский
"Как ловят хакеров в Украине", Дмитрий Гадомский"Как ловят хакеров в Украине", Дмитрий Гадомский
"Как ловят хакеров в Украине", Дмитрий ГадомскийHackIT Ukraine
 
"Security Requirements Engineering", Oleksii Baranovskyi
"Security Requirements Engineering", Oleksii Baranovskyi"Security Requirements Engineering", Oleksii Baranovskyi
"Security Requirements Engineering", Oleksii BaranovskyiHackIT Ukraine
 
"Наступну атаку можна попередити", Олександр Чубарук
"Наступну атаку можна попередити", Олександр Чубарук"Наступну атаку можна попередити", Олександр Чубарук
"Наступну атаку можна попередити", Олександр ЧубарукHackIT Ukraine
 
"How to make money with Hacken?", Dmytro Budorin
"How to make money with Hacken?", Dmytro Budorin"How to make money with Hacken?", Dmytro Budorin
"How to make money with Hacken?", Dmytro BudorinHackIT Ukraine
 
"Bypassing two factor authentication", Shahmeer Amir
"Bypassing two factor authentication", Shahmeer Amir"Bypassing two factor authentication", Shahmeer Amir
"Bypassing two factor authentication", Shahmeer AmirHackIT Ukraine
 
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ..."Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ...HackIT Ukraine
 
"Hack it. Found it. Sell it. How hackers can be successful in the business wo...
"Hack it. Found it. Sell it. How hackers can be successful in the business wo..."Hack it. Found it. Sell it. How hackers can be successful in the business wo...
"Hack it. Found it. Sell it. How hackers can be successful in the business wo...HackIT Ukraine
 
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim HegazyHackIT Ukraine
 
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...HackIT Ukraine
 
Владимир Махитко - Automotive security. New challenges
Владимир Махитко - Automotive security. New challengesВладимир Махитко - Automotive security. New challenges
Владимир Махитко - Automotive security. New challengesHackIT Ukraine
 
Алексей Старов - Как проводить киберраследования?
Алексей Старов - Как проводить киберраследования?Алексей Старов - Как проводить киберраследования?
Алексей Старов - Как проводить киберраследования?HackIT Ukraine
 
Лариса Матвеева - Хакеры и уголовная ответственность: как избежать негативных...
Лариса Матвеева - Хакеры и уголовная ответственность: как избежать негативных...Лариса Матвеева - Хакеры и уголовная ответственность: как избежать негативных...
Лариса Матвеева - Хакеры и уголовная ответственность: как избежать негативных...HackIT Ukraine
 
Andrew Dodson - Smart grids are stupid ideas
Andrew Dodson - Smart grids are stupid ideasAndrew Dodson - Smart grids are stupid ideas
Andrew Dodson - Smart grids are stupid ideasHackIT Ukraine
 
Вадим Ковкин - Безопасный коммуникатор: миф или реальность?
Вадим Ковкин - Безопасный коммуникатор: миф или реальность?Вадим Ковкин - Безопасный коммуникатор: миф или реальность?
Вадим Ковкин - Безопасный коммуникатор: миф или реальность?HackIT Ukraine
 

Mais de HackIT Ukraine (20)

"CyberGuard — проект государственно-частного партнерства по созданию киберцен...
"CyberGuard — проект государственно-частного партнерства по созданию киберцен..."CyberGuard — проект государственно-частного партнерства по созданию киберцен...
"CyberGuard — проект государственно-частного партнерства по созданию киберцен...
 
"В поисках уязвимостей мобильных приложений", Алексей Голубев
"В поисках уязвимостей мобильных приложений", Алексей Голубев"В поисках уязвимостей мобильных приложений", Алексей Голубев
"В поисках уязвимостей мобильных приложений", Алексей Голубев
 
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
 
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
 
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
 
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
 
"Как ловят хакеров в Украине", Дмитрий Гадомский
"Как ловят хакеров в Украине", Дмитрий Гадомский"Как ловят хакеров в Украине", Дмитрий Гадомский
"Как ловят хакеров в Украине", Дмитрий Гадомский
 
"Security Requirements Engineering", Oleksii Baranovskyi
"Security Requirements Engineering", Oleksii Baranovskyi"Security Requirements Engineering", Oleksii Baranovskyi
"Security Requirements Engineering", Oleksii Baranovskyi
 
"Наступну атаку можна попередити", Олександр Чубарук
"Наступну атаку можна попередити", Олександр Чубарук"Наступну атаку можна попередити", Олександр Чубарук
"Наступну атаку можна попередити", Олександр Чубарук
 
"How to make money with Hacken?", Dmytro Budorin
"How to make money with Hacken?", Dmytro Budorin"How to make money with Hacken?", Dmytro Budorin
"How to make money with Hacken?", Dmytro Budorin
 
"Bypassing two factor authentication", Shahmeer Amir
"Bypassing two factor authentication", Shahmeer Amir"Bypassing two factor authentication", Shahmeer Amir
"Bypassing two factor authentication", Shahmeer Amir
 
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ..."Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
 
"Hack it. Found it. Sell it. How hackers can be successful in the business wo...
"Hack it. Found it. Sell it. How hackers can be successful in the business wo..."Hack it. Found it. Sell it. How hackers can be successful in the business wo...
"Hack it. Found it. Sell it. How hackers can be successful in the business wo...
 
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
 
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...
 
Владимир Махитко - Automotive security. New challenges
Владимир Махитко - Automotive security. New challengesВладимир Махитко - Automotive security. New challenges
Владимир Махитко - Automotive security. New challenges
 
Алексей Старов - Как проводить киберраследования?
Алексей Старов - Как проводить киберраследования?Алексей Старов - Как проводить киберраследования?
Алексей Старов - Как проводить киберраследования?
 
Лариса Матвеева - Хакеры и уголовная ответственность: как избежать негативных...
Лариса Матвеева - Хакеры и уголовная ответственность: как избежать негативных...Лариса Матвеева - Хакеры и уголовная ответственность: как избежать негативных...
Лариса Матвеева - Хакеры и уголовная ответственность: как избежать негативных...
 
Andrew Dodson - Smart grids are stupid ideas
Andrew Dodson - Smart grids are stupid ideasAndrew Dodson - Smart grids are stupid ideas
Andrew Dodson - Smart grids are stupid ideas
 
Вадим Ковкин - Безопасный коммуникатор: миф или реальность?
Вадим Ковкин - Безопасный коммуникатор: миф или реальность?Вадим Ковкин - Безопасный коммуникатор: миф или реальность?
Вадим Ковкин - Безопасный коммуникатор: миф или реальность?
 

Último

VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 

Último (20)

VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 

"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowden Era", Alex Brennen

  • 1.
  • 2. Алекс Бреннен Криптография, защита данных и безопасность для стартапов в «пост- сноуденовской» эпохе Консультант
  • 3. About Me... * Cypherpunk (1990's Definition) * Consultant (ProtonMail, various others...) * MIT SysAdmin (10+ years) * Last Time I Gave A Talk About Computer Security I Was Not Invited Back Watching MIT presentations taught me: When presenting... don't get too technical. Instead, massively challenge everyones' thinking (you'll energize and motivate them). • Views and opinions presented during this presentation are my own and do not reflect my current or previous employer's • (in fact they may conflict with them)
  • 4. A Russian Painting Countess Mordvinov's Forest (1891) by Ivan Shishkin
  • 5. What Snowden (And Others) Revealed * Unencrypted Communications Are Intercepted * Cryptographic Standards And Systems Have Been Subverted * Uncompromised Cryptographic Systems Are Attacked Directly (SIM Attack) * Systems and Networks Are Attacked Directly * US Government Works Closely With Vendors * Data Is Collected And Warehoused Indefinitely On Everyone * Large Cache of Hacking Tools And Vulnerabilities
  • 6. Snowden Showed How Bad Things Are * US Government Has Made “Cyber” Capability a Priority * Subverting Open Standards (Cryptography/Protocols/Etc) * Purchasing Vulnerabilities and Perhaps Creating/Introducing Them * Large USD (Billions) Budget For Offensive Research * Evidence of Use of CyberAttacks in International Disputes * A Untargeted Drag Net (Fear of Missing the Next Big One) * Primary Source of US Intelligence is Now “Cyber” Capabilities * NSA Growth Unparalleled In Last Decade * “Golden Age Of Intellegence” - GEN Michael Hayden, Frm. Dir. NSA * Widespread Adoption of Cell Phones and Social Media by People * Global Corporate Pivot to “Big Data”
  • 7. NSA/State Actor Capabilities vs Other Hackers Due to Legal Support and Massive Budget NSA/State Actors Will Always Be in Own Class Unmatched Primary Capabilities * Telecommunications Intercepts * Telecommunication Injections * Cryptographic Infrastructure Subversion Hacking/Compromise * Traditional Methods (Buffer Overflows, etc) * Algorithm/Cryptographic System Compromise (SSH/DH - POISONNUT) * Tools and Techniques are Leaking!
  • 8. But, We've Been Getting Better Right? Virtualization/Compartmentalization * Virtualized Dynamic Memory Environments (Java, etc) * Virtual Machines (Operating System Images) * Containers (Sub-OS Application Images) * VPNs/VLANs Helpful, but... * Systems Still Need To Talk To Each Other * New Class of HyperVisor Attacks
  • 9. Engineering Lesson: We Cannot Stop Them We need to engineer our systems with the expectation that we cannot stop hackers from penetrating them. 30 Years Ago: Buffer Overflows, Off-By-1, SQL Injection, etc. 20 Years Ago: Buffer Overflows, Off-By-1, SQL Injection, etc. 10 Years Ago: Buffer Overflows, Off-By-1, SQL Injection, etc. Today: Buffer Overflows, Off-By-1, SQL Injection, etc. Tomorrow: (More of the Same).
  • 10. Engineering Lesson: No Really, We Cannot Stop Them ● Seriously, We Cannot Stop Them ● Almost No One Was Protected From HeartBleed * Maybe there was one or two Active Firewalls? * They got OpenBSD!
  • 11. Patches Can Take A Long Time Zeroday Bugs Can Exist For Years Before Discovery * A Study Found Linux Kernel Bugs Take Average Of 857 Days After Discovery to Be Fixed. * The Same Study Found Windows Core OS Vulnerabilities Take 375 Days After Discovery To Be Fixed. Zerodays Can Exist For Years, or Even Decades, Before Discovery * Linux Has Seen Exploitable Security Flaws Exists For As Long As 11 Years With Out Detection and Correction Patching Can Be Difficult Or Impossible For End Users * Equifax (Apache Struts) * Unmaintained OpenSource Software Study By TrustWave (2012)
  • 12. TrustWave 2012 OS Vulnerability Study
  • 13. So What Should We Do? * Encrypt Valuable Data * Aggressively Limit Account Privilege * Limit What You Store * Eliminate Single Points of Security Failure * Metrics, Metrics, Metrics * Backups
  • 14. Encrypt Valuable Data Attackers Are Most Often After Data * Identity Data/Financial Data (Equifax, etc) * E-Mail/Text/Photo Leaks (Sony, Celebrities, etc.) * Industrial Espionage (Big 5 Defense Contractors, Oracle, Akamai, Hedge Funds, etc.) Companies Aren't Encrypting Yet * Some Large Companies Are Just Now Starting To Do Encryption At Rest * Encryption Can Be Hard (For Example: Password Storage) Don't Let Your Compromise Be Your Customer's Compromise * Be Able to Lose Your Systems With Out Losing Customer Data Encryption Doesn't Have to Be Difficult! Use An OpenSource Toolkit.
  • 15. Encryption Best Practices OK System * Data Encryption With Company Controlled Key (AES128/AES256/ECC) * Encryption of All Data During Transit (TLS 1.2/TLS 1.3) * One Way Hashing Of Unneeded Data (Blake2, etc) Good System * Data Encryption With Company Managed Customer Controlled Key (openPGP/AES128/AES256/ECC) * Encryption of All Data During Transit with PFS (TSL 1.2/TLS 1.3) * One Way Hashing of Unneeded Data (Blake2, etc) Great System * Data Encryption With Customer Controlled Key (AES128/AES256/ECC) * Encryption of All Data During Transit with PFS (TSL 1.2/TLS 1.3) * One Way Hashing of Unneeded Data (Blake2, etc)
  • 16. Aggressively Limit Account Privilege SQL Dump - Most Common Way For Compromised Data To Circulate Prevent SQL Dumps * Have Granular Role Accounts (Authentication/Metadata/Customer Data) Shell Accounts Are Always A Danger * Avoid Using/Sharing Root Account (Create Role Accounts, Use sudo) * Use Binary Programs When Possible (sudo to limit access) Database Accounts And Application Accounts Should Also Be Limited * The Principal of Least Privilege * Limit Database Account Privilege To Minimum Necessary (Read Only) * Even Internally In Your Own Applications
  • 17. Limit What You Store And Collect If You Do Not Have The Data, Hackers Will Not Come For It Avoid Storing Personal Data When Ever Possible * For Example: If Using SMS Verification, Store Salted Hash of Verified Phone Number (aka “Selector”) * Third Party Vendor For Credit Cards, Bank Account Details, etc. Aggressively Expire Data After You No Longer Need It * Liability Laws Will Probably Be Next For Ukraine (After Criminal) When Storing Data Encrypt It * Symmetric Encryption With Key Stored In Code (OK) * Symmetric Encryption With Key Stored In Protected RAM/File/HSM (Better) * PGP Public/Private Keypair With Private Key Air Gapped (Best)
  • 18. Eliminate Single Points of Security Failure No Single Compromised System or Piece of Software Should Compromise Your Entire Infrastructure Firewall and VPN Isolation is Important Consider Security Carefully When Building or Deploying A DevOps System Different Authentication Credentials (Passwords, Two Factor Code, etc) on Everything Full Access Is Efficient. Efficiency Is Dangerous.
  • 19. Monitoring and Metrics, Metrics, Metrics The State of The Art in Monitoring is Active Kill Systems. For Start-Ups Best Practice is Monitoring and Metrics * Put Monitoring on Everything (OpenFlow, Log Analysis, Bandwidth, Account Activity) * Use Statistics and Metrics to Catch Potential Problems * Bandwidth Usage Abnormality – Possible Data Exfiltration * Disk I/O Abnormality – Possible Ransomware Infection * Unusual Traffic From Certain IPs – Botnet Activity * Unusual Account Activity – Possible Employee Compromise Monitoring Your Systems Is Critical To End Point Security.
  • 20. Barrier For Proof Of Work Cryptographic Systems Will Eventually Be Broken Some Systems May Already Be Broken (Historically The Case) The Idea is to Create a Barrier that Stops Hackers and Companies From Accessing Data They Shouldn't. Not Necessarily State Actors.
  • 21. DDoS Attacks Attacks Have Become Large Enough To Knock Entire Countries Off Line For Extended Periods * Consider Upstream Fiber Capacity of Any Networking Infrastructure * Infrastructure Is Changing (Architecture, Throttling, Traffic Analysis, etc) Any Large Site Will Need To Deploy A BGP Based Traffic Scrubber Think About API DDoS Possibilities When You Design API's, Communication Systems, and Even Basic Systems Like Search DDoS Attacks Are Frequently A Distraction From Another Attack A Large DDoS Can Quickly Bankrupt Your Company.
  • 22. Start-Up Revenue Models There Are Workable Alternatives To AdRev! Subscription Model * Pay Monthly (Recurring Fee Covers Resource Usage. Example: ProtonMail) The Utility Model * Pay For Resource Usage (Storage, Network, CPU. Example: AWS) Alt-AdRev Broadly Targeted/CPA (Cost Per Actions) * This Worked For Early Internet and For Decades With TV and Radio The Snowden revelations likely changed what is possible in terms of business models.
  • 23. Will They Work For Ukrainian Start-Ups? Most Common Areas of Competition Are In Local Language Verticals * Company X for Country Y or Language Z (Examples Yandex, VK) Current Incentives Are Around Ease of Use And Cultural Fit Consider Building Companies and Products That Offer Security and Privacy Incentives * A Good Product With Good Enough Incentive May Break Out of Geography * Local Laws May Be Used For Arbitrage
  • 24. In Summary... * End to End Encryption - If Possible * But, At Least Client Side Encryption * Decentralized/Ephemeral Keys and Primitives * Data Retention As Risk Rather Than Reward * Auto-expiration/Auto-wipe Cultural Change is Already Happening!
  • 25. Alex Brennen vab@protonmail.ch Thank you, for your attention! (Спасибо за внимание!)