SlideShare uma empresa Scribd logo
1 de 23
Information Security in the
Starbucks Generation
Anthony Lauro
Anthony.Lauro@dfwwireless.org
Overview
• What is security?
• Who are the threats?
• Know thy enemy
• Know thyself
• Emerging threats
• Plan of defense
• Security Management
• Defense in depth
What Is “Security”?
• “Freedom from risk or danger”*
• The application of safeguards to
prevent loss
• A subjective measurement of
preparedness for risk
• A feeling of safety 
* The American Heritage Dictionary of the English Language.
What is Risk?
• A potential for loss or harm
• An exposure to a threat
• Risk is subjective
• Dependent on situation and
circumstances
What’s the big deal?
• Loss of company assets
• Loss of revenue/market
share
• Loss of intellectual property
• Loss of privacy
• Damage to reputation
Who is a threat?
• Hackers
• Vandals
• Espionage
• Insiders
• Everyone*
* This depends on how paranoid you are.
Know Thy Enemy
Knowing your Enemy
Not knowing who the enemy is can be a bad thing
• Vietnam
• “War on Drugs”
• Vezzini - from The Princess Bride
Know Thyself
• "Well, cyberterrorists may be difficult to capture in the act,
but from what I know about people who are highly skilled
with computers, they should be easy to beat up."
– Ernest Cey, Speechwriter
• "You mean some hacker could disrupt the computerized
billing and record-keeping of my local phone company,
costing them millions of dollars? That's awesome."
– Frank Moreland, Piano Teacher
• "This is not a tool we should take seriously, or our customers
should take seriously..."
– Edmund Muth, Microsoft, as reported by the New York Times,
referring to Back Orifice.
History of the Hack
1960: The Dawn of Hacking
1970: Phone Phreaks and Cap'n
Crunch
1980: Hacker Message Boards and
Groups
1983: Kids' Games
1984: Hacker 'Zines- Birth of the 2600
group
1986: Use a Computer, Go to Jail
1988: The Morris Worm
1989: The Germans and the KGB
1990: Operation Sundevil
1993: Why Buy a Car When You Can
Hack One?
1994: Hacking Tools R Us
1995: The Mitnick Takedown
1997: Hacking AOL
1998: The Cult of Hacking and the
Israeli Connection
1999: Software Security Goes
Mainstream
2000: Service Denied (DDOS)
2001: DNS Attacks
Hacking is not that hard to do!
• Openly displayed information
• Easily available tools
• Dumpster Diving
• Shoulder Surfing
Search online, see what you find
• Go to http://neworder.box.sk/ and search for your favorite
operating system or program. Chances are it’s already been
hacked.
• Find tools to secure your network and test your system for
vulnerabilities. http://packetstorm.dnsi.info
• Tools and info on security research. http://blacksun.box.sk/
• News and Info on wireless hacking and security. Tools to
audit wireless networks. Home of the DFW Wireless Users
Group.
http://www.dfwwireless.org
• Daily news, vulnerability listings, and advisories.
http://www.net-security.org/
Resources
Social Engineering
• Using social interaction to get information
• Plays upon people’s good intentions
• Extremely effective in many situations
• Common ploys
– The Dumb User
– The VIP
– The Lost Puppy
– The Prize
Social Engineering
• Attempt to manipulate or trick a person into
providing information or access
• Bypass network security by exploiting human
vulnerabilities
• Human-based
– Impersonation
– Third-person authorization
• Computer-based
– Popup windows
– Mail attachments
Wireless Networks
• Different technology, same threat
• Out of sight out of mind
• “Gee Wiz” technology
• Increases attack accessibility
• Unauthorized clients
• Misconfigurations
Consumer Wireless Products
Local Area NetworkLocal Area Network
TechnologyTechnology
802.11 (FHSS) 2.4 GHz802.11 (FHSS) 2.4 GHz
1 Mbps1 Mbps
Freq. Hopped Spread SpectrumFreq. Hopped Spread Spectrum
802.11 (DSSS) 2.4 GHz802.11 (DSSS) 2.4 GHz
1 or 2 Mbps1 or 2 Mbps
Direct Sequence Spread SpectrumDirect Sequence Spread Spectrum
HiperlanHiperlan
23.5 Mbps23.5 Mbps
High Performance Radio LANHigh Performance Radio LAN
P802.11b (DSSS) 2.4 GHzP802.11b (DSSS) 2.4 GHz
11 Mbps11 Mbps
Direct Sequence Spread SpectrumDirect Sequence Spread Spectrum
P802.11a 5 GHzP802.11a 5 GHz
InitialInitial
ShipmentsShipments
InitialInitial
ShipmentsShipments
FinalFinal
SpecificationSpecification
SpecificationsSpecifications
ApprovedApproved
Initial MobileInitial Mobile
ShipmentsShipments
19991999 20002000 20012001 20022002 20032003
Q1Q1 Q2Q2 Q3Q3 Q4Q4 Q1Q1 Q2Q2 Q3Q3 Q4Q4 Q1Q1 Q2Q2 Q3Q3 Q4Q4 Q1Q1 Q2Q2 Q3Q3 Q4Q4 Q1Q1 Q2Q2 Q3Q3 Q4Q4
54 Mbps54 Mbps
Direct Sequence Spread SpectrumDirect Sequence Spread Spectrum
!! WIRELESS GONE WILD !!
Wireless Access Points
Wireless Usage Statistics
• 35.8% of Access points are
running with default
configurations
• 65% of networks are NOT
using WEP
Basic Security Management
Defense in Depth
• Administrative Controls
• Physical Controls
• System Access
• File Access
• Authorization Tables
• Transmission Protocols
• Encryption
My crime is that of curiosity. My crime is
that of judging people by what they say and
think, not what they look like. My crime is
that of outsmarting you, something that you
will never forgive me for.
Mentor – Hackers Manefisto

Mais conteĂşdo relacionado

Mais procurados

Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivismBilal Ali
 
Ciberamenazas - ÂżA quĂŠ nos enfrentamos?
Ciberamenazas - ÂżA quĂŠ nos enfrentamos?Ciberamenazas - ÂżA quĂŠ nos enfrentamos?
Ciberamenazas - ÂżA quĂŠ nos enfrentamos?Antonio Sanz Alcober
 
Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015
Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015
Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015COIICV
 
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011Tyler Shields
 
Earthmouse: Mobile Guardian
Earthmouse: Mobile GuardianEarthmouse: Mobile Guardian
Earthmouse: Mobile Guardianearthmouse
 
Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Jorge Sebastiao
 
Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)Tanja Drca
 
Staying Safe Online for HR Professionals
Staying Safe Online for HR ProfessionalsStaying Safe Online for HR Professionals
Staying Safe Online for HR ProfessionalsBen Woelk, CISSP, CPTC
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinKingfin Enterprises Limited
 
Why Risk Management is Impossible
Why Risk Management is ImpossibleWhy Risk Management is Impossible
Why Risk Management is ImpossibleRichard Stiennon
 
Android vulnerability study
Android vulnerability studyAndroid vulnerability study
Android vulnerability studySri Harsha Pamu
 
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblinsDEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblinsFelipe Prado
 
Digital self defense
Digital self defenseDigital self defense
Digital self defenseHenrik Jacobsen
 
Catching imsi catchers
Catching imsi catchersCatching imsi catchers
Catching imsi catchersGeoffrey Vaughan
 
Web Site Security
Web Site SecurityWeb Site Security
Web Site SecurityNetStrategies
 
A Brief History of Cryptographic Failures
A Brief History of Cryptographic FailuresA Brief History of Cryptographic Failures
A Brief History of Cryptographic FailuresNothing Nowhere
 

Mais procurados (20)

Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Ciberamenazas - ÂżA quĂŠ nos enfrentamos?
Ciberamenazas - ÂżA quĂŠ nos enfrentamos?Ciberamenazas - ÂżA quĂŠ nos enfrentamos?
Ciberamenazas - ÂżA quĂŠ nos enfrentamos?
 
Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015
Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015
Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015
 
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011
 
Earthmouse: Mobile Guardian
Earthmouse: Mobile GuardianEarthmouse: Mobile Guardian
Earthmouse: Mobile Guardian
 
Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13
 
Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)
 
Staying Safe Online for HR Professionals
Staying Safe Online for HR ProfessionalsStaying Safe Online for HR Professionals
Staying Safe Online for HR Professionals
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
 
Why Risk Management is Impossible
Why Risk Management is ImpossibleWhy Risk Management is Impossible
Why Risk Management is Impossible
 
Android vulnerability study
Android vulnerability studyAndroid vulnerability study
Android vulnerability study
 
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblinsDEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
 
Hacking Question and Answer
Hacking Question and Answer Hacking Question and Answer
Hacking Question and Answer
 
Android
Android Android
Android
 
Digital self defense
Digital self defenseDigital self defense
Digital self defense
 
Catching imsi catchers
Catching imsi catchersCatching imsi catchers
Catching imsi catchers
 
Web Site Security
Web Site SecurityWeb Site Security
Web Site Security
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
A Brief History of Cryptographic Failures
A Brief History of Cryptographic FailuresA Brief History of Cryptographic Failures
A Brief History of Cryptographic Failures
 

Semelhante a Information security in the starbucks generation

Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_securityEr Mahendra Yadav
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and HackersFarwa Ansari
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial SectorLIFARS
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocentdanish3
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network securityAPNIC
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentationSuryansh Srivastava
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-RAKESH SHARMA
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking Irvin Costa
 
All about Hacking
All about HackingAll about Hacking
All about HackingMadhusudhan G
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical HackingRishab garg
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptxdhumaletiku
 
Computer safety
Computer safetyComputer safety
Computer safetyAnaamorales27
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?hackdemocracy
 

Semelhante a Information security in the starbucks generation (20)

hacking
hackinghacking
hacking
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
Hacking
HackingHacking
Hacking
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial Sector
 
Hacking
HackingHacking
Hacking
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocent
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?
 

Último

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Information security in the starbucks generation

  • 1. Information Security in the Starbucks Generation Anthony Lauro Anthony.Lauro@dfwwireless.org
  • 2. Overview • What is security? • Who are the threats? • Know thy enemy • Know thyself • Emerging threats • Plan of defense • Security Management • Defense in depth
  • 3. What Is “Security”? • “Freedom from risk or danger”* • The application of safeguards to prevent loss • A subjective measurement of preparedness for risk • A feeling of safety  * The American Heritage Dictionary of the English Language.
  • 4. What is Risk? • A potential for loss or harm • An exposure to a threat • Risk is subjective • Dependent on situation and circumstances
  • 5. What’s the big deal? • Loss of company assets • Loss of revenue/market share • Loss of intellectual property • Loss of privacy • Damage to reputation
  • 6. Who is a threat? • Hackers • Vandals • Espionage • Insiders • Everyone* * This depends on how paranoid you are.
  • 8. Knowing your Enemy Not knowing who the enemy is can be a bad thing • Vietnam • “War on Drugs” • Vezzini - from The Princess Bride
  • 9. Know Thyself • "Well, cyberterrorists may be difficult to capture in the act, but from what I know about people who are highly skilled with computers, they should be easy to beat up." – Ernest Cey, Speechwriter • "You mean some hacker could disrupt the computerized billing and record-keeping of my local phone company, costing them millions of dollars? That's awesome." – Frank Moreland, Piano Teacher • "This is not a tool we should take seriously, or our customers should take seriously..." – Edmund Muth, Microsoft, as reported by the New York Times, referring to Back Orifice.
  • 10. History of the Hack 1960: The Dawn of Hacking 1970: Phone Phreaks and Cap'n Crunch 1980: Hacker Message Boards and Groups 1983: Kids' Games 1984: Hacker 'Zines- Birth of the 2600 group 1986: Use a Computer, Go to Jail 1988: The Morris Worm 1989: The Germans and the KGB 1990: Operation Sundevil 1993: Why Buy a Car When You Can Hack One? 1994: Hacking Tools R Us 1995: The Mitnick Takedown 1997: Hacking AOL 1998: The Cult of Hacking and the Israeli Connection 1999: Software Security Goes Mainstream 2000: Service Denied (DDOS) 2001: DNS Attacks
  • 11. Hacking is not that hard to do! • Openly displayed information • Easily available tools • Dumpster Diving • Shoulder Surfing
  • 12. Search online, see what you find
  • 13. • Go to http://neworder.box.sk/ and search for your favorite operating system or program. Chances are it’s already been hacked. • Find tools to secure your network and test your system for vulnerabilities. http://packetstorm.dnsi.info • Tools and info on security research. http://blacksun.box.sk/ • News and Info on wireless hacking and security. Tools to audit wireless networks. Home of the DFW Wireless Users Group. http://www.dfwwireless.org • Daily news, vulnerability listings, and advisories. http://www.net-security.org/ Resources
  • 14. Social Engineering • Using social interaction to get information • Plays upon people’s good intentions • Extremely effective in many situations • Common ploys – The Dumb User – The VIP – The Lost Puppy – The Prize
  • 15. Social Engineering • Attempt to manipulate or trick a person into providing information or access • Bypass network security by exploiting human vulnerabilities • Human-based – Impersonation – Third-person authorization • Computer-based – Popup windows – Mail attachments
  • 16. Wireless Networks • Different technology, same threat • Out of sight out of mind • “Gee Wiz” technology • Increases attack accessibility • Unauthorized clients • Misconfigurations
  • 17. Consumer Wireless Products Local Area NetworkLocal Area Network TechnologyTechnology 802.11 (FHSS) 2.4 GHz802.11 (FHSS) 2.4 GHz 1 Mbps1 Mbps Freq. Hopped Spread SpectrumFreq. Hopped Spread Spectrum 802.11 (DSSS) 2.4 GHz802.11 (DSSS) 2.4 GHz 1 or 2 Mbps1 or 2 Mbps Direct Sequence Spread SpectrumDirect Sequence Spread Spectrum HiperlanHiperlan 23.5 Mbps23.5 Mbps High Performance Radio LANHigh Performance Radio LAN P802.11b (DSSS) 2.4 GHzP802.11b (DSSS) 2.4 GHz 11 Mbps11 Mbps Direct Sequence Spread SpectrumDirect Sequence Spread Spectrum P802.11a 5 GHzP802.11a 5 GHz InitialInitial ShipmentsShipments InitialInitial ShipmentsShipments FinalFinal SpecificationSpecification SpecificationsSpecifications ApprovedApproved Initial MobileInitial Mobile ShipmentsShipments 19991999 20002000 20012001 20022002 20032003 Q1Q1 Q2Q2 Q3Q3 Q4Q4 Q1Q1 Q2Q2 Q3Q3 Q4Q4 Q1Q1 Q2Q2 Q3Q3 Q4Q4 Q1Q1 Q2Q2 Q3Q3 Q4Q4 Q1Q1 Q2Q2 Q3Q3 Q4Q4 54 Mbps54 Mbps Direct Sequence Spread SpectrumDirect Sequence Spread Spectrum
  • 18. !! WIRELESS GONE WILD !!
  • 20. Wireless Usage Statistics • 35.8% of Access points are running with default configurations • 65% of networks are NOT using WEP
  • 22. Defense in Depth • Administrative Controls • Physical Controls • System Access • File Access • Authorization Tables • Transmission Protocols • Encryption
  • 23. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. Mentor – Hackers Manefisto