security basics sponsored by 112 and sox (u.s.) – upped the ante on financial audits (and...
TRANSCRIPT
![Page 1: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/1.jpg)
#RSAC
Security Basics
1
Sponsored by:
Start Time Title Presenter
8:30 AM Introduction Hugh Thompson
8:45 AM Security Industry and Trends Hugh Thompson
9:30 AM Authentication Technologies Michael Poitner
10:15 AM Break
10:30 AM Governance, Risk and Compliance Dennis Moreau
11:15 AM Application Security Jason Brvenik
12:00 PM Lunch
1:15 PM Crypto 101/Encryption Basics, SSL & Certificates
Benjamin Jun
2:00 PM Firewalls and Perimeter Protection Dana Wolf
2:45 PM Break
3:00 PM Viruses, Malware and Threats Tas Giakouminakis
3:45 PM Mobile and Network Security Mike Janke
![Page 2: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/2.jpg)
SESSION ID:
Introduction and A Look at Security Trends
SEM-MO1
Hugh Thompson, Ph.D.Program Committee Chairman, RSA Conference
![Page 3: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/3.jpg)
#RSAC
Agenda
Intro to Information Security
Security Trends
Economics of Information Security
![Page 4: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/4.jpg)
#RSAC
The Shifting IT Environment(…or why security has become so important)
![Page 5: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/5.jpg)
#RSAC
Shift: Compliance and Consequences The business has to adhere to regulations, guidelines, standards,…
SAS 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems)
PCI DSS – requirements on companies that process payment cards
HIPAA, GLBA, BASEL II, …, many more
Audits are changing the economics of risk and create an “impending event”
Hackers may attack you but auditors will show up
Disclosure laws mean that the consequences of failure have increased Waves of disclosure legislation
![Page 6: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/6.jpg)
#RSAC
Shift: Technology
• System communication is fundamentally changing – many transaction occur over the web
• Network defenses are covering a shrinking portion of the attack surface
• Cloud is changing our notion of a perimeter• Worker mobility is redefining the IT landscape• Shadow IT is becoming enterprise IT• The security model has changed from good people vs. bad people to
enabling partial trust – There are more “levels” of access: Extranets, partner access, customer
access, identity management, …
![Page 7: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/7.jpg)
#RSAC
Shift: Attackers
Cyber criminals are becoming organized and profit-driven An entire underground economy exists to support cybercrime
Attackers are shifting their methods to exploit both technical and human weaknesses
Attackers after much more than traditional monetizable data (PII, etc.) Hacktivism
State-sponsored attacks
IP attacks/breaches
![Page 8: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/8.jpg)
#RSAC
Shift: Customer expectations
Customers, especially businesses, are using security as a discriminator
In many ways security has become a non-negotiable expectation of businesses
Banks, photocopiers, pens, etc. are being sold based on security…
Security being woven into service level agreements (SLAs)
![Page 9: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/9.jpg)
#RSAC
Big Questions
How do you communicate the value of security to the enterprise (and management)?
How do you measure security?
How do you rank risks?
How do you reconcile security and compliance?
How can you be proactive and not reactive?
What changes are likely in privacy laws, data sovereignty, trust?
What about big issues in the news like APT’s, hacktivism, leaks, DDoSattacks, …? How should/can we adapt what we do based on them?
![Page 10: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/10.jpg)
#RSAC
The Economics of Security
![Page 11: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/11.jpg)
#RSAC
Hackernomics (noun)
A social science concerned chiefly with description and analysis of attacker
motivations, economics, and business risk. Characterized by
5 fundamental immutable laws and 4 corollaries
![Page 12: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/12.jpg)
#RSAC
Law 1Most attackers aren’t evil or insane; they just
want somethingCorollary 1.a.:
We don’t have the budget to protect against evil people but we can protect against people that will look for weaker targets
![Page 13: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/13.jpg)
#RSAC
Law 2Security isn’t about security. It’s about
mitigating risk at some cost.Corollary 2.a.:
In the absence of metrics, we tend to over focus on risks that are either familiar or recent.
![Page 14: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/14.jpg)
#RSAC
Law 3Most costly breaches come from simple
failures, not from attacker ingenuityCorollary 3.a.:
Bad guys can, however, be VERY creative if properly incentivized.
![Page 15: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/15.jpg)
#RSAC
The CAPTCHA Dilemma
Completely
Automated
Public
Turing test to tell
Computers and
Humans
Apart
![Page 16: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/16.jpg)
#RSAC
Law 4In the absence of security education or experience, people (employees, users,
customers, …) naturally make poor security decisions with technology
Corollary 4.a.:Systems needs to be easy to use securely and difficult to use insecurely
![Page 17: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/17.jpg)
#RSAC
Law 5
Attackers usually don’t get in by cracking some impenetrable security control, they look for
weak points like trusting employees
![Page 18: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/18.jpg)
#RSAC
A Visual Journey of Security Trends
![Page 19: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/19.jpg)
2008
![Page 20: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/20.jpg)
2009
![Page 21: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/21.jpg)
2010
![Page 22: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/22.jpg)
2011
![Page 23: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/23.jpg)
2012
![Page 24: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/24.jpg)
2013
![Page 25: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/25.jpg)
2014
![Page 26: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/26.jpg)
#RSAC
Enjoy the rest of the conference!!
![Page 27: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/27.jpg)
#RSAC
Security Basics
27
Sponsored by:
Start Time Title Presenter
8:30 AM Introduction Hugh Thompson
8:45 AM Security Industry and Trends Hugh Thompson
9:30 AM Authentication Technologies Michael Poitner
10:15 AM Break
10:30 AM Governance, Risk and Compliance Dennis Moreau
11:15 AM Application Security Jason Brvenik
12:00 PM Lunch
1:15 PM Crypto 101/Encryption Basics, SSL & Certificates
Benjamin Jun
2:00 PM Firewalls and Perimeter Protection Dana Wolf
2:45 PM Break
3:00 PM Viruses, Malware and Threats Tas Giakouminakis
3:45 PM Mobile and Network Security Mike Janke
![Page 28: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/28.jpg)
SESSION ID:
Authentication – Current state and future
SEM-M01
Michael PoitnerGlobal Segment Marketing Director
NXP Semiconductors
![Page 29: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/29.jpg)
#RSAC
Table of Contents
Introduction to Authentication
Beloved passwords
Overview Authentication Methods
User vs. Device Authentication
FIDO Alliance
Overview NXP Semiconductors
29
![Page 30: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/30.jpg)
#RSAC
Passwords are obsolete
30
![Page 31: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/31.jpg)
#RSAC
BruteForce++ is getting scary
31
8 digits (NTLM) takes now 5.5h(348B NTLM hashes per second)
14 digits (LM) takes 6min
Dictionaries (110M+ entries)
L1nk3d1n or xxxxxxx12 does not cut it anymore
Rain bow tables, Amazon EC2
John the ripper and Hashcat (GPU)
Server side (Hash, salt, bcrypt, HSM)
![Page 32: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/32.jpg)
#RSAC
Other ways to authenticate
32
Geolocation
Knowledge based
Client side certificates
Grid cards
Out of band
One time password systems
PKI based systems
Virtual keyboards
Key stroke biometrics
Graphical password systems
Password managers
Voice, facial,…
Federated systems
SQRL-Secure, Quick, Reliable Login
3456789
![Page 33: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/33.jpg)
#RSAC
Overview 2 Factor Methods
33
![Page 34: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/34.jpg)
#RSAC
User vs. Device Authentication
34
![Page 35: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/35.jpg)
#RSAC
Client Authentication Protocol
35
![Page 36: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/36.jpg)
#RSAC
Mutual Authentication Protocol and Key Exchange
36
![Page 37: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/37.jpg)
#RSAC
FIDO Alliance has reached critical mass
37
![Page 38: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/38.jpg)
#RSAC
FIDO is promoting two authentication protocols
38
![Page 39: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/39.jpg)
#RSAC
FIDO System Architecture
39
![Page 40: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/40.jpg)
#RSAC
Useful stuff (own opinion)
40
Still use a good Pa$$phr@se#1
Use Open Source (Linux, FF, GPG, Tor, BM, Tails/Qubes, Mumble,…)
Add-ons: NoScript, WOT, HTTPS Everywhere, …
Leave your cell phone on and at home
Updates (OS, Browser, Sumatra PDF, AV, Router)
Check for open ports (https://www.grc.com/x/ne.dll?bh0bkyd2)
Play with crypto: http://www.cryptool.org/en/
![Page 41: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/41.jpg)
Thank you very much
![Page 42: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/42.jpg)
#RSAC
Security Basics
42
Sponsored by:
Start Time Title Presenter
8:30 AM Introduction Hugh Thompson
8:45 AM Security Industry and Trends Hugh Thompson
9:30 AM Authentication Technologies Michael Poitner
10:15 AM Break
10:30 AM Governance, Risk and Compliance Dennis Moreau
11:15 AM Application Security Jason Brvenik
12:00 PM Lunch
1:15 PM Crypto 101/Encryption Basics, SSL & Certificates
Benjamin Jun
2:00 PM Firewalls and Perimeter Protection Dana Wolf
2:45 PM Break
3:00 PM Viruses, Malware and Threats Tas Giakouminakis
3:45 PM Mobile and Network Security Mike Janke
![Page 43: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/43.jpg)
SESSION ID:
Crypto 101/Encryption, SSL & Certificates
SEM-MO1
Benjamin JunVice President and Chief Technology Officer
Cryptography Research, a division of Rambus
Slides adapted from: Ivan Ristic, Qualys (RSAC 2011)
![Page 44: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/44.jpg)
#RSAC
Agenda
44
CRYPTOGRAPHY
VULNERABILITIES
SSL / TLS
CERTIFICATES
![Page 45: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/45.jpg)
CRYPTOGRAPHY
![Page 46: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/46.jpg)
#RSAC
What is Cryptography?
Cryptography is the art and science of keeping messages secure.
46
Cryptology
Cryptography
Symmetric encryption
Stream ciphers
Block ciphers
Asymmetric encryption Hash functions Digital
signatures Protocols
Cryptoanalysis
![Page 47: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/47.jpg)
#RSAC
What Does Secure Mean?
Always required: Confidentiality
Integrity
Authentication
Non-repudiation
Other criteria: Interoperability
Performance
47
![Page 48: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/48.jpg)
#RSAC
Meet Alice and Bob
Good guys: Alice, Bob
Bad guys: Eve (passive, eavesdropped)
Mallory, Oscar, Trudy (active, man in the middle)
48
![Page 49: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/49.jpg)
#RSAC
Restricted Versus Open
Issues:
Need different algorithm for every communication group
Algorithms must be thrown away on compromise, or when someone leaves group
Difficult to validate algorithms are secure
49
![Page 50: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/50.jpg)
#RSAC
How Does Encryption Work?
Obfuscation that is fast when you know the secrets, but impossible or slow when you don’t.
Computational security means that something cannot be broken with available resources, either now or in the future.
Aspects of complexity: Amount of data
Processing power
Memory capacity
50
![Page 51: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/51.jpg)
#RSAC
Symmetric Encryption
Convenient and fast:
Common algorithms: RC4, 3DES, AES
Secret key must be agreed on in advance
Group communication requires secure key distribution
No authentication
51
![Page 52: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/52.jpg)
#RSAC
Asymmetric EncryptionAsymmetric encryption uses two keys; one private and one public. The keys are related.
RSA, Diffie-Hellman key exchange, Elgamal encryption, and DSA. Also ECDH and ECDSA.
Enables authentication and secure key exchange.
Significantly slower than symmetric encryption.
52
![Page 53: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/53.jpg)
#RSAC
Digital SignaturesWell-known algorithms:
RSA Textbook approach – just encrypt with private key
In practice, use digest and strengthen
DSA, ECDSA
53
![Page 54: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/54.jpg)
#RSAC
Random Number Generation
Random numbers are at the heart of cryptography. Used for key generation
Weak keys equal weak encryption
Types of random number generators: True random number generators (TRNG) – truly random
Pseudorandom number generators (PRNG) – look random
Cryptographically secure pseudorandom number generators (CSPRNG) –look random and are unpredictable
54
![Page 55: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/55.jpg)
#RSAC
Hash Functions Hash functions are lossy one-way transformations that result with
fixed-length data fingerprints. Usually used for: Digital signatures
Integrity validation
Tokenization (e.g., storing passwords)
Desirable qualities of hash functions: Preimage resistance (one-wayness)
Weak collision resistance (2nd preimage resistance)
Strong collision resistance and the Birthday attack
55
![Page 56: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/56.jpg)
#RSAC
Protocols
Communicating securely requires more effort than just putting the primitives together
56
Message
Digest
Sign with Alice’s private key
Message
Alice’s certificate
Signature
Session key
Encrypted message, certificate,
and signature
Encrypted session key
Encrypt with session key
Encrypt with Bob’s public key
![Page 57: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/57.jpg)
VULNERABILITIES
![Page 58: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/58.jpg)
#RSAC
Attacks on Cryptography
58
Cryptoanalysis
Classical cryptoanalysis
Mathematical analysis
Brute-force attacks
Implementation attacks
Social engineering
![Page 59: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/59.jpg)
#RSAC
Example: Brute Force (Cryptanalysis)
59
US Navy Bombe, 1943Contains 16 four-rotor Enigma equivalents to perform exhaustive key search.
DES Keysearch Machine, 1998(Cryptography Research, AWT, EFF)
Tests over 90 billion keys per second, taking an average of less than 5 days to discover a DES key.
![Page 60: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/60.jpg)
#RSAC
Example: Side-Channel (Implementation) Simple EM attack with a radio
Usable signals even at 10 feet away
60
Devices far field
near field
Antennas
Receiver ($350)
Digitizer, GNU Radio peripheral($1000)
Signal Processing(demodulation, filtering)
DPAWSTM side-channelanalysis software
![Page 61: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/61.jpg)
#RSAC
Example: Side-Channel (Implementation) Focus on Mpdp mod p calculation (Mqdq mod q similar)
61
For each bit i of secret dpperform “Square”if (bit i == 1)
perform “Multiply”endif
endfor
SM S S S S S S S SM S SM SM S S S SM SM S S S S S S S S S
![Page 62: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/62.jpg)
SSL/TLS
![Page 63: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/63.jpg)
#RSAC
Introduction to SSL
SSL is a hybrid protocol designed to turn an insecure communication channel (regardless of protocol) into a secure one
Designed by Netscape in 1994, standardized in 1999 as TLS, which is now at version 1.2 (2008)
Protocol versions so far: SSL v2 – insecure
SSL v3 – still secure, but lacking
TLS v1 – widely used, but not best
TLS v1.1, v1.2 – not widely used
63
SSL v249.85%
SSL v2 No
Suites11.93%
No support38.22%
![Page 64: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/64.jpg)
#RSAC
SSL Goals
The SSL standard packages our knowledge of security protocols for resuse
Key services: Discovery and authentication
Session key(s) generation
Communication integrity
Interoperability
Extensibility
Performance
64
![Page 65: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/65.jpg)
#RSAC
SSL Cipher Suites SSL cipher suites are a higher-level cryptographic construct,
consisting of: Key exchange and authentication
Symmetric session cipher
Message integrity algorithm
Examples: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_RC4_128_SHA
65
![Page 66: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/66.jpg)
#RSAC
State of SSL
The situation is good, overall
But there are several issues: Problems with certificate authorities
Browsers talk to the sites with broken certificates
We’re not good at keeping up with protocol evolution: SSL v2 still widely supported; TLS v1.1 and TLS v1.2 virtually not supported
Lack of support for virtual SSL in Windows XP
Too many plain-text (HTTP) web sites
Issues related to mixed content (HTTP/HTTPS)
66
![Page 67: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/67.jpg)
CERTIFICATES
![Page 68: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/68.jpg)
#RSAC
Digital Certificates
Digital identity often include a public/private keypair Usually exchanged at start of a session
It is necessary to authenticate the keypair when faced with an active man-in-the-middle attack
We need third parties to help establish identity – generally a certificate authority (CA)
Digital certificates contain a public key, some identifying information (e.g., name, address, etc.) and a signature
68
![Page 69: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/69.jpg)
#RSAC
Certificate Contents
69
![Page 70: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/70.jpg)
#RSAC
Certificate Chaining
70
![Page 71: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/71.jpg)
#RSAC
Certificate Authorities Estimated ~ 650 certificate authorities (EFF)
Most browsers trust a small (ish) number of root certs, but the overall number grows through chaining
Any CA can issue certificate for any site
Strong desire to keep certificates in DNS (not that we are starting to implement DNSSEC)
71
The EFF SSL Observatoryhttps://www.eff.org/observatory
![Page 72: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/72.jpg)
CONCLUSIONS
![Page 73: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/73.jpg)
#RSAC
Resources
73
Understanding CryptographyChristof Paar and Jan Pelzl(Springer, 2009)
Applied CryptographySecond EditionBruce Schneier(Wiley, 1996)
SSL and TLSEric Rescorla(Addison Wesley, 2001)
SSL Labswww.ssllabs.comQualys
![Page 74: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/74.jpg)
#RSAC
How to Apply What You Have Learned
In the first three months, you should: Identify where cryptography is used in your organization
Identify infrastructure required for cryptography implementations (key management, certificates)
Within six months, you should: Know what crypto can do. Explain the different security properties.
Know what crypto can’t do. Gain basic knowledge of implementation security issues.
74
![Page 75: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/75.jpg)
QUESTIONS?
![Page 76: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/76.jpg)
#RSAC
Security Basics
76
Sponsored by:
Start Time Title Presenter
8:30 AM Introduction Hugh Thompson
8:45 AM Security Industry and Trends Hugh Thompson
9:30 AM Authentication Technologies Michael Poitner
10:15 AM BREAK
10:30 AM Governance, Risk and Compliance Dennis Moreau
11:15 AM Application Security Jason Brvenik
12:00 PM LUNCH
1:15 PM Crypto 101/Encryption Basics, SSL & Certificates
Benjamin Jun
2:00 PM Firewalls and Perimeter Protection Dana Wolf
2:45 PM Break
3:00 PM Viruses, Malware and Threats Tas Giakouminakis
3:45 PM Mobile and Network Security Mike Janke
![Page 77: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/77.jpg)
SESSION ID:
Firewalls & Perimeter Security
SEM-M01
Dana Elizabeth WolfSr. Director of Products
OpenDNS@dayowolf
![Page 78: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/78.jpg)
#RSAC
Firewall & Perimeter in 45 minutes
History of the Perimeter
The Morris Worm
What is a firewall?
Packets & Protocols
Features of a firewall
What it protects
78
![Page 79: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/79.jpg)
Quick History of the Evolution of the Perimeter
![Page 80: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/80.jpg)
#RSAC
Security: Physical Enforcement
80
![Page 81: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/81.jpg)
#RSAC
Security: Access Enforcement
81
![Page 82: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/82.jpg)
#RSAC
Security: Local Access/Authentication Enforcement
82
![Page 83: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/83.jpg)
#RSAC
<New Enforcement?>
83
![Page 84: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/84.jpg)
#RSAC
So WHAT is the Perimeter?
84
![Page 85: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/85.jpg)
Morris Worm
![Page 86: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/86.jpg)
#RSAC
1988, Robert Morris wrote an experimental, self-replicating, self-propagating program
Called “a worm”
Many machines at locations around the country crashed or became “catatonic”
Cost of dealing with worm at each location: $200-$53,000
Concept of “firewall” introduced
The Morris Worm
![Page 87: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/87.jpg)
Perimeter Security
![Page 88: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/88.jpg)
#RSAC
THE WALL THE GATE
![Page 89: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/89.jpg)
#RSAC
Some “creative” ways attackers try to gain access
89
Remote login
Application backdoors
SMTP session hijacking
OS Bugs
Denial of service
Redirect bombs
Email bombs
Viruses
Source Routing
Port scanning
![Page 90: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/90.jpg)
#RSAC
Definition of a Firewall Prevents the dangers of the internet from spreading to
your internal network
Collection of components placed between two networks that collectively have the following properties:
All traffic from inside to outside (and vice versa) must pass through the firewall
Only authorized traffic, as defined by policy, will be allowed to pass
The firewall itself is immune to penetration
90
![Page 91: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/91.jpg)
#RSAC
91
![Page 92: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/92.jpg)
Firewall Technologies/Components
![Page 93: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/93.jpg)
#RSAC
Network Protocol
![Page 94: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/94.jpg)
#RSAC
Protocol stack
![Page 95: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/95.jpg)
#RSAC
95
Packet building
![Page 96: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/96.jpg)
#RSAC
Packet Filtering
96
![Page 97: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/97.jpg)
#RSAC
Packet Filtering: Advantages/Disadvantages
Advantages A single router can help protect an entire network
Packet filtering is widely available
Simple packet filtering is very efficient
Disadvantages Reduces router performance
Some policies cannot be easily enforced by normal packet filtering routers
Current tools are not perfect
97
![Page 98: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/98.jpg)
#RSAC
Host Terminology
Host: Computer system attached to a network
Bastion Host: Special purpose computer specifically designed & configured to withstand attacks
Dual-homed host: System fitted with at least 2 NICs that sits between a trusted & untrusted network
98
![Page 99: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/99.jpg)
#RSAC
Proxy Services
99
![Page 100: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/100.jpg)
#RSAC
Proxying: Advantages/Disadvantages
Advantages Can be good at logging
Can provide caching & intelligent filtering
Can perform user-level authentication
Provide protection for weak or faulty IP implementations
Disadvantages Lag behind non-proxied services
Require modifications to clients, applications or procedures
100
![Page 101: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/101.jpg)
#RSAC
Network Address Translation
101
![Page 102: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/102.jpg)
#RSAC
NAT: Advantages/Disadvantages
Advantages Helps enforce the firewalls control over outbound connections
Can help restrict incoming traffic
Conceals the internal network’s configuration
Disadvantages Requires state information that isn’t always available
Interferes with some encryption and authentication systems
Has a problem with Embedded IP addresses
Dynamic allocation may interfere with packet filtering
102
![Page 103: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/103.jpg)
#RSAC
Virtual Private Networks
103
![Page 104: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/104.jpg)
#RSAC
VPN: Advantages/Disadvantages
Advantages Provide overall encryption
Allow you to remotely use protocols that are difficult to secure any other way
Disadvantages Involve dangerous network connections
Extend the network that you now have to protect
104
![Page 105: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/105.jpg)
Types of Firewalls
![Page 106: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/106.jpg)
#RSAC
Packet Filtering StatefulInspection
Application Proxy
Guard Personal Firewall
Simplest More complex Even more complex Most complex Similar to packet filtering firewall
Sees only addresses and service protocol type
Can see either addresses or data
Sees full data portion of packet
Sees full text of communication
Can see full data portion of packet
Auditing difficult Auditing possible Can audit activity Can audit activity Can—and usually does—audit activity
Screens based on connection rules
Screens based on information across packets—in either header or data field
Screens based on behavior of proxies
Screens based on interpretation of message content
Typically, screens based on information in a single packet, using header or data
Complex addressing rules can make configuration tricky
Usually preconfigured to detect certain attack signatures
Simple proxies can substitute for complex addressing rules
Complex guard functionality can limit assurance
Usually starts in "deny all inbound" mode, to which user adds trusted addresses as they appear
![Page 107: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/107.jpg)
#RSAC
So move on from Firewalls – what is NGFW?
Non-disruptive in-line bump-in-the-wire configuration
Standard first generation firewall capabilities
Integrated signature-based IPS
Application awareness\Ability to incorporate information from outside the firewall
Upgrade paths to include future information feeds
SSL Decryption
107
![Page 108: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/108.jpg)
#RSAC
Firewalls cannot....
Protect your network against traffic that does not go through it Protect your company against completely new threats Protect your data if it cannot understand it Set itself up correctly Prevent revealing sensitive information through social engineering Protect against what has been authorized Secure against tunneling attempts
108
![Page 109: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/109.jpg)
#RSAC
Will the Firewall disappear with the perimeter?
Is the Internet going to be the new corporate LAN?
Where will the new “bump in the wire” be?
Will the content & inspection approach still be relevant?
109
![Page 110: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/110.jpg)
SESSION ID:
Firewalls & Perimeter Security
SEM-M01
Dana WolfSr. Director of Products, OpenDNS
@dayowolf
![Page 111: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/111.jpg)
#RSAC
Security Basics
111
Sponsored by:
Start Time Title Presenter
8:30 AM Introduction Hugh Thompson
8:45 AM Security Industry and Trends Hugh Thompson
9:30 AM Authentication Technologies Michael Poitner
10:15 AM Break
10:30 AM Governance, Risk and Compliance Dennis Moreau
11:15 AM Application Security Jason Brvenik
12:00 PM Lunch
1:15 PM Crypto 101/Encryption Basics, SSL & Certificates
Benjamin Jun
2:00 PM Firewalls and Perimeter Protection Dana Wolf
2:45 PM Break
3:00 PM Viruses, Malware and Threats Tas Giakouminakis
3:45 PM Mobile and Network Security Mike Janke
![Page 112: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/112.jpg)
SESSION ID:
Security Basics SeminarViruses, Malware and Threats
SEM-M01
Tas GiakouminakisCo-Founder & Chief Technology Officer
Rapid7
![Page 113: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/113.jpg)
#RSAC
The Beginning
1966Theory of
Self-Reproducing
Automata
1971Creeper &
Reaper experimental
worms on DEC PDP-10/TENEX
1983Virus term
coined
1986Brain first
IBM PC virus
1988Morris worm first Internet
worm
1990sDOS &
Windows viruses and
worms
2000sInternet
spreading worms
ILOVEYOU, Slammer, MyDoom, Netsky,
botnets, …
113
![Page 114: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/114.jpg)
#RSAC
The Evolution
2007Storm worm botnet
2007Zeus
crimewarekit
2008Conficker
botnet
2009SpyEye
2010APT gains publicity, Stuxnetcyber
weapon
2011SpyEye &
Zeus merge
2011Bit coin
mining on the rise
2012Dexter
Point-of-Sale botnet
114
![Page 115: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/115.jpg)
#RSAC
Threats, threats, everywhere
Common threats impact everyone
Mass malware
“Unintentional” insiders
Gain insight into industry specific threats
ISACs
UK CISP
Vendors Verizon – 2013 Data Breach Investigations Report
Verizon – 2013 Data Breach Investigations Report
![Page 116: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/116.jpg)
#RSAC
Know Your Enemy
Hacktivists
Cybercriminals
State-Sponsored
116
![Page 117: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/117.jpg)
#RSAC
Professions in Cyber Crime
Intruders
Malware Developers
Exploit Kits Developers
Bulletproof Hosting
Money Laundering Providers
Traffic Brokers
…
117
![Page 118: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/118.jpg)
#RSAC
Malware: There’s an App For That
118
![Page 119: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/119.jpg)
#RSAC
Goal: Making Money
Data/Service Price Range
Credit Card # & CVV $4‐$8 (US)$7‐$13 (UK/Australia/Canada)$15‐$18 (EU/Asia)
Credit Card including track data $12 (US)$19‐$20 (UK/Australia/Canada)$28 (EU/Asia)
Fullz (identity and financial info) $25 (US)$30‐$40 (UK/Australia/Canada/EU/Asia)
Bank Account $70K‐$150K < $300
Infected Computers (1,000 – 15,000) $20 ‐ $250
119
Source: http://www.secureworks.com/resources/blog/the-underground-hacking-economy-is-alive-and-well/
![Page 120: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/120.jpg)
#RSAC
It’s Not Just Endpoints
Stuxnet made targeted SCADA/ICS attacks infamous
Point-of-Sale malware on the rise
ATM malware
120
![Page 121: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/121.jpg)
#RSAC
Combating Today’s Attacks
Philosophy shifting from prevention to detection and containment
Attackers increasingly rely on deception and the human element
Intrusion Kill Chains – understand attackers methodology and apply corresponding defensive measures to increase cost/complexity to attackerhttp://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf
121
![Page 122: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/122.jpg)
#RSAC
The Intrusion Kill Chain
122
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command & Control (C2)
Actions on Objectives
![Page 123: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/123.jpg)
#RSAC
Malware Exposure
123
Verizon – 2013 Data Breach Investigations Report
![Page 124: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/124.jpg)
#RSAC
User Targeted Attacks
124
User
Browse Internet
Click E-mail Link(Social Engineering)
Malicious Page(Drive-by, Watering
Hole)
Open E-mail Attachment
(Social Engineering)
Compromised Acquire Desired Target/Data
Open file USB drive (Social Engineering)
Acquire Desired Target/Data
Verizon – 2013 Data Breach Investigations Report
User
75%
66%
63%55%
51%
51%
45%
39%
18%
17%9%
4%
4%
![Page 125: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/125.jpg)
#RSAC
Defending Against User Targeted Attacks
125
User
Click E-mail Link
Malicious Page
Compromised
TBD installed
TBD action
User awareness training
Sender ID/SPF, content filtering, …
URL reputation, content filtering, AV, …
Patch software, exploit mitigations, HIDS/HIPS, …
AV, HIDS/HIPS, UAC, limit admin privileges, …
App whitelist, egress filters, DLP, IDS, blacklist, …
![Page 126: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/126.jpg)
#RSAC
Additional Reading
126
![Page 127: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/127.jpg)
#RSAC
Final Thoughts
127
![Page 128: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/128.jpg)
Thank You
Tas GiakouminakisRapid7
Co-founder & Chief Technology Officer
www.rapid7.com
![Page 129: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/129.jpg)
#RSAC
Security Basics
129
Sponsored by:
Start Time Title Presenter
8:30 AM Introduction Hugh Thompson
8:45 AM Security Industry and Trends Hugh Thompson
9:30 AM Authentication Technologies Michael Poitner
10:15 AM BREAK
10:30 AM Governance, Risk and Compliance Dennis Moreau
11:15 AM Application Security Jason Brvenik
12:00 PM LUNCH
1:15 PM Crypto 101/Encryption Basics, SSL & Certificates
Benjamin Jun
2:00 PM Firewalls and Perimeter Protection Dana Wolf
2:45 PM Break
3:00 PM Viruses, Malware and Threats Tas Giakouminakis
3:45 PM Mobile and Network Security Mike Janke
![Page 130: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/130.jpg)
SESSION ID:
MOBILE SECURITY
How did we get here? What is it? Where are we going?SEM-M01
Mike JankeCEO & Co-Founder
Silent Circle
![Page 131: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/131.jpg)
#RSAC
A Journey of Disruption
131
![Page 132: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/132.jpg)
#RSAC
2014 is About the Past
132
![Page 133: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/133.jpg)
#RSAC
IT Departments in 2007
The iPhone just launched
There were no app stores, no clouds (to speak of)
92% of all connected devices ran MSFT
The new “Innovative” mobile devices Blackberry rules the corporate world
Handspring, Nokia N, Danger Sidekick, Palm
133
![Page 134: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/134.jpg)
#RSAC
IT Departments Were GODs
Most company functions revolved around IT• From ERP systems, to email, to all communications
CEO’s and CFO’s bowed down before them…
Microsoft owned the world…Blackberry followed
134
![Page 135: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/135.jpg)
#RSAC
The Winds of Change - Disruption
Cloud Computing + Apps + Moore’s Law pushing further
Lightweight laptops, faster devices, Smarter Phones
The “consumerization” of technology
PC Hackers & Data Mining moved to Mobile – fertile hunting grounds
135
![Page 136: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/136.jpg)
#RSAC
You Became The Customer
The end customer became YOU, not IT
C-Suite Executives brought more efficient devices to work
BYOD begins to happen
iPhone 3GS (2009)
iPad (2010) with Microsoft ActiveSync
136
![Page 137: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/137.jpg)
#RSAC
Users Begin Dictating Products to the Enterprise
Politicians, CEO’s, Sales Executives, “Cool” is also efficient
Executives bring iPads, Androids, iPhones, slim laptops to work
“I don’t care –find a way to make it work”, IT is told
Hundreds of Apps –more efficient + cheaper than existing infrastructure in enterprises
Efficiency soars, IT goes from buying equipment to integrating
137
![Page 138: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/138.jpg)
#RSAC
What is Mobile Security?
Uhmmm...It’s being free from someone stealing your stuff
It’s Safety
It’s Control
138
![Page 139: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/139.jpg)
#RSAC
What is Mobile Security?
Ultimately: Mobile Security is about CONTROL for Enterprise• AND about securing “your stuff” as a consumer
The FRICTION POINT happens when CONTROL hits “Your Stuff”..
139
![Page 140: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/140.jpg)
#RSAC
The Security Reality?
LET ME BE PERFECTLY CLEAR…
There is no Bloke that can’t be Beaten…
No horse that can’t be rode…
And NO PHONE THAT IS 100% SECURE….
140
![Page 141: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/141.jpg)
#RSAC
So What Does Security Feel Like? CONSUMER: Keep criminals out of my device. Its my money/data –not theirs…
Let me decide who gets my data and when –including the Government
ENTERPRISE: Keep criminals, competitors & hackers out of “OUR” devices
Give us control so we know what is going on…and IT stays employed
We don’t want to end up in the “headlines on CNN”
141
![Page 142: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/142.jpg)
#RSAC
Confusion & Fragmentation
CONSUMER: Who has my data? Everyone!!! How come I didnt know?
I want the magic of technology and I don’t want to think of security
ENTERPRISE: MDM? MAM? Zero Days, Malware, 52 vendors, 27 solutions, BYOD?
I need to control ALL devices, but I can’t –always playing “catch-up”.
142
![Page 143: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/143.jpg)
#RSAC
Who Dictates the Future of Mobile?
FOLLOW THE MONEY….
The Customer changed
It used to be IT Departments
Now it’s the end consumer…BYOD
143
![Page 144: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/144.jpg)
#RSAC
Products flow from the user… To the Enterprise
144
![Page 145: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/145.jpg)
#RSAC
Mobile Devices are at least as secure as the desktop and laptops they augment
145
Code signing + Sandboxing + better integrated security hardware
IOS’s mini HSM
ARM Trustzone
Apps are safer than websites…less cross-site contamination
![Page 146: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/146.jpg)
#RSAC
They Have Much Less…
146
Data archives with decades of data
Files more focused to on-going tasks
Email is a subset of messages
![Page 147: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/147.jpg)
#RSAC
Better Remediation
147
Device Encryption (on by default with IOS)
Remote wipe – Baseband makes this easier
![Page 148: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/148.jpg)
#RSAC
Why is it so hard to solve these problems?
148
Phone, Chip and Hardware companies go for $$$, not security
Governments go for surveillance and regulations
Consumers go for convenience
![Page 149: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/149.jpg)
#RSAC
Where is The Next Disruption? Mobile Device Monopolies are about to hit a wall (Apple, Samsung)
Smartphone saturation is coming….HTC/LG/BB/Nokia all losing $$
Smaller innovative specialty & niche makers are servicing areas the giants cannot…Security/Style/Customization (Xiaomi and others)
Consolidation of Mobile Security Services
One-stop shops coming (MDM, Secure Comms, Hardware, Cloud)
Too much funding for too many solutions…too much security “noise”
149
![Page 150: Security Basics Sponsored by 112 and SOX (U.S.) – upped the ante on financial audits (and supporting IT systems) ... SEM-MO1 Benjamin Jun Vice President and Chief Technology Officer](https://reader036.vdocument.in/reader036/viewer/2022070608/5abb3c727f8b9a297f8ca336/html5/thumbnails/150.jpg)
#RSAC
ACTIONABLE ADVICE Products flow from the user up to the enterprise – not vice versa
Device makers know who the customer is… security is not a priority
Control products are starting to flow to the platform
Security depends upon what “you” want…. control or safety
We are in the midst of a revolution… users want more “privacy control”
Consolidation of products/services and security disruption is just NOW beginning.
Don’t try to solve everything – start with basics – change is too quick
150