David Shu PPT

Preview:

DESCRIPTION

ppt about internet banking

Citation preview

David Shu

Cyber Security Issues in Internet Banking

Senior Architect Compliance & Security Standard Chartered March 2013

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Cisco Confidential 2 © 2010 Cisco and/or its affiliates. All rights reserved.

What is

Internet

Banking?

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Cisco Confidential 3 © 2010 Cisco and/or its affiliates. All rights reserved.

1660’s

1660 1950 1960 1970 1980 1990 2000 2010 2020+

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Cisco Confidential 4 © 2010 Cisco and/or its affiliates. All rights reserved. http://www.bbc.co.uk/ahistoryoftheworld/objects/becTP-jATkmwWfx7ol336w

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Cisco Confidential 5 © 2010 Cisco and/or its affiliates. All rights reserved.

Trust

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Cisco Confidential 6 © 2010 Cisco and/or its affiliates. All rights reserved.

1950-60s

1660 1950 1960 1970 1980 1990 2000 2010 2020+

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Cisco Confidential 7 © 2010 Cisco and/or its affiliates. All rights reserved.

http://www.tomshardware.com/picturestory/508-mainframe-computer-history.html

1965

Multics CTSS on IBM 7094 contains a flaw that may

disclose the contents of the password file. The issue

occurred when multiple instances of the system text

editor were invoked, causing the editor to create

temporary files with a constant name. This would

unexplicably cause the contents of the system

CTSS password file to display to any user logging

into the system.

http://osvdb.org/show/osvdb/23257

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Cisco Confidential 8 © 2010 Cisco and/or its affiliates. All rights reserved.

1960-80s

1660 1950 1960 1970 1980 1990 2000 2010 2020+

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Cisco Confidential 9 © 2010 Cisco and/or its affiliates. All rights reserved.

http://www.guardian.co.uk/money/gallery/2007/jun/27/1

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Cisco Confidential 10 © 2010 Cisco and/or its affiliates. All rights reserved.

Source: Wikipedia

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Cisco Confidential 11 © 2010 Cisco and/or its affiliates. All rights reserved.

1990s

1660 1950 1960 1970 1980 1990 2000 2010 2020+

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Cisco Confidential 13 © 2010 Cisco and/or its affiliates. All rights reserved.

http://www.phishing.org/history-of-phishing/

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Cisco Confidential 14 © 2010 Cisco and/or its affiliates. All rights reserved.

2000s

1660 1950 1960 1970 1980 1990 2000 2010 2020+

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 Cisco Confidential 15 © 2010 Cisco and/or its affiliates. All rights reserved.

http://www.yodlee.com/yodlee-moneycenter-blog/great-infographic-the-history-of-online-banking/

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Cisco Confidential 17 © 2010 Cisco and/or its affiliates. All rights reserved.

2010-20+

1660 1950 1960 1970 1980 1990 2000 2010 2020+

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Cisco Confidential 18 © 2010 Cisco and/or its affiliates. All rights reserved.

Source: Versafe and Check Point Software Technologies

http://www.checkpoint.com/products/downloads/whitepapers/Eurograbber_White_Paper.pdf

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 Cisco Confidential 19 © 2010 Cisco and/or its affiliates. All rights reserved.

Source: Versafe and Check Point Software Technologies

http://www.checkpoint.com/products/downloads/whitepapers/Eurograbber_White_Paper.pdf

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 Cisco Confidential 20 © 2010 Cisco and/or its affiliates. All rights reserved. http://www.imperva.com/docs/hii_the_anatomy_of_an_anonymous_attack.pdf

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 Cisco Confidential 21 Cisco Confidential 21 © 2010 Cisco and/or its affiliates. All rights reserved.

Recap

Internet Banking is about Trust -Trust is the cornerstone of banking.

-As the threats increase so will the countermeasures.

- If you find this exciting, you should consider a career in IT Security

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Cisco Confidential 22 © 2010 Cisco and/or its affiliates. All rights reserved.

http://www.standardchartered.com.sg/move2013/

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 Cisco Confidential 23 © 2010 Cisco and/or its affiliates. All rights reserved.

Security Related Courses:

CCNA Security with Cisco Networking Academy

https://www.netacad.com/group/offerings/ccna-security

The ISC² courses: https://www.isc2.org/cissp/default.aspx

SANS training: http://www.sans.org/

ISACA courses: http://www.isaca.org/Education/