25
Security is Like a Chain... as Strong as The Weakest link 90% cyber security implementation is inconsistent... :’( XecureIT © PT IMAN Teknologi Informasi The Security Weakest Links v2.0

03. The Security Weakest Links

Embed Size (px)

DESCRIPTION

This presentation presentated by Gildas Deograt Lumy "Simulasi Scirital Information Infrastructure Protection (CIIP)" , Bandung, Indonesia 10th September 2013 on #IISF2013

Citation preview

Page 1: 03. The Security Weakest Links

Security is Like a Chain...as Strong as The Weakest link

90% cyber security implementation is inconsistent... :’(

XecureIT

© PT IMAN Teknologi InformasiThe Security Weakest Links v2.0

Page 2: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

People: Unaware and Ignorance“Amateur hacks the systems. Professional hacks the people.”

Page 3: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

People: Unaware and Ignorance“Amateur hacks the systems. Professional hacks the people.”

Page 4: 03. The Security Weakest Links

Policies and Procedures

InconsistentInconsistent

UnclearUnclear

Page 5: 03. The Security Weakest Links

Technology Implementation

Completely Wrong :’(

Page 6: 03. The Security Weakest Links

Technology Implementation

Complete Failure :’(

Page 7: 03. The Security Weakest Links

Physical Cable Weakness

Page 8: 03. The Security Weakest Links

Technology Weakness

Border Gateway Protocol (BGP) Poisoning

Page 9: 03. The Security Weakest Links

Technology Vulnerability“We are like sitting duck.”

Page 10: 03. The Security Weakest Links

Anti Malware is Ineffective“Updated anti malware is ineffective.”

Page 11: 03. The Security Weakest Links

Anti Malware is Ineffective“Malware is more stealthy.”

Page 12: 03. The Security Weakest Links

Targeted Attack“Updated anti malware is useless.”

Page 13: 03. The Security Weakest Links

Government and Business Cooperation

Page 14: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

Government and Business Cooperation

Page 15: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

BackdoorVendors: “Backdoors are critical vulnerabilities.”

Page 16: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

BackdoorVendors: “Discovered hidden key is a critical vulnerability.”

Page 17: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

BackdoorVendors: “Discovered hidden key is a critical vulnerability.”

Page 18: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

BackdoorFirmware

Page 19: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

BackdoorKill Switch

Page 20: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

End-PointMalware in The Browser and ATM

Page 21: 03. The Security Weakest Links

Insider AttackThe enemy is “brought” inside by authorized people :’(

Page 22: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

The History of War

Page 23: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

The Cyberwar

Page 24: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

Mobile Device

Page 25: 03. The Security Weakest Links

© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0

Mobile Device