SlideShare a Scribd company logo
1 of 7
Security and Trust Gabriel Waller Nokia Siemens Networks September 2011 Primary colors:
Resent real-life examples Fraudulent SSL certificate for *.google.com   [August 29]  we received reports of  man-in-the-middle attacks  against Google users, whereby someone get between them and encrypted Google services. The people affected were primarily located in Iran. The attacker used a  fraudulent SSL certificate  issued by DigiNotar, a root certificate authority that  normally do not issue certificates  for Google. - Why to attack google.com? - Attacker could intercept end-users’ communication. The  Dutch government  has been using only Diginotar-supplied certificates. The breach leaves all government websites with invalid certificates while a new supplier is being searched for.  The minister of internal affairs recommends people  not to use the websites.
Case study: DigiNotar compromized CA Weak password All CAs in the same domain No central protected logging IDS didn’t work No virus protection Over 1 month between  first  internal observation  And public warning Skilled  attacker Target:  Google users In Iran  The attacker usually  takes the easiest route. ATTACKER Poor network design Unpatched SW in use Firewalls? ,[object Object],[object Object],[object Object],[object Object]
 
Trust is built on security   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Security Trust
Implications on trust ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You!   Questions ?

More Related Content

What's hot

Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
crussell79
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
Dilip Kr. Jangir
 

What's hot (20)

Secure Web Gateway Ds Lr[1]
Secure Web Gateway Ds Lr[1]Secure Web Gateway Ds Lr[1]
Secure Web Gateway Ds Lr[1]
 
News Bytes - December 2015
News Bytes - December 2015News Bytes - December 2015
News Bytes - December 2015
 
Null hyderabad - October Newsbytes
Null hyderabad - October NewsbytesNull hyderabad - October Newsbytes
Null hyderabad - October Newsbytes
 
Risk-based Authentication In Cloud | Sysfore
Risk-based Authentication In Cloud | SysforeRisk-based Authentication In Cloud | Sysfore
Risk-based Authentication In Cloud | Sysfore
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
Profile securitarian
Profile   securitarianProfile   securitarian
Profile securitarian
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
Web Security
Web SecurityWeb Security
Web Security
 
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
 
Past, Present & Future of Credentials Theft
Past, Present & Future of Credentials TheftPast, Present & Future of Credentials Theft
Past, Present & Future of Credentials Theft
 
Generic threats to mobile application
Generic threats to mobile applicationGeneric threats to mobile application
Generic threats to mobile application
 
Websecurity fundamentals for beginners
Websecurity fundamentals for beginnersWebsecurity fundamentals for beginners
Websecurity fundamentals for beginners
 
CROWDSALE LAUNCHED TO BUILD BLOCKCHAIN-BASED GUN VERIFICATION SYSTEM
CROWDSALE LAUNCHED TO BUILD BLOCKCHAIN-BASED GUN VERIFICATION SYSTEMCROWDSALE LAUNCHED TO BUILD BLOCKCHAIN-BASED GUN VERIFICATION SYSTEM
CROWDSALE LAUNCHED TO BUILD BLOCKCHAIN-BASED GUN VERIFICATION SYSTEM
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor Authentication
 
R u hacked
R u hackedR u hacked
R u hacked
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest Threat
 
Alert logic anatomy owasp infographic
Alert logic anatomy owasp infographicAlert logic anatomy owasp infographic
Alert logic anatomy owasp infographic
 
Password spraying
Password sprayingPassword spraying
Password spraying
 

Similar to Security and trust. gabriel waller, nokia siemens networks.

Final Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxFinal Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docx
lmelaine
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal
 

Similar to Security and trust. gabriel waller, nokia siemens networks. (20)

Strong authentication implementation guide
Strong authentication   implementation guideStrong authentication   implementation guide
Strong authentication implementation guide
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
 
Google & FIDO Authentication
Google & FIDO AuthenticationGoogle & FIDO Authentication
Google & FIDO Authentication
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Document security & firewall
Document security & firewallDocument security & firewall
Document security & firewall
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
Google FIDO Authentication Case Study
Google FIDO Authentication Case StudyGoogle FIDO Authentication Case Study
Google FIDO Authentication Case Study
 
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ..."Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT Security
 
Role Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsRole Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online Transactions
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Google Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and Consumers
 
Final Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxFinal Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docx
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 

More from Business Finland

More from Business Finland (20)

Russia_Business opportunities, presentation by Alexey Zak at Navigate fair 2018
Russia_Business opportunities, presentation by Alexey Zak at Navigate fair 2018Russia_Business opportunities, presentation by Alexey Zak at Navigate fair 2018
Russia_Business opportunities, presentation by Alexey Zak at Navigate fair 2018
 
Norway_Business opportunities, presentation by Jaakko Isotalo at Navigate fai...
Norway_Business opportunities, presentation by Jaakko Isotalo at Navigate fai...Norway_Business opportunities, presentation by Jaakko Isotalo at Navigate fai...
Norway_Business opportunities, presentation by Jaakko Isotalo at Navigate fai...
 
France_Business opportunities_presentation by Marie-Zoe Belon-Laitinen at Nav...
France_Business opportunities_presentation by Marie-Zoe Belon-Laitinen at Nav...France_Business opportunities_presentation by Marie-Zoe Belon-Laitinen at Nav...
France_Business opportunities_presentation by Marie-Zoe Belon-Laitinen at Nav...
 
Innovative Bioproducts Finland
Innovative Bioproducts FinlandInnovative Bioproducts Finland
Innovative Bioproducts Finland
 
Canada_Maritime business opportunities_seminar 2018
Canada_Maritime business opportunities_seminar 2018Canada_Maritime business opportunities_seminar 2018
Canada_Maritime business opportunities_seminar 2018
 
United States Coast Guard icebreaker program_seminar 2018
United States Coast Guard icebreaker program_seminar 2018United States Coast Guard icebreaker program_seminar 2018
United States Coast Guard icebreaker program_seminar 2018
 
China’s key policies and the impacts on maritime industry
China’s key policies and the impacts on maritime industry China’s key policies and the impacts on maritime industry
China’s key policies and the impacts on maritime industry
 
Norway_Maritime and offshore market update 2018
 Norway_Maritime and offshore market update 2018 Norway_Maritime and offshore market update 2018
Norway_Maritime and offshore market update 2018
 
France_Shipbuilding market_seminar 2018
France_Shipbuilding market_seminar 2018France_Shipbuilding market_seminar 2018
France_Shipbuilding market_seminar 2018
 
Russia_Market business opportunities and events 2018
Russia_Market business opportunities and events 2018 Russia_Market business opportunities and events 2018
Russia_Market business opportunities and events 2018
 
German-Finnish maritime co-operation, joint development of next-generation te...
German-Finnish maritime co-operation, joint development of next-generation te...German-Finnish maritime co-operation, joint development of next-generation te...
German-Finnish maritime co-operation, joint development of next-generation te...
 
Challenges and requirements on modern short sea operations in the Baltic Sea ...
Challenges and requirements on modern short sea operations in the Baltic Sea ...Challenges and requirements on modern short sea operations in the Baltic Sea ...
Challenges and requirements on modern short sea operations in the Baltic Sea ...
 
Innovative Bioproducts Finland
Innovative Bioproducts FinlandInnovative Bioproducts Finland
Innovative Bioproducts Finland
 
Invest in Finland Forum 2017
Invest in Finland Forum 2017Invest in Finland Forum 2017
Invest in Finland Forum 2017
 
Team Finland Japan Day 15.5.2017
 Team Finland Japan Day 15.5.2017 Team Finland Japan Day 15.5.2017
Team Finland Japan Day 15.5.2017
 
Iran_Maritime Market snapshot 2017
Iran_Maritime Market snapshot 2017Iran_Maritime Market snapshot 2017
Iran_Maritime Market snapshot 2017
 
Norway_Shipbuilding Market Update, seminar 10.5.2017
Norway_Shipbuilding Market Update, seminar 10.5.2017Norway_Shipbuilding Market Update, seminar 10.5.2017
Norway_Shipbuilding Market Update, seminar 10.5.2017
 
Russia_Business opportunities in Russia_seminar 10.5.2017
Russia_Business opportunities in Russia_seminar 10.5.2017Russia_Business opportunities in Russia_seminar 10.5.2017
Russia_Business opportunities in Russia_seminar 10.5.2017
 
Vietnam_maritime market snapshot, Seminar 10.5.2017
Vietnam_maritime market snapshot, Seminar 10.5.2017Vietnam_maritime market snapshot, Seminar 10.5.2017
Vietnam_maritime market snapshot, Seminar 10.5.2017
 
Germany_New Business Opportunities in German Maritime and Offshore Market_Sem...
Germany_New Business Opportunities in German Maritime and Offshore Market_Sem...Germany_New Business Opportunities in German Maritime and Offshore Market_Sem...
Germany_New Business Opportunities in German Maritime and Offshore Market_Sem...
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Security and trust. gabriel waller, nokia siemens networks.

  • 1. Security and Trust Gabriel Waller Nokia Siemens Networks September 2011 Primary colors:
  • 2. Resent real-life examples Fraudulent SSL certificate for *.google.com [August 29] we received reports of man-in-the-middle attacks against Google users, whereby someone get between them and encrypted Google services. The people affected were primarily located in Iran. The attacker used a fraudulent SSL certificate issued by DigiNotar, a root certificate authority that normally do not issue certificates for Google. - Why to attack google.com? - Attacker could intercept end-users’ communication. The Dutch government has been using only Diginotar-supplied certificates. The breach leaves all government websites with invalid certificates while a new supplier is being searched for. The minister of internal affairs recommends people not to use the websites.
  • 3.
  • 4.  
  • 5.
  • 6.
  • 7. Thank You! Questions ?

Editor's Notes

  1. Example of real proffessioinal and targeted cybercrime, attacking Google! Also impacting the National Security in Holland, as Dutch Government was depending on the miss-used Diginotar
  2. The defaced pages dating back to 2009 found by F-secure appear to have been copied during a re-installation of the  web server in August. The OCSP server's working at DigiNotar has been reversed since Sept 1st. Normally these servers respond with good to all certificates except those on the CRL (a blacklist). The OCSP now operates in whitelist mode: it will call all unknown certificates signed by DigiNotar as revoked (a whitelist). Hence we need to make sure to use the OCSP server to validate DigiNotar certificates -should we want/need to- and not rely on the published CRLs anymore. DigiNotar operates multiple CA servers, all of them seem to have been compromised by the hackers and having had Administrator level access, including those used for Qualified certificates and PKIOverheid certificates. Some of the CA servers have had parts of their logs deleted, leading to DigiNotar not knowing what certificates were issued. Hacker tools including Cain&Abel as well as specialized dedicated scripts -written in a language specific to the PKI environment- were found. Intentional fingerprints left in one of the scripts links it back to the Comodo breach. There is a list of 6 CAs that have been found to have emitted rogue certificates There is an incomplete list of 24 additional CAs that have had their security compromised but have not shown to have emitted rogue certificates The rogue certificate for *.google.com detected in the wild was verified against the DigiNotar OCSP service from August 4th till it was revoked on August 29th. 300 000 different IP addresses verified that certificate.  More than 99% of those addresses trace back to Iran. The report notes that those who had their connections to gmail intercepted could have exposed their authentication cookies and that would expose their email itself, and through that also allow access to reset functionality of other services such as e.g. facebook.  It is recommended that those in Iran logout and change passwords. 2 certificates were found on the PKIOverheid and Qualified environment that cannot be related to a valid certificate.Yet the logs appear to be intact and do not show rogue certificates created. There is a list of failures of basic best security practices that have clearly not worked, implemented badly or were omitted. Yet the servers are housed in a tempest protected room. The hackers breached the systems possible June 6th already, this got detected by DigiNotar on June 19th, The rogue certificates were created in July and the first time the *.google.com certificate that was detected in the wild was presented on July 27th to the OCSP server. Yet it took till DigiNotar was notified by govCERT.nl before they revoked the certificate. The letter [in Dutch] summarizes the report itself, and contains some additional information not in the report that is of interest: There is now an inquiry into DigiNotar for possible responsibility and negligence The search for the hackers continues DigiNotar filed an official reported the incident on September 5th They suggest leniency and agreements for those cases where the revocation of trust in DigiNotar leads to problems such as with the timely filing of tax information in the Netherlands
  3. The browser trusts many sites, as indicated in the ”trusted Root Certificate Authorities If one Root CA is compromised, browser remain trusing whatever malicious site creted with that CA. Security update of borwser/operating system required to mitigate the threat