Your SlideShare is downloading. ×
0
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
03. The Security Weakest Links
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

03. The Security Weakest Links

567

Published on

This presentation presentated by Gildas Deograt Lumy "Simulasi Scirital Information Infrastructure Protection (CIIP)" , Bandung, Indonesia 10th September 2013 on #IISF2013

This presentation presentated by Gildas Deograt Lumy "Simulasi Scirital Information Infrastructure Protection (CIIP)" , Bandung, Indonesia 10th September 2013 on #IISF2013

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
567
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
98
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Security is Like a Chain... as Strong as The Weakest link 90% cyber security implementation is inconsistent... :’( XecureIT © PT IMAN Teknologi InformasiThe Security Weakest Links v2.0
  • 2. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 People: Unaware and Ignorance “Amateur hacks the systems. Professional hacks the people.”
  • 3. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 People: Unaware and Ignorance “Amateur hacks the systems. Professional hacks the people.”
  • 4. Policies and Procedures InconsistentInconsistent UnclearUnclear
  • 5. Technology Implementation Completely Wrong :’(
  • 6. Technology Implementation Complete Failure :’(
  • 7. Physical Cable Weakness
  • 8. Technology Weakness Border Gateway Protocol (BGP) Poisoning
  • 9. Technology Vulnerability “We are like sitting duck.”
  • 10. Anti Malware is Ineffective “Updated anti malware is ineffective.”
  • 11. Anti Malware is Ineffective “Malware is more stealthy.”
  • 12. Targeted Attack “Updated anti malware is useless.”
  • 13. Government and Business Cooperation
  • 14. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 Government and Business Cooperation
  • 15. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 Backdoor Vendors: “Backdoors are critical vulnerabilities.”
  • 16. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 Backdoor Vendors: “Discovered hidden key is a critical vulnerability.”
  • 17. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 Backdoor Vendors: “Discovered hidden key is a critical vulnerability.”
  • 18. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 Backdoor Firmware
  • 19. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 Backdoor Kill Switch
  • 20. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 End-Point Malware in The Browser and ATM
  • 21. Insider Attack The enemy is “brought” inside by authorized people :’(
  • 22. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 The History of War
  • 23. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 The Cyberwar
  • 24. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 Mobile Device
  • 25. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 Mobile Device

×