y3dips - Who Own Your Sensitive Information?
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

y3dips - Who Own Your Sensitive Information?

  • 1,469 views
Uploaded on

Presentation for National Cryptography Seminar at Sekolah Tinggi Sandi Negara

Presentation for National Cryptography Seminar at Sekolah Tinggi Sandi Negara

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,469
On Slideshare
1,268
From Embeds
201
Number of Embeds
1

Actions

Shares
Downloads
63
Comments
0
Likes
0

Embeds 201

http://clog.ammar.web.id 201

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Who Own yourSensitive Information ? How It was Taken & How To Protect It SNKI - 29, December 2010 - y3dips
  • 2. Who Own It ?
  • 3. HACKER
  • 4. CYBER MAFIA
  • 5. CYBER TERRORIST
  • 6. Movie
  • 7. CYBER ARMY
  • 8. WIKILEAKS
  • 9. Who Own It ?
  • 10. How It Was Taken ?
  • 11. Famous Attack Vector• Password (Authentication)• Insecure Infrastructure• Insecure Data Protection• There isnt any Policy and Procedure• Intrusion/hacking• Social Engineering
  • 12. PASSWORD TREAT
  • 13. INSECURE INFRASTRUCTURE
  • 14. Hacking Example
  • 15. Video Demo
  • 16. WikiLeaks
  • 17. BradleyManning an ArmyIntellegence analyst
  • 18. US Airstrikes
  • 19. Wikileaks Publication • Baghdad “AirStrikes” Incident • Copy the Data into a “LADY GAGA” labeled CD • Bradley Submit to Wikileaks • Wikileaks confirm 3 Month Decrypting it - but it never encrypted said Bradley.http://www.wired.com/threatlevel/2010/06/wikileaks-chat/#ixzz0qYdG9xzE
  • 20. Attack Vector• Unprotected “Private” Network• Unpatched/Out of date server/system• Zip - aes256 - password protected partial usage• Lack on Physical Security - 5 digit door access = knock
  • 21. WikiLeaks
  • 22. Secret US Embassy Cables
  • 23. Secret US Embassy Cables
  • 24. How To Protect It ?
  • 25. • Upgrade your Security Awareness• Read The “Security” Manual• Give a serious attention to your Authentication/Credentials• Use a relatively Strong Encryption (e.g for file, network communication)• Use AntiVirus, Firewall, e.t.c
  • 26. Password Management
  • 27. File/Partition Encryption
  • 28. No System 100% SecureIs a Process SECURITY Human is the Weakest Link
  • 29. Who Own yourSensitive Information ? How It was Taken & How To Protect It @y3dips - me@ammar.web.id