Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Security in today's World

557 views

Published on

Small overview of the security of our everyday things like bank and rfid cards, laptops and phones

Published in: Education
  • Be the first to comment

Security in today's World

  1. 1. Security in today's world Marian HackMan Marinov mm@1h.com Chief System Architect of SiteGround
  2. 2. Personal security ➢Bank cards ➢Personal documents ➢RFID cards ➢Laptop ➢Phone ➢Surveillance
  3. 3. Bank cardsBank cards ➢ How to protect our PIN ➢ cover your hand, when typing it ➢ do not share it ➢ do not write it on a note and keep it in your wallet
  4. 4. Bank cardsBank cards ➢ How to protect our PIN ➢ How to protect the written data on your card
  5. 5. Bank cardsBank cards ➢ How to protect our PIN ➢ How to protect the written data on your card ➢ PayPass
  6. 6. Bank cardsBank cards ➢ How to protect the card it self
  7. 7. Bank cardsBank cards ➢ How to protect the written data on your card ➢ Cloning ➢ Name ➢ Expiration date ➢ CVV/CVC
  8. 8. Bank cardsBank cards ➢ PayPass ➢ Wireless ➢ Unauthorized access ➢ Transactions without authorization ➢ Cloning ➢ Relay attack
  9. 9. Bank cardsBank cards ➢ PayPass - relay attack Payment terminal Attacker's phone Attacker's phone Victim's card
  10. 10. Bank cardsBank cards ➢ PayPass - relay attack Payment terminal Attacker's phone Victim's phone with a Trojan app Victim's card
  11. 11. Bank cardsBank cards ➢ There are other devices that can be used to read or impersonate your card
  12. 12. Bank cardsBank cards ➢ PayPass - protection
  13. 13. Personal documents How to protect them? ➢Personal ID cards ➢Passport ➢Driver's license ➢ЕГН :)
  14. 14. Personal information What to do ➢ Do not share unnecessary your personal details ➢ Combining separately provided data can compromise your identity ➢ Assume that you are being watched all the time
  15. 15. Personal information What to do ➢ Start using the Tor services ➢ Your browsing habits give away who you are
  16. 16. RFID/NFC cards ➢ Easy proximity reads ➢ Very easy forging ➢ Cheap devices for forging
  17. 17. Phone protection ➢Encrypt your phone ➢Encrypt your SD card ➢Set a password, not a PIN ➢Setup a remote lock and wipe ➢Be very careful what apps you install and what permissions they require
  18. 18. Laptop Protections ➢BIOS password ➢do not allow external devices to be used for boot ➢disable network boot ➢Power-On password ➢HDD password from BIOS ➢Encrypt your data (Linux LUKS and ecryptfs) ➢separate browser profile for banking ➢password manager for storing passwords
  19. 19. Laptop Protections ➢ Firewall your system ➢ Protecting your data from government searches ➢ double encrpt ➢ cripple your second encrypted volume ➢ make sure you do not have access to the fix for your data
  20. 20. Questions?Questions? Marian HackMan Marinov mm@1h.com Chief System Architect of SiteGround
  21. 21. Questions Thank you!Thank you! Marian HackMan Marinov mm@1h.com Chief System Architect of SiteGround

×