Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
How To Rob A Bank In The 21st Century
March 2015
Lim Chin Wan
Have you ever wanted to rob a bank?
DOING IT THE OLD SCHOOL WAY?
Hacking A Bank Is
Easy Because We’re
All Humans!
I think you should meet
someone…
This is Yuri.
In 2012, he and his “anonymous” friends hacked major bank.
In 2013, they hacked credit card company and boug...
Last year, Yuri hit a major telco with the secret keys
provided by a disgruntled employee.
Then Yuri went on a nice 2 mont...
Banks and telcos all
used “State of the Art”
encryption… yet they
were still hacked!
So how does Yuri do it?
“Usually, I just find one
disgruntled employee.
Just one.”
Don’t Believe Me?
Let’s Play A Game…
Can Anyone Tell
Me Who These
People Are?
Heidi KlumJessica Alba
Britney
Spears
Christina
Aguilera
Scarlett
Johansson
Kate
Winslet
Jon Bon Jovi
RATED TOP 20
MOST DANGEROUS
CELEBRITIES IN 2014
BY
McAfee
18.19%
Because your users are
your weakest link…
They are your customers…
They are your Employees...
They are your vendors…
Regular Training…
www.securityvitamins.com
How can you as a bank
protect your customers and
yourself?
CENTAGATE (Centralized
Authentication Gateway) is an on-
demand identification and access
management services that enable
...
N1.1
N1.2
N1.3 Machine Learning
Transaction & Authentication Specific
Hybrid Model
Rules Based & Case Based
Openness
Hybri...
Implement Server-to-Server
Authentication using PKI
What is PKI?
Public Key Infrastructure
Public Key
Private Key
What is a Certificate Authority?
SECRET
MARY’S
Public Key
IDEAL WORLD
MESSAGE
+
ENCRYPTED
MESSAGE
REAL WORLD
SECRET
Fake
MARY’S
Public Key
MESSAGE
+
ENCRYPTED
MESSAGE
MARY’S
Public Key
MODIFIED
ENCRYPTED
MESSAGE
+
HOW TO SOLVE PROBLEM?
SECRET
MESSAGE
+
ENCRYPTED
MESSAGE
MARY’S
Public Key
We are
going round
in circle!
PROBLEM SOLVED
CPS & CP
CERTIFICATE
AUTHORITY
Diffie-Hellman Key Exchange Explained
Why banks should use
digital certificates?
Your typical server room scene
How many servers do you have?
How many servers are talking to each
other?
Which server is talking to which server?
How do you take control of your
serve...
Assign each server a digital certificate
Digital Certificates Provides
Identity to each server
Expiry date
How much does
it cost?
Wow! So
expensive!
Become my own CA!
Next generation PKI
51
Why a PKI Appliance?
• Make deployments easier and faster
• Minimize installation/integration efforts
• Lower the TCO w...
A PKI Appliance Gives You...
• Overview of all your servers in your data centre
• Better security via Server-to-Server aut...
?
Questions?
SecureMetric Technology Group
Lim Chin Wan
Mobile : +6 016 261 8925
Office : +603 8996 8225
chinwan@securemetri...
How To Rob A Bank In The 21st Century - PKI Version
How To Rob A Bank In The 21st Century - PKI Version
How To Rob A Bank In The 21st Century - PKI Version
How To Rob A Bank In The 21st Century - PKI Version
How To Rob A Bank In The 21st Century - PKI Version
How To Rob A Bank In The 21st Century - PKI Version
How To Rob A Bank In The 21st Century - PKI Version
Upcoming SlideShare
Loading in …5
×

How To Rob A Bank In The 21st Century - PKI Version

700 views

Published on

PKI Appliance from PrimeKey.

Published in: Technology
  • Be the first to comment

How To Rob A Bank In The 21st Century - PKI Version

  1. 1. How To Rob A Bank In The 21st Century March 2015 Lim Chin Wan
  2. 2. Have you ever wanted to rob a bank?
  3. 3. DOING IT THE OLD SCHOOL WAY?
  4. 4. Hacking A Bank Is Easy Because We’re All Humans!
  5. 5. I think you should meet someone…
  6. 6. This is Yuri. In 2012, he and his “anonymous” friends hacked major bank. In 2013, they hacked credit card company and bought a BMW.
  7. 7. Last year, Yuri hit a major telco with the secret keys provided by a disgruntled employee. Then Yuri went on a nice 2 month long vacation in the Caribbean Islands.
  8. 8. Banks and telcos all used “State of the Art” encryption… yet they were still hacked!
  9. 9. So how does Yuri do it?
  10. 10. “Usually, I just find one disgruntled employee. Just one.”
  11. 11. Don’t Believe Me? Let’s Play A Game…
  12. 12. Can Anyone Tell Me Who These People Are?
  13. 13. Heidi KlumJessica Alba
  14. 14. Britney Spears
  15. 15. Christina Aguilera
  16. 16. Scarlett Johansson Kate Winslet
  17. 17. Jon Bon Jovi
  18. 18. RATED TOP 20 MOST DANGEROUS CELEBRITIES IN 2014 BY McAfee
  19. 19. 18.19%
  20. 20. Because your users are your weakest link…
  21. 21. They are your customers… They are your Employees... They are your vendors…
  22. 22. Regular Training…
  23. 23. www.securityvitamins.com
  24. 24. How can you as a bank protect your customers and yourself?
  25. 25. CENTAGATE (Centralized Authentication Gateway) is an on- demand identification and access management services that enable cloud-based services to adopt strong multi-factor authentication seamlessly. This is a perfect solution for enterprise applications that are now rapidly moving to a secure, cloud-based services. Next-Gen Adaptive Intelligent Authentication Platform
  26. 26. N1.1 N1.2 N1.3 Machine Learning Transaction & Authentication Specific Hybrid Model Rules Based & Case Based Openness Hybrid Adaptive Intelligence Scoring Engine
  27. 27. Implement Server-to-Server Authentication using PKI
  28. 28. What is PKI?
  29. 29. Public Key Infrastructure Public Key Private Key
  30. 30. What is a Certificate Authority?
  31. 31. SECRET MARY’S Public Key IDEAL WORLD MESSAGE + ENCRYPTED MESSAGE
  32. 32. REAL WORLD SECRET Fake MARY’S Public Key MESSAGE + ENCRYPTED MESSAGE MARY’S Public Key MODIFIED ENCRYPTED MESSAGE +
  33. 33. HOW TO SOLVE PROBLEM? SECRET MESSAGE + ENCRYPTED MESSAGE MARY’S Public Key
  34. 34. We are going round in circle!
  35. 35. PROBLEM SOLVED CPS & CP CERTIFICATE AUTHORITY
  36. 36. Diffie-Hellman Key Exchange Explained
  37. 37. Why banks should use digital certificates?
  38. 38. Your typical server room scene How many servers do you have?
  39. 39. How many servers are talking to each other? Which server is talking to which server? How do you take control of your servers? How many vendors do you have logged onto your servers?
  40. 40. Assign each server a digital certificate
  41. 41. Digital Certificates Provides Identity to each server Expiry date
  42. 42. How much does it cost?
  43. 43. Wow! So expensive!
  44. 44. Become my own CA! Next generation PKI
  45. 45. 51 Why a PKI Appliance? • Make deployments easier and faster • Minimize installation/integration efforts • Lower the TCO with simplified management and maintenance • Provide one source for Software/Hardware stack
  46. 46. A PKI Appliance Gives You... • Overview of all your servers in your data centre • Better security via Server-to-Server authentication • Control over who can access your servers • Easy management of your server access
  47. 47. ?
  48. 48. Questions? SecureMetric Technology Group Lim Chin Wan Mobile : +6 016 261 8925 Office : +603 8996 8225 chinwan@securemetric.com Formula for Strong Digital Security sales@securemetric.com www.securemetric.com

×