Security is Like a Chain...
as Strong as The Weakest link
90% cyber security implementation is inconsistent... :’(
XecureI...
© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
People: Unaware and Ignorance
“Amateur hacks the sys...
© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
People: Unaware and Ignorance
“Amateur hacks the sys...
Policies and Procedures
InconsistentInconsistent
UnclearUnclear
Technology Implementation
Completely Wrong :’(
Technology Implementation
Complete Failure :’(
Physical Cable Weakness
Technology Weakness
Border Gateway Protocol (BGP) Poisoning
Technology Vulnerability
“We are like sitting duck.”
Anti Malware is Ineffective
“Updated anti malware is ineffective.”
Anti Malware is Ineffective
“Malware is more stealthy.”
Targeted Attack
“Updated anti malware is useless.”
Government and Business Cooperation
© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
Government and Business
Cooperation
© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
Backdoor
Vendors: “Backdoors are critical
vulnerabil...
© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
Backdoor
Vendors: “Discovered hidden key is a
critic...
© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
Backdoor
Vendors: “Discovered hidden key is a
critic...
© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
Backdoor
Firmware
© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
Backdoor
Kill Switch
© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
End-Point
Malware in The Browser and ATM
Insider Attack
The enemy is “brought” inside by authorized people :’(
© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
The History of War
© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
The Cyberwar
© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
Mobile Device
© PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
Mobile Device
Upcoming SlideShare
Loading in …5
×

03. The Security Weakest Links

762 views

Published on

This presentation presentated by Gildas Deograt Lumy "Simulasi Scirital Information Infrastructure Protection (CIIP)" , Bandung, Indonesia 10th September 2013 on #IISF2013

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
762
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
105
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

03. The Security Weakest Links

  1. 1. Security is Like a Chain... as Strong as The Weakest link 90% cyber security implementation is inconsistent... :’( XecureIT © PT IMAN Teknologi InformasiThe Security Weakest Links v2.0
  2. 2. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 People: Unaware and Ignorance “Amateur hacks the systems. Professional hacks the people.”
  3. 3. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 People: Unaware and Ignorance “Amateur hacks the systems. Professional hacks the people.”
  4. 4. Policies and Procedures InconsistentInconsistent UnclearUnclear
  5. 5. Technology Implementation Completely Wrong :’(
  6. 6. Technology Implementation Complete Failure :’(
  7. 7. Physical Cable Weakness
  8. 8. Technology Weakness Border Gateway Protocol (BGP) Poisoning
  9. 9. Technology Vulnerability “We are like sitting duck.”
  10. 10. Anti Malware is Ineffective “Updated anti malware is ineffective.”
  11. 11. Anti Malware is Ineffective “Malware is more stealthy.”
  12. 12. Targeted Attack “Updated anti malware is useless.”
  13. 13. Government and Business Cooperation
  14. 14. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 Government and Business Cooperation
  15. 15. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 Backdoor Vendors: “Backdoors are critical vulnerabilities.”
  16. 16. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 Backdoor Vendors: “Discovered hidden key is a critical vulnerability.”
  17. 17. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 Backdoor Vendors: “Discovered hidden key is a critical vulnerability.”
  18. 18. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 Backdoor Firmware
  19. 19. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 Backdoor Kill Switch
  20. 20. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 End-Point Malware in The Browser and ATM
  21. 21. Insider Attack The enemy is “brought” inside by authorized people :’(
  22. 22. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 The History of War
  23. 23. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 The Cyberwar
  24. 24. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 Mobile Device
  25. 25. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0 Mobile Device

×