SlideShare a Scribd company logo
Information Security in the
Starbucks Generation
Anthony Lauro
Anthony.Lauro@dfwwireless.org
Overview
• What is security?
• Who are the threats?
• Know thy enemy
• Know thyself
• Emerging threats
• Plan of defense
• Security Management
• Defense in depth
What Is “Security”?
• “Freedom from risk or danger”*
• The application of safeguards to
prevent loss
• A subjective measurement of
preparedness for risk
• A feeling of safety 
* The American Heritage Dictionary of the English Language.
What is Risk?
• A potential for loss or harm
• An exposure to a threat
• Risk is subjective
• Dependent on situation and
circumstances
What’s the big deal?
• Loss of company assets
• Loss of revenue/market
share
• Loss of intellectual property
• Loss of privacy
• Damage to reputation
Who is a threat?
• Hackers
• Vandals
• Espionage
• Insiders
• Everyone*
* This depends on how paranoid you are.
Know Thy Enemy
Knowing your Enemy
Not knowing who the enemy is can be a bad thing
• Vietnam
• “War on Drugs”
• Vezzini - from The Princess Bride
Know Thyself
• "Well, cyberterrorists may be difficult to capture in the act,
but from what I know about people who are highly skilled
with computers, they should be easy to beat up."
– Ernest Cey, Speechwriter
• "You mean some hacker could disrupt the computerized
billing and record-keeping of my local phone company,
costing them millions of dollars? That's awesome."
– Frank Moreland, Piano Teacher
• "This is not a tool we should take seriously, or our customers
should take seriously..."
– Edmund Muth, Microsoft, as reported by the New York Times,
referring to Back Orifice.
History of the Hack
1960: The Dawn of Hacking
1970: Phone Phreaks and Cap'n
Crunch
1980: Hacker Message Boards and
Groups
1983: Kids' Games
1984: Hacker 'Zines- Birth of the 2600
group
1986: Use a Computer, Go to Jail
1988: The Morris Worm
1989: The Germans and the KGB
1990: Operation Sundevil
1993: Why Buy a Car When You Can
Hack One?
1994: Hacking Tools R Us
1995: The Mitnick Takedown
1997: Hacking AOL
1998: The Cult of Hacking and the
Israeli Connection
1999: Software Security Goes
Mainstream
2000: Service Denied (DDOS)
2001: DNS Attacks
Hacking is not that hard to do!
• Openly displayed information
• Easily available tools
• Dumpster Diving
• Shoulder Surfing
Search online, see what you find
• Go to http://neworder.box.sk/ and search for your favorite
operating system or program. Chances are it’s already been
hacked.
• Find tools to secure your network and test your system for
vulnerabilities. http://packetstorm.dnsi.info
• Tools and info on security research. http://blacksun.box.sk/
• News and Info on wireless hacking and security. Tools to
audit wireless networks. Home of the DFW Wireless Users
Group.
http://www.dfwwireless.org
• Daily news, vulnerability listings, and advisories.
http://www.net-security.org/
Resources
Social Engineering
• Using social interaction to get information
• Plays upon people’s good intentions
• Extremely effective in many situations
• Common ploys
– The Dumb User
– The VIP
– The Lost Puppy
– The Prize
Social Engineering
• Attempt to manipulate or trick a person into
providing information or access
• Bypass network security by exploiting human
vulnerabilities
• Human-based
– Impersonation
– Third-person authorization
• Computer-based
– Popup windows
– Mail attachments
Wireless Networks
• Different technology, same threat
• Out of sight out of mind
• “Gee Wiz” technology
• Increases attack accessibility
• Unauthorized clients
• Misconfigurations
Consumer Wireless Products
Local Area NetworkLocal Area Network
TechnologyTechnology
802.11 (FHSS) 2.4 GHz802.11 (FHSS) 2.4 GHz
1 Mbps1 Mbps
Freq. Hopped Spread SpectrumFreq. Hopped Spread Spectrum
802.11 (DSSS) 2.4 GHz802.11 (DSSS) 2.4 GHz
1 or 2 Mbps1 or 2 Mbps
Direct Sequence Spread SpectrumDirect Sequence Spread Spectrum
HiperlanHiperlan
23.5 Mbps23.5 Mbps
High Performance Radio LANHigh Performance Radio LAN
P802.11b (DSSS) 2.4 GHzP802.11b (DSSS) 2.4 GHz
11 Mbps11 Mbps
Direct Sequence Spread SpectrumDirect Sequence Spread Spectrum
P802.11a 5 GHzP802.11a 5 GHz
InitialInitial
ShipmentsShipments
InitialInitial
ShipmentsShipments
FinalFinal
SpecificationSpecification
SpecificationsSpecifications
ApprovedApproved
Initial MobileInitial Mobile
ShipmentsShipments
19991999 20002000 20012001 20022002 20032003
Q1Q1 Q2Q2 Q3Q3 Q4Q4 Q1Q1 Q2Q2 Q3Q3 Q4Q4 Q1Q1 Q2Q2 Q3Q3 Q4Q4 Q1Q1 Q2Q2 Q3Q3 Q4Q4 Q1Q1 Q2Q2 Q3Q3 Q4Q4
54 Mbps54 Mbps
Direct Sequence Spread SpectrumDirect Sequence Spread Spectrum
!! WIRELESS GONE WILD !!
Wireless Access Points
Wireless Usage Statistics
• 35.8% of Access points are
running with default
configurations
• 65% of networks are NOT
using WEP
Basic Security Management
Defense in Depth
• Administrative Controls
• Physical Controls
• System Access
• File Access
• Authorization Tables
• Transmission Protocols
• Encryption
My crime is that of curiosity. My crime is
that of judging people by what they say and
think, not what they look like. My crime is
that of outsmarting you, something that you
will never forgive me for.
Mentor – Hackers Manefisto

More Related Content

What's hot

Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivismBilal Ali
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
pavankumarmangena
 
Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?
Antonio Sanz Alcober
 
Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015
Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015
Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015
COIICV
 
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011
Tyler Shields
 
Earthmouse: Mobile Guardian
Earthmouse: Mobile GuardianEarthmouse: Mobile Guardian
Earthmouse: Mobile Guardian
earthmouse
 
Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13
Jorge Sebastiao
 
Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)
Tanja Drca
 
Staying Safe Online for HR Professionals
Staying Safe Online for HR ProfessionalsStaying Safe Online for HR Professionals
Staying Safe Online for HR Professionals
Ben Woelk, CISSP, CPTC
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
Kingfin Enterprises Limited
 
Why Risk Management is Impossible
Why Risk Management is ImpossibleWhy Risk Management is Impossible
Why Risk Management is Impossible
Richard Stiennon
 
Android vulnerability study
Android vulnerability studyAndroid vulnerability study
Android vulnerability study
Sri Harsha Pamu
 
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblinsDEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
Felipe Prado
 
Hacking Question and Answer
Hacking Question and Answer Hacking Question and Answer
Hacking Question and Answer
Greater Noida Institute Of Technology
 
Digital self defense
Digital self defenseDigital self defense
Digital self defense
Henrik Jacobsen
 
Catching imsi catchers
Catching imsi catchersCatching imsi catchers
Catching imsi catchers
Geoffrey Vaughan
 
Web Site Security
Web Site SecurityWeb Site Security
Web Site Security
NetStrategies
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
Andrew Delamarter
 
A Brief History of Cryptographic Failures
A Brief History of Cryptographic FailuresA Brief History of Cryptographic Failures
A Brief History of Cryptographic Failures
Nothing Nowhere
 

What's hot (20)

Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?
 
Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015
Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015
Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015
 
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011
 
Earthmouse: Mobile Guardian
Earthmouse: Mobile GuardianEarthmouse: Mobile Guardian
Earthmouse: Mobile Guardian
 
Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13
 
Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)
 
Staying Safe Online for HR Professionals
Staying Safe Online for HR ProfessionalsStaying Safe Online for HR Professionals
Staying Safe Online for HR Professionals
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
 
Why Risk Management is Impossible
Why Risk Management is ImpossibleWhy Risk Management is Impossible
Why Risk Management is Impossible
 
Android vulnerability study
Android vulnerability studyAndroid vulnerability study
Android vulnerability study
 
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblinsDEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
 
Hacking Question and Answer
Hacking Question and Answer Hacking Question and Answer
Hacking Question and Answer
 
Android
Android Android
Android
 
Digital self defense
Digital self defenseDigital self defense
Digital self defense
 
Catching imsi catchers
Catching imsi catchersCatching imsi catchers
Catching imsi catchers
 
Web Site Security
Web Site SecurityWeb Site Security
Web Site Security
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
A Brief History of Cryptographic Failures
A Brief History of Cryptographic FailuresA Brief History of Cryptographic Failures
A Brief History of Cryptographic Failures
 

Similar to Information security in the starbucks generation

hacking
hackinghacking
hacking
mayank1293
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
Er Mahendra Yadav
 
Hacking
HackingHacking
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
b coatesworth
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
Farwa Ansari
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial Sector
LIFARS
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocent
danish3
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
APNIC
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
Irvin Costa
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
RAKESH SHARMA
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
Madhusudhan G
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Rishab garg
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
Sibghatullah Khattak
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
rishirvk1995
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
dhumaletiku
 
Computer safety
Computer safetyComputer safety
Computer safety
Anaamorales27
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?
hackdemocracy
 

Similar to Information security in the starbucks generation (20)

hacking
hackinghacking
hacking
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
Hacking
HackingHacking
Hacking
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial Sector
 
Hacking
HackingHacking
Hacking
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocent
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

Information security in the starbucks generation

  • 1. Information Security in the Starbucks Generation Anthony Lauro Anthony.Lauro@dfwwireless.org
  • 2. Overview • What is security? • Who are the threats? • Know thy enemy • Know thyself • Emerging threats • Plan of defense • Security Management • Defense in depth
  • 3. What Is “Security”? • “Freedom from risk or danger”* • The application of safeguards to prevent loss • A subjective measurement of preparedness for risk • A feeling of safety  * The American Heritage Dictionary of the English Language.
  • 4. What is Risk? • A potential for loss or harm • An exposure to a threat • Risk is subjective • Dependent on situation and circumstances
  • 5. What’s the big deal? • Loss of company assets • Loss of revenue/market share • Loss of intellectual property • Loss of privacy • Damage to reputation
  • 6. Who is a threat? • Hackers • Vandals • Espionage • Insiders • Everyone* * This depends on how paranoid you are.
  • 8. Knowing your Enemy Not knowing who the enemy is can be a bad thing • Vietnam • “War on Drugs” • Vezzini - from The Princess Bride
  • 9. Know Thyself • "Well, cyberterrorists may be difficult to capture in the act, but from what I know about people who are highly skilled with computers, they should be easy to beat up." – Ernest Cey, Speechwriter • "You mean some hacker could disrupt the computerized billing and record-keeping of my local phone company, costing them millions of dollars? That's awesome." – Frank Moreland, Piano Teacher • "This is not a tool we should take seriously, or our customers should take seriously..." – Edmund Muth, Microsoft, as reported by the New York Times, referring to Back Orifice.
  • 10. History of the Hack 1960: The Dawn of Hacking 1970: Phone Phreaks and Cap'n Crunch 1980: Hacker Message Boards and Groups 1983: Kids' Games 1984: Hacker 'Zines- Birth of the 2600 group 1986: Use a Computer, Go to Jail 1988: The Morris Worm 1989: The Germans and the KGB 1990: Operation Sundevil 1993: Why Buy a Car When You Can Hack One? 1994: Hacking Tools R Us 1995: The Mitnick Takedown 1997: Hacking AOL 1998: The Cult of Hacking and the Israeli Connection 1999: Software Security Goes Mainstream 2000: Service Denied (DDOS) 2001: DNS Attacks
  • 11. Hacking is not that hard to do! • Openly displayed information • Easily available tools • Dumpster Diving • Shoulder Surfing
  • 12. Search online, see what you find
  • 13. • Go to http://neworder.box.sk/ and search for your favorite operating system or program. Chances are it’s already been hacked. • Find tools to secure your network and test your system for vulnerabilities. http://packetstorm.dnsi.info • Tools and info on security research. http://blacksun.box.sk/ • News and Info on wireless hacking and security. Tools to audit wireless networks. Home of the DFW Wireless Users Group. http://www.dfwwireless.org • Daily news, vulnerability listings, and advisories. http://www.net-security.org/ Resources
  • 14. Social Engineering • Using social interaction to get information • Plays upon people’s good intentions • Extremely effective in many situations • Common ploys – The Dumb User – The VIP – The Lost Puppy – The Prize
  • 15. Social Engineering • Attempt to manipulate or trick a person into providing information or access • Bypass network security by exploiting human vulnerabilities • Human-based – Impersonation – Third-person authorization • Computer-based – Popup windows – Mail attachments
  • 16. Wireless Networks • Different technology, same threat • Out of sight out of mind • “Gee Wiz” technology • Increases attack accessibility • Unauthorized clients • Misconfigurations
  • 17. Consumer Wireless Products Local Area NetworkLocal Area Network TechnologyTechnology 802.11 (FHSS) 2.4 GHz802.11 (FHSS) 2.4 GHz 1 Mbps1 Mbps Freq. Hopped Spread SpectrumFreq. Hopped Spread Spectrum 802.11 (DSSS) 2.4 GHz802.11 (DSSS) 2.4 GHz 1 or 2 Mbps1 or 2 Mbps Direct Sequence Spread SpectrumDirect Sequence Spread Spectrum HiperlanHiperlan 23.5 Mbps23.5 Mbps High Performance Radio LANHigh Performance Radio LAN P802.11b (DSSS) 2.4 GHzP802.11b (DSSS) 2.4 GHz 11 Mbps11 Mbps Direct Sequence Spread SpectrumDirect Sequence Spread Spectrum P802.11a 5 GHzP802.11a 5 GHz InitialInitial ShipmentsShipments InitialInitial ShipmentsShipments FinalFinal SpecificationSpecification SpecificationsSpecifications ApprovedApproved Initial MobileInitial Mobile ShipmentsShipments 19991999 20002000 20012001 20022002 20032003 Q1Q1 Q2Q2 Q3Q3 Q4Q4 Q1Q1 Q2Q2 Q3Q3 Q4Q4 Q1Q1 Q2Q2 Q3Q3 Q4Q4 Q1Q1 Q2Q2 Q3Q3 Q4Q4 Q1Q1 Q2Q2 Q3Q3 Q4Q4 54 Mbps54 Mbps Direct Sequence Spread SpectrumDirect Sequence Spread Spectrum
  • 18. !! WIRELESS GONE WILD !!
  • 20. Wireless Usage Statistics • 35.8% of Access points are running with default configurations • 65% of networks are NOT using WEP
  • 22. Defense in Depth • Administrative Controls • Physical Controls • System Access • File Access • Authorization Tables • Transmission Protocols • Encryption
  • 23. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. Mentor – Hackers Manefisto