SlideShare a Scribd company logo
1 of 18
Download to read offline
Looking at Information
Security from different
    perspectives

         Edgard Chammas
           University Of Balamand


   Byblos Startup Weekend – March 1, 2013
Outline
* How users see it?
* How hackers see it?
* How developers see it?
* How companies see it?
* How the media sees it?
* How governments see it?
* The current state in Lebanon
* Some security incidents and facts in Lebanon
* For a better digital Lebanon
How users see it?
* Not all people have a good technical background
* Most of them are not security aware
* They are prone to attacks such as “Social Engineering”
* Security is always an end-to-end solution
   => If you fail at any point, you FAIL!
* Securing a process from Source to Sink is a big challenge
   => You can't blame Facebook when your password is your
      phone number :)
* Security awareness for users is inevitable
How hackers see it?
* Simply. It's a “game”
* They can be any anyone. No exceptions.
* They are human => prone to errors
* But, they have an advantage over you
   => They think “out of the box”
   => A single bug is enough for a hacker to break in
* Security is a chain; it's only as secure as the weakest link
* Relying on the fact that nothing is 100% secure
* They seek for vulnerabilities that can be exploited to pwn you!
How hackers see it?
How developers see it?
* It's hard to build a product that meets security standards
* Some developers aren't security aware
   => Sometimes it is not enough to just look “sexy”
* Some developers tend to secure their product at the testing stage
   => You will FAIL! Especially in big and complex systems
* Some of them take the role of a penetration tester
   => Can psychologists diagnose their own mental health
       problems? No.
* Some of them adopt Security Through obscurity practices
Security Through Obscurity depicted...
`

     How companies see it?
    * Companies only care about making profit
    * They start investing in security as soon as they realize they risk
       loosing money
       => This often happens right after a security incident
    * Big companies invest millions of dollars to secure their Infrastructure
       against all know attacks
       Q: What about 0-day attacks?
       A: Proactive solutions? Hmm...
    * Some of them went further by creating “Bug Bounty” programs!
`

    Facebook Bug Bounty program
`

     How the media sees it?
    * It says the truth most of the times
    * Most of the times it goes wrong on details
    * Nevertheless, It does the job of highlighting security incidents
       => Pushing companies and governments to improve security
    * Sometimes it goes mad. It abuses security for other purposes
       => You most probably heard of WikiLeaks
           => Most of its leaks donors are hackers
    * Obviously, the media is part of the “game”
`

     How the governments see it?
    * They want to know everything about anyone
    * But they absolutely don't want you to get into their business
       => Wikileaks for governments, is what Jerry is to Tom
    * They hire hackers of different colors (the good and the bad)
       1) to take care of internal security
       2) or take part of the global cyber war
           => Haven't you heard of Flame, Duqu and Stuxnet? ;)
    * Now we have a war taking place on the internet!
       => It's not a cold war. A real one!
`

     The current state in Lebanon
    * Poor security!
    * Leading companies and parties in the public and private sectors
       (internet, telecommunication, education, e-commerce,
       financial... etc) are vulnerable to primitive and basic types of
       attacks
       => Absence of minimal security measures
    * This tragic state is influencing the outcome of the internet while it
       was essentially made for our benefits
       => We need a move!
`

    Some security incidents and facts in Lebanon
    * Good amount of bad security practices by the major ISPs
    * WEP can be cracked in 5 minutes. But some deployed routers
       passwords can be retrieved instantly with a small Python code
       => Privacy invasion, abuse of the internet resources
    * Clone a DSL router configuration in Saida, connect it in Batroun
       then hack everyone without a proxy ^^
       => The next day you hear about the cyber crime team
       investigating in Saida
`

     Some security incidents and facts in Lebanon
    * Clone your SIM card, appear in two different locations at the
       same time and no one cares (+1 for Telecom companies)
       => National Security agencies, good luck
       trying to track foreign agents and terrorists
       when they use time machine


    * A database containing thousands of phone numbers information
       and their IMSIs has been leaked online
       => Tracking mobile users for fun and profit!
`

    Some security incidents and facts in Lebanon
    * One of the biggest companies for online e-commerce having its
       admin panel login page injectable via 'OR 1=1--
       => Information disclosure and compromise of
       hundreds of credit cards


    * Serious vulnerabilities in Telecom companies web services
       => Privacy invasion, and abuse of web and mobile services
    * A number of government websites main pages defaced
       => 4 shared-hosting servers, hundreds of websites penetrated
`

    Some security incidents and facts in Lebanon
    * We keep hearing about local websites being hacked
       => among them are for media, universities and big parties...
    * Some ISP companies are abusing customer's data traffic
       => eg: hijacking Facebook accounts
    * Tried to approach a number of big Lebanese companies about
       security weaknesses in their systems
       => No reply. Silence. They don't care?!
`

     For a better digital Lebanon
    * Need for a cyber crime law
    * Need for skilled personnel at the different parties involved in
       cyber crime in Lebanon
    * Need for a good coordination between the ISPs and the
       government agencies
    * Need obligations by the government on ISPs about a clear and
       strict policy for their operation
    * Where is the media? We need awareness!
    * Need a call for a Lebanese Hacking group. Are you in?
`




              Thank You!


    Looking forward to see you at the
       Web Security Workshop :)

More Related Content

What's hot

CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCEanthony4web
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityAjay Singh
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get InterestingIBM Security
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.Niloy Biswas
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyPELUMI APANTAKU
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research PaperWhitney Bolton
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacyGouthamXander
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital ageSaman Sara
 

What's hot (20)

Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Cyber crime.ppt
Cyber crime.pptCyber crime.ppt
Cyber crime.ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 

Similar to Looking at information security from different perspectives

Similar to Looking at information security from different perspectives (20)

Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
cyber crime
cyber crimecyber crime
cyber crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
CA_Module_1.pdf
CA_Module_1.pdfCA_Module_1.pdf
CA_Module_1.pdf
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
CA_Module_1.pptx
CA_Module_1.pptxCA_Module_1.pptx
CA_Module_1.pptx
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 

Recently uploaded

Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiRaviKumarDaparthi
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 

Recently uploaded (20)

Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 

Looking at information security from different perspectives

  • 1. Looking at Information Security from different perspectives Edgard Chammas University Of Balamand Byblos Startup Weekend – March 1, 2013
  • 2. Outline * How users see it? * How hackers see it? * How developers see it? * How companies see it? * How the media sees it? * How governments see it? * The current state in Lebanon * Some security incidents and facts in Lebanon * For a better digital Lebanon
  • 3. How users see it? * Not all people have a good technical background * Most of them are not security aware * They are prone to attacks such as “Social Engineering” * Security is always an end-to-end solution => If you fail at any point, you FAIL! * Securing a process from Source to Sink is a big challenge => You can't blame Facebook when your password is your phone number :) * Security awareness for users is inevitable
  • 4. How hackers see it? * Simply. It's a “game” * They can be any anyone. No exceptions. * They are human => prone to errors * But, they have an advantage over you => They think “out of the box” => A single bug is enough for a hacker to break in * Security is a chain; it's only as secure as the weakest link * Relying on the fact that nothing is 100% secure * They seek for vulnerabilities that can be exploited to pwn you!
  • 6. How developers see it? * It's hard to build a product that meets security standards * Some developers aren't security aware => Sometimes it is not enough to just look “sexy” * Some developers tend to secure their product at the testing stage => You will FAIL! Especially in big and complex systems * Some of them take the role of a penetration tester => Can psychologists diagnose their own mental health problems? No. * Some of them adopt Security Through obscurity practices
  • 8. ` How companies see it? * Companies only care about making profit * They start investing in security as soon as they realize they risk loosing money => This often happens right after a security incident * Big companies invest millions of dollars to secure their Infrastructure against all know attacks Q: What about 0-day attacks? A: Proactive solutions? Hmm... * Some of them went further by creating “Bug Bounty” programs!
  • 9. ` Facebook Bug Bounty program
  • 10. ` How the media sees it? * It says the truth most of the times * Most of the times it goes wrong on details * Nevertheless, It does the job of highlighting security incidents => Pushing companies and governments to improve security * Sometimes it goes mad. It abuses security for other purposes => You most probably heard of WikiLeaks => Most of its leaks donors are hackers * Obviously, the media is part of the “game”
  • 11. ` How the governments see it? * They want to know everything about anyone * But they absolutely don't want you to get into their business => Wikileaks for governments, is what Jerry is to Tom * They hire hackers of different colors (the good and the bad) 1) to take care of internal security 2) or take part of the global cyber war => Haven't you heard of Flame, Duqu and Stuxnet? ;) * Now we have a war taking place on the internet! => It's not a cold war. A real one!
  • 12. ` The current state in Lebanon * Poor security! * Leading companies and parties in the public and private sectors (internet, telecommunication, education, e-commerce, financial... etc) are vulnerable to primitive and basic types of attacks => Absence of minimal security measures * This tragic state is influencing the outcome of the internet while it was essentially made for our benefits => We need a move!
  • 13. ` Some security incidents and facts in Lebanon * Good amount of bad security practices by the major ISPs * WEP can be cracked in 5 minutes. But some deployed routers passwords can be retrieved instantly with a small Python code => Privacy invasion, abuse of the internet resources * Clone a DSL router configuration in Saida, connect it in Batroun then hack everyone without a proxy ^^ => The next day you hear about the cyber crime team investigating in Saida
  • 14. ` Some security incidents and facts in Lebanon * Clone your SIM card, appear in two different locations at the same time and no one cares (+1 for Telecom companies) => National Security agencies, good luck trying to track foreign agents and terrorists when they use time machine * A database containing thousands of phone numbers information and their IMSIs has been leaked online => Tracking mobile users for fun and profit!
  • 15. ` Some security incidents and facts in Lebanon * One of the biggest companies for online e-commerce having its admin panel login page injectable via 'OR 1=1-- => Information disclosure and compromise of hundreds of credit cards * Serious vulnerabilities in Telecom companies web services => Privacy invasion, and abuse of web and mobile services * A number of government websites main pages defaced => 4 shared-hosting servers, hundreds of websites penetrated
  • 16. ` Some security incidents and facts in Lebanon * We keep hearing about local websites being hacked => among them are for media, universities and big parties... * Some ISP companies are abusing customer's data traffic => eg: hijacking Facebook accounts * Tried to approach a number of big Lebanese companies about security weaknesses in their systems => No reply. Silence. They don't care?!
  • 17. ` For a better digital Lebanon * Need for a cyber crime law * Need for skilled personnel at the different parties involved in cyber crime in Lebanon * Need for a good coordination between the ISPs and the government agencies * Need obligations by the government on ISPs about a clear and strict policy for their operation * Where is the media? We need awareness! * Need a call for a Lebanese Hacking group. Are you in?
  • 18. ` Thank You! Looking forward to see you at the Web Security Workshop :)