SlideShare a Scribd company logo
Presented by ebusinessmantra at
Online Security and Privacy Issues
www.ebusinessmantra.com
Presented by ebusinessmantra at
ecommerce Conference at Umass Dartmouth, MA
April 19, 2013
Agenda
 (In)Security Landscape
 It’s all business
 What is your identity worth?
 How does it work on the web?
 Does it matter to SMB?
Problem
www.ebusinessmantra.com
 Does it matter to SMB?
 Myths about security
 Vulnerability Exploits (Hacking 101) Demo
 SQL Injection, XSS, Google Hacking
 How do you minimize the risk?
 Security Tools - Demo
 Discussions
ProblemSolution
About ebusinessmantra
 WebApplication Security Consultants
 Assess and recommend security solutions
 Through partnerships, we offer:
 WebApplication Security Scanner
 WebApplication Firewalls
www.ebusinessmantra.com
 WebApplication Firewalls
 Database Firewalls
 File Systems Monitoring
 Training and eLearning (in process)
 Customers: *.mil, *.gov, *edu , *.org, *.com
 Web Site Design and Development (past)
(In)Security Landscape
 Number of incidents of data breaches reaches new record in
2012
www.ebusinessmantra.com
(In)Security Landscape
www.ebusinessmantra.com
(In)Security Landscape
Web + Hacking
= 37% of all
incidents
www.ebusinessmantra.com
Top 10 security breaches of 2012
 Wyndham Hotels – 600,000 credit cards #s stored in plain text, $10.5
billion in fraudulent transactions
 Yahoo – 400,000 passwords stored in plain text (SQL injection)
 Apple – 11 million Unique Device Identifiers - access user names, devices
names, cell phone numbers and addresses
 Global Payments – 1.5 million credit card numbers withTrack 2 data used
www.ebusinessmantra.com
 Global Payments – 1.5 million credit card numbers withTrack 2 data used
to clone credit cards
 Ghostshell - Hactivist Group stole account information for 1.6 government
and contractors
 LinkedIn – 6.5 million (hashed) passwords – published on web
 Nationwide and Allied Insurance Co. – 1.1 million applicants’ info
 South Carolina DOR – 3.8 million tax records
 Zappos – 24 million customer data
 Government Sector – 94 million Personal Identifiable Information (PII)
In the news…
www.ebusinessmantra.com
In the news...
www.ebusinessmantra.com
Cybercrime is on the rise
www.ebusinessmantra.com
In the news…
www.ebusinessmantra.com
Business of cybercrime
 Cybercrime is a highly organized, well run profitable business
 Hierarchal structure - specialists
 Programmer, Hackers, Distributors, Hosting Providers, Money
Mule, Cashiers,Tellers (FBI classification)
www.ebusinessmantra.com
Mule, Cashiers,Tellers (FBI classification)
Extortion
www.ebusinessmantra.com
Fraudulent tax returns
 Alabama: 1000 false returns for $1.7 million
 LA County: 65 false returns for $358,000
www.ebusinessmantra.com
 Fort Lauderdale: 2000 false tax returns were filed from
10/2010 - 6/2012 for $11 million.
Your identity @ bargain price…
Fullz Info USAType A
package
# of records Price/record
Full Name
Email address + password
PhysicalAddress
Phone Number
1- 499 0.25
500 - 4999 0.22
5000 - 9999 0.18
www.ebusinessmantra.com
Phone Number
DOB, SSN, DL Numbers
Bank Name,Account number
+ routing number
Employer's name + # years of
employment
10000 - 16499 0.16
Fullz Info USAType B package includes mother’s maiden name.
Web site claims to have 99 to 100% of people in US in their database and have most
upto date database.
Typical Offers on Black Market - Price List
Products Price
Credit card details $2 - $90
Physical credit cards $190 + cost of details
Card cloners $200 - $1000
Bank credentials $80 to $700 (with guaranteed balance)
www.ebusinessmantra.com
Bank credentials $80 to $700 (with guaranteed balance)
Bank transfers and cashing checks from 10% to 40% of total
Online stores and pay platforms $80 - $1500 with guaranteed balance
(In)Security Landscape
 Pretty grim, sobering landscape!
 Notable web sites have been hacked (Govt.,
security firms, banks)
 Many are not reported and many more do not
know they are being hacked. Your web site might
www.ebusinessmantra.com
know they are being hacked. Your web site might
have been hacked and you may be unaware of it.
 Organized crimes, blackmail/extortion,
defraud IRS
 High costs to remediate: $90 - $300 per
record, plus lost business, tangible and
intangible losses
How does it work on the web?
 Hackers exploit vulnerabilities in the code
 to steal data
 to make you, web site users, do things that you did not intend to
 to distribute and install malware, ransom-ware, in general, bad-
ware
www.ebusinessmantra.com
ware
 Monitor your activities on the computer, web site and report data
We are Small Business, it does not matter
to us…
 S&M are most vulnerable because they don’t have resources that
large organizations have.
 Your site could be used to launch or distribute malware
www.ebusinessmantra.com
Your site could be used to launch or distribute malware
 You may not think you are at risk – but actually you could be –
usingWordPress or some other platform which may be
vulnerable
 Google search for vulnerabilities inWordPress site.
We don’t have anything of value on our
web site…
 Even if you don’t believe you have anything of value on your website, it
could be used as a means for malicious acts. Here are some negative side-
effects:
 Credibility
www.ebusinessmantra.com
 Block -Your business website could be blocked by your Internet service provider
or even Google, Bing, and other search engines.
 http://www.google.com/safebrowsing/diagnostic?site=domainname
 Blacklisting -Your email address or entire domain could be blacklisted by spam
filtering services.
 http://www.spamhaus.org: Track internet spam senders and spam services and provide real-time anti-
spam protection and to identify and pursue spammers worldwide
 Time and money - remediation
Myths about security
 We have SSL (https) on my web site
 Our network has firewalls
 Our site is password protected
 Our developers will deal with security
www.ebusinessmantra.com
 Our developers will deal with security
 Our OS and software are upto date and patched
 These are essential but none of these protect your web site from
being hacked.
Are you chasing the mice or protecting the
cheese?
www.ebusinessmantra.com
Web Application Model
www.ebusinessmantra.com
• Attack passes as normal traffic through ports 80 & 443
• SSL, Network, OS securities cannot protect web applications
Vulnerability Exploits - Hacking 101
 Demo
 SQL Injection
 Cross Site Scripting
 Google Hacking
www.ebusinessmantra.com
Injection Attack
 Very widely used by hackers and is one of the top 10
vulnerabilities in web applications
 SQL Injection Attack Demo
www.ebusinessmantra.com
Cross Site Scripting Attack
 Another very frequently used attack method - Demo
www.ebusinessmantra.com
Google hacking demo
 Have you Googled yourself or your business?
 Advance Google search –
 Demo
 inurl:admin intext:username=AND email=AND password= OR pass=
filetype:xls
www.ebusinessmantra.com
filetype:xls
 "your password is" filetype:txt
 Tools that can do the search for you - demo
How do you minimize risk?
 Awareness
 All stakeholders must recognize the risks and work towards mitigation
 Culture within the organization, mandate from the management
 Examples – IT (network security), coders (perplexed), management (state of
denial), users (unsafe browsing, cool sites!)
 Develop security strategy
 Secure Coding Practices during SDLC
 Developers need to understand the threats; write secure code; follow
www.ebusinessmantra.com
 Developers need to understand the threats; write secure code; follow
published guidelines
 Resource Intensive: time and $ - training, coding, testing
 QA
 During all stages of application development life cycle
 At regular intervals while in production
 Web Application Scanning, static code analysis
 Monitoring
 Web Application Scanning (demo)
 Web Application Firewall
 Database Firewall
 Compliance
Security Strategy
 Web Site Scanning
 Snapshot of vulnerabilities (new vulnerabilities), fix
vulnerabilities, and install patches
 Web Application Firewall
 Real time, continuous
 Set policies to alerts and/or block attacks
www.ebusinessmantra.com
 Set policies to alerts and/or block attacks
 Virtual patch from scanning results
 Block traffic from certain region
 Database Firewall
 Data Protection
 Set policies to alert and/or block attacks
 (Prevent) Internal and external threats
 Secured Hosting
PCI Requirements for Credit Cards
www.ebusinessmantra.com
OWASP Top 10 vulnerabilities – set by
worldwide security experts
www.ebusinessmantra.com
Section 6 of PCI DSS
www.ebusinessmantra.com
PCI DSS Requirements – web related
www.ebusinessmantra.com
Security Tools
 WebApplication Scanner
 WebApplication Firewall
 Database Firewall
www.ebusinessmantra.com
 Database Firewall
 Secured Hosting
Demo – Vulnerability Scanning
www.ebusinessmantra.com
How can we help…
 Security Assessment
 Develop a strategy
 Implement strategy
 Training
www.ebusinessmantra.com
 Training
Take away
 Web presence and doing business on web is essential
 Security should also be part of the web strategy
 Internal and external threats
 Develop a strategy for securing data
www.ebusinessmantra.com
 Develop a strategy for securing data
 Take action
 Call us if you need help with securing your digital assests.
Discussions
www.ebusinessmantra.com
References
 2012-DataBreachQuickView by Risk Based Security
 The Cyber Crime Black Market – by Panda Security
 Web Sites:
 http://www.crn.com/slide-shows/security/240144596/the-top-10-security-breaches-of-2012.htm
 http://www.esecurityplanet.com/network-security/salem-state-university-suffers-security-breach.html
 http://datalossdb.org/incident_highlights/58-nothing-is-certain-but-death-taxes-and-identity-theft
 http://www.securityweek.com/economic-update-cybercrime-economy-current-prices-black-market
http://www.sbnonline.com/2012/01/your-personally-identifiable-information-it%E2%80%99s-valuable-
www.ebusinessmantra.com
 http://www.sbnonline.com/2012/01/your-personally-identifiable-information-it%E2%80%99s-valuable-
to-someone/
 http://it.toolbox.com/blogs/managing-infosec/google-hacking-master-list-28302
 http://stopbadware.org
 http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1761937/
 http://www.howcast.com/guides/593-How-to-Maintain-Internet-Security-and-Privacy
 http://www.ftc.gov/bcp/menus/consumer/tech/privacy.shtm
 http://www.whitehouse.gov/files/documents/cyber/National%20Cyber%20Security%20Alliance%20-
%20Harris+Online+Security+and+Privacy+Study.pdf
Resources
 OWASP www.owasp.org
 Dataloss www.dataloss.org
 Calculate your risk: https://databreachcalculator.com
 Ebusinessmantra www.ebusinessmantra.com
www.ebusinessmantra.com
 Ebusinessmantra www.ebusinessmantra.com

More Related Content

What's hot

Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"Jeremiah Grossman
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliabilitycaca1009
 
Content Management System Security
Content Management System SecurityContent Management System Security
Content Management System Security
Samvel Gevorgyan
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
Quick Heal Technologies Ltd.
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
John Ryan
 
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businesses
ntoscano50
 
Web security presentation
Web security presentationWeb security presentation
Web security presentation
John Staveley
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
Carol Montgomery Adams
 
10 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 202110 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 2021
insightscare
 
Websecurity fundamentals for beginners
Websecurity fundamentals for beginnersWebsecurity fundamentals for beginners
Websecurity fundamentals for beginners
Samvel Gevorgyan
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
Advanced monitoring
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
Carol Meng-Shih Wang
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification course
NishaPaunikar1
 
Hack miami emiliocasbas
Hack miami emiliocasbasHack miami emiliocasbas
Hack miami emiliocasbasEmilio Casbas
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
cat509
 
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Amazon Web Services
 
When thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksWhen thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacks
Sangram Gayal
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
NetLockSmith
 
Web security leeds sharp dot netnotts
Web security leeds sharp dot netnottsWeb security leeds sharp dot netnotts
Web security leeds sharp dot netnotts
John Staveley
 
Knowbe4 presentation
Knowbe4 presentationKnowbe4 presentation
Knowbe4 presentation
Md Mofijul Haque
 

What's hot (20)

Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
Content Management System Security
Content Management System SecurityContent Management System Security
Content Management System Security
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
 
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businesses
 
Web security presentation
Web security presentationWeb security presentation
Web security presentation
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 
10 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 202110 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 2021
 
Websecurity fundamentals for beginners
Websecurity fundamentals for beginnersWebsecurity fundamentals for beginners
Websecurity fundamentals for beginners
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification course
 
Hack miami emiliocasbas
Hack miami emiliocasbasHack miami emiliocasbas
Hack miami emiliocasbas
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
 
When thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksWhen thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacks
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Web security leeds sharp dot netnotts
Web security leeds sharp dot netnottsWeb security leeds sharp dot netnotts
Web security leeds sharp dot netnotts
 
Knowbe4 presentation
Knowbe4 presentationKnowbe4 presentation
Knowbe4 presentation
 

Similar to Online Security and Privacy Issues

Cyber security considerations for Small and Medium Businesses
Cyber security considerations for Small and Medium BusinessesCyber security considerations for Small and Medium Businesses
Cyber security considerations for Small and Medium Businesses
ebusinessmantra
 
Cybersecurity Threats Web Developers Must Know.pptx
Cybersecurity Threats Web Developers Must Know.pptxCybersecurity Threats Web Developers Must Know.pptx
Cybersecurity Threats Web Developers Must Know.pptx
Master Infotech
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
NetWatcher
 
Website Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your WebsiteWebsite Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your Website
WebGuru Infosystems Pvt. Ltd.
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
NetWatcher
 
Ecommerce(2)
Ecommerce(2)Ecommerce(2)
Ecommerce(2)ecommerce
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
Melbourne IT
 
Make Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your FavorMake Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your Favor
David Perkins
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdf
NirGoldstein5
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
DWP Information Architects Inc.
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
Inspiring Women
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
WebSitePulse
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
SensePost
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdf
arri2009av
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
Daniel Versola
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Nick Galbreath
 
securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdf
ssuser6c59cb
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 

Similar to Online Security and Privacy Issues (20)

Cyber security considerations for Small and Medium Businesses
Cyber security considerations for Small and Medium BusinessesCyber security considerations for Small and Medium Businesses
Cyber security considerations for Small and Medium Businesses
 
Cybersecurity Threats Web Developers Must Know.pptx
Cybersecurity Threats Web Developers Must Know.pptxCybersecurity Threats Web Developers Must Know.pptx
Cybersecurity Threats Web Developers Must Know.pptx
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
Website Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your WebsiteWebsite Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your Website
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Ecommerce(2)
Ecommerce(2)Ecommerce(2)
Ecommerce(2)
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
Make Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your FavorMake Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your Favor
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdf
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdf
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
Cyber security
Cyber securityCyber security
Cyber security
 
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
 
securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdf
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 

Recently uploaded

The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 

Recently uploaded (20)

The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 

Online Security and Privacy Issues

  • 1. Presented by ebusinessmantra at Online Security and Privacy Issues www.ebusinessmantra.com Presented by ebusinessmantra at ecommerce Conference at Umass Dartmouth, MA April 19, 2013
  • 2. Agenda  (In)Security Landscape  It’s all business  What is your identity worth?  How does it work on the web?  Does it matter to SMB? Problem www.ebusinessmantra.com  Does it matter to SMB?  Myths about security  Vulnerability Exploits (Hacking 101) Demo  SQL Injection, XSS, Google Hacking  How do you minimize the risk?  Security Tools - Demo  Discussions ProblemSolution
  • 3. About ebusinessmantra  WebApplication Security Consultants  Assess and recommend security solutions  Through partnerships, we offer:  WebApplication Security Scanner  WebApplication Firewalls www.ebusinessmantra.com  WebApplication Firewalls  Database Firewalls  File Systems Monitoring  Training and eLearning (in process)  Customers: *.mil, *.gov, *edu , *.org, *.com  Web Site Design and Development (past)
  • 4. (In)Security Landscape  Number of incidents of data breaches reaches new record in 2012 www.ebusinessmantra.com
  • 6. (In)Security Landscape Web + Hacking = 37% of all incidents www.ebusinessmantra.com
  • 7. Top 10 security breaches of 2012  Wyndham Hotels – 600,000 credit cards #s stored in plain text, $10.5 billion in fraudulent transactions  Yahoo – 400,000 passwords stored in plain text (SQL injection)  Apple – 11 million Unique Device Identifiers - access user names, devices names, cell phone numbers and addresses  Global Payments – 1.5 million credit card numbers withTrack 2 data used www.ebusinessmantra.com  Global Payments – 1.5 million credit card numbers withTrack 2 data used to clone credit cards  Ghostshell - Hactivist Group stole account information for 1.6 government and contractors  LinkedIn – 6.5 million (hashed) passwords – published on web  Nationwide and Allied Insurance Co. – 1.1 million applicants’ info  South Carolina DOR – 3.8 million tax records  Zappos – 24 million customer data  Government Sector – 94 million Personal Identifiable Information (PII)
  • 10. Cybercrime is on the rise www.ebusinessmantra.com
  • 12. Business of cybercrime  Cybercrime is a highly organized, well run profitable business  Hierarchal structure - specialists  Programmer, Hackers, Distributors, Hosting Providers, Money Mule, Cashiers,Tellers (FBI classification) www.ebusinessmantra.com Mule, Cashiers,Tellers (FBI classification)
  • 14. Fraudulent tax returns  Alabama: 1000 false returns for $1.7 million  LA County: 65 false returns for $358,000 www.ebusinessmantra.com  Fort Lauderdale: 2000 false tax returns were filed from 10/2010 - 6/2012 for $11 million.
  • 15. Your identity @ bargain price… Fullz Info USAType A package # of records Price/record Full Name Email address + password PhysicalAddress Phone Number 1- 499 0.25 500 - 4999 0.22 5000 - 9999 0.18 www.ebusinessmantra.com Phone Number DOB, SSN, DL Numbers Bank Name,Account number + routing number Employer's name + # years of employment 10000 - 16499 0.16 Fullz Info USAType B package includes mother’s maiden name. Web site claims to have 99 to 100% of people in US in their database and have most upto date database.
  • 16. Typical Offers on Black Market - Price List Products Price Credit card details $2 - $90 Physical credit cards $190 + cost of details Card cloners $200 - $1000 Bank credentials $80 to $700 (with guaranteed balance) www.ebusinessmantra.com Bank credentials $80 to $700 (with guaranteed balance) Bank transfers and cashing checks from 10% to 40% of total Online stores and pay platforms $80 - $1500 with guaranteed balance
  • 17. (In)Security Landscape  Pretty grim, sobering landscape!  Notable web sites have been hacked (Govt., security firms, banks)  Many are not reported and many more do not know they are being hacked. Your web site might www.ebusinessmantra.com know they are being hacked. Your web site might have been hacked and you may be unaware of it.  Organized crimes, blackmail/extortion, defraud IRS  High costs to remediate: $90 - $300 per record, plus lost business, tangible and intangible losses
  • 18. How does it work on the web?  Hackers exploit vulnerabilities in the code  to steal data  to make you, web site users, do things that you did not intend to  to distribute and install malware, ransom-ware, in general, bad- ware www.ebusinessmantra.com ware  Monitor your activities on the computer, web site and report data
  • 19. We are Small Business, it does not matter to us…  S&M are most vulnerable because they don’t have resources that large organizations have.  Your site could be used to launch or distribute malware www.ebusinessmantra.com Your site could be used to launch or distribute malware  You may not think you are at risk – but actually you could be – usingWordPress or some other platform which may be vulnerable  Google search for vulnerabilities inWordPress site.
  • 20. We don’t have anything of value on our web site…  Even if you don’t believe you have anything of value on your website, it could be used as a means for malicious acts. Here are some negative side- effects:  Credibility www.ebusinessmantra.com  Block -Your business website could be blocked by your Internet service provider or even Google, Bing, and other search engines.  http://www.google.com/safebrowsing/diagnostic?site=domainname  Blacklisting -Your email address or entire domain could be blacklisted by spam filtering services.  http://www.spamhaus.org: Track internet spam senders and spam services and provide real-time anti- spam protection and to identify and pursue spammers worldwide  Time and money - remediation
  • 21. Myths about security  We have SSL (https) on my web site  Our network has firewalls  Our site is password protected  Our developers will deal with security www.ebusinessmantra.com  Our developers will deal with security  Our OS and software are upto date and patched  These are essential but none of these protect your web site from being hacked.
  • 22. Are you chasing the mice or protecting the cheese? www.ebusinessmantra.com
  • 23. Web Application Model www.ebusinessmantra.com • Attack passes as normal traffic through ports 80 & 443 • SSL, Network, OS securities cannot protect web applications
  • 24. Vulnerability Exploits - Hacking 101  Demo  SQL Injection  Cross Site Scripting  Google Hacking www.ebusinessmantra.com
  • 25. Injection Attack  Very widely used by hackers and is one of the top 10 vulnerabilities in web applications  SQL Injection Attack Demo www.ebusinessmantra.com
  • 26. Cross Site Scripting Attack  Another very frequently used attack method - Demo www.ebusinessmantra.com
  • 27. Google hacking demo  Have you Googled yourself or your business?  Advance Google search –  Demo  inurl:admin intext:username=AND email=AND password= OR pass= filetype:xls www.ebusinessmantra.com filetype:xls  "your password is" filetype:txt  Tools that can do the search for you - demo
  • 28. How do you minimize risk?  Awareness  All stakeholders must recognize the risks and work towards mitigation  Culture within the organization, mandate from the management  Examples – IT (network security), coders (perplexed), management (state of denial), users (unsafe browsing, cool sites!)  Develop security strategy  Secure Coding Practices during SDLC  Developers need to understand the threats; write secure code; follow www.ebusinessmantra.com  Developers need to understand the threats; write secure code; follow published guidelines  Resource Intensive: time and $ - training, coding, testing  QA  During all stages of application development life cycle  At regular intervals while in production  Web Application Scanning, static code analysis  Monitoring  Web Application Scanning (demo)  Web Application Firewall  Database Firewall  Compliance
  • 29. Security Strategy  Web Site Scanning  Snapshot of vulnerabilities (new vulnerabilities), fix vulnerabilities, and install patches  Web Application Firewall  Real time, continuous  Set policies to alerts and/or block attacks www.ebusinessmantra.com  Set policies to alerts and/or block attacks  Virtual patch from scanning results  Block traffic from certain region  Database Firewall  Data Protection  Set policies to alert and/or block attacks  (Prevent) Internal and external threats  Secured Hosting
  • 30. PCI Requirements for Credit Cards www.ebusinessmantra.com
  • 31. OWASP Top 10 vulnerabilities – set by worldwide security experts www.ebusinessmantra.com
  • 32. Section 6 of PCI DSS www.ebusinessmantra.com
  • 33. PCI DSS Requirements – web related www.ebusinessmantra.com
  • 34. Security Tools  WebApplication Scanner  WebApplication Firewall  Database Firewall www.ebusinessmantra.com  Database Firewall  Secured Hosting
  • 35. Demo – Vulnerability Scanning www.ebusinessmantra.com
  • 36. How can we help…  Security Assessment  Develop a strategy  Implement strategy  Training www.ebusinessmantra.com  Training
  • 37. Take away  Web presence and doing business on web is essential  Security should also be part of the web strategy  Internal and external threats  Develop a strategy for securing data www.ebusinessmantra.com  Develop a strategy for securing data  Take action  Call us if you need help with securing your digital assests.
  • 39. References  2012-DataBreachQuickView by Risk Based Security  The Cyber Crime Black Market – by Panda Security  Web Sites:  http://www.crn.com/slide-shows/security/240144596/the-top-10-security-breaches-of-2012.htm  http://www.esecurityplanet.com/network-security/salem-state-university-suffers-security-breach.html  http://datalossdb.org/incident_highlights/58-nothing-is-certain-but-death-taxes-and-identity-theft  http://www.securityweek.com/economic-update-cybercrime-economy-current-prices-black-market http://www.sbnonline.com/2012/01/your-personally-identifiable-information-it%E2%80%99s-valuable- www.ebusinessmantra.com  http://www.sbnonline.com/2012/01/your-personally-identifiable-information-it%E2%80%99s-valuable- to-someone/  http://it.toolbox.com/blogs/managing-infosec/google-hacking-master-list-28302  http://stopbadware.org  http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1761937/  http://www.howcast.com/guides/593-How-to-Maintain-Internet-Security-and-Privacy  http://www.ftc.gov/bcp/menus/consumer/tech/privacy.shtm  http://www.whitehouse.gov/files/documents/cyber/National%20Cyber%20Security%20Alliance%20- %20Harris+Online+Security+and+Privacy+Study.pdf
  • 40. Resources  OWASP www.owasp.org  Dataloss www.dataloss.org  Calculate your risk: https://databreachcalculator.com  Ebusinessmantra www.ebusinessmantra.com www.ebusinessmantra.com  Ebusinessmantra www.ebusinessmantra.com