SlideShare a Scribd company logo
1 of 49
Database Theft
A simple, easy to use, online, B2B procurement portal for
purchasing products and services to secure your data.
According to …


 In 2011 reported database thefts increased
       37% from the previous year.

                                       May 20012
Why ?
Supply & Demand

            2001
Name, Address DOB = £2.00

Credit card # = £2.00

Expiry date = £ 3.00

Security Code = £3.00                         2005
                 Total = £10.00   Name, Address DOB = £1.00

                                  Credit card # = £1.00

                                  Expiry date = £ 1.00
                                                                                2010
                                  Security Code = £2.00
                                                                    Name, Address DOB = £.25
                                                    Total = £5.00
                                                                    Credit card # = £.25

                                                                    Expiry date = £ .25

                                                                    Security Code = £.25

                                                                                     Total = £1.00
Cocktail Party Chat Up Line
#1


  In one week, the average person living in Britain
  has 3,254 pieces of personal information stored
          about him or her in databases.*
                                      *Evening Standard Survey August 2008
We live in
 societies that
collect data for
  data’s sake.
Cocktail Party Chat Up Line
#2



The average UK citizen is in over 750 databases.*
                               *UK Information Commissioner's' Report: “What Price Privacy?” 2009
Our Births, Marriages &
Deaths
Our Family
Our Ancestors
Our Preferences
Get a Life...
Our Credit
Our Friends
Our Enemies
Our Love Lives
Our Web Lives
Our Retirement
Our Deaths
Your identity data
 is big business.
How Do You Find One?
Tool of Choice

• Examines:
  – Every domain on the Internet
  – Every web page in your
    application ever (cached)

• Can locate:
  – Unsecured databases
  – Unsecured websites, URLs
  – Unsecured files & folders
Example:

• Oracle HTTP Servers
  – Provides functionality to query database using an HTTP
    form
  – Accessed using the URL /isqlplus
  – By default runs on any Oracle HTTP server installed with
    Oracle Applications Server or Oracle Database Server

• Easily identified by Google search:
   – Look for Oracle HTTP servers using the “allinurl”
     advanced search feature
Using Advanced Search
Search Results
Default
Username/Password
You’re In
Then Execute Any Query
The Biggest Threat?


       FBI/Computer Security Institute 2008:
  85% of all offenders prosecuted for cyber crimes were
           employees of the company attacked
How To Steal a Database

Removable media:             PDAs, USB flash drives,          iPods – digital cameras,
gaming consoles, write-able CDs DVDs etc.

Unauthorised connections:                       wireless, Bluetooth, infrared mobile
connections, modems, peer-to-peer, etc.

Unauthorised output devices:                      printers, faxes, photo copiers, etc

Unauthorised applications:                    MSN chat, web mail, malware, trojans,
key loggers, etc.

Unauthorised applications use:                        file, print, save as, print screen,
cut & paste, file sharing, search, import/export, print, rename etc.
Driving Forces

Demand for Pervasive Access
                                                                  Uncertain Economic Conditions
 From any place…
                                                                   Restructuring, downsizing, mergers,
 By anyone…                                                        acquisitions…
 Via any application…                                             Increase in disgruntled employees
 Increase in remote & 3rd party                                   Increased understanding that data = cash
  connections
                                                                  Result: increase in database thefts
Result: increase of privileged users




     Compliance Requirements                                        Compliance programs must be:
      Data apps must meet:                                            Transparent
         Confidentiality                                              Repeatable
         Integrity                                                    Demonstrable
         Availability

                          Result: compliance demands increase in privileged users
Our Research


• Analysed 200,000+ hours of user activity
• Monitored database access for: “open”, “copy”,
  “paste”, “save as”, “convert”, “send”, “print”, “attach”
  and file transfer activity
• Carried out over 24 months
• Identified the who, what where & when
• Entitled “Inside Out”
Who?
How?
Summary Findings

• 68% theft linked to mobile rather than fixed desktop systems.

• IT and Customer Services Departments highest number thefts.

• 98% male

• 79% incidents occurred on Fridays between 3 and 5PM.

• Applications most favoured to remove data were identified as web mail,
  instant messaging (IM) and social networking web sites.
• The top 4 theft vectors were identified as mobile devices, web mail,
  removable media and corporate email.
• All instances identified could have been prevented. Existing corporate
  security policies were not implemented, monitored or enforced.
5 Factors Leading to
Compromise



1.   Ignorance
2.   Poor password management
3.   Rampant account sharing
4.   Unfettered access to data
5.   Excessive portability of data
Start: Find Your Database
Data

•   Network?
•   End Users
•   Remote Users
•   3rd Parties?
•   Contractors
•   Other locations: printers,
    photocopiers,       scanners,
    faxes, audio recordings…
Laptop / Desktop
                                                                               Server
                                                                               CD / DVD
        Piggybacking
                                                                               USB       iPod
Dumpster (Skip) Diving
                          Social Engineering                                             Memory Stick
          Contractors
          Road Apple                                                           PCMCIA
       Eavesdropping                                                           Memory Card Readers
                                                                                                Bluetooth
                                                                  Endpoint
                                                                               Communication    Infrared
                    Databases
                                                                                                Firewire
                 File Systems
                                                                                                Serial / Parallel Ports
                  File Servers
         NAS                       Data-At-Rest                                Virtual Machine
        SANs / iSCSI Storage                                                                            Screen Scrapers
                   Voice Mail                         Data Loss                                         Trojans
                                                                               Other Threat Vectors
           Video Surveillance                                                                           Key Loggers
                                                                                                        Phishing / Spear Phishing
                          E-Mail
                         HTTP/S                                                  Printers
                           SSH                                                   Backup Tapes / CD / DVD
                            FTP                                                  Laptop / Desktop / Server
                                     Data-In-Motion
                             IM                                                  Fax
                           VoIP
                                                                    Physical     Photocopier
                            P2P                                                  Mobile Phone / PDA
                          Blogs                                                  Digital Camera (incl. Mobile Phone Cameras)
                                                                                 Incorrect Disposal
                                                                                 Printed Reports
Get a Grip

• Do you have a Database Security Policy?
• Can you monitor all DB access?
   – Who did what, from where, and when…
   – What was accessed?
   – Did it violate the data permissions policy?
   – Was it a month-end report or theft of millions of records?
• Are your systems hardened?
   – Tamper-resistant
   – Tamper-evident
   – Compliant with segregation of duties
Apply the vulnerability management
lifecycle...


                                     • Determine risk
•   Establish inventory
                                     • Prioritize based on-
•   Identify vulnerabilities
                                        - Vulnerabilities
•   Identify privileged users
                                        - Threat
•   Define Policies
                                        - Asset
                                          classification



•    Monitor: Users,
     Access, Activity,
     Misuse, Policy                  • Eliminate high-priority
     Violations                        vulnerabilities
•    Track & Audit                   • Establish controls
     Changes                           & eliminate root cause
•    Baseline compliance             • Demonstrate progress
•    Monitor
     Vulnerabilities &
Top 10 Best Practices

1. Access and Authentication Auditing
   • Determine who accessed which systems, when, and how
2. User and Administrator Auditing
   • Determine what activities were performed in the database by both
      users and administrators
3. Security Activity Alerting
   • Identify and flag any suspicious, unusual or abnormal access to
      sensitive data or critical systems
4. Vulnerability Assessment and Threat Monitoring
   • Assess your database applications for known vulnerabilities
   • Alert in real-time users attempting to exploit these vulnerabilities
   • Alert in real time any other suspicious, unusual or other “abnormal”
      access
Best Practices

5.   Database Activity Monitoring
     • Determine who accessed which systems, when, and how
     • Determine what they did (both users and administrators)
     • Understand where the threat / risk originates and deploy the appropriate
         solution to defend against such threats
6.   Change Auditing
      Establish a baseline policy for database; configuration, schema, users,
        privileges and structure, then track deviations from that baseline.
     7.   Data classification scheme (locate, mark, define handling storage
          requirements)
     8.   Database access included in information security policies
     9.   Information & awareness (Appropriate use agreements)
Best Practices

10. Delete any/all data associated with me




              PLEASE !
26 Dover Street
        London
    United Kingdom
        W1S 4LY
  +44 (0)20 3586 1025
+44 (0)20 7763 7101(fax)

More Related Content

What's hot

Mission impossible: Protect Your Date from Cyberspace & HIPAA Violations
Mission impossible: Protect Your Date from Cyberspace & HIPAA ViolationsMission impossible: Protect Your Date from Cyberspace & HIPAA Violations
Mission impossible: Protect Your Date from Cyberspace & HIPAA ViolationsValerie Houghton
 
Privacy of social network attributes for online services
Privacy of  social network attributes for online servicesPrivacy of  social network attributes for online services
Privacy of social network attributes for online servicesAtos_Worldline
 
Experience and Outcomes of the New German Electronic ID Card
Experience and Outcomes of the New German Electronic ID CardExperience and Outcomes of the New German Electronic ID Card
Experience and Outcomes of the New German Electronic ID CardAtos_Worldline
 
Turning social disputes into knowledge representations DERI reading group 201...
Turning social disputes into knowledge representations DERI reading group 201...Turning social disputes into knowledge representations DERI reading group 201...
Turning social disputes into knowledge representations DERI reading group 201...jodischneider
 
Health 2 0 & ultrabook services
Health 2 0 & ultrabook servicesHealth 2 0 & ultrabook services
Health 2 0 & ultrabook servicesifa2012
 
E@scribo presentation jan 2012
E@scribo presentation jan 2012E@scribo presentation jan 2012
E@scribo presentation jan 2012rubensescribo
 
Don zaal a 11.15 11.45 fccu
Don zaal a 11.15 11.45 fccuDon zaal a 11.15 11.45 fccu
Don zaal a 11.15 11.45 fccuwebwinkelvakdag
 
Ariba Knowledge Nuggets: eSignatures
Ariba Knowledge Nuggets: eSignaturesAriba Knowledge Nuggets: eSignatures
Ariba Knowledge Nuggets: eSignaturesSAP Ariba
 
SMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationSMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationVCW Security Ltd
 
Use of IT in judicial proceedings
Use of IT in judicial proceedingsUse of IT in judicial proceedings
Use of IT in judicial proceedingsDory Reiling
 
Information system and data modelling tools
Information system and data modelling toolsInformation system and data modelling tools
Information system and data modelling toolsMR Z
 
Who is the digital you
Who is the digital youWho is the digital you
Who is the digital youTony Fish
 
GI2012 hoffmann-oddp
GI2012 hoffmann-oddpGI2012 hoffmann-oddp
GI2012 hoffmann-oddpIGN Vorstand
 

What's hot (20)

Mission impossible: Protect Your Date from Cyberspace & HIPAA Violations
Mission impossible: Protect Your Date from Cyberspace & HIPAA ViolationsMission impossible: Protect Your Date from Cyberspace & HIPAA Violations
Mission impossible: Protect Your Date from Cyberspace & HIPAA Violations
 
Privacy of social network attributes for online services
Privacy of  social network attributes for online servicesPrivacy of  social network attributes for online services
Privacy of social network attributes for online services
 
Experience and Outcomes of the New German Electronic ID Card
Experience and Outcomes of the New German Electronic ID CardExperience and Outcomes of the New German Electronic ID Card
Experience and Outcomes of the New German Electronic ID Card
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Intranets and Extranets
Intranets and Extranets Intranets and Extranets
Intranets and Extranets
 
Turning social disputes into knowledge representations DERI reading group 201...
Turning social disputes into knowledge representations DERI reading group 201...Turning social disputes into knowledge representations DERI reading group 201...
Turning social disputes into knowledge representations DERI reading group 201...
 
Health 2 0 & ultrabook services
Health 2 0 & ultrabook servicesHealth 2 0 & ultrabook services
Health 2 0 & ultrabook services
 
E@scribo presentation jan 2012
E@scribo presentation jan 2012E@scribo presentation jan 2012
E@scribo presentation jan 2012
 
Mental Models of Employment
Mental Models of EmploymentMental Models of Employment
Mental Models of Employment
 
Don zaal a 11.15 11.45 fccu
Don zaal a 11.15 11.45 fccuDon zaal a 11.15 11.45 fccu
Don zaal a 11.15 11.45 fccu
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Ariba Knowledge Nuggets: eSignatures
Ariba Knowledge Nuggets: eSignaturesAriba Knowledge Nuggets: eSignatures
Ariba Knowledge Nuggets: eSignatures
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
SMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationSMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales Presentation
 
Online DFS
Online DFSOnline DFS
Online DFS
 
Use of IT in judicial proceedings
Use of IT in judicial proceedingsUse of IT in judicial proceedings
Use of IT in judicial proceedings
 
Stefan Decker
Stefan DeckerStefan Decker
Stefan Decker
 
Information system and data modelling tools
Information system and data modelling toolsInformation system and data modelling tools
Information system and data modelling tools
 
Who is the digital you
Who is the digital youWho is the digital you
Who is the digital you
 
GI2012 hoffmann-oddp
GI2012 hoffmann-oddpGI2012 hoffmann-oddp
GI2012 hoffmann-oddp
 

Viewers also liked

Database Threats - Information System Security
Database Threats - Information System SecurityDatabase Threats - Information System Security
Database Threats - Information System Securitysandra sukarieh
 
Top 10 Security Challenges
Top 10 Security ChallengesTop 10 Security Challenges
Top 10 Security ChallengesJorge Sebastiao
 
Top 10 Database Threats
Top 10 Database ThreatsTop 10 Database Threats
Top 10 Database ThreatsImperva
 
Security Policies
Security PoliciesSecurity Policies
Security Policiesphanleson
 
Threat modeling with architectural risk patterns
Threat modeling with architectural risk patternsThreat modeling with architectural risk patterns
Threat modeling with architectural risk patternsStephen de Vries
 
Threat modeling web application: a case study
Threat modeling web application: a case studyThreat modeling web application: a case study
Threat modeling web application: a case studyAntonio Fontes
 
Database Security
Database SecurityDatabase Security
Database Securityalraee
 

Viewers also liked (8)

Database Threats - Information System Security
Database Threats - Information System SecurityDatabase Threats - Information System Security
Database Threats - Information System Security
 
Top 10 Security Challenges
Top 10 Security ChallengesTop 10 Security Challenges
Top 10 Security Challenges
 
Top 10 Database Threats
Top 10 Database ThreatsTop 10 Database Threats
Top 10 Database Threats
 
Security Policies
Security PoliciesSecurity Policies
Security Policies
 
Threat modeling with architectural risk patterns
Threat modeling with architectural risk patternsThreat modeling with architectural risk patterns
Threat modeling with architectural risk patterns
 
Threat modeling web application: a case study
Threat modeling web application: a case studyThreat modeling web application: a case study
Threat modeling web application: a case study
 
Database Security
Database SecurityDatabase Security
Database Security
 
Database Security
Database SecurityDatabase Security
Database Security
 

Similar to Risk Factory: Database Security: Oxymoron?

Risk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Crew
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteVCW Security Ltd
 
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...Novell
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareFelipe Prado
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Amazon Web Services
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdingershawn_merdinger
 
20120329 Cybercrime threats on e-world
20120329 Cybercrime threats on e-world20120329 Cybercrime threats on e-world
20120329 Cybercrime threats on e-worldLuc Beirens
 
20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threatLuc Beirens
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsBeyondTrust
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AlivePositive Hack Days
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
Security Procedures
Security ProceduresSecurity Procedures
Security Proceduresmarkilyn
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?TechGenie
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016dilahkmpk
 

Similar to Risk Factory: Database Security: Oxymoron? (20)

Risk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to Fit
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security Suite
 
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdinger
 
B Hkorba
B HkorbaB Hkorba
B Hkorba
 
20120329 Cybercrime threats on e-world
20120329 Cybercrime threats on e-world20120329 Cybercrime threats on e-world
20120329 Cybercrime threats on e-world
 
20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay Alive
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Security Procedures
Security ProceduresSecurity Procedures
Security Procedures
 
Bettyboop
BettyboopBettyboop
Bettyboop
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016
 

More from Risk Crew

Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Risk Crew
 
Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Risk Crew
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Risk Crew
 
Risk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a HackerRisk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a HackerRisk Crew
 
Risk Factory The 2014 Numbers
Risk Factory The 2014 NumbersRisk Factory The 2014 Numbers
Risk Factory The 2014 NumbersRisk Crew
 
Risk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Crew
 
Risk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big DataRisk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big DataRisk Crew
 
Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Crew
 
Risk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile DevicesRisk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile DevicesRisk Crew
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Crew
 
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Crew
 
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment IndustryRisk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment IndustryRisk Crew
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Crew
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Crew
 
Risk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back DoorRisk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back DoorRisk Crew
 
Risk Factory How to Steal an Identity
Risk Factory How to Steal an IdentityRisk Factory How to Steal an Identity
Risk Factory How to Steal an IdentityRisk Crew
 
Risk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic EavesdroppingRisk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic EavesdroppingRisk Crew
 
Risk Factory Geo-location Security Issues & Best Practices
Risk Factory Geo-location Security Issues & Best PracticesRisk Factory Geo-location Security Issues & Best Practices
Risk Factory Geo-location Security Issues & Best PracticesRisk Crew
 

More from Risk Crew (18)

Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
Risk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a HackerRisk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a Hacker
 
Risk Factory The 2014 Numbers
Risk Factory The 2014 NumbersRisk Factory The 2014 Numbers
Risk Factory The 2014 Numbers
 
Risk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best Practice
 
Risk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big DataRisk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big Data
 
Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013
 
Risk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile DevicesRisk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile Devices
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The Essentials
 
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response Programme
 
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment IndustryRisk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get Physical
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
 
Risk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back DoorRisk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back Door
 
Risk Factory How to Steal an Identity
Risk Factory How to Steal an IdentityRisk Factory How to Steal an Identity
Risk Factory How to Steal an Identity
 
Risk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic EavesdroppingRisk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic Eavesdropping
 
Risk Factory Geo-location Security Issues & Best Practices
Risk Factory Geo-location Security Issues & Best PracticesRisk Factory Geo-location Security Issues & Best Practices
Risk Factory Geo-location Security Issues & Best Practices
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Risk Factory: Database Security: Oxymoron?

  • 2. A simple, easy to use, online, B2B procurement portal for purchasing products and services to secure your data.
  • 3. According to … In 2011 reported database thefts increased 37% from the previous year. May 20012
  • 5.
  • 6. Supply & Demand 2001 Name, Address DOB = £2.00 Credit card # = £2.00 Expiry date = £ 3.00 Security Code = £3.00 2005 Total = £10.00 Name, Address DOB = £1.00 Credit card # = £1.00 Expiry date = £ 1.00 2010 Security Code = £2.00 Name, Address DOB = £.25 Total = £5.00 Credit card # = £.25 Expiry date = £ .25 Security Code = £.25 Total = £1.00
  • 7.
  • 8.
  • 9. Cocktail Party Chat Up Line #1 In one week, the average person living in Britain has 3,254 pieces of personal information stored about him or her in databases.* *Evening Standard Survey August 2008
  • 10. We live in societies that collect data for data’s sake.
  • 11. Cocktail Party Chat Up Line #2 The average UK citizen is in over 750 databases.* *UK Information Commissioner's' Report: “What Price Privacy?” 2009
  • 24. Your identity data is big business.
  • 25. How Do You Find One?
  • 26. Tool of Choice • Examines: – Every domain on the Internet – Every web page in your application ever (cached) • Can locate: – Unsecured databases – Unsecured websites, URLs – Unsecured files & folders
  • 27. Example: • Oracle HTTP Servers – Provides functionality to query database using an HTTP form – Accessed using the URL /isqlplus – By default runs on any Oracle HTTP server installed with Oracle Applications Server or Oracle Database Server • Easily identified by Google search: – Look for Oracle HTTP servers using the “allinurl” advanced search feature
  • 33. The Biggest Threat? FBI/Computer Security Institute 2008: 85% of all offenders prosecuted for cyber crimes were employees of the company attacked
  • 34.
  • 35. How To Steal a Database Removable media: PDAs, USB flash drives, iPods – digital cameras, gaming consoles, write-able CDs DVDs etc. Unauthorised connections: wireless, Bluetooth, infrared mobile connections, modems, peer-to-peer, etc. Unauthorised output devices: printers, faxes, photo copiers, etc Unauthorised applications: MSN chat, web mail, malware, trojans, key loggers, etc. Unauthorised applications use: file, print, save as, print screen, cut & paste, file sharing, search, import/export, print, rename etc.
  • 36. Driving Forces Demand for Pervasive Access Uncertain Economic Conditions  From any place…  Restructuring, downsizing, mergers,  By anyone… acquisitions…  Via any application…  Increase in disgruntled employees  Increase in remote & 3rd party  Increased understanding that data = cash connections Result: increase in database thefts Result: increase of privileged users Compliance Requirements  Compliance programs must be:  Data apps must meet:  Transparent  Confidentiality  Repeatable  Integrity  Demonstrable  Availability Result: compliance demands increase in privileged users
  • 37. Our Research • Analysed 200,000+ hours of user activity • Monitored database access for: “open”, “copy”, “paste”, “save as”, “convert”, “send”, “print”, “attach” and file transfer activity • Carried out over 24 months • Identified the who, what where & when • Entitled “Inside Out”
  • 38. Who?
  • 39. How?
  • 40. Summary Findings • 68% theft linked to mobile rather than fixed desktop systems. • IT and Customer Services Departments highest number thefts. • 98% male • 79% incidents occurred on Fridays between 3 and 5PM. • Applications most favoured to remove data were identified as web mail, instant messaging (IM) and social networking web sites. • The top 4 theft vectors were identified as mobile devices, web mail, removable media and corporate email. • All instances identified could have been prevented. Existing corporate security policies were not implemented, monitored or enforced.
  • 41. 5 Factors Leading to Compromise 1. Ignorance 2. Poor password management 3. Rampant account sharing 4. Unfettered access to data 5. Excessive portability of data
  • 42. Start: Find Your Database Data • Network? • End Users • Remote Users • 3rd Parties? • Contractors • Other locations: printers, photocopiers, scanners, faxes, audio recordings…
  • 43. Laptop / Desktop Server CD / DVD Piggybacking USB iPod Dumpster (Skip) Diving Social Engineering Memory Stick Contractors Road Apple PCMCIA Eavesdropping Memory Card Readers Bluetooth Endpoint Communication Infrared Databases Firewire File Systems Serial / Parallel Ports File Servers NAS Data-At-Rest Virtual Machine SANs / iSCSI Storage Screen Scrapers Voice Mail Data Loss Trojans Other Threat Vectors Video Surveillance Key Loggers Phishing / Spear Phishing E-Mail HTTP/S Printers SSH Backup Tapes / CD / DVD FTP Laptop / Desktop / Server Data-In-Motion IM Fax VoIP Physical Photocopier P2P Mobile Phone / PDA Blogs Digital Camera (incl. Mobile Phone Cameras) Incorrect Disposal Printed Reports
  • 44. Get a Grip • Do you have a Database Security Policy? • Can you monitor all DB access? – Who did what, from where, and when… – What was accessed? – Did it violate the data permissions policy? – Was it a month-end report or theft of millions of records? • Are your systems hardened? – Tamper-resistant – Tamper-evident – Compliant with segregation of duties
  • 45. Apply the vulnerability management lifecycle... • Determine risk • Establish inventory • Prioritize based on- • Identify vulnerabilities - Vulnerabilities • Identify privileged users - Threat • Define Policies - Asset classification • Monitor: Users, Access, Activity, Misuse, Policy • Eliminate high-priority Violations vulnerabilities • Track & Audit • Establish controls Changes & eliminate root cause • Baseline compliance • Demonstrate progress • Monitor Vulnerabilities &
  • 46. Top 10 Best Practices 1. Access and Authentication Auditing • Determine who accessed which systems, when, and how 2. User and Administrator Auditing • Determine what activities were performed in the database by both users and administrators 3. Security Activity Alerting • Identify and flag any suspicious, unusual or abnormal access to sensitive data or critical systems 4. Vulnerability Assessment and Threat Monitoring • Assess your database applications for known vulnerabilities • Alert in real-time users attempting to exploit these vulnerabilities • Alert in real time any other suspicious, unusual or other “abnormal” access
  • 47. Best Practices 5. Database Activity Monitoring • Determine who accessed which systems, when, and how • Determine what they did (both users and administrators) • Understand where the threat / risk originates and deploy the appropriate solution to defend against such threats 6. Change Auditing  Establish a baseline policy for database; configuration, schema, users, privileges and structure, then track deviations from that baseline. 7. Data classification scheme (locate, mark, define handling storage requirements) 8. Database access included in information security policies 9. Information & awareness (Appropriate use agreements)
  • 48. Best Practices 10. Delete any/all data associated with me PLEASE !
  • 49. 26 Dover Street London United Kingdom W1S 4LY +44 (0)20 3586 1025 +44 (0)20 7763 7101(fax)

Editor's Notes

  1. Give out cards
  2. Oldest crime on record – not prostitution First recorded case of identity theft Bible: Genesis XXX