SlideShare a Scribd company logo
Team 3
Dan Tan
Derek Weisman
Leah Wetzel
Shuruthy Yogarajah
Tyler Stump
Vanessa Voss
“Netflix is the world’s leading Internet television
network with over 86 million members in over 190
countries enjoying more than 125 million hours of
TV shows and movies per day, including original
series, documentaries and feature films.”
Evolution of Netflix
Yesterday - Netflix announces
‘Download and Go’
https://www.youtube.com/watch?v=7Bkz5awx
wYk
• Netflix was invented after Blockbuster charged
co-founder, Reed Hastings, a $40 late fee on his
‘Apollo 13’ rental
• Netflix envelopes are rectangular because square
envelopes cost more to mail via USPS. If these
envelopes were square, it would have cost Netflix
an additional 225M to mail DVDs in 2011
• Netflix gathers data from BitTorrent and other
illegal pirating sites to determine which content
they will purchase for distribution via their
streaming service
Fun Facts
Security Tools
• Every few months, Netflix unveils a new security tool
• These started with Security Monkey and include FIDO (Fully
Integrated Defense Operation), Lemur, and Sleepy Puppy
• Coming soon is Dirty Laundry as the tenth security release
Power of Automation
• Being such a large company, Netflix needs to find ways to move faster
when dealing with security threats
• Their solution is automation
• Automation helps them identify compromised accounts, respond to
security incidents, and monitor security configurations in a way that is
much quicker than a manual approach
• Security personnel are alerted when an issue is detected
• That way, personnel aren’t bogged down by being alerted to every
minuscule change in the system
Open Company
• No BYOD Policy
• OSS (Open Source Software) for a large
amount of their software and tools
• Also have looked into innovative physical
security
Information Security
• These are two-fold
• Netflix has both their company data to protect as
well as the information of their customers
• Company that is completely cloud based
• Netflix is proactive instead of reactive
• Search for compromised accounts on sites
like Pastebin in order to protect their users
• Collaboration between engineers and
product deployment (DevOps)
• Allows issues to be communicated earlier
before they become a serious problem
Getting Access to Movies
• 5-step process
• User Authentication - Makes sure that the viewer is indeed a
Netflix subscriber and has the right playback privileges
• Device Authorization - Identify the device that the user is
playing from, and to ensure that the limit of six is not
exceeded
• Instruction Fetching - The player gets
information from the Netflix servers about
how to play the movie, and where to get the
files (only happens after device is
authorized)
• License Acquisition - Controls DRM-encoded
video and audio files.
– It is the last security step before
playback can begin, basically getting
license to decrypt the video.
• Playback - Playback can finally take place
once these constraints have been enforced.
The player talks directly to the Netflix
Streaming servers, which in turn assume
that all security concerns have already been
taken care of by the other components.
• PROBLEM? Race Condition. Once you reach
the playback session, Netflix assumes that
everything is safe. (similar to the angry bird
reference)
Attached from“Lecture Five and Six”, Nicholas Davis
Layers of Security
• Requests user authentication before playing
the video
• Only allowing a maximum of six playback
devices per account
• Encrypts the video content
• Providing unique decryption keys per movie
and device
How do they do that?
• The security checks take place over the duration of the playback experience,
and delegated to several different Netflix components and servers, each with
distinct responsibilities. (Segregation of duties)
• Microsoft Silverlight prevents cross-site scripting and makes sure that the
player only talks to Netflix servers
• Microsoft DRM component gets an individualized key for each player and
coordinates with the License server to acquire keys that are unique to the
movie and the player
What’s so GREAT about these different
servers?
• Information is shared between these different
servers via cookies
• By delegating tasks, these servers and client
components can focus on the particular
constraints that they have to enforce, and
assume that other constraints are checked
somewhere else
• Security on each of these servers can be
tightened as desired, when Netflix detects a
breach at a particular point
• The encryption of the video files ensures that
only players with decryption algorithm (Netflix
player) can view them
• If one of those decryption keys is compromised
then the security threat is minor, because the
keys are individualized and can only be used by
one player
Location
• Los Gatos, California
– Floods, earthquakes, tropical storms
• Railroad Tracks
• Highway
Exterior
• Light Posts
• Sidewalks
• Landscape
• Walls
• Road Entrance
• Cameras
Interior
• Glass Walls and Doors
– Territorial Reinforcement
• Cameras
• Front Desk Employee
– Natural Surveillance
Mobile Access
• From Keyfobs to Smartphones
– Digital key
• Have to know…
– Phone can be used as key
– Passcode to the phone
– How to activate the key with the app
Automatic Approaches
• Security Monkey
– Monitors internal security configurations
• Scumbler
– Automatic web searches
• Fully Integrated Defense Operation
– Automatic incident response
Detecting the Host
• Problem
– With FIDO, there hasn’t been a focus on detecting the
host
• Suggestion
– Timely DNS Resolution
HTTPS
• HTTP vs. HTTPS
• Encryption is critical
for ensuring safe
communication – and
personalized
communication
MLS
• MLS is the Best
• Superior flexibility for cross-communication
The Future
• Offline Mode?!?
• Potential Problem: data gaps?
AWS Outage
• Cloud computing
• What went well?
– Multiple zones – hot zones
– S3 storage
• What failed?
– Manual operations – shifting services out of zones
– ELB Load Balancing – servers down? Service lost!
• Chaos Monkey
– Constant simulated failures so that Netflix systems
know how to react
• Chaos Gorilla
– Total service failure as opposed to smaller,
localized breaches
Restrictive Legal, Regulatory, and
Compliance
• Financial
– Securities Exchange Act of 1934
– Sarbanes Oxley
• Payment Processing
– PCI DSS (Payment Card Industry Data Security Standard) Compliance
(Same)
• Content, IP, Licensing, Distribution
– Licensing contracts with TV Shows, Networks, and Studios
• 10/18/2016 - Relativity Media sued Netflix for breach of contract and libel
• NOT subject to Federal Communication Commission (FCC)
regulation
– FCC - “It is outside of open internet.”
Netflix’s Response to Regulation and
Compliance
• 2012 – Formed Political Action
Committee ‘FLIXPAC’
– Net Neutrality
– Bandwidth Caps
– Usage-based Billing (Canada)
– VPPA, Video Privacy Protection Act
(US)
• Supported 2012 Amendments, which
allowed video rental companies to
share rental information on social
networking sites, with customer
permission
Protective Legal, Regulatory, and
Compliance
• Proprietary Intellectual Property
– Protected by Patent, Trademark, Copyright, Trade
Secret Laws, Confidentiality Agreements
• Stop Online Piracy Act (SOPA)
• Protect IP Act (PIPA)
• Computer Fraud and Abuse Act (CFAA)
Application Overview
• Data Collected by the App:
– Sign Up - Personally Identifiable
Information (Name, Postal Address,
Email Address, Telephone Number)
– Payments - Payment Information
(Credit Card Number, Expiration,
Security Code)
– User Preferences/Profiles - Reviews,
Ratings, Account Settings
– Use Data -
• Interactions with User Interface and
Advertising
• Computer, device, and software data
• Title selections, watch history, search
queries
Application Security
• Application Security Best Practices:
– Container-based development > simplified development
experience
– NetflixEverywhere Global Architecture> service availability,
latency, data replication, compute capacity, and efficiency
– HTTPS > secure video streams
– Integration with Amazon Web Services
• S3 > Big Data
• Simple Email Service > Customer Emails
• ECS > Container Scheduling, Execution, and Integration
– Netflix is committed to open source.
• Big Data, Build and Delivery Tools, Common Runtime Services and
Libraries, Content Encoding, Data Persistence, Insight, Reliability,
Performance, Security, User Interface
External Security
• External Security Considerations
– Device
– Browser
– Internet Service Providers
– 3rd Parties
10/14/16 - “As part of our regular security monitoring, we
discovered that credentials that match your Netflix email
address and password were included in a release of email
addresses and passwords from a breach at another
company.”
Availability is a Priority
• On Integrity/Confidentiality:
– “We believe we use reasonable
administrative, logical, physical and
managerial measures to safeguard your
personal information against loss, theft
and unauthorized access, use and
modification. Unfortunately, no measures
can be guaranteed to provide 100%
security. Accordingly, we cannot
guarantee the security of your
information.”
• On Availability:
– “ Members can watch as much as they
want, anytime, anywhere, on nearly any
Internet-connected screen. Members can
play, pause and resume watching, all
without commercials or commitments.”
• Current Netflix Operations Security in place to monitor
day to day work and use are:
– Creating and maintaining user accounts and access for
data access
– Carrying out security assessments
– Limiting excessive customer data
• Customer name and billing Information aka credit card numbers-
Sensitive Customer Data
– Service Level Agreement with third party operations
provider--Indicating acceptable and unacceptable
performance and recovery baseline agreements in the
case of a breach within Netflix customer data from the
third party
• Sensitive customer data is also maintained in third parties used in
Operations for Netflix, one of their third parties is Amazon Web
Services (AWS)
• No threats have CURRENTLY been discovered
at Netflix concerning Operations Security
• Periodic Vulnerability Testing
– Check for new threats
– Confirm old threats
– Helps evaluate company's security posture
• Moved from vertically scaled operation (data centers) to
horizontally scaled highly reliable system (cloud)
– August 2008 - Netflix Database Corruptions stops operations,
could not ship DVDs
– January 2016 - Netflix operates completely on cloud
• 7 Year process to finally finish
– 8 times as many streaming members
– Cloud has supported the rapid growth
– Elasticity of Cloud allows Netflix to add thousands of virtual
servers and create storage
– Cloud cost per streaming is way cheaper then in a data center
– Can Now Stream Netflix Worldwide
• There were a number of outages in data
centers---reason for moving to cloud BUT
there were outages in cloud as well
– Christmas Eve of 2012
– Had issues with AWS that routes network traffic to
Netflix
– Now resolved
BYOD
• Netflix wants to maintain a corporate culture
that is based off of freedom and trust
• Do not incorporate BYOD security or Mobile
Device Management (MDM) software and
policies
• Netflix does not want to govern employee
owned devices
• Their tactic is to only protect the data
• Believe that extreme IT security actions will
lead to under the table action by employees
Threats
• Information gets transferred where it should
not be - lost devices, memorized passwords,
malware infections
• How will they address security concerns
without containerization and virtualization
through MDM
Problems and Suggested Change
• Problem:
– Employees may not be aware of the correct rules and
standards in which to abide for BYOD and therefore
information may end up in the wrong hands if
employees are not correctly education
• Suggestion for change:
– Set guidelines and educate employees of BYOD
expectations as a part of training and then expect
employees to follow through. Explain it is just a part of
the process of using BYOD
– Should not interrupt the corporate culture of trust
and freedom by educating employees
References
https://www.hidglobal.com/doclib/files/resource_files/netflix-pilot-cs-en-2012-09-24.pdf
http://blogs.wsj.com/cio/2015/06/01/how-netflix-manages-security-in-the-age-of-devops/
https://informationdiscoverydigest.com/2013/09/19/netflix-protecting-data-over-devices-byod-and-ediscovery/
http://fieldguide.gizmodo.com/stop-netflix-youtube-spotify-and-more-from-eating-u-1759395052
http://arstechnica.com/information-technology/2016/02/netflix-finishes-its-massive-migration-to-the-amazon-cloud/
https://media.netflix.com/en/company-blog/completing-the-netflix-cloud-migration
http://techblog.netflix.com/2012/12/a-closer-look-at-christmas-eve-outage.html
http://www.worldtvpc.com/blog/amazon-want-100-of-netflix-streaming-on-their-cloud/
https://ir.netflix.com/index.cfm
https://media.netflix.com/en/about-netflix
https://twitter.com/netflix/status/803962377997688832?ref_src=twsrc%5Etfw
https://www.cnet.com/news/blockbuster-laughed-at-netflix-partnership-offer/
https://www.quora.com/Why-is-the-Netflix-DVD-envelope-rectangular
http://www.forbes.com/sites/timworstall/2013/09/16/how-clever-netflix-monitors-bittorrent-to-purchase-
shows/#3b4e4b4c38cd
https://pomelollc.files.wordpress.com/2009/04/pomelo-tech-report-netflix.pdf
https://github.com/Netflix/msl/wiki/Netflix-ID-Cookies-User-Authentication
https://netflix.github.io/
https://ir.netflix.com/index.cfm

More Related Content

What's hot

Netflix Case Study
Netflix Case StudyNetflix Case Study
Netflix Case Study
Julien Guitton
 
Group case study assignment
Group case study assignmentGroup case study assignment
Group case study assignment
OlgaKovalchuk15
 
Netflix - Globalization and business expansion case study
Netflix - Globalization and business expansion case studyNetflix - Globalization and business expansion case study
Netflix - Globalization and business expansion case study
Benoît Prentout
 
Netflix failure & marketing strategy
Netflix   failure & marketing strategyNetflix   failure & marketing strategy
Netflix failure & marketing strategy
Ashutosh Sahu
 
Netflix Business Model & Strategy
Netflix Business Model & StrategyNetflix Business Model & Strategy
Netflix Business Model & Strategy
Evgenii Gvozdev
 
Netflix case study
Netflix case studyNetflix case study
Netflix case study
Foridur Rahman
 
Netflix Case Presentation
Netflix Case PresentationNetflix Case Presentation
Netflix Case Presentation
Brett Miller
 
Use of Analytics by Netflix - Case Study
Use of Analytics by Netflix - Case StudyUse of Analytics by Netflix - Case Study
Use of Analytics by Netflix - Case Study
Saket Toshniwal
 
Netflix Inc
Netflix Inc Netflix Inc
Netflix Inc
Financial Services
 
Netflix Business Model - Nine Elements
Netflix Business Model - Nine ElementsNetflix Business Model - Nine Elements
Netflix Business Model - Nine Elements
Giovanna Correa
 
Activision Blizzard Capabilities
Activision Blizzard CapabilitiesActivision Blizzard Capabilities
Activision Blizzard Capabilitiesptaylor2583
 
ATT Inc. Strategy Analysis
ATT Inc. Strategy AnalysisATT Inc. Strategy Analysis
ATT Inc. Strategy AnalysisKyle Hughes
 
Sci-fi Target Audiences
Sci-fi Target AudiencesSci-fi Target Audiences
Sci-fi Target Audiences
Andrew Murray
 
Netflix Business Plan with SWOT for Spain
Netflix Business Plan with SWOT for SpainNetflix Business Plan with SWOT for Spain
Netflix Business Plan with SWOT for Spain
bcnbynit
 
Netflix marketing plan presentation
Netflix marketing plan presentationNetflix marketing plan presentation
Netflix marketing plan presentation
Evelyne Otto
 
Market Analysis on Netflix
Market Analysis on NetflixMarket Analysis on Netflix
Market Analysis on Netflix
Tapan Desai
 
Netflix
NetflixNetflix
Netflix marketing plan
Netflix marketing plan Netflix marketing plan
Netflix marketing plan
Evelyne Otto
 
Rise and fall of Kodak
Rise and fall of KodakRise and fall of Kodak
Rise and fall of Kodak
Pulchowk Campus
 
Netflix Presentation
Netflix PresentationNetflix Presentation
Netflix Presentation
Laura Adkins
 

What's hot (20)

Netflix Case Study
Netflix Case StudyNetflix Case Study
Netflix Case Study
 
Group case study assignment
Group case study assignmentGroup case study assignment
Group case study assignment
 
Netflix - Globalization and business expansion case study
Netflix - Globalization and business expansion case studyNetflix - Globalization and business expansion case study
Netflix - Globalization and business expansion case study
 
Netflix failure & marketing strategy
Netflix   failure & marketing strategyNetflix   failure & marketing strategy
Netflix failure & marketing strategy
 
Netflix Business Model & Strategy
Netflix Business Model & StrategyNetflix Business Model & Strategy
Netflix Business Model & Strategy
 
Netflix case study
Netflix case studyNetflix case study
Netflix case study
 
Netflix Case Presentation
Netflix Case PresentationNetflix Case Presentation
Netflix Case Presentation
 
Use of Analytics by Netflix - Case Study
Use of Analytics by Netflix - Case StudyUse of Analytics by Netflix - Case Study
Use of Analytics by Netflix - Case Study
 
Netflix Inc
Netflix Inc Netflix Inc
Netflix Inc
 
Netflix Business Model - Nine Elements
Netflix Business Model - Nine ElementsNetflix Business Model - Nine Elements
Netflix Business Model - Nine Elements
 
Activision Blizzard Capabilities
Activision Blizzard CapabilitiesActivision Blizzard Capabilities
Activision Blizzard Capabilities
 
ATT Inc. Strategy Analysis
ATT Inc. Strategy AnalysisATT Inc. Strategy Analysis
ATT Inc. Strategy Analysis
 
Sci-fi Target Audiences
Sci-fi Target AudiencesSci-fi Target Audiences
Sci-fi Target Audiences
 
Netflix Business Plan with SWOT for Spain
Netflix Business Plan with SWOT for SpainNetflix Business Plan with SWOT for Spain
Netflix Business Plan with SWOT for Spain
 
Netflix marketing plan presentation
Netflix marketing plan presentationNetflix marketing plan presentation
Netflix marketing plan presentation
 
Market Analysis on Netflix
Market Analysis on NetflixMarket Analysis on Netflix
Market Analysis on Netflix
 
Netflix
NetflixNetflix
Netflix
 
Netflix marketing plan
Netflix marketing plan Netflix marketing plan
Netflix marketing plan
 
Rise and fall of Kodak
Rise and fall of KodakRise and fall of Kodak
Rise and fall of Kodak
 
Netflix Presentation
Netflix PresentationNetflix Presentation
Netflix Presentation
 

Viewers also liked

The IT Security Jungle of Higher Education
The IT Security Jungle of Higher EducationThe IT Security Jungle of Higher Education
The IT Security Jungle of Higher Education
Nicholas Davis
 
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9 UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
Nicholas Davis
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
Nicholas Davis
 
Information Systems 365 Lecture Six -- Access Control
Information Systems 365 Lecture Six -- Access ControlInformation Systems 365 Lecture Six -- Access Control
Information Systems 365 Lecture Six -- Access Control
Nicholas Davis
 
Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...
Nicholas Davis
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional Certifications
Nicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
Nicholas Davis
 
Cloud Security and Bring Your Own Device (BYOD) Security
Cloud Security and Bring Your Own Device (BYOD) SecurityCloud Security and Bring Your Own Device (BYOD) Security
Cloud Security and Bring Your Own Device (BYOD) Security
Nicholas Davis
 
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
BeyondTrust
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
Kevin M. Moker, CFE, CISSP, ISSMP, CISM
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
 
NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New WorldNTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New World
North Texas Chapter of the ISSA
 
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
North Texas Chapter of the ISSA
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
Tanmay Shinde
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
Tanmay Shinde
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa
 

Viewers also liked (16)

The IT Security Jungle of Higher Education
The IT Security Jungle of Higher EducationThe IT Security Jungle of Higher Education
The IT Security Jungle of Higher Education
 
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9 UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Information Systems 365 Lecture Six -- Access Control
Information Systems 365 Lecture Six -- Access ControlInformation Systems 365 Lecture Six -- Access Control
Information Systems 365 Lecture Six -- Access Control
 
Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional Certifications
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Cloud Security and Bring Your Own Device (BYOD) Security
Cloud Security and Bring Your Own Device (BYOD) SecurityCloud Security and Bring Your Own Device (BYOD) Security
Cloud Security and Bring Your Own Device (BYOD) Security
 
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New WorldNTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New World
 
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Similar to Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison

Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Abhinav Biswas
 
AtlSecCon 2016
AtlSecCon 2016AtlSecCon 2016
AtlSecCon 2016
Earl Carter
 
Data Governance and Management in Cloud pak nam
Data Governance and Management in Cloud pak namData Governance and Management in Cloud pak nam
Data Governance and Management in Cloud pak nam
PT Datacomm Diangraha
 
LT-1 Language Technology and the Sharing Economy
LT-1 Language Technology and the Sharing EconomyLT-1 Language Technology and the Sharing Economy
LT-1 Language Technology and the Sharing Economy
Joseph Wojowski
 
CNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring RationaleCNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring Rationale
Sam Bowne
 
Drm landscape and online streaming
Drm landscape and online streamingDrm landscape and online streaming
Drm landscape and online streaming
Jas Chhabra
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Positive Hack Days
 
Computer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxComputer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptx
SmithaV19
 
Vp ns
Vp nsVp ns
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
CASCouncil
 
A non-technical introduction to Cloud Computing
A non-technical introduction to Cloud ComputingA non-technical introduction to Cloud Computing
A non-technical introduction to Cloud Computing
William Pourmajidi
 
VPN
VPNVPN
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
GeekNightHyderabad
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Greater Noida Institute Of Technology
 
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse TeamsUsing GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
Andrew Morris
 
Security events in 2014
Security events in 2014Security events in 2014
Security events in 2014
Chong-Kuan Chen
 
Raabit and bacteria
Raabit and bacteriaRaabit and bacteria
Raabit and bacteria
sabin kafle
 
Alfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitAlfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transit
Toni de la Fuente
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
Usman Arshad
 

Similar to Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison (20)

Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
AtlSecCon 2016
AtlSecCon 2016AtlSecCon 2016
AtlSecCon 2016
 
Data Governance and Management in Cloud pak nam
Data Governance and Management in Cloud pak namData Governance and Management in Cloud pak nam
Data Governance and Management in Cloud pak nam
 
LT-1 Language Technology and the Sharing Economy
LT-1 Language Technology and the Sharing EconomyLT-1 Language Technology and the Sharing Economy
LT-1 Language Technology and the Sharing Economy
 
CNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring RationaleCNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring Rationale
 
Drm landscape and online streaming
Drm landscape and online streamingDrm landscape and online streaming
Drm landscape and online streaming
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
 
Computer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxComputer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptx
 
Vp ns
Vp nsVp ns
Vp ns
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
 
A non-technical introduction to Cloud Computing
A non-technical introduction to Cloud ComputingA non-technical introduction to Cloud Computing
A non-technical introduction to Cloud Computing
 
VPN
VPNVPN
VPN
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse TeamsUsing GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
 
Security events in 2014
Security events in 2014Security events in 2014
Security events in 2014
 
Raabit and bacteria
Raabit and bacteriaRaabit and bacteria
Raabit and bacteria
 
Alfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitAlfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transit
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 

More from Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
Nicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
Nicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
Nicholas Davis
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
Nicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
Nicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
Nicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
Nicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
Nicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
Nicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
Nicholas Davis
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
Nicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
Nicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
Nicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Nicholas Davis
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep Web
Nicholas Davis
 
Scary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebScary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep Web
Nicholas Davis
 
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Nicholas Davis
 

More from Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep Web
 
Scary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebScary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep Web
 
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
 

Recently uploaded

1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
JeyaPerumal1
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 

Recently uploaded (20)

1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 

Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison

  • 1. Team 3 Dan Tan Derek Weisman Leah Wetzel Shuruthy Yogarajah Tyler Stump Vanessa Voss
  • 2. “Netflix is the world’s leading Internet television network with over 86 million members in over 190 countries enjoying more than 125 million hours of TV shows and movies per day, including original series, documentaries and feature films.”
  • 4. Yesterday - Netflix announces ‘Download and Go’ https://www.youtube.com/watch?v=7Bkz5awx wYk
  • 5. • Netflix was invented after Blockbuster charged co-founder, Reed Hastings, a $40 late fee on his ‘Apollo 13’ rental • Netflix envelopes are rectangular because square envelopes cost more to mail via USPS. If these envelopes were square, it would have cost Netflix an additional 225M to mail DVDs in 2011 • Netflix gathers data from BitTorrent and other illegal pirating sites to determine which content they will purchase for distribution via their streaming service Fun Facts
  • 6.
  • 7. Security Tools • Every few months, Netflix unveils a new security tool • These started with Security Monkey and include FIDO (Fully Integrated Defense Operation), Lemur, and Sleepy Puppy • Coming soon is Dirty Laundry as the tenth security release
  • 8. Power of Automation • Being such a large company, Netflix needs to find ways to move faster when dealing with security threats • Their solution is automation • Automation helps them identify compromised accounts, respond to security incidents, and monitor security configurations in a way that is much quicker than a manual approach • Security personnel are alerted when an issue is detected • That way, personnel aren’t bogged down by being alerted to every minuscule change in the system
  • 9. Open Company • No BYOD Policy • OSS (Open Source Software) for a large amount of their software and tools • Also have looked into innovative physical security
  • 10.
  • 11. Information Security • These are two-fold • Netflix has both their company data to protect as well as the information of their customers • Company that is completely cloud based
  • 12. • Netflix is proactive instead of reactive • Search for compromised accounts on sites like Pastebin in order to protect their users • Collaboration between engineers and product deployment (DevOps) • Allows issues to be communicated earlier before they become a serious problem
  • 13.
  • 14. Getting Access to Movies • 5-step process • User Authentication - Makes sure that the viewer is indeed a Netflix subscriber and has the right playback privileges • Device Authorization - Identify the device that the user is playing from, and to ensure that the limit of six is not exceeded
  • 15. • Instruction Fetching - The player gets information from the Netflix servers about how to play the movie, and where to get the files (only happens after device is authorized) • License Acquisition - Controls DRM-encoded video and audio files. – It is the last security step before playback can begin, basically getting license to decrypt the video. • Playback - Playback can finally take place once these constraints have been enforced. The player talks directly to the Netflix Streaming servers, which in turn assume that all security concerns have already been taken care of by the other components. • PROBLEM? Race Condition. Once you reach the playback session, Netflix assumes that everything is safe. (similar to the angry bird reference) Attached from“Lecture Five and Six”, Nicholas Davis
  • 16.
  • 17. Layers of Security • Requests user authentication before playing the video • Only allowing a maximum of six playback devices per account • Encrypts the video content • Providing unique decryption keys per movie and device
  • 18. How do they do that? • The security checks take place over the duration of the playback experience, and delegated to several different Netflix components and servers, each with distinct responsibilities. (Segregation of duties) • Microsoft Silverlight prevents cross-site scripting and makes sure that the player only talks to Netflix servers • Microsoft DRM component gets an individualized key for each player and coordinates with the License server to acquire keys that are unique to the movie and the player
  • 19. What’s so GREAT about these different servers? • Information is shared between these different servers via cookies • By delegating tasks, these servers and client components can focus on the particular constraints that they have to enforce, and assume that other constraints are checked somewhere else • Security on each of these servers can be tightened as desired, when Netflix detects a breach at a particular point • The encryption of the video files ensures that only players with decryption algorithm (Netflix player) can view them • If one of those decryption keys is compromised then the security threat is minor, because the keys are individualized and can only be used by one player
  • 20.
  • 21. Location • Los Gatos, California – Floods, earthquakes, tropical storms • Railroad Tracks • Highway
  • 22. Exterior • Light Posts • Sidewalks • Landscape • Walls • Road Entrance • Cameras
  • 23. Interior • Glass Walls and Doors – Territorial Reinforcement • Cameras • Front Desk Employee – Natural Surveillance
  • 24. Mobile Access • From Keyfobs to Smartphones – Digital key • Have to know… – Phone can be used as key – Passcode to the phone – How to activate the key with the app
  • 25.
  • 26. Automatic Approaches • Security Monkey – Monitors internal security configurations • Scumbler – Automatic web searches • Fully Integrated Defense Operation – Automatic incident response
  • 27. Detecting the Host • Problem – With FIDO, there hasn’t been a focus on detecting the host • Suggestion – Timely DNS Resolution
  • 28.
  • 29. HTTPS • HTTP vs. HTTPS • Encryption is critical for ensuring safe communication – and personalized communication
  • 30. MLS • MLS is the Best • Superior flexibility for cross-communication
  • 31. The Future • Offline Mode?!? • Potential Problem: data gaps?
  • 32.
  • 33. AWS Outage • Cloud computing
  • 34. • What went well? – Multiple zones – hot zones – S3 storage • What failed? – Manual operations – shifting services out of zones – ELB Load Balancing – servers down? Service lost!
  • 35. • Chaos Monkey – Constant simulated failures so that Netflix systems know how to react • Chaos Gorilla – Total service failure as opposed to smaller, localized breaches
  • 36.
  • 37. Restrictive Legal, Regulatory, and Compliance • Financial – Securities Exchange Act of 1934 – Sarbanes Oxley • Payment Processing – PCI DSS (Payment Card Industry Data Security Standard) Compliance (Same) • Content, IP, Licensing, Distribution – Licensing contracts with TV Shows, Networks, and Studios • 10/18/2016 - Relativity Media sued Netflix for breach of contract and libel • NOT subject to Federal Communication Commission (FCC) regulation – FCC - “It is outside of open internet.”
  • 38. Netflix’s Response to Regulation and Compliance • 2012 – Formed Political Action Committee ‘FLIXPAC’ – Net Neutrality – Bandwidth Caps – Usage-based Billing (Canada) – VPPA, Video Privacy Protection Act (US) • Supported 2012 Amendments, which allowed video rental companies to share rental information on social networking sites, with customer permission
  • 39. Protective Legal, Regulatory, and Compliance • Proprietary Intellectual Property – Protected by Patent, Trademark, Copyright, Trade Secret Laws, Confidentiality Agreements • Stop Online Piracy Act (SOPA) • Protect IP Act (PIPA) • Computer Fraud and Abuse Act (CFAA)
  • 40.
  • 41. Application Overview • Data Collected by the App: – Sign Up - Personally Identifiable Information (Name, Postal Address, Email Address, Telephone Number) – Payments - Payment Information (Credit Card Number, Expiration, Security Code) – User Preferences/Profiles - Reviews, Ratings, Account Settings – Use Data - • Interactions with User Interface and Advertising • Computer, device, and software data • Title selections, watch history, search queries
  • 42. Application Security • Application Security Best Practices: – Container-based development > simplified development experience – NetflixEverywhere Global Architecture> service availability, latency, data replication, compute capacity, and efficiency – HTTPS > secure video streams – Integration with Amazon Web Services • S3 > Big Data • Simple Email Service > Customer Emails • ECS > Container Scheduling, Execution, and Integration – Netflix is committed to open source. • Big Data, Build and Delivery Tools, Common Runtime Services and Libraries, Content Encoding, Data Persistence, Insight, Reliability, Performance, Security, User Interface
  • 43. External Security • External Security Considerations – Device – Browser – Internet Service Providers – 3rd Parties 10/14/16 - “As part of our regular security monitoring, we discovered that credentials that match your Netflix email address and password were included in a release of email addresses and passwords from a breach at another company.”
  • 44. Availability is a Priority • On Integrity/Confidentiality: – “We believe we use reasonable administrative, logical, physical and managerial measures to safeguard your personal information against loss, theft and unauthorized access, use and modification. Unfortunately, no measures can be guaranteed to provide 100% security. Accordingly, we cannot guarantee the security of your information.” • On Availability: – “ Members can watch as much as they want, anytime, anywhere, on nearly any Internet-connected screen. Members can play, pause and resume watching, all without commercials or commitments.”
  • 45.
  • 46. • Current Netflix Operations Security in place to monitor day to day work and use are: – Creating and maintaining user accounts and access for data access – Carrying out security assessments – Limiting excessive customer data • Customer name and billing Information aka credit card numbers- Sensitive Customer Data – Service Level Agreement with third party operations provider--Indicating acceptable and unacceptable performance and recovery baseline agreements in the case of a breach within Netflix customer data from the third party • Sensitive customer data is also maintained in third parties used in Operations for Netflix, one of their third parties is Amazon Web Services (AWS)
  • 47. • No threats have CURRENTLY been discovered at Netflix concerning Operations Security • Periodic Vulnerability Testing – Check for new threats – Confirm old threats – Helps evaluate company's security posture
  • 48.
  • 49. • Moved from vertically scaled operation (data centers) to horizontally scaled highly reliable system (cloud) – August 2008 - Netflix Database Corruptions stops operations, could not ship DVDs – January 2016 - Netflix operates completely on cloud • 7 Year process to finally finish – 8 times as many streaming members – Cloud has supported the rapid growth – Elasticity of Cloud allows Netflix to add thousands of virtual servers and create storage – Cloud cost per streaming is way cheaper then in a data center – Can Now Stream Netflix Worldwide
  • 50. • There were a number of outages in data centers---reason for moving to cloud BUT there were outages in cloud as well – Christmas Eve of 2012 – Had issues with AWS that routes network traffic to Netflix – Now resolved
  • 51.
  • 52. BYOD • Netflix wants to maintain a corporate culture that is based off of freedom and trust • Do not incorporate BYOD security or Mobile Device Management (MDM) software and policies • Netflix does not want to govern employee owned devices • Their tactic is to only protect the data • Believe that extreme IT security actions will lead to under the table action by employees
  • 53. Threats • Information gets transferred where it should not be - lost devices, memorized passwords, malware infections • How will they address security concerns without containerization and virtualization through MDM
  • 54. Problems and Suggested Change • Problem: – Employees may not be aware of the correct rules and standards in which to abide for BYOD and therefore information may end up in the wrong hands if employees are not correctly education • Suggestion for change: – Set guidelines and educate employees of BYOD expectations as a part of training and then expect employees to follow through. Explain it is just a part of the process of using BYOD – Should not interrupt the corporate culture of trust and freedom by educating employees
  • 55. References https://www.hidglobal.com/doclib/files/resource_files/netflix-pilot-cs-en-2012-09-24.pdf http://blogs.wsj.com/cio/2015/06/01/how-netflix-manages-security-in-the-age-of-devops/ https://informationdiscoverydigest.com/2013/09/19/netflix-protecting-data-over-devices-byod-and-ediscovery/ http://fieldguide.gizmodo.com/stop-netflix-youtube-spotify-and-more-from-eating-u-1759395052 http://arstechnica.com/information-technology/2016/02/netflix-finishes-its-massive-migration-to-the-amazon-cloud/ https://media.netflix.com/en/company-blog/completing-the-netflix-cloud-migration http://techblog.netflix.com/2012/12/a-closer-look-at-christmas-eve-outage.html http://www.worldtvpc.com/blog/amazon-want-100-of-netflix-streaming-on-their-cloud/ https://ir.netflix.com/index.cfm https://media.netflix.com/en/about-netflix https://twitter.com/netflix/status/803962377997688832?ref_src=twsrc%5Etfw https://www.cnet.com/news/blockbuster-laughed-at-netflix-partnership-offer/ https://www.quora.com/Why-is-the-Netflix-DVD-envelope-rectangular http://www.forbes.com/sites/timworstall/2013/09/16/how-clever-netflix-monitors-bittorrent-to-purchase- shows/#3b4e4b4c38cd https://pomelollc.files.wordpress.com/2009/04/pomelo-tech-report-netflix.pdf https://github.com/Netflix/msl/wiki/Netflix-ID-Cookies-User-Authentication https://netflix.github.io/ https://ir.netflix.com/index.cfm