SlideShare a Scribd company logo
Bring Your Own Disclosure
Analysing BYOD Threats to Corporate Information
Denys A. Flores, Farrukh Qazi & Arshad Jhumka
TrustCom 2016 – Tianjin, China
August 25th, 2016
Topics
Research Background
Related Work
The BYOD Threat to Corporate Information
The BYOD Challenge to Digital Forensics
Analysing BYOD Threats: Methodology
Conclusions
Research Background…
During data breaches, databases are the primary targets and also a great
challenge for forensic investigations.
DB Forensics applies digital forensic approaches to gather suitable digital
evidence related to database activity for presentation in a court of law [1] –
evidence may be stored in different sources.
DB Forensics has received very little research attention [2].
Generating trustworthy digital evidence by ensuring Chain of Custody
(evidence possession, authenticity and provenance) during the investigation
life cycle.
Research Background…
Reactive DB Forensics Proactive DB Forensics
DB reconstruction and recovery – reactive
controls [3]
Analyse logged activity (audit stage) of
suspicious events – proactive controls
Traditional imaging and file carving [4][5]
eDiscovery - digital evidence from multiple
trusted distributed sources
Admissibility may be challenged [2] Requires a forensically ready environment
Time-consuming when dealing with short
incident-response time
Relatively shorter than reactive techniques
Traditional Digital Forensic techniques may not be suitable for DB
Forensics [15].
Related Work
Previous work on mitigating BYOD Threats has not considered
security and digital forensics issues.
Mobile Device Management (MDM) solutions [6] provide
mobile device access control, but do not prevent/monitor
information access and misuse (i.e. disclosure and
contamination).
STRIDE-based Threat Models have already been applied for
supporting digital forensic readiness initiatives [14] without
analysing threat interaction.
Our research provides a baseline for understanding the
environment in which proactive digital forensics initiatives may
be deployed [16], considering internal and external threat
interactions in the BYOD context.
The BYOD Threat to Corporate Information
Bring-Your-Own-Device (BYOD), or Dual-Use Devices is a growing
trend encouraged by some organisations.
Increases employee productivity and accessibility to corporate
information assets (including databases) from anywhere at anytime.
Security concerns regarding monitoring and controlling employee
mobile device access to information assets [6]
BYOD – Bring Your Own Disclosure??
The BYOD Challenge to Digital Forensics
Sometimes trusted insiders (employees) misuse credentials to access corporate
information assets, such as databases, from uncontrolled devices.
In BYOD, digital evidence is distributed in different locations and collected in various
electronic media [7].
Incidents related to information misuse (disclosure and contamination) [8][9] require
proper event identification to associate actions with actors.
Accountability is a security characteristic for forensics and auditing purposes [10].
When there is an incident there is someone accountable for it!
The BYOD Challenge to Digital Forensics
BYOD is a source of a vast amount of digital evidence [11].
When corporate-owned relatively easy to handle.
Insider activity has been overlooked as only outsider attacks
are seen as relevant [12].
Malicious/naive insider actions must be controlled [13] to
avoid corporate information disclosure [9] and
contamination [8].
In BYOD, there is uncontrolled mobile device activity [6]
In BYOD controlling and monitoring
evidence sources => device ownership issues
Analysing BYOD Threats: Methodology
Define external and internal threat contexts where information misuse
in BYOD may lead to forensic investigations.
Determining a STRIDE-based BYOD Threat Model for determining
potential threats to corporate information.
Analyse threat interactions from inside and outside the corporate
perimeter.
Defining the BYOD External/Internal Threat Context
Actor Carrier Target Example
Cybercriminals
known as
Outsiders
Naïve employee
BYOD activity
Corporate
Information
An employee can disclose
corporate information in
unsecure/untrusted Outsider
Locations.
An employee can download
malicious applications that
retrieves corporate information
and send it back to the Outsider
Trusted
employees
known as
Insiders
Unauthorised
mobile activity
Credential
Misuse
An employee can misuse his/her
database credentials to disclose or
contaminate information.
Defining the BYOD External/Internal Threat Context
External Internal
Actor Cybercriminals (outsiders) Trusted employees (insiders)
Threats
• Malware
• Phishing
• Social Engineering
• Malicious Mobile Apps.
• Insecure Wireless
Networks
• Fake Certificate
Authorities
• DoS
• Uncontrolled Devices
• Device Misconfiguration
• Unauthorised Information Sharing in
Personal Clouds
• Mixture of Personal and Corporate
Information
• Lost/Stolen/Unlinked Devices
• Device Ownership
BYOD exposes information assets (including databases) to
External and Internal Threat Contexts
Determining a STRIDE-based BYOD Threat Model
Trust Boundaries Represents Interacts With
A. Internet Trust Boundary (ITB) Lower-Trust Insider Activity
Personal Cloud
Mobile App Stores
CPTB
B. Business Core Trust Boundary (BCTB) Higher-Trust Insider Activity
Relational Database
Audit Repository
C. Corporate Perimeter Trust Boundary (CPTB) Internal/External Insider Interaction
ITB-located Mobile Client
CPTB
Analysing Threat Interactions
Threats were analysed using relevant research literature and security
reports.
Analysis showed that corporate information is either contaminated or
disclosed.
Particularly in databases, which are primary targets during data
breaches.
If databases are compromised, then proactive digital forensic
investigations are required
Analysing Threat Interactions
BYOD Threats causing Information Contamination
Analysing Threat Interactions
BYOD Threats causing Information Disclosure
Conclusions
Future work towards protecting corporate information (in databases) from
unauthorised disclosure and contamination, using proactive approaches.
Regarding information contamination, control and monitor actions that can
compromise information integrity, introducing repudiation issues when disabling
logging and auditing repositories.
Regarding information disclosure, control malicious insider activity such as credential
misuse to access sensitive information. E.g. DB credential misuse.
Current undergoing work analysing chain of custody and evidence requirements to
define the notion of evidence possession, authenticity and provenance in BYOD
environments.
Thank You!
Denys A. Flores
PhD Student
Department of Computer Science
University of Warwick
email: d.flores-armas@warwick.ac.uk
web: go.warwick.ac.uk/dflores
twitter: @denys_flores
Sponsors
References
[1]Fowler, K. (2007). SQL Server Database Forensics. [Online] Available at: http://ubm.io/1WuG9Il
[2]Hauger, W., Olivier, M. (2015). The state of Database Forensic research. In IEEE Information Security for South Africa (ISSA)
[3]Fasan, O., Olivier, M. (2012). On Dimensions of Reconstruction in Database Forensics, In Seventh International Workshop on Digital
Forensics & Incident Analysis.
[4]Fowler, K. (2008). SQL Server Forensic Analysis. Addison-Wesley Professional, Boston
[5]Litchfield, D. (2007-2011). Papers on Oracle Forensics. Available at: http://www.davidlitchfield.com/security.htm
[6]Sobers, A. (2015). BYOD and the Mobile Enterprise – Organisational challenges and solutions to adopt BYOD. [Online]. Available at:
http://bit.ly/1Z8ZkG2
[7]Attoe, R. (2016). Chapter 6 - Digital forensics in an eDiscovery world, In Digital Forensics, edited by John Sammons, Syngress,
Boston, Pp. 85-98
[8]Downer, K. and Bhattacharya, M. (2016). BYOD security: A new business challenge. [Online] Available at: http://bit.ly/1O08xJY
[9]Pohlmann, N. et al. (2015). Bring your own device for authentication (BYOD4A)–the Xign–System. In Information Security Solutions
Europe (ISSE) 2015 Conference. Springer, 2015, pp. 240–250.
[10]Stallings, W. (2011). Network Security Essentials, 4th edition, New York, US; Prentice-Hall
[11]Francis, K. and Larson, M. (2015). Digital Forensics in the Mobile, BYOD, and Cloud Era. [Online]. Available at:
http://bit.ly/1T9TxdY
[12]Pavlou, K. et al. (2012). Achieving Database Information Accountability in the Cloud. [Online] Available at: http://bit.ly/1WuGzyh
[13]Densham, B. (2015). Three cyber-security strategies to mitigate the impact of a data breach. In Network Security, vol. 2015, 2015,
pp. 5–8. [Online] Available at: http://bit.ly/1Wv9CQJ
[14]Lourida, K., et al. (2013). Assessing database and network threats in traditional and cloud computing. [Online]. Available at:
http://wrap.warwick.ac.uk/65197/
[15]Khanuja, H. (2014). Role of metadata in forensic analysis of database attacks, In IEEE International Advance Computing
Conference (IACC).
[16]Henry, P. et al (2013). The SANS Survey of Digital Forensics and Incident Response. [Online]. Available at: http://bit.ly/1SDdomv

More Related Content

What's hot

Ht t17
Ht t17Ht t17
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
Eryk Budi Pratama
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016
Tomppa Järvinen
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
Eryk Budi Pratama
 
Identify and Stop Insider Threats
Identify and Stop Insider ThreatsIdentify and Stop Insider Threats
Identify and Stop Insider Threats
Lancope, Inc.
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
Zivaro Inc
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
Jacqueline Fick
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
Happiest Minds Technologies
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
Murray Security Services
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
North Texas Chapter of the ISSA
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider Threat
Lancope, Inc.
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasures
KAMRAN KHALID
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
andreasschuster
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
ijtsrd
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
Tomppa Järvinen
 
Data security
Data securityData security
Data security
Soumen Mondal
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics Lecture
Ollie Whitehouse
 
Database security
Database securityDatabase security
Database security
Zubair Rahim
 
Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
Synopsys Software Integrity Group
 
The Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityThe Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise Security
Stephen Cobb
 

What's hot (20)

Ht t17
Ht t17Ht t17
Ht t17
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
Identify and Stop Insider Threats
Identify and Stop Insider ThreatsIdentify and Stop Insider Threats
Identify and Stop Insider Threats
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider Threat
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasures
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
 
Data security
Data securityData security
Data security
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics Lecture
 
Database security
Database securityDatabase security
Database security
 
Flight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the LawFlight East 2018 Presentation–Data Breaches and the Law
Flight East 2018 Presentation–Data Breaches and the Law
 
The Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityThe Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise Security
 

Similar to TrustCom-16 - Paper ID 227

A foundation for breach data analysis
A foundation for breach data analysisA foundation for breach data analysis
A foundation for breach data analysis
Alexander Decker
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
Jenna Murray
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGSPRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
IJCNCJournal
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
tonkung6
 
Security attacks taxonomy on
Security attacks taxonomy onSecurity attacks taxonomy on
Security attacks taxonomy on
ijmnct
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01
ijmnct
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
IRJET Journal
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptx
SyedSaqlain32
 
INT 1010 07-4.pdf
INT 1010 07-4.pdfINT 1010 07-4.pdf
INT 1010 07-4.pdf
Luis R Castellanos
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
YogeshIJTSRD
 
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
sulu98
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
ijtsrd
 
Running Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docx
Running Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docxRunning Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docx
Running Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docx
todd271
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
GFI Software
 
BYOD: Risks and Opportunities
BYOD: Risks and OpportunitiesBYOD: Risks and Opportunities
BYOD: Risks and Opportunities
budzeg
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
Usman Anjum
 
Design for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemDesign for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic System
CSCJournals
 
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
IJERA Editor
 

Similar to TrustCom-16 - Paper ID 227 (20)

A foundation for breach data analysis
A foundation for breach data analysisA foundation for breach data analysis
A foundation for breach data analysis
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGSPRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
 
Security attacks taxonomy on
Security attacks taxonomy onSecurity attacks taxonomy on
Security attacks taxonomy on
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptx
 
INT 1010 07-4.pdf
INT 1010 07-4.pdfINT 1010 07-4.pdf
INT 1010 07-4.pdf
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
 
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 
Running Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docx
Running Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docxRunning Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docx
Running Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docx
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
BYOD: Risks and Opportunities
BYOD: Risks and OpportunitiesBYOD: Risks and Opportunities
BYOD: Risks and Opportunities
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Design for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemDesign for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic System
 
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
 

More from Denys A. Flores, PhD

D flores trust-com19-pres
D flores trust-com19-presD flores trust-com19-pres
D flores trust-com19-pres
Denys A. Flores, PhD
 
Conozca cómo evadir el ataque de los hackers
Conozca cómo evadir el ataque de los hackersConozca cómo evadir el ataque de los hackers
Conozca cómo evadir el ataque de los hackers
Denys A. Flores, PhD
 
eDem&eGov 2014
eDem&eGov 2014eDem&eGov 2014
eDem&eGov 2014
Denys A. Flores, PhD
 
Memorias del Campus Party Quito 2014
Memorias del Campus Party Quito 2014Memorias del Campus Party Quito 2014
Memorias del Campus Party Quito 2014
Denys A. Flores, PhD
 
eDem&eGov 2013
eDem&eGov 2013eDem&eGov 2013
eDem&eGov 2013
Denys A. Flores, PhD
 
Memorias del Campus Party Quito 2013
Memorias del Campus Party Quito 2013Memorias del Campus Party Quito 2013
Memorias del Campus Party Quito 2013
Denys A. Flores, PhD
 

More from Denys A. Flores, PhD (6)

D flores trust-com19-pres
D flores trust-com19-presD flores trust-com19-pres
D flores trust-com19-pres
 
Conozca cómo evadir el ataque de los hackers
Conozca cómo evadir el ataque de los hackersConozca cómo evadir el ataque de los hackers
Conozca cómo evadir el ataque de los hackers
 
eDem&eGov 2014
eDem&eGov 2014eDem&eGov 2014
eDem&eGov 2014
 
Memorias del Campus Party Quito 2014
Memorias del Campus Party Quito 2014Memorias del Campus Party Quito 2014
Memorias del Campus Party Quito 2014
 
eDem&eGov 2013
eDem&eGov 2013eDem&eGov 2013
eDem&eGov 2013
 
Memorias del Campus Party Quito 2013
Memorias del Campus Party Quito 2013Memorias del Campus Party Quito 2013
Memorias del Campus Party Quito 2013
 

Recently uploaded

Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 

Recently uploaded (20)

Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 

TrustCom-16 - Paper ID 227

  • 1. Bring Your Own Disclosure Analysing BYOD Threats to Corporate Information Denys A. Flores, Farrukh Qazi & Arshad Jhumka TrustCom 2016 – Tianjin, China August 25th, 2016
  • 2. Topics Research Background Related Work The BYOD Threat to Corporate Information The BYOD Challenge to Digital Forensics Analysing BYOD Threats: Methodology Conclusions
  • 3. Research Background… During data breaches, databases are the primary targets and also a great challenge for forensic investigations. DB Forensics applies digital forensic approaches to gather suitable digital evidence related to database activity for presentation in a court of law [1] – evidence may be stored in different sources. DB Forensics has received very little research attention [2]. Generating trustworthy digital evidence by ensuring Chain of Custody (evidence possession, authenticity and provenance) during the investigation life cycle.
  • 4. Research Background… Reactive DB Forensics Proactive DB Forensics DB reconstruction and recovery – reactive controls [3] Analyse logged activity (audit stage) of suspicious events – proactive controls Traditional imaging and file carving [4][5] eDiscovery - digital evidence from multiple trusted distributed sources Admissibility may be challenged [2] Requires a forensically ready environment Time-consuming when dealing with short incident-response time Relatively shorter than reactive techniques Traditional Digital Forensic techniques may not be suitable for DB Forensics [15].
  • 5. Related Work Previous work on mitigating BYOD Threats has not considered security and digital forensics issues. Mobile Device Management (MDM) solutions [6] provide mobile device access control, but do not prevent/monitor information access and misuse (i.e. disclosure and contamination). STRIDE-based Threat Models have already been applied for supporting digital forensic readiness initiatives [14] without analysing threat interaction. Our research provides a baseline for understanding the environment in which proactive digital forensics initiatives may be deployed [16], considering internal and external threat interactions in the BYOD context.
  • 6. The BYOD Threat to Corporate Information Bring-Your-Own-Device (BYOD), or Dual-Use Devices is a growing trend encouraged by some organisations. Increases employee productivity and accessibility to corporate information assets (including databases) from anywhere at anytime. Security concerns regarding monitoring and controlling employee mobile device access to information assets [6] BYOD – Bring Your Own Disclosure??
  • 7. The BYOD Challenge to Digital Forensics Sometimes trusted insiders (employees) misuse credentials to access corporate information assets, such as databases, from uncontrolled devices. In BYOD, digital evidence is distributed in different locations and collected in various electronic media [7]. Incidents related to information misuse (disclosure and contamination) [8][9] require proper event identification to associate actions with actors. Accountability is a security characteristic for forensics and auditing purposes [10]. When there is an incident there is someone accountable for it!
  • 8. The BYOD Challenge to Digital Forensics BYOD is a source of a vast amount of digital evidence [11]. When corporate-owned relatively easy to handle. Insider activity has been overlooked as only outsider attacks are seen as relevant [12]. Malicious/naive insider actions must be controlled [13] to avoid corporate information disclosure [9] and contamination [8]. In BYOD, there is uncontrolled mobile device activity [6] In BYOD controlling and monitoring evidence sources => device ownership issues
  • 9. Analysing BYOD Threats: Methodology Define external and internal threat contexts where information misuse in BYOD may lead to forensic investigations. Determining a STRIDE-based BYOD Threat Model for determining potential threats to corporate information. Analyse threat interactions from inside and outside the corporate perimeter.
  • 10. Defining the BYOD External/Internal Threat Context Actor Carrier Target Example Cybercriminals known as Outsiders Naïve employee BYOD activity Corporate Information An employee can disclose corporate information in unsecure/untrusted Outsider Locations. An employee can download malicious applications that retrieves corporate information and send it back to the Outsider Trusted employees known as Insiders Unauthorised mobile activity Credential Misuse An employee can misuse his/her database credentials to disclose or contaminate information.
  • 11. Defining the BYOD External/Internal Threat Context External Internal Actor Cybercriminals (outsiders) Trusted employees (insiders) Threats • Malware • Phishing • Social Engineering • Malicious Mobile Apps. • Insecure Wireless Networks • Fake Certificate Authorities • DoS • Uncontrolled Devices • Device Misconfiguration • Unauthorised Information Sharing in Personal Clouds • Mixture of Personal and Corporate Information • Lost/Stolen/Unlinked Devices • Device Ownership BYOD exposes information assets (including databases) to External and Internal Threat Contexts
  • 12. Determining a STRIDE-based BYOD Threat Model Trust Boundaries Represents Interacts With A. Internet Trust Boundary (ITB) Lower-Trust Insider Activity Personal Cloud Mobile App Stores CPTB B. Business Core Trust Boundary (BCTB) Higher-Trust Insider Activity Relational Database Audit Repository C. Corporate Perimeter Trust Boundary (CPTB) Internal/External Insider Interaction ITB-located Mobile Client CPTB
  • 13. Analysing Threat Interactions Threats were analysed using relevant research literature and security reports. Analysis showed that corporate information is either contaminated or disclosed. Particularly in databases, which are primary targets during data breaches. If databases are compromised, then proactive digital forensic investigations are required
  • 14. Analysing Threat Interactions BYOD Threats causing Information Contamination
  • 15. Analysing Threat Interactions BYOD Threats causing Information Disclosure
  • 16. Conclusions Future work towards protecting corporate information (in databases) from unauthorised disclosure and contamination, using proactive approaches. Regarding information contamination, control and monitor actions that can compromise information integrity, introducing repudiation issues when disabling logging and auditing repositories. Regarding information disclosure, control malicious insider activity such as credential misuse to access sensitive information. E.g. DB credential misuse. Current undergoing work analysing chain of custody and evidence requirements to define the notion of evidence possession, authenticity and provenance in BYOD environments.
  • 18. Denys A. Flores PhD Student Department of Computer Science University of Warwick email: d.flores-armas@warwick.ac.uk web: go.warwick.ac.uk/dflores twitter: @denys_flores Sponsors
  • 19. References [1]Fowler, K. (2007). SQL Server Database Forensics. [Online] Available at: http://ubm.io/1WuG9Il [2]Hauger, W., Olivier, M. (2015). The state of Database Forensic research. In IEEE Information Security for South Africa (ISSA) [3]Fasan, O., Olivier, M. (2012). On Dimensions of Reconstruction in Database Forensics, In Seventh International Workshop on Digital Forensics & Incident Analysis. [4]Fowler, K. (2008). SQL Server Forensic Analysis. Addison-Wesley Professional, Boston [5]Litchfield, D. (2007-2011). Papers on Oracle Forensics. Available at: http://www.davidlitchfield.com/security.htm [6]Sobers, A. (2015). BYOD and the Mobile Enterprise – Organisational challenges and solutions to adopt BYOD. [Online]. Available at: http://bit.ly/1Z8ZkG2 [7]Attoe, R. (2016). Chapter 6 - Digital forensics in an eDiscovery world, In Digital Forensics, edited by John Sammons, Syngress, Boston, Pp. 85-98 [8]Downer, K. and Bhattacharya, M. (2016). BYOD security: A new business challenge. [Online] Available at: http://bit.ly/1O08xJY [9]Pohlmann, N. et al. (2015). Bring your own device for authentication (BYOD4A)–the Xign–System. In Information Security Solutions Europe (ISSE) 2015 Conference. Springer, 2015, pp. 240–250. [10]Stallings, W. (2011). Network Security Essentials, 4th edition, New York, US; Prentice-Hall [11]Francis, K. and Larson, M. (2015). Digital Forensics in the Mobile, BYOD, and Cloud Era. [Online]. Available at: http://bit.ly/1T9TxdY [12]Pavlou, K. et al. (2012). Achieving Database Information Accountability in the Cloud. [Online] Available at: http://bit.ly/1WuGzyh [13]Densham, B. (2015). Three cyber-security strategies to mitigate the impact of a data breach. In Network Security, vol. 2015, 2015, pp. 5–8. [Online] Available at: http://bit.ly/1Wv9CQJ [14]Lourida, K., et al. (2013). Assessing database and network threats in traditional and cloud computing. [Online]. Available at: http://wrap.warwick.ac.uk/65197/ [15]Khanuja, H. (2014). Role of metadata in forensic analysis of database attacks, In IEEE International Advance Computing Conference (IACC). [16]Henry, P. et al (2013). The SANS Survey of Digital Forensics and Incident Response. [Online]. Available at: http://bit.ly/1SDdomv