SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Personal Data Security in a Digital World



                   Alex Davis
         Vice President of Engineering
                  AllClear ID
Key Points

•   Risks of Data Insecurity & Identity Theft
•   The Old Standby: Failure of the password
•   Multi-Factor Authentication
•   Mobile Risks




                                                2
What is Identity Theft?
FTC: Identity theft occurs when someone uses
your personally identifying
information, like your name, Social Security
number, or credit card number, without your
permission, to commit fraud or other crimes.

• Types:
  –   Financial
  –   Medical
  –   Criminal
  –   Identity Cloning

                                     Source: FTC.gov
Real Life Examples
Why does Identity Theft happen?


   Failed Authentication




                          Source: FTC.gov
The Old Standby: Failure of the Password

•   Brute force dictionary attacks (Brutus)
•   Hash-based dictionary attacks (John-the-Ripper)
•   People use terrible passwords
     – Top 3 Gawker passwords:
            o 123456
            o password
            o 12345678
     – Top 3 rootkit.com (HBGary) passwords:
            o 123456
            o password
            o rootkit
     – 25 Worst Passwords of 2011
           •   http://tinyurl.com/badpassword

•   Best Practice: Password generator/repository
     – PasswordSafe http://passwordsafe.sourceforge.net/
     – Keepass http://keepass.info/
The Old Standby, Round 2: Challenge Questions

•   When easy enough for you to answer, thieves can answer too
•   When difficult enough to defeat thieves, defeats you
•   Examples:
      – Sarah Palin email hack
      – “Mother’s Maiden Name”
•   Best Practice:
     If you have to use them, come up with an answer that is not directly related to the
     question.




                                                                                           7
Multi-Factor Authentication

ATM Card                      OTP       Cellphone +
  + PIN        Biometrics    tokens   PIN & VoiceKey




                                                 8
The Rise of the Smartphones

•    In 2011, 83% of adults have cell phones
•    42% are smart phones
•    62% for ages 25 – 34
•    68% of smartphone users go online with it every day
•    25% use it as their primary internet access


Sources:
http://www.pewinternet.org/Reports/2011/Smartphones.aspx
http://blog.nielsen.com/nielsenwire/online_mobile/generation-app-62-of-mobile-users-25-34-own-smartphones/




                                                                                                             9
Mobile Risks: Android Phones

•   Study by Penn State, Duke University and Intel Labs of 30 of the most popular Android apps found half of
    them were misusing personal information, sending unauthorized info to advertisers.
      – http://appanalysis.org/

•   Recent study by Dasient security company of 10,000 Android apps shows 8% sending personal data to
    unauthorized servers, some including sending unauthorized SMS messages to contacts
•   Mobile “drive by” attack demonstrated. Malicious website installs unauthorized code that can exploit
    further vulnerabilities, in this case eavesdropping on Skype conversations
      – http://www.dasient.com/

•   Android developer Trevor Eckhart reported on discovery of pre-installed software by CarrierIQ on Sprint
    and Verizon phones that monitors, collects, and sends personal usage data, including: websites
    visited, search terms used, location data, “demographic data” (gender, age, sports fan, frequent diner, pet
    owner, etc)
      – http://androidsecuritytest.com/




                                                                                                               10
Mobile Risks: iPhones

•   When iOS 4 was released in 2010, iPhones and iPads started storing up to a year’s
    worth of your timestamped location information in a unencrypted text file
•   Security researcher Charlie Miller discovered a “trojan horse” iPhone app exploit
    to download and execute unrestricted code
•   Even official financial apps aren’t always safe (http://viaforensics.com/appwatchdog/)
     – Wells Fargo stored passwords unencrypted on the phone
     – Bank of America app left answers to security questions in plain text on phones
     – USAA stored account and transit numbers, balances and payments
     – PayPal stored transaction histories unencrypted, including email addresses for
        both parties




                                                                                        11
Mobile Risks: Wireless Networks

•   WEP Encrypted Networks
     – Can be cracked in 15 minutes with a standard Linux laptop
          1.   Airmon-ng – set network card in monitoring mode to access network data without being on
               the network
          2.   Airdump-ng – capture wireless data packets
          3.   Aireplay-ng – inject additional network traffic to speed analysis
          4.   Aircrack-ng – extract WEP key from captured packets. Key can be extracted from 10k – 40k
               packets


•   WPA/WPA2-PSK Encrypted Networks
     – Stronger security but vulnerable to dictionary attacks, takes longer to crack
       depending on password strength
          1.   Airmon-ng & Airdump-ng as above
          2.   Aireplay-ng – force deauthentication/reauthentication to speed cracking attempts
          3.   Aircrack-ng – use pre-generated password dictionary to attack network password




                                                                                                          12
Mobile Risks: Cellular Networks

•   GSM Networks (ATT&T, T-Mobile) are vulnerable to “IMSI Catchers”
     – Spoofs a cellular base station. Intercepts, records, and re-transmits voice calls and text messages
     – Typically costs hundreds of thousands of dollars, only available to law enforcement and intelligence
        agencies
     – Security Researcher Chris Paget in 2010 was able to build a laptop-based IMSI Catcher from scratch
        for $1500 (most of the cost was the laptop)
     – Encrypted calls are no help, the “base station” can simply tell the phone to turn off encryption.
     – Intercepts outbound calls only, incoming calls will go straight to voicemail




                                                                                                              13
Putting it together: “Aerial Cyber Apocalypse”

Richard Perkins and Mike Tassey
http://rabbit-hole.org/

DIY Spy Drone
•    Surplus army target practice drone
        bought online
•    6 ft long, 14 lbs
•    22,000 ft max altitude
•    Up to 45 minute flight time
•    GPS & Google Maps
        pre-programmed flight path

Payload – all off-the shelf parts!
•   HD Camera
•   32 Gb onboard storage
•   Wi-Fi hotspot spoofing and penetration
•   340 million word dictionary for
       brute-forcing passwords
•   4G T-Mobile card
•   Spoof GSM cellphone tower to intercept, decrypt, and record calls and text messages

Total project cost: about $6000




                                                                                          14
Increasing Awareness

• Identity Theft is A) big business, B) damaging, C) caused by a failure to
  identify the authentic user
• A strong authentication solution is required
• The rising ubiquity of smartphones and wireless networks provide
  enormous increases in convenience and capability, but also introduces
  significant new vectors of attack to obtain and expose private information.



“Often the hardest part of cryptography is getting people to use it…It's hard
to build a system that provides strong authentication on top of systems that
can be penetrated by knowing someone's mother's maiden name.” – Bruce
Schneier, Applied Cryptography




                                                                      Source: ITRC

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
Sit presentation
Sit presentationSit presentation
Sit presentation
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Security News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet BangaloreSecurity News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet Bangalore
 
Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
 

Andere mochten auch

Atlas Cars Of London - Hybrid Cabs In London
Atlas Cars Of London - Hybrid Cabs In LondonAtlas Cars Of London - Hybrid Cabs In London
Atlas Cars Of London - Hybrid Cabs In LondonAtlas Cars
 
HRISMeet Sopra Steria Presentation
HRISMeet Sopra Steria PresentationHRISMeet Sopra Steria Presentation
HRISMeet Sopra Steria PresentationExpedite HR
 
Women Safety Initiatives By Minicab Companies Of London
Women Safety Initiatives By Minicab Companies Of LondonWomen Safety Initiatives By Minicab Companies Of London
Women Safety Initiatives By Minicab Companies Of LondonAtlas Cars
 
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe OnlineCyber Crime: Stay Safe Online
Cyber Crime: Stay Safe OnlineSalshaza Putera
 
ePortfolios and eAssessment - - using technology to gather quality assessment...
ePortfolios and eAssessment - - using technology to gather quality assessment...ePortfolios and eAssessment - - using technology to gather quality assessment...
ePortfolios and eAssessment - - using technology to gather quality assessment...Vanguard Visions
 
Are your children cyber safe?
Are your children cyber safe?Are your children cyber safe?
Are your children cyber safe?Mark Kingham
 
Security Landscape Presentation
Security Landscape PresentationSecurity Landscape Presentation
Security Landscape PresentationDoug McTighe
 
Kali app - women safety (Concept)
Kali app - women safety (Concept)Kali app - women safety (Concept)
Kali app - women safety (Concept)Mahek Shah
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Justin Bull
 
Privacy on Social Media by Catalyst Woman
Privacy on Social Media by Catalyst Woman  Privacy on Social Media by Catalyst Woman
Privacy on Social Media by Catalyst Woman Mariam Sb
 
Workshop on women safety ritu dhar, acp,detective dept.
Workshop on women safety  ritu dhar, acp,detective dept.Workshop on women safety  ritu dhar, acp,detective dept.
Workshop on women safety ritu dhar, acp,detective dept.SVSAKOLKATA
 
Introduction to Oracle Database
Introduction to Oracle DatabaseIntroduction to Oracle Database
Introduction to Oracle Databasepuja_dhar
 
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Gohsuke Takama
 
Don Personal Safety For Women Power Point.5
Don   Personal Safety For Women Power Point.5Don   Personal Safety For Women Power Point.5
Don Personal Safety For Women Power Point.5mojo_5
 
Safety of women, Crime Against womens.
Safety of women, Crime Against womens.Safety of women, Crime Against womens.
Safety of women, Crime Against womens.Talha Siddiqui
 
Women Safety by MBA Media Management , ASCO
Women Safety by MBA Media Management , ASCOWomen Safety by MBA Media Management , ASCO
Women Safety by MBA Media Management , ASCOGNRC Hospital
 

Andere mochten auch (20)

The Power of Technology
The Power of TechnologyThe Power of Technology
The Power of Technology
 
Atlas Cars Of London - Hybrid Cabs In London
Atlas Cars Of London - Hybrid Cabs In LondonAtlas Cars Of London - Hybrid Cabs In London
Atlas Cars Of London - Hybrid Cabs In London
 
HRISMeet Sopra Steria Presentation
HRISMeet Sopra Steria PresentationHRISMeet Sopra Steria Presentation
HRISMeet Sopra Steria Presentation
 
Women Safety Initiatives By Minicab Companies Of London
Women Safety Initiatives By Minicab Companies Of LondonWomen Safety Initiatives By Minicab Companies Of London
Women Safety Initiatives By Minicab Companies Of London
 
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe OnlineCyber Crime: Stay Safe Online
Cyber Crime: Stay Safe Online
 
ePortfolios and eAssessment - - using technology to gather quality assessment...
ePortfolios and eAssessment - - using technology to gather quality assessment...ePortfolios and eAssessment - - using technology to gather quality assessment...
ePortfolios and eAssessment - - using technology to gather quality assessment...
 
Are your children cyber safe?
Are your children cyber safe?Are your children cyber safe?
Are your children cyber safe?
 
Women safety
Women safetyWomen safety
Women safety
 
Cyber safe manual_2
Cyber safe manual_2Cyber safe manual_2
Cyber safe manual_2
 
Security Landscape Presentation
Security Landscape PresentationSecurity Landscape Presentation
Security Landscape Presentation
 
Kali app - women safety (Concept)
Kali app - women safety (Concept)Kali app - women safety (Concept)
Kali app - women safety (Concept)
 
Basic Personal Safety Concepts
Basic Personal Safety ConceptsBasic Personal Safety Concepts
Basic Personal Safety Concepts
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)
 
Privacy on Social Media by Catalyst Woman
Privacy on Social Media by Catalyst Woman  Privacy on Social Media by Catalyst Woman
Privacy on Social Media by Catalyst Woman
 
Workshop on women safety ritu dhar, acp,detective dept.
Workshop on women safety  ritu dhar, acp,detective dept.Workshop on women safety  ritu dhar, acp,detective dept.
Workshop on women safety ritu dhar, acp,detective dept.
 
Introduction to Oracle Database
Introduction to Oracle DatabaseIntroduction to Oracle Database
Introduction to Oracle Database
 
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
 
Don Personal Safety For Women Power Point.5
Don   Personal Safety For Women Power Point.5Don   Personal Safety For Women Power Point.5
Don Personal Safety For Women Power Point.5
 
Safety of women, Crime Against womens.
Safety of women, Crime Against womens.Safety of women, Crime Against womens.
Safety of women, Crime Against womens.
 
Women Safety by MBA Media Management , ASCO
Women Safety by MBA Media Management , ASCOWomen Safety by MBA Media Management , ASCO
Women Safety by MBA Media Management , ASCO
 

Ähnlich wie Personal Data Security in a Digital World

ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksMichael Davis
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Trends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursTrends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursMotherGuardians
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHINGsanthuana sg
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
News Byte Session By Mukesh Pathak
News Byte Session By Mukesh PathakNews Byte Session By Mukesh Pathak
News Byte Session By Mukesh PathakMukesh Pathak
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network securityAPNIC
 
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackersHarsh Sharma
 
Crontab Cyber Security session 4
Crontab Cyber Security session 4Crontab Cyber Security session 4
Crontab Cyber Security session 4gpioa
 
ch07-Security.pptx
ch07-Security.pptxch07-Security.pptx
ch07-Security.pptxLuckySaigon1
 
Homeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkHomeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkFlaskdata.io
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSmart Assessment
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesPraveen Vackayil
 

Ähnlich wie Personal Data Security in a Digital World (20)

ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Hackers
HackersHackers
Hackers
 
Trends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursTrends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yours
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
News Byte Session By Mukesh Pathak
News Byte Session By Mukesh PathakNews Byte Session By Mukesh Pathak
News Byte Session By Mukesh Pathak
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackers
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Security Bytes - July 2013
Security Bytes -  July 2013Security Bytes -  July 2013
Security Bytes - July 2013
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Crontab Cyber Security session 4
Crontab Cyber Security session 4Crontab Cyber Security session 4
Crontab Cyber Security session 4
 
ch07-Security.pptx
ch07-Security.pptxch07-Security.pptx
ch07-Security.pptx
 
Homeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkHomeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest link
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 

Kürzlich hochgeladen

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Kürzlich hochgeladen (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Personal Data Security in a Digital World

  • 1. Personal Data Security in a Digital World Alex Davis Vice President of Engineering AllClear ID
  • 2. Key Points • Risks of Data Insecurity & Identity Theft • The Old Standby: Failure of the password • Multi-Factor Authentication • Mobile Risks 2
  • 3. What is Identity Theft? FTC: Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes. • Types: – Financial – Medical – Criminal – Identity Cloning Source: FTC.gov
  • 5. Why does Identity Theft happen? Failed Authentication Source: FTC.gov
  • 6. The Old Standby: Failure of the Password • Brute force dictionary attacks (Brutus) • Hash-based dictionary attacks (John-the-Ripper) • People use terrible passwords – Top 3 Gawker passwords: o 123456 o password o 12345678 – Top 3 rootkit.com (HBGary) passwords: o 123456 o password o rootkit – 25 Worst Passwords of 2011 • http://tinyurl.com/badpassword • Best Practice: Password generator/repository – PasswordSafe http://passwordsafe.sourceforge.net/ – Keepass http://keepass.info/
  • 7. The Old Standby, Round 2: Challenge Questions • When easy enough for you to answer, thieves can answer too • When difficult enough to defeat thieves, defeats you • Examples: – Sarah Palin email hack – “Mother’s Maiden Name” • Best Practice: If you have to use them, come up with an answer that is not directly related to the question. 7
  • 8. Multi-Factor Authentication ATM Card OTP Cellphone + + PIN Biometrics tokens PIN & VoiceKey 8
  • 9. The Rise of the Smartphones • In 2011, 83% of adults have cell phones • 42% are smart phones • 62% for ages 25 – 34 • 68% of smartphone users go online with it every day • 25% use it as their primary internet access Sources: http://www.pewinternet.org/Reports/2011/Smartphones.aspx http://blog.nielsen.com/nielsenwire/online_mobile/generation-app-62-of-mobile-users-25-34-own-smartphones/ 9
  • 10. Mobile Risks: Android Phones • Study by Penn State, Duke University and Intel Labs of 30 of the most popular Android apps found half of them were misusing personal information, sending unauthorized info to advertisers. – http://appanalysis.org/ • Recent study by Dasient security company of 10,000 Android apps shows 8% sending personal data to unauthorized servers, some including sending unauthorized SMS messages to contacts • Mobile “drive by” attack demonstrated. Malicious website installs unauthorized code that can exploit further vulnerabilities, in this case eavesdropping on Skype conversations – http://www.dasient.com/ • Android developer Trevor Eckhart reported on discovery of pre-installed software by CarrierIQ on Sprint and Verizon phones that monitors, collects, and sends personal usage data, including: websites visited, search terms used, location data, “demographic data” (gender, age, sports fan, frequent diner, pet owner, etc) – http://androidsecuritytest.com/ 10
  • 11. Mobile Risks: iPhones • When iOS 4 was released in 2010, iPhones and iPads started storing up to a year’s worth of your timestamped location information in a unencrypted text file • Security researcher Charlie Miller discovered a “trojan horse” iPhone app exploit to download and execute unrestricted code • Even official financial apps aren’t always safe (http://viaforensics.com/appwatchdog/) – Wells Fargo stored passwords unencrypted on the phone – Bank of America app left answers to security questions in plain text on phones – USAA stored account and transit numbers, balances and payments – PayPal stored transaction histories unencrypted, including email addresses for both parties 11
  • 12. Mobile Risks: Wireless Networks • WEP Encrypted Networks – Can be cracked in 15 minutes with a standard Linux laptop 1. Airmon-ng – set network card in monitoring mode to access network data without being on the network 2. Airdump-ng – capture wireless data packets 3. Aireplay-ng – inject additional network traffic to speed analysis 4. Aircrack-ng – extract WEP key from captured packets. Key can be extracted from 10k – 40k packets • WPA/WPA2-PSK Encrypted Networks – Stronger security but vulnerable to dictionary attacks, takes longer to crack depending on password strength 1. Airmon-ng & Airdump-ng as above 2. Aireplay-ng – force deauthentication/reauthentication to speed cracking attempts 3. Aircrack-ng – use pre-generated password dictionary to attack network password 12
  • 13. Mobile Risks: Cellular Networks • GSM Networks (ATT&T, T-Mobile) are vulnerable to “IMSI Catchers” – Spoofs a cellular base station. Intercepts, records, and re-transmits voice calls and text messages – Typically costs hundreds of thousands of dollars, only available to law enforcement and intelligence agencies – Security Researcher Chris Paget in 2010 was able to build a laptop-based IMSI Catcher from scratch for $1500 (most of the cost was the laptop) – Encrypted calls are no help, the “base station” can simply tell the phone to turn off encryption. – Intercepts outbound calls only, incoming calls will go straight to voicemail 13
  • 14. Putting it together: “Aerial Cyber Apocalypse” Richard Perkins and Mike Tassey http://rabbit-hole.org/ DIY Spy Drone • Surplus army target practice drone bought online • 6 ft long, 14 lbs • 22,000 ft max altitude • Up to 45 minute flight time • GPS & Google Maps pre-programmed flight path Payload – all off-the shelf parts! • HD Camera • 32 Gb onboard storage • Wi-Fi hotspot spoofing and penetration • 340 million word dictionary for brute-forcing passwords • 4G T-Mobile card • Spoof GSM cellphone tower to intercept, decrypt, and record calls and text messages Total project cost: about $6000 14
  • 15. Increasing Awareness • Identity Theft is A) big business, B) damaging, C) caused by a failure to identify the authentic user • A strong authentication solution is required • The rising ubiquity of smartphones and wireless networks provide enormous increases in convenience and capability, but also introduces significant new vectors of attack to obtain and expose private information. “Often the hardest part of cryptography is getting people to use it…It's hard to build a system that provides strong authentication on top of systems that can be penetrated by knowing someone's mother's maiden name.” – Bruce Schneier, Applied Cryptography Source: ITRC

Hinweis der Redaktion

  1. 0:20Talking about risks inherent in loss or exposure of personal data, and some of the threats and attacks in particular that are related to the rising ubiquity of smartphones and wireless networking
  2. 0:33Key pointsRisks of Data Insecurity & impacts of Identity TheftFailure of single-factor, or password-based authenticationWhat is strong authentication, or Multi-Factor AuthenticationSome new attacks targeted toward the Mobile world
  3. 3:30Let’s set the baseline for our talk. There’s a lot of chatter about id theft these days. Define terms.The FTC says: Identity theft occurs when someone uses your personally identifying information (or PII), like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.Pretty general description4 main Types of ID Theft Financial (using another's identity to obtain lines of credit, buy stolen goods) Medical (using another's identity to obtain medical care or drugs) – can be worse than financial fraud. Imagine if someone uses your id to get medical treatment, and now your history says that you’re an AB- diabetic with an array of drug allergies. Next time you end up in the emergency room things could go very badly for you Criminal (posing as another person when apprehended for a crime) = prostitution, dealing drug, obvious severe consequences Identity cloning (using another's information to assume his or her identity in daily life, “Don Draper” ) It’s important to note that ID Theft doesn’t just happen when someone snags your wallet at the coffee shop. Big business. Lot of money to be made, and criminal organizations are very aware of that factTop 3 areas of growth for organized crime: Drugs, human trafficking, identity theft.Why? Relatively easy, low riskGain access to large volumes of personal information through data breachEither resell the records to other id thieves to exploit like petroleum suppliers selling crude oil to be refined into diesel, or make use themselves. Data entry warehouseBuy up drives, laptops, backup tapes, pay break-ins, grind through to harvest data into dbNow cracking and spoofing wifi networks to harvest data,New theoretical attacks published exploiting smartphone vulnerabilities, cellular network spoofing, and trojan horse phone apps
  4. 4:44 From my context, we deal with these situations every day. We have protected over a million people who have had their personal information exposed in corporate data breaches. Chances are many of you have received notifications from your credit card company or your healthcare provider or university that you data had been lost or stolen.We deal with many cases of ID theft, and we help people discover when it’s happening and help them resolve it, so we get a lot of interesting case studies.Derrick – nursing student and Iraq veteran, EMT in the military, paramedic afterwards, dedicated to helping other people. Unknowingly had his identity stolen while serving overseas, and thief generated a long list of crimes from unpaid speeding tickets and revoked drivers license to felony check fraud.As a result, Derrick twice during routine traffic stops was arrested, once as the driver and once as a passenger. We were able to clear up the contamination of his identity, and all charges were dismissed, but the state still held him responsible for the court and attorney fees, fines, tow fees, bond and the cost to have a new license issued. Fortunately as a customer of ours he was covered by the ID theft insurance policy we provide and didn’t have to go out of pocket for all those expenses, but these can very significant hardships to a person without protection, or the ability to do the investigative work necessary to prove their innocenceCustomer used an iPhone app (pastie.org) to transfer documents from his desktop to his iPhone. One of docs was password list, something thought would be useful have on his phoneWhat didn’t realize app created web site where all transferred docs were publicly available. Thieves who knew where to look able take over almost all accounts, including iTunes, Amazon, American Express, PayPal, and First Tennessee Bank.When tried to take over Debix account, with two-factor mobile authentication, was immediately alerted to the takeover attempt and able to deny it in real time. Then called Debix investigation team who were able to help recover his accounts and update his credentialsCustomer Christopher ordered a ChildScan for his teenage daughter Caitlin through our AllClear ID consumer service. Thought he was just being proactive, didn’t expect to discover that this daughter’s identity had been used to open 42 accounts over 13 years.Common scenario, coyotes bring illegal immigrants, set them up with children’s ssns, don’t get used for yearsIn this case, 3 mortgages, several car loans, credit cards, and multiple accounts in collections.Our investigations team was able to get all the fraudulent accounts closed and the credit damage removed from her identity, just in time for her college applications.Months or even years, Until it was cleared up, job, apt, car
  5. 0:30There are a lot of scary stories and statistics out there about id theft, but at heart I’m an engineer, so the thing I find most interesting is analyzing how things work, and sometimes how they fail to work.At the end of the day identity theft cases have one thing in common: A failure to differentiate real people from thieves. Ultimately, banks and corporations are doing a poor job at determining that you are who you say you are. That is what allows identity theft to continue.
  6. 10:53How data is most commonly protectedHost of known attacks against passwordsBrutus, outside inLog and analyze source domainsLock after x attemptsOnce networks have been penetrated, and contents of db or key files harvested, you certainly hope that passwords have not been stored in the clearExpect them to be hashedJohn-the-ripper used to detect weak linux passwordsRecent network breakins have highlighted one thing, people are going to pick bad passwordsGawker – Lifehacker, Gizmodo, KotakuPassword reuse
  7. 2:25Palin – Where did you meet your husband? Wasilla High SchoolStreet you grew up on? Houston, NASA, manonthemoon
  8. 4:34Multi-factor – something you have and something you knowATM card + PINBroken when you don’t need card presentBiometricspromising, but not yet prevalentReplay attack, you can change a compromised password, but you can’t change your fingerprintsSecure tokenJob, World of Warcraft, PayPal, bank, credit card, etcDebix uses Cellphone as thing you have. When you sign up, register your phone number, define a PIN, and record “voicekey”
  9. 1:20In the past, the most common avenues of data breaches have been theft of physical hardware (computers with spreadsheets and databases, backup tapes)or network penetration, exposing database contentsIn the last few years, a new avenue has opened up, one that rests in the hands of the end consumer, and which is used to broadcast personal information across wireless and mobile networks at an unprecedented rate. http://www.pewinternet.org/Reports/2011/Smartphones.aspx
  10. 3:30How secure is your data? Where is your data going?Several studies over the last year showed surprising results on the amount of personal data that your phone is leaking without your knowledgeNot just “rogue” appsCarrierIQ was not pleased with Eckharts report and threatened legal action unless he retracted his data and issued a public apology, but has since withdrawn their cease and desist and issued an apology to him
  11. 3:30Ever since iOS 4, iPhones and iPads continuously monitor and store your location with timestamp in a unencrypted text fileCharlie Miller discovered it was possible to create Trojan Horse iphone apps that could innocuously pass the apple app review, then download and execute additional, unverified and potentially malicious code. When he notified Apple about the existence of the bug, Apple promptly terminated Miller’s developer license.
  12. In addition to smartphones themselves, wireless networks are found everywhere todayCoffee shop, airport, campus, even getting an oil changeConvenience, great feature to offer, but comes with its own set of risksLet’s look at how they are securedWEP – Wireless Equivalent PrivacyProcess is to capture enough network packets to allow a cracking tool to extract and reassemble the network keyWPA – Wifi Protected Access
  13. IMSI – International Mobile Subscriber IdentityDisabling encryption – could generate a warning, but carriers have turned these warnings off an all handsets, to prevent “confusing” customers
  14. Circle over a target, someone’s house, starbucks, university campusComplete mobile wireless & cellular surveillance packageNothing new invented hereAll payload components were off-the-shelfWiFi cracking has been around a long timeGSM cell tower spoofing attack published at DefCon 2010Not restricted to corporate espionage or government surveillanceIndivuduals with modest budgets can launch very sophisticated attacks targetted at intercepting and harvesting personal information