SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Downloaden Sie, um offline zu lesen
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 1/33
How Safe is Your Data?
TAPPS
12 May 2014
Michael Soltys
McMaster University / Executek
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#8 2/33
Information Security
Key in a knowledge-based economy; key to safety: at a personal,
organizational, and national level
As technology evolves, so do the threats
User behavior:
- choose good passwords
- update software regularly
- authenticate
Advanced practice:
- comes down to the unsolved problem of writing correct software
- Big data analytics
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#8 3/33
Large scale attacks: U of Maryland
Attacks it can affect large numbers of people
In February 2014 the University of Maryland faced what it called a
"sophisticated cyber-attack"
which breached the records of more than 287,000 present and past students
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 4/33
Large scale vulnerabilities: Heartbleed Bug
allows an attack to read the memory of a web server
affects all versions of OpenSSL in the 1.0.1 series up to and including 1.0.1f
the defect could be used to reveal up to 64 kilobytes of the application's memory
CVE-2014-0160
Canadian Revenue Agency (CRA) closed down its electronic services website over
Heartbleed bug security concerns
OpenSSL validated under FIPS 140-2 by NIST!
(FIPS = Federal Information Processing Standards; NIST = National Institute of Standards
and Technology)
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 5/33
New types of attacks
The field is not static; new attacks are clever and inventive:
Drive-by downloads: where a browsing reader can accidentally download rogue
computer programs.
Spear phishing: where specific individuals or organisations are targeted with fake
emails to obtain confidential information.
Watering Hole: about one in 20 attacks uses this strategy where rather than trying to
break into an organisation's network directly, this targets other websites where
people might regularly visit, with the aim of infecting their computers and trying to
get the unwitting carrier to bring a virus back into their own network.
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 6/33
A typical attack: Malicious PDFs
In March 2014 a massive scam email was sent in Colombia, claiming to be from one of
the country's credit score agencies
The email contained an attachment file. The file does not show malicious payload when
scanned by antimalware software.
However, doing a "stream dump" of the file we see:
Malicious scripting: which instructs the reader to execute the URL. After downloading
the file shown in that URL, keylogger is downloaded.
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 7/33
2011: A Bad Year
When the history of 2011 is written, it may well be remembered as the Year of the Hack.
Stories of computer breaches were breaking almost every week:
Sony
Fox
the British National Health Service
and the Web sites of:
PBS
the U.S. Senate
and the C.I.A.
all fallen victim to highly publicized cyber-attacks. Many of the breaches have been
attributed to the groups Anonymous and LulzSec.
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 8/33
Operation Shady Rat
Operation Shady rat ranks with Operation Aurora (the attack on Google and many
other companies in 2010) as among the most significant and potentially damaging
acts of cyber-espionage yet made public.
Operation Shady rat has been stealing valuable intellectual property (including
government secrets, email archives, legal contracts, negotiation plans for
business activities, and design schematics) from more than 70 public and
private sector organizations in 14 countries.
The list of victims, which ranges from national governments to global
corporations to tiny nonprofits, demonstrates with unprecedented clarity the
universal scope of cyber-espionage and the vulnerability of organizations in
almost every category imaginable.
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 9/33
Operation Shady Rat
The vast majority of victims, 49, were U.S. based companies, government
agencies, and nonprofits. The category most heavily targeted was defense
contractors, 13 in all.
All the signs point to China.
Forensic investigation revealed that the defense contractor had been hit by a
species of malware that had never been seen before: a spear-phishing email
containing a link to a Web page that, when clicked, automatically loaded a
malicious program, a remote access tool, or rat, onto the victim's computer.
The rat opened the door for a live intruder to get on the network, escalate
user privileges, and begin exfiltrating data.
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 10/33
Victims don't want to be victims
McAfee sent emails to officials at four organizations, informing them that
their computer networks had been compromised.
Three of those organizations-including one whose breach is ongoing-made no
response to McAfee's notifications.
"Victims don't want to know they're victims. I
guess that's just victim psychology: if you
don't know about it, it's not really happening."
bit.ly/1iiKWoh(http://bit.ly/1iiKWoh)
0:00  /  3:21
CNN  -­  Operation  Shady  RAT
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 11/33
An innocuous click
RSA is the security division of the high-tech company EMC. Its products protect
computer networks at the
White House
the Central Intelligence Agency
the National Security Agency
the Pentagon
the Department of Homeland Security,
as well as most top defense contractors, and a majority of Fortune 500
corporations.
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 12/33
An innocuous click
Sometime in the winter of 2011, lying there in the junk-mail folder, in the
spammy mess of mortgage offers and erectile-dysfunction drug ads, an email from
an associate with a subject line that looked legit caught the man's eye.
The subject line said "2011 Recruitment Plan."
The man clicked on the message, downloaded the attached Excel spreadsheet file,
and unwittingly set in motion a chain of events allowing hackers to raid the
computer networks of his employer, RSA.
The parent company disclosed the breach on March 17, 2011, in a filing with the
Securities and Exchange Commission. The hack gravely undermined the reputation
of RSA's popular SecurID security service.
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 13/33
An innocuous click
Experts found evidence that the attack on RSA had come from China.
They also linked the RSA attack to the penetration of computer networks at some
of RSA's most powerful defense-contractor clients, among them:
Lockheed Martin, Northrop Grumman, L-3 Communications
Few details of these episodes
have been made public.
BIG DATA →
bit.ly/1iiLc6I(http://bit.ly/1iiLc6I)
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 14/33
Operation Aurora
in 2010 Google became the first major company to blow the whistle on Chinese
hacking when it admitted to a penetration known as Operation Aurora, which also
hit:
Intel
Morgan Stanley
and several dozen other corporations
Most companies have preferred not to talk about or even acknowledge violations
of their computer systems, for fear of panicking shareholders and exposing
themselves to lawsuits.
Or for fear of offending the Chinese and jeopardizing their share of that
country's exploding markets.
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 15/33
Operation Aurora
Chinese hackers who breached
Google's servers several years
ago gained access to a sensitive
database with years' worth of
information about U.S.
surveillance targets, according to
current and former government
officials.
bit.ly/1iiLtXt(http://bit.ly/1iiLtXt)
The breach appears to have been aimed at unearthing the identities of Chinese
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 16/33
Attempted logins
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 17/33
Attempted logins
#!/usr/bin/perl
$i=1;
$test=0;
$packets=0;
sub compute_ip {
$IP=`dig @_ +short`;
if ($IP) {
print "tt IP= $IP <br>";
}
else {
print "tt IP= ? <br> n";
}
}
sub compute_location {
$country=`/sw/bin/geoiplookup @_`;
$country =~ m/([ A-Za-z]*)$/;
$country_short = $1;
if ($country_short) {
print "tt Country= $country_short <br>nn";
}
else {
print "tt Country= ? <br> nn";
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 18/33
Esotnia 2007
In the Spring of 2007, government computer systems in Estonia experienced a
sustained cyberattack (cyber-{warfare, terror, crime}).
On April 27, officials in Estonia moved a Soviet-era war memorial commemorating
an unknown Russian who died fighting the Nazis. The move stirred emotions, and
led to rioting by ethnic Russians, and the blockading of the Estonian Embassy
in Moscow.
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 19/33
Estonia 2007
The event marked the beginning of a series of large and sustained Distributed Denial-
Of-Service (DDOS) attacks launched against several Estonian national websites.
In the early days of the cyberattack, government websites that normally receive around
1,000 visits a day reportedly were receiving 2,000 visits every second. This caused the
repeated shut down of some websites.
The cyberattacks against Estonia were unusual bec. the rate of the packet attack was
very high, and the series of attacks lasted weeks, rather than hour or days, which is
more commonly seen for a DoS attack.
Eventually, NATO and the United States sent computer security experts to
Estonia to help recover from the attacks, and to analyze the methods used and
attempt to determine the source of the attacks.
youtu.be/PTv3QrhGPC8?t=42m34s(http://youtu.be/PTv3QrhGPC8?t=42m34s)
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 20/33
Estonia 2007
A persistent problem during and after any cyberattack is accurate
identification of the attacker:
was it sponsored by a nation?
was it the independent work of a few unconnected individuals?
was it initiated by a group to instill frustration and fear by damaging the
computerized infrastructure and economy?
The uncertainty of not knowing the initiator also affects the decision about
whom should ultimately become a target for retaliation, and whether the
response should come from law enforcement or the military.
After some investigation, network analysts later concluded that the
cyberattacks targeting Estonia were not a concerted attack, but instead were
the product of spontaneous anger from a loose federation of separate attackers.
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 21/33
Botnets
Botnet = "Robot Network"
Botnets are made up of vast numbers of compromised computers that have been
infected with malicious code, and can be remotely-controlled through commands sent
via the Internet.
Hundreds or thousands of these infected computers can operate in concert to:
disrupt or block Internet traffic for targeted victims
harvest information
distribute spam, viruses, or other malicious code.
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 22/33
Botnets
Botmasters can reportedly make large sums of money by marketing their technical
services.
For example, Jeanson Ancheta, a 21-year-old hacker and member of a group called the
Botmaster Underground, reportedly made more than $100,000 from different Internet
Advertising companies who paid him to download specially-designed malicious adware
code onto more than 400,000 vulnerable PCs he had secretly infected and taken over.
He also made tens of thousands more dollars renting his 400,000-unit botnet herd to
other companies that used them to send out spam, viruses, and other malicious code
on the Internet.
PPI: Pay-per-Install - The Commoditization of Malware Distribution
In 2006, Ancheta was sentenced to five years in prison (FBI operation Bot Roast).
Symantec reported that it detected 6 million bot-infected computers in the second half
of 2006.
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 23/33
Botnets
Some botnet owners reportedly rent their huge networks for US$200 to $300 an
hour, and botnets are becoming the weapon of choice for fraud and extortion.
Newer methods are evolving for distributing bot software that may make it
even more difficult in the future for law enforcement to identify and locate
the originating botmaster.
Botnets organize themselves in an hierarchical manner, with a central command
and control location (sometimes dynamic) for the botmaster.
This central command location is useful to security professionals because it
offers a possible central point of failure for the botnet.
However, in the near future, attackers may use new botnet architectures that
are more sophisticated, and more difficult to detect and trace, e.g., P2P.
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 24/33
E.g., Wordpress
A fantastic piece of software for blogging; but consists of many parts:
MySQL; Apache; PHP; HTML; JavaScript; Mac OS X Server
absolutely essential to have the latest versions and strong password.
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 25/33
Passwords
Your password must be a minimum of 8 characters in length and must include
characters from at least three of the four groups below:
Uppercase letters: A, B, C, ... ,Z
Lowercase letters: a, b, c, ...,z
Numerals: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Symbols: ~ ! @ # $ % ^ & * ( ) _ + ` - = { } | ] [  : " ; < > ? , . / '
Do not use any of your last five previous passwords.
Passwords cannot contain your account name or parts of your full name.
Generate with a seed, a name, and an MD5 hash generator
E.g., myname@gmail.com use seed 5a63y@h& to obtain:
hash: ae19e19070a052b85306fc758146ef8e
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 26/33
Uncovered during Executek audits
A client's computer we discovered that the data was kept in a Dropbox folder,
and someone who was not supposed to see it had constant access to the latest
version.
Most clients use dictionary passwords, never change them; sometimes they write
them down on sticky notes placed on the monitor. Employees who leave keep
passwords, which are not changed immediatelly, etc.
Software is seldom updated.
The server is secured but the backup module is not.
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 27/33
Sophisticated attacks
Control hijacking attacks: exploits and defenses
Dealing with legacy code: sandboxing and isolation
Exploitation techniques and fuzzing
Tools for writing robust application code
Principle of least privilege, access control, and operating systems security
Security problems in network protocols: TCP, DNS, SMTP, and routing
Unwanted traffic: denial of service attacks
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 28/33
Authentication
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 29/33
Apache Security
Apache HTTP server access:
.htaccess
.htpasswd
The first file is the policy and the second the password:
AuthType Basic
AuthName "Networks & Security Readings 2014"
AuthUserFile cs3c03-w14/ReadingList/.htpasswd
require valid-user
The second file contains the username and a hash of the password; two examples:
nets2014:9bn3EF/hJS5J6
netsec2013:$apr1$fr2JPfTa$HEzejdyg5DE2MFGVCIzd21
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 30/33
Apache Security Challenge
I tell my students that the first to break the first password, obtained with
the command:
htpasswd -cbd ./.htpasswd nets2014 a5e1c054
gets extra marks. Note the password is not a dictionary word.
Still, it takes about 15min with, for example,
ochHashcat-plus
software. On the other hand, breaking the second password, obtained with the
command:
htpasswd -cbm ./.htpasswd netsec2013 tigerblood
is practically impossible (crypt vs md5).
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 31/33
Executek: Breaking into a Super-User account
Obtained the SHA1 hash of the password from "shadow file":
cat /private/ var/db/shadow/hash/[...] | cut -c 169-216
which turns out to be:
[...]:4AC8F24F7CE9DBF6C81ECEAA9885401E3221147179FB9178
and then used:
John the Ripper 1.7.3.1
software to reverse engineer the password: onegod
it took about 20 minutes
because the password was a dictionary word!
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 32/33
References
CRS Report for Congress 2008(http://www.fas.org/sgp/crs/terror/RL32114.pdf)
Vanity Fair: Operation Shady Rat 2011(http://rdd.me/5sihotjz)
Vanity Fair: Enter the Cyber-Dragon 2011(http://rdd.me/todxjx9k)
Malicious PDF (ISC)(https://isc.sans.edu/forums/diary/17875)
Networks Course Password Cracking Challenge(http://bit.ly/1paMuDy)
5/12/2014 How Safe is Your Data?
http://127.0.0.1:3999/security-may2014.slide#1 33/33
Thank you
Michael Soltys
McMaster University / Executek
soltys@mcmaster.ca(mailto:soltys@mcmaster.ca)
http://www.cas.mcmaster.ca/~soltys(http://www.cas.mcmaster.ca/~soltys)
@MichaelMSoltys(http://twitter.com/MichaelMSoltys)

Weitere ähnliche Inhalte

Was ist angesagt?

Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattssonUlf Mattsson
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoJonas Mercier
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Kim Jensen
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social TakeoverZeroFOX
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataLindsey Landolfi
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...IJECEIAES
 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearIronCore Labs
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information SecuritySimoun Ung
 
Symantec Intelligence Report - July 2014
Symantec Intelligence Report - July 2014Symantec Intelligence Report - July 2014
Symantec Intelligence Report - July 2014Symantec
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-naAndreas Hiller
 
Anatomy of an Enterprise Social Cyber Attack
Anatomy of an Enterprise Social Cyber Attack Anatomy of an Enterprise Social Cyber Attack
Anatomy of an Enterprise Social Cyber Attack ZeroFOX
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hackingAyush Upadhyay
 

Was ist angesagt? (20)

Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattsson
 
2013 Threat Report
2013 Threat Report2013 Threat Report
2013 Threat Report
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemalto
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
 
1358619756 cyber terrorism
1358619756 cyber terrorism1358619756 cyber terrorism
1358619756 cyber terrorism
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social Takeover
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary Data
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...Detecting malicious URLs using binary classification through ada boost algori...
Detecting malicious URLs using binary classification through ada boost algori...
 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information Security
 
Symantec Intelligence Report - July 2014
Symantec Intelligence Report - July 2014Symantec Intelligence Report - July 2014
Symantec Intelligence Report - July 2014
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
Anatomy of an Enterprise Social Cyber Attack
Anatomy of an Enterprise Social Cyber Attack Anatomy of an Enterprise Social Cyber Attack
Anatomy of an Enterprise Social Cyber Attack
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 

Andere mochten auch

SQL Server Security
SQL Server SecuritySQL Server Security
SQL Server Securitysunitkanyan
 
Introduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivismIntroduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivismGlobal Micro Solutions
 
Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012Michael Soltys
 
Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013Michael Soltys
 
Fair ranking in competitive bidding procurement: a case analysis
Fair ranking in competitive bidding procurement: a case analysisFair ranking in competitive bidding procurement: a case analysis
Fair ranking in competitive bidding procurement: a case analysisMichael Soltys
 
Unambiguous functions in logarithmic space - CiE 2009
Unambiguous functions in logarithmic space - CiE 2009Unambiguous functions in logarithmic space - CiE 2009
Unambiguous functions in logarithmic space - CiE 2009Michael Soltys
 
The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002Michael Soltys
 
La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004Michael Soltys
 
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006Michael Soltys
 
Games on Posets - CiE 2008
Games on Posets - CiE 2008Games on Posets - CiE 2008
Games on Posets - CiE 2008Michael Soltys
 
A formal framework for Stringology
A formal framework for StringologyA formal framework for Stringology
A formal framework for StringologyMichael Soltys
 
Feasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentationFeasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentationMichael Soltys
 
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006Michael Soltys
 
Boolean Programs and Quantified Propositional Proof System -
Boolean Programs and Quantified Propositional Proof System - Boolean Programs and Quantified Propositional Proof System -
Boolean Programs and Quantified Propositional Proof System - Michael Soltys
 
Forced repetitions over alphabet lists
Forced repetitions over alphabet listsForced repetitions over alphabet lists
Forced repetitions over alphabet listsMichael Soltys
 
Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...Maxime CARPENTIER
 
Circuit Complexity of Shuffle - IWOCA 2013
Circuit Complexity of Shuffle - IWOCA 2013Circuit Complexity of Shuffle - IWOCA 2013
Circuit Complexity of Shuffle - IWOCA 2013Michael Soltys
 

Andere mochten auch (20)

APT
APTAPT
APT
 
SQL Server Security
SQL Server SecuritySQL Server Security
SQL Server Security
 
Introduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivismIntroduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivism
 
Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012
 
Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013
 
Fair ranking in competitive bidding procurement: a case analysis
Fair ranking in competitive bidding procurement: a case analysisFair ranking in competitive bidding procurement: a case analysis
Fair ranking in competitive bidding procurement: a case analysis
 
Unambiguous functions in logarithmic space - CiE 2009
Unambiguous functions in logarithmic space - CiE 2009Unambiguous functions in logarithmic space - CiE 2009
Unambiguous functions in logarithmic space - CiE 2009
 
Intro to Cryptography
Intro to CryptographyIntro to Cryptography
Intro to Cryptography
 
The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002
 
La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004
 
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
 
Games on Posets - CiE 2008
Games on Posets - CiE 2008Games on Posets - CiE 2008
Games on Posets - CiE 2008
 
A formal framework for Stringology
A formal framework for StringologyA formal framework for Stringology
A formal framework for Stringology
 
Feasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentationFeasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentation
 
Algorithms on Strings
Algorithms on StringsAlgorithms on Strings
Algorithms on Strings
 
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
 
Boolean Programs and Quantified Propositional Proof System -
Boolean Programs and Quantified Propositional Proof System - Boolean Programs and Quantified Propositional Proof System -
Boolean Programs and Quantified Propositional Proof System -
 
Forced repetitions over alphabet lists
Forced repetitions over alphabet listsForced repetitions over alphabet lists
Forced repetitions over alphabet lists
 
Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...
 
Circuit Complexity of Shuffle - IWOCA 2013
Circuit Complexity of Shuffle - IWOCA 2013Circuit Complexity of Shuffle - IWOCA 2013
Circuit Complexity of Shuffle - IWOCA 2013
 

Ähnlich wie How Safe is your Data?

Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public SectorSeqrite
 
Analysis of Rogue Access Points using Software-Defined Radio
Analysis of Rogue Access Points using Software-Defined RadioAnalysis of Rogue Access Points using Software-Defined Radio
Analysis of Rogue Access Points using Software-Defined RadioJuanRios179
 
Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015RapidSSLOnline.com
 
Perform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdfPerform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdffasttrackcomputersol
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"CloudCamp Chicago
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64Chema Alonso
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011Felipe Prado
 
Symantec Intelligence Report December 2014
Symantec Intelligence Report December 2014Symantec Intelligence Report December 2014
Symantec Intelligence Report December 2014Symantec
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...MZERMA Amine
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisIJERD Editor
 
Ransomware (1).pdf
Ransomware (1).pdfRansomware (1).pdf
Ransomware (1).pdfHiYeti1
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptxTapan Khilar
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsBlake A. Klinkner
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 

Ähnlich wie How Safe is your Data? (20)

Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
Analysis of Rogue Access Points using Software-Defined Radio
Analysis of Rogue Access Points using Software-Defined RadioAnalysis of Rogue Access Points using Software-Defined Radio
Analysis of Rogue Access Points using Software-Defined Radio
 
Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Perform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdfPerform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdf
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011
 
Symantec Intelligence Report December 2014
Symantec Intelligence Report December 2014Symantec Intelligence Report December 2014
Symantec Intelligence Report December 2014
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
 
Ransomware (1).pdf
Ransomware (1).pdfRansomware (1).pdf
Ransomware (1).pdf
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 

Kürzlich hochgeladen

LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGIThomas Poetter
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryJeremy Anderson
 
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhThiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhYasamin16
 
Vision, Mission, Goals and Objectives ppt..pptx
Vision, Mission, Goals and Objectives ppt..pptxVision, Mission, Goals and Objectives ppt..pptx
Vision, Mission, Goals and Objectives ppt..pptxellehsormae
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...Amil Baba Dawood bangali
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Seán Kennedy
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectBoston Institute of Analytics
 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfchwongval
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Seán Kennedy
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort servicejennyeacort
 
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...ssuserf63bd7
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfgstagge
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Boston Institute of Analytics
 
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...GQ Research
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]📊 Markus Baersch
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 
detection and classification of knee osteoarthritis.pptx
detection and classification of knee osteoarthritis.pptxdetection and classification of knee osteoarthritis.pptx
detection and classification of knee osteoarthritis.pptxAleenaJamil4
 

Kürzlich hochgeladen (20)

LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
 
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhThiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
 
Vision, Mission, Goals and Objectives ppt..pptx
Vision, Mission, Goals and Objectives ppt..pptxVision, Mission, Goals and Objectives ppt..pptx
Vision, Mission, Goals and Objectives ppt..pptx
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis Project
 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdf
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
 
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
 
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 
detection and classification of knee osteoarthritis.pptx
detection and classification of knee osteoarthritis.pptxdetection and classification of knee osteoarthritis.pptx
detection and classification of knee osteoarthritis.pptx
 

How Safe is your Data?

  • 1. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 1/33 How Safe is Your Data? TAPPS 12 May 2014 Michael Soltys McMaster University / Executek
  • 2. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#8 2/33 Information Security Key in a knowledge-based economy; key to safety: at a personal, organizational, and national level As technology evolves, so do the threats User behavior: - choose good passwords - update software regularly - authenticate Advanced practice: - comes down to the unsolved problem of writing correct software - Big data analytics
  • 3. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#8 3/33 Large scale attacks: U of Maryland Attacks it can affect large numbers of people In February 2014 the University of Maryland faced what it called a "sophisticated cyber-attack" which breached the records of more than 287,000 present and past students
  • 4. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 4/33 Large scale vulnerabilities: Heartbleed Bug allows an attack to read the memory of a web server affects all versions of OpenSSL in the 1.0.1 series up to and including 1.0.1f the defect could be used to reveal up to 64 kilobytes of the application's memory CVE-2014-0160 Canadian Revenue Agency (CRA) closed down its electronic services website over Heartbleed bug security concerns OpenSSL validated under FIPS 140-2 by NIST! (FIPS = Federal Information Processing Standards; NIST = National Institute of Standards and Technology)
  • 5. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 5/33 New types of attacks The field is not static; new attacks are clever and inventive: Drive-by downloads: where a browsing reader can accidentally download rogue computer programs. Spear phishing: where specific individuals or organisations are targeted with fake emails to obtain confidential information. Watering Hole: about one in 20 attacks uses this strategy where rather than trying to break into an organisation's network directly, this targets other websites where people might regularly visit, with the aim of infecting their computers and trying to get the unwitting carrier to bring a virus back into their own network.
  • 6. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 6/33 A typical attack: Malicious PDFs In March 2014 a massive scam email was sent in Colombia, claiming to be from one of the country's credit score agencies The email contained an attachment file. The file does not show malicious payload when scanned by antimalware software. However, doing a "stream dump" of the file we see: Malicious scripting: which instructs the reader to execute the URL. After downloading the file shown in that URL, keylogger is downloaded.
  • 7. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 7/33 2011: A Bad Year When the history of 2011 is written, it may well be remembered as the Year of the Hack. Stories of computer breaches were breaking almost every week: Sony Fox the British National Health Service and the Web sites of: PBS the U.S. Senate and the C.I.A. all fallen victim to highly publicized cyber-attacks. Many of the breaches have been attributed to the groups Anonymous and LulzSec.
  • 8. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 8/33 Operation Shady Rat Operation Shady rat ranks with Operation Aurora (the attack on Google and many other companies in 2010) as among the most significant and potentially damaging acts of cyber-espionage yet made public. Operation Shady rat has been stealing valuable intellectual property (including government secrets, email archives, legal contracts, negotiation plans for business activities, and design schematics) from more than 70 public and private sector organizations in 14 countries. The list of victims, which ranges from national governments to global corporations to tiny nonprofits, demonstrates with unprecedented clarity the universal scope of cyber-espionage and the vulnerability of organizations in almost every category imaginable.
  • 9. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 9/33 Operation Shady Rat The vast majority of victims, 49, were U.S. based companies, government agencies, and nonprofits. The category most heavily targeted was defense contractors, 13 in all. All the signs point to China. Forensic investigation revealed that the defense contractor had been hit by a species of malware that had never been seen before: a spear-phishing email containing a link to a Web page that, when clicked, automatically loaded a malicious program, a remote access tool, or rat, onto the victim's computer. The rat opened the door for a live intruder to get on the network, escalate user privileges, and begin exfiltrating data.
  • 10. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 10/33 Victims don't want to be victims McAfee sent emails to officials at four organizations, informing them that their computer networks had been compromised. Three of those organizations-including one whose breach is ongoing-made no response to McAfee's notifications. "Victims don't want to know they're victims. I guess that's just victim psychology: if you don't know about it, it's not really happening." bit.ly/1iiKWoh(http://bit.ly/1iiKWoh) 0:00  /  3:21 CNN  -­  Operation  Shady  RAT
  • 11. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 11/33 An innocuous click RSA is the security division of the high-tech company EMC. Its products protect computer networks at the White House the Central Intelligence Agency the National Security Agency the Pentagon the Department of Homeland Security, as well as most top defense contractors, and a majority of Fortune 500 corporations.
  • 12. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 12/33 An innocuous click Sometime in the winter of 2011, lying there in the junk-mail folder, in the spammy mess of mortgage offers and erectile-dysfunction drug ads, an email from an associate with a subject line that looked legit caught the man's eye. The subject line said "2011 Recruitment Plan." The man clicked on the message, downloaded the attached Excel spreadsheet file, and unwittingly set in motion a chain of events allowing hackers to raid the computer networks of his employer, RSA. The parent company disclosed the breach on March 17, 2011, in a filing with the Securities and Exchange Commission. The hack gravely undermined the reputation of RSA's popular SecurID security service.
  • 13. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 13/33 An innocuous click Experts found evidence that the attack on RSA had come from China. They also linked the RSA attack to the penetration of computer networks at some of RSA's most powerful defense-contractor clients, among them: Lockheed Martin, Northrop Grumman, L-3 Communications Few details of these episodes have been made public. BIG DATA → bit.ly/1iiLc6I(http://bit.ly/1iiLc6I)
  • 14. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 14/33 Operation Aurora in 2010 Google became the first major company to blow the whistle on Chinese hacking when it admitted to a penetration known as Operation Aurora, which also hit: Intel Morgan Stanley and several dozen other corporations Most companies have preferred not to talk about or even acknowledge violations of their computer systems, for fear of panicking shareholders and exposing themselves to lawsuits. Or for fear of offending the Chinese and jeopardizing their share of that country's exploding markets.
  • 15. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 15/33 Operation Aurora Chinese hackers who breached Google's servers several years ago gained access to a sensitive database with years' worth of information about U.S. surveillance targets, according to current and former government officials. bit.ly/1iiLtXt(http://bit.ly/1iiLtXt) The breach appears to have been aimed at unearthing the identities of Chinese
  • 16. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 16/33 Attempted logins
  • 17. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 17/33 Attempted logins #!/usr/bin/perl $i=1; $test=0; $packets=0; sub compute_ip { $IP=`dig @_ +short`; if ($IP) { print "tt IP= $IP <br>"; } else { print "tt IP= ? <br> n"; } } sub compute_location { $country=`/sw/bin/geoiplookup @_`; $country =~ m/([ A-Za-z]*)$/; $country_short = $1; if ($country_short) { print "tt Country= $country_short <br>nn"; } else { print "tt Country= ? <br> nn";
  • 18. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 18/33 Esotnia 2007 In the Spring of 2007, government computer systems in Estonia experienced a sustained cyberattack (cyber-{warfare, terror, crime}). On April 27, officials in Estonia moved a Soviet-era war memorial commemorating an unknown Russian who died fighting the Nazis. The move stirred emotions, and led to rioting by ethnic Russians, and the blockading of the Estonian Embassy in Moscow.
  • 19. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 19/33 Estonia 2007 The event marked the beginning of a series of large and sustained Distributed Denial- Of-Service (DDOS) attacks launched against several Estonian national websites. In the early days of the cyberattack, government websites that normally receive around 1,000 visits a day reportedly were receiving 2,000 visits every second. This caused the repeated shut down of some websites. The cyberattacks against Estonia were unusual bec. the rate of the packet attack was very high, and the series of attacks lasted weeks, rather than hour or days, which is more commonly seen for a DoS attack. Eventually, NATO and the United States sent computer security experts to Estonia to help recover from the attacks, and to analyze the methods used and attempt to determine the source of the attacks. youtu.be/PTv3QrhGPC8?t=42m34s(http://youtu.be/PTv3QrhGPC8?t=42m34s)
  • 20. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 20/33 Estonia 2007 A persistent problem during and after any cyberattack is accurate identification of the attacker: was it sponsored by a nation? was it the independent work of a few unconnected individuals? was it initiated by a group to instill frustration and fear by damaging the computerized infrastructure and economy? The uncertainty of not knowing the initiator also affects the decision about whom should ultimately become a target for retaliation, and whether the response should come from law enforcement or the military. After some investigation, network analysts later concluded that the cyberattacks targeting Estonia were not a concerted attack, but instead were the product of spontaneous anger from a loose federation of separate attackers.
  • 21. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 21/33 Botnets Botnet = "Robot Network" Botnets are made up of vast numbers of compromised computers that have been infected with malicious code, and can be remotely-controlled through commands sent via the Internet. Hundreds or thousands of these infected computers can operate in concert to: disrupt or block Internet traffic for targeted victims harvest information distribute spam, viruses, or other malicious code.
  • 22. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 22/33 Botnets Botmasters can reportedly make large sums of money by marketing their technical services. For example, Jeanson Ancheta, a 21-year-old hacker and member of a group called the Botmaster Underground, reportedly made more than $100,000 from different Internet Advertising companies who paid him to download specially-designed malicious adware code onto more than 400,000 vulnerable PCs he had secretly infected and taken over. He also made tens of thousands more dollars renting his 400,000-unit botnet herd to other companies that used them to send out spam, viruses, and other malicious code on the Internet. PPI: Pay-per-Install - The Commoditization of Malware Distribution In 2006, Ancheta was sentenced to five years in prison (FBI operation Bot Roast). Symantec reported that it detected 6 million bot-infected computers in the second half of 2006.
  • 23. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 23/33 Botnets Some botnet owners reportedly rent their huge networks for US$200 to $300 an hour, and botnets are becoming the weapon of choice for fraud and extortion. Newer methods are evolving for distributing bot software that may make it even more difficult in the future for law enforcement to identify and locate the originating botmaster. Botnets organize themselves in an hierarchical manner, with a central command and control location (sometimes dynamic) for the botmaster. This central command location is useful to security professionals because it offers a possible central point of failure for the botnet. However, in the near future, attackers may use new botnet architectures that are more sophisticated, and more difficult to detect and trace, e.g., P2P.
  • 24. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 24/33 E.g., Wordpress A fantastic piece of software for blogging; but consists of many parts: MySQL; Apache; PHP; HTML; JavaScript; Mac OS X Server absolutely essential to have the latest versions and strong password.
  • 25. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 25/33 Passwords Your password must be a minimum of 8 characters in length and must include characters from at least three of the four groups below: Uppercase letters: A, B, C, ... ,Z Lowercase letters: a, b, c, ...,z Numerals: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 Symbols: ~ ! @ # $ % ^ & * ( ) _ + ` - = { } | ] [ : " ; < > ? , . / ' Do not use any of your last five previous passwords. Passwords cannot contain your account name or parts of your full name. Generate with a seed, a name, and an MD5 hash generator E.g., myname@gmail.com use seed 5a63y@h& to obtain: hash: ae19e19070a052b85306fc758146ef8e
  • 26. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 26/33 Uncovered during Executek audits A client's computer we discovered that the data was kept in a Dropbox folder, and someone who was not supposed to see it had constant access to the latest version. Most clients use dictionary passwords, never change them; sometimes they write them down on sticky notes placed on the monitor. Employees who leave keep passwords, which are not changed immediatelly, etc. Software is seldom updated. The server is secured but the backup module is not.
  • 27. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 27/33 Sophisticated attacks Control hijacking attacks: exploits and defenses Dealing with legacy code: sandboxing and isolation Exploitation techniques and fuzzing Tools for writing robust application code Principle of least privilege, access control, and operating systems security Security problems in network protocols: TCP, DNS, SMTP, and routing Unwanted traffic: denial of service attacks
  • 28. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 28/33 Authentication
  • 29. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 29/33 Apache Security Apache HTTP server access: .htaccess .htpasswd The first file is the policy and the second the password: AuthType Basic AuthName "Networks & Security Readings 2014" AuthUserFile cs3c03-w14/ReadingList/.htpasswd require valid-user The second file contains the username and a hash of the password; two examples: nets2014:9bn3EF/hJS5J6 netsec2013:$apr1$fr2JPfTa$HEzejdyg5DE2MFGVCIzd21
  • 30. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 30/33 Apache Security Challenge I tell my students that the first to break the first password, obtained with the command: htpasswd -cbd ./.htpasswd nets2014 a5e1c054 gets extra marks. Note the password is not a dictionary word. Still, it takes about 15min with, for example, ochHashcat-plus software. On the other hand, breaking the second password, obtained with the command: htpasswd -cbm ./.htpasswd netsec2013 tigerblood is practically impossible (crypt vs md5).
  • 31. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 31/33 Executek: Breaking into a Super-User account Obtained the SHA1 hash of the password from "shadow file": cat /private/ var/db/shadow/hash/[...] | cut -c 169-216 which turns out to be: [...]:4AC8F24F7CE9DBF6C81ECEAA9885401E3221147179FB9178 and then used: John the Ripper 1.7.3.1 software to reverse engineer the password: onegod it took about 20 minutes because the password was a dictionary word!
  • 32. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 32/33 References CRS Report for Congress 2008(http://www.fas.org/sgp/crs/terror/RL32114.pdf) Vanity Fair: Operation Shady Rat 2011(http://rdd.me/5sihotjz) Vanity Fair: Enter the Cyber-Dragon 2011(http://rdd.me/todxjx9k) Malicious PDF (ISC)(https://isc.sans.edu/forums/diary/17875) Networks Course Password Cracking Challenge(http://bit.ly/1paMuDy)
  • 33. 5/12/2014 How Safe is Your Data? http://127.0.0.1:3999/security-may2014.slide#1 33/33 Thank you Michael Soltys McMaster University / Executek soltys@mcmaster.ca(mailto:soltys@mcmaster.ca) http://www.cas.mcmaster.ca/~soltys(http://www.cas.mcmaster.ca/~soltys) @MichaelMSoltys(http://twitter.com/MichaelMSoltys)