32
Who Own your Sensitive Information ? How It was Taken & How To Protect It SNKI - 29, December 2010 - y3dips

y3dips - Who Own Your Sensitive Information?

Embed Size (px)

DESCRIPTION

Presentation for National Cryptography Seminar at Sekolah Tinggi Sandi Negara

Citation preview

Page 1: y3dips - Who Own Your Sensitive Information?

Who Own your Sensitive Information ?

How It was Taken & How To Protect It

SNKI - 29, December 2010 - y3dips

Page 2: y3dips - Who Own Your Sensitive Information?

Who Own It ?

Page 3: y3dips - Who Own Your Sensitive Information?

HACKER

Page 4: y3dips - Who Own Your Sensitive Information?

CYBER MAFIA

Page 5: y3dips - Who Own Your Sensitive Information?

CYBER TERRORIST

Page 6: y3dips - Who Own Your Sensitive Information?

Movie

Page 7: y3dips - Who Own Your Sensitive Information?

CYBER ARMY

Page 8: y3dips - Who Own Your Sensitive Information?

WIKILEAKS

Page 9: y3dips - Who Own Your Sensitive Information?

Who Own It ?

Page 10: y3dips - Who Own Your Sensitive Information?

How It Was Taken ?

Page 11: y3dips - Who Own Your Sensitive Information?

Famous Attack Vector

• Password (Authentication)

• Insecure Infrastructure

• Insecure Data Protection

• There isnt any Policy and Procedure

• Intrusion/hacking

• Social Engineering

Page 12: y3dips - Who Own Your Sensitive Information?

PASSWORD TREAT

Page 13: y3dips - Who Own Your Sensitive Information?

INSECURE INFRASTRUCTURE

Page 14: y3dips - Who Own Your Sensitive Information?

Hacking Example

Page 15: y3dips - Who Own Your Sensitive Information?

Video Demo

Page 16: y3dips - Who Own Your Sensitive Information?

WikiLeaks

Page 17: y3dips - Who Own Your Sensitive Information?

Bradley Manning

an Army Intellegence

analyst

Page 18: y3dips - Who Own Your Sensitive Information?

US Airstrikes

Page 19: y3dips - Who Own Your Sensitive Information?

• Baghdad “AirStrikes” Incident

• Copy the Data into a “LADY GAGA” labeled CD

• Bradley Submit to Wikileaks

• Wikileaks confirm 3 Month Decrypting it - but it never encrypted said Bradley.

http://www.wired.com/threatlevel/2010/06/wikileaks-chat/#ixzz0qYdG9xzE

Wikileaks Publication

Page 20: y3dips - Who Own Your Sensitive Information?

• Unprotected “Private” Network

• Unpatched/Out of date server/system

• Zip - aes256 - password protected partial usage

• Lack on Physical Security - 5 digit door access = knock

Attack Vector

Page 21: y3dips - Who Own Your Sensitive Information?

WikiLeaks

Page 22: y3dips - Who Own Your Sensitive Information?

Secret US Embassy Cables

Page 23: y3dips - Who Own Your Sensitive Information?

Secret US Embassy Cables

Page 24: y3dips - Who Own Your Sensitive Information?

How To Protect It ?

Page 25: y3dips - Who Own Your Sensitive Information?
Page 26: y3dips - Who Own Your Sensitive Information?

• Upgrade your Security Awareness

• Read The “Security” Manual

• Give a serious attention to your Authentication/Credentials

• Use a relatively Strong Encryption (e.g for file, network communication)

• Use AntiVirus, Firewall, e.t.c

Page 27: y3dips - Who Own Your Sensitive Information?

Password Management

Page 28: y3dips - Who Own Your Sensitive Information?

File/Partition Encryption

Page 29: y3dips - Who Own Your Sensitive Information?

SECURITYIs a Process

No System 100% Secure

Human is the Weakest Link

Page 30: y3dips - Who Own Your Sensitive Information?
Page 31: y3dips - Who Own Your Sensitive Information?

Reference

• http://google.com “For most of the Images”

• http://wired.com “for Bradley and Lamo Chat transkrip”

• http://guardian.co.uk “For US Embassy Cablegate Diagrams”

Page 32: y3dips - Who Own Your Sensitive Information?

Who Own your Sensitive Information ?

How It was Taken & How To Protect It

@y3dips - [email protected]