SlideShare ist ein Scribd-Unternehmen logo
1 von 64
Downloaden Sie, um offline zu lesen
RSA Conference 2011                                                            Security intelligence




       Prinya Hom-Anek
       CGEIT, CISSP, CSSLP, CISA, CISM, SSCP, SANS GIAC GCFW,
       ITIL Expert, CompTIA Security+, IRCA: ISMS Lead Auditor, BCMS Auditor
       (ISC)2 Asian Advisory Board; ISACA Thailand Committee,
       Thailand Information Security Association (TISA) Committee,
       ACIS Professional Center Co., Ltd. , President and Founder
RSA Conference 2011                                                                                Security intelligence




                                          Agenda

          Introduction
          Social Networks Security Update
          Malware Security Update
          Mobile Devices and Smart phones Security
          Update
          Secure Software Development Security
          Update

                      © Copyright, ACIS Professional Center Company Limited, All rights reserved                     2
RSA Conference 2011                                                                                 Security intelligence




                      RSA CONFERENCE




                       © Copyright, ACIS Professional Center Company Limited, All rights reserved                     3
RSA Conference 2011                                                                                Security intelligence




    The previous RSA Conference Theme




                      © Copyright, ACIS Professional Center Company Limited, All rights reserved                     4
RSA Conference 2011                                                                                  Security intelligence




                        RSA Conference 2011
                      (ISC)2 member reception




                        © Copyright, ACIS Professional Center Company Limited, All rights reserved                     5
RSA Conference 2011                                                                                  Security intelligence




                       Conference Theme


         Rivest used fictitious placeholder names to explain the RSA
         encryption method and the many steps involved in the complex
         system.
         Alice & Bob were born to make the subject matter easier to
         grasp – replacing Person A and Person B.
         Bruce Schneier, author of Applied Cryptography and another
         forefather of information security, introduced a host of other
         characters to make technical topics more understandable.
         This cast of friends and enemies – including Eve the
         Eavesdropper, Mallory the Malicious Attacker and Walter the
         Warden, among others – populate Alice & Bob's universe and
         evolved into common parlance in cryptography and computer
         security.
                        © Copyright, ACIS Professional Center Company Limited, All rights reserved                     6
RSA Conference 2011                                                                                Security intelligence



        Example of an "Alice and Bob" analogy
               used in cryptography




                      © Copyright, ACIS Professional Center Company Limited, All rights reserved                     7
RSA Conference 2011                                                                                Security intelligence



        Example of an "Alice and Bob" analogy
           used in cryptographic hashing




                      © Copyright, ACIS Professional Center Company Limited, All rights reserved                     8
RSA Conference 2011                                                                                 Security intelligence




                      SOCIAL NETWORKS
                          SECURITY




                       © Copyright, ACIS Professional Center Company Limited, All rights reserved                     9
RSA Conference 2011                                                                                   Security intelligence




                      Social Networks Survey




                         © Copyright, ACIS Professional Center Company Limited, All rights reserved                    10
RSA Conference 2011                                                                                     Security intelligence



                      Social Engineering Techniques
                           on Social Networks
          One of the more common types of attack hitting users is
          “clickjacking”, also called “UI redressing”
          These attacks use maliciously created pages where the true
          function of a button is concealed beneath an opaque layer
          showing something entirely different.
          Often sharing or “liking” the content in question sends the
          attack out to contacts through newsfeeds and status
          updates, propagating the scam.
          Clickjacking attacks not only spread social networking link-
          spam, they also regularly carry out other actions such as
          granting access to valuable personal information and even
          making purchases.
                           © Copyright, ACIS Professional Center Company Limited, All rights reserved                    11
RSA Conference 2011                                                                                   Security intelligence




                      Example of Clickjacking




                         © Copyright, ACIS Professional Center Company Limited, All rights reserved                    12
RSA Conference 2011                                                                                   Security intelligence




                      How Clickjacking works?




                         © Copyright, ACIS Professional Center Company Limited, All rights reserved                    13
RSA Conference 2011                                                                                Security intelligence



         How to Avoid From Social Engineering
           Techniques on Social Network?

   1. If something sounds too good to be true, it probably is.
   2. Ask yourself—why would you be singled out for a windfall
      or other special treatment out of the millions of other
      Internet users. If you can’t find a good reason, it’s probably
      a scam.
   3. Don’t believe everything you read.
   4. Be patient. Too many users end up the victims of Internet
      crime because they do not stop to think, but instead act on
      impulse clicking on a “sexy” link or an interesting looking
      attachment without thinking of the possible consequences.


                      © Copyright, ACIS Professional Center Company Limited, All rights reserved                    14
RSA Conference 2011                                                                                Security intelligence



       How to Avoid From Social Engineering
       Techniques on Social Network? (Cont.)

   5. Never provide your personal information or information about
      your company/organization.
   6. Double-check the URLs of websites you visit. Some phishing
      websites look identical to the actual site, but the URL may be
      subtly different.
   7. Be cautious about sending sensitive information over the
      Internet if you’re not confident about the security of the website.
   8. Be suspicious of unsolicited phone calls and emails that ask for
      information about your employees or other information. It could
      be a scammer calling.


                      © Copyright, ACIS Professional Center Company Limited, All rights reserved                    15
RSA Conference 2011                                                                                  Security intelligence




                                  Applications

          Facebook has a major problem in the form of
          its app system.
          Any user can create an application, with a wide
          range of powers to interact with data stored
          on user pages and cross-site messaging
          systems, and these applications, like survey
          scams, can then be installed and run on any
          users’ page.
          To combat this serious problem, a “walled
          garden” approach may be more suitable. This
          refers to a closed or exclusive set of
          information services provided for users, in
          contrast to allowing open access to
          applications and content.
                        © Copyright, ACIS Professional Center Company Limited, All rights reserved                    16
RSA Conference 2011                                                                                  Security intelligence




                           Privacy Setting

          Facebook comes under regular criticism
          for its provision, implementation and
          explanation of user privacy features.
          Directions for setting privacy preferences
          are vague and unclear—if and when
          they’re provided. Plus, once uploaded,
          information and content may be difficult
          or impossible to remove.




                        © Copyright, ACIS Professional Center Company Limited, All rights reserved                    17
RSA Conference 2011                                                                                    Security intelligence




                      Types of Personal Data
          Likes: a person, band, movie, web page, or any other entity
          represented in Facebook's social graph that has a "like" button.
          "Likes" started with status updates, but have now grown to
          encompass pretty much everything.
          Name, Picture, Gender, Birthday, Contact Info: self-
          explanatory
          Extended Profile Data: Your family members, city, place of birth,
          religious views, favorite authors, schools attended -- anything that
          is an entity you can list a relationship to in your profile.
          Friends: The people you've added to friends.
          Networks: The personal networks you've set up on Facebook (e.g.
          colleges & universities or companies).
          Wall posts & Photos: Self-explanatory.

                          © Copyright, ACIS Professional Center Company Limited, All rights reserved                    18
RSA Conference 2011                                                                                Security intelligence




                                  MALWARE




                      © Copyright, ACIS Professional Center Company Limited, All rights reserved                    19
RSA Conference 2011                                                                                   Security intelligence




                          Target Software
          Cybercriminals tend to target Microsoft, because its Office and
          Internet Explorer solutions are ubiquitous.
          Many users view this software as an integral part of the
          Windows platform, rather than separate software that may need
          a separate regime of updating and patching.
          Lately, cybercrooks targeted Adobe to enable malware
          distribution, as its PDF Reader and Flash player are also widely, if
          not universally, installed.
          PDF exploits became ever more widespread, and new
          vulnerabilities in Reader emerged regularly.
          Maliciously-crafted PDFs are placed on websites or mailed out in
          spam runs, hoping that they will be opened in vulnerable Reader
          software and their payloads will be given free rein to infect
          systems.


                         © Copyright, ACIS Professional Center Company Limited, All rights reserved                    20
RSA Conference 2011                                                                                    Security intelligence




                      Top 10 Vulnerable Vendors




                          © Copyright, ACIS Professional Center Company Limited, All rights reserved                    21
RSA Conference 2011                                                                                   Security intelligence




                      Best and worst patchers




                         © Copyright, ACIS Professional Center Company Limited, All rights reserved                    22
RSA Conference 2011                                                                                  Security intelligence



                       Exploit effort versus
                      potential reward matrix




                        © Copyright, ACIS Professional Center Company Limited, All rights reserved                    23
RSA Conference 2011                                                                                     Security intelligence




         Advanced Persistent Threat (APT)

   Increasingly sophisticated cyber attacks by hostile
      organizations with the goal of:
               Gaining access to defense, financial and other targeted
               information from governments, corporations and individuals.
               Maintaining a foothold in these environments to enable future
               use and control.
               Modifying data to disrupt performance in their targets.




                           © Copyright, ACIS Professional Center Company Limited, All rights reserved                    24
RSA Conference 2011                     Security intelligence




                      APT in the news
RSA Conference 2011                                    Security intelligence




                      APT - NASDAQ ATTACK

                                     The Attacker were persisting
                                      within NASDAQ’ Directors
                                       Desk servers for over 12
                                               months




                                                           25-Feb-11

                                                                        26
RSA Conference 2011                                                                                                 Security intelligence




                                    Malware Evolution
   Sophistication


                                                                                                                  SpyEye
                                                                                                           Zeus
  High                                                                  Man in the
                                                                                            SilentBanker
                                                         Man in the      Browser
                                                          Middle
                                                                               Smishing
                                               Trojan/Virus       Vishing
                                                 Spyware
Medium                                 Phishing
                                    Fake Web Sites

                       Mouselogging
                      Screen Capture


               Keylogging
  Low

               2002          2003           2004        2005          2006           2007         2008       2009         2010
RSA Conference 2011                 Security intelligence




                      ZEUS BOTNET




                                                     28
RSA Conference 2011                 Security intelligence




                      ZEUS BOTNET




                                                     29
RSA Conference 2011                   Security intelligence




                      SpyEye BOTNET
RSA Conference 2011                   Security intelligence




                      SpyEye BOTNET
RSA Conference 2011                   Security intelligence




                      SpyEye BOTNET
RSA Conference 2011                     Security intelligence




        SpyEye BOTNET – Credit Card Grabber
RSA Conference 2011                         Security intelligence




                      Zeus BOTNET Tracker
RSA Conference 2011                           Security intelligence




                      SpyEye BOTNET Tracker
RSA Conference 2011                                                                                Security intelligence




       Top ten countries hosting malware




                      © Copyright, ACIS Professional Center Company Limited, All rights reserved                    36
RSA Conference 2011                                                                                 Security intelligence




                 Top malware spreading via email
                          attachment




                       © Copyright, ACIS Professional Center Company Limited, All rights reserved                    37
RSA Conference 2011                                                                                    Security intelligence




                                             Stuxnet
          Stuxnet is a Windows computer worm discovered in July 2010 that
          targets industrial software and equipment.
          The worm initially spreads indiscriminately, but includes a highly
          specialized malware payload that is designed to target only Supervisory
          Control And Data Acquisition (SCADA) systems that are configured to
          control and monitor specific industrial processes.
          Some of Iran’s sensitive nuclear program computers were reportedly
          affected by it.
          A report issued by the Congressional Research Service (CRS) claims
          that Stuxnet could hit the U.S. as well.
          The so-called military-grade malware may have been an advanced
          threat, showing a number of flaws in many layers of security processes.



                          © Copyright, ACIS Professional Center Company Limited, All rights reserved                    38
RSA Conference 2011                            Security intelligence




                      STUXNET – SCADA ATTACK




                                                                39
RSA Conference 2011                                                                                Security intelligence




                      © Copyright, ACIS Professional Center Company Limited, All rights reserved                    40
RSA Conference 2011                                                                                  Security intelligence




                      MOBILE DEVICES AND
                        SMARTPHONES




                        © Copyright, ACIS Professional Center Company Limited, All rights reserved                    41
RSA Conference 2011                                                                                   Security intelligence




           Mobile Devices and Smartphones
          According to Gartner analysts, one in six people will have access
          to a high-tech mobile device by the end of 2010.
          In the last few years, we’ve witnessed a radical change in the
          way we access and use the Internet.
          The rapid upswing in sophistication of mobile technology
          resulted in a swift change in the way we provide mobile content
          and interact with it.
          However, this change brings with it a wealth of new problems for
          security.
          In our new, always-connected age, maintaining the integrity and
          privacy of networks, business data and personal information is
          increasingly important and difficult.




                         © Copyright, ACIS Professional Center Company Limited, All rights reserved                    42
RSA Conference 2011                                                                                    Security intelligence




                                               iPhone
          Hackers released the source code for potential iPhone spyware to the
          Internet (this also affected BlackBerry).
          iPhone smartphone users into joining a mobile botnet by spreading a
          seemingly innocuous weather application.
          The majority of security issues continue to focus on jailbroken devices,
          where the mobile security settings are unlocked to get more
          functionality.
          Users continue to jailbreak their devices in droves, tempted by the
          possibility of installing applications not approved by the company.
          When iPhones are plugged in to home or company computers or are
          set up on unapproved wireless networks to provide phone connectivity,
          threats are transferred from the iPhone to more vulnerable systems
          and networks.
          You can use a blend of policies and technologies to keep your network
          and machines safe. “Acceptable use” policies can attempt to control
          what users plug into company devices.
                          © Copyright, ACIS Professional Center Company Limited, All rights reserved                    43
RSA Conference 2011                                                                                    Security intelligence




                                             Android
          Google’s Android tried to keep pace with the iPhone in terms of
          functionality, and as devices diversify, the Android user base continues
          to grow.
          Google found and removed banking malware from the site when a
          wallpaper application gathered information on over 1 million Android
          users.
          Android phones represent a considerable exposure point, but again one
          that relies heavily on social engineering to lure users into installing
          rogue or malicious applications that give the bad guys access to their
          phones.




                          © Copyright, ACIS Professional Center Company Limited, All rights reserved                    44
RSA Conference 2011                                                                                  Security intelligence




                                     BlackBerry
          BlackBerry is still the device of choice in corporate
          environments.
          The BlackBerry security-built-in model is fairly successful so
          far, although potential spyware applications have been
          introduced.
          Most new developments—if anything—weaken that security
          model, with several nations pressuring RIM to slacken their
          policy of transporting all data through their central servers
          in strongly encrypted form, preventing government
          snooping on traffic.


                        © Copyright, ACIS Professional Center Company Limited, All rights reserved                    45
RSA Conference 2011                         Security intelligence




                      ปลอดภ ัยแน่นอน !!!!
RSA Conference 2011                                                                              Security intelligence




      Attacks Using Internet Marketing Techniques
          The search engine is our gateway to the web, and cybercrooks
          are skilled at manipulating search results from the engines such
          as Google, Bing and Yahoo! to lure victims to their malicious
          pages.
          These pages host security risks and browser exploits just waiting
          to infect users who are directed to these sites.
          Legitimate Search Engine Optimization (SEO) techniques are
          regularly used as marketing tools, but when SEO is abused by
          the bad guys, and supplemented by more devious methods, it’s
          known as Black Hat SEO.
          With Black Hat SEO attacks—known as “SEO poisoning”—search
          engine results are poisoned to drive user traffic to the rogue site.
          Google reported that up to 1.3% of their search results are
          infected.     © Copyright, ACIS Professional Center Company Limited, All rights reserved                47
RSA Conference 2011                                                                                 Security intelligence




                      SECURE SOFTWARE
                        DEVELOPMENT




                       © Copyright, ACIS Professional Center Company Limited, All rights reserved                    48
RSA Conference 2011                                                                                Security intelligence




                      Trusted Software
   Security profile for trusted software in the context of software
      assurance includes the following:
      Protection against confidentiality, integrity, and availability
      threats
      Assurance that authentication cannot be circumvented
      Validation of authorization credentials before access to
      resources are granted
      Effective implementation of auditing functionality for
      business-critical and administrative transactions
      Management of Sessions, Exceptions, and Configuration
      parameters.


                      © Copyright, ACIS Professional Center Company Limited, All rights reserved                    49
RSA Conference 2011                                                                                              Security intelligence




                      Software Security Profile


      Confidentiality                               Integrity                                           Availability




      Authentication                          Authorization                                              Auditing



          Session                               Exceptions                                             Configuration
        Management                             Management                                              Management
                          © Copyright, ACIS Professional Center Company Limited, All rights reserved                              50
RSA Conference 2011                                                                                    Security intelligence




                      Threats that Impact Trust

          There are several threats to software that can impact one’s
          level of confidence or trust in it.
          These threat agents take advantage of vulnerabilities in
          software and may be human or non-human.




                          © Copyright, ACIS Professional Center Company Limited, All rights reserved                    51
RSA Conference 2011                                                                                                  Security intelligence




       Software Threat Agents Categorization

                                       Software Threat Agents




                      Non-Human                                               Human




                                                              User Error                                Hacker
                      Malware
                                                             (Accidental)                            (Intentional)




                                © Copyright, ACIS Professional Center Company Limited, All rights reserved                            52
RSA Conference 2011                                                                                                      Security intelligence




                                  Types of Malware

                                                        Malware




                      Proliferative                                          Stealthware




                      Viruses &                 Spyware &
                                                                                     Rootkits                  Trojans
                       Worms                     Adware




                                  © Copyright, ACIS Professional Center Company Limited, All rights reserved                              53
RSA Conference 2011                                                                                   Security intelligence




                      Types of Malware (cont.)

   Proliferative Malware
      Proliferative malware includes malicious software programs that, upon
      exploiting weaknesses in networks, hosts, and software applications,
      aim at propagating their malicious operations to other networks, hosts,
      and software applications connected to the victim.
      Viruses and worms are the most common form of proliferative
      malware.
   Stealthware
      Stealthware includes malicious software programs such as spyware and
      adware, Trojans, and rootkits that remain hidden and operate often
      without the consent or knowledge of the victimized system or user.




                         © Copyright, ACIS Professional Center Company Limited, All rights reserved                    54
RSA Conference 2011                                                                                          Security intelligence




                      Types of Embedded Code

Backdoors
                                                                                                      Embedded
       Backdoors are code constructs embedded in                                                        Code
       code to allow programmers to bypass security
       mechanisms.
Logic bombs                                                                                 Maintenance
                                                                                               Hook/        Logic Bomb
       Like backdoors, logic bombs are also embedded                                         Backdoor
       code constructs that remain dormant in code
       and are executed when specific events and/or
       time conditions are met.




                         © Copyright, ACIS Professional Center Company Limited, All rights reserved                           55
RSA Conference 2011                                                                                    Security intelligence



                      Trusted Software Characteristics
   Functions as expected (reliable)                             Ensures security policy (resilient)
   Is fault-tolerant and robust (recoverable)                   Maintains confidentiality, integrity, and
                                                                availability of software and the data it
                                                                handles
   Prevents circumvention of authentication                     Handles sessions, configurations, and
   and access control checks                                    exceptions securely
   Is deployed on host systems that are                         Ensures protection against proliferative
   adequately hardened                                          malware (viruses and worms)
   Defends against malware that causes                          Ensures protection against harmful
   disclosure and destruction (spyware and                      malware that is purported as benign
   adware)                                                      (Trojans)
   Does not allow privilege escalation from                     Is deployed/released without any
   user land to kernel land (rootkits)                          maintenance hooks (backdoors)
   Ensures that there are no embedded                           Anti-tampering (obfuscation) and
   code security threats that can be                            authenticity (signed code) controls are
   conditionally triggered (logic bombs)                        present
   Tested, validated, and verified for software security by the organization or by an
   independent third party.
                          © Copyright, ACIS Professional Center Company Limited, All rights reserved                    56
RSA Conference 2011                                                                                    Security intelligence




                      RSA Conference Highlight
   Application and Development Security
          Best Practices from the Front Lines: The Fight for Secure Software
          Software Security: The Big Picture
          Stop Exposing Yourself: Principles of Attack Surface Analysis and
          Reduction
          The Evolution of Software Security Assurance and its Relevance Today
          Innovation in Application Security
          Intelligence on the Intractable Problem of Insecure Software
          Agile Development, Security Fail
          Strategies for Security in Software QA
          Don't Teach Developers Security
          Planned vs. Agile for Security Software Development


                          © Copyright, ACIS Professional Center Company Limited, All rights reserved                    57
RSA Conference 2011                                                                                  Security intelligence




          RSA Conference Highlight (Cont.)
   Cloud Computing Security
          Put a SOC in it: Operationalizing Security in a SaaS
          Environment
          Securing Cloud Access – Beyond Enterprise IA&M
          Cloud Investigations and Forensics
          Hacking Exposed - Exploiting the Cloud and Virtual
          Machines




                        © Copyright, ACIS Professional Center Company Limited, All rights reserved                    58
RSA Conference 2011                                                                                Security intelligence




          RSA Conference Highlight (Cont.)
   Social Networks Security
     Social Engineering in a Social Media World: Risk, Liability,
     and Control
     Blocking Social Media Is So 2010 - How to Embrace the
     Social Web Safely
     Is Social Networking Making Your Network Insecure?
     Proactively Tackling Social Networking and Data Security
     The Dark Side: Measuring and Analyzing Malicious Activity
     on Twitter
     Social Engineering in a Social Media World: Risk, Liability,
     and Control

                      © Copyright, ACIS Professional Center Company Limited, All rights reserved                    59
RSA Conference 2011                                                                                 Security intelligence




          RSA Conference Highlight (Cont.)
   Mobile Security
          Are Mobile Security Threats Real? A Panel of Mobile Experts
          Weigh In...
          Why You Can't Trust Your Mobile Network
          Trends in Mobile Authentication and Fraud Deterrence
          Mobile Security: What Perimeter? What Defense?
          The Big Picture Never Say "Mobile Cloud Leak“
          Mobile Security the Ugly Truth
          There’s an App for That: What the Mobile App Explosion
          Means for Security

                       © Copyright, ACIS Professional Center Company Limited, All rights reserved                    60
RSA Conference 2011                                                                                 Security intelligence




          RSA Conference Highlight (Cont.)
   APT (Advanced Persistent Threats)
          Cyber War: How We Learned to Stop Worrying and Love
          the Cyber Bomb
          Advanced Persistent Threats: War Stories from the Front
          Lines
          Hypebusters: The Advanced Persistent Threat and You
          Bring Your Doctor Masks: Live Zeus Trojan Dissection




                       © Copyright, ACIS Professional Center Company Limited, All rights reserved                    61
RSA Conference 2011                                                                                 Security intelligence




          RSA Conference Highlight (Cont.)
   Technical Security
          Databases Under Attack - Securing Heterogeneous
          Database Infrastructures
          Seven Steps to Protecting Databases
          The Death of Signature-Based AV
          Cutting-Edge Hacking Techniques




                       © Copyright, ACIS Professional Center Company Limited, All rights reserved                    62
RSA Conference 2011                                                                                Security intelligence




             Ref: http://www.rsaconference.com/




                      © Copyright, ACIS Professional Center Company Limited, All rights reserved                    63
RSA Conference 2011                           Security intelligence




       Web : http://www.acisonline.net
       Email : prinya@acisonline.net

       Twitter : www.twitter.com/prinyaacis
       Facebook : www.facebook.com/prinyah

Weitere ähnliche Inhalte

Was ist angesagt?

MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...IJCNCJournal
 
Thy myth of hacking Oracle
Thy myth of hacking OracleThy myth of hacking Oracle
Thy myth of hacking OracleErmando
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Cisco do Brasil
 
Managed Security for Your Business
Managed Security for Your BusinessManaged Security for Your Business
Managed Security for Your BusinessSikich LLP
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityCentrify Corporation
 
Intel - Copaco Cloud Event 2015 (break-out 3 en 4)
Intel - Copaco Cloud Event 2015 (break-out 3 en 4)Intel - Copaco Cloud Event 2015 (break-out 3 en 4)
Intel - Copaco Cloud Event 2015 (break-out 3 en 4)Copaco Nederland
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Security B-Sides
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trustscoopnewsgroup
 
FINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYFINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYSecureData Europe
 
NEC IWS+PAN - Cyber Security Solutions
NEC IWS+PAN - Cyber Security SolutionsNEC IWS+PAN - Cyber Security Solutions
NEC IWS+PAN - Cyber Security SolutionsNECIndia
 
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013 Skybox Security
 
Layer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load TargetLayer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load TargetPrathan Phongthiproek
 
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017japijapi
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security LandscapeArrow ECS UK
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web securityxKinAnx
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
Intrusion Detection System (IDS)
Intrusion Detection System (IDS)Intrusion Detection System (IDS)
Intrusion Detection System (IDS)HCL Technologies
 
Ivanti Insights Podcast - FireEye Breach
Ivanti Insights Podcast - FireEye BreachIvanti Insights Podcast - FireEye Breach
Ivanti Insights Podcast - FireEye BreachIvanti
 

Was ist angesagt? (19)

MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
 
Thy myth of hacking Oracle
Thy myth of hacking OracleThy myth of hacking Oracle
Thy myth of hacking Oracle
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Managed Security for Your Business
Managed Security for Your BusinessManaged Security for Your Business
Managed Security for Your Business
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
 
Intel - Copaco Cloud Event 2015 (break-out 3 en 4)
Intel - Copaco Cloud Event 2015 (break-out 3 en 4)Intel - Copaco Cloud Event 2015 (break-out 3 en 4)
Intel - Copaco Cloud Event 2015 (break-out 3 en 4)
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
FINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYFINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITY
 
Inside Cybero
Inside CyberoInside Cybero
Inside Cybero
 
NEC IWS+PAN - Cyber Security Solutions
NEC IWS+PAN - Cyber Security SolutionsNEC IWS+PAN - Cyber Security Solutions
NEC IWS+PAN - Cyber Security Solutions
 
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013
 
Layer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load TargetLayer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load Target
 
Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017Reality of cybersecurity 11.4.2017
Reality of cybersecurity 11.4.2017
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security Landscape
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web security
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Intrusion Detection System (IDS)
Intrusion Detection System (IDS)Intrusion Detection System (IDS)
Intrusion Detection System (IDS)
 
Ivanti Insights Podcast - FireEye Breach
Ivanti Insights Podcast - FireEye BreachIvanti Insights Podcast - FireEye Breach
Ivanti Insights Podcast - FireEye Breach
 

Ähnlich wie Presentation : CIO challenges by AJ.Prinya ในงานสัมมนาผู้บริหารไอที เมื่อวันที่ 24 กุมภาพันธ์ 2554

IT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACAIT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACARamsés Gallego
 
Realizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application SecurityRealizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application SecurityOry Segal
 
Security Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeSecurity Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeKelum Senanayake
 
Looking Forward… and Beyond - Distinctiveness Through Security Excellence
Looking Forward… and Beyond - Distinctiveness Through Security ExcellenceLooking Forward… and Beyond - Distinctiveness Through Security Excellence
Looking Forward… and Beyond - Distinctiveness Through Security ExcellenceLudovic Petit
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategyJason Clark
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Ulf Mattsson
 
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...Business Development Institute
 
Strategies for Web Application Security
Strategies for Web Application SecurityStrategies for Web Application Security
Strategies for Web Application SecurityOpSource
 
Strategies for Web Application Security
Strategies for Web Application SecurityStrategies for Web Application Security
Strategies for Web Application SecurityOpSource
 
Maloney slides
Maloney slidesMaloney slides
Maloney slidesOnkar Sule
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligenceguest08b1e6
 
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...Amazon Web Services
 
Secure Application Development Training
Secure Application Development TrainingSecure Application Development Training
Secure Application Development Trainingpivotalsecurity
 
Can Information Security Survive
Can Information Security SurviveCan Information Security Survive
Can Information Security SurviveIT@Intel
 
2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecuritySvetlana Belyaeva
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSAmazon Web Services
 
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...Amazon Web Services
 

Ähnlich wie Presentation : CIO challenges by AJ.Prinya ในงานสัมมนาผู้บริหารไอที เมื่อวันที่ 24 กุมภาพันธ์ 2554 (20)

IT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACAIT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACA
 
Realizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application SecurityRealizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application Security
 
Security Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeSecurity Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in Skype
 
Looking Forward… and Beyond - Distinctiveness Through Security Excellence
Looking Forward… and Beyond - Distinctiveness Through Security ExcellenceLooking Forward… and Beyond - Distinctiveness Through Security Excellence
Looking Forward… and Beyond - Distinctiveness Through Security Excellence
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
 
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
 
Strategies for Web Application Security
Strategies for Web Application SecurityStrategies for Web Application Security
Strategies for Web Application Security
 
Strategies for Web Application Security
Strategies for Web Application SecurityStrategies for Web Application Security
Strategies for Web Application Security
 
UL TS - CSA NL SUMMIT
UL TS - CSA NL SUMMITUL TS - CSA NL SUMMIT
UL TS - CSA NL SUMMIT
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligence
 
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...
 
Secure Application Development Training
Secure Application Development TrainingSecure Application Development Training
Secure Application Development Training
 
Can Information Security Survive
Can Information Security SurviveCan Information Security Survive
Can Information Security Survive
 
2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity
 
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
 
Data leakage prevention EN Final
Data leakage prevention EN FinalData leakage prevention EN Final
Data leakage prevention EN Final
 
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
 

Mehr von Software Park Thailand

Software Park Thailand Newsletter (Thai) Vol2/2556
Software Park Thailand Newsletter (Thai) Vol2/2556Software Park Thailand Newsletter (Thai) Vol2/2556
Software Park Thailand Newsletter (Thai) Vol2/2556Software Park Thailand
 
Software Park Newsletter Thai Vol 3/25561
Software Park Newsletter Thai Vol 3/25561Software Park Newsletter Thai Vol 3/25561
Software Park Newsletter Thai Vol 3/25561Software Park Thailand
 
Solfware park Newsletter Vol 3/2013 Eng Version
Solfware park Newsletter Vol 3/2013 Eng VersionSolfware park Newsletter Vol 3/2013 Eng Version
Solfware park Newsletter Vol 3/2013 Eng VersionSoftware Park Thailand
 
Software Park Thailand Newsletter Vol 3/2556
Software Park Thailand Newsletter Vol 3/2556Software Park Thailand Newsletter Vol 3/2556
Software Park Thailand Newsletter Vol 3/2556Software Park Thailand
 
Software Park Thailand Newsletter (Eng) Vol3/2012
Software Park Thailand Newsletter (Eng) Vol3/2012Software Park Thailand Newsletter (Eng) Vol3/2012
Software Park Thailand Newsletter (Eng) Vol3/2012Software Park Thailand
 
Software Park Thailand Newsletter (Eng) Vol5/2013
Software Park Thailand Newsletter (Eng) Vol5/2013Software Park Thailand Newsletter (Eng) Vol5/2013
Software Park Thailand Newsletter (Eng) Vol5/2013Software Park Thailand
 
Software Park Thailand Newsletter (Thai) Vol4/2555
Software Park Thailand Newsletter (Thai) Vol4/2555Software Park Thailand Newsletter (Thai) Vol4/2555
Software Park Thailand Newsletter (Thai) Vol4/2555Software Park Thailand
 
Thai ICT Trad Mission CommunicAsia 2013 (18-21 June 2013)
Thai ICT Trad Mission CommunicAsia 2013 (18-21 June 2013)Thai ICT Trad Mission CommunicAsia 2013 (18-21 June 2013)
Thai ICT Trad Mission CommunicAsia 2013 (18-21 June 2013)Software Park Thailand
 
Smart Industry Vo.22/2556"E-transaction กระตุ้นธุรกิจอีคอมเมิร์สโต"
Smart Industry Vo.22/2556"E-transaction กระตุ้นธุรกิจอีคอมเมิร์สโต"Smart Industry Vo.22/2556"E-transaction กระตุ้นธุรกิจอีคอมเมิร์สโต"
Smart Industry Vo.22/2556"E-transaction กระตุ้นธุรกิจอีคอมเมิร์สโต"Software Park Thailand
 
Software Park Newsletter 2/2554 "แท็บเล็ต สมาร์ทโพน โมบายแอพพลิเคชั่น ดาวเด่น...
Software Park Newsletter 2/2554 "แท็บเล็ต สมาร์ทโพน โมบายแอพพลิเคชั่น ดาวเด่น...Software Park Newsletter 2/2554 "แท็บเล็ต สมาร์ทโพน โมบายแอพพลิเคชั่น ดาวเด่น...
Software Park Newsletter 2/2554 "แท็บเล็ต สมาร์ทโพน โมบายแอพพลิเคชั่น ดาวเด่น...Software Park Thailand
 
Software Park Newsletter Vol. 4/2012 English Version
Software Park Newsletter Vol. 4/2012 English VersionSoftware Park Newsletter Vol. 4/2012 English Version
Software Park Newsletter Vol. 4/2012 English VersionSoftware Park Thailand
 
Thai IT Business Develop,emt Delegation to Tokyo, Japan, 2012
Thai IT Business Develop,emt Delegation to Tokyo, Japan, 2012Thai IT Business Develop,emt Delegation to Tokyo, Japan, 2012
Thai IT Business Develop,emt Delegation to Tokyo, Japan, 2012Software Park Thailand
 
Thai IT Trade Delegation to Tokyo, Japan 11-16 November 2012
Thai IT Trade Delegation to Tokyo, Japan 11-16 November 2012Thai IT Trade Delegation to Tokyo, Japan 11-16 November 2012
Thai IT Trade Delegation to Tokyo, Japan 11-16 November 2012Software Park Thailand
 
Thai IT Business Development Delegation to Tokyo, Japan: November 2012
Thai IT Business Development Delegation to Tokyo, Japan: November 2012 Thai IT Business Development Delegation to Tokyo, Japan: November 2012
Thai IT Business Development Delegation to Tokyo, Japan: November 2012 Software Park Thailand
 

Mehr von Software Park Thailand (20)

Smart industry Vol.33/2561
Smart industry Vol.33/2561Smart industry Vol.33/2561
Smart industry Vol.33/2561
 
Softwarepark news Vol.7/2561
Softwarepark news Vol.7/2561Softwarepark news Vol.7/2561
Softwarepark news Vol.7/2561
 
Software Park Thailand Newsletter (Thai) Vol2/2556
Software Park Thailand Newsletter (Thai) Vol2/2556Software Park Thailand Newsletter (Thai) Vol2/2556
Software Park Thailand Newsletter (Thai) Vol2/2556
 
Software Park Newsletter Thai Vol 3/25561
Software Park Newsletter Thai Vol 3/25561Software Park Newsletter Thai Vol 3/25561
Software Park Newsletter Thai Vol 3/25561
 
Smart Industry Vol.23
Smart Industry Vol.23Smart Industry Vol.23
Smart Industry Vol.23
 
Solfware park Newsletter Vol 3/2013 Eng Version
Solfware park Newsletter Vol 3/2013 Eng VersionSolfware park Newsletter Vol 3/2013 Eng Version
Solfware park Newsletter Vol 3/2013 Eng Version
 
Software Park Thailand Newsletter Vol 3/2556
Software Park Thailand Newsletter Vol 3/2556Software Park Thailand Newsletter Vol 3/2556
Software Park Thailand Newsletter Vol 3/2556
 
Software Park Thailand Newsletter (Eng) Vol3/2012
Software Park Thailand Newsletter (Eng) Vol3/2012Software Park Thailand Newsletter (Eng) Vol3/2012
Software Park Thailand Newsletter (Eng) Vol3/2012
 
Software Park Thailand Newsletter (Eng) Vol5/2013
Software Park Thailand Newsletter (Eng) Vol5/2013Software Park Thailand Newsletter (Eng) Vol5/2013
Software Park Thailand Newsletter (Eng) Vol5/2013
 
Software Park Thailand Newsletter (Thai) Vol4/2555
Software Park Thailand Newsletter (Thai) Vol4/2555Software Park Thailand Newsletter (Thai) Vol4/2555
Software Park Thailand Newsletter (Thai) Vol4/2555
 
Thai ICT Trad Mission CommunicAsia 2013 (18-21 June 2013)
Thai ICT Trad Mission CommunicAsia 2013 (18-21 June 2013)Thai ICT Trad Mission CommunicAsia 2013 (18-21 June 2013)
Thai ICT Trad Mission CommunicAsia 2013 (18-21 June 2013)
 
Smart Industry Vo.22/2556"E-transaction กระตุ้นธุรกิจอีคอมเมิร์สโต"
Smart Industry Vo.22/2556"E-transaction กระตุ้นธุรกิจอีคอมเมิร์สโต"Smart Industry Vo.22/2556"E-transaction กระตุ้นธุรกิจอีคอมเมิร์สโต"
Smart Industry Vo.22/2556"E-transaction กระตุ้นธุรกิจอีคอมเมิร์สโต"
 
Software newsletter
Software newsletterSoftware newsletter
Software newsletter
 
Smart industry Vol. 21/2556
Smart industry Vol. 21/2556Smart industry Vol. 21/2556
Smart industry Vol. 21/2556
 
Software Park Newsletter 2/2554 "แท็บเล็ต สมาร์ทโพน โมบายแอพพลิเคชั่น ดาวเด่น...
Software Park Newsletter 2/2554 "แท็บเล็ต สมาร์ทโพน โมบายแอพพลิเคชั่น ดาวเด่น...Software Park Newsletter 2/2554 "แท็บเล็ต สมาร์ทโพน โมบายแอพพลิเคชั่น ดาวเด่น...
Software Park Newsletter 2/2554 "แท็บเล็ต สมาร์ทโพน โมบายแอพพลิเคชั่น ดาวเด่น...
 
Software Park Newsletter Vol. 4/2012 English Version
Software Park Newsletter Vol. 4/2012 English VersionSoftware Park Newsletter Vol. 4/2012 English Version
Software Park Newsletter Vol. 4/2012 English Version
 
Thai IT Delegation to Japan 2012
Thai IT Delegation to Japan 2012Thai IT Delegation to Japan 2012
Thai IT Delegation to Japan 2012
 
Thai IT Business Develop,emt Delegation to Tokyo, Japan, 2012
Thai IT Business Develop,emt Delegation to Tokyo, Japan, 2012Thai IT Business Develop,emt Delegation to Tokyo, Japan, 2012
Thai IT Business Develop,emt Delegation to Tokyo, Japan, 2012
 
Thai IT Trade Delegation to Tokyo, Japan 11-16 November 2012
Thai IT Trade Delegation to Tokyo, Japan 11-16 November 2012Thai IT Trade Delegation to Tokyo, Japan 11-16 November 2012
Thai IT Trade Delegation to Tokyo, Japan 11-16 November 2012
 
Thai IT Business Development Delegation to Tokyo, Japan: November 2012
Thai IT Business Development Delegation to Tokyo, Japan: November 2012 Thai IT Business Development Delegation to Tokyo, Japan: November 2012
Thai IT Business Development Delegation to Tokyo, Japan: November 2012
 

Kürzlich hochgeladen

Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 

Kürzlich hochgeladen (20)

Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 

Presentation : CIO challenges by AJ.Prinya ในงานสัมมนาผู้บริหารไอที เมื่อวันที่ 24 กุมภาพันธ์ 2554

  • 1. RSA Conference 2011 Security intelligence Prinya Hom-Anek CGEIT, CISSP, CSSLP, CISA, CISM, SSCP, SANS GIAC GCFW, ITIL Expert, CompTIA Security+, IRCA: ISMS Lead Auditor, BCMS Auditor (ISC)2 Asian Advisory Board; ISACA Thailand Committee, Thailand Information Security Association (TISA) Committee, ACIS Professional Center Co., Ltd. , President and Founder
  • 2. RSA Conference 2011 Security intelligence Agenda Introduction Social Networks Security Update Malware Security Update Mobile Devices and Smart phones Security Update Secure Software Development Security Update © Copyright, ACIS Professional Center Company Limited, All rights reserved 2
  • 3. RSA Conference 2011 Security intelligence RSA CONFERENCE © Copyright, ACIS Professional Center Company Limited, All rights reserved 3
  • 4. RSA Conference 2011 Security intelligence The previous RSA Conference Theme © Copyright, ACIS Professional Center Company Limited, All rights reserved 4
  • 5. RSA Conference 2011 Security intelligence RSA Conference 2011 (ISC)2 member reception © Copyright, ACIS Professional Center Company Limited, All rights reserved 5
  • 6. RSA Conference 2011 Security intelligence Conference Theme Rivest used fictitious placeholder names to explain the RSA encryption method and the many steps involved in the complex system. Alice & Bob were born to make the subject matter easier to grasp – replacing Person A and Person B. Bruce Schneier, author of Applied Cryptography and another forefather of information security, introduced a host of other characters to make technical topics more understandable. This cast of friends and enemies – including Eve the Eavesdropper, Mallory the Malicious Attacker and Walter the Warden, among others – populate Alice & Bob's universe and evolved into common parlance in cryptography and computer security. © Copyright, ACIS Professional Center Company Limited, All rights reserved 6
  • 7. RSA Conference 2011 Security intelligence Example of an "Alice and Bob" analogy used in cryptography © Copyright, ACIS Professional Center Company Limited, All rights reserved 7
  • 8. RSA Conference 2011 Security intelligence Example of an "Alice and Bob" analogy used in cryptographic hashing © Copyright, ACIS Professional Center Company Limited, All rights reserved 8
  • 9. RSA Conference 2011 Security intelligence SOCIAL NETWORKS SECURITY © Copyright, ACIS Professional Center Company Limited, All rights reserved 9
  • 10. RSA Conference 2011 Security intelligence Social Networks Survey © Copyright, ACIS Professional Center Company Limited, All rights reserved 10
  • 11. RSA Conference 2011 Security intelligence Social Engineering Techniques on Social Networks One of the more common types of attack hitting users is “clickjacking”, also called “UI redressing” These attacks use maliciously created pages where the true function of a button is concealed beneath an opaque layer showing something entirely different. Often sharing or “liking” the content in question sends the attack out to contacts through newsfeeds and status updates, propagating the scam. Clickjacking attacks not only spread social networking link- spam, they also regularly carry out other actions such as granting access to valuable personal information and even making purchases. © Copyright, ACIS Professional Center Company Limited, All rights reserved 11
  • 12. RSA Conference 2011 Security intelligence Example of Clickjacking © Copyright, ACIS Professional Center Company Limited, All rights reserved 12
  • 13. RSA Conference 2011 Security intelligence How Clickjacking works? © Copyright, ACIS Professional Center Company Limited, All rights reserved 13
  • 14. RSA Conference 2011 Security intelligence How to Avoid From Social Engineering Techniques on Social Network? 1. If something sounds too good to be true, it probably is. 2. Ask yourself—why would you be singled out for a windfall or other special treatment out of the millions of other Internet users. If you can’t find a good reason, it’s probably a scam. 3. Don’t believe everything you read. 4. Be patient. Too many users end up the victims of Internet crime because they do not stop to think, but instead act on impulse clicking on a “sexy” link or an interesting looking attachment without thinking of the possible consequences. © Copyright, ACIS Professional Center Company Limited, All rights reserved 14
  • 15. RSA Conference 2011 Security intelligence How to Avoid From Social Engineering Techniques on Social Network? (Cont.) 5. Never provide your personal information or information about your company/organization. 6. Double-check the URLs of websites you visit. Some phishing websites look identical to the actual site, but the URL may be subtly different. 7. Be cautious about sending sensitive information over the Internet if you’re not confident about the security of the website. 8. Be suspicious of unsolicited phone calls and emails that ask for information about your employees or other information. It could be a scammer calling. © Copyright, ACIS Professional Center Company Limited, All rights reserved 15
  • 16. RSA Conference 2011 Security intelligence Applications Facebook has a major problem in the form of its app system. Any user can create an application, with a wide range of powers to interact with data stored on user pages and cross-site messaging systems, and these applications, like survey scams, can then be installed and run on any users’ page. To combat this serious problem, a “walled garden” approach may be more suitable. This refers to a closed or exclusive set of information services provided for users, in contrast to allowing open access to applications and content. © Copyright, ACIS Professional Center Company Limited, All rights reserved 16
  • 17. RSA Conference 2011 Security intelligence Privacy Setting Facebook comes under regular criticism for its provision, implementation and explanation of user privacy features. Directions for setting privacy preferences are vague and unclear—if and when they’re provided. Plus, once uploaded, information and content may be difficult or impossible to remove. © Copyright, ACIS Professional Center Company Limited, All rights reserved 17
  • 18. RSA Conference 2011 Security intelligence Types of Personal Data Likes: a person, band, movie, web page, or any other entity represented in Facebook's social graph that has a "like" button. "Likes" started with status updates, but have now grown to encompass pretty much everything. Name, Picture, Gender, Birthday, Contact Info: self- explanatory Extended Profile Data: Your family members, city, place of birth, religious views, favorite authors, schools attended -- anything that is an entity you can list a relationship to in your profile. Friends: The people you've added to friends. Networks: The personal networks you've set up on Facebook (e.g. colleges & universities or companies). Wall posts & Photos: Self-explanatory. © Copyright, ACIS Professional Center Company Limited, All rights reserved 18
  • 19. RSA Conference 2011 Security intelligence MALWARE © Copyright, ACIS Professional Center Company Limited, All rights reserved 19
  • 20. RSA Conference 2011 Security intelligence Target Software Cybercriminals tend to target Microsoft, because its Office and Internet Explorer solutions are ubiquitous. Many users view this software as an integral part of the Windows platform, rather than separate software that may need a separate regime of updating and patching. Lately, cybercrooks targeted Adobe to enable malware distribution, as its PDF Reader and Flash player are also widely, if not universally, installed. PDF exploits became ever more widespread, and new vulnerabilities in Reader emerged regularly. Maliciously-crafted PDFs are placed on websites or mailed out in spam runs, hoping that they will be opened in vulnerable Reader software and their payloads will be given free rein to infect systems. © Copyright, ACIS Professional Center Company Limited, All rights reserved 20
  • 21. RSA Conference 2011 Security intelligence Top 10 Vulnerable Vendors © Copyright, ACIS Professional Center Company Limited, All rights reserved 21
  • 22. RSA Conference 2011 Security intelligence Best and worst patchers © Copyright, ACIS Professional Center Company Limited, All rights reserved 22
  • 23. RSA Conference 2011 Security intelligence Exploit effort versus potential reward matrix © Copyright, ACIS Professional Center Company Limited, All rights reserved 23
  • 24. RSA Conference 2011 Security intelligence Advanced Persistent Threat (APT) Increasingly sophisticated cyber attacks by hostile organizations with the goal of: Gaining access to defense, financial and other targeted information from governments, corporations and individuals. Maintaining a foothold in these environments to enable future use and control. Modifying data to disrupt performance in their targets. © Copyright, ACIS Professional Center Company Limited, All rights reserved 24
  • 25. RSA Conference 2011 Security intelligence APT in the news
  • 26. RSA Conference 2011 Security intelligence APT - NASDAQ ATTACK The Attacker were persisting within NASDAQ’ Directors Desk servers for over 12 months 25-Feb-11 26
  • 27. RSA Conference 2011 Security intelligence Malware Evolution Sophistication SpyEye Zeus High Man in the SilentBanker Man in the Browser Middle Smishing Trojan/Virus Vishing Spyware Medium Phishing Fake Web Sites Mouselogging Screen Capture Keylogging Low 2002 2003 2004 2005 2006 2007 2008 2009 2010
  • 28. RSA Conference 2011 Security intelligence ZEUS BOTNET 28
  • 29. RSA Conference 2011 Security intelligence ZEUS BOTNET 29
  • 30. RSA Conference 2011 Security intelligence SpyEye BOTNET
  • 31. RSA Conference 2011 Security intelligence SpyEye BOTNET
  • 32. RSA Conference 2011 Security intelligence SpyEye BOTNET
  • 33. RSA Conference 2011 Security intelligence SpyEye BOTNET – Credit Card Grabber
  • 34. RSA Conference 2011 Security intelligence Zeus BOTNET Tracker
  • 35. RSA Conference 2011 Security intelligence SpyEye BOTNET Tracker
  • 36. RSA Conference 2011 Security intelligence Top ten countries hosting malware © Copyright, ACIS Professional Center Company Limited, All rights reserved 36
  • 37. RSA Conference 2011 Security intelligence Top malware spreading via email attachment © Copyright, ACIS Professional Center Company Limited, All rights reserved 37
  • 38. RSA Conference 2011 Security intelligence Stuxnet Stuxnet is a Windows computer worm discovered in July 2010 that targets industrial software and equipment. The worm initially spreads indiscriminately, but includes a highly specialized malware payload that is designed to target only Supervisory Control And Data Acquisition (SCADA) systems that are configured to control and monitor specific industrial processes. Some of Iran’s sensitive nuclear program computers were reportedly affected by it. A report issued by the Congressional Research Service (CRS) claims that Stuxnet could hit the U.S. as well. The so-called military-grade malware may have been an advanced threat, showing a number of flaws in many layers of security processes. © Copyright, ACIS Professional Center Company Limited, All rights reserved 38
  • 39. RSA Conference 2011 Security intelligence STUXNET – SCADA ATTACK 39
  • 40. RSA Conference 2011 Security intelligence © Copyright, ACIS Professional Center Company Limited, All rights reserved 40
  • 41. RSA Conference 2011 Security intelligence MOBILE DEVICES AND SMARTPHONES © Copyright, ACIS Professional Center Company Limited, All rights reserved 41
  • 42. RSA Conference 2011 Security intelligence Mobile Devices and Smartphones According to Gartner analysts, one in six people will have access to a high-tech mobile device by the end of 2010. In the last few years, we’ve witnessed a radical change in the way we access and use the Internet. The rapid upswing in sophistication of mobile technology resulted in a swift change in the way we provide mobile content and interact with it. However, this change brings with it a wealth of new problems for security. In our new, always-connected age, maintaining the integrity and privacy of networks, business data and personal information is increasingly important and difficult. © Copyright, ACIS Professional Center Company Limited, All rights reserved 42
  • 43. RSA Conference 2011 Security intelligence iPhone Hackers released the source code for potential iPhone spyware to the Internet (this also affected BlackBerry). iPhone smartphone users into joining a mobile botnet by spreading a seemingly innocuous weather application. The majority of security issues continue to focus on jailbroken devices, where the mobile security settings are unlocked to get more functionality. Users continue to jailbreak their devices in droves, tempted by the possibility of installing applications not approved by the company. When iPhones are plugged in to home or company computers or are set up on unapproved wireless networks to provide phone connectivity, threats are transferred from the iPhone to more vulnerable systems and networks. You can use a blend of policies and technologies to keep your network and machines safe. “Acceptable use” policies can attempt to control what users plug into company devices. © Copyright, ACIS Professional Center Company Limited, All rights reserved 43
  • 44. RSA Conference 2011 Security intelligence Android Google’s Android tried to keep pace with the iPhone in terms of functionality, and as devices diversify, the Android user base continues to grow. Google found and removed banking malware from the site when a wallpaper application gathered information on over 1 million Android users. Android phones represent a considerable exposure point, but again one that relies heavily on social engineering to lure users into installing rogue or malicious applications that give the bad guys access to their phones. © Copyright, ACIS Professional Center Company Limited, All rights reserved 44
  • 45. RSA Conference 2011 Security intelligence BlackBerry BlackBerry is still the device of choice in corporate environments. The BlackBerry security-built-in model is fairly successful so far, although potential spyware applications have been introduced. Most new developments—if anything—weaken that security model, with several nations pressuring RIM to slacken their policy of transporting all data through their central servers in strongly encrypted form, preventing government snooping on traffic. © Copyright, ACIS Professional Center Company Limited, All rights reserved 45
  • 46. RSA Conference 2011 Security intelligence ปลอดภ ัยแน่นอน !!!!
  • 47. RSA Conference 2011 Security intelligence Attacks Using Internet Marketing Techniques The search engine is our gateway to the web, and cybercrooks are skilled at manipulating search results from the engines such as Google, Bing and Yahoo! to lure victims to their malicious pages. These pages host security risks and browser exploits just waiting to infect users who are directed to these sites. Legitimate Search Engine Optimization (SEO) techniques are regularly used as marketing tools, but when SEO is abused by the bad guys, and supplemented by more devious methods, it’s known as Black Hat SEO. With Black Hat SEO attacks—known as “SEO poisoning”—search engine results are poisoned to drive user traffic to the rogue site. Google reported that up to 1.3% of their search results are infected. © Copyright, ACIS Professional Center Company Limited, All rights reserved 47
  • 48. RSA Conference 2011 Security intelligence SECURE SOFTWARE DEVELOPMENT © Copyright, ACIS Professional Center Company Limited, All rights reserved 48
  • 49. RSA Conference 2011 Security intelligence Trusted Software Security profile for trusted software in the context of software assurance includes the following: Protection against confidentiality, integrity, and availability threats Assurance that authentication cannot be circumvented Validation of authorization credentials before access to resources are granted Effective implementation of auditing functionality for business-critical and administrative transactions Management of Sessions, Exceptions, and Configuration parameters. © Copyright, ACIS Professional Center Company Limited, All rights reserved 49
  • 50. RSA Conference 2011 Security intelligence Software Security Profile Confidentiality Integrity Availability Authentication Authorization Auditing Session Exceptions Configuration Management Management Management © Copyright, ACIS Professional Center Company Limited, All rights reserved 50
  • 51. RSA Conference 2011 Security intelligence Threats that Impact Trust There are several threats to software that can impact one’s level of confidence or trust in it. These threat agents take advantage of vulnerabilities in software and may be human or non-human. © Copyright, ACIS Professional Center Company Limited, All rights reserved 51
  • 52. RSA Conference 2011 Security intelligence Software Threat Agents Categorization Software Threat Agents Non-Human Human User Error Hacker Malware (Accidental) (Intentional) © Copyright, ACIS Professional Center Company Limited, All rights reserved 52
  • 53. RSA Conference 2011 Security intelligence Types of Malware Malware Proliferative Stealthware Viruses & Spyware & Rootkits Trojans Worms Adware © Copyright, ACIS Professional Center Company Limited, All rights reserved 53
  • 54. RSA Conference 2011 Security intelligence Types of Malware (cont.) Proliferative Malware Proliferative malware includes malicious software programs that, upon exploiting weaknesses in networks, hosts, and software applications, aim at propagating their malicious operations to other networks, hosts, and software applications connected to the victim. Viruses and worms are the most common form of proliferative malware. Stealthware Stealthware includes malicious software programs such as spyware and adware, Trojans, and rootkits that remain hidden and operate often without the consent or knowledge of the victimized system or user. © Copyright, ACIS Professional Center Company Limited, All rights reserved 54
  • 55. RSA Conference 2011 Security intelligence Types of Embedded Code Backdoors Embedded Backdoors are code constructs embedded in Code code to allow programmers to bypass security mechanisms. Logic bombs Maintenance Hook/ Logic Bomb Like backdoors, logic bombs are also embedded Backdoor code constructs that remain dormant in code and are executed when specific events and/or time conditions are met. © Copyright, ACIS Professional Center Company Limited, All rights reserved 55
  • 56. RSA Conference 2011 Security intelligence Trusted Software Characteristics Functions as expected (reliable) Ensures security policy (resilient) Is fault-tolerant and robust (recoverable) Maintains confidentiality, integrity, and availability of software and the data it handles Prevents circumvention of authentication Handles sessions, configurations, and and access control checks exceptions securely Is deployed on host systems that are Ensures protection against proliferative adequately hardened malware (viruses and worms) Defends against malware that causes Ensures protection against harmful disclosure and destruction (spyware and malware that is purported as benign adware) (Trojans) Does not allow privilege escalation from Is deployed/released without any user land to kernel land (rootkits) maintenance hooks (backdoors) Ensures that there are no embedded Anti-tampering (obfuscation) and code security threats that can be authenticity (signed code) controls are conditionally triggered (logic bombs) present Tested, validated, and verified for software security by the organization or by an independent third party. © Copyright, ACIS Professional Center Company Limited, All rights reserved 56
  • 57. RSA Conference 2011 Security intelligence RSA Conference Highlight Application and Development Security Best Practices from the Front Lines: The Fight for Secure Software Software Security: The Big Picture Stop Exposing Yourself: Principles of Attack Surface Analysis and Reduction The Evolution of Software Security Assurance and its Relevance Today Innovation in Application Security Intelligence on the Intractable Problem of Insecure Software Agile Development, Security Fail Strategies for Security in Software QA Don't Teach Developers Security Planned vs. Agile for Security Software Development © Copyright, ACIS Professional Center Company Limited, All rights reserved 57
  • 58. RSA Conference 2011 Security intelligence RSA Conference Highlight (Cont.) Cloud Computing Security Put a SOC in it: Operationalizing Security in a SaaS Environment Securing Cloud Access – Beyond Enterprise IA&M Cloud Investigations and Forensics Hacking Exposed - Exploiting the Cloud and Virtual Machines © Copyright, ACIS Professional Center Company Limited, All rights reserved 58
  • 59. RSA Conference 2011 Security intelligence RSA Conference Highlight (Cont.) Social Networks Security Social Engineering in a Social Media World: Risk, Liability, and Control Blocking Social Media Is So 2010 - How to Embrace the Social Web Safely Is Social Networking Making Your Network Insecure? Proactively Tackling Social Networking and Data Security The Dark Side: Measuring and Analyzing Malicious Activity on Twitter Social Engineering in a Social Media World: Risk, Liability, and Control © Copyright, ACIS Professional Center Company Limited, All rights reserved 59
  • 60. RSA Conference 2011 Security intelligence RSA Conference Highlight (Cont.) Mobile Security Are Mobile Security Threats Real? A Panel of Mobile Experts Weigh In... Why You Can't Trust Your Mobile Network Trends in Mobile Authentication and Fraud Deterrence Mobile Security: What Perimeter? What Defense? The Big Picture Never Say "Mobile Cloud Leak“ Mobile Security the Ugly Truth There’s an App for That: What the Mobile App Explosion Means for Security © Copyright, ACIS Professional Center Company Limited, All rights reserved 60
  • 61. RSA Conference 2011 Security intelligence RSA Conference Highlight (Cont.) APT (Advanced Persistent Threats) Cyber War: How We Learned to Stop Worrying and Love the Cyber Bomb Advanced Persistent Threats: War Stories from the Front Lines Hypebusters: The Advanced Persistent Threat and You Bring Your Doctor Masks: Live Zeus Trojan Dissection © Copyright, ACIS Professional Center Company Limited, All rights reserved 61
  • 62. RSA Conference 2011 Security intelligence RSA Conference Highlight (Cont.) Technical Security Databases Under Attack - Securing Heterogeneous Database Infrastructures Seven Steps to Protecting Databases The Death of Signature-Based AV Cutting-Edge Hacking Techniques © Copyright, ACIS Professional Center Company Limited, All rights reserved 62
  • 63. RSA Conference 2011 Security intelligence Ref: http://www.rsaconference.com/ © Copyright, ACIS Professional Center Company Limited, All rights reserved 63
  • 64. RSA Conference 2011 Security intelligence Web : http://www.acisonline.net Email : prinya@acisonline.net Twitter : www.twitter.com/prinyaacis Facebook : www.facebook.com/prinyah