Cyber Security - Enrico Branca

18
Cyber Security

Transcript of Cyber Security - Enrico Branca

Cyber Security

2

“the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or

misdirection of the services they provide”

Computer security, also known as cybersecurity or IT security, is:

Cyber Security

Gasser, Morrie (1988). Building a Secure Computer System

3

4

5

6

Attack Vectors

Web

POS Pictures

Computer Vehicles

Documents

Mobile

IoT

What we will talk about..

7

…the vents started blasting cold air at the maximum setting …. ..Then the windshield wipers turned on and wiper fluid blurred the glass..

..Immediately my accelerator stopped working… ..I could see an 18-wheeler approaching in my rearview mirror..

…The most disturbing maneuver came when they

cut the Jeep’s brakes, leaving me frantically pumping the pedal as the 2-ton SUV slid

uncontrollably into a ditch….

8

.… pulled out a small black device …. then reached down, opened the door and climbed into my car….

Toronto Police Service Broadcast time: 15:09 Thursday, April 9, 2015 … Investigators believe that the suspect(s) may have access to electronic devices which can compromise an SUV's security system….

9

10

11

12

13

14

15

16

17

Thank You!!

!

Enrico Branca!Security [email protected][email protected]!!

18

http://www.tripwire.com/state-of-security/wp-content/uploads/Tripwire_2015_Verizon_Attack_Vectors_infographic.png http://cdn.swcdn.net/creative/v3.2/infographics/solarwinds_continuous_monitoring_cyber_infographic.png https://mywebsitesecurity.files.wordpress.com/2015/02/sitelock-howtobeatawebhacker-infographic-v6_s.jpg http://www.fico.com/en/blogs/wp-content/uploads/2015/03/Cybersecurity-gap.png http://maxcdn.jaypeeonline.net/wp-content/uploads/2013/10/elegant-free-flat-icons.jpg http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ http://makezine.com/2015/08/14/block-car-door-relay-hack-faraday-cage/ http://securityaffairs.co/wordpress/41253/cyber-crime/mitm-attacks-emv-cards.html http://www.wired.com/2015/08/hackers-tiny-device-unlocks-cars-opens-garages/ http://hothardware.com/ContentImages/NewsItem/35459/content/WD_MyPassport_Ultra.jpg http://www.theregister.co.uk/2015/10/20/western_digital_bad_hard_drive_encryption/ http://www.intego.com/mac-security-blog/ios-9-can-now-finally-be-remotely-jailbroken-but-you-cant-do-it/ http://ios8pangu.com/ http://www.digitaltrends.com/photography/could-you-fall-victim-to-crime-simply-by-geotagging-location-info-to-your-photos/ http://www.keloland.com/newsdetail.cfm/metadata-shows-gps-location-on-photos-posted-online/?id=155750 http://petapixel.com/2012/12/03/exif-data-may-have-revealed-location-of-fugitive-billionaire-john-mcafee/ http://www.nbcchicago.com/news/tech/geotagging-facebook-twitter--137537933.html http://www.imore.com/how-to-turn-off-photo-geotagging-protect-privacy-iphone-ipad http://fossbytes.com/what-is-this-feature-named-wifi-sense-in-windows-10/ http://thehackernews.com/2015/07/windows-10-wi-fi-sense-explained-actual.html http://www.rockpapershotgun.com/2015/07/28/windows-10-wifi-sharing/ http://www.zdnet.com/article/lenovo-rootkit-ensured-its-software-could-not-be-deleted/ http://thehackernews.com/2015/08/lenovo-rootkit-malware.html http://securityaffairs.co/wordpress/40440/digital-id/lenovo-tracking-application-3.html http://www.extremetech.com/computing/218437-dell-laptops-may-have-a-lenovo-superfish-size-security-problem http://thenextweb.com/insider/2015/08/12/lenovo-used-a-hidden-windows-feature-to-ensure-its-software-could-not-be-deleted/ http://new.office-watch.com/2015/image-privacy-breach-in-microsoft-office/ https://books.google.ca/books?isbn=1604422564 - John M. Barkett - 2009 - The Ethics of E-Discovery - Page 101 https://www.maketecheasier.com/remove-windows-8-metadata/ http://what-when-how.com/windows-forensic-analysis/file-analysis-windows-forensic-analysis-part-6/ http://www.casi.org.uk/discuss/2003/msg00457.html http://www.ummah.com/forum/archive/index.php/t-27608.html?s=a85a020c240a60bdf823f4a716be882d http://www.nytimes.com/2015/04/16/style/keeping-your-car-safe-from-electronic-thieves.html?_r=0 https://forums.finalgear.com/automotive-news/all-your-cars-are-belong-to-us-56432/page-4/ http://hackaday.com/2013/06/05/ask-hackaday-how-are-these-thieves-exploiting-automotive-keyless-entry/ http://www.itgovernanceusa.com/blog/wp-content/uploads/2015/09/AGCS_Cyber_Crime_full.jpg