Hacking, Privacy and Security in a Hyperconnected Society

20

Transcript of Hacking, Privacy and Security in a Hyperconnected Society

Page 1: Hacking, Privacy and Security in a Hyperconnected Society
Page 2: Hacking, Privacy and Security in a Hyperconnected Society

DescriptionData and technological advances are abounding at lightening speed. It is hard to stay on top of everything that is happening in these digitally disruptive times. But there has never been more important for companies and individuals to do so. Hacking, privacy, and security are on the minds of every corporation and private citizen. In this keynote, you will hear the latest trends in combating contrast threats to one’s security, how much more data can we possibly handle. The unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products allowing Internet connectivity.

Page 3: Hacking, Privacy and Security in a Hyperconnected Society

Perfect World Scenario

Page 4: Hacking, Privacy and Security in a Hyperconnected Society

Real World ScenarioWhat actually happens...

Page 5: Hacking, Privacy and Security in a Hyperconnected Society

Photo Share - Excited Giver

Page 6: Hacking, Privacy and Security in a Hyperconnected Society

Meta Data - Web Extraction

Page 7: Hacking, Privacy and Security in a Hyperconnected Society

Location - Google Maps: Street View

Page 8: Hacking, Privacy and Security in a Hyperconnected Society

Web Search on Phone Model

• SEARCH FOR VULNERABILITIES

• IDENTIFIED THREATS BASED ON DATE - CORRELATE WITH PHOTO TIME STAMP

• SEARCH TO SEE PRELOADED SOFTWARE CONFIGURATION

Page 9: Hacking, Privacy and Security in a Hyperconnected Society

[3] TIME STAMP

• LOCATION PATTERN ANALYSIS [3] [4]

• SIMPLE LATITUDE & LONGITUDE [4]

• SEARCH FOR VULNERABILITIES [2]

• IDENTIFIED THREATS BASED ON DATE - CORRELATE WITH PHOTO TIME STAMP [3]

• SEARCH TO SEE PRELOADED SOFTWARE CONFIGURATION [2] [3]

• ADDITIONAL FIELDS: CAPTION, DESCRIPTION

Page 10: Hacking, Privacy and Security in a Hyperconnected Society

Maltego - Example

Page 11: Hacking, Privacy and Security in a Hyperconnected Society

Maltego - Geolocation From and To Tweet [Circular Area]

Page 12: Hacking, Privacy and Security in a Hyperconnected Society

OWASP Top 10 Vulnerabilities - 2006

Page 13: Hacking, Privacy and Security in a Hyperconnected Society

Digital Footprint

Page 14: Hacking, Privacy and Security in a Hyperconnected Society

Maltego - Example

Page 15: Hacking, Privacy and Security in a Hyperconnected Society

Maletgo - Example Cont.

Page 16: Hacking, Privacy and Security in a Hyperconnected Society

Maletgo - Example Cont.

Page 17: Hacking, Privacy and Security in a Hyperconnected Society

Maletgo - Example Cont.

Page 18: Hacking, Privacy and Security in a Hyperconnected Society

Intelligence Applications

Page 19: Hacking, Privacy and Security in a Hyperconnected Society

RecommendationsMobile Device

• Anti Virus

• Trusted Applications

• Device Hardening

• Clicking on Unknown Links in Web Broswer

• Check Application Authorizations

Embedded Device

• Scan for Cyber Security Posture

• Limit the Data Shared on Device

Social Media

• Remove GPS Tag

• Remove Metadata

• Limit Posting Revealing Information

• Control Digital Footprint

Bluetooth 2.0 > Versions

• Insecure Versions

• Limit Use

• Limit Pairing

**Even though SSP improves the security of Bluetooth pairing, it has been shownthat MITM attacks against Bluetooth 2.1+EDR, 3.0+HS, and 4.0 devices are possibleby forcing victim devices to use the Just Works association model**

Page 20: Hacking, Privacy and Security in a Hyperconnected Society

Any QuestionsContact at [email protected]