SlideShare a Scribd company logo
1 of 30
Nihil novi sub solem?
Security: Past, present and future...
       Jan Guldentops ( j@ba.be )
       BA N.V. ( http://www.ba.be )
My personal story
●   Jan Guldentops (° 1973)
    ●   Historian by Education, ICT consultant & researcher by
        vocation, security-guy by accident
    ●   Strong background in:
        –   Open Source / Linux ( since 1993 )
        –   Research ( BA Testlab )
        –   Security
●   Better Access / BA N.V. (°1996)
    ●   Small team of consultants
    ●   Macguyver, security and infrastructure projects
For the record:
I never considered myself a
     security-expert...
Belgium Online
●   1996 exposed security-problems in the first Belgian
    internet-bank
●   Amateurism
        –   browseable cgi-bin-dir
        –   clear-text, downloadable perlscripts
        –   mainframe userid/password connection
        –   (internal) documentation downloadable
        –   debug logging to a browseable directory
        –   ...
●   “experts”
    ●   Built by Netvision ( later Ubizen now Verizon )
In security there is often a big
difference between reality and
  theory, marketing and sales
What did I think in 1996 would be
         fixed by Now?
User Authentication
●   We still mostly use userid/passwords for
    authentication
    ●     Strong, tokenbased authentication ?
●   Often no centralised user / role management
    system
●   Bad passwords / usage
●   Clear-text storage of userid / passwords
●   ...
E-mail
●   Has become one of the most important forms of
    communication...
●   BUT
    ●   Nobody encrypts, signs his e-mail
    ●   Still use SMTP with all its problems
    ●   We haven't fundamentally solved the spam-problem
●   Often it is a miracle e-mail works at all
IPv6
●   1996 we already were running out of ip-
    adresses ( “Imminent death of the internet,
    episode 3097”)
●   Adaption of IPV6 is still pretty marginal
●   In Belgian one of the companies developing
    smart metering uses IPV4 adresses in the most
    recent design!
Encryption
●   We still don't encrypt everything !
    ●   Disks
    ●   Devices
    ●   Communications
●   And if we use encryption we often use it in a
    bad, insecure way.
●   Basic awareness of how encryption works is
    quite rare even with IT-professionals.
Secure communications
●   We still communicate clear text or use badly
    setup encryption!
    ●   No use of third party signed certificates in for
        instance web applications
    ●   Man-in-the-middle attacks are still easy to do
    ●   You can still sniff passwords !
Amateurism
●   Security is in a lot of projects still a side-show
●   Even for security orientated companies
●   Biggest example is the Diginotar case...
The official report :

The successful hack implies that the current network setup and / or procedures at DigiNotar
are not sufficiently secure to prevent this kind of attack.
The most critical servers contain malicious software that can normally be detected by
anti-virus software. The separation of critical components was not functioning or was not in
place. We have strong indications that the CA-servers, although physically very securely
placed in a tempest proof environment, were accessible over the network from the
management LAN.
The network has been severely breached. All CA servers were members of one Windows
domain, which made it possible to access them all using one obtained user/password
combination. The password was not very strong and could easily be brute-forced.
The software installed on the public web servers was outdated and not patched.
No antivirus protection was present on the investigated servers.
An intrusion prevention system is operational. It is not clear at the moment why it didn ‟t block
some of the outside web server attacks. No secure central network logging is in place.
Good system administration
●   Integrity checks
    ●   For instance host based IDS
●   Centralized tamper-proof logging
●   Decent password policies
●   Automated, regular security-updates
●   Etc.
Business Continuity
●   Correct risk assessment is still a problem
    ●   RTO
    ●   RPO
●   Testing and common sense are often forgotten
●   We still see major data loss problems on a
    regular basis
●   RT @JeremiadLee: There’s an assumption that
    when you host in the cloud, the datacenter is
    well above sea level.
Security awareness is incredibly low
Operating systems
●   Are still not secure
●   Not only a problem of the OS anymore but all
    the components in it ( java, flash, browsers,
    etc.)
●   Also a enduser problem :
    ●   e.g. SE Linux everybody turns it off
What has been fixed ?
Cyber police
●   In 1996 there hardly existed anything like a
    computer crime unit or a Digitale recherche
●   Now there is an infrastructure and professionals
    for this.
●   But often money is wasted by politicians
    ●   Digitale meldpunten
    ●   Etc.
Law itself
●   In 1996 there was no law allowing us to
    prosecute cybercriminals.
●   A whole framework has been put in place.
●   But the balance between privacy / civil rights
    and the war on cybercrime is always delicate.
    ●   Especially when it concerns copyright.
Best practices




   There now is a complete framework of best
practices, advisories, trainings, certifications, etc.
Other changes
M(o)ore
●   Moore's law is still working :
    ●   Exponential growth of the available bandwidth
    ●   Computing power
●   Globalisation
●   Doesn't make it easier
    ●   Encryption can be broken more quickly
    ●   Denial-of-service attacks get more lethal
Cloud / Cloud washing
●   One million different definitions :
    ●   Private / public / hybride
    ●   SAAS, PAAS, IAAS,
●   A lot is marketing blabla and Cloud washing
●   But it doesn't change the basic security
    paradigm:
    ●   CIA
●   Cloud doesn't change the rules !
ICT has lost control
●   IT / Security manager were always no-men
●   In the past they were the ones that are the alfa
    and omega of what happens in an enterprise /
    organisation
●   Is being challenged by :
    ●   Consumerism
    ●   BYOD
Mobilisation
●   Perimeter has completely disappeared
●   Enormous consequences we are still getting to
    grasp with :
    ●   Network
    ●   Authentication
    ●   Devices
    ●   Data Leakage
    ●   ...
Cyber criminals have organized
●   1996 organized crime was not really big in
    cyberspace
●   Hackers were mostly cyberpunks
●   Now organized crime going for the big money
    ●   Scamming
    ●   Trade and industrial secrets
    ●   Hacking
    ●   Blackmail...
Privacy Impact
●   We did the “Dave”-project for Febelfin
    ●   Idea is to create awareness to be careful what you post on the
        internet
    ●   http://www.youtube.com/watch?v=F7pYHN9iC9I
●   3 factors
    ●   What we give away ourself on social media, blog, etc.
    ●   Open, often governmental data
    ●   What large players (Google, Facebook) do with this data
●   One rule: everything you post on the net is public !
The future ?
●   There is only one security killer product :
    common sense, everything is marketing !
    ●   Be critical !
●   Standards and frameworks should not be
    paper tigers but practical tools.
●   Create awareness on every level from the
    enduser, over the IT-staff to highest
    management level.
●   If you go cloud, get legal and real guarantees
Questions ?



   Jan Guldentops
        j@ba.be
Twitter: JanGuldentops

More Related Content

Viewers also liked

長野市大岡地区 芦沼北菜園付き住宅が入居しやすくなります!
長野市大岡地区 芦沼北菜園付き住宅が入居しやすくなります!長野市大岡地区 芦沼北菜園付き住宅が入居しやすくなります!
長野市大岡地区 芦沼北菜園付き住宅が入居しやすくなります!長野市議会議員小泉一真
 
E-democracy: Comparison of opportunities in the Western Balkan countries
E-democracy: Comparison of opportunities in the Western Balkan countriesE-democracy: Comparison of opportunities in the Western Balkan countries
E-democracy: Comparison of opportunities in the Western Balkan countriesTomislav Korman
 
Croatian Government's 1st Six Months [Infographic]
Croatian Government's 1st Six Months [Infographic]Croatian Government's 1st Six Months [Infographic]
Croatian Government's 1st Six Months [Infographic]Tomislav Korman
 
Pedromsduarte cv+portfolio (full)
Pedromsduarte cv+portfolio (full)Pedromsduarte cv+portfolio (full)
Pedromsduarte cv+portfolio (full)Pedro Duarte
 
Our Services increase your business as a Brand name.
Our Services increase your business as a Brand name.Our Services increase your business as a Brand name.
Our Services increase your business as a Brand name.Aurelius Corporate Solutions
 
The introduction to_ipv6
The introduction to_ipv6The introduction to_ipv6
The introduction to_ipv6mnihsanmz
 
Wind Power Hr Brochure Web
Wind Power Hr Brochure   WebWind Power Hr Brochure   Web
Wind Power Hr Brochure Webgm330
 
2016 Frontier Group Executive Coaching E-Book Updated
2016 Frontier Group Executive Coaching E-Book  Updated2016 Frontier Group Executive Coaching E-Book  Updated
2016 Frontier Group Executive Coaching E-Book UpdatedPatrick Lynch
 
облачные сервисы. для образования, управления и личного пользования
облачные сервисы. для образования, управления и личного пользованияоблачные сервисы. для образования, управления и личного пользования
облачные сервисы. для образования, управления и личного пользованияFordzon Putilovez
 
Using the WEB to inspire WOM for your school
Using the WEB to inspire WOM for your schoolUsing the WEB to inspire WOM for your school
Using the WEB to inspire WOM for your schoolRick Newberry
 

Viewers also liked (17)

長野市大岡地区 芦沼北菜園付き住宅が入居しやすくなります!
長野市大岡地区 芦沼北菜園付き住宅が入居しやすくなります!長野市大岡地区 芦沼北菜園付き住宅が入居しやすくなります!
長野市大岡地区 芦沼北菜園付き住宅が入居しやすくなります!
 
Homes
HomesHomes
Homes
 
E-democracy: Comparison of opportunities in the Western Balkan countries
E-democracy: Comparison of opportunities in the Western Balkan countriesE-democracy: Comparison of opportunities in the Western Balkan countries
E-democracy: Comparison of opportunities in the Western Balkan countries
 
Unit i notes
Unit i notesUnit i notes
Unit i notes
 
Rigor2
Rigor2Rigor2
Rigor2
 
Программы здоровья ТРАДО
Программы здоровья ТРАДО Программы здоровья ТРАДО
Программы здоровья ТРАДО
 
Tabla de materiales y precios de colciencias (1)
Tabla de materiales y precios de colciencias (1)Tabla de materiales y precios de colciencias (1)
Tabla de materiales y precios de colciencias (1)
 
Croatian Government's 1st Six Months [Infographic]
Croatian Government's 1st Six Months [Infographic]Croatian Government's 1st Six Months [Infographic]
Croatian Government's 1st Six Months [Infographic]
 
Pedromsduarte cv+portfolio (full)
Pedromsduarte cv+portfolio (full)Pedromsduarte cv+portfolio (full)
Pedromsduarte cv+portfolio (full)
 
Our Services increase your business as a Brand name.
Our Services increase your business as a Brand name.Our Services increase your business as a Brand name.
Our Services increase your business as a Brand name.
 
The introduction to_ipv6
The introduction to_ipv6The introduction to_ipv6
The introduction to_ipv6
 
Wind Power Hr Brochure Web
Wind Power Hr Brochure   WebWind Power Hr Brochure   Web
Wind Power Hr Brochure Web
 
2016 Frontier Group Executive Coaching E-Book Updated
2016 Frontier Group Executive Coaching E-Book  Updated2016 Frontier Group Executive Coaching E-Book  Updated
2016 Frontier Group Executive Coaching E-Book Updated
 
облачные сервисы. для образования, управления и личного пользования
облачные сервисы. для образования, управления и личного пользованияоблачные сервисы. для образования, управления и личного пользования
облачные сервисы. для образования, управления и личного пользования
 
Using the WEB to inspire WOM for your school
Using the WEB to inspire WOM for your schoolUsing the WEB to inspire WOM for your school
Using the WEB to inspire WOM for your school
 
Comicus-TheGreatest-2016
Comicus-TheGreatest-2016Comicus-TheGreatest-2016
Comicus-TheGreatest-2016
 
04 03 wh_chris_walker
04 03 wh_chris_walker04 03 wh_chris_walker
04 03 wh_chris_walker
 

More from B.A.

GDPR one year in: Observations
GDPR one year in: ObservationsGDPR one year in: Observations
GDPR one year in: ObservationsB.A.
 
Multicloud - Nadenken over een polynimbus infrastructuur
Multicloud - Nadenken over een polynimbus infrastructuurMulticloud - Nadenken over een polynimbus infrastructuur
Multicloud - Nadenken over een polynimbus infrastructuurB.A.
 
Werken aan je (digitale) toekomst ?
Werken aan je (digitale) toekomst ? Werken aan je (digitale) toekomst ?
Werken aan je (digitale) toekomst ? B.A.
 
Verhalen uit de loopgraven - Workshop Security & privacy
Verhalen uit de loopgraven - Workshop Security & privacyVerhalen uit de loopgraven - Workshop Security & privacy
Verhalen uit de loopgraven - Workshop Security & privacyB.A.
 
BC, DR & SLA's
BC, DR & SLA'sBC, DR & SLA's
BC, DR & SLA'sB.A.
 
Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...B.A.
 
Cyberincidenten - Verhalen uit de loopgraven
Cyberincidenten - Verhalen uit de loopgravenCyberincidenten - Verhalen uit de loopgraven
Cyberincidenten - Verhalen uit de loopgravenB.A.
 
The good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturen
The good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturenThe good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturen
The good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturenB.A.
 
GDPR Revealed: EU privacy wetgeving in het juiste perspectief
GDPR Revealed: EU privacy wetgeving in het juiste perspectiefGDPR Revealed: EU privacy wetgeving in het juiste perspectief
GDPR Revealed: EU privacy wetgeving in het juiste perspectiefB.A.
 
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginners
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginnersBelgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginners
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginnersB.A.
 
Van brandweerman tot brandpreventieadviseur
Van brandweerman tot brandpreventieadviseurVan brandweerman tot brandpreventieadviseur
Van brandweerman tot brandpreventieadviseurB.A.
 
Business Continuity & Disaster Recovery introductie
Business Continuity & Disaster Recovery introductieBusiness Continuity & Disaster Recovery introductie
Business Continuity & Disaster Recovery introductieB.A.
 
Hit by a Cyberattack: lesson learned
 Hit by a Cyberattack: lesson learned Hit by a Cyberattack: lesson learned
Hit by a Cyberattack: lesson learnedB.A.
 
Presentatie Proactieve Monitoring ( BA Monitoring )
Presentatie Proactieve Monitoring ( BA Monitoring )Presentatie Proactieve Monitoring ( BA Monitoring )
Presentatie Proactieve Monitoring ( BA Monitoring )B.A.
 
Storage: trends, oplossingen, caveats
Storage: trends, oplossingen, caveatsStorage: trends, oplossingen, caveats
Storage: trends, oplossingen, caveatsB.A.
 
Random thoughts on security
Random thoughts on securityRandom thoughts on security
Random thoughts on securityB.A.
 
Safeshops ? Nadenken over veiligheidsaspecten van E-shops/Commerce
Safeshops ?  Nadenken over veiligheidsaspecten van E-shops/CommerceSafeshops ?  Nadenken over veiligheidsaspecten van E-shops/Commerce
Safeshops ? Nadenken over veiligheidsaspecten van E-shops/CommerceB.A.
 
Proactive monitoring tools or services - Open Source
Proactive monitoring tools or services - Open Source Proactive monitoring tools or services - Open Source
Proactive monitoring tools or services - Open Source B.A.
 
Zarafa Tour 2014: "Where Zarafa can make a difference"
Zarafa Tour 2014: "Where Zarafa can make a difference"Zarafa Tour 2014: "Where Zarafa can make a difference"
Zarafa Tour 2014: "Where Zarafa can make a difference"B.A.
 
INFORUM - VEILIGHEIDSPROBLEMEN VOOR BIBLIOTHEEK EN ARCHIEF IN HET DIGITALE TI...
INFORUM - VEILIGHEIDSPROBLEMEN VOOR BIBLIOTHEEK EN ARCHIEF IN HET DIGITALE TI...INFORUM - VEILIGHEIDSPROBLEMEN VOOR BIBLIOTHEEK EN ARCHIEF IN HET DIGITALE TI...
INFORUM - VEILIGHEIDSPROBLEMEN VOOR BIBLIOTHEEK EN ARCHIEF IN HET DIGITALE TI...B.A.
 

More from B.A. (20)

GDPR one year in: Observations
GDPR one year in: ObservationsGDPR one year in: Observations
GDPR one year in: Observations
 
Multicloud - Nadenken over een polynimbus infrastructuur
Multicloud - Nadenken over een polynimbus infrastructuurMulticloud - Nadenken over een polynimbus infrastructuur
Multicloud - Nadenken over een polynimbus infrastructuur
 
Werken aan je (digitale) toekomst ?
Werken aan je (digitale) toekomst ? Werken aan je (digitale) toekomst ?
Werken aan je (digitale) toekomst ?
 
Verhalen uit de loopgraven - Workshop Security & privacy
Verhalen uit de loopgraven - Workshop Security & privacyVerhalen uit de loopgraven - Workshop Security & privacy
Verhalen uit de loopgraven - Workshop Security & privacy
 
BC, DR & SLA's
BC, DR & SLA'sBC, DR & SLA's
BC, DR & SLA's
 
Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...
 
Cyberincidenten - Verhalen uit de loopgraven
Cyberincidenten - Verhalen uit de loopgravenCyberincidenten - Verhalen uit de loopgraven
Cyberincidenten - Verhalen uit de loopgraven
 
The good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturen
The good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturenThe good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturen
The good, the Bad & the Ugly : ICT-beveiliging en privacy bij lokale besturen
 
GDPR Revealed: EU privacy wetgeving in het juiste perspectief
GDPR Revealed: EU privacy wetgeving in het juiste perspectiefGDPR Revealed: EU privacy wetgeving in het juiste perspectief
GDPR Revealed: EU privacy wetgeving in het juiste perspectief
 
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginners
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginnersBelgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginners
Belgium 101 - Snelle cursus zakendoen in België voor (Nederlandse) beginners
 
Van brandweerman tot brandpreventieadviseur
Van brandweerman tot brandpreventieadviseurVan brandweerman tot brandpreventieadviseur
Van brandweerman tot brandpreventieadviseur
 
Business Continuity & Disaster Recovery introductie
Business Continuity & Disaster Recovery introductieBusiness Continuity & Disaster Recovery introductie
Business Continuity & Disaster Recovery introductie
 
Hit by a Cyberattack: lesson learned
 Hit by a Cyberattack: lesson learned Hit by a Cyberattack: lesson learned
Hit by a Cyberattack: lesson learned
 
Presentatie Proactieve Monitoring ( BA Monitoring )
Presentatie Proactieve Monitoring ( BA Monitoring )Presentatie Proactieve Monitoring ( BA Monitoring )
Presentatie Proactieve Monitoring ( BA Monitoring )
 
Storage: trends, oplossingen, caveats
Storage: trends, oplossingen, caveatsStorage: trends, oplossingen, caveats
Storage: trends, oplossingen, caveats
 
Random thoughts on security
Random thoughts on securityRandom thoughts on security
Random thoughts on security
 
Safeshops ? Nadenken over veiligheidsaspecten van E-shops/Commerce
Safeshops ?  Nadenken over veiligheidsaspecten van E-shops/CommerceSafeshops ?  Nadenken over veiligheidsaspecten van E-shops/Commerce
Safeshops ? Nadenken over veiligheidsaspecten van E-shops/Commerce
 
Proactive monitoring tools or services - Open Source
Proactive monitoring tools or services - Open Source Proactive monitoring tools or services - Open Source
Proactive monitoring tools or services - Open Source
 
Zarafa Tour 2014: "Where Zarafa can make a difference"
Zarafa Tour 2014: "Where Zarafa can make a difference"Zarafa Tour 2014: "Where Zarafa can make a difference"
Zarafa Tour 2014: "Where Zarafa can make a difference"
 
INFORUM - VEILIGHEIDSPROBLEMEN VOOR BIBLIOTHEEK EN ARCHIEF IN HET DIGITALE TI...
INFORUM - VEILIGHEIDSPROBLEMEN VOOR BIBLIOTHEEK EN ARCHIEF IN HET DIGITALE TI...INFORUM - VEILIGHEIDSPROBLEMEN VOOR BIBLIOTHEEK EN ARCHIEF IN HET DIGITALE TI...
INFORUM - VEILIGHEIDSPROBLEMEN VOOR BIBLIOTHEEK EN ARCHIEF IN HET DIGITALE TI...
 

Recently uploaded

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Recently uploaded (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Information Security past, present and future -  Nothing new under the sun ? (Infosecurity.nl 2012)

  • 1. Nihil novi sub solem? Security: Past, present and future... Jan Guldentops ( j@ba.be ) BA N.V. ( http://www.ba.be )
  • 2. My personal story ● Jan Guldentops (° 1973) ● Historian by Education, ICT consultant & researcher by vocation, security-guy by accident ● Strong background in: – Open Source / Linux ( since 1993 ) – Research ( BA Testlab ) – Security ● Better Access / BA N.V. (°1996) ● Small team of consultants ● Macguyver, security and infrastructure projects
  • 3. For the record: I never considered myself a security-expert...
  • 4. Belgium Online ● 1996 exposed security-problems in the first Belgian internet-bank ● Amateurism – browseable cgi-bin-dir – clear-text, downloadable perlscripts – mainframe userid/password connection – (internal) documentation downloadable – debug logging to a browseable directory – ... ● “experts” ● Built by Netvision ( later Ubizen now Verizon )
  • 5. In security there is often a big difference between reality and theory, marketing and sales
  • 6. What did I think in 1996 would be fixed by Now?
  • 7. User Authentication ● We still mostly use userid/passwords for authentication ● Strong, tokenbased authentication ? ● Often no centralised user / role management system ● Bad passwords / usage ● Clear-text storage of userid / passwords ● ...
  • 8. E-mail ● Has become one of the most important forms of communication... ● BUT ● Nobody encrypts, signs his e-mail ● Still use SMTP with all its problems ● We haven't fundamentally solved the spam-problem ● Often it is a miracle e-mail works at all
  • 9. IPv6 ● 1996 we already were running out of ip- adresses ( “Imminent death of the internet, episode 3097”) ● Adaption of IPV6 is still pretty marginal ● In Belgian one of the companies developing smart metering uses IPV4 adresses in the most recent design!
  • 10. Encryption ● We still don't encrypt everything ! ● Disks ● Devices ● Communications ● And if we use encryption we often use it in a bad, insecure way. ● Basic awareness of how encryption works is quite rare even with IT-professionals.
  • 11. Secure communications ● We still communicate clear text or use badly setup encryption! ● No use of third party signed certificates in for instance web applications ● Man-in-the-middle attacks are still easy to do ● You can still sniff passwords !
  • 12. Amateurism ● Security is in a lot of projects still a side-show ● Even for security orientated companies ● Biggest example is the Diginotar case...
  • 13. The official report : The successful hack implies that the current network setup and / or procedures at DigiNotar are not sufficiently secure to prevent this kind of attack. The most critical servers contain malicious software that can normally be detected by anti-virus software. The separation of critical components was not functioning or was not in place. We have strong indications that the CA-servers, although physically very securely placed in a tempest proof environment, were accessible over the network from the management LAN. The network has been severely breached. All CA servers were members of one Windows domain, which made it possible to access them all using one obtained user/password combination. The password was not very strong and could easily be brute-forced. The software installed on the public web servers was outdated and not patched. No antivirus protection was present on the investigated servers. An intrusion prevention system is operational. It is not clear at the moment why it didn ‟t block some of the outside web server attacks. No secure central network logging is in place.
  • 14. Good system administration ● Integrity checks ● For instance host based IDS ● Centralized tamper-proof logging ● Decent password policies ● Automated, regular security-updates ● Etc.
  • 15. Business Continuity ● Correct risk assessment is still a problem ● RTO ● RPO ● Testing and common sense are often forgotten ● We still see major data loss problems on a regular basis ● RT @JeremiadLee: There’s an assumption that when you host in the cloud, the datacenter is well above sea level.
  • 16. Security awareness is incredibly low
  • 17. Operating systems ● Are still not secure ● Not only a problem of the OS anymore but all the components in it ( java, flash, browsers, etc.) ● Also a enduser problem : ● e.g. SE Linux everybody turns it off
  • 18. What has been fixed ?
  • 19. Cyber police ● In 1996 there hardly existed anything like a computer crime unit or a Digitale recherche ● Now there is an infrastructure and professionals for this. ● But often money is wasted by politicians ● Digitale meldpunten ● Etc.
  • 20. Law itself ● In 1996 there was no law allowing us to prosecute cybercriminals. ● A whole framework has been put in place. ● But the balance between privacy / civil rights and the war on cybercrime is always delicate. ● Especially when it concerns copyright.
  • 21. Best practices There now is a complete framework of best practices, advisories, trainings, certifications, etc.
  • 23. M(o)ore ● Moore's law is still working : ● Exponential growth of the available bandwidth ● Computing power ● Globalisation ● Doesn't make it easier ● Encryption can be broken more quickly ● Denial-of-service attacks get more lethal
  • 24. Cloud / Cloud washing ● One million different definitions : ● Private / public / hybride ● SAAS, PAAS, IAAS, ● A lot is marketing blabla and Cloud washing ● But it doesn't change the basic security paradigm: ● CIA ● Cloud doesn't change the rules !
  • 25. ICT has lost control ● IT / Security manager were always no-men ● In the past they were the ones that are the alfa and omega of what happens in an enterprise / organisation ● Is being challenged by : ● Consumerism ● BYOD
  • 26. Mobilisation ● Perimeter has completely disappeared ● Enormous consequences we are still getting to grasp with : ● Network ● Authentication ● Devices ● Data Leakage ● ...
  • 27. Cyber criminals have organized ● 1996 organized crime was not really big in cyberspace ● Hackers were mostly cyberpunks ● Now organized crime going for the big money ● Scamming ● Trade and industrial secrets ● Hacking ● Blackmail...
  • 28. Privacy Impact ● We did the “Dave”-project for Febelfin ● Idea is to create awareness to be careful what you post on the internet ● http://www.youtube.com/watch?v=F7pYHN9iC9I ● 3 factors ● What we give away ourself on social media, blog, etc. ● Open, often governmental data ● What large players (Google, Facebook) do with this data ● One rule: everything you post on the net is public !
  • 29. The future ? ● There is only one security killer product : common sense, everything is marketing ! ● Be critical ! ● Standards and frameworks should not be paper tigers but practical tools. ● Create awareness on every level from the enduser, over the IT-staff to highest management level. ● If you go cloud, get legal and real guarantees
  • 30. Questions ? Jan Guldentops j@ba.be Twitter: JanGuldentops