SlideShare une entreprise Scribd logo
1  sur  26
Kim Aarenstrup




        CYBER RISK MANAGEMENT

         Seen from a social network perspective
”Hi guys, it’s Peter.
I’m stranded in New Orleans and I’m really in trouble. I cannot do anything... because
my wallet was stolen by pickpocket.

Can you help arrange payment of my hotel, until tomorrow when
I can get in touch with my bank?”

----

SMS: What happened Peter, are you okay …. Tavshed..
Turned out that Peters Facebook accout was compromised..
Nepalese Hackers Publish 10,000 Stolen Facebook
Accounts
TeamSwaStika posted the Facebook account data on Pastebin.
October 20, 2011
Share   
                                                      
A group from Nepal calling itself TeamSwaStika has posted 10,000 stolen Facebook accounts on Pastebin.




News
1.5M stolen Facebook IDs up for sale
By Robert McMillan
April 22, 2010 08:15 PM ET
13 Comments

IDG News Service - A hacker named Kirllos has a rare deal for anyone who wants to spam, steal or scam on
Facebook: an unprecedented number of user accounts offered at rock-bottom prices.
Researchers at VeriSign's iDefense group recently spotted Kirllos selling Facebook user names and passwords
in an underground hacker forum, but what really caught their attention was the volume of credentials he
had for sale: 1.5 million accounts.
Facebook Data Stolen

'Socialbots' steal 250GB of user data in Facebook invasion
by Steven Musil November 1, 2011 11:27 PM PDT




Researchers' illustration of how their "socialbots" attack social networks.
Programs designed to resemble humans infiltrated Facebook recently and made off with 250 gigabytes of personal
information belonging to thousands of the social network's users, researchers said in an academic paper released today.

The eight-week study was designed to evaluate how vulnerable online social networks are to large-scale infiltrations by
programs designed to mimic real users, researchers from the University of British Columbia Vancouver said in the paper
(PDF), titled "The Socialbot Network: When bots socialize for fame and money."
Soldier Spy Eyes a Jackpot: Facebook credentials are
the most stolen
21 September, 2011


Trend Micro Incorporated made known its investigation of a
cybercriminal, a Russian national in his 20s who has been targeting
users in the US and Asia.

The attacker goes by the name ‘Soldier’ in the criminal underground.
He has been successful in increasing his network of infected users and
has also been known to buy traffic from other cybercriminals. Besides
using malware to steal money from the compromised accounts, user
security credentials were also stolen.

During the investigation, Trend Micro discovered that the
cybercriminal uses various criminal toolkits including SpyEye and
ZeuS, as well as exploit kits such as those for driving blackhat SEO to
propagate his SpyEye/ZeuS binaries.

Trend Micro Senior Threat Researcher Loucif Kharouni, who has been
part of the team investigating Soldier said, “Using the SpyEye criminal
toolkit, money mules and an accomplice believed to reside in
Hollywood, USA, Soldier stole over $3.2 million US dollars in 6
months starting January 2011, which equates to approximately $533
thousand dollars per month, or $17 thousand dollars a day! He has
really hit the jackpot.”
"Let The Hacking Begin" Declares Person
Who Hacked Zuckerberg's Facebook
Fan Page
           b
Facebook sees 600,000 compromised logins per day—0.06% of all logins
By Jon Brodkin | Published about a month ago
Facebook has released a statistic showing that fewer than one-tenth of one percent of
logins into the social network are compromised.

But since more than 1 billion Facebook logins occur each day, that could add up to
600,000 breaches every 24 hours.

Specifically, an infographic in an official Facebook post introducing new security tools
states that “Only .06 percent of over 1 billion logins per day are compromised.” Security
firm Sophos was intrigued enough by that statistic to post its own analysis.
http://www.youtube.com/watch?v=Q6crH8qmyZ8
Vi elsker Facebook, men…
sociale medier spreder spyware, virus, orme og trojanske heste som aldrig før.

Sidste år lavede XX Security en undersøgelse, der viste, at Facebook, Twitter og
YouTube udgør den største risiko indenfor angreb på personfølsomme
oplysninger via malware.

De tre sociale medier, der bærer størst malware risici:

Facebook: 71.6 %
Twitter: 51%
YouTube: 41.2 %

Eksperter estimerer, at der bliver frigivet malware på sociale
medier hvert 15. sekund med det formål at udnytte intetanende
brugere.
The mission of the
            IBM X-Force® research and
              development team is to:


   Research and evaluate threat and protection issues

   Deliver security protection for today’s security problems
   Develop new technology for tomorrow’s security challenges

   Educate the media and user communities
No. 1
        of 2.00
                0
(exploiting a.o. information
    from social medias)
ADIGMESKIFT
PAR
De 5 mantra

1.   Governance

2.   Perimeter beskyttelse

3.   Slutbruger udstyr

4.   Sårbarhedsniveau

5.   Incident respons
Governance

• Sikkerhedspolitikker
       • Overordnet
       • Sociale medier – filtre vs vejledning
       • Medarbejder overvågning?
•   Organisering – funktionsadskillelse
•   Identiteter & roller i systemerne
•   Kontrolmiljø / måleudstyr – ejerskab
•   Rapportering
•   Opfølgning – KPI styring
Firewalls

•   Beskyttelse af infrastrukturen
•   Hindrer direkte forbindelse
•   Advarer mod angreb
•   Afslører angriberen
•   Kan ikke stå alene – er kun ”dør åben eller dør
    lukket”..
Slutbruger udstyr

• Standardisering
• Beskyttelsessoftware (Anti-X)
  – Antivirus
  – Antispyware
  – Antimalware
• Soft-firewall
• Intrusion detection / prevention
Sårbarhedsniveau

• Vigtigste komponent – også den sværeste
• Mål på sårbarheder månedligt
• Fjern alle højrisikosårbarheder (server og pc
  vedligeholdelse!)
  – Højrisikosårbarheder tillader overtagelse af
    maskinen
• Mål på evnen/viljen til at fjerne sårbarheder
  – Beløn dem der gør et effektivt stykke arbejde
Respons

• Sørg for at have intrusion detection /
  prevention systemer installeret
• Udpeg en ansvarlig for at respondere på
  incidents/angreb/infektioner
• Sørg for at have relevante kompetencer
  tilstede (internt eller til at købe på timebasis)
• Etablér en incident repons proces eller plan
Verdens mest omfattende sikkerhedsprogram...
Verdens mest omfattende it forskning
          - heriblandt 6 Nobelpris modtagere

9 Security    9 Security     133          20,000+        4,000       7 Billion+
Operations    Research     Monitored   Devices under   MSS Clients    Events
 Centers       Centers     Countries     Contract      Worldwide      Per Day
Kim Aarenstrup
kimaarenstrup@dk.ibm.com
Tlf. 5163 8387

Contenu connexe

Tendances

Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareYoungjun Chang
 
Mobile application security
Mobile application securityMobile application security
Mobile application securityEY Belgium
 
Lookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisLookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisAndrey Apuhtin
 
Security News Bytes March 2020
Security News Bytes   March 2020Security News Bytes   March 2020
Security News Bytes March 2020Hiren Sadhwani
 
Vulnerability Prioritization and Prediction
Vulnerability Prioritization and PredictionVulnerability Prioritization and Prediction
Vulnerability Prioritization and PredictionJonathan Cran
 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threatsdnomura
 
David Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwareDavid Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwarePro Mrkt
 
0926182320 Sophos[1]
0926182320 Sophos[1]0926182320 Sophos[1]
0926182320 Sophos[1]guest043f27
 
Cyber Rangers S1 E1
Cyber Rangers S1 E1Cyber Rangers S1 E1
Cyber Rangers S1 E1JudyEvans8
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasuresNoushin Ahson
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
Null mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul TulaskarNull mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul Tulaskarnullowaspmumbai
 
Sahilmod 120315100301-phpapp01
Sahilmod 120315100301-phpapp01Sahilmod 120315100301-phpapp01
Sahilmod 120315100301-phpapp01Nelito Systems Ltd
 

Tendances (20)

Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshare
 
Mobile application security
Mobile application securityMobile application security
Mobile application security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Lookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisLookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysis
 
Maine Judicial Conference
Maine Judicial ConferenceMaine Judicial Conference
Maine Judicial Conference
 
pegasus spyware
pegasus spywarepegasus spyware
pegasus spyware
 
News Bytes
News BytesNews Bytes
News Bytes
 
Security News Bytes March 2020
Security News Bytes   March 2020Security News Bytes   March 2020
Security News Bytes March 2020
 
Vulnerability Prioritization and Prediction
Vulnerability Prioritization and PredictionVulnerability Prioritization and Prediction
Vulnerability Prioritization and Prediction
 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threats
 
David Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwareDavid Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer Malware
 
0926182320 Sophos[1]
0926182320 Sophos[1]0926182320 Sophos[1]
0926182320 Sophos[1]
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
 
Spy android malware - eScan
Spy android malware - eScanSpy android malware - eScan
Spy android malware - eScan
 
Cyber Rangers S1 E1
Cyber Rangers S1 E1Cyber Rangers S1 E1
Cyber Rangers S1 E1
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Null mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul TulaskarNull mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul Tulaskar
 
Cyber Risk
Cyber RiskCyber Risk
Cyber Risk
 
Sahilmod 120315100301-phpapp01
Sahilmod 120315100301-phpapp01Sahilmod 120315100301-phpapp01
Sahilmod 120315100301-phpapp01
 

Similaire à Ibm risk management-30min

Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat ReportKim Jensen
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys? SITA
 
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitPR Americas
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hackingijtsrd
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of securityGemy Chan
 
Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Tammy Clark
 
Insider threats
Insider threatsInsider threats
Insider threatsizoologic
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...HackIT Ukraine
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-bBbAOC
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011Felipe Prado
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkJack Shaffer
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeleySara-Jayne Terp
 
Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Sara-Jayne Terp
 
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsStop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsInvincea, Inc.
 

Similaire à Ibm risk management-30min (20)

Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
2013 Threat Report
2013 Threat Report2013 Threat Report
2013 Threat Report
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 
Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!
 
Insider threats
Insider threatsInsider threats
Insider threats
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley
 
Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...
 
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsStop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
 
File000145
File000145File000145
File000145
 

Dernier

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Dernier (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Ibm risk management-30min

  • 1. Kim Aarenstrup CYBER RISK MANAGEMENT Seen from a social network perspective
  • 2. ”Hi guys, it’s Peter. I’m stranded in New Orleans and I’m really in trouble. I cannot do anything... because my wallet was stolen by pickpocket. Can you help arrange payment of my hotel, until tomorrow when I can get in touch with my bank?” ---- SMS: What happened Peter, are you okay …. Tavshed.. Turned out that Peters Facebook accout was compromised..
  • 3. Nepalese Hackers Publish 10,000 Stolen Facebook Accounts TeamSwaStika posted the Facebook account data on Pastebin. October 20, 2011 Share                                                           A group from Nepal calling itself TeamSwaStika has posted 10,000 stolen Facebook accounts on Pastebin. News 1.5M stolen Facebook IDs up for sale By Robert McMillan April 22, 2010 08:15 PM ET 13 Comments IDG News Service - A hacker named Kirllos has a rare deal for anyone who wants to spam, steal or scam on Facebook: an unprecedented number of user accounts offered at rock-bottom prices. Researchers at VeriSign's iDefense group recently spotted Kirllos selling Facebook user names and passwords in an underground hacker forum, but what really caught their attention was the volume of credentials he had for sale: 1.5 million accounts.
  • 4. Facebook Data Stolen 'Socialbots' steal 250GB of user data in Facebook invasion by Steven Musil November 1, 2011 11:27 PM PDT Researchers' illustration of how their "socialbots" attack social networks. Programs designed to resemble humans infiltrated Facebook recently and made off with 250 gigabytes of personal information belonging to thousands of the social network's users, researchers said in an academic paper released today. The eight-week study was designed to evaluate how vulnerable online social networks are to large-scale infiltrations by programs designed to mimic real users, researchers from the University of British Columbia Vancouver said in the paper (PDF), titled "The Socialbot Network: When bots socialize for fame and money."
  • 5. Soldier Spy Eyes a Jackpot: Facebook credentials are the most stolen 21 September, 2011 Trend Micro Incorporated made known its investigation of a cybercriminal, a Russian national in his 20s who has been targeting users in the US and Asia. The attacker goes by the name ‘Soldier’ in the criminal underground. He has been successful in increasing his network of infected users and has also been known to buy traffic from other cybercriminals. Besides using malware to steal money from the compromised accounts, user security credentials were also stolen. During the investigation, Trend Micro discovered that the cybercriminal uses various criminal toolkits including SpyEye and ZeuS, as well as exploit kits such as those for driving blackhat SEO to propagate his SpyEye/ZeuS binaries. Trend Micro Senior Threat Researcher Loucif Kharouni, who has been part of the team investigating Soldier said, “Using the SpyEye criminal toolkit, money mules and an accomplice believed to reside in Hollywood, USA, Soldier stole over $3.2 million US dollars in 6 months starting January 2011, which equates to approximately $533 thousand dollars per month, or $17 thousand dollars a day! He has really hit the jackpot.”
  • 6. "Let The Hacking Begin" Declares Person Who Hacked Zuckerberg's Facebook Fan Page b
  • 7. Facebook sees 600,000 compromised logins per day—0.06% of all logins By Jon Brodkin | Published about a month ago Facebook has released a statistic showing that fewer than one-tenth of one percent of logins into the social network are compromised. But since more than 1 billion Facebook logins occur each day, that could add up to 600,000 breaches every 24 hours. Specifically, an infographic in an official Facebook post introducing new security tools states that “Only .06 percent of over 1 billion logins per day are compromised.” Security firm Sophos was intrigued enough by that statistic to post its own analysis.
  • 9. Vi elsker Facebook, men… sociale medier spreder spyware, virus, orme og trojanske heste som aldrig før. Sidste år lavede XX Security en undersøgelse, der viste, at Facebook, Twitter og YouTube udgør den største risiko indenfor angreb på personfølsomme oplysninger via malware. De tre sociale medier, der bærer størst malware risici: Facebook: 71.6 % Twitter: 51% YouTube: 41.2 % Eksperter estimerer, at der bliver frigivet malware på sociale medier hvert 15. sekund med det formål at udnytte intetanende brugere.
  • 10. The mission of the IBM X-Force® research and development team is to:  Research and evaluate threat and protection issues  Deliver security protection for today’s security problems  Develop new technology for tomorrow’s security challenges  Educate the media and user communities
  • 11. No. 1 of 2.00 0
  • 12.
  • 13.
  • 14.
  • 15. (exploiting a.o. information from social medias)
  • 16.
  • 18. De 5 mantra 1. Governance 2. Perimeter beskyttelse 3. Slutbruger udstyr 4. Sårbarhedsniveau 5. Incident respons
  • 19. Governance • Sikkerhedspolitikker • Overordnet • Sociale medier – filtre vs vejledning • Medarbejder overvågning? • Organisering – funktionsadskillelse • Identiteter & roller i systemerne • Kontrolmiljø / måleudstyr – ejerskab • Rapportering • Opfølgning – KPI styring
  • 20. Firewalls • Beskyttelse af infrastrukturen • Hindrer direkte forbindelse • Advarer mod angreb • Afslører angriberen • Kan ikke stå alene – er kun ”dør åben eller dør lukket”..
  • 21. Slutbruger udstyr • Standardisering • Beskyttelsessoftware (Anti-X) – Antivirus – Antispyware – Antimalware • Soft-firewall • Intrusion detection / prevention
  • 22. Sårbarhedsniveau • Vigtigste komponent – også den sværeste • Mål på sårbarheder månedligt • Fjern alle højrisikosårbarheder (server og pc vedligeholdelse!) – Højrisikosårbarheder tillader overtagelse af maskinen • Mål på evnen/viljen til at fjerne sårbarheder – Beløn dem der gør et effektivt stykke arbejde
  • 23. Respons • Sørg for at have intrusion detection / prevention systemer installeret • Udpeg en ansvarlig for at respondere på incidents/angreb/infektioner • Sørg for at have relevante kompetencer tilstede (internt eller til at købe på timebasis) • Etablér en incident repons proces eller plan
  • 24. Verdens mest omfattende sikkerhedsprogram...
  • 25. Verdens mest omfattende it forskning - heriblandt 6 Nobelpris modtagere 9 Security 9 Security 133 20,000+ 4,000 7 Billion+ Operations Research Monitored Devices under MSS Clients Events Centers Centers Countries Contract Worldwide Per Day

Notes de l'éditeur

  1. Angreb på infrastrukturen – altså på organisationens indre systemer og netværk, er ofte en meget kompleks størrelse at risikostyre. ISFs Standard of Good Practise har over 2.000 kontroller, for at løfte den samlede informationssikkerhed, og en meget stor del af disse ligger i den tekniske kontrol og monitorering.
  2. Alle angreb udnytter som et fællestræk enten kendte eller ukendte sårbarheder. så sårbarhedsniveauet skal konstant holdes nede og det er en meget vanskelig opgave. Ikke blot operativ systemem (f.eks. windows), men også de installerede programmer skal opdateres, På grafen ser i hvordan eksempelvis Flash bliver stadig mere sårbar – noget vi alle bruger når vi browser
  3. Men også den massive stigning i anvendelsen af smartphones og tablets er for alvor begyndt at blive et problem. Tidligere anså jeg og andre sikkerhedseksperter det for et potentielt problem, uden egentlige angreb. Det har ændret sig i 2011, hvor angrebene er begyndt at tikke ind. Der er ikke mange, men stigningsgraden er alarmerende. Mange husker måske sagen om Margrethe Vestagers mobil..?
  4. At det ikke er det rene retorik, kan disse virksomheder skrive under på. Her ser I en oversigt over typerne af angreb (farverne), tidspunkterne samt skadeseffekten af angrebet, illustreret ved størrelsen af boblerne. Der er ikke tid til at komme ind på de enkelte sager, men de er alle til at google sig til..
  5. Lad os lige kigge på angriberne. Der er et par forskellige scenarier. Man kan angribe bredt – alså større kredse af personer, virksomheder eller hele nationer, eller man kan angribe målrettet mod personer eller specifikke virksomheder. Til angrebene, kan man også anvende hyldevarer, eller man kan være mere sofistikeret – det afhænger helt af angriberen og formålet.
  6. Her er et eksempel på et såkaldt root-kit, kaldet Bleedinglife, som har et fint og brugervenligt interface. Her kan man, uden de store IT-evner, i ro og mag bestille sit angreb. Man kører angrebsdelen på et website eller i en reklamedel af et legitimt website, så alle der besøger sitet bliver ramt. Hvordan du vil betale – det er der vejledning om også...
  7. Samlet set er alt dette ved at blive noget af en hovedpine for de ansvarlige IT og Sikkerhedschefer. Der er simpelthen sket et paradigmeskift, Det er svært at følge med, der er mange parametre, og det er ikke core business for ret mange. Det kræver en veltilrettelagt investeringsplan på sikkerhedsområdet, hvor man skridt for skridt fjerner de værste risici først.
  8. Der er mange parametre der skal overvejes. Og der flere kompetente leverandører. IBM har i mange år haft verdens mest omfattende og professionelle sikkerhedsportefølje Se den her – sådan high level De grønne er rådgivning De orange er driftede services De blå er Cloud services
  9. IBM har 9 globale Sikkerhedsoperationscentre (de gule) Der opereres med følg solen 24/7 med verdens absolut førende sikkerhedseksperter (der jo ikke gider at have nattevagter) Vi betjener over 4.000 kunder og mere end 20.000 systemer. IBM har desuden 9 globale forskningscentre (de grønne), og med nogle er verdens førende forskere.. Og her taler vi altså om Nobelpristagere..