SlideShare a Scribd company logo
1 of 17
SECURING MOBILE
POPULATION
Vladimir Jirasek
About.me/jirasek
2nd Dec 2011
About me
• Security professional (11 years), current work at WorldPay
  as Head of Security Solutions
• Director, CSA UK & Ireland
• I love reading books: thrillers (Clive Cusler) and business
  management (Jo Owen)
• Apple fan
I will cover three topics today
• Consumerisation opportunities and challenges
• Threats related to mobile devices
• Smart devices security architecture
• How to fit mobile devices to company security architecture
Consumerisation               Hmm, might
                              be tricky but
           I want to use      here is what
          one device for      we can do….
          both personal
          and work stuff




           Say yes and give clear
           policies!

           Access to data and systems
           based on risk

           Agree forensic policy and
           investigations rules for
           personal devices.
How to manage access – not binary
Access decisions based on accuracy of following:
• Identity – Google apps ID vs. Active directory ID, one
  factor auth vs. two factor auth
• Role – FTE, contractor, cleaner, executive
• Device – trusted, non-trusted
• Location – inside fw or outside, US vs. China, IPv6 vs
  IPv4, changes in locations in time
• Time – inside working hours or outside,
• Data/Application – business impact, approved apps vs
  consumer apps.
Classifications of systems
                                M anaged                                U nmanaged
                                Domain joined or mobile                 Non-domain joined
                                managed
                                T r usted syst ems                      I solated syst ems
                                ·   Domain joi ned devices                       ·   Non domain joined but
                                ·   M anaged mobile devices                          passed t he compliance
Compliant (TPM , Bit locker ,
                                ·   Confi gur at ion assessed and                    checks
confi g and pat ch)
                                    compliant                           St r at egy: Offer managed pat h t o
                                St r at egy: K eep                      incr ease number of apps and dat a
                                                                        access
                                Vulner able syst ems                    Rogue systems
                                    ·    Domain joi ned devices                      ·       Unknown devices
                                    ·    M anaged mobile devices                     ·       Not compliant or
N on-Compliant
                                    ·    Non-compliant st at us                              cannot assess
                                St r at egy: M igr at e t o compliant                        compliance
                                                                        St r at egy: Block
Evolution of connected world
                                                                                              Source: McAfee

                    100B


                     10B
Number of Devices




                      1B
                                                                                         Mobile, Cloud…

                    100M                                                   Connected
                                                                              PC

                    10M                                            PC


                                                 Minicomputer
                     1M

                                  Mainframe

                           1960               1970          1980        1990           2000          2010
Revolution in mobile device capabilities
                                                                      Source: McAfee

        • Microsoft Windows Vista

        • Blackberry & Palm
                                                                  • iOS App Store
                                                                  • iOS ActiveSync email
                              Apple iPhone launches               • Gartner approves iPhone
                               • Gartner says never                 for the enterprise
                                 ready for enterprise             • Android G1




  Q1     Q2         Q3         Q4          Q1           Q2   Q3           Q4         Q1
 2007                                     2008                                      2009
And its acceleration

                                                       • iPad2                            RIM
 • Microsoft Windows 7                                                                    Playbook
                                          • Android Honeycomb
                                                with Encryption
• iOS 3GS w/ encryption
                                iPad                                                          • iCloud
                                launches                                                      • iPhone 4s
                                                           Android
                                                           tablets


                                                       • Windows Phone 7
                                                       • webOS
                                                       • Next gen Blackberry




      Q1      Q2      Q3   Q4       Q1        Q2      Q3       Q4     Q1       Q2   Q3   Q4     Q1
     2009                          2010                              2011                      2012
Mobile devices threats
• Web-based and network-based attacks
• Malware
• Social engineering attacks
• Resource and service availability abuse.
• Malicious and unintentional data loss.
• Attacks on the integrity of the device’s data.
Mobile platforms – security architecture
• Traditional Access Control: Traditional access
    control seeks to protect devices using techniques
    such as pass- words and idle-time screen locking.
•   Application Provenance: Provenance is an
    approach where each application is stamped with
    the identity of its author and then made tamper
    resistant (using a digital signature).
•   Encryption: Encryption seeks to conceal data at
    rest on the device to address device loss or theft.
•   Isolation: Isolation techniques attempt to limit an
    application’s ability to access the sensitive data or
    systems on a device.
•   Permissions-based access control: Permission-
    based access control grants a set of permissions to
    each application and then limits each application to    Source: Symantec
    accessing device data/systems that are within the
    scope of those permissions, blocking the
    applications if they attempt to perform actions that
    exceed these permissions.
iOS
• The iOS is based on Mac OS X
• The number of vulnerabilities and attacks on iOS is very
  small and usually occurs in 3rd party applications installed
  on iOS
• The OS offers very good security, data
  protection, encryption, access control
• Lack of anonymity in application developer community. It
  is far more risky to develop malware for iOS.
• Certified for Microsoft ActiveSync program
Android
Android is based on Linux and uses the best security
features Linux can offer, such as robust access control and
application isolation. However, the main security problem
with Android is that:
• It is very easy to jailbreak
• Users can install any application from any Marketplace
• Confusing application access permission confirmations
• Many devices do not implement strong device encryption
• Google does not control final deployment – vendors and
  operators may add “features”
Updating of old devices is an an issue for
Android…




                              By Michael DeGusta
                              TheUnderstatement.com
Windows Phone (Mango release)
• Robust security model
• Mandatory access control – 4 privilege chambers– similar
    to Windows 7 (trusted, elevated, standard, least
    privileged)
•   Application isolation
•   Application code-signing
•   Data isolation
•   Controlled developer environment
•   Lack of enterprise VPN features
•   Immature certificate and key support
•   Capability notifications and enforcement
Correct approach to mobile security
• Secure Device, Applications and Data
• Use risk based approach for access control decisions
• Less emphasis on whether device is procured by company or
  user
• Extend DLP to mobile
• Extend security event and forensic services
• Monitor installed apps, jail-breaking and configuration
  compliance




     Source: McAfee
References
•   “A Window Into
Mobile Device Security”, Carey Nachenberg, Symantec, 2011
•   McAfee EMM Site
•   Mobile Security: Looking Back, Looking Forward, David Goldschlag, McAfee, 2011
•   Microsoft ActiveSync certification program, http://technet.microsoft.com/en-us/exchange/gg187968.aspx
•   Microsoft Consumerization Site, http://www.microsoft.com/enterprise/viewpoints/consumerization/default.aspx
•   “CISO Perspective: Consumerization of IT” @ RSA Europe 2011, Bret Arsenault, CISO Microsoft,
•   “Magic Quadrant for Mobile Device Management Software”, Document ID G00211101, Gartner, 2011
•   “Your Apps Are Watching You,” The Wall Street Journal, December 17, 2010
•   Windows Phone 7.5 (Mango) Security model explained, http://j4ni.com/blog/?p=59, Jani Nevalainen
•   Windows Phone Platform
    Security, http://www.developer.nokia.com/Community/Wiki/Windows_Phone_Platform_Security, Nokia
•   Windows Phone Security page, http://msdn.microsoft.com/en-us/library/ff402533(v=vs.92).aspx, Microsoft
•   VMware Mobile virtual platform, http://www.vmware.com/products/mobile/overview.html
•   Revolution or Evolution: Information Security
    2020, http://www.pwc.co.uk/eng/publications/revolution_or_evolution_information_security_2020.html, PWC, 2010
•   Consumerisation and Corporate IT
    Security, http://www.schneier.com/blog/archives/2010/09/consumerization.html, Bruce Schneier, September 2010
•   Android Orphans: Visualizing a Sad History of Support, http://theunderstatement.com/post/11982112928/android-
    orphans-visualizing-a-sad-history-of-support, Michael Degusta, October 2011

More Related Content

What's hot

Designing Secure Mobile Apps
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile AppsDenim Group
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of ThingsRishabh Sharma
 
Mobile World Congress 2011 Overview
Mobile World Congress 2011 OverviewMobile World Congress 2011 Overview
Mobile World Congress 2011 OverviewBhavya Siddappa
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)SecPod Technologies
 
The Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT SecurityThe Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT SecurityDr. Mohamed Torky
 
The shift from social network security to the social iot security
The shift from social network security to the social iot securityThe shift from social network security to the social iot security
The shift from social network security to the social iot securityAboul Ella Hassanien
 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsJay Nagar
 
IBM Mobilizing Minds With Ib Ms Mobility Strategy 2010
IBM Mobilizing Minds With Ib Ms Mobility Strategy 2010IBM Mobilizing Minds With Ib Ms Mobility Strategy 2010
IBM Mobilizing Minds With Ib Ms Mobility Strategy 2010Friedel Jonker
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
“Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh...
“Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh...“Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh...
“Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh...Andrey Belenko
 
Merchant360 SP4G(tm) NFC Coverage Walls Counters and Floors
Merchant360 SP4G(tm) NFC Coverage Walls Counters and FloorsMerchant360 SP4G(tm) NFC Coverage Walls Counters and Floors
Merchant360 SP4G(tm) NFC Coverage Walls Counters and FloorsMerchant360, Inc.
 
Nokia NFC Presentation
Nokia NFC PresentationNokia NFC Presentation
Nokia NFC Presentationmomobeijing
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTBarcoding, Inc.
 
What Exactly is Internet of Things? - IoT Video Series - Part -1
What Exactly is Internet of Things? - IoT Video Series - Part -1 What Exactly is Internet of Things? - IoT Video Series - Part -1
What Exactly is Internet of Things? - IoT Video Series - Part -1 Dr. Mazlan Abbas
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)Kabilen Sornum
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issuesrjain51
 
Cidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 FullCidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 Fulllfilliat
 
Technologies That Enable Internet of Things - IoT Video Series - Part 2
Technologies That Enable Internet of Things - IoT Video Series - Part 2Technologies That Enable Internet of Things - IoT Video Series - Part 2
Technologies That Enable Internet of Things - IoT Video Series - Part 2Dr. Mazlan Abbas
 

What's hot (20)

Designing Secure Mobile Apps
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile Apps
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of Things
 
Mobile World Congress 2011 Overview
Mobile World Congress 2011 OverviewMobile World Congress 2011 Overview
Mobile World Congress 2011 Overview
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
 
The Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT SecurityThe Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT Security
 
The shift from social network security to the social iot security
The shift from social network security to the social iot securityThe shift from social network security to the social iot security
The shift from social network security to the social iot security
 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security Controls
 
IBM Mobilizing Minds With Ib Ms Mobility Strategy 2010
IBM Mobilizing Minds With Ib Ms Mobility Strategy 2010IBM Mobilizing Minds With Ib Ms Mobility Strategy 2010
IBM Mobilizing Minds With Ib Ms Mobility Strategy 2010
 
Nokia 700 & Nokia 701 - Try something new!
Nokia 700 & Nokia 701 - Try something new!Nokia 700 & Nokia 701 - Try something new!
Nokia 700 & Nokia 701 - Try something new!
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
“Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh...
“Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh...“Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh...
“Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh...
 
Merchant360 SP4G(tm) NFC Coverage Walls Counters and Floors
Merchant360 SP4G(tm) NFC Coverage Walls Counters and FloorsMerchant360 SP4G(tm) NFC Coverage Walls Counters and Floors
Merchant360 SP4G(tm) NFC Coverage Walls Counters and Floors
 
Nokia NFC Presentation
Nokia NFC PresentationNokia NFC Presentation
Nokia NFC Presentation
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
 
What Exactly is Internet of Things? - IoT Video Series - Part -1
What Exactly is Internet of Things? - IoT Video Series - Part -1 What Exactly is Internet of Things? - IoT Video Series - Part -1
What Exactly is Internet of Things? - IoT Video Series - Part -1
 
Mobility Strategy - IBM
Mobility Strategy - IBMMobility Strategy - IBM
Mobility Strategy - IBM
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
Cidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 FullCidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 Full
 
Technologies That Enable Internet of Things - IoT Video Series - Part 2
Technologies That Enable Internet of Things - IoT Video Series - Part 2Technologies That Enable Internet of Things - IoT Video Series - Part 2
Technologies That Enable Internet of Things - IoT Video Series - Part 2
 

Viewers also liked

OSGi Community Event 2010 - App Store for the Connected Home Services
OSGi Community Event 2010 - App Store for the Connected Home ServicesOSGi Community Event 2010 - App Store for the Connected Home Services
OSGi Community Event 2010 - App Store for the Connected Home Servicesmfrancis
 
Pitt-09-08-08.pdf
Pitt-09-08-08.pdfPitt-09-08-08.pdf
Pitt-09-08-08.pdfmelias11
 
Stimulus Bill & HIE, RHIO Market
Stimulus Bill & HIE, RHIO MarketStimulus Bill & HIE, RHIO Market
Stimulus Bill & HIE, RHIO MarketJohn Moore
 
Healthy Islands Core Architectural Models 2012 Aug 18
Healthy Islands   Core Architectural Models   2012 Aug 18Healthy Islands   Core Architectural Models   2012 Aug 18
Healthy Islands Core Architectural Models 2012 Aug 18melias11
 
HIE base.Research.101
HIE base.Research.101HIE base.Research.101
HIE base.Research.101Rex Osborn
 
Understanding your learning styles 3
Understanding your learning styles 3Understanding your learning styles 3
Understanding your learning styles 3Lisa Stack
 

Viewers also liked (8)

OSGi Community Event 2010 - App Store for the Connected Home Services
OSGi Community Event 2010 - App Store for the Connected Home ServicesOSGi Community Event 2010 - App Store for the Connected Home Services
OSGi Community Event 2010 - App Store for the Connected Home Services
 
Pitt-09-08-08.pdf
Pitt-09-08-08.pdfPitt-09-08-08.pdf
Pitt-09-08-08.pdf
 
Stimulus Bill & HIE, RHIO Market
Stimulus Bill & HIE, RHIO MarketStimulus Bill & HIE, RHIO Market
Stimulus Bill & HIE, RHIO Market
 
Week12 final
Week12 finalWeek12 final
Week12 final
 
Cantones de Jutiapa, Guatemala
Cantones de Jutiapa, GuatemalaCantones de Jutiapa, Guatemala
Cantones de Jutiapa, Guatemala
 
Healthy Islands Core Architectural Models 2012 Aug 18
Healthy Islands   Core Architectural Models   2012 Aug 18Healthy Islands   Core Architectural Models   2012 Aug 18
Healthy Islands Core Architectural Models 2012 Aug 18
 
HIE base.Research.101
HIE base.Research.101HIE base.Research.101
HIE base.Research.101
 
Understanding your learning styles 3
Understanding your learning styles 3Understanding your learning styles 3
Understanding your learning styles 3
 

Similar to Securing mobile population for White Hats

C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
Android : Evolution or Revolution
Android : Evolution or RevolutionAndroid : Evolution or Revolution
Android : Evolution or RevolutionSanjiv Malik
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013Petr Dvorak
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile DeviceTyler Shields
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devicesjraja01
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Andris Soroka
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Keynote | Middleware Everywhere - Ready for Mobile and Cloud | Dr. Mark Little
Keynote | Middleware Everywhere - Ready for Mobile and Cloud | Dr. Mark LittleKeynote | Middleware Everywhere - Ready for Mobile and Cloud | Dr. Mark Little
Keynote | Middleware Everywhere - Ready for Mobile and Cloud | Dr. Mark LittleJAX London
 
WinWire webinar: Converting iPad apps to Windows Store apps
WinWire webinar: Converting iPad apps to Windows Store appsWinWire webinar: Converting iPad apps to Windows Store apps
WinWire webinar: Converting iPad apps to Windows Store appsWinWire Technologies Inc
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-pptWSO2
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Mikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivityMikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivityMicrosoft Windows Embedded
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 

Similar to Securing mobile population for White Hats (20)

C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Android : Evolution or Revolution
Android : Evolution or RevolutionAndroid : Evolution or Revolution
Android : Evolution or Revolution
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile Device
 
iScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task ForceiScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task Force
 
Mobile – Adoption and Adaption in 2012
Mobile – Adoption and Adaption in 2012Mobile – Adoption and Adaption in 2012
Mobile – Adoption and Adaption in 2012
 
NBIF mobile apps
 NBIF mobile apps NBIF mobile apps
NBIF mobile apps
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Keynote | Middleware Everywhere - Ready for Mobile and Cloud | Dr. Mark Little
Keynote | Middleware Everywhere - Ready for Mobile and Cloud | Dr. Mark LittleKeynote | Middleware Everywhere - Ready for Mobile and Cloud | Dr. Mark Little
Keynote | Middleware Everywhere - Ready for Mobile and Cloud | Dr. Mark Little
 
WinWire webinar: Converting iPad apps to Windows Store apps
WinWire webinar: Converting iPad apps to Windows Store appsWinWire webinar: Converting iPad apps to Windows Store apps
WinWire webinar: Converting iPad apps to Windows Store apps
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Mikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivityMikehall FutureWorld 2010 - enabling connectivity
Mikehall FutureWorld 2010 - enabling connectivity
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 

More from Vladimir Jirasek

Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanningVladimir Jirasek
 
Vulnerability Management @ DevSecOps London Gathering
Vulnerability Management @ DevSecOps London GatheringVulnerability Management @ DevSecOps London Gathering
Vulnerability Management @ DevSecOps London GatheringVladimir Jirasek
 
C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud securityVladimir Jirasek
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Vladimir Jirasek
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architectureVladimir Jirasek
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantVladimir Jirasek
 
Security architecture for LSE 2009
Security architecture for LSE 2009Security architecture for LSE 2009
Security architecture for LSE 2009Vladimir Jirasek
 
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksMobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksVladimir Jirasek
 
Information Risk Security model and metrics
Information Risk Security model and metricsInformation Risk Security model and metrics
Information Risk Security model and metricsVladimir Jirasek
 
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processesIntegrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processesVladimir Jirasek
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architectureVladimir Jirasek
 
Meaningfull security metrics
Meaningfull security metricsMeaningfull security metrics
Meaningfull security metricsVladimir Jirasek
 
CAMM presentation for Cyber Security Gas and Oil june 2011
CAMM presentation for Cyber Security Gas and Oil june 2011CAMM presentation for Cyber Security Gas and Oil june 2011
CAMM presentation for Cyber Security Gas and Oil june 2011Vladimir Jirasek
 
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir JirasekISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir JirasekVladimir Jirasek
 
Federation For The Cloud Opportunities For A Single Identity
Federation For The Cloud  Opportunities For A Single IdentityFederation For The Cloud  Opportunities For A Single Identity
Federation For The Cloud Opportunities For A Single IdentityVladimir Jirasek
 

More from Vladimir Jirasek (17)

Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
 
Vulnerability Management @ DevSecOps London Gathering
Vulnerability Management @ DevSecOps London GatheringVulnerability Management @ DevSecOps London Gathering
Vulnerability Management @ DevSecOps London Gathering
 
C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud security
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
2012 10 cloud security architecture
2012 10 cloud security architecture2012 10 cloud security architecture
2012 10 cloud security architecture
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
Security architecture for LSE 2009
Security architecture for LSE 2009Security architecture for LSE 2009
Security architecture for LSE 2009
 
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksMobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risks
 
Information Risk Security model and metrics
Information Risk Security model and metricsInformation Risk Security model and metrics
Information Risk Security model and metrics
 
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processesIntegrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processes
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
 
Meaningfull security metrics
Meaningfull security metricsMeaningfull security metrics
Meaningfull security metrics
 
CAMM presentation for Cyber Security Gas and Oil june 2011
CAMM presentation for Cyber Security Gas and Oil june 2011CAMM presentation for Cyber Security Gas and Oil june 2011
CAMM presentation for Cyber Security Gas and Oil june 2011
 
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir JirasekISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
 
Qualys Webex 24 June 2008
Qualys Webex 24 June 2008Qualys Webex 24 June 2008
Qualys Webex 24 June 2008
 
Federation For The Cloud Opportunities For A Single Identity
Federation For The Cloud  Opportunities For A Single IdentityFederation For The Cloud  Opportunities For A Single Identity
Federation For The Cloud Opportunities For A Single Identity
 

Securing mobile population for White Hats

  • 2. About me • Security professional (11 years), current work at WorldPay as Head of Security Solutions • Director, CSA UK & Ireland • I love reading books: thrillers (Clive Cusler) and business management (Jo Owen) • Apple fan
  • 3. I will cover three topics today • Consumerisation opportunities and challenges • Threats related to mobile devices • Smart devices security architecture • How to fit mobile devices to company security architecture
  • 4. Consumerisation Hmm, might be tricky but I want to use here is what one device for we can do…. both personal and work stuff Say yes and give clear policies! Access to data and systems based on risk Agree forensic policy and investigations rules for personal devices.
  • 5. How to manage access – not binary Access decisions based on accuracy of following: • Identity – Google apps ID vs. Active directory ID, one factor auth vs. two factor auth • Role – FTE, contractor, cleaner, executive • Device – trusted, non-trusted • Location – inside fw or outside, US vs. China, IPv6 vs IPv4, changes in locations in time • Time – inside working hours or outside, • Data/Application – business impact, approved apps vs consumer apps.
  • 6. Classifications of systems M anaged U nmanaged Domain joined or mobile Non-domain joined managed T r usted syst ems I solated syst ems · Domain joi ned devices · Non domain joined but · M anaged mobile devices passed t he compliance Compliant (TPM , Bit locker , · Confi gur at ion assessed and checks confi g and pat ch) compliant St r at egy: Offer managed pat h t o St r at egy: K eep incr ease number of apps and dat a access Vulner able syst ems Rogue systems · Domain joi ned devices · Unknown devices · M anaged mobile devices · Not compliant or N on-Compliant · Non-compliant st at us cannot assess St r at egy: M igr at e t o compliant compliance St r at egy: Block
  • 7. Evolution of connected world Source: McAfee 100B 10B Number of Devices 1B Mobile, Cloud… 100M Connected PC 10M PC Minicomputer 1M Mainframe 1960 1970 1980 1990 2000 2010
  • 8. Revolution in mobile device capabilities Source: McAfee • Microsoft Windows Vista • Blackberry & Palm • iOS App Store • iOS ActiveSync email Apple iPhone launches • Gartner approves iPhone • Gartner says never for the enterprise ready for enterprise • Android G1 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 2007 2008 2009
  • 9. And its acceleration • iPad2 RIM • Microsoft Windows 7 Playbook • Android Honeycomb with Encryption • iOS 3GS w/ encryption iPad • iCloud launches • iPhone 4s Android tablets • Windows Phone 7 • webOS • Next gen Blackberry Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 2009 2010 2011 2012
  • 10. Mobile devices threats • Web-based and network-based attacks • Malware • Social engineering attacks • Resource and service availability abuse. • Malicious and unintentional data loss. • Attacks on the integrity of the device’s data.
  • 11. Mobile platforms – security architecture • Traditional Access Control: Traditional access control seeks to protect devices using techniques such as pass- words and idle-time screen locking. • Application Provenance: Provenance is an approach where each application is stamped with the identity of its author and then made tamper resistant (using a digital signature). • Encryption: Encryption seeks to conceal data at rest on the device to address device loss or theft. • Isolation: Isolation techniques attempt to limit an application’s ability to access the sensitive data or systems on a device. • Permissions-based access control: Permission- based access control grants a set of permissions to each application and then limits each application to Source: Symantec accessing device data/systems that are within the scope of those permissions, blocking the applications if they attempt to perform actions that exceed these permissions.
  • 12. iOS • The iOS is based on Mac OS X • The number of vulnerabilities and attacks on iOS is very small and usually occurs in 3rd party applications installed on iOS • The OS offers very good security, data protection, encryption, access control • Lack of anonymity in application developer community. It is far more risky to develop malware for iOS. • Certified for Microsoft ActiveSync program
  • 13. Android Android is based on Linux and uses the best security features Linux can offer, such as robust access control and application isolation. However, the main security problem with Android is that: • It is very easy to jailbreak • Users can install any application from any Marketplace • Confusing application access permission confirmations • Many devices do not implement strong device encryption • Google does not control final deployment – vendors and operators may add “features”
  • 14. Updating of old devices is an an issue for Android… By Michael DeGusta TheUnderstatement.com
  • 15. Windows Phone (Mango release) • Robust security model • Mandatory access control – 4 privilege chambers– similar to Windows 7 (trusted, elevated, standard, least privileged) • Application isolation • Application code-signing • Data isolation • Controlled developer environment • Lack of enterprise VPN features • Immature certificate and key support • Capability notifications and enforcement
  • 16. Correct approach to mobile security • Secure Device, Applications and Data • Use risk based approach for access control decisions • Less emphasis on whether device is procured by company or user • Extend DLP to mobile • Extend security event and forensic services • Monitor installed apps, jail-breaking and configuration compliance Source: McAfee
  • 17. References • “A Window Into
Mobile Device Security”, Carey Nachenberg, Symantec, 2011 • McAfee EMM Site • Mobile Security: Looking Back, Looking Forward, David Goldschlag, McAfee, 2011 • Microsoft ActiveSync certification program, http://technet.microsoft.com/en-us/exchange/gg187968.aspx • Microsoft Consumerization Site, http://www.microsoft.com/enterprise/viewpoints/consumerization/default.aspx • “CISO Perspective: Consumerization of IT” @ RSA Europe 2011, Bret Arsenault, CISO Microsoft, • “Magic Quadrant for Mobile Device Management Software”, Document ID G00211101, Gartner, 2011 • “Your Apps Are Watching You,” The Wall Street Journal, December 17, 2010 • Windows Phone 7.5 (Mango) Security model explained, http://j4ni.com/blog/?p=59, Jani Nevalainen • Windows Phone Platform Security, http://www.developer.nokia.com/Community/Wiki/Windows_Phone_Platform_Security, Nokia • Windows Phone Security page, http://msdn.microsoft.com/en-us/library/ff402533(v=vs.92).aspx, Microsoft • VMware Mobile virtual platform, http://www.vmware.com/products/mobile/overview.html • Revolution or Evolution: Information Security 2020, http://www.pwc.co.uk/eng/publications/revolution_or_evolution_information_security_2020.html, PWC, 2010 • Consumerisation and Corporate IT Security, http://www.schneier.com/blog/archives/2010/09/consumerization.html, Bruce Schneier, September 2010 • Android Orphans: Visualizing a Sad History of Support, http://theunderstatement.com/post/11982112928/android- orphans-visualizing-a-sad-history-of-support, Michael Degusta, October 2011