SlideShare a Scribd company logo
HACKING TRUST
IT Vendors and The Illusion of Safety
Introduction
 Artist
 Information security troublemaker
 Casual procrastinator




      http://treeatwork.blogspot.com/2008/11/interview-2-jim-geovedi.html
Overview
Indonesian IT Growth
Cyber Security Issues
Network of Trust
ISO 27001:2005 on third party services
Indonesian IT Growth
Indonesian IT Growth
Market overview
  Projected to be worth nearly US$ 512 billion by 2012
  The government is pushing for more integrated
  e-government development, promoting a series of
  infrastructure and education initiatives
  Financial services and banking sectors accounting
  for as much as 30% of total spending forecast


                                           Source: Business Monitor International
Indonesian IT Growth
Computer sales
  Notebook sales were the main driver of PC market
  growth in 2007 accounted for around 60% of unit
  sales
  Computer sales (including notebooks and
  peripherals) will be worth an estimated
  US$ 1.9 billion in full year 2008



                                            Source: Business Monitor International
Indonesian IT Growth
Software
  For 2008, legal software sales are forecast at
  US$ 361 million
  Indonesia having one of the worst records in the
  world in terms of its failure to significantly reduce the
  software piracy rate, which was estimated at 85% by
  Business Software Association in 2007



                                              Source: Business Monitor International
Indonesian IT Growth
IT Services
  Expected to be worth US$ 500 million in 2008
  Hardware deployment services remain the largest
  Indonesian IT service approximately 20% share
  Opportunities are mainly in fundamental services:
  system integration, support systems, training,
  professional services, outsourcing, and Internet
  services

                                            Source: Business Monitor International
Indonesian IT Growth
e-Readiness
  Only 14% of Indonesians have Internet access
  (32 million users)
  Low telephone line density, high charges, and low
  PC penetration are all significant obstacles
  In 2007 research, only 40% of Indonesian Internet
  users have ever made purchases through the
  Internet

                                           Source: Business Monitor International
Cyber Security Issues
Cyber Security Issues
 General security
   Passwords
   Anti-virus software
   Firewalls
Cyber Security Issues
Email and communication
  Email attachments       Social networking
                          websites
  SPAM
                          Blog
  Blind carbon copy
                          VoIP
  Digital signatures
  Internet messaging
Cyber Security Issues
 Mobile Devices
   Physical security
   Data security
   USB drives
   Wireless network
   Bluetooth
Cyber Security Issues
 Privacy
   Anonymity
   Encryption
   Secure erase
   Supplementing passwords
Cyber Security Issues
 Safe browsing
   Active contents and cookies
   Website certificates
   Internationalised Domain Name
     klikbca.com ≠ klikbcå.com (xn--klikbc-nua.com)
   Browser security settings
Cyber Security Issues
 Software and applications
   Patches
   Operating systems
   End-user license agreements
Network of Trust
Developers


                   Operations         Contractors
                                                                                                 Finance        Operating Systems

                    Marketing
                                                                                                                                                   ISP
                                                       Vendors                                                  Network Infrastructure
                      Auditors
                                                                                                                                                   ASP

            System Integrators        Consultants
                                                                                                                                       ERP

              System Analysis                                                                    Operations
                                                     Customers                                                                         Intranet Applications


                                       Spies                                                                    Applications           Billing
                                                    Competitors
                       Business Associations                                                                                           Payment Gateway
                                                                  Corporation
                                                       Lawyers                                                                         Backup
                                                                                Business Units                  Database
                             Board of Directors
                                                     Executives                                                   Planning
                                     Secretary
                                                                                                                  Analysis
            Anti-monopoly

                                                                                                                  Design
                                                                                                 Development
               Fair Trades        Regulation        Government
                                                                                                                  Implementation
Money Laundry Surveillance

                                                                                                                  Maintenance


                                                                                                 Marketing     Business Intelligence             Data Mining


                                                                                                 HRD
Access Management
                                                      Database
      Development                                                   Audit Trails

        Code Audit                                                                 Software Updates
                        Application
Performance Review                                    Operating Systems            System Hardening

           Logging                                                                 Performance Optimisation
                                      IT Operations
    Installation                                                   ISP
                                                      Network
  Configuration       Administration                                Network Devices


   Maintenance

                           Backup
Parties involved in a typical
software attack
 The company that sold the software
 The attack tool writer
 The attacker him/herself
 The owner of the network
100% of the liability shouldn't fall on the shoulders of the
software vendor, just as 100% shouldn't fall on the
attacker or the network owner. But today, 100% of the
cost falls directly on the network owner, and that just has
to stop.

We will always pay for security. If software vendors have
liability costs, they'll pass those on to us. It might not be
cheaper than what we're paying today. But as long as
we're going to pay, we might as well pay to fix the
problem. Forcing the software vendor to pay to fix the
problem and then pass those costs on to us means that
the problem might actually get fixed.
ISO 27001:2005 on third
party services
ISO 27001:2005
What's new? (compared to BS 7799:2000)
 11 old controls modified,116 controls remaining, 17
 new controls added — 133 controls in total
 5 control objectives re-arranged, 8 new controls
 objectives added — 39 control objectives in total
ISO 27001:2005
What's new?
 Service Delivery Management
   Service delivery, monitoring and review of third
   party services, managing charges to third party
   services
   Based on BS 15000/ISO 2000
ISO 27001:2005
What's new?
 Improving the management of external risk
   Outsourcing, service providers, supplies, third
   parties, business partners, and customers
   SLAs and contracts, audits
Conclusion
Information security isn't a technological problem
  It's economics problem
Make vendors liable for security problems

More Related Content

PDF
Legal IT Article - Outsourcing - Back to the Future by Dave Cunningham july 04
PDF
TripleTree eDiscovery
PDF
Rawat Ibm Compliance Webinar
PPTX
Intro to yakpact fexco prizebond team slideshare
PDF
BI Forum 2009 - BI Mega Trends
PDF
Hybrid Cloud, BigData and Consumerization The 2012 Trends
PPT
PDF
Technology Trends in the Financial Service Industry
Legal IT Article - Outsourcing - Back to the Future by Dave Cunningham july 04
TripleTree eDiscovery
Rawat Ibm Compliance Webinar
Intro to yakpact fexco prizebond team slideshare
BI Forum 2009 - BI Mega Trends
Hybrid Cloud, BigData and Consumerization The 2012 Trends
Technology Trends in the Financial Service Industry

What's hot (20)

PDF
Paul Butterworth Policy Based Approach
PPTX
Guerilla Marketing of Enterprise Architecture Management
PDF
Oracle Procurement Channel
PPT
2005 Presentation - Annual ITAM Conference
PDF
Enrterprise Apps Cio Summit 2009pdf
PDF
Presentation mktspl
PDF
T-Systems Core Belief Collaboration - Portfolio
PDF
Australia Department of Immigration and Citizenship - A Case Study on Transfo...
PDF
JOSÉ BASÍLIO SIMÕES - Presidente da ISA – Intelligent Sensing Anywhere
PDF
Ipscf2011 I K Price Infor10 Ea Mv10 1 Roadmap
PDF
E12 Sox And Identity Management
PDF
Challenges financial information_systems_a_clarke
PDF
Distribution Automation & Grid Modernization Business Case Summit 2013
PDF
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
PDF
MITA Beyond MMIS Presentation
PDF
9sept2009 iiruc
PDF
Win and Manage more Government Business with GovWin CRM
PDF
Realising Enhanced Value Due To Business Network Redesign Through Extended Er...
PDF
Consolidating sap applications for improved operational costs looking at sap ...
Paul Butterworth Policy Based Approach
Guerilla Marketing of Enterprise Architecture Management
Oracle Procurement Channel
2005 Presentation - Annual ITAM Conference
Enrterprise Apps Cio Summit 2009pdf
Presentation mktspl
T-Systems Core Belief Collaboration - Portfolio
Australia Department of Immigration and Citizenship - A Case Study on Transfo...
JOSÉ BASÍLIO SIMÕES - Presidente da ISA – Intelligent Sensing Anywhere
Ipscf2011 I K Price Infor10 Ea Mv10 1 Roadmap
E12 Sox And Identity Management
Challenges financial information_systems_a_clarke
Distribution Automation & Grid Modernization Business Case Summit 2013
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
MITA Beyond MMIS Presentation
9sept2009 iiruc
Win and Manage more Government Business with GovWin CRM
Realising Enhanced Value Due To Business Network Redesign Through Extended Er...
Consolidating sap applications for improved operational costs looking at sap ...

Viewers also liked (20)

PDF
Hacking a Bird in the Sky: The Revenge of Angry Birds
PDF
Hacking Satellite: A New Universe to Discover
PDF
Internet Worms
PDF
Wireless Hotspot: The Hackers Playground
PDF
Wireless Hotspot Security
PDF
Adam Laurie - $atellite Hacking for Fun & Pr0fit!
PDF
Hacking Cracking 2008
PDF
Warezzman - DVB-Satellite Hacking
PDF
Satellite Telephony Security
PDF
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
PDF
Hacking a Bird in the Sky: Hijacking VSAT Connection
PDF
The 21st Century Bank Job
PDF
Is Cyber-offence the New Cyber-defence?
PDF
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship
PDF
Satellite Hacking — Intro by Indianz (2012)
PDF
Professional Hackers
PDF
Waluku: Answering Astronomy Questions through Social Media
PDF
AI & NLP pada @begobet
PDF
Cheating the 10,000 hour rule
PDF
IDS & Log Management
Hacking a Bird in the Sky: The Revenge of Angry Birds
Hacking Satellite: A New Universe to Discover
Internet Worms
Wireless Hotspot: The Hackers Playground
Wireless Hotspot Security
Adam Laurie - $atellite Hacking for Fun & Pr0fit!
Hacking Cracking 2008
Warezzman - DVB-Satellite Hacking
Satellite Telephony Security
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Hacking a Bird in the Sky: Hijacking VSAT Connection
The 21st Century Bank Job
Is Cyber-offence the New Cyber-defence?
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship
Satellite Hacking — Intro by Indianz (2012)
Professional Hackers
Waluku: Answering Astronomy Questions through Social Media
AI & NLP pada @begobet
Cheating the 10,000 hour rule
IDS & Log Management

Similar to Hacking Trust (20)

PPT
E biz blueprint
PPTX
DPS: Operative Spotlight on the Changing Face of Digital Publishing Operations
PDF
3 forrester - tag management state of the union
PDF
Fussion Middleware
PDF
EMC Documentum & Captiva
PPT
Industrial Automation Services
PDF
The Digital Intelligence Imperative — Driving Digital Customer Experiences W...
PDF
Enterprise Analysts And Business Analysts Companions Or Competitors
PPTX
Da Vinci Performance Management 4 13 09
PDF
Corporate overview 2.0
PDF
Building highly scalable process and rule-driven applications with JBoss Ente...
PPT
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ie
PDF
Introduction to the BPM Lifecycle
PDF
Hexaware insurance analytics
PPTX
Indian it industry
PDF
Managing the Data Center with JBoss SOA-P
PDF
Thoughts on Utility, Grid, on demand, cloud computing and appliances
PPTX
M2M Billing - Comarch M2M Projects
PDF
Fcs Corporate
PDF
Xoriant - Financial services expertise
E biz blueprint
DPS: Operative Spotlight on the Changing Face of Digital Publishing Operations
3 forrester - tag management state of the union
Fussion Middleware
EMC Documentum & Captiva
Industrial Automation Services
The Digital Intelligence Imperative — Driving Digital Customer Experiences W...
Enterprise Analysts And Business Analysts Companions Or Competitors
Da Vinci Performance Management 4 13 09
Corporate overview 2.0
Building highly scalable process and rule-driven applications with JBoss Ente...
Gordon baisley - eircom - Introducing the EDM role with www.softtest.ie
Introduction to the BPM Lifecycle
Hexaware insurance analytics
Indian it industry
Managing the Data Center with JBoss SOA-P
Thoughts on Utility, Grid, on demand, cloud computing and appliances
M2M Billing - Comarch M2M Projects
Fcs Corporate
Xoriant - Financial services expertise

Hacking Trust

  • 1. HACKING TRUST IT Vendors and The Illusion of Safety
  • 2. Introduction Artist Information security troublemaker Casual procrastinator http://treeatwork.blogspot.com/2008/11/interview-2-jim-geovedi.html
  • 3. Overview Indonesian IT Growth Cyber Security Issues Network of Trust ISO 27001:2005 on third party services
  • 5. Indonesian IT Growth Market overview Projected to be worth nearly US$ 512 billion by 2012 The government is pushing for more integrated e-government development, promoting a series of infrastructure and education initiatives Financial services and banking sectors accounting for as much as 30% of total spending forecast Source: Business Monitor International
  • 6. Indonesian IT Growth Computer sales Notebook sales were the main driver of PC market growth in 2007 accounted for around 60% of unit sales Computer sales (including notebooks and peripherals) will be worth an estimated US$ 1.9 billion in full year 2008 Source: Business Monitor International
  • 7. Indonesian IT Growth Software For 2008, legal software sales are forecast at US$ 361 million Indonesia having one of the worst records in the world in terms of its failure to significantly reduce the software piracy rate, which was estimated at 85% by Business Software Association in 2007 Source: Business Monitor International
  • 8. Indonesian IT Growth IT Services Expected to be worth US$ 500 million in 2008 Hardware deployment services remain the largest Indonesian IT service approximately 20% share Opportunities are mainly in fundamental services: system integration, support systems, training, professional services, outsourcing, and Internet services Source: Business Monitor International
  • 9. Indonesian IT Growth e-Readiness Only 14% of Indonesians have Internet access (32 million users) Low telephone line density, high charges, and low PC penetration are all significant obstacles In 2007 research, only 40% of Indonesian Internet users have ever made purchases through the Internet Source: Business Monitor International
  • 11. Cyber Security Issues General security Passwords Anti-virus software Firewalls
  • 12. Cyber Security Issues Email and communication Email attachments Social networking websites SPAM Blog Blind carbon copy VoIP Digital signatures Internet messaging
  • 13. Cyber Security Issues Mobile Devices Physical security Data security USB drives Wireless network Bluetooth
  • 14. Cyber Security Issues Privacy Anonymity Encryption Secure erase Supplementing passwords
  • 15. Cyber Security Issues Safe browsing Active contents and cookies Website certificates Internationalised Domain Name klikbca.com ≠ klikbcå.com (xn--klikbc-nua.com) Browser security settings
  • 16. Cyber Security Issues Software and applications Patches Operating systems End-user license agreements
  • 18. Developers Operations Contractors Finance Operating Systems Marketing ISP Vendors Network Infrastructure Auditors ASP System Integrators Consultants ERP System Analysis Operations Customers Intranet Applications Spies Applications Billing Competitors Business Associations Payment Gateway Corporation Lawyers Backup Business Units Database Board of Directors Executives Planning Secretary Analysis Anti-monopoly Design Development Fair Trades Regulation Government Implementation Money Laundry Surveillance Maintenance Marketing Business Intelligence Data Mining HRD
  • 19. Access Management Database Development Audit Trails Code Audit Software Updates Application Performance Review Operating Systems System Hardening Logging Performance Optimisation IT Operations Installation ISP Network Configuration Administration Network Devices Maintenance Backup
  • 20. Parties involved in a typical software attack The company that sold the software The attack tool writer The attacker him/herself The owner of the network
  • 21. 100% of the liability shouldn't fall on the shoulders of the software vendor, just as 100% shouldn't fall on the attacker or the network owner. But today, 100% of the cost falls directly on the network owner, and that just has to stop. We will always pay for security. If software vendors have liability costs, they'll pass those on to us. It might not be cheaper than what we're paying today. But as long as we're going to pay, we might as well pay to fix the problem. Forcing the software vendor to pay to fix the problem and then pass those costs on to us means that the problem might actually get fixed.
  • 22. ISO 27001:2005 on third party services
  • 23. ISO 27001:2005 What's new? (compared to BS 7799:2000) 11 old controls modified,116 controls remaining, 17 new controls added — 133 controls in total 5 control objectives re-arranged, 8 new controls objectives added — 39 control objectives in total
  • 24. ISO 27001:2005 What's new? Service Delivery Management Service delivery, monitoring and review of third party services, managing charges to third party services Based on BS 15000/ISO 2000
  • 25. ISO 27001:2005 What's new? Improving the management of external risk Outsourcing, service providers, supplies, third parties, business partners, and customers SLAs and contracts, audits
  • 26. Conclusion Information security isn't a technological problem It's economics problem Make vendors liable for security problems