SlideShare a Scribd company logo
Presented by ebusinessmantra at
Online Security and Privacy Issues
www.ebusinessmantra.com
Presented by ebusinessmantra at
ecommerce Conference at Umass Dartmouth, MA
April 19, 2013
Agenda
 (In)Security Landscape
 It’s all business
 What is your identity worth?
 How does it work on the web?
 Does it matter to SMB?
Problem
www.ebusinessmantra.com
 Does it matter to SMB?
 Myths about security
 Vulnerability Exploits (Hacking 101) Demo
 SQL Injection, XSS, Google Hacking
 How do you minimize the risk?
 Security Tools - Demo
 Discussions
ProblemSolution
About ebusinessmantra
 WebApplication Security Consultants
 Assess and recommend security solutions
 Through partnerships, we offer:
 WebApplication Security Scanner
 WebApplication Firewalls
www.ebusinessmantra.com
 WebApplication Firewalls
 Database Firewalls
 File Systems Monitoring
 Training and eLearning (in process)
 Customers: *.mil, *.gov, *edu , *.org, *.com
 Web Site Design and Development (past)
(In)Security Landscape
 Number of incidents of data breaches reaches new record in
2012
www.ebusinessmantra.com
(In)Security Landscape
www.ebusinessmantra.com
(In)Security Landscape
Web + Hacking
= 37% of all
incidents
www.ebusinessmantra.com
Top 10 security breaches of 2012
 Wyndham Hotels – 600,000 credit cards #s stored in plain text, $10.5
billion in fraudulent transactions
 Yahoo – 400,000 passwords stored in plain text (SQL injection)
 Apple – 11 million Unique Device Identifiers - access user names, devices
names, cell phone numbers and addresses
 Global Payments – 1.5 million credit card numbers withTrack 2 data used
www.ebusinessmantra.com
 Global Payments – 1.5 million credit card numbers withTrack 2 data used
to clone credit cards
 Ghostshell - Hactivist Group stole account information for 1.6 government
and contractors
 LinkedIn – 6.5 million (hashed) passwords – published on web
 Nationwide and Allied Insurance Co. – 1.1 million applicants’ info
 South Carolina DOR – 3.8 million tax records
 Zappos – 24 million customer data
 Government Sector – 94 million Personal Identifiable Information (PII)
In the news…
www.ebusinessmantra.com
In the news...
www.ebusinessmantra.com
Cybercrime is on the rise
www.ebusinessmantra.com
In the news…
www.ebusinessmantra.com
Business of cybercrime
 Cybercrime is a highly organized, well run profitable business
 Hierarchal structure - specialists
 Programmer, Hackers, Distributors, Hosting Providers, Money
Mule, Cashiers,Tellers (FBI classification)
www.ebusinessmantra.com
Mule, Cashiers,Tellers (FBI classification)
Extortion
www.ebusinessmantra.com
Fraudulent tax returns
 Alabama: 1000 false returns for $1.7 million
 LA County: 65 false returns for $358,000
www.ebusinessmantra.com
 Fort Lauderdale: 2000 false tax returns were filed from
10/2010 - 6/2012 for $11 million.
Your identity @ bargain price…
Fullz Info USAType A
package
# of records Price/record
Full Name
Email address + password
PhysicalAddress
Phone Number
1- 499 0.25
500 - 4999 0.22
5000 - 9999 0.18
www.ebusinessmantra.com
Phone Number
DOB, SSN, DL Numbers
Bank Name,Account number
+ routing number
Employer's name + # years of
employment
10000 - 16499 0.16
Fullz Info USAType B package includes mother’s maiden name.
Web site claims to have 99 to 100% of people in US in their database and have most
upto date database.
Typical Offers on Black Market - Price List
Products Price
Credit card details $2 - $90
Physical credit cards $190 + cost of details
Card cloners $200 - $1000
Bank credentials $80 to $700 (with guaranteed balance)
www.ebusinessmantra.com
Bank credentials $80 to $700 (with guaranteed balance)
Bank transfers and cashing checks from 10% to 40% of total
Online stores and pay platforms $80 - $1500 with guaranteed balance
(In)Security Landscape
 Pretty grim, sobering landscape!
 Notable web sites have been hacked (Govt.,
security firms, banks)
 Many are not reported and many more do not
know they are being hacked. Your web site might
www.ebusinessmantra.com
know they are being hacked. Your web site might
have been hacked and you may be unaware of it.
 Organized crimes, blackmail/extortion,
defraud IRS
 High costs to remediate: $90 - $300 per
record, plus lost business, tangible and
intangible losses
How does it work on the web?
 Hackers exploit vulnerabilities in the code
 to steal data
 to make you, web site users, do things that you did not intend to
 to distribute and install malware, ransom-ware, in general, bad-
ware
www.ebusinessmantra.com
ware
 Monitor your activities on the computer, web site and report data
We are Small Business, it does not matter
to us…
 S&M are most vulnerable because they don’t have resources that
large organizations have.
 Your site could be used to launch or distribute malware
www.ebusinessmantra.com
Your site could be used to launch or distribute malware
 You may not think you are at risk – but actually you could be –
usingWordPress or some other platform which may be
vulnerable
 Google search for vulnerabilities inWordPress site.
We don’t have anything of value on our
web site…
 Even if you don’t believe you have anything of value on your website, it
could be used as a means for malicious acts. Here are some negative side-
effects:
 Credibility
www.ebusinessmantra.com
 Block -Your business website could be blocked by your Internet service provider
or even Google, Bing, and other search engines.
 http://www.google.com/safebrowsing/diagnostic?site=domainname
 Blacklisting -Your email address or entire domain could be blacklisted by spam
filtering services.
 http://www.spamhaus.org: Track internet spam senders and spam services and provide real-time anti-
spam protection and to identify and pursue spammers worldwide
 Time and money - remediation
Myths about security
 We have SSL (https) on my web site
 Our network has firewalls
 Our site is password protected
 Our developers will deal with security
www.ebusinessmantra.com
 Our developers will deal with security
 Our OS and software are upto date and patched
 These are essential but none of these protect your web site from
being hacked.
Are you chasing the mice or protecting the
cheese?
www.ebusinessmantra.com
Web Application Model
www.ebusinessmantra.com
• Attack passes as normal traffic through ports 80 & 443
• SSL, Network, OS securities cannot protect web applications
Vulnerability Exploits - Hacking 101
 Demo
 SQL Injection
 Cross Site Scripting
 Google Hacking
www.ebusinessmantra.com
Injection Attack
 Very widely used by hackers and is one of the top 10
vulnerabilities in web applications
 SQL Injection Attack Demo
www.ebusinessmantra.com
Cross Site Scripting Attack
 Another very frequently used attack method - Demo
www.ebusinessmantra.com
Google hacking demo
 Have you Googled yourself or your business?
 Advance Google search –
 Demo
 inurl:admin intext:username=AND email=AND password= OR pass=
filetype:xls
www.ebusinessmantra.com
filetype:xls
 "your password is" filetype:txt
 Tools that can do the search for you - demo
How do you minimize risk?
 Awareness
 All stakeholders must recognize the risks and work towards mitigation
 Culture within the organization, mandate from the management
 Examples – IT (network security), coders (perplexed), management (state of
denial), users (unsafe browsing, cool sites!)
 Develop security strategy
 Secure Coding Practices during SDLC
 Developers need to understand the threats; write secure code; follow
www.ebusinessmantra.com
 Developers need to understand the threats; write secure code; follow
published guidelines
 Resource Intensive: time and $ - training, coding, testing
 QA
 During all stages of application development life cycle
 At regular intervals while in production
 Web Application Scanning, static code analysis
 Monitoring
 Web Application Scanning (demo)
 Web Application Firewall
 Database Firewall
 Compliance
Security Strategy
 Web Site Scanning
 Snapshot of vulnerabilities (new vulnerabilities), fix
vulnerabilities, and install patches
 Web Application Firewall
 Real time, continuous
 Set policies to alerts and/or block attacks
www.ebusinessmantra.com
 Set policies to alerts and/or block attacks
 Virtual patch from scanning results
 Block traffic from certain region
 Database Firewall
 Data Protection
 Set policies to alert and/or block attacks
 (Prevent) Internal and external threats
 Secured Hosting
PCI Requirements for Credit Cards
www.ebusinessmantra.com
OWASP Top 10 vulnerabilities – set by
worldwide security experts
www.ebusinessmantra.com
Section 6 of PCI DSS
www.ebusinessmantra.com
PCI DSS Requirements – web related
www.ebusinessmantra.com
Security Tools
 WebApplication Scanner
 WebApplication Firewall
 Database Firewall
www.ebusinessmantra.com
 Database Firewall
 Secured Hosting
Demo – Vulnerability Scanning
www.ebusinessmantra.com
How can we help…
 Security Assessment
 Develop a strategy
 Implement strategy
 Training
www.ebusinessmantra.com
 Training
Take away
 Web presence and doing business on web is essential
 Security should also be part of the web strategy
 Internal and external threats
 Develop a strategy for securing data
www.ebusinessmantra.com
 Develop a strategy for securing data
 Take action
 Call us if you need help with securing your digital assests.
Discussions
www.ebusinessmantra.com
References
 2012-DataBreachQuickView by Risk Based Security
 The Cyber Crime Black Market – by Panda Security
 Web Sites:
 http://www.crn.com/slide-shows/security/240144596/the-top-10-security-breaches-of-2012.htm
 http://www.esecurityplanet.com/network-security/salem-state-university-suffers-security-breach.html
 http://datalossdb.org/incident_highlights/58-nothing-is-certain-but-death-taxes-and-identity-theft
 http://www.securityweek.com/economic-update-cybercrime-economy-current-prices-black-market
http://www.sbnonline.com/2012/01/your-personally-identifiable-information-it%E2%80%99s-valuable-
www.ebusinessmantra.com
 http://www.sbnonline.com/2012/01/your-personally-identifiable-information-it%E2%80%99s-valuable-
to-someone/
 http://it.toolbox.com/blogs/managing-infosec/google-hacking-master-list-28302
 http://stopbadware.org
 http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1761937/
 http://www.howcast.com/guides/593-How-to-Maintain-Internet-Security-and-Privacy
 http://www.ftc.gov/bcp/menus/consumer/tech/privacy.shtm
 http://www.whitehouse.gov/files/documents/cyber/National%20Cyber%20Security%20Alliance%20-
%20Harris+Online+Security+and+Privacy+Study.pdf
Resources
 OWASP www.owasp.org
 Dataloss www.dataloss.org
 Calculate your risk: https://databreachcalculator.com
 Ebusinessmantra www.ebusinessmantra.com
www.ebusinessmantra.com
 Ebusinessmantra www.ebusinessmantra.com

More Related Content

PDF
Web application vulnerabilities
PDF
Why Should A Business Worry about Cyber Attacks?
PPT
Phishing Education
PPTX
Security risks awareness
PPTX
What is the Cybersecurity plan for tomorrow?
PDF
Data Science vs. the Bad Guys: Defending LinkedIn from Fraud and Abuse
PDF
Server-Side Second Factors: Approaches to Measuring User Authenticity
PPT
Web Application Security - "In theory and practice"
Web application vulnerabilities
Why Should A Business Worry about Cyber Attacks?
Phishing Education
Security risks awareness
What is the Cybersecurity plan for tomorrow?
Data Science vs. the Bad Guys: Defending LinkedIn from Fraud and Abuse
Server-Side Second Factors: Approaches to Measuring User Authenticity
Web Application Security - "In theory and practice"

What's hot (19)

PPT
Security&reliability
PPTX
Content Management System Security
PPTX
Dos and Don'ts of Internet Security
PDF
A Guide To Cyber Insurance
PDF
Cyber Risks & Liabilities - Cyber Security for Small Businesses
PPT
Web security presentation
PPTX
Security Awareness Training from KnowBe4
PDF
10 best cybersecurity companies in healthcare for 2021
PPTX
Websecurity fundamentals for beginners
PDF
Безопасность данных мобильных приложений. Мифы и реальность.
DOCX
What you need to know about cyber security
PPTX
Cyber security certification course
PPTX
Hack miami emiliocasbas
PPTX
Staying Safe on the Computer and Online
PDF
When thieves strike: Executive briefing on SWIFT attacks
PDF
Nat'l Cyber Security Awareness Month (NCSAM) Posters
PPT
Web security leeds sharp dot netnotts
PPTX
Knowbe4 presentation
PPTX
Human Risk Management
Security&reliability
Content Management System Security
Dos and Don'ts of Internet Security
A Guide To Cyber Insurance
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Web security presentation
Security Awareness Training from KnowBe4
10 best cybersecurity companies in healthcare for 2021
Websecurity fundamentals for beginners
Безопасность данных мобильных приложений. Мифы и реальность.
What you need to know about cyber security
Cyber security certification course
Hack miami emiliocasbas
Staying Safe on the Computer and Online
When thieves strike: Executive briefing on SWIFT attacks
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Web security leeds sharp dot netnotts
Knowbe4 presentation
Human Risk Management
Ad

Similar to Online Security and Privacy Issues (20)

PDF
Cyber security considerations for Small and Medium Businesses
PPTX
Cybersecurity Threats Web Developers Must Know.pptx
PPTX
Cyber 101 for smb execs v1
PDF
Website Security: A Guide to Defending Your Website
PPTX
Cyber security awareness for end users
PPT
Ecommerce(2)
PDF
Introduction to the Current Threat Landscape
PPTX
Make Every Spin Count: Putting the Security Odds in Your Favor
PDF
Web Application Security Testing Guide | Secure Web Apps
PPTX
Cyber security presentation
PDF
parabcswithout-front-200320113631.pdf
PDF
DWP Cybersecurity 101 for Nonprofits
PDF
The Small Business Cyber Security Best Practice Guide
PPTX
10 ways to protect your e commerce site from hacking & fraud
PPT
Security in e-commerce
PDF
Based on the below and using the 12 categories of threats identify 3 .pdf
PPTX
ITSolutions|Currie Network Security Seminar
PPTX
Cyber security
PPTX
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
PDF
securityattackvectorsslidesharefinal-160405191759.pdf
Cyber security considerations for Small and Medium Businesses
Cybersecurity Threats Web Developers Must Know.pptx
Cyber 101 for smb execs v1
Website Security: A Guide to Defending Your Website
Cyber security awareness for end users
Ecommerce(2)
Introduction to the Current Threat Landscape
Make Every Spin Count: Putting the Security Odds in Your Favor
Web Application Security Testing Guide | Secure Web Apps
Cyber security presentation
parabcswithout-front-200320113631.pdf
DWP Cybersecurity 101 for Nonprofits
The Small Business Cyber Security Best Practice Guide
10 ways to protect your e commerce site from hacking & fraud
Security in e-commerce
Based on the below and using the 12 categories of threats identify 3 .pdf
ITSolutions|Currie Network Security Seminar
Cyber security
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
securityattackvectorsslidesharefinal-160405191759.pdf
Ad

Recently uploaded (20)

PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Funds Management Learning Material for Beg
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
artificial intelligence overview of it and more
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PPTX
Introduction to cybersecurity and digital nettiquette
PPTX
E -tech empowerment technologies PowerPoint
PPTX
Database Information System - Management Information System
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
Introduction to the IoT system, how the IoT system works
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PDF
Sims 4 Historia para lo sims 4 para jugar
PPT
250152213-Excitation-SystemWERRT (1).ppt
SASE Traffic Flow - ZTNA Connector-1.pdf
Unit-1 introduction to cyber security discuss about how to secure a system
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Funds Management Learning Material for Beg
Power Point - Lesson 3_2.pptx grad school presentation
artificial intelligence overview of it and more
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
Introduction to cybersecurity and digital nettiquette
E -tech empowerment technologies PowerPoint
Database Information System - Management Information System
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
Exploring VPS Hosting Trends for SMBs in 2025
Introduction to the IoT system, how the IoT system works
Mathew Digital SEO Checklist Guidlines 2025
Sims 4 Historia para lo sims 4 para jugar
250152213-Excitation-SystemWERRT (1).ppt

Online Security and Privacy Issues

  • 1. Presented by ebusinessmantra at Online Security and Privacy Issues www.ebusinessmantra.com Presented by ebusinessmantra at ecommerce Conference at Umass Dartmouth, MA April 19, 2013
  • 2. Agenda  (In)Security Landscape  It’s all business  What is your identity worth?  How does it work on the web?  Does it matter to SMB? Problem www.ebusinessmantra.com  Does it matter to SMB?  Myths about security  Vulnerability Exploits (Hacking 101) Demo  SQL Injection, XSS, Google Hacking  How do you minimize the risk?  Security Tools - Demo  Discussions ProblemSolution
  • 3. About ebusinessmantra  WebApplication Security Consultants  Assess and recommend security solutions  Through partnerships, we offer:  WebApplication Security Scanner  WebApplication Firewalls www.ebusinessmantra.com  WebApplication Firewalls  Database Firewalls  File Systems Monitoring  Training and eLearning (in process)  Customers: *.mil, *.gov, *edu , *.org, *.com  Web Site Design and Development (past)
  • 4. (In)Security Landscape  Number of incidents of data breaches reaches new record in 2012 www.ebusinessmantra.com
  • 6. (In)Security Landscape Web + Hacking = 37% of all incidents www.ebusinessmantra.com
  • 7. Top 10 security breaches of 2012  Wyndham Hotels – 600,000 credit cards #s stored in plain text, $10.5 billion in fraudulent transactions  Yahoo – 400,000 passwords stored in plain text (SQL injection)  Apple – 11 million Unique Device Identifiers - access user names, devices names, cell phone numbers and addresses  Global Payments – 1.5 million credit card numbers withTrack 2 data used www.ebusinessmantra.com  Global Payments – 1.5 million credit card numbers withTrack 2 data used to clone credit cards  Ghostshell - Hactivist Group stole account information for 1.6 government and contractors  LinkedIn – 6.5 million (hashed) passwords – published on web  Nationwide and Allied Insurance Co. – 1.1 million applicants’ info  South Carolina DOR – 3.8 million tax records  Zappos – 24 million customer data  Government Sector – 94 million Personal Identifiable Information (PII)
  • 10. Cybercrime is on the rise www.ebusinessmantra.com
  • 12. Business of cybercrime  Cybercrime is a highly organized, well run profitable business  Hierarchal structure - specialists  Programmer, Hackers, Distributors, Hosting Providers, Money Mule, Cashiers,Tellers (FBI classification) www.ebusinessmantra.com Mule, Cashiers,Tellers (FBI classification)
  • 14. Fraudulent tax returns  Alabama: 1000 false returns for $1.7 million  LA County: 65 false returns for $358,000 www.ebusinessmantra.com  Fort Lauderdale: 2000 false tax returns were filed from 10/2010 - 6/2012 for $11 million.
  • 15. Your identity @ bargain price… Fullz Info USAType A package # of records Price/record Full Name Email address + password PhysicalAddress Phone Number 1- 499 0.25 500 - 4999 0.22 5000 - 9999 0.18 www.ebusinessmantra.com Phone Number DOB, SSN, DL Numbers Bank Name,Account number + routing number Employer's name + # years of employment 10000 - 16499 0.16 Fullz Info USAType B package includes mother’s maiden name. Web site claims to have 99 to 100% of people in US in their database and have most upto date database.
  • 16. Typical Offers on Black Market - Price List Products Price Credit card details $2 - $90 Physical credit cards $190 + cost of details Card cloners $200 - $1000 Bank credentials $80 to $700 (with guaranteed balance) www.ebusinessmantra.com Bank credentials $80 to $700 (with guaranteed balance) Bank transfers and cashing checks from 10% to 40% of total Online stores and pay platforms $80 - $1500 with guaranteed balance
  • 17. (In)Security Landscape  Pretty grim, sobering landscape!  Notable web sites have been hacked (Govt., security firms, banks)  Many are not reported and many more do not know they are being hacked. Your web site might www.ebusinessmantra.com know they are being hacked. Your web site might have been hacked and you may be unaware of it.  Organized crimes, blackmail/extortion, defraud IRS  High costs to remediate: $90 - $300 per record, plus lost business, tangible and intangible losses
  • 18. How does it work on the web?  Hackers exploit vulnerabilities in the code  to steal data  to make you, web site users, do things that you did not intend to  to distribute and install malware, ransom-ware, in general, bad- ware www.ebusinessmantra.com ware  Monitor your activities on the computer, web site and report data
  • 19. We are Small Business, it does not matter to us…  S&M are most vulnerable because they don’t have resources that large organizations have.  Your site could be used to launch or distribute malware www.ebusinessmantra.com Your site could be used to launch or distribute malware  You may not think you are at risk – but actually you could be – usingWordPress or some other platform which may be vulnerable  Google search for vulnerabilities inWordPress site.
  • 20. We don’t have anything of value on our web site…  Even if you don’t believe you have anything of value on your website, it could be used as a means for malicious acts. Here are some negative side- effects:  Credibility www.ebusinessmantra.com  Block -Your business website could be blocked by your Internet service provider or even Google, Bing, and other search engines.  http://www.google.com/safebrowsing/diagnostic?site=domainname  Blacklisting -Your email address or entire domain could be blacklisted by spam filtering services.  http://www.spamhaus.org: Track internet spam senders and spam services and provide real-time anti- spam protection and to identify and pursue spammers worldwide  Time and money - remediation
  • 21. Myths about security  We have SSL (https) on my web site  Our network has firewalls  Our site is password protected  Our developers will deal with security www.ebusinessmantra.com  Our developers will deal with security  Our OS and software are upto date and patched  These are essential but none of these protect your web site from being hacked.
  • 22. Are you chasing the mice or protecting the cheese? www.ebusinessmantra.com
  • 23. Web Application Model www.ebusinessmantra.com • Attack passes as normal traffic through ports 80 & 443 • SSL, Network, OS securities cannot protect web applications
  • 24. Vulnerability Exploits - Hacking 101  Demo  SQL Injection  Cross Site Scripting  Google Hacking www.ebusinessmantra.com
  • 25. Injection Attack  Very widely used by hackers and is one of the top 10 vulnerabilities in web applications  SQL Injection Attack Demo www.ebusinessmantra.com
  • 26. Cross Site Scripting Attack  Another very frequently used attack method - Demo www.ebusinessmantra.com
  • 27. Google hacking demo  Have you Googled yourself or your business?  Advance Google search –  Demo  inurl:admin intext:username=AND email=AND password= OR pass= filetype:xls www.ebusinessmantra.com filetype:xls  "your password is" filetype:txt  Tools that can do the search for you - demo
  • 28. How do you minimize risk?  Awareness  All stakeholders must recognize the risks and work towards mitigation  Culture within the organization, mandate from the management  Examples – IT (network security), coders (perplexed), management (state of denial), users (unsafe browsing, cool sites!)  Develop security strategy  Secure Coding Practices during SDLC  Developers need to understand the threats; write secure code; follow www.ebusinessmantra.com  Developers need to understand the threats; write secure code; follow published guidelines  Resource Intensive: time and $ - training, coding, testing  QA  During all stages of application development life cycle  At regular intervals while in production  Web Application Scanning, static code analysis  Monitoring  Web Application Scanning (demo)  Web Application Firewall  Database Firewall  Compliance
  • 29. Security Strategy  Web Site Scanning  Snapshot of vulnerabilities (new vulnerabilities), fix vulnerabilities, and install patches  Web Application Firewall  Real time, continuous  Set policies to alerts and/or block attacks www.ebusinessmantra.com  Set policies to alerts and/or block attacks  Virtual patch from scanning results  Block traffic from certain region  Database Firewall  Data Protection  Set policies to alert and/or block attacks  (Prevent) Internal and external threats  Secured Hosting
  • 30. PCI Requirements for Credit Cards www.ebusinessmantra.com
  • 31. OWASP Top 10 vulnerabilities – set by worldwide security experts www.ebusinessmantra.com
  • 32. Section 6 of PCI DSS www.ebusinessmantra.com
  • 33. PCI DSS Requirements – web related www.ebusinessmantra.com
  • 34. Security Tools  WebApplication Scanner  WebApplication Firewall  Database Firewall www.ebusinessmantra.com  Database Firewall  Secured Hosting
  • 35. Demo – Vulnerability Scanning www.ebusinessmantra.com
  • 36. How can we help…  Security Assessment  Develop a strategy  Implement strategy  Training www.ebusinessmantra.com  Training
  • 37. Take away  Web presence and doing business on web is essential  Security should also be part of the web strategy  Internal and external threats  Develop a strategy for securing data www.ebusinessmantra.com  Develop a strategy for securing data  Take action  Call us if you need help with securing your digital assests.
  • 39. References  2012-DataBreachQuickView by Risk Based Security  The Cyber Crime Black Market – by Panda Security  Web Sites:  http://www.crn.com/slide-shows/security/240144596/the-top-10-security-breaches-of-2012.htm  http://www.esecurityplanet.com/network-security/salem-state-university-suffers-security-breach.html  http://datalossdb.org/incident_highlights/58-nothing-is-certain-but-death-taxes-and-identity-theft  http://www.securityweek.com/economic-update-cybercrime-economy-current-prices-black-market http://www.sbnonline.com/2012/01/your-personally-identifiable-information-it%E2%80%99s-valuable- www.ebusinessmantra.com  http://www.sbnonline.com/2012/01/your-personally-identifiable-information-it%E2%80%99s-valuable- to-someone/  http://it.toolbox.com/blogs/managing-infosec/google-hacking-master-list-28302  http://stopbadware.org  http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1761937/  http://www.howcast.com/guides/593-How-to-Maintain-Internet-Security-and-Privacy  http://www.ftc.gov/bcp/menus/consumer/tech/privacy.shtm  http://www.whitehouse.gov/files/documents/cyber/National%20Cyber%20Security%20Alliance%20- %20Harris+Online+Security+and+Privacy+Study.pdf
  • 40. Resources  OWASP www.owasp.org  Dataloss www.dataloss.org  Calculate your risk: https://databreachcalculator.com  Ebusinessmantra www.ebusinessmantra.com www.ebusinessmantra.com  Ebusinessmantra www.ebusinessmantra.com