Cloud, social networking
   and BYOD collide!




                     Peter Wood
                  Chief Executive Officer
                First•Base Technologies
Who is Peter Wood?


  Worked in computers & electronics since 1969
  Founded First Base in 1989 (one of the first ethical hacking firms)
  CEO First Base Technologies LLP
  Social engineer & penetration tester
  Conference speaker and security ‘expert’

  Member of ISACA Security Advisory Group
  Vice Chair of BCS Information Risk Management and Audit Group
  UK Chair, Corporate Executive Programme

  FBCS, CITP, CISSP, MIEEE, M.Inst.ISP
  Registered BCS Security Consultant
  Member of ACM, ISACA, ISSA, Mensa



Slide 2                                                                 © First Base Technologies 2012
Cloud




Slide 3           © First Base Technologies 2012
What's Different in Cloud
                                                           Security ~
                                                           THEM

     Security ~
     YOU                                                      SaaS
                                                        Software as a Service




               IaaS                   PaaS
                                Platform as a Service
          Infrastructure as a
                Service




Slide 4                                                              © First Base Technologies 2012
What's Different in Cloud




Slide 5                           © First Base Technologies 2012
What's Different in Cloud




Slide 6                           © First Base Technologies 2012
Just a little brainstorm




Slide 7                              © First Base Technologies 2012
Social Networking




Slide 8                       © First Base Technologies 2012
Yada yada yada

 • People have always talked about work to their friends
 • What has changed is the nature of how we interact
 • We talk about our lives on our blogs, on social networking sites such
   as Facebook and Twitter, and on message boards pertaining to the
   work we're doing
 • What was once intimate and ephemeral is now available to the whole
   world, indexed by Google, and archived for posterity
 • A good open-source intelligence gatherer can learn a lot about what a
   company is doing by monitoring its employees’ online activities
                                                               Bruce Schneier




Slide 9                                                    © First Base Technologies 2012
Social networks vulnerabilities




Slide 10                              © First Base Technologies 2012
Social networks vulnerabilities




Slide 11                              © First Base Technologies 2012
Why APT works




Slide 12                   © First Base Technologies 2012
BYOD




Slide 13          © First Base Technologies 2012
Data loss


           • Unencrypted storage and backup

           • Poor or missing passwords and PINs

           • No automatic screen lock

           • Mobile apps often store sensitive data such
             as banking and payment system PIN
             numbers, credit card numbers, or online
             service passwords



Slide 14                                                   © First Base Technologies 2012
Network spoofing

     • Mobile devices use wireless
           communications exclusively and
           often public WiFi

     • SSL can fall victim to a downgrade
           attack if app allows degrading
           HTTPS to HTTP

     • SSL could also be compromised if
           app does not fail on invalid
           certificates, enabling MITM attacks

Slide 15                                         © First Base Technologies 2012
Spyware




           http://www.f-secure.com/en/web/labs_global/whitepapers/reports

Slide 16                                                              © First Base Technologies 2012
UI impersonation

       • Malicious app creates UI that impersonates that of the
         phone’s native UI or the UI of a legitimate application
       • Victim is asked to authenticate and ends up sending
         their credentials to an attacker




 http://blogs.mcafee.com/mcafee-labs/android-malware-pairs-man-in-the-middle-with-remote-controlled-banking-trojan

Slide 17                                                                                 © First Base Technologies 2012
BYOD risks

           •   Data loss: a stolen or lost phone with unprotected memory allows an
               attacker to access the data on it
           •   Unintentional data disclosure: most apps have privacy settings but
               many users are unaware that data is being transmitted, let alone know of
               the existence of the settings to prevent this
           •   Network spoofing attacks: an attacker deploys a rogue network access
               point and intercepts user’s data or conducts MITM attacks
           •   Phishing: an attacker collects user credentials using fake apps or
               messages that seem genuine.
           •   Spyware: the smartphone has spyware installed allowing an attacker to
               access or infer personal data
           •   Surveillance: spying using open microphone and/or camera
           •   Diallerware: an attacker steals money from the user by means of
               malware that makes hidden use of premium SMS services or numbers.
           •   Financial malware: malware specifically designed for stealing credit card
               numbers, online banking credentials or subverting online banking or
               ecommerce transactions.

Slide 18                                                                   © First Base Technologies 2012
The Collision




Slide 19                   © First Base Technologies 2012
How Security sees Management?




Slide 20                           © First Base Technologies 2012
How Management sees Security?




Slide 21                           © First Base Technologies 2012
The Solution?




Slide 22                   © First Base Technologies 2012
Make it real!



           Identify real threats


                     Identify real impact


                                   Demonstrate the risk



Slide 23                                        © First Base Technologies 2012
Now for the science bit …




Slide 24                           © First Base Technologies 2012
Business Impact Level

           A successful exploit will result in compromise of
           Confidentiality, Integrity or Availability of an asset
           • Level 1: negligible impact
           • Level 2: limited consequences
           • Level 3: significant impact
           • Level 4: very high impact, requiring external
             assistance and possible financial support
           • Level 5: major risk which seriously endangers
             business processes and prevents continuity


Slide 25                                                  © First Base Technologies 2012
Threat Actors


           • System and Service Users
             - Regular users, admins, end users, shared service users
           • Direct Connections
             - Service providers, other business units
           • Indirect Connections
             - Network users, internet users
           • Supply Chain
             - Developers, hardware support
           • Physically Present
             - Regular users, admins, visitors, war drivers, intruders


Slide 26                                                  © First Base Technologies 2012
Threat Actor Capability

           1. Very little: almost no capabilities or
              resources

           2. Little: an average untrained computer user

           3. Limited: a trained computer user

           4. Significant: a full-time well-educated
              computer expert using publicly available
              tools

           5. Formidable: a full-time well-educated
              computer expert using bespoke attacks


Slide 27                                               © First Base Technologies 2012
Threat Actor Motivation


           1. Very low: Indifferent

           2. Low: Curious

           3. Medium: Interested

           4. High: Committed

           5. Very high: Focused




Slide 28                              © First Base Technologies 2012
Threat = Capability x Motivation




Slide 29                              © First Base Technologies 2012
Example Threat Actor Analysis




Slide 30                            © First Base Technologies 2012
Risk = Impact x Threat




Slide 31                            © First Base Technologies 2012
Example Risk for Impact Level of 3




Slide 32                               © First Base Technologies 2012
Example Prioritised Risk List




Slide 33                             © First Base Technologies 2012
Run a Workshop




Slide 34                    © First Base Technologies 2012
Now you’ve added value!




Slide 35                         © First Base Technologies 2012
Or …



           Management          Security




Slide 36                            © First Base Technologies 2012
Which results in …




Slide 37                        © First Base Technologies 2012
Need more information?


                Peter Wood
               Chief Executive Officer
           First Base Technologies LLP

            peterw@firstbase.co.uk

                http://firstbase.co.uk
               http://white-hats.co.uk
               http://peterwood.com

                Twitter: peterwoodx




Slide 38                                 © First Base Technologies 2012

More Related Content

PPT
Out of the Blue: Responding to New Zero-Day Threats
PPT
Emerging Threats and Attack Surfaces
PDF
The Cloud Security Landscape
PPTX
Unpatched Systems: An Ethical Hacker's View
PPSX
MBM's InterGuard Security Suite
PDF
Protecting Data on Laptops
PDF
White Paper: Securing Nomadic Workforce
PDF
The Need For Open Software Security Standards In A Mobile And Cloudy World
Out of the Blue: Responding to New Zero-Day Threats
Emerging Threats and Attack Surfaces
The Cloud Security Landscape
Unpatched Systems: An Ethical Hacker's View
MBM's InterGuard Security Suite
Protecting Data on Laptops
White Paper: Securing Nomadic Workforce
The Need For Open Software Security Standards In A Mobile And Cloudy World

What's hot (20)

PDF
Cyberoam: il futuro della network security!
PPTX
Hp Fortify Pillar
PDF
Applied mobile chaos theory
PPTX
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
PDF
Distance Learning Technologies
PDF
The Darkside of Mobile Applications
PDF
Security White Paper
PDF
VIPRE Business Takes a Bite out of Bloatware
PDF
Threat model express agile 2012
PDF
Security Threats for SMBs
PDF
Distance Learning Technologies
PDF
Patch management
PDF
Trend Micro - Virtualization and Security Compliance
PPTX
Ensure Software Security already during development
PDF
Appsec Introduction
PDF
Skeletons in the Closet: Securing Inherited Applications
PDF
Network Environments
PDF
Polk County Sheriffs Office Success Story
DOCX
Ayman Hamed (1)-2
PPTX
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Cyberoam: il futuro della network security!
Hp Fortify Pillar
Applied mobile chaos theory
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Distance Learning Technologies
The Darkside of Mobile Applications
Security White Paper
VIPRE Business Takes a Bite out of Bloatware
Threat model express agile 2012
Security Threats for SMBs
Distance Learning Technologies
Patch management
Trend Micro - Virtualization and Security Compliance
Ensure Software Security already during development
Appsec Introduction
Skeletons in the Closet: Securing Inherited Applications
Network Environments
Polk County Sheriffs Office Success Story
Ayman Hamed (1)-2
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012

Similar to Cloud, social networking and BYOD collide! (20)

PPT
Security Intelligence: Advanced Persistent Threats
PDF
Mobile Threats and Owasp Top 10 Risks
PPTX
Attacking the cloud with social engineering
PPTX
Mobile Workplace Risks
PDF
Waterfall Security Solutions Overview Q1 2012
PDF
Top Strategies to Capture Security Intelligence for Applications
PPTX
Building A Cloud-Ready Security Program
PDF
Software Security for Project Managers: What Do You Need To Know?
PPTX
Key Resources - z/Assure Sales Presentation
PPTX
Stopping the Adobe, Apple and Java Software Updater Insanity
PPTX
Challenges2013
PDF
Cloud Computing Risk Management (Multi Venue)
PDF
Best practices for mobile enterprise security and the importance of endpoint ...
PDF
Session 4 Enterprise Mobile Security
PDF
Securing the Human (人を守るセキュリティ)
PDF
Uncover Vulnerabilities Beyond Software Vulnerabilities
PPTX
Big Data and Security - Where are we now? (2015)
PPTX
Security Management in the Cloud
PDF
Detect & Remediate Malware & Advanced Targeted Attacks
PPTX
Critical Infrastructure Security by Subodh Belgi
Security Intelligence: Advanced Persistent Threats
Mobile Threats and Owasp Top 10 Risks
Attacking the cloud with social engineering
Mobile Workplace Risks
Waterfall Security Solutions Overview Q1 2012
Top Strategies to Capture Security Intelligence for Applications
Building A Cloud-Ready Security Program
Software Security for Project Managers: What Do You Need To Know?
Key Resources - z/Assure Sales Presentation
Stopping the Adobe, Apple and Java Software Updater Insanity
Challenges2013
Cloud Computing Risk Management (Multi Venue)
Best practices for mobile enterprise security and the importance of endpoint ...
Session 4 Enterprise Mobile Security
Securing the Human (人を守るセキュリティ)
Uncover Vulnerabilities Beyond Software Vulnerabilities
Big Data and Security - Where are we now? (2015)
Security Management in the Cloud
Detect & Remediate Malware & Advanced Targeted Attacks
Critical Infrastructure Security by Subodh Belgi

More from Peter Wood (20)

PPTX
Hacking is easy: understanding your vulnerabilities
PPTX
The future of cloud security
PPTX
The 2018 Threatscape
PDF
Introduction to Cyber Resilience
PPTX
Network security, seriously?
PPTX
Lessons from a Red Team Exercise
PPTX
Red teaming in the cloud
PPTX
All your files now belong to us
PPTX
Network Security - Real and Present Dangers
PPTX
Advanced Threat Protection: Lessons from a Red Team Exercise
PPTX
Pragmatic Network Security - Avoiding Real-World Vulnerabilities
PPTX
Advanced threat protection and big data
PPTX
Prime Targets in Network Infrastructure
PPT
Social Networking - An Ethical Hacker's View
PPT
Top Five Internal Security Vulnerabilities
PPT
The Consumerisation of Corporate IT
PDF
Security in a Virtualised Environment
PPT
The Corporate Web Security Landscape
PDF
The Ultimate Defence - Think Like a Hacker
PDF
Security Testing in an Age of Austerity
Hacking is easy: understanding your vulnerabilities
The future of cloud security
The 2018 Threatscape
Introduction to Cyber Resilience
Network security, seriously?
Lessons from a Red Team Exercise
Red teaming in the cloud
All your files now belong to us
Network Security - Real and Present Dangers
Advanced Threat Protection: Lessons from a Red Team Exercise
Pragmatic Network Security - Avoiding Real-World Vulnerabilities
Advanced threat protection and big data
Prime Targets in Network Infrastructure
Social Networking - An Ethical Hacker's View
Top Five Internal Security Vulnerabilities
The Consumerisation of Corporate IT
Security in a Virtualised Environment
The Corporate Web Security Landscape
The Ultimate Defence - Think Like a Hacker
Security Testing in an Age of Austerity

Recently uploaded (20)

PDF
EGCB_Solar_Project_Presentation_and Finalcial Analysis.pdf
PPTX
Information-Technology-in-Human-Society (2).pptx
PDF
Applying Agentic AI in Enterprise Automation
PDF
Human Computer Interaction Miterm Lesson
PDF
Fitaura: AI & Machine Learning Powered Fitness Tracker
PDF
substrate PowerPoint Presentation basic one
PDF
Intravenous drug administration application for pediatric patients via augmen...
PPTX
Slides World Game (s) Great Redesign Eco Economic Epochs.pptx
PDF
CCUS-as-the-Missing-Link-to-Net-Zero_AksCurious.pdf
PDF
“Introduction to Designing with AI Agents,” a Presentation from Amazon Web Se...
PDF
Secure Java Applications against Quantum Threats
PDF
Slides World Game (s) Great Redesign Eco Economic Epochs.pdf
PPTX
AQUEEL MUSHTAQUE FAKIH COMPUTER CENTER .
PPTX
Blending method and technology for hydrogen.pptx
PPTX
Strategic Picks — Prioritising the Right Agentic Use Cases [2/6]
PPTX
Information-Technology-in-Human-Society.pptx
PDF
Be ready for tomorrow’s needs with a longer-lasting, higher-performing PC
PDF
Altius execution marketplace concept.pdf
PDF
FASHION-DRIVEN TEXTILES AS A CRYSTAL OF A NEW STREAM FOR STAKEHOLDER CAPITALI...
PDF
Peak of Data & AI Encore: Scalable Design & Infrastructure
EGCB_Solar_Project_Presentation_and Finalcial Analysis.pdf
Information-Technology-in-Human-Society (2).pptx
Applying Agentic AI in Enterprise Automation
Human Computer Interaction Miterm Lesson
Fitaura: AI & Machine Learning Powered Fitness Tracker
substrate PowerPoint Presentation basic one
Intravenous drug administration application for pediatric patients via augmen...
Slides World Game (s) Great Redesign Eco Economic Epochs.pptx
CCUS-as-the-Missing-Link-to-Net-Zero_AksCurious.pdf
“Introduction to Designing with AI Agents,” a Presentation from Amazon Web Se...
Secure Java Applications against Quantum Threats
Slides World Game (s) Great Redesign Eco Economic Epochs.pdf
AQUEEL MUSHTAQUE FAKIH COMPUTER CENTER .
Blending method and technology for hydrogen.pptx
Strategic Picks — Prioritising the Right Agentic Use Cases [2/6]
Information-Technology-in-Human-Society.pptx
Be ready for tomorrow’s needs with a longer-lasting, higher-performing PC
Altius execution marketplace concept.pdf
FASHION-DRIVEN TEXTILES AS A CRYSTAL OF A NEW STREAM FOR STAKEHOLDER CAPITALI...
Peak of Data & AI Encore: Scalable Design & Infrastructure

Cloud, social networking and BYOD collide!

  • 1. Cloud, social networking and BYOD collide! Peter Wood Chief Executive Officer First•Base Technologies
  • 2. Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base in 1989 (one of the first ethical hacking firms) CEO First Base Technologies LLP Social engineer & penetration tester Conference speaker and security ‘expert’ Member of ISACA Security Advisory Group Vice Chair of BCS Information Risk Management and Audit Group UK Chair, Corporate Executive Programme FBCS, CITP, CISSP, MIEEE, M.Inst.ISP Registered BCS Security Consultant Member of ACM, ISACA, ISSA, Mensa Slide 2 © First Base Technologies 2012
  • 3. Cloud Slide 3 © First Base Technologies 2012
  • 4. What's Different in Cloud Security ~ THEM Security ~ YOU SaaS Software as a Service IaaS PaaS Platform as a Service Infrastructure as a Service Slide 4 © First Base Technologies 2012
  • 5. What's Different in Cloud Slide 5 © First Base Technologies 2012
  • 6. What's Different in Cloud Slide 6 © First Base Technologies 2012
  • 7. Just a little brainstorm Slide 7 © First Base Technologies 2012
  • 8. Social Networking Slide 8 © First Base Technologies 2012
  • 9. Yada yada yada • People have always talked about work to their friends • What has changed is the nature of how we interact • We talk about our lives on our blogs, on social networking sites such as Facebook and Twitter, and on message boards pertaining to the work we're doing • What was once intimate and ephemeral is now available to the whole world, indexed by Google, and archived for posterity • A good open-source intelligence gatherer can learn a lot about what a company is doing by monitoring its employees’ online activities Bruce Schneier Slide 9 © First Base Technologies 2012
  • 10. Social networks vulnerabilities Slide 10 © First Base Technologies 2012
  • 11. Social networks vulnerabilities Slide 11 © First Base Technologies 2012
  • 12. Why APT works Slide 12 © First Base Technologies 2012
  • 13. BYOD Slide 13 © First Base Technologies 2012
  • 14. Data loss • Unencrypted storage and backup • Poor or missing passwords and PINs • No automatic screen lock • Mobile apps often store sensitive data such as banking and payment system PIN numbers, credit card numbers, or online service passwords Slide 14 © First Base Technologies 2012
  • 15. Network spoofing • Mobile devices use wireless communications exclusively and often public WiFi • SSL can fall victim to a downgrade attack if app allows degrading HTTPS to HTTP • SSL could also be compromised if app does not fail on invalid certificates, enabling MITM attacks Slide 15 © First Base Technologies 2012
  • 16. Spyware http://www.f-secure.com/en/web/labs_global/whitepapers/reports Slide 16 © First Base Technologies 2012
  • 17. UI impersonation • Malicious app creates UI that impersonates that of the phone’s native UI or the UI of a legitimate application • Victim is asked to authenticate and ends up sending their credentials to an attacker http://blogs.mcafee.com/mcafee-labs/android-malware-pairs-man-in-the-middle-with-remote-controlled-banking-trojan Slide 17 © First Base Technologies 2012
  • 18. BYOD risks • Data loss: a stolen or lost phone with unprotected memory allows an attacker to access the data on it • Unintentional data disclosure: most apps have privacy settings but many users are unaware that data is being transmitted, let alone know of the existence of the settings to prevent this • Network spoofing attacks: an attacker deploys a rogue network access point and intercepts user’s data or conducts MITM attacks • Phishing: an attacker collects user credentials using fake apps or messages that seem genuine. • Spyware: the smartphone has spyware installed allowing an attacker to access or infer personal data • Surveillance: spying using open microphone and/or camera • Diallerware: an attacker steals money from the user by means of malware that makes hidden use of premium SMS services or numbers. • Financial malware: malware specifically designed for stealing credit card numbers, online banking credentials or subverting online banking or ecommerce transactions. Slide 18 © First Base Technologies 2012
  • 19. The Collision Slide 19 © First Base Technologies 2012
  • 20. How Security sees Management? Slide 20 © First Base Technologies 2012
  • 21. How Management sees Security? Slide 21 © First Base Technologies 2012
  • 22. The Solution? Slide 22 © First Base Technologies 2012
  • 23. Make it real! Identify real threats Identify real impact Demonstrate the risk Slide 23 © First Base Technologies 2012
  • 24. Now for the science bit … Slide 24 © First Base Technologies 2012
  • 25. Business Impact Level A successful exploit will result in compromise of Confidentiality, Integrity or Availability of an asset • Level 1: negligible impact • Level 2: limited consequences • Level 3: significant impact • Level 4: very high impact, requiring external assistance and possible financial support • Level 5: major risk which seriously endangers business processes and prevents continuity Slide 25 © First Base Technologies 2012
  • 26. Threat Actors • System and Service Users - Regular users, admins, end users, shared service users • Direct Connections - Service providers, other business units • Indirect Connections - Network users, internet users • Supply Chain - Developers, hardware support • Physically Present - Regular users, admins, visitors, war drivers, intruders Slide 26 © First Base Technologies 2012
  • 27. Threat Actor Capability 1. Very little: almost no capabilities or resources 2. Little: an average untrained computer user 3. Limited: a trained computer user 4. Significant: a full-time well-educated computer expert using publicly available tools 5. Formidable: a full-time well-educated computer expert using bespoke attacks Slide 27 © First Base Technologies 2012
  • 28. Threat Actor Motivation 1. Very low: Indifferent 2. Low: Curious 3. Medium: Interested 4. High: Committed 5. Very high: Focused Slide 28 © First Base Technologies 2012
  • 29. Threat = Capability x Motivation Slide 29 © First Base Technologies 2012
  • 30. Example Threat Actor Analysis Slide 30 © First Base Technologies 2012
  • 31. Risk = Impact x Threat Slide 31 © First Base Technologies 2012
  • 32. Example Risk for Impact Level of 3 Slide 32 © First Base Technologies 2012
  • 33. Example Prioritised Risk List Slide 33 © First Base Technologies 2012
  • 34. Run a Workshop Slide 34 © First Base Technologies 2012
  • 35. Now you’ve added value! Slide 35 © First Base Technologies 2012
  • 36. Or … Management Security Slide 36 © First Base Technologies 2012
  • 37. Which results in … Slide 37 © First Base Technologies 2012
  • 38. Need more information? Peter Wood Chief Executive Officer First Base Technologies LLP [email protected] http://firstbase.co.uk http://white-hats.co.uk http://peterwood.com Twitter: peterwoodx Slide 38 © First Base Technologies 2012

Editor's Notes

  • #5: The lower down the stack the Cloud provider stops, the more security you are tactically responsible for implementing & managing yourself.