© GMV, 2011 FROM SKIMMING TO THE LOGICAL FRAUD, THE NEWCOMING ATM RISK IT & Security Forum - Bucharest Bucharest, 11/10/2011 Reference: GMV-DESCOR-PR-0048.

Slides:



Advertisements
Similar presentations
Operating System Structures
Advertisements

Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
1. Intro What is PremiumAV? Antivirus engine Features of PremiumAV. Classification of PremiumAV. PremiumAV LAB Re-Branding or Private Label Why Re- Branding.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Factors to be taken into account when designing ICT Security Policies
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Norman Endpoint Protection Advanced security made easy.
1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.
Norman SecureSurf Protect your users when surfing the Internet.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
About Us Inception in 2001, Bitdefender has continued to raise the bar to set new standards in proactive threat prevention and virus removal. Offices.
SEC835 Database and Web application security Information Security Architecture.
Hands-On Microsoft Windows Server 2008
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
Lessons Learned in Smart Grid Cyber Security
Study Results Advanced Persistent Threat Awareness.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Managing Windows Server 2008 R2 Lesson 2. Objectives.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Copyright 2006 IDC Reproduction is forbidden unless authorized. All rights reserved. Information Security Trends.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Automating Enterprise IT Management by Leveraging Security Content Automation Protocol (SCAP) John M. Gilligan May, 2009.
© GMV, 2010 Propiedad de GMV Todos los derechos reservados EUROPEAN GNSS EGNOS AND GALILEO. CHARACTERISTICS AND ADVANTAGES OF BRUSSELS. OCTOBER 1 st, 2010.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Report to Mining Management on: Recommendation for Anti-Spyware to be installed in six (6) Personal Computers in the Mine Site Office.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
VMM Based Rootkit Detection on Android
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Phase 4: Manage Deployment
Lecture 1-Part 2: Operating-System Structures
Active Cyber Security, OnDemand
McAfee Issue Updating the antivirus with the most recent version accessible Activate security software suite.
Check Point Connectra NGX R60
How to Mitigate the Consequences What are the Countermeasures?
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
In the attack index…what number is your Company?
IT Security Solutions for Banking
Cybersecurity Simplified: Ransomware
Presentation transcript:

© GMV, 2011 FROM SKIMMING TO THE LOGICAL FRAUD, THE NEWCOMING ATM RISK IT & Security Forum - Bucharest Bucharest, 11/10/2011 Reference: GMV-DESCOR-PR-0048

© GMV, /10/2011Página 2IT & Security Forum - Bucharest

© GMV, 2011 Traditionally, a lot of attention has been paid to protect ATMs and their users: o Extensive deployment of physical security controls such as anti- skimmers, o Physical manipulation of ATMS is becoming more and more difficult for criminal gangs, o As a result criminal gangs are looking for riskless & sustainable sources of revenue. MALWARE: A GROWING THREAT FOR ATM 11/10/2011Page 3IT & Security Forum - Bucharest The arrival of MS Windows and IP networks has introduced a new and severe hazard for ATMs security very difficult to detect: Malware. The world is experiencing a paradigm shift regarding ATM attacks: o Attacks against ATMs using Malware is a clear trend in Eastern Europe and Latin America, and is becoming a reality in most advanced countries.

© GMV, 2011 Purpose of the Malware can be either to get cards data or ATM cash. Difficult to detect: Many security incidents in ATM networks provoked by malware infection are currently not being detected. Difficult to prosecute the criminals. Malicious Software: o To infect the ATM there are several options: direct access to the ATM (maybe by maintenance personnel) to install malicious software or injecting it over the network. o Developing this kind of malware is not a sophisticated task, specially for a well known open systems like Windows. o As an example, “Skimer” malware expanded in a few countries at the end of By means of a particularly built card, they were able to instruct the infected ATM to dispense cash. Lost cash was impossible to trace. o In the very near future this type of malware is expected to behave as a “worm” and be able to self-replicate in an ATM network. 11/10/2011Page 4IT & Security Forum - Bucharest MALWARE: A GROWING THREAT FOR ATM

© GMV, 2011 ATM network managers are facing the urgent need to install security controls against Malware. Traditional PC security vendors are adapting their antiviruses for ATMs. But traditional antivirus technology does not fit ATM security needs: o Classical antivirus yields on pattern based recognition algorithms: o No protection against new Malware attacks. o Need to continuous updating of a blacklist full of Malware designed for desktop PC. o They consume a lot of processing resources incompatible with ATM application required time of response. o Malware is evolving to use self-compiling technologies that result in customized versions with unique patterns, so that all instances of the malware look different for a classical antivirus. TRADITIONAL ANTIVIRUSES DON´T WORK 11/10/2011Page 5IT & Security Forum - Bucharest

© GMV, 2011 ATMs configuration and resources remain very stable. ATMs require one integrated security solution that does three simple tasks: o Generation and management of ATM-specific security policies, that could automatically be translated into rules for security controls. o Enforce these rules using one single, low footprint security process in the ATM. o Centralized monitoring of compliance, including all required audit features. An even more, the concept must evolve only following a roadmap suited to the needs of ATM networks and not constrained by the requirements coming from the huge desktop market. ATMs REQUIRE AN SPECIFIC APPROACH 11/10/2011Page 6IT & Security Forum - Bucharest

© GMV, 2011 Protection against unauthorized software execution: o Since an ATM is a well understood, controlled and stable environment, this should be achieved by means of white listing technology. o Permitted execution of software only when it is included in a so called “white list”, as opposed to “black listing”, which is the current antivirus technology. Protection against unauthorized use of libraries and drivers. Protection against unauthorized access to ATM hardware devices. Protection against unauthorized access to ATM’s files and folders. Protection against unauthorized execution of Java code. Integrity validation of executable files, libraries and drivers. Integrated Firewall to control communications on a per process basis. Configurable keyboard hook. Prevention of generic users and weak passwords. 11/10/2011Page 7IT & Security Forum - Bucharest SECURITY POLICIES

© GMV, 2011 CHECKER ATM SECURITY® BY GMV

© GMV, 2011 CHECKER ATM SECURITY ® 11/10/2011Page 9IT & Security Forum - Bucharest Checker ATM Security © is the first ever security product custom designed to protect ATM platforms and networks. Ensures a high-security ATM environment based in white listing technology to control processes, applications, libraries, devices, directories, communications and files integrity. Provides centralized management and alarms monitoring of ATM's security Checker ATM Security© supports PCI-DSS compliance.

© GMV, 2011 Multinational conglomerate founded in Offices in Spain, Portugal, Poland, USA, Germany, Romania and Malaysia. Customers in five continents, Over 1,000 employees all over the world. Roots tied to the Space and Defense industries, currently operating also in Security, Aeronautics, Transportation, Healthcare and ICT industries. Technology Leadership: o Leader in security systems for ATMs. o Ranked #1 Worldwide as Satellite Control Centre provider (Over 230 Satellite missions worldwide have used or are using GMV technology). o Only European company working in the ground segment of NASA. o Main responsible of safety critical systems of European GNSS systems (EGNOS and Galileo). o Since 1994 GMV is leader in GPS based telematic systems for the transport sector. GMV: A TECHNOLOGY MULTINATIONAL 11/10/2011Page 10IT & Security Forum - Bucharest

© GMV, 2011 CHECKER ATM SECURITY ® 11/10/2011Page 11IT & Security Forum - Bucharest Checker ATM Security © demo

© GMV, 2011 Thanks!