Vs The Illusion of Security. Aaron Barr : “Security Expert” CEO of security company HBGary Federal Provide Security Training Create Malicious Software.

Slides:



Advertisements
Similar presentations
INTERNET SAFETY Maureen Baron, M.A. English Montreal School Board.
Advertisements

Anonymous 20*20. Director of Security Intelligence for Akamai Technologies  Former Research Director, Enterprise Security [The 451 Group]  Former Principal.
Cyber Security and the Global Business Environment Jeremy Schaar:)
Anonymous vs. HBGary Jared DeMott Principle Security Researcher Crucial Security, Inc.
What is identity theft, and how can you protect yourself from it?
Social media threats. Warning! May contain mild peril.
WebCast 5 May 2003 NERC Cyber Security Standard Overview of Proposed Cyber Security Standard.
James Sees Senior Network Administrator Management Analyst Cyber Protection Strategies White Hall Business Association - Cyber Security & Awareness Conference.
Miguel E. Andrés. What is information leakage? An incident where the confidentiality of information has been compromised. Examples [2010] Gmail accounts.
Security+ Guide to Network Security Fundamentals
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Information Assurance Outreach. Overview Survey Results Password Security Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Threats to I.T Internet security By Cameron Mundy.
KEEPING YOUR FAMILY SAFE ONLINE Tips from a Parent Who is Paid to be Paranoid Aaron Ades AVP Cybersecurity at MetLife and Parent of Two Children of the.
Special Anatomy of an Attack Or Layered Security Failure.
Social impacts of the use of it By: Mohamed Abdalla.
The Financial Impact of Cyber Security 50 Questions Every CFO Should Ask A publication of the American National Standards Institute and the Internet Security.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
How tos, dos and please don’ts Landing the Interview.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Google Apps for Education Collaboration has never been so easy!
PREPARED BY: SHOUA VANG ABHINAV JUWA CHASE PAUL EASy Security Project Anonymous vs HBGary Inc.
The Security Circus.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Hurdles in implementation of cyber security in India.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Network Security. Announcements Review Assignment - Assessment 3 (due Tuesday, before class) Assessment 3 – Next Thursday Reminders: Network Design Project.
INTRODUCTION & QUESTIONS.
The Security Circus MPICT Summer Conference, June, 2011.
Introduction To Cyberlaw Presented By: Allison R. Seidel.
Social impacts of IT By Lewis dancocks. Social impacts Due to IT people around the world can commutate with each other anywhere at any time, this is due.
By: Delaney Syme and Megan Eglin.. When there is a very intense argument going on in a chat room or over texts it is called flaming. The bullies that.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
The Current State of Cyber Security and How to Defend Your Data.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Privacy, anonymity and other confusing words Przemek Jaroszewski CERT Polska/NASK.
Team Electronics Automation & Machinery S-17, DLF Ind. Area, Phase-1, Sec-32, Faridabad ,
TOTAL POLICING LDSC: Protecting London’s Business Community. Presentation to.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Safe Computing Protect your electronic profile means protecting You and Case Information Security Office, ITS Case Western Reserve University 2015 Information.
Law Firm Data Security: What In-house Counsel Need to Know
Social Engineering: The Human Element of Computer Security
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Forensics Week 11.
ციფრული მარკეტინგი ნიკოლოზ არჩვაძე.
Social Engineering No class today! Dr. X.
Internet Privacy and You
Chapter 5 Electronic Commerce | Security
European Conference of Electoral Management Bodies
Cyber Bullying.
Protecting Your Company’s Most Valuable Asset
E SAFETY ASSEMBLY.
Discussion Government Private Business Tools for prevention Congress
Election Security Presented by: michelle K. tassinari Director and Legal counsel Elections division Office of the secretary of the commonwealth.
Presentation transcript:

vs The Illusion of Security

Aaron Barr : “Security Expert” CEO of security company HBGary Federal Provide Security Training Create Malicious Software Develop tactics to squash dissent and shape public opinion "They think I have nothing but a heirarchy based on IRC [Internet Relay Chat] aliases!" he wrote. "As 1337 as these guys are suppsed to be they don't get it. I have pwned them! :)"

Bank Of America vs Wikileaks planting fake documents with the group and then attacking them when published "creating concern over the security" of the site "cyber attacks against the infrastructure to get data on document submitters" "media campaign to push the radical and reckless nature of wikileaks activities." Many of those proposals were also featured prongs of a secret 2008 Pentagon plan to destroy WikiLeaks. a secret 2008 Pentagon plan

From thinkprogress.org: ThinkProgress has learned that the U.S. Chamber of Commerce, the big business trade association representing ExxonMobil, AIG, and other major international corporations, is working with set of "private security" companies and lobbying firms to undermine their political opponents, including ThinkProgress, with a surreptitious sabotage campaign. The core proposals called for snooping on the families of progressive activists, creating phony identities to penetrate progressive organizations, creating bots to “scrape” social media for information, and submitting fake documents to Chamber opponents as a false flag trick to discredit progressive organizations. Hunton & Williams LLP Named a 'Top Environmental Firm' by Law360 01/28/11 Hunton & Williams LLP Uncontested as Top Privacy Adviser in Computerworld Poll 02/07/11

PERSONA MANAGEMENT

Anonymous Retaliates LOIC Low Orbit Ion Cannon DoS attacks SQL Injections, Rainbow Tables Weak Passwords found, belonging to… “Why are you going to sell this information to the FBI when we are going to give it to them for free?”

Your Password is WEAK CEO Aaron Barr & COO Ted Vera 6 lower case letters and 2 numbers ALSO USED FOR: Twitter Linked-In SSH HBGary used Google Apps, and Aaron’s account was an administrator for all of them.

HBGary pulls out of RSA Conference "We had to pull out of the RSA Conference (in San Francisco) because at our booth, we found vandalism placed stating that Anonymous was intending to take the threats to the physical space," said Jim Butterworth, vice president of services at HB Gary. "The threats aren't limited to cyberspace anymore. It's gone beyond the RJ-45 jack to real people and real addresses."