Presentation is loading. Please wait.

Presentation is loading. Please wait.

Is Commercial Technology All That Threatening? Colin Rose Quarter Past Five Limited “The Dual Use of Technology” Wednesday 4 th June 2008 SHAPE Club,

Similar presentations


Presentation on theme: "Is Commercial Technology All That Threatening? Colin Rose Quarter Past Five Limited “The Dual Use of Technology” Wednesday 4 th June 2008 SHAPE Club,"— Presentation transcript:

1

2

3 Is Commercial Technology All That Threatening? Colin Rose Quarter Past Five Limited “The Dual Use of Technology” Wednesday 4 th June 2008 SHAPE Club, Mons

4

5 Some Themes Requirements Future Development A Commercial Mindset

6 Some Themes Requirements Future Development A Commercial Mindset

7 Requirements Understanding what you want? Commodity – Value Proposition How Secure does it have to be? Available Accurate Exclusive Where do “Features” fit into the requirements?

8 Understand What You Are Asking For Men are from Mars Women are from Venus Business people speak “board-room” IT people speak “server-room” Political people speak XXXX Military people speak XXXX Military requirements must be met Commercial salesmen WILL NOT SAY NO

9 Some Themes Requirements Future Development A Commercial Mindset

10 Future Developments Commercial Technology Services Commerce Small Military Fish in Big Commercial Ocean Commercial Drivers Technological Drivers Economic and Market Drivers Are You Happy Being Connected to the Commercial World? E.g. the ubiquitous product update mindset?

11 Some Themes Requirements Future Development A Commercial Mindset

12 Commercial Mindset Feature Rich Fix It When It Goes Wrong Adopt and Adapt Technologies

13 Questions – Not Answers Is Commercial Technology All That Threatening? Could Be!! Understand Your Requirements Understand Your Supplier Forewarned is Forearmed

14 An Un-Commercial Mindset Commercial V Mercenary Is the Technology Better or Worse? Does it Matter? Is the Solution Better or Worse? This Matters!

15 Technology Can Get In The Way More information does not mean more understanding Photocopying lecture notes does not mean that you understood the lecture Quotation Game “Don’t be too proud of this technological terror you have constructed.”  Darth Vader

16 The Enemy Without - The Enemy WithinThe Enemy Within The Enemy of What? (What is it against?) Securing against something? or- Securing for something? Understand what you are dealing with Define your Systems? Technically and effectively. Making Your Systems Work (not just the technology) Who is on your network -  

17 Alternative Uses of Technology Google – A Case in Point Unofficial Slogan “Don’t Be Evil” But Is a Spoon Dangerous?

18 Google Hacking

19 Google Hacking A Note of Caution

20 What You Could Get Up To ! The Old Times Copyright Confidentiality Anarchy and theft Credit card fraud Telephone fraud Lock picking

21 More Old Fun Denial of Service Steganography Spoofs and sucksites Virus creation Password crackers Music & Movies

22 A Word About The Future (Or is that the past?) People Process Technology No matter how much the technology changes, the individuals change, even how much the environment changes. There are still some things that remain the same

23 To re-cap…. Technology is ambivalent The solution goes beyond the technology Risk management V Risk avoidance Assess all the factors Progress accordingly Technology Value PropositionCommodity ?

24 Thank You

25 What are the drawbacks? Of increased user internet and e-mail access “Users; who would have them?” Users do not know what to do Users mess things up Users are lazy Users change things Users are a maverick component

26 What are the consequences? Of increased user internet and e-mail access “Users; what would you do without them?” Users need to be told what to do (and what not to do) Users are the main reason why you have a computer network Users are the larger half of your information systems Users can spot problems Users need to be “configured”, you just need to understand how to “configure” them.

27 Fred Smith, currently on placement, can always be found hard at work at his desk. Fred works independently, without wasting company time talking to colleagues. Fred never thinks twice about assisting fellow employees, and he always finishes given assignments on time. Often Fred takes extended measures to complete his work, sometimes skipping coffee breaks. Fred is an individual who has absolutely no vanity in spite of his high accomplishments and profound knowledge in his field. I firmly believe that Fred can be classed as a high-caliber asset, the type which cannot be dispensed with. Consequently, I duly recommend that Fred be offered permanent employment here, and a proposal be executed as soon as possible. Steganography

28 Fred Smith, currently on placement, can always be found wasting company time talking to colleagues. Fred never finishes given assignments on time. Often Fred takes extended breaks. Fred is an individual who has absolutely no knowledge in his field. I firmly believe that Fred can be dispensed with. Consequently, I duly recommend that Fred be executed as soon as possible.

29 Confidentiality Inadvertent disclosure (MS Word)MS Word Cached information (Hotel Phoenix)Hotel Phoenix Revelation Phishing

30

31

32 We Control The Vertical…….

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50 Anyone Want To Go Shopping?

51

52

53

54

55

56

57

58

59

60

61

62 Getting Personal

63

64 Keeping it Personal (Not)

65

66 Rumbled  !!

67 What is Google? It’s a Search Engine! Well – Yes But …. There is a Lot More

68 What Google Is It has Spiders It is a Database There is a Simple Web Interface a BIG Database

69 Why is the Google Database Interesting? It Records What You Don’t Want it to Look at Robots Robots It Doesn’t Only Record Web Page Where it is e.g. in Title or in URL Where it is e.g. in Title or in URL It Stores Details From Your Servers Allowing us to find what you might not want us to Allowing us to find what you might not want us to If You Mess Up – It Tells The World It Finds Your Target For You

70 Google Does Draw The Line Slightly

71 Robots Clicking on this link

72 From Disallowed List

73

74 For The Truly Lazy Among Us The old “script kiddie” mentality G2P.org

75 Lock (picking) Guide

76


Download ppt "Is Commercial Technology All That Threatening? Colin Rose Quarter Past Five Limited “The Dual Use of Technology” Wednesday 4 th June 2008 SHAPE Club,"

Similar presentations


Ads by Google