410 likes | 548 Views
Identities, Digital Threats and Games. Yanki Margalit Aladdin Knowledge Systems Jan 2005. Prepare for Fusion. Identities and digital identities Assets and digital assets Threats and digital treats Security vs. privacy Hacking as a way of life Define identity, reality and games.
E N D
Identities, Digital Threats and Games Yanki Margalit Aladdin Knowledge Systems Jan 2005
Prepare for Fusion • Identities and digital identities • Assets and digital assets • Threats and digital treats • Security vs. privacy • Hacking as a way of life • Define identity, reality and games
CIA – the foundation ofdigital security • Confidentiality • We want to keep secrets • Integrity • We want to keep data and information’s integrity • Availability • We want data and information to be available all time
Identity & Identification • We need to authenticate ourselves for contradicting reasons: • Security & confidentiality • Privacy • Business and other value transactions • Access rights • We need strong authentication • User name • Password • A token / smart card • A One time password • A biometric print • A photo ID
Passwords Are Unsecured and Costly to Manage A typical user can have more than 10 passwords! • Up to 70% of help desk calls are password related • Average of 4 password-related help desk calls per year • The cost per password reset is between $30 – $140 A 1,000 employee organization can spend $150,000 a year or more on password-related help desk calls!!! Analysts and security specialists report:
Analyst View: Gartner “Passwords remain a fundamental security weakness, regardless of the strength of the password policy.” • Strong Authentication: “Use passwords or PINs in conjunction with another authentication method, such as a hardware token.” • Password Management: “Implement password management systems to alleviate technical and procedural vulnerabilities.” Two recommendations for reducing password issues: Source: Gartner report, “Assess Authentication Methods for Strong System Security”, August 2004
Aladdin eToken Simple & Strong User Authentication eToken provides strong two-factor user authentication Something you have- The eToken device Something you know- The eToken password
Now that you have an identity – Are you ready to enter the game?
The game is about • Fight • Make money • Progress • Win!
In Game In Life • Identity • Assets • Banks • Transactions • Information • Access rights • Privacy • Hacking • Spam • Phishing • Identity theft • Financial fraud • Business Intelligence When people ask Gibson about cyberspace today, he often tells them, "It's where the bank keeps your money."
UK Government Warns of Massive Trojan Attack By Paul F. Roberts June 16, 2005 A U.K. critical infrastructure monitoring group is warning public and private sector organizations about a wave of electronic attacks that have compromised critical networks in Britain with Trojan horse programs in recent months. Major Recent Trojans
Curiosity? Political Trojan? Censorship? Yusufali Trojan. September, 2005
Phishing: more and smarter It started from bank fraud attempts http://68.255.44.238:87/%63%69%74/%69%6E%64%65%78%2E%68%74%6D
Phishing: more and smarter Now getting smarter with email accounts
Why do people click on YES? Because they are conditioned to…
XP SP2 Security? Users just follow the instructions…
Why hack a private PC? Question: I am an ordinary person, why would anyonewant to break into my private PC? • Because they can… • Maybe you have somethinginteresting • Maybe you, a family member ora colleague could be blackmailed • Maybe they can find someinformation for later use(fraud, harassment) • Personal, bank, credit card • Turn your PC into a Zombie to: send spam, DoS, spyware server, phishing… • Exploit your PC to break into other systems
Want Free Items? I_am_here_4_you