SlideShare una empresa de Scribd logo
1 de 22
Applied Networking-IV (2231114)
             Lecture Week-5
            Mobile Security-1




            Lecture by: Djadja.Sardjana, S.T., M.M.
                        Djadja.Sardjana,
                  www.slideshare.net/djadja
              Djadja.sardjana@widyatama.ac.id
18-Mar-10
18-Mar-               Widyatama University-Informatics
                                University-              1
Mobile Security-1
                   Security-




                          Mobile
                         Security




18-Mar-10
18-Mar-       Widyatama University-Informatics
                        University-              2
The New Age of Risk
         Ubiquitous internet protocol-based
                              protocol-
        technology
        (Almost) everything connects to the ‘Net
        Many vulnerabilities awaiting exploitation
        Mobility of people / information / devices
        Cyber crime: real and increasing
        Terrorist threat: physical now….blended
        later?


18-Mar-10
18-Mar-             Widyatama University-Informatics
                              University-              3
Hostile World
      9-11, 3-11, 7-7 and other major terror attacks
            3-    7-

      Wars and insurgencies

      SARS / Bird flu - global impact of disease

      SE Asia tsunami disaster

      Katrina hurricane disaster in USA

      Tomorrow’s headlines…?


18-Mar-10
18-Mar-              Widyatama University-Informatics
                               University-              4
Convergence Of Legal, IT,
                 And Business
   Laws/Regulations              Technologies              Stakeholders


       EU Data                    Web / Internet            Customers
       Protect
                                    Databases               Competitors
   GLB/HIPAA/Patriot
   Sarbanes-Oxley                 Collaboration
                                                            Governments
  U.S. Identity Theft
       Law(s)?                       Wireless               Suppliers/
                                                            Partners
                                 Mobile Devices
                                                            Employees


   Pressure mounting on organizations to prove compliance with
      an increasing array of laws and regulations. This makes
            information security much more challenging.

18-Mar-10
18-Mar-                 Widyatama University-Informatics
                                  University-                             5
Dissolution of Perimeter
                       Hostile Internet Environment
    Joint Ventures                                            Contract Manufacture
                       “Organization Community”


                                                                   Contract Design

     Parts                         Un-trusted
                                   Un-
                                    Intranet

                                “Point defenses”                     Customers

            Services
                   s




                                  Transportation
18-Mar-10
18-Mar-                    Widyatama University-Informatics
                                     University-                                     6
Current State of Network Security

                                                                                                    Home/Remote
                                                                                                       Users

                                                                      Business Systems

                                                    Manufacturing
                       Research/Development


                              Intranet                                Labs

                                                                             Legacy Systems
                                                       HR Systems
                                                                Communication/
                                                                Messaging Systems




                                  Users      Finance/SOx
     Eroding Firewall Perimeter

                                                                Eroding Firewall Perimeter

                                                                                              Strategic Partners
                                                                                                   Suppliers
                                                                                                   Vendors
                                                                                                     Etc…
                                          Hackers
                                                                                    Hackers
            Mobile/Wireless



18-Mar-10
18-Mar-                                    Widyatama University-Informatics
                                                     University-                                                   7
Mobile Viruses on the rise
                                                              2004
               2005                                06-15-04: Cabir A
                                                   06-16-04: Cabir B
01-10-2005: Lasco A
01-10-                                             07-10-2004: WinCE/Dust
02-01-2005: Locknut.A
02-01-                                             08-06-2004: Brador
03-07-2005: Commwarrior
03-07-                                             11-19-04: Skulls A
03-04-2005: Dampig.A
03-04-                                             11-29-04: Skull B
                                                   12-09-04: Cabir C
03-18-2005: Drever
03-18-
                                                   12-09-04: Cabir D
04-04-2005: Mabir.A
04-04-                                             12-09-04: Cabir E
                                                   12-21-04: Cabir F
                                                   12-21-04: Cabir G
                                                   12-21-04: Skulls C
                                                   12-21-04: MGDropper
                                                   12-26-04: Cabir H
                                                   12-26-04: Cabir I



18-Mar-10
18-Mar-              Widyatama University-Informatics
                               University-                                  8
Wireless Enabled & Mobile
                Attacks
   Blue-
   Blue-jacking, bugging, snarfing, sniping
   Wardriving
   Malicious Mobile Code (Virus, Worms, Trojans)
   RFID Sniffing
   Denial of Service
   Web Application
   Spyware
   Social Engineering

18-Mar-10
18-Mar-           Widyatama University-Informatics
                            University-              9
Securing the Mobile Workforce
                                           As the person responsible
                                           for an organization you
                                           only have “control” in this
                                           space




                                           But mobile employees
                                           move throughout the
                                           entire set of possibilities




18-Mar-10
18-Mar-     Widyatama University-Informatics
                      University-                                    10
Effective Security is Complex
  PKI Manager
                       Centralized
                          Security
                                               Token Card        Other Security
                                                                                                                   Many parts & pieces
                                                Manager          Entity Manager
                     Policy Manager
                                                                                                                   Complex components
    Certificate
     Authority
                          Digital
                        Signature
                                              OS Security
                                              Management
                                                                 Single Sign-on
                                                                                                                   Too few qualified personnel
                                                                       Tools
     Interface          Interface                Tools
                                                                                                                      ~.005% of employees
                                                                                             Network

                                                                 Security Event
                                                                                                                   Lack of standards
Virus Interception   Security Policy       Cyberwall/Firewall
                                                                     Report                  Host-based
   & Correction        Distributor             Rule Base
                                                                    Writer(s)
                                                                                                                   Protection programs “custom
                                                                   Encryption
                                                                                             Application-based
                                                                                                                   built”
VPN Session or         Connection
                                           Application Proxy      Facilities for
    Tunnel
   Manager
                      Manager and
                        Logging
                                           Implementations          Network
                                                                  Connections
                                                                                             Authentication
                                                                                                                   Failure of weakest link (s)
                                                                                             Cryptography
VPN IPSec and
      VPN            Security Traffic         Application           Intrusion
  Connection         Event Analyzer         Logging Facility        Logging                  Anti-Virus
   Manager

                                                                                             Intrusion Detection

                     Security Event         Security Integrity      Intrusion
    Intrusion
                        Logging                 Manager            Prevention                Auditing
    Detection


                                                                                             Security Management

      Stateful            Packet                  Frame            Application
    Inspection          Inspection              Inspection         Inspection




       Security
                              Network Access                       Real-time
                            Control Interception                     Frame
   Filter Engine
                             and Enforcement                      Management
                                    Facility




     18-Mar-10
     18-Mar-                                                                       Widyatama University-Informatics
                                                                                             University-                                    11
Security Must Make Business Sense


                             OPTIMAL LEVEL OF SECURITY
                                 AT MINIMUM COST
       COST ($)
                                                                             SECURITY
                                                                              LEVEL




 COST OF SECURITY
COUNTERMEASURES

                                                         TOTAL COST




                    0%                     COST OF SECURITY           100%
                                              BREACHES



   18-Mar-10
   18-Mar-               Widyatama University-Informatics
                                   University-                                          12
Next Generation Security
   Zones and compartments
   Extensive use of cryptography
   Identity and access management
   “Opt in” for more protection

     Essential to enable seamless security !



18-Mar-10
18-Mar-           Widyatama University-Informatics
                            University-              13
Next Generation Design



             Internet
                                                                         Legacy Zone
                                                                      e.g. manufacturing
                                           Collaborative
                                             Systems
                  General Purpose
                     Systems

                                      Intranet Zone
   MOT ISP                          Seamless Mobility                                        Secure Zone
                   Not subject to
                    Regulation                                           Personal Regulated
                      Systems                                               Data Systems
                                                                                         SOX Compliant
                                                                                            Systems

                                        Availability Not Critical
                                               Systems

                  Custom Zone
                  Stand Alone
                                                       High Sensitivity Zone
                                                        Trade Secret, Race, age, ethnicity



     DMZ          QZ
     Zone       Zone




 18-Mar-10
 18-Mar-                            Widyatama University-Informatics
                                              University-                                                  14
Security is a Process
               Not a Product!
   Security is achieved by the combination of
        People
        Process
        Technology
   Protections Address:
        Prevention
        Detection
        Response
        Recovery

18-Mar-10
18-Mar-                   Widyatama University-Informatics
                                    University-              15
Traditional security programs align people, processes and
           technology to protect enterprise networks

 With seamless mobility, security must now expand to encompass the
 extended enterprise.




                                    People


                  Processes                            Policies
                                                                         QuickTime™ and a
                                                                     TIFF (LZW) decompressor
                                                                  are needed to see this picture.




                                 Technology
                                                                   RFID CHIP




18-Mar-10
18-Mar-                 Widyatama University-Informatics
                                  University-                                                       16
Securing Seamless Mobility:
Wireless/Mobility Risk Management

    Business-
    Business-focused understanding and
    prioritization of risks, vulnerabilities and
    countermeasures
    Include technical vulnerabilities as well as
    other key elements of the security program
    Assures most effective use of limited
    resources

18-Mar-10
18-Mar-          Widyatama University-Informatics
                           University-              17
Securing Seamless Mobility:
           Network Design
   Understand existing “wired” environment
   Build security into wireless network foundations
   Focus on points of connectivity, firewalls, DMZs,
   intrusion detection/prevention, VPNs and
   encryption
   Maximize wireless network availability,
   operational security and performance
   Secure devices in a system designed for
   security
18-Mar-10
18-Mar-           Widyatama University-Informatics
                            University-              18
Approach to Information Security

             INTERNAL IT

           Ensure the
        Confidentiality,
         Integrity, and
        Availability of
                            Product Security
          Motorola I/T                                  Services include
             Assets
                               Support
                                                        PROTECTING assets,
                            development of              DETECTING hostile
                             more secure                activities, RESPONDING to
       Wireless Security       Motorola                 incidents, and
           Services            products                 RECOVERING to limit
                                                        adverse business impacts
            Leverage our
             expertise to
               provide
              customer
              services




18-Mar-10
18-Mar-                     Widyatama University-Informatics
                                      University-                                   19
Tugas Mobile Security
      1.    0606022 - FIRMANSAYH APNET4
            Mobile Security
      2.    Genta Gemilang-Mobile Security
                   Gemilang-
      3.    Hillman Nurrachman-Mobile
                    Nurrachman-
            Security Software
      4.    Mobile Security - Farhan Atsani -
            0606P02


18-Mar-10
18-Mar-             Widyatama University-Informatics
                              University-              20
Conclusion & Final Words




                              Mobile
                              Security
                               Demo


18-Mar-10
18-Mar-           Widyatama University-Informatics
                            University-              21
Conclusion
   Threats to organizations are real and
   increasing, seamless mobility requires
   careful security planning
   Security incidents involving mobile and
   wireless environment are increasing
   Securing seamless mobility requires
   holistic approach that address people,
   process and technology

18-Mar-10
18-Mar-         Widyatama University-Informatics
                          University-              22

Más contenido relacionado

La actualidad más candente

Solving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtSolving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtRoopa Nadkarni
 
Data Breach from the Inside Out
Data Breach from the Inside Out Data Breach from the Inside Out
Data Breach from the Inside Out The Lorenzi Group
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File VirtualizationFindWhitePapers
 
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6Dr. Ahmed Al Zaidy
 
Developing a corporate intelligence strategy from online sources
Developing a corporate intelligence strategy from online sourcesDeveloping a corporate intelligence strategy from online sources
Developing a corporate intelligence strategy from online sourcesEnterprise Security Risk Management
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystemkpatrickwheeler
 
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...Global Business Events
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_AdamsJulius Adams
 
Internet of things
Internet of thingsInternet of things
Internet of thingsvarungoyal98
 
IRJET- Phishing Attack based on Visual Cryptography
IRJET-  	  Phishing Attack based on Visual CryptographyIRJET-  	  Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual CryptographyIRJET Journal
 
Digital Rights Management for Companies
Digital Rights Management for Companies Digital Rights Management for Companies
Digital Rights Management for Companies Canto
 
Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation baipgroup
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
 
McCord Security Plus Technology Solutions Capacity Statement 2010
McCord Security Plus Technology Solutions Capacity Statement 2010McCord Security Plus Technology Solutions Capacity Statement 2010
McCord Security Plus Technology Solutions Capacity Statement 2010emmettmccord
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2olambel
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDr. Raghavendra GS
 

La actualidad más candente (20)

Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Solving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtSolving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holt
 
E-commerce Security
E-commerce SecurityE-commerce Security
E-commerce Security
 
Data Breach from the Inside Out
Data Breach from the Inside Out Data Breach from the Inside Out
Data Breach from the Inside Out
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File Virtualization
 
Funsec3e ppt ch14
Funsec3e ppt ch14Funsec3e ppt ch14
Funsec3e ppt ch14
 
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6
 
Developing a corporate intelligence strategy from online sources
Developing a corporate intelligence strategy from online sourcesDeveloping a corporate intelligence strategy from online sources
Developing a corporate intelligence strategy from online sources
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystem
 
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IRJET- Phishing Attack based on Visual Cryptography
IRJET-  	  Phishing Attack based on Visual CryptographyIRJET-  	  Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
 
Digital Rights Management for Companies
Digital Rights Management for Companies Digital Rights Management for Companies
Digital Rights Management for Companies
 
Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation
 
Pdf7
Pdf7Pdf7
Pdf7
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
McCord Security Plus Technology Solutions Capacity Statement 2010
McCord Security Plus Technology Solutions Capacity Statement 2010McCord Security Plus Technology Solutions Capacity Statement 2010
McCord Security Plus Technology Solutions Capacity Statement 2010
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
 

Similar a Widyatama Lecture Applied Networking-IV Week05 Mobile Security 1

Widyatama Lecture Applied Networking IV Week03 Mobile Networking
Widyatama Lecture Applied Networking IV Week03 Mobile NetworkingWidyatama Lecture Applied Networking IV Week03 Mobile Networking
Widyatama Lecture Applied Networking IV Week03 Mobile NetworkingDjadja Sardjana
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docxaulasnilda
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...Ahmed Al Enizi
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetHarry Gunns
 
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01guest446b00
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
Fortinet - Digital Government Cloud Security 2.pptx
Fortinet - Digital Government Cloud Security 2.pptxFortinet - Digital Government Cloud Security 2.pptx
Fortinet - Digital Government Cloud Security 2.pptxThanhBoHoaluaVn
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
Disruptive Analysis Enterprise Networks for UK Spectrum Policy Forum
Disruptive Analysis   Enterprise Networks for UK Spectrum Policy ForumDisruptive Analysis   Enterprise Networks for UK Spectrum Policy Forum
Disruptive Analysis Enterprise Networks for UK Spectrum Policy ForumDean Bubley
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetRichardus Indrajit
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture Vrince Vimal
 
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, ArduinoParis Open Source Summit
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
Widyatama Lecture Applied Networking.IV Week02
Widyatama Lecture Applied Networking.IV Week02Widyatama Lecture Applied Networking.IV Week02
Widyatama Lecture Applied Networking.IV Week02Djadja Sardjana
 
Ernst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital worldErnst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital worldforumdavignon
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilAndris Soroka
 

Similar a Widyatama Lecture Applied Networking-IV Week05 Mobile Security 1 (20)

Widyatama Lecture Applied Networking IV Week03 Mobile Networking
Widyatama Lecture Applied Networking IV Week03 Mobile NetworkingWidyatama Lecture Applied Networking IV Week03 Mobile Networking
Widyatama Lecture Applied Networking IV Week03 Mobile Networking
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 
Chris Boyer
Chris BoyerChris Boyer
Chris Boyer
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
 
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Fortinet - Digital Government Cloud Security 2.pptx
Fortinet - Digital Government Cloud Security 2.pptxFortinet - Digital Government Cloud Security 2.pptx
Fortinet - Digital Government Cloud Security 2.pptx
 
Information security presentation
Information security presentationInformation security presentation
Information security presentation
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Disruptive Analysis Enterprise Networks for UK Spectrum Policy Forum
Disruptive Analysis   Enterprise Networks for UK Spectrum Policy ForumDisruptive Analysis   Enterprise Networks for UK Spectrum Policy Forum
Disruptive Analysis Enterprise Networks for UK Spectrum Policy Forum
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture
 
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
#OSSPARIS19 : The evolving (IoT) security landscape - Gianluca Varisco, Arduino
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Widyatama Lecture Applied Networking.IV Week02
Widyatama Lecture Applied Networking.IV Week02Widyatama Lecture Applied Networking.IV Week02
Widyatama Lecture Applied Networking.IV Week02
 
Ernst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital worldErnst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital world
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_April
 

Más de Djadja Sardjana

Perancangan Diklat/Training Berbasis e-Learning di Perusahaan
Perancangan Diklat/Training Berbasis e-Learning di PerusahaanPerancangan Diklat/Training Berbasis e-Learning di Perusahaan
Perancangan Diklat/Training Berbasis e-Learning di PerusahaanDjadja Sardjana
 
Organisasi dan Tata Kelola e-Learning di Perusahaan
Organisasi dan Tata Kelola e-Learning di PerusahaanOrganisasi dan Tata Kelola e-Learning di Perusahaan
Organisasi dan Tata Kelola e-Learning di PerusahaanDjadja Sardjana
 
Pengembangan SDM Pertanian Berbasis TIK Dalam Rangka Mengantisipasi MEA (Masy...
Pengembangan SDM Pertanian Berbasis TIK Dalam Rangka Mengantisipasi MEA (Masy...Pengembangan SDM Pertanian Berbasis TIK Dalam Rangka Mengantisipasi MEA (Masy...
Pengembangan SDM Pertanian Berbasis TIK Dalam Rangka Mengantisipasi MEA (Masy...Djadja Sardjana
 
Digitalization of Learning and Knowledge Management on Corporate
Digitalization of Learning and  Knowledge Management on Corporate  Digitalization of Learning and  Knowledge Management on Corporate
Digitalization of Learning and Knowledge Management on Corporate Djadja Sardjana
 
Konsep, Model dan Pengembangan Knowledge Management & e-Learning di Perusahaan
Konsep, Model dan Pengembangan Knowledge Management & e-Learning di PerusahaanKonsep, Model dan Pengembangan Knowledge Management & e-Learning di Perusahaan
Konsep, Model dan Pengembangan Knowledge Management & e-Learning di PerusahaanDjadja Sardjana
 
Corporate Learning Toward Corporate University (Pembelajaran Menuju Universit...
Corporate Learning Toward Corporate University (Pembelajaran Menuju Universit...Corporate Learning Toward Corporate University (Pembelajaran Menuju Universit...
Corporate Learning Toward Corporate University (Pembelajaran Menuju Universit...Djadja Sardjana
 
Peningkatan Kemampuan Mahasiswa Muslim Dalam Menghadapi Era Globalisasi
Peningkatan Kemampuan Mahasiswa Muslim Dalam Menghadapi Era GlobalisasiPeningkatan Kemampuan Mahasiswa Muslim Dalam Menghadapi Era Globalisasi
Peningkatan Kemampuan Mahasiswa Muslim Dalam Menghadapi Era GlobalisasiDjadja Sardjana
 
TechnoEduPreneur 30 Mei 2013 Higher Education 21st Century Learning
TechnoEduPreneur 30 Mei 2013 Higher Education 21st Century Learning TechnoEduPreneur 30 Mei 2013 Higher Education 21st Century Learning
TechnoEduPreneur 30 Mei 2013 Higher Education 21st Century Learning Djadja Sardjana
 
Seminar TechnoEduPreneur 1 Juni 2013: "Tantangan dan Kesempatan Yang Kita Had...
Seminar TechnoEduPreneur 1 Juni 2013: "Tantangan dan Kesempatan Yang Kita Had...Seminar TechnoEduPreneur 1 Juni 2013: "Tantangan dan Kesempatan Yang Kita Had...
Seminar TechnoEduPreneur 1 Juni 2013: "Tantangan dan Kesempatan Yang Kita Had...Djadja Sardjana
 
Teknik Kreatif Menjalankan Usaha
Teknik Kreatif Menjalankan UsahaTeknik Kreatif Menjalankan Usaha
Teknik Kreatif Menjalankan UsahaDjadja Sardjana
 
Human Capital Development & Future Learning for BCA
Human Capital Development & Future Learning for BCAHuman Capital Development & Future Learning for BCA
Human Capital Development & Future Learning for BCADjadja Sardjana
 
Corporate Ethics and Social Responsibility
Corporate Ethics and Social ResponsibilityCorporate Ethics and Social Responsibility
Corporate Ethics and Social ResponsibilityDjadja Sardjana
 
Basic Concept of Strategy & Strategic Management
Basic Concept of Strategy & Strategic Management Basic Concept of Strategy & Strategic Management
Basic Concept of Strategy & Strategic Management Djadja Sardjana
 
Manajemen Stratejik dan Manajemen Mutu Terpadu Bapinger University
Manajemen Stratejik dan Manajemen Mutu Terpadu Bapinger UniversityManajemen Stratejik dan Manajemen Mutu Terpadu Bapinger University
Manajemen Stratejik dan Manajemen Mutu Terpadu Bapinger UniversityDjadja Sardjana
 
Policy Making and Decision Making in Education
Policy Making and Decision Making in EducationPolicy Making and Decision Making in Education
Policy Making and Decision Making in EducationDjadja Sardjana
 
Kebijakan Pembelajaran Dengan e-Learning di Lembaga Pendidikan
Kebijakan Pembelajaran Dengan e-Learning di Lembaga PendidikanKebijakan Pembelajaran Dengan e-Learning di Lembaga Pendidikan
Kebijakan Pembelajaran Dengan e-Learning di Lembaga PendidikanDjadja Sardjana
 
ICBEM2012: Knowledge Management for Small and Medium Enterprises to Win the C...
ICBEM2012: Knowledge Management for Small and Medium Enterprises to Win the C...ICBEM2012: Knowledge Management for Small and Medium Enterprises to Win the C...
ICBEM2012: Knowledge Management for Small and Medium Enterprises to Win the C...Djadja Sardjana
 
Management Creativity and Its Form: Lecture on Corporate Creativity
Management Creativity and Its Form: Lecture on Corporate CreativityManagement Creativity and Its Form: Lecture on Corporate Creativity
Management Creativity and Its Form: Lecture on Corporate CreativityDjadja Sardjana
 
Process of Creative Regeneration: Lecture on Corporate Creativity
Process of Creative Regeneration: Lecture on Corporate CreativityProcess of Creative Regeneration: Lecture on Corporate Creativity
Process of Creative Regeneration: Lecture on Corporate CreativityDjadja Sardjana
 
Creative Management: Lecture on Corporate Creativity
Creative Management: Lecture on Corporate CreativityCreative Management: Lecture on Corporate Creativity
Creative Management: Lecture on Corporate CreativityDjadja Sardjana
 

Más de Djadja Sardjana (20)

Perancangan Diklat/Training Berbasis e-Learning di Perusahaan
Perancangan Diklat/Training Berbasis e-Learning di PerusahaanPerancangan Diklat/Training Berbasis e-Learning di Perusahaan
Perancangan Diklat/Training Berbasis e-Learning di Perusahaan
 
Organisasi dan Tata Kelola e-Learning di Perusahaan
Organisasi dan Tata Kelola e-Learning di PerusahaanOrganisasi dan Tata Kelola e-Learning di Perusahaan
Organisasi dan Tata Kelola e-Learning di Perusahaan
 
Pengembangan SDM Pertanian Berbasis TIK Dalam Rangka Mengantisipasi MEA (Masy...
Pengembangan SDM Pertanian Berbasis TIK Dalam Rangka Mengantisipasi MEA (Masy...Pengembangan SDM Pertanian Berbasis TIK Dalam Rangka Mengantisipasi MEA (Masy...
Pengembangan SDM Pertanian Berbasis TIK Dalam Rangka Mengantisipasi MEA (Masy...
 
Digitalization of Learning and Knowledge Management on Corporate
Digitalization of Learning and  Knowledge Management on Corporate  Digitalization of Learning and  Knowledge Management on Corporate
Digitalization of Learning and Knowledge Management on Corporate
 
Konsep, Model dan Pengembangan Knowledge Management & e-Learning di Perusahaan
Konsep, Model dan Pengembangan Knowledge Management & e-Learning di PerusahaanKonsep, Model dan Pengembangan Knowledge Management & e-Learning di Perusahaan
Konsep, Model dan Pengembangan Knowledge Management & e-Learning di Perusahaan
 
Corporate Learning Toward Corporate University (Pembelajaran Menuju Universit...
Corporate Learning Toward Corporate University (Pembelajaran Menuju Universit...Corporate Learning Toward Corporate University (Pembelajaran Menuju Universit...
Corporate Learning Toward Corporate University (Pembelajaran Menuju Universit...
 
Peningkatan Kemampuan Mahasiswa Muslim Dalam Menghadapi Era Globalisasi
Peningkatan Kemampuan Mahasiswa Muslim Dalam Menghadapi Era GlobalisasiPeningkatan Kemampuan Mahasiswa Muslim Dalam Menghadapi Era Globalisasi
Peningkatan Kemampuan Mahasiswa Muslim Dalam Menghadapi Era Globalisasi
 
TechnoEduPreneur 30 Mei 2013 Higher Education 21st Century Learning
TechnoEduPreneur 30 Mei 2013 Higher Education 21st Century Learning TechnoEduPreneur 30 Mei 2013 Higher Education 21st Century Learning
TechnoEduPreneur 30 Mei 2013 Higher Education 21st Century Learning
 
Seminar TechnoEduPreneur 1 Juni 2013: "Tantangan dan Kesempatan Yang Kita Had...
Seminar TechnoEduPreneur 1 Juni 2013: "Tantangan dan Kesempatan Yang Kita Had...Seminar TechnoEduPreneur 1 Juni 2013: "Tantangan dan Kesempatan Yang Kita Had...
Seminar TechnoEduPreneur 1 Juni 2013: "Tantangan dan Kesempatan Yang Kita Had...
 
Teknik Kreatif Menjalankan Usaha
Teknik Kreatif Menjalankan UsahaTeknik Kreatif Menjalankan Usaha
Teknik Kreatif Menjalankan Usaha
 
Human Capital Development & Future Learning for BCA
Human Capital Development & Future Learning for BCAHuman Capital Development & Future Learning for BCA
Human Capital Development & Future Learning for BCA
 
Corporate Ethics and Social Responsibility
Corporate Ethics and Social ResponsibilityCorporate Ethics and Social Responsibility
Corporate Ethics and Social Responsibility
 
Basic Concept of Strategy & Strategic Management
Basic Concept of Strategy & Strategic Management Basic Concept of Strategy & Strategic Management
Basic Concept of Strategy & Strategic Management
 
Manajemen Stratejik dan Manajemen Mutu Terpadu Bapinger University
Manajemen Stratejik dan Manajemen Mutu Terpadu Bapinger UniversityManajemen Stratejik dan Manajemen Mutu Terpadu Bapinger University
Manajemen Stratejik dan Manajemen Mutu Terpadu Bapinger University
 
Policy Making and Decision Making in Education
Policy Making and Decision Making in EducationPolicy Making and Decision Making in Education
Policy Making and Decision Making in Education
 
Kebijakan Pembelajaran Dengan e-Learning di Lembaga Pendidikan
Kebijakan Pembelajaran Dengan e-Learning di Lembaga PendidikanKebijakan Pembelajaran Dengan e-Learning di Lembaga Pendidikan
Kebijakan Pembelajaran Dengan e-Learning di Lembaga Pendidikan
 
ICBEM2012: Knowledge Management for Small and Medium Enterprises to Win the C...
ICBEM2012: Knowledge Management for Small and Medium Enterprises to Win the C...ICBEM2012: Knowledge Management for Small and Medium Enterprises to Win the C...
ICBEM2012: Knowledge Management for Small and Medium Enterprises to Win the C...
 
Management Creativity and Its Form: Lecture on Corporate Creativity
Management Creativity and Its Form: Lecture on Corporate CreativityManagement Creativity and Its Form: Lecture on Corporate Creativity
Management Creativity and Its Form: Lecture on Corporate Creativity
 
Process of Creative Regeneration: Lecture on Corporate Creativity
Process of Creative Regeneration: Lecture on Corporate CreativityProcess of Creative Regeneration: Lecture on Corporate Creativity
Process of Creative Regeneration: Lecture on Corporate Creativity
 
Creative Management: Lecture on Corporate Creativity
Creative Management: Lecture on Corporate CreativityCreative Management: Lecture on Corporate Creativity
Creative Management: Lecture on Corporate Creativity
 

Último

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 

Último (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 

Widyatama Lecture Applied Networking-IV Week05 Mobile Security 1

  • 1. Applied Networking-IV (2231114) Lecture Week-5 Mobile Security-1 Lecture by: Djadja.Sardjana, S.T., M.M. Djadja.Sardjana, www.slideshare.net/djadja Djadja.sardjana@widyatama.ac.id 18-Mar-10 18-Mar- Widyatama University-Informatics University- 1
  • 2. Mobile Security-1 Security- Mobile Security 18-Mar-10 18-Mar- Widyatama University-Informatics University- 2
  • 3. The New Age of Risk Ubiquitous internet protocol-based protocol- technology (Almost) everything connects to the ‘Net Many vulnerabilities awaiting exploitation Mobility of people / information / devices Cyber crime: real and increasing Terrorist threat: physical now….blended later? 18-Mar-10 18-Mar- Widyatama University-Informatics University- 3
  • 4. Hostile World 9-11, 3-11, 7-7 and other major terror attacks 3- 7- Wars and insurgencies SARS / Bird flu - global impact of disease SE Asia tsunami disaster Katrina hurricane disaster in USA Tomorrow’s headlines…? 18-Mar-10 18-Mar- Widyatama University-Informatics University- 4
  • 5. Convergence Of Legal, IT, And Business Laws/Regulations Technologies Stakeholders EU Data Web / Internet Customers Protect Databases Competitors GLB/HIPAA/Patriot Sarbanes-Oxley Collaboration Governments U.S. Identity Theft Law(s)? Wireless Suppliers/ Partners Mobile Devices Employees Pressure mounting on organizations to prove compliance with an increasing array of laws and regulations. This makes information security much more challenging. 18-Mar-10 18-Mar- Widyatama University-Informatics University- 5
  • 6. Dissolution of Perimeter Hostile Internet Environment Joint Ventures Contract Manufacture “Organization Community” Contract Design Parts Un-trusted Un- Intranet “Point defenses” Customers Services s Transportation 18-Mar-10 18-Mar- Widyatama University-Informatics University- 6
  • 7. Current State of Network Security Home/Remote Users Business Systems Manufacturing Research/Development Intranet Labs Legacy Systems HR Systems Communication/ Messaging Systems Users Finance/SOx Eroding Firewall Perimeter Eroding Firewall Perimeter Strategic Partners Suppliers Vendors Etc… Hackers Hackers Mobile/Wireless 18-Mar-10 18-Mar- Widyatama University-Informatics University- 7
  • 8. Mobile Viruses on the rise 2004 2005 06-15-04: Cabir A 06-16-04: Cabir B 01-10-2005: Lasco A 01-10- 07-10-2004: WinCE/Dust 02-01-2005: Locknut.A 02-01- 08-06-2004: Brador 03-07-2005: Commwarrior 03-07- 11-19-04: Skulls A 03-04-2005: Dampig.A 03-04- 11-29-04: Skull B 12-09-04: Cabir C 03-18-2005: Drever 03-18- 12-09-04: Cabir D 04-04-2005: Mabir.A 04-04- 12-09-04: Cabir E 12-21-04: Cabir F 12-21-04: Cabir G 12-21-04: Skulls C 12-21-04: MGDropper 12-26-04: Cabir H 12-26-04: Cabir I 18-Mar-10 18-Mar- Widyatama University-Informatics University- 8
  • 9. Wireless Enabled & Mobile Attacks Blue- Blue-jacking, bugging, snarfing, sniping Wardriving Malicious Mobile Code (Virus, Worms, Trojans) RFID Sniffing Denial of Service Web Application Spyware Social Engineering 18-Mar-10 18-Mar- Widyatama University-Informatics University- 9
  • 10. Securing the Mobile Workforce As the person responsible for an organization you only have “control” in this space But mobile employees move throughout the entire set of possibilities 18-Mar-10 18-Mar- Widyatama University-Informatics University- 10
  • 11. Effective Security is Complex PKI Manager Centralized Security Token Card Other Security Many parts & pieces Manager Entity Manager Policy Manager Complex components Certificate Authority Digital Signature OS Security Management Single Sign-on Too few qualified personnel Tools Interface Interface Tools ~.005% of employees Network Security Event Lack of standards Virus Interception Security Policy Cyberwall/Firewall Report Host-based & Correction Distributor Rule Base Writer(s) Protection programs “custom Encryption Application-based built” VPN Session or Connection Application Proxy Facilities for Tunnel Manager Manager and Logging Implementations Network Connections Authentication Failure of weakest link (s) Cryptography VPN IPSec and VPN Security Traffic Application Intrusion Connection Event Analyzer Logging Facility Logging Anti-Virus Manager Intrusion Detection Security Event Security Integrity Intrusion Intrusion Logging Manager Prevention Auditing Detection Security Management Stateful Packet Frame Application Inspection Inspection Inspection Inspection Security Network Access Real-time Control Interception Frame Filter Engine and Enforcement Management Facility 18-Mar-10 18-Mar- Widyatama University-Informatics University- 11
  • 12. Security Must Make Business Sense OPTIMAL LEVEL OF SECURITY AT MINIMUM COST COST ($) SECURITY LEVEL COST OF SECURITY COUNTERMEASURES TOTAL COST 0% COST OF SECURITY 100% BREACHES 18-Mar-10 18-Mar- Widyatama University-Informatics University- 12
  • 13. Next Generation Security Zones and compartments Extensive use of cryptography Identity and access management “Opt in” for more protection Essential to enable seamless security ! 18-Mar-10 18-Mar- Widyatama University-Informatics University- 13
  • 14. Next Generation Design Internet Legacy Zone e.g. manufacturing Collaborative Systems General Purpose Systems Intranet Zone MOT ISP Seamless Mobility Secure Zone Not subject to Regulation Personal Regulated Systems Data Systems SOX Compliant Systems Availability Not Critical Systems Custom Zone Stand Alone High Sensitivity Zone Trade Secret, Race, age, ethnicity DMZ QZ Zone Zone 18-Mar-10 18-Mar- Widyatama University-Informatics University- 14
  • 15. Security is a Process Not a Product! Security is achieved by the combination of People Process Technology Protections Address: Prevention Detection Response Recovery 18-Mar-10 18-Mar- Widyatama University-Informatics University- 15
  • 16. Traditional security programs align people, processes and technology to protect enterprise networks With seamless mobility, security must now expand to encompass the extended enterprise. People Processes Policies QuickTime™ and a TIFF (LZW) decompressor are needed to see this picture. Technology RFID CHIP 18-Mar-10 18-Mar- Widyatama University-Informatics University- 16
  • 17. Securing Seamless Mobility: Wireless/Mobility Risk Management Business- Business-focused understanding and prioritization of risks, vulnerabilities and countermeasures Include technical vulnerabilities as well as other key elements of the security program Assures most effective use of limited resources 18-Mar-10 18-Mar- Widyatama University-Informatics University- 17
  • 18. Securing Seamless Mobility: Network Design Understand existing “wired” environment Build security into wireless network foundations Focus on points of connectivity, firewalls, DMZs, intrusion detection/prevention, VPNs and encryption Maximize wireless network availability, operational security and performance Secure devices in a system designed for security 18-Mar-10 18-Mar- Widyatama University-Informatics University- 18
  • 19. Approach to Information Security INTERNAL IT Ensure the Confidentiality, Integrity, and Availability of Product Security Motorola I/T Services include Assets Support PROTECTING assets, development of DETECTING hostile more secure activities, RESPONDING to Wireless Security Motorola incidents, and Services products RECOVERING to limit adverse business impacts Leverage our expertise to provide customer services 18-Mar-10 18-Mar- Widyatama University-Informatics University- 19
  • 20. Tugas Mobile Security 1. 0606022 - FIRMANSAYH APNET4 Mobile Security 2. Genta Gemilang-Mobile Security Gemilang- 3. Hillman Nurrachman-Mobile Nurrachman- Security Software 4. Mobile Security - Farhan Atsani - 0606P02 18-Mar-10 18-Mar- Widyatama University-Informatics University- 20
  • 21. Conclusion & Final Words Mobile Security Demo 18-Mar-10 18-Mar- Widyatama University-Informatics University- 21
  • 22. Conclusion Threats to organizations are real and increasing, seamless mobility requires careful security planning Security incidents involving mobile and wireless environment are increasing Securing seamless mobility requires holistic approach that address people, process and technology 18-Mar-10 18-Mar- Widyatama University-Informatics University- 22