SlideShare una empresa de Scribd logo
1 de 29
Descargar para leer sin conexión
Perspectives on consumers
              privacy and security tradeoffs


                      Marco Morana
                      Global Industry Committee
                      OWASP Foundation


OWASP
Summer School on
Computer Security &
Privacy                Copyright © 2011 - The OWASP Foundation
                       Permission is granted to copy, distribute and/or modify this document
27-31 August 2012      under the terms of the GNU Free Documentation License.




                       The OWASP Foundation
                       http://www.owasp.org
Do you know OWASP ?




                      OWASP   2
About myself and my career journey




                                     OWASP   3
Privacy is one of the biggest problems in this
new electronic age…
                                        …At the heart of the
                                        Internet culture is a
                                        force that wants to find
                                        out everything about
                                        you. And once it has found
                                        out everything about you
                                        and two hundred million
                                        others, that's a very
                                        valuable asset, and
                                        people will be tempted
                                        to trade and do
                                        commerce with that
What I've Learned: Andy Grove           asset. This wasn't the
     Former Chairman of Intel, 63,      information that people
     Santa Clara, California            were thinking of when they
http://www.esquire.com/features/what    called this the information
-ive-learned/what-ive-learned-archive   age
                                                       OWASP          4
Presentation Objective & Agenda
 Objective: different perspectives in regarding of privacy
  and the trade offs between different needs of consumers
  and businesses and future trends
 Agenda
    PART I: Doing business with customers' private
     information
    PART II: Threats to consumers private information and
     measures to protect it
    PART III: Future trends affecting data privacy




                                                   OWASP      5
PART I
Doing Business with Customer’s Private
               Information




                                    OWASP   6
Factors that Limit Personal Privacy



          Law
      Enforcement
         Social
      Networking            Personal Data
                               Privacy
        Targeted
       Marketing
        Taxation




                                       OWASP   7
Factors that Enable Personal Data Privacy



        Anonymity
       Data Privacy
         Laws &
         Controls         Personal
      Confidentiality    Data Privacy
         Security
       Controls (e.g.
        Encryption)




                                        OWASP   8
…about Privacy
1. Privacy is a personal right
2. There are different types of privacy, health, political,
   race/sex etc financial privacy is important for the
   avoidance of fraud, identity theft
3. Privacy is traded off with different needs such as
   networking, business, marketing, compliance, law
   enforcement
4. Businesses collect, process and store customers’ private
   and confidential information for different reasons
5. Data confidentiality and privacy have similar goals
6. New technologies such as social networks, online services,
   cloud computing challenge the notion of personal privacy
7. Perspectives about privacy change with time
                                                 OWASP     9
Private And Personal Identifiable Information
 Private information and Personal
  Identifiable Information (PII) uniquely
  indentify an individual. What is private
  and PII varies among countries, e.g.:
    US SB1386: Name and SSN, Driven
      License No., Account /Credit/Debit
      Acc No + PIN
    EU directive 95/46/Article 2a:
      'personal data any information
      relating to an identified or
      identifiable person, identification
      number or to one or more factors
      specific to his physical,
      physiological, mental, economic,
                                             OWASP   10
      cultural or social identity
Data Breach Notification Rules in Italy
.. Legislative Decree 69/2012 (into force since June 1st 2012
   implementing in Italy Directive no. 2009/136/EC):
 Definition of personal data breach a breach of security
   leading to the accidental destruction, loss, alteration,
   unauthorized disclosure of, or access to, personal data
 Procedures to deal with a personal data breach:
     Shall notify the Italian Data Protection Authority (“DPA” or
      Garante) without undue delay (e.g. 72 hrs for ISPs);
     Shall notify the subject but the notification unless the
      provider is able to give evidence to the DPA that it has
      implemented appropriate security measures
     Failure or delay to notify a personal data breach to the DPA
      is sanctioned with a fine ranging between EUR25,000 to
      EUR150,000                                        OWASP    11
Trade offs Between Business and Privacy Needs
 Collection,              Protection of C-PII
  Processing of             and sensitive
  Customers PII (C-PII)     information in storage
  and Sensitive Info.       and transmission
 Sharing of C-PII and     Disclosure &
  personal information      Consent to which 3rd
  with 3rd                  parties and affiliates
  parties/affiliates        C-PII is shared with
 Compliance with          Notifications to
  privacy laws, data        customers when
  breach notification       private data is
  laws and security         collected and is either
  policies                  lost or compromised
                                          OWASP       12
Collection and Processing of PII
..in case of financial institutions, PII is:
 Collected online and at a branch when opening
   bank accounts, apply for loans, run credit report,
   apply for credit cards, online banking
 Processed and stored to identify/verify
   customer by asking the last for digits of SSN and
   ACC# for example:
     Over the phone for bank account balance and
      payments of bills
     Online user validation for resetting a
      password/PINs
     Online for authenticate a user with
      challenge/questions
                                                   OWASP   13
Collection and Processing of PII Examples




                                    OWASP   14
Private Data Collection Examples




                                   OWASP   15
PART II
Threats to private information and measures to
                      protect it




                                         OWASP   16
Statistical Data of Data Loss Incidents (*)
 Hacking and external attacks are the major cause of private
  data losses and increasing (32% to 61% and 53% to 75% )
 NAA, SSN, DOB represent the majority of private data
  record last year, this year are PWD, EMA and SSN




                                                 (*) Source:
                                                 DataLossDb.org
                                                 http://www.datalossdb.
                                                 org




                                                OWASP                 17
…In the space of one hour, my entire digital
life was destroyed.
                        First my Google account was taken
                        over, then deleted. Next my Twitter
                        account was compromised, and used
                        as a platform to broadcast racist and
                        homophobic messages. And worst of
                        all, my AppleID account was broken
                        into, and my hackers used it to
                        remotely erase all of the data on my
                        iPhone, iPad, and MacBook
                                     (*) Source:How Apple and Amazon
                                     Security Flaws Led to My Epic Hacking
                                     http://www.wired.com/gadgetlab/2012/
                                     08/apple-amazon-mat-honan-hacking/



.. all you need in addition to someone’s e-mail
is a billing address and the last four digits of a
credit card
                                                                         OWASP   18
Cost to Businesses for Loss of PII
1. Data breach costs x data record lost: $ 222/record (*)
2. Out of pocket costs x identity fraud incident: $
   631/victim/incident (**)

                                          (*) Source: 2011 Cost of a Data
                                          Breach: United States, Ponemon
                                          Institute and Symantec, March 2012




                                          (**) Source: The 2011 Identity Fraud
                                          Survey Report by Javelin Strategy &
                                          Research by Javelin Strategy &
                                          Research
                                          http://www.identityguard.com/downloads/j
                                          avelin-2011-identity-fraud-survey-report.pdf




                                                              OWASP                      19
Security Measures And Protection of Privacy
 Business protect their customers private
  information with:
    Information Security Policy: Requirements
      for protection of Confidentiality, Integrity and
      Availability (CIA) of customers private data
    Data classification: Public, Internal,
      Confidential, PII, Restricted
    Security measures:
        Controls: Authentication, Entitlements,
          Encryption, Session Management,
          Auditing & Logging;
        Measures: Security Audits;
        Information Security and Privacy Officers
                                                         OWASP   20
Opt out Privacy Controls: Privacy Notices From
US Banks




                                     OWASP   21
Opt In Privacy Controls: Cookies & Preferences




                                     OWASP   22
PART III
Future trends affecting data privacy




                                       OWASP   23
Individuals’ Awareness of Privacy




 “Maybe Zuckerberg is right. The mores of privacy are
 changing, and “people don’t want complete privacy.” Teens
 may be the first adopters of this change, Source
 http://trends.myyearbook.com/2010/07/facebook-privacy-issues-not-an-issue-for-teens/
                                                                                        OWASP   24
Adoption of New Technologies And New
Challenges For Consumer’s Privacy
                                                     2017
                                      2015
                               2012
                      2010
               2007
                                                       Face
        2005                                           Recognition
                                  Biometric
                                  Authentication       Gesture
    2000              Smart-      Big data
                                                       Recognition
                      phones                           Virtual
                                  BYOD                 Assistants
 1997                 Social      Cloud computing      Internet of
        Internet      Networks
                                  Location aware       things
        Webmail
                                  applications         Social TVs
                                  Mobile Payments
                                  Social Analytics



                                                              OWASP   25
Law Enforcement vs. Individual’s Privacy




                     Sources: https://www.eff.org




                                                    OWASP   26
Company’s Privacy Practices Are
Increasingly Under Scrutiny




                                  OWASP   27
Future Privacy Legislations in EU
1. EU regulation for 27
   countries
2. Any processed PII data for
   EU citizens (include IP
   addresses, GPS location
   data)
3. 24 hours data breach             6. Fines up to
   notification                          2% of
                                         company
4. Mandatory security
                                         annual
   assessments
                                         worldwide
5. EU citizens will have the             turnover
   right to request extended         (*)
                                     Source:http://www.donneespersonnelle
                                     s.fr/6-things-you-need-to-know-about-
   erasure of their personal data    the-new-eu-privacy-framework

                                                           OWASP             28
Open Questions
 Questions for consumers:
   1. What are my privacy rights ?
   2. How I can control my privacy ?
   3. Which PII can be disclosed and to who ?
   4. Who is legally liable for PII data that is lost
 Questions for businesses:
   1. Which are the privacy rights of my customers ?
   2. Which security policies protect customer’s PII in
      compliance with privacy laws?
   3. How soon I need to inform my customers of a
      breach of PII and/or identity theft fraud ?
   4. When customers PII can be disclosed to law
      enforcement ?
                                               OWASP      29

Más contenido relacionado

La actualidad más candente

Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Security B-Sides
 
Social engineering
Social engineeringSocial engineering
Social engineering
Bola Oduyale
 
Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership
Leonardo
 

La actualidad más candente (20)

Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership
 
Cybercriminals and security attacks
Cybercriminals and security attacksCybercriminals and security attacks
Cybercriminals and security attacks
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive Measures
 
Data Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus PandemicData Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus Pandemic
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
Importance of cyber security in education sector
Importance of cyber security in education sectorImportance of cyber security in education sector
Importance of cyber security in education sector
 

Destacado

Encoded Attacks And Countermeasures
Encoded Attacks And CountermeasuresEncoded Attacks And Countermeasures
Encoded Attacks And Countermeasures
Marco Morana
 
Cross Site Request Forgery Vulnerabilities
Cross Site Request Forgery VulnerabilitiesCross Site Request Forgery Vulnerabilities
Cross Site Request Forgery Vulnerabilities
Marco Morana
 
Secure Code Reviews
Secure Code ReviewsSecure Code Reviews
Secure Code Reviews
Marco Morana
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
Marco Morana
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Symantec
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
Arrow ECS UK
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
IAEME Publication
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Symantec
 
OWASP Top 10 And Insecure Software Root Causes
OWASP Top 10 And Insecure Software Root CausesOWASP Top 10 And Insecure Software Root Causes
OWASP Top 10 And Insecure Software Root Causes
Marco Morana
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
Marco Morana
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
Marco Morana
 

Destacado (20)

Isaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdfIsaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdf
 
Encoded Attacks And Countermeasures
Encoded Attacks And CountermeasuresEncoded Attacks And Countermeasures
Encoded Attacks And Countermeasures
 
Cross Site Request Forgery Vulnerabilities
Cross Site Request Forgery VulnerabilitiesCross Site Request Forgery Vulnerabilities
Cross Site Request Forgery Vulnerabilities
 
Secure Code Reviews
Secure Code ReviewsSecure Code Reviews
Secure Code Reviews
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Ffiec presentation
Ffiec presentationFfiec presentation
Ffiec presentation
 
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
WHITE PAPER: How safe is your quantified self? from the Symantec Security Res...
 
Security Metrics
Security MetricsSecurity Metrics
Security Metrics
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
 
Security Exploit of Business Logic Flaws, Business Logic Attacks
Security Exploit of Business Logic Flaws, Business Logic AttacksSecurity Exploit of Business Logic Flaws, Business Logic Attacks
Security Exploit of Business Logic Flaws, Business Logic Attacks
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 
OWASP Top 10 And Insecure Software Root Causes
OWASP Top 10 And Insecure Software Root CausesOWASP Top 10 And Insecure Software Root Causes
OWASP Top 10 And Insecure Software Root Causes
 
Security Compliance Web Application Risk Management
Security Compliance Web Application Risk ManagementSecurity Compliance Web Application Risk Management
Security Compliance Web Application Risk Management
 
Presentation sso design_security
Presentation sso design_securityPresentation sso design_security
Presentation sso design_security
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 

Similar a Security And Privacy Cagliari 2012

Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillance
NANDI AYANA
 
Internet Safety/Security
Internet Safety/SecurityInternet Safety/Security
Internet Safety/Security
czarviscayno
 

Similar a Security And Privacy Cagliari 2012 (20)

Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillance
 
INT 1010 07-4.pdf
INT 1010 07-4.pdfINT 1010 07-4.pdf
INT 1010 07-4.pdf
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Safe use of cloud - alternative cloud
Safe use of cloud - alternative cloudSafe use of cloud - alternative cloud
Safe use of cloud - alternative cloud
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm
 
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
 
INT 1010 10-1.pdf
INT 1010 10-1.pdfINT 1010 10-1.pdf
INT 1010 10-1.pdf
 
Internet Safety/Security
Internet Safety/SecurityInternet Safety/Security
Internet Safety/Security
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Exploring Data Privacy - SQL Saturday Louisville 2011
Exploring Data Privacy - SQL Saturday Louisville 2011Exploring Data Privacy - SQL Saturday Louisville 2011
Exploring Data Privacy - SQL Saturday Louisville 2011
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 

Más de Marco Morana

Owasp security summit_2012_milanovs_final
Owasp security summit_2012_milanovs_finalOwasp security summit_2012_milanovs_final
Owasp security summit_2012_milanovs_final
Marco Morana
 
Owasp Forum Web Services Security
Owasp Forum Web Services SecurityOwasp Forum Web Services Security
Owasp Forum Web Services Security
Marco Morana
 
Owasp Top 10 And Security Flaw Root Causes
Owasp Top 10 And Security Flaw Root CausesOwasp Top 10 And Security Flaw Root Causes
Owasp Top 10 And Security Flaw Root Causes
Marco Morana
 
Software Security Frameworks
Software Security FrameworksSoftware Security Frameworks
Software Security Frameworks
Marco Morana
 
Software Open Source, Proprierio, Interoperabilita'
Software Open Source, Proprierio, Interoperabilita'Software Open Source, Proprierio, Interoperabilita'
Software Open Source, Proprierio, Interoperabilita'
Marco Morana
 
Progetti Open Source Per La Sicurezza Delle Web Applications
Progetti Open Source Per La Sicurezza Delle Web ApplicationsProgetti Open Source Per La Sicurezza Delle Web Applications
Progetti Open Source Per La Sicurezza Delle Web Applications
Marco Morana
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
Marco Morana
 
Software Security Initiative And Capability Maturity Models
Software Security Initiative And Capability Maturity ModelsSoftware Security Initiative And Capability Maturity Models
Software Security Initiative And Capability Maturity Models
Marco Morana
 

Más de Marco Morana (13)

Is talent shortage ws marco morana
Is talent shortage ws marco moranaIs talent shortage ws marco morana
Is talent shortage ws marco morana
 
Owasp security summit_2012_milanovs_final
Owasp security summit_2012_milanovs_finalOwasp security summit_2012_milanovs_final
Owasp security summit_2012_milanovs_final
 
Security Summit Rome 2011
Security Summit Rome 2011Security Summit Rome 2011
Security Summit Rome 2011
 
Risk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware AttacksRisk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware Attacks
 
Software Security Initiatives
Software Security InitiativesSoftware Security Initiatives
Software Security Initiatives
 
Business cases for software security
Business cases for software securityBusiness cases for software security
Business cases for software security
 
Owasp Forum Web Services Security
Owasp Forum Web Services SecurityOwasp Forum Web Services Security
Owasp Forum Web Services Security
 
Owasp Top 10 And Security Flaw Root Causes
Owasp Top 10 And Security Flaw Root CausesOwasp Top 10 And Security Flaw Root Causes
Owasp Top 10 And Security Flaw Root Causes
 
Software Security Frameworks
Software Security FrameworksSoftware Security Frameworks
Software Security Frameworks
 
Software Open Source, Proprierio, Interoperabilita'
Software Open Source, Proprierio, Interoperabilita'Software Open Source, Proprierio, Interoperabilita'
Software Open Source, Proprierio, Interoperabilita'
 
Progetti Open Source Per La Sicurezza Delle Web Applications
Progetti Open Source Per La Sicurezza Delle Web ApplicationsProgetti Open Source Per La Sicurezza Delle Web Applications
Progetti Open Source Per La Sicurezza Delle Web Applications
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
 
Software Security Initiative And Capability Maturity Models
Software Security Initiative And Capability Maturity ModelsSoftware Security Initiative And Capability Maturity Models
Software Security Initiative And Capability Maturity Models
 

Security And Privacy Cagliari 2012

  • 1. Perspectives on consumers privacy and security tradeoffs Marco Morana Global Industry Committee OWASP Foundation OWASP Summer School on Computer Security & Privacy Copyright © 2011 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document 27-31 August 2012 under the terms of the GNU Free Documentation License. The OWASP Foundation http://www.owasp.org
  • 2. Do you know OWASP ? OWASP 2
  • 3. About myself and my career journey OWASP 3
  • 4. Privacy is one of the biggest problems in this new electronic age… …At the heart of the Internet culture is a force that wants to find out everything about you. And once it has found out everything about you and two hundred million others, that's a very valuable asset, and people will be tempted to trade and do commerce with that What I've Learned: Andy Grove asset. This wasn't the Former Chairman of Intel, 63, information that people Santa Clara, California were thinking of when they http://www.esquire.com/features/what called this the information -ive-learned/what-ive-learned-archive age OWASP 4
  • 5. Presentation Objective & Agenda  Objective: different perspectives in regarding of privacy and the trade offs between different needs of consumers and businesses and future trends  Agenda  PART I: Doing business with customers' private information  PART II: Threats to consumers private information and measures to protect it  PART III: Future trends affecting data privacy OWASP 5
  • 6. PART I Doing Business with Customer’s Private Information OWASP 6
  • 7. Factors that Limit Personal Privacy Law Enforcement Social Networking Personal Data Privacy Targeted Marketing Taxation OWASP 7
  • 8. Factors that Enable Personal Data Privacy Anonymity Data Privacy Laws & Controls Personal Confidentiality Data Privacy Security Controls (e.g. Encryption) OWASP 8
  • 9. …about Privacy 1. Privacy is a personal right 2. There are different types of privacy, health, political, race/sex etc financial privacy is important for the avoidance of fraud, identity theft 3. Privacy is traded off with different needs such as networking, business, marketing, compliance, law enforcement 4. Businesses collect, process and store customers’ private and confidential information for different reasons 5. Data confidentiality and privacy have similar goals 6. New technologies such as social networks, online services, cloud computing challenge the notion of personal privacy 7. Perspectives about privacy change with time OWASP 9
  • 10. Private And Personal Identifiable Information  Private information and Personal Identifiable Information (PII) uniquely indentify an individual. What is private and PII varies among countries, e.g.:  US SB1386: Name and SSN, Driven License No., Account /Credit/Debit Acc No + PIN  EU directive 95/46/Article 2a: 'personal data any information relating to an identified or identifiable person, identification number or to one or more factors specific to his physical, physiological, mental, economic, OWASP 10 cultural or social identity
  • 11. Data Breach Notification Rules in Italy .. Legislative Decree 69/2012 (into force since June 1st 2012 implementing in Italy Directive no. 2009/136/EC):  Definition of personal data breach a breach of security leading to the accidental destruction, loss, alteration, unauthorized disclosure of, or access to, personal data  Procedures to deal with a personal data breach:  Shall notify the Italian Data Protection Authority (“DPA” or Garante) without undue delay (e.g. 72 hrs for ISPs);  Shall notify the subject but the notification unless the provider is able to give evidence to the DPA that it has implemented appropriate security measures  Failure or delay to notify a personal data breach to the DPA is sanctioned with a fine ranging between EUR25,000 to EUR150,000 OWASP 11
  • 12. Trade offs Between Business and Privacy Needs  Collection,  Protection of C-PII Processing of and sensitive Customers PII (C-PII) information in storage and Sensitive Info. and transmission  Sharing of C-PII and  Disclosure & personal information Consent to which 3rd with 3rd parties and affiliates parties/affiliates C-PII is shared with  Compliance with  Notifications to privacy laws, data customers when breach notification private data is laws and security collected and is either policies lost or compromised OWASP 12
  • 13. Collection and Processing of PII ..in case of financial institutions, PII is:  Collected online and at a branch when opening bank accounts, apply for loans, run credit report, apply for credit cards, online banking  Processed and stored to identify/verify customer by asking the last for digits of SSN and ACC# for example:  Over the phone for bank account balance and payments of bills  Online user validation for resetting a password/PINs  Online for authenticate a user with challenge/questions OWASP 13
  • 14. Collection and Processing of PII Examples OWASP 14
  • 15. Private Data Collection Examples OWASP 15
  • 16. PART II Threats to private information and measures to protect it OWASP 16
  • 17. Statistical Data of Data Loss Incidents (*)  Hacking and external attacks are the major cause of private data losses and increasing (32% to 61% and 53% to 75% )  NAA, SSN, DOB represent the majority of private data record last year, this year are PWD, EMA and SSN (*) Source: DataLossDb.org http://www.datalossdb. org OWASP 17
  • 18. …In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook (*) Source:How Apple and Amazon Security Flaws Led to My Epic Hacking http://www.wired.com/gadgetlab/2012/ 08/apple-amazon-mat-honan-hacking/ .. all you need in addition to someone’s e-mail is a billing address and the last four digits of a credit card OWASP 18
  • 19. Cost to Businesses for Loss of PII 1. Data breach costs x data record lost: $ 222/record (*) 2. Out of pocket costs x identity fraud incident: $ 631/victim/incident (**) (*) Source: 2011 Cost of a Data Breach: United States, Ponemon Institute and Symantec, March 2012 (**) Source: The 2011 Identity Fraud Survey Report by Javelin Strategy & Research by Javelin Strategy & Research http://www.identityguard.com/downloads/j avelin-2011-identity-fraud-survey-report.pdf OWASP 19
  • 20. Security Measures And Protection of Privacy  Business protect their customers private information with:  Information Security Policy: Requirements for protection of Confidentiality, Integrity and Availability (CIA) of customers private data  Data classification: Public, Internal, Confidential, PII, Restricted  Security measures:  Controls: Authentication, Entitlements, Encryption, Session Management, Auditing & Logging;  Measures: Security Audits;  Information Security and Privacy Officers OWASP 20
  • 21. Opt out Privacy Controls: Privacy Notices From US Banks OWASP 21
  • 22. Opt In Privacy Controls: Cookies & Preferences OWASP 22
  • 23. PART III Future trends affecting data privacy OWASP 23
  • 24. Individuals’ Awareness of Privacy “Maybe Zuckerberg is right. The mores of privacy are changing, and “people don’t want complete privacy.” Teens may be the first adopters of this change, Source http://trends.myyearbook.com/2010/07/facebook-privacy-issues-not-an-issue-for-teens/ OWASP 24
  • 25. Adoption of New Technologies And New Challenges For Consumer’s Privacy 2017 2015 2012 2010 2007 Face 2005 Recognition Biometric Authentication Gesture 2000 Smart- Big data Recognition phones Virtual BYOD Assistants 1997 Social Cloud computing Internet of Internet Networks Location aware things Webmail applications Social TVs Mobile Payments Social Analytics OWASP 25
  • 26. Law Enforcement vs. Individual’s Privacy Sources: https://www.eff.org OWASP 26
  • 27. Company’s Privacy Practices Are Increasingly Under Scrutiny OWASP 27
  • 28. Future Privacy Legislations in EU 1. EU regulation for 27 countries 2. Any processed PII data for EU citizens (include IP addresses, GPS location data) 3. 24 hours data breach 6. Fines up to notification 2% of company 4. Mandatory security annual assessments worldwide 5. EU citizens will have the turnover right to request extended (*) Source:http://www.donneespersonnelle s.fr/6-things-you-need-to-know-about- erasure of their personal data the-new-eu-privacy-framework OWASP 28
  • 29. Open Questions  Questions for consumers: 1. What are my privacy rights ? 2. How I can control my privacy ? 3. Which PII can be disclosed and to who ? 4. Who is legally liable for PII data that is lost  Questions for businesses: 1. Which are the privacy rights of my customers ? 2. Which security policies protect customer’s PII in compliance with privacy laws? 3. How soon I need to inform my customers of a breach of PII and/or identity theft fraud ? 4. When customers PII can be disclosed to law enforcement ? OWASP 29