SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
XecureIT
©PTIMANTeknologiInformasi
R U Sure U R Secure?
R U Sure U R Secure?
XecureIT
©PTIMANTeknologiInformasi
R U Sure U R Secure?
Oil and Gas SCADA/DCS
Case: Gazprom, April 2000

Gazprom is the world's largest natural gas producer and Western Europe's
largest source.

“ Russian authorities revealed this week that Gazprom, a state-run gas
utility, came under the control of malicious hackers.

The intruders succeeded in defeating the company's security and breaking
into systems controlling gas pipelines, Interior Ministry spokesman Colonel
Konstantin Machabeli said.

The flow of natural gas was under the control of outsiders for some time,
Machabeli reported. The Colonel said the intruders used some type of
Trojan to gain access, but didn't name it. “
XecureIT
©PTIMANTeknologiInformasi
R U Sure U R Secure?
Oil and Gas SCADA/DCS
Case: Olympic Pipe Line Co., July 1999

Breakdowns in the Olympic Pipe Line Co. computer system just before and
during last month's deadly accident in Bellingham have so alarmed federal
regulators that they have issued a nationwide warning.

The federal Office of Pipeline Safety issued the warning... The advisory
details a series of computer failures on June 10 around the time Olympic's
16-inch line leaked up to 277,000 gallons of gasoline into Bellingham creeks.
Gasoline vapor later exploded in flames, and two 10-year-old boys and a
teenager were killed.

After the accident, Olympic acknowledged that its computer system crashed
on the afternoon of the accident. The computer problems may have kept
Olympic personnel from reacting quickly to the leak, regulators said. ”
XecureIT
©PTIMANTeknologiInformasi
R U Sure U R Secure?
Oil and Gas SCADA/DCS
Case: Davis-Besse

“ The Slammer worm penetrated a private computer network at
Ohio's Davis-Besse nuclear power plant in January and disabled a
safety monitoring system for nearly five hours...

The Slammer worm entered the Davis-Besse plant through a
circuitous route. It began by penetrating the unsecured network of an
unnamed Davis-Besse contractor, then squirmed through a private
connection bridging that network and Davis-Besse's corporate
network.

One of multiple connections into Davis-Besse's business network
completely bypassed the plant's firewall, which was programmed to
block the port Slammer used to spread.

Some people in Corporate's Network Services department were not
aware of the connection.
R U Sure U R Secure? XecureIT
©PTIMANTeknologiInformasi
Cyberwar
Case: 3 Kiloton Explosion, June 1982
R U Sure U R Secure? XecureIT
©PTIMANTeknologiInformasi
Cyberwar
Case: DNS Service Provider
R U Sure U R Secure? XecureIT
©PTIMANTeknologiInformasi
Cyberwar
Case: People Powered
R U Sure U R Secure? XecureIT
©PTIMANTeknologiInformasi
Espionage
Case: Government Involvement
XecureIT
©PTIMANTeknologiInformasi
R U Sure U R Secure?
Espionage
Case: Coca-Cola and Pepsi

An executive administrative assistant at Coke in Atlanta offering samples
of a new product to Pepsi for $1.5 million.

He sent the initial letter to Pepsi using an official Coca-Cola envelope on
May 19, 2006.

He gave 14 pages of Coca-Cola documents marked "Classified --
Confidential" and "Classified -- Highly Restricted".

"I can even provide actual products and packaging of certain products,
that no eye has seen, outside of maybe five top execs," the letter states.

Coca-Cola CEO thanked Pepsi officials for alerting their competitor "to
this attack."
Source: CNN
XecureIT
©PTIMANTeknologiInformasi
R U Sure U R Secure?
Espionage
Case: McLaren vs Ferrari, July 2007

Ferrari engineer passes two computer discs to Mike
Coughlan, chief designer of McLaren.

Contain 780 pages of Ferrari technical information.

Mr Coughlan's wife was copying the dossier in a
photocopying shop.

A staff member from the shop tipped off Ferrari after
realizing that the documents were confidential.

"We would not have found out about it were it not from a
tip-off by the photocopying agency," said Ferrari
Source: New Zealand Herald, July 2007
XecureIT
©PTIMANTeknologiInformasi
R U Sure U R Secure?
Malicious Employee
Case: Societe Generale

Jerome Kerviel is a trader

He subverted Societe Generale's systemwide safeguards and
security controls.

Led to $7.2 billion in losses for one of France's largest banks.
XecureIT
©PTIMANTeknologiInformasi
R U Sure U R Secure?
Malicious Contractor
Case: Fannie Mae

Unix engineer and IT contractor Rajendrasinh Makwana installed a "server
bomb" on Fannie Mae's (the mortgage giant) servers.

He was embedding a malicious script in fall 2008.

The script was to go off on Jan. 31, 2009 and "would have disabled
monitoring alerts and all log-ins, deleted the root passwords to the
approximately 4,000 Fannie Mae servers, then erased all data and backup
data on those servers by overwriting with zeros.

By chance, a Fannie Mae employee discovered the malicious script before it
went off.
XecureIT
©PTIMANTeknologiInformasi
R U Sure U R Secure?
Malicious Auditor
Case: KPMG

In the spring of 2005, Guy Enright, an accountant at KPMG Financial
Advisory Services Ltd. in Bermuda, got a call from a man identifying
himself in a crisp British accent as Nick Hamilton.

Enright believed Hamilton was a British intelligence officer

Hamilton wanted information about a KPMG project that had national
security implications for Britain.

Soon, Enright, who was born in Britain, was depositing confidential
audit documents in plastic containers at drop-off points designated by
Hamilton.
R U Sure U R Secure? XecureIT
©PTIMANTeknologiInformasi
Case: Verisign
R U Sure U R Secure? XecureIT
©PTIMANTeknologiInformasi
Case: Heartland
R U Sure U R Secure? XecureIT
©PTIMANTeknologiInformasi
Case: UK Royal Navy Laptop
XecureIT
©PTIMANTeknologiInformasi
R U Sure U R Secure?
Case: Microsoft Web Site
XecureIT
©PTIMANTeknologiInformasi
R U Sure U R Secure?
Case: Citibank
R U Sure U R Secure? XecureIT
©PTIMANTeknologiInformasi
Cases: e-Banking
XecureIT
©PTIMANTeknologiInformasi
R U Sure U R Secure?
Case: Victim of Stolen ID
XecureIT
©PTIMANTeknologiInformasi
R U Sure U R Secure?
More Cases... @XECUREIT

Más contenido relacionado

Destacado

Destacado (20)

Developing a Legal Framework for Privacy
Developing a Legal Framework for PrivacyDeveloping a Legal Framework for Privacy
Developing a Legal Framework for Privacy
 
Chuan weihoo_IISF2011
Chuan weihoo_IISF2011Chuan weihoo_IISF2011
Chuan weihoo_IISF2011
 
Personal security
Personal securityPersonal security
Personal security
 
Rusmanto - Pengantar PDF dan Aplikasi Open Source terkait PDF
Rusmanto - Pengantar PDF dan Aplikasi Open Source terkait PDFRusmanto - Pengantar PDF dan Aplikasi Open Source terkait PDF
Rusmanto - Pengantar PDF dan Aplikasi Open Source terkait PDF
 
Tasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-Government
Tasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-GovernmentTasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-Government
Tasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-Government
 
Summary report cc brti
Summary report cc brtiSummary report cc brti
Summary report cc brti
 
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
 
04. SAKTTI Introduction
04. SAKTTI Introduction04. SAKTTI Introduction
04. SAKTTI Introduction
 
Telkom sigma keminfo materi
Telkom sigma keminfo materiTelkom sigma keminfo materi
Telkom sigma keminfo materi
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk IndonesiaDR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
 
20111214 iisf shinoda_
20111214 iisf shinoda_20111214 iisf shinoda_
20111214 iisf shinoda_
 
Global informationsecurityissue_ZainalHasibuan
Global informationsecurityissue_ZainalHasibuanGlobal informationsecurityissue_ZainalHasibuan
Global informationsecurityissue_ZainalHasibuan
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi NasionalSkema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
 
Information Security Governance
Information Security GovernanceInformation Security Governance
Information Security Governance
 
Penanganan Kasus Cybercrime
Penanganan Kasus CybercrimePenanganan Kasus Cybercrime
Penanganan Kasus Cybercrime
 
Persyaratan perangkat lunak 20141118_18november2014
Persyaratan perangkat lunak 20141118_18november2014Persyaratan perangkat lunak 20141118_18november2014
Persyaratan perangkat lunak 20141118_18november2014
 
Rancangan Peraturan Menteri Sistem Manajemen Pengamanan Informasi
Rancangan Peraturan Menteri Sistem Manajemen Pengamanan InformasiRancangan Peraturan Menteri Sistem Manajemen Pengamanan Informasi
Rancangan Peraturan Menteri Sistem Manajemen Pengamanan Informasi
 
Surat kepada seluruh Rektor Perguruan Tinggi dan Ketua Prodi di NKRI
Surat kepada seluruh Rektor Perguruan Tinggi dan Ketua Prodi di NKRISurat kepada seluruh Rektor Perguruan Tinggi dan Ketua Prodi di NKRI
Surat kepada seluruh Rektor Perguruan Tinggi dan Ketua Prodi di NKRI
 

Similar a 02. R U Sure U R Secure

Raoul Chiesa Hacking A Impianti Industriali
Raoul Chiesa   Hacking A Impianti IndustrialiRaoul Chiesa   Hacking A Impianti Industriali
Raoul Chiesa Hacking A Impianti IndustrialiGoWireless
 
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020Business Days
 
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet CaseMag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet CaseNeelabh Rai
 
Bulletinof theAtomicScientistsIT IS 5 MINUTES TO MID.docx
Bulletinof theAtomicScientistsIT IS 5 MINUTES TO MID.docxBulletinof theAtomicScientistsIT IS 5 MINUTES TO MID.docx
Bulletinof theAtomicScientistsIT IS 5 MINUTES TO MID.docxRAHUL126667
 
Cooper theft duke_energy
Cooper theft duke_energyCooper theft duke_energy
Cooper theft duke_energyIlias Varsamis
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...TI Safe
 
iec62443_compress.pdf
iec62443_compress.pdfiec62443_compress.pdf
iec62443_compress.pdfAmineRached2
 
[CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK ...
[CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK ...[CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK ...
[CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK ...CODE BLUE
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza Belayneh
 
Working remotely due to the coronavirus? This technology from your employer i...
Working remotely due to the coronavirus? This technology from your employer i...Working remotely due to the coronavirus? This technology from your employer i...
Working remotely due to the coronavirus? This technology from your employer i...Abaram Network Solutions
 
Protecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email ThreatsProtecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email ThreatsOPSWAT
 
US Power Grid Vs. Smart Grid
US Power Grid Vs. Smart GridUS Power Grid Vs. Smart Grid
US Power Grid Vs. Smart GridJosh Wentz
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT Worldsyrinxtech
 

Similar a 02. R U Sure U R Secure (20)

Security Management
Security ManagementSecurity Management
Security Management
 
SCADA Security
SCADA SecuritySCADA Security
SCADA Security
 
Nov 2008 sec prod
Nov 2008 sec prodNov 2008 sec prod
Nov 2008 sec prod
 
Raoul Chiesa Hacking A Impianti Industriali
Raoul Chiesa   Hacking A Impianti IndustrialiRaoul Chiesa   Hacking A Impianti Industriali
Raoul Chiesa Hacking A Impianti Industriali
 
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020
 
S C A D A Security Keynote C K
S C A D A  Security  Keynote  C KS C A D A  Security  Keynote  C K
S C A D A Security Keynote C K
 
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet CaseMag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
 
Bulletinof theAtomicScientistsIT IS 5 MINUTES TO MID.docx
Bulletinof theAtomicScientistsIT IS 5 MINUTES TO MID.docxBulletinof theAtomicScientistsIT IS 5 MINUTES TO MID.docx
Bulletinof theAtomicScientistsIT IS 5 MINUTES TO MID.docx
 
Cyberattack Forces a Shutdown of a Top U.S. Pipeline
Cyberattack Forces a Shutdown of a Top U.S. PipelineCyberattack Forces a Shutdown of a Top U.S. Pipeline
Cyberattack Forces a Shutdown of a Top U.S. Pipeline
 
Att agl
Att aglAtt agl
Att agl
 
Cooper theft duke_energy
Cooper theft duke_energyCooper theft duke_energy
Cooper theft duke_energy
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
 
iec62443_compress.pdf
iec62443_compress.pdfiec62443_compress.pdf
iec62443_compress.pdf
 
[CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK ...
[CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK ...[CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK ...
[CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK ...
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 
Working remotely due to the coronavirus? This technology from your employer i...
Working remotely due to the coronavirus? This technology from your employer i...Working remotely due to the coronavirus? This technology from your employer i...
Working remotely due to the coronavirus? This technology from your employer i...
 
Protecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email ThreatsProtecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email Threats
 
US Power Grid Vs. Smart Grid
US Power Grid Vs. Smart GridUS Power Grid Vs. Smart Grid
US Power Grid Vs. Smart Grid
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT World
 
SCADA Security in CDIC 2009
SCADA Security in CDIC 2009SCADA Security in CDIC 2009
SCADA Security in CDIC 2009
 

Más de Directorate of Information Security | Ditjen Aptika

Más de Directorate of Information Security | Ditjen Aptika (20)

Sosialisasi Keamanan Informasi_Sektor Kesehatan
Sosialisasi Keamanan Informasi_Sektor KesehatanSosialisasi Keamanan Informasi_Sektor Kesehatan
Sosialisasi Keamanan Informasi_Sektor Kesehatan
 
Sosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
Sosialisasi Keamanan Informasi_Penyelenggaraan TelekomunikasiSosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
Sosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
 
Sosialisasi Keamanan Informasi_Sektor Tranportasi
Sosialisasi Keamanan Informasi_Sektor TranportasiSosialisasi Keamanan Informasi_Sektor Tranportasi
Sosialisasi Keamanan Informasi_Sektor Tranportasi
 
Sosialisasi Keamanan Informasi_Bidang Perhubungan Udara
Sosialisasi Keamanan Informasi_Bidang Perhubungan UdaraSosialisasi Keamanan Informasi_Bidang Perhubungan Udara
Sosialisasi Keamanan Informasi_Bidang Perhubungan Udara
 
Sosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
Sosialisasi Keamanan Informasi_Bidang Mineral dan BatubaraSosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
Sosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
 
Sosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
Sosialisasi Keamanan Informasi_Bidang KetenagalistrikanSosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
Sosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
 
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
 
Fetri Miftach_Uji publik rpm tata kelola
Fetri Miftach_Uji publik rpm tata kelolaFetri Miftach_Uji publik rpm tata kelola
Fetri Miftach_Uji publik rpm tata kelola
 
Hasyim Gautama_Tata kelola tik 20151118
Hasyim Gautama_Tata kelola tik 20151118Hasyim Gautama_Tata kelola tik 20151118
Hasyim Gautama_Tata kelola tik 20151118
 
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasi
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasiStandar rujukan keamanan informasi sub sektor perangkat telekomunikasi
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasi
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made WiryawanDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior LazuardiDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim GautamaDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
 
Teguh arifiyadi ls skse
Teguh arifiyadi ls skseTeguh arifiyadi ls skse
Teguh arifiyadi ls skse
 
Konny sagala skema kelaikan se
Konny sagala skema kelaikan seKonny sagala skema kelaikan se
Konny sagala skema kelaikan se
 
Intan rahayu tata cara sertifikasi kelaikan sistem elektronik
Intan rahayu tata cara sertifikasi kelaikan sistem elektronikIntan rahayu tata cara sertifikasi kelaikan sistem elektronik
Intan rahayu tata cara sertifikasi kelaikan sistem elektronik
 
Uji Publik RPM SMPI Fetri Miftah
Uji Publik RPM SMPI  Fetri MiftahUji Publik RPM SMPI  Fetri Miftah
Uji Publik RPM SMPI Fetri Miftah
 
RPM SMPI 20150805 Hasim Gautama
RPM SMPI 20150805 Hasim GautamaRPM SMPI 20150805 Hasim Gautama
RPM SMPI 20150805 Hasim Gautama
 
SNI ISO 27001 Anwar Siregar
SNI ISO 27001 Anwar SiregarSNI ISO 27001 Anwar Siregar
SNI ISO 27001 Anwar Siregar
 
RPM SMPI
RPM SMPIRPM SMPI
RPM SMPI
 

Último

PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030tarushabhavsar
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance managementVaishnaviGunji
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecZurliaSoop
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfDerekIwanaka1
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareWorkforce Group
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdflaloo_007
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...NadhimTaha
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfbelieveminhh
 

Último (20)

PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance management
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdf
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 

02. R U Sure U R Secure

  • 1. XecureIT ©PTIMANTeknologiInformasi R U Sure U R Secure? R U Sure U R Secure?
  • 2. XecureIT ©PTIMANTeknologiInformasi R U Sure U R Secure? Oil and Gas SCADA/DCS Case: Gazprom, April 2000  Gazprom is the world's largest natural gas producer and Western Europe's largest source.  “ Russian authorities revealed this week that Gazprom, a state-run gas utility, came under the control of malicious hackers.  The intruders succeeded in defeating the company's security and breaking into systems controlling gas pipelines, Interior Ministry spokesman Colonel Konstantin Machabeli said.  The flow of natural gas was under the control of outsiders for some time, Machabeli reported. The Colonel said the intruders used some type of Trojan to gain access, but didn't name it. “
  • 3. XecureIT ©PTIMANTeknologiInformasi R U Sure U R Secure? Oil and Gas SCADA/DCS Case: Olympic Pipe Line Co., July 1999  Breakdowns in the Olympic Pipe Line Co. computer system just before and during last month's deadly accident in Bellingham have so alarmed federal regulators that they have issued a nationwide warning.  The federal Office of Pipeline Safety issued the warning... The advisory details a series of computer failures on June 10 around the time Olympic's 16-inch line leaked up to 277,000 gallons of gasoline into Bellingham creeks. Gasoline vapor later exploded in flames, and two 10-year-old boys and a teenager were killed.  After the accident, Olympic acknowledged that its computer system crashed on the afternoon of the accident. The computer problems may have kept Olympic personnel from reacting quickly to the leak, regulators said. ”
  • 4. XecureIT ©PTIMANTeknologiInformasi R U Sure U R Secure? Oil and Gas SCADA/DCS Case: Davis-Besse  “ The Slammer worm penetrated a private computer network at Ohio's Davis-Besse nuclear power plant in January and disabled a safety monitoring system for nearly five hours...  The Slammer worm entered the Davis-Besse plant through a circuitous route. It began by penetrating the unsecured network of an unnamed Davis-Besse contractor, then squirmed through a private connection bridging that network and Davis-Besse's corporate network.  One of multiple connections into Davis-Besse's business network completely bypassed the plant's firewall, which was programmed to block the port Slammer used to spread.  Some people in Corporate's Network Services department were not aware of the connection.
  • 5. R U Sure U R Secure? XecureIT ©PTIMANTeknologiInformasi Cyberwar Case: 3 Kiloton Explosion, June 1982
  • 6. R U Sure U R Secure? XecureIT ©PTIMANTeknologiInformasi Cyberwar Case: DNS Service Provider
  • 7. R U Sure U R Secure? XecureIT ©PTIMANTeknologiInformasi Cyberwar Case: People Powered
  • 8. R U Sure U R Secure? XecureIT ©PTIMANTeknologiInformasi Espionage Case: Government Involvement
  • 9. XecureIT ©PTIMANTeknologiInformasi R U Sure U R Secure? Espionage Case: Coca-Cola and Pepsi  An executive administrative assistant at Coke in Atlanta offering samples of a new product to Pepsi for $1.5 million.  He sent the initial letter to Pepsi using an official Coca-Cola envelope on May 19, 2006.  He gave 14 pages of Coca-Cola documents marked "Classified -- Confidential" and "Classified -- Highly Restricted".  "I can even provide actual products and packaging of certain products, that no eye has seen, outside of maybe five top execs," the letter states.  Coca-Cola CEO thanked Pepsi officials for alerting their competitor "to this attack." Source: CNN
  • 10. XecureIT ©PTIMANTeknologiInformasi R U Sure U R Secure? Espionage Case: McLaren vs Ferrari, July 2007  Ferrari engineer passes two computer discs to Mike Coughlan, chief designer of McLaren.  Contain 780 pages of Ferrari technical information.  Mr Coughlan's wife was copying the dossier in a photocopying shop.  A staff member from the shop tipped off Ferrari after realizing that the documents were confidential.  "We would not have found out about it were it not from a tip-off by the photocopying agency," said Ferrari Source: New Zealand Herald, July 2007
  • 11. XecureIT ©PTIMANTeknologiInformasi R U Sure U R Secure? Malicious Employee Case: Societe Generale  Jerome Kerviel is a trader  He subverted Societe Generale's systemwide safeguards and security controls.  Led to $7.2 billion in losses for one of France's largest banks.
  • 12. XecureIT ©PTIMANTeknologiInformasi R U Sure U R Secure? Malicious Contractor Case: Fannie Mae  Unix engineer and IT contractor Rajendrasinh Makwana installed a "server bomb" on Fannie Mae's (the mortgage giant) servers.  He was embedding a malicious script in fall 2008.  The script was to go off on Jan. 31, 2009 and "would have disabled monitoring alerts and all log-ins, deleted the root passwords to the approximately 4,000 Fannie Mae servers, then erased all data and backup data on those servers by overwriting with zeros.  By chance, a Fannie Mae employee discovered the malicious script before it went off.
  • 13. XecureIT ©PTIMANTeknologiInformasi R U Sure U R Secure? Malicious Auditor Case: KPMG  In the spring of 2005, Guy Enright, an accountant at KPMG Financial Advisory Services Ltd. in Bermuda, got a call from a man identifying himself in a crisp British accent as Nick Hamilton.  Enright believed Hamilton was a British intelligence officer  Hamilton wanted information about a KPMG project that had national security implications for Britain.  Soon, Enright, who was born in Britain, was depositing confidential audit documents in plastic containers at drop-off points designated by Hamilton.
  • 14. R U Sure U R Secure? XecureIT ©PTIMANTeknologiInformasi Case: Verisign
  • 15. R U Sure U R Secure? XecureIT ©PTIMANTeknologiInformasi Case: Heartland
  • 16. R U Sure U R Secure? XecureIT ©PTIMANTeknologiInformasi Case: UK Royal Navy Laptop
  • 17. XecureIT ©PTIMANTeknologiInformasi R U Sure U R Secure? Case: Microsoft Web Site
  • 18. XecureIT ©PTIMANTeknologiInformasi R U Sure U R Secure? Case: Citibank
  • 19. R U Sure U R Secure? XecureIT ©PTIMANTeknologiInformasi Cases: e-Banking
  • 20. XecureIT ©PTIMANTeknologiInformasi R U Sure U R Secure? Case: Victim of Stolen ID
  • 21. XecureIT ©PTIMANTeknologiInformasi R U Sure U R Secure? More Cases... @XECUREIT