More Related Content Similar to 03. The Security Weakest Links (20) More from Directorate of Information Security | Ditjen Aptika (20) 03. The Security Weakest Links1. Security is Like a Chain...
as Strong as The Weakest link
90% cyber security implementation is inconsistent... :’(
XecureIT
© PT IMAN Teknologi InformasiThe Security Weakest Links v2.0
2. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
People: Unaware and Ignorance
“Amateur hacks the systems. Professional hacks the people.”
3. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
People: Unaware and Ignorance
“Amateur hacks the systems. Professional hacks the people.”
14. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
Government and Business
Cooperation
15. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
Backdoor
Vendors: “Backdoors are critical
vulnerabilities.”
16. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
Backdoor
Vendors: “Discovered hidden key is a
critical vulnerability.”
17. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
Backdoor
Vendors: “Discovered hidden key is a
critical vulnerability.”
18. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
Backdoor
Firmware
19. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
Backdoor
Kill Switch
20. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
End-Point
Malware in The Browser and ATM
22. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
The History of War
23. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
The Cyberwar
24. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
Mobile Device
25. © PT IMAN Teknologi Informasi XecureITThe Security Weakest Links v2.0
Mobile Device