210 likes | 329 Vues
This seminar, held on March 19, 2009, at The Executive Club in Jakarta, delves into the intricate relationship between trust and security in digital environments. It covers the challenges of identity theft, malicious software, and the importance of authentication. Participants explore factors that contribute to secure systems, including two-factor authentication and the role of technology, process, and people in risk reduction. Real-world examples highlight the necessity of trust in services like e-banking and e-government. Join us to discuss strategies for building reliable, secure digital interactions.
E N D
Trusting the Trust Budi Rahardjobudi@indocisc.com http://rahard.wordpress.comInixindo Security Day SeminarThe Executive Club, Jakarta, 19 March 2009
Trust vs. Security[no 100% secure system] BR - trusting the trust
Security vs. … • Convenience • Performance • Business Requirement
Failing the trust • Malicious software; virus, worm, … • Malicious users; crackers, attackers, … • Fraud; disgruntled employees, … • Indentity theft; unauthenticated users, … BR - trusting the trust
identity theft[facebook, friendster, … social networksdo you trust your “friends”?] march 2009 BR - trusting the trust 5
Authentication • Authentication factors • What you have (card, token) • What you know (password, pin, id) • What you are (biometrics) • Electronic transaction requirement • 2 factor-authentication
Do you trust your bank? BR - trusting the trust
[“borrowed” slides on skimmer attached on an ATM machine of a local bank. Sorry, I cannot add the slides here since I don’t know the owner of the slides to ask/acknowledge.] march 2009 BR - trusting the trust 9
Do you trust your e-government?[election jokes, e-gov, e-proc] march 2009 BR - trusting the trust 10
[Examples of bad 2009 election campaign posters are available at http://janganbikinmalu2009.com] march 2009 BR - trusting the trust 11
Can you trust your code? march 2009 BR - trusting the trust 12
Open Source is better, IF … BR - trusting the trust
you play with your code[read Ken Thompson, "Reflections on Trusting Trust" ACM, September 1995] BR - trusting the trust
Reflections on trusting trust • Self reproducing code • “Learning” program • Create trojaned compilercompile a “bug” versionwhen detecta pattern
meaning … skill is important [awareness too] BR - trusting the trust
Reducing Risks • Anti virus, • 2 factors authentication, • … BR - trusting the trust
Reducing Risks • But … really … • people, process, & technology
Reducing Risks • Review periodically by independent, trusted3rd party • How do you trust your partner?
Thank you fortrusting me :) Budi Rahardjobudi@indocisc.com