Skip to content
This repository has been archived by the owner on Dec 16, 2019. It is now read-only.

Latest commit

 

History

History
263 lines (181 loc) · 8.92 KB

01-01-motivation.md

File metadata and controls

263 lines (181 loc) · 8.92 KB

Motivation


Security = ⁉️


Security

The state of being free from danger or threat. [1]


Vulnerability = ⁉️


Vulnerability

A flaw or weakness in system security procedures, design, implementation, or internal controls that could […] result in a security breach or a violation of the system's security policy [2]


Exploit = ⁉️


Exploit

A piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized) [3]


Zero Day = ⁉️


Zero-Day

A zero day vulnerability refers to a hole in software that is unknown to the vendor.

This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack. [...]

The term “zero day” refers to the unknown nature of the hole to those outside of the hackers, specifically, the developers. Once the vulnerability becomes known, a race begins for the developer, who must protect users. [4]


Exercise 1.1 (:pushpin:)

Brainstorming Attackers

  1. Identify and describe possible Attackers and their motivation
  2. Rate the danger posed by each attacker type (:skull: to :skull::skull::skull:)
  3. Estimate the risk of your own employer being targeted by each identified attacker type (in %)
  4. Which attacker types are likely to work together and how does this impact their danger rating?

Advantage of the Attacker

  • Attacker must succeed once
    • Defender must get it right all the time
  • Attacker can choose the weakest spot
    • Defender must defend all places
  • Attacker can leverage zero-days
    • Defender can only defend against known attacks
  • Attacker can play dirty
    • Defender needs to play by the rules

Case Studies


Data Breaches (by no. of records)

Data Breaches by no. of records


Data Breaches (by data sensitivity)

Data Breaches by data sensitivity


Marriot (November 2018)

The hotel chain asked guests checking in for a treasure trove of personal information: credit cards, addresses and sometimes passport numbers. On Friday, consumers learned the risk. Marriott International revealed that hackers had breached its Starwood reservation system and had stolen the personal data of up to 500 million guests. [5]

Marriot logo


[...] Starwood’s data has not popped up on the so-called dark web, according to Recorded Future, a cybersecurity firm, and Coalition, a cyber insurance provider, which suggested that the hotel attackers weren’t looking to sell what they took.

“Usually when stolen data doesn’t appear, it’s a state actor collecting it for intelligence purposes,” [...] information could be fed, for example, into an analysis program run by a country’s state security apparatus [...]. Using “big data” technology similar to what marketers use in targeted advertising, the country could try to pinpoint the comings and going of intelligence agents from other nations. Did they stay, for example, in the same hotel as a potential source for that country? [5]

The intrusion went unnoticed for four years by Starwood. 📆


Equifax (September 2017)

If you have a credit report, there’s a good chance that you’re one of the 143 million American consumers whose sensitive personal information was exposed in a data breach at Equifax, one of the nation’s three major credit reporting agencies. [6]

Equifax logo


Here are the facts, according to Equifax. The breach lasted from mid-May through July. The hackers accessed people’s names, Social Security numbers, birth dates, addresses and, in some instances, driver’s license numbers. They also stole credit card numbers for about 209,000 people and dispute documents with personal identifying information for about 182,000 people. And they grabbed personal information of people in the UK and Canada too. [6]

Recommended steps for protection include "monitor your existing credit card and bank accounts closely" but also "consider placing a credit freeze" 🍦 or "placing a fraud alert on your files".


VTech (November 2015)

[...] When it comes to our identities being leaked all over the place, it’s just another day on the web. Unless it’s our children’s identities, that’s a whole new level. When it’s hundreds of thousands of children including their names, genders and birthdates, that’s off the charts. [7]

VTech logo


When it includes their parents as well – along with their home address – and you can link the two and emphatically say “Here is 9 year old Mary, I know where she lives and I have other personally identifiable information about her parents (including their password and security question)”, I start to run out of superlatives to even describe how bad that is. [7]

It later came out that head shots 📷 of kids and private chat messages were also exposed. The total number of children exposed in the incident is over 6.3 million.


CloudPets (February 2017)

[...] There were a lot of news headlines about how Germany had banned an internet-connected doll called "Cayla" over fears hackers could target children.

[...] Just before that, we had the VTech data breach which exposed a huge amount of very personal information.

Which brings us to CloudPets [...] which is a toy that represents the nexus of both the problems discussed above. [8]

CloudPets logo


[...] Put yourself in the shoes of the average parent, that is one who's technically literate enough to know the wifi password but not savvy enough to understand how the "magic" of daddy talking to the kids through the bear (and vice versa) actually works. They don't necessarily realise that every one of those recordings – those intimate, heartfelt, extremely personal recordings – between a parent and their child is stored as an audio file on the web. They certainly wouldn't realise that in CloudPets' case, that data was stored in a MongoDB that was in a publicly facing network segment without any authentication required and had been indexed by Shodan (a popular search engine for finding connected things). [8]

Impacted parents were never notified by CloudPets. 😱


Exercise 1.2 (optional)

Have I been pwned?

  1. Visit https://haveibeenpwned.com/
  2. Type in your email address
  3. Hit the pwned? button

Good news - No pwnage found! Oh no - pwned!


Exercise 1.3 (:house:)

  1. Mark potentially malicious items in the Press Kit from the Trump-Kim Summit (2018) in the image on the next slide (:arrow_right:)
  2. Explain possible ways how these items might actually be malicious
  3. Reason about potential attackers behind this and explain their most likely motivations
  4. Come up with a least two more additions to the Press Kit and explain how they could be used maliciously

ℹ️ Speculation is allowed, but still be as specific as possible!


Press kit from Trump-Kim Summit in Singapore 2018

Footnotes

  1. https://en.oxforddictionaries.com/definition/security

  2. http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf

  3. https://en.wikipedia.org/wiki/Exploit_(computer_security)

  4. https://web.archive.org/web/20170704035927/http://www.pctools.com/security-news/zero-day-vulnerability/

  5. https://www.nytimes.com/2018/11/30/business/marriott-data-breach.html 2

  6. https://www.consumer.ftc.gov/blog/2017/09/equifax-data-breach-what-do 2

  7. https://www.troyhunt.com/when-children-are-breached-inside 2

  8. https://www.troyhunt.com/data-from-connected-cloudpets-teddy-bears-leaked-and-ransomed-exposing-kids-voice-messages 2