Title: Trusting the Trust
1Trusting the Trust
- Budi Rahardjobudi_at_indocisc.com
http//rahard.wordpress.comInixindo Security
Day SeminarThe Executive Club, Jakarta, 19 March
2009
2Trust vs. Securityno 100 secure system
3Security vs.
- Convenience
- Performance
- Business Requirement
4Failing the trust
- Malicious software virus, worm,
- Malicious users crackers, attackers,
- Fraud disgruntled employees,
- Indentity theft unauthenticated users,
5identity theft facebook, friendster, social
networksdo you trust your friends?
march 2009
5
BR - trusting the trust
6On the internet, nobody knows youre a dog
7Authentication
- Authentication factors
- What you have (card, token)
- What you know (password, pin, id)
- What you are (biometrics)
- Electronic transaction requirement
- 2 factor-authentication
8Do you trust your bank?
9borrowed slides on skimmer attached on an ATM
machine of a local bank. Sorry, I cannot add the
slides here since I dont know the owner of the
slides to ask/acknowledge.
march 2009
9
BR - trusting the trust
10Do you trust your e-government?election jokes,
e-gov, e-proc
march 2009
10
BR - trusting the trust
11Examples of bad 2009 election campaign posters
are available at http//janganbikinmalu2009.com
march 2009
11
BR - trusting the trust
12Can you trust your code?
march 2009
12
BR - trusting the trust
13Open Source is better, IF
14you play with your coderead Ken Thompson,
"Reflections on Trusting Trust" ACM, September
1995
15Reflections on trusting trust
- Self reproducing code
- Learning program
- Create trojaned compilercompile a bug
versionwhen detecta pattern
16meaning skill is important awareness too
17Reducing Risks
- Anti virus,
- 2 factors authentication,
18Reducing Risks
- But really
- people, process, technology
19Reducing Risks
- Review periodically by independent, trusted 3rd
party - How do you trust your partner?
20Thank you fortrusting me )
- Budi Rahardjobudi_at_indocisc.com
21(No Transcript)