Hacking, Privacy and Security in a Hyperconnected Society

Post on 21-Jan-2018

468 views 0 download

Transcript of Hacking, Privacy and Security in a Hyperconnected Society

DescriptionData and technological advances are abounding at lightening speed. It is hard to stay on top of everything that is happening in these digitally disruptive times. But there has never been more important for companies and individuals to do so. Hacking, privacy, and security are on the minds of every corporation and private citizen. In this keynote, you will hear the latest trends in combating contrast threats to one’s security, how much more data can we possibly handle. The unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products allowing Internet connectivity.

Perfect World Scenario

Real World ScenarioWhat actually happens...

Photo Share - Excited Giver

Meta Data - Web Extraction

Location - Google Maps: Street View

Web Search on Phone Model

• SEARCH FOR VULNERABILITIES

• IDENTIFIED THREATS BASED ON DATE - CORRELATE WITH PHOTO TIME STAMP

• SEARCH TO SEE PRELOADED SOFTWARE CONFIGURATION

[3] TIME STAMP

• LOCATION PATTERN ANALYSIS [3] [4]

• SIMPLE LATITUDE & LONGITUDE [4]

• SEARCH FOR VULNERABILITIES [2]

• IDENTIFIED THREATS BASED ON DATE - CORRELATE WITH PHOTO TIME STAMP [3]

• SEARCH TO SEE PRELOADED SOFTWARE CONFIGURATION [2] [3]

• ADDITIONAL FIELDS: CAPTION, DESCRIPTION

Maltego - Example

Maltego - Geolocation From and To Tweet [Circular Area]

OWASP Top 10 Vulnerabilities - 2006

Digital Footprint

Maltego - Example

Maletgo - Example Cont.

Maletgo - Example Cont.

Maletgo - Example Cont.

Intelligence Applications

RecommendationsMobile Device

• Anti Virus

• Trusted Applications

• Device Hardening

• Clicking on Unknown Links in Web Broswer

• Check Application Authorizations

Embedded Device

• Scan for Cyber Security Posture

• Limit the Data Shared on Device

Social Media

• Remove GPS Tag

• Remove Metadata

• Limit Posting Revealing Information

• Control Digital Footprint

Bluetooth 2.0 > Versions

• Insecure Versions

• Limit Use

• Limit Pairing

**Even though SSP improves the security of Bluetooth pairing, it has been shownthat MITM attacks against Bluetooth 2.1+EDR, 3.0+HS, and 4.0 devices are possibleby forcing victim devices to use the Just Works association model**

Any QuestionsContact at dawsonmau@umsl.edu