New Genre of Mobile Security

31
We are pleased to present a new show in cyber security, entitled . . . Enough, “When’s Enough?”

Transcript of New Genre of Mobile Security

Page 1: New Genre of Mobile Security

We are pleased to present a new show in cyber

security, entitled . . .

Enough, “When’s

Enough?”

Page 2: New Genre of Mobile Security

All is well at Int’l Phishing Industries. . .

Int’l Phishing Industries

Page 3: New Genre of Mobile Security

I’ve got

the OPM

on the hook!

Oh good, another one!Great!

The same

tricks keep

working. . .

Int’l Phishing Industries

OPM

All is well at Int’l Phishing Industries. . .

Page 4: New Genre of Mobile Security

Was the OPM Breach really a surprise???

Breaking

NewsCardSystems

2005

TD Ameritrade

2015

Breaking News

2007Breaking

News

2011Breaking

News

2013

Breaking

News

2014

Breaking News

Home Depot, DHS

Anthem

RSA

Target

Page 5: New Genre of Mobile Security

Was the OPM Breach really a surprise???

Breaking

NewsCardSystems

2005

TD Ameritrade

2015

Breaking News

2007Breaking

News

2011Breaking

News

2013

Breaking

News

2014

Breaking News

Home Depot, DHS

Anthem

RSA

Target

It was the SAME type of attack as Anthem.

Which was the SAME as Home Depot. . .

and DHS. . . and Target.

And Phishing Attacks go UNDETECTED for years–

like Pawn Storm 2007-2014

Of course not. . .

Page 6: New Genre of Mobile Security

If you think it ain’t broke, the Government’s$4.5 billion

Einstein System failed

to protect

Page 7: New Genre of Mobile Security

over 5 MILLION

Fingerprints also stolen from the

OPM

If you think it ain’t broke, the Government’s$4.5 billion

Einstein System failed

to protect

Page 8: New Genre of Mobile Security

More BYOD, social media & apps make it even easier for me.

And it’s getting worse. . .

Page 9: New Genre of Mobile Security

More BYOD, social media & apps make it even easier for me.

They’re now specifically targeting

containers and virtualization too!

And it’s getting worse. . .

Page 10: New Genre of Mobile Security

Here’s a thought. .

.

Page 11: New Genre of Mobile Security

INTRODUCING

Let’s try something

DIFFERENT!

Page 12: New Genre of Mobile Security

Hardware-Separated Operating Systems

Willy & Wally WorkPlay

Starring

Let’s try something

DIFFERENT!

Page 13: New Genre of Mobile Security

Now appearing . . . Identical . . .

Complete OS’s. . .

EACH with its OWN

resources . . .

Page 14: New Genre of Mobile Security

I’ve got MY OWN kernel,

storage, RAM & drivers.

Now appearing . . . Identical . . .

Complete OS’s. . .

EACH with its OWN

resources . . .

Page 15: New Genre of Mobile Security

I’ve got MY OWN kernel,

storage, RAM & drivers.

I’ve got MY OWN kernel,

storage, RAM & drivers,

TOO!Now appearing . . . Identical . . .

Complete OS’s. . .

EACH with its OWN

resources . . .

Page 16: New Genre of Mobile Security

Juggling between WORK and PLAY in 2 separate OS’s

that CAN’T access each

other

Page 17: New Genre of Mobile Security

W

W

WW

W

Wally can’t touch me!

Juggling between WORK and PLAY in 2 separate OS’s

that CAN’T access each

other

Page 18: New Genre of Mobile Security

W

W

WW

W

P

P

PP

P

Wally can’t touch me! And Willy

can’t touch me!

Juggling between WORK and PLAY in 2 separate OS’s

that CAN’T access each

other

Page 19: New Genre of Mobile Security

Mom learns the importance of HARDWARE

SEPARATION . . .

Page 20: New Genre of Mobile Security

Boys! Learn to

share. Share your

kernel . . . Share

your memory . . .

Share ALL of your

resources.

Mom learns the importance of HARDWARE

SEPARATION . . .

Page 21: New Genre of Mobile Security

Boys! Learn to

share. Share your

kernel . . . Share

your memory . . .

Share ALL of your

resources.

NO Mom, sharing is NOT GOOD.

When one of us gets a virus, do you want the other one

infected too?

Mom learns the importance of HARDWARE

SEPARATION . . .

Page 22: New Genre of Mobile Security

Now Wally’s boss doesn’t have to worry

about what Willy is doing.

Page 23: New Genre of Mobile Security

BYOD just became a

lot easier . . .

Now Wally’s boss doesn’t have to worry

about what Willy is doing.

IT Admi

n

Page 24: New Genre of Mobile Security

Here Willy and Wally go to work

for the Government. . .

Page 25: New Genre of Mobile Security

Here Willy and Wally go to work

for the Government. . . I’m doing

CLASSIFIED only

Page 26: New Genre of Mobile Security

Here Willy and Wally go to work

for the Government. . . I’m doing

EVERYTHING else

I’m doing CLASSIFIED

only

Page 27: New Genre of Mobile Security

Going Out

of

Business

Sale

Things aren’t so well at Int’l Phishing anymore

Int’l Phishing Industries

Page 28: New Genre of Mobile Security

I hacked in

but can’t

access t

he

network

Going Out

of

Business

Sale

DRAT!

FOILED AGAIN

by Hardware-

Separated

Operating Systems!

Any luck?

Things aren’t so well at Int’l Phishing anymore

Int’l Phishing Industries

Page 29: New Genre of Mobile Security

Anybody wanna buy my laptop?

I hacked in

but can’t

access t

he

network

Going Out

of

Business

Sale

Will you take this

stupid suit they

made me wear in

this cartoon play?

DRAT!

FOILED AGAIN

by Hardware-

Separated

Operating Systems!

Any luck?

Things aren’t so well at Int’l Phishing anymore

Int’l Phishing Industries

Page 30: New Genre of Mobile Security

Before you go, did you know?

Page 31: New Genre of Mobile Security

Before you go, did you know?

*Author’s note: Willy and Wally are fictional characters who accurately portray WorkPlay Technology. Otherwise, any resemblance to persons living or dead is coincidental.

IT Admi

n

Willy & Wally* are less than 10K lines of

code.