- Inti Rossenbach, in cybersecurity since 1998
- Physics, applied cryptography then cybersecurity, sea kayak expedition in Patagonia, CISO
- University lecturer
- www.cryptosec.org
- iro@cryptosec.org
- Mastodon @cryptosec@infosec.exchange
- Two real-life cyber attacks
- Threats, risks and security
- Ethics
- Vulnerabilities
- Perimetrical defenses
- In-depth defenses
- Humans
- Detection and reaction
https://www.theregister.com/2020/09/11/trump_twitter_account_recycled_password
- No 0 risk, life is risky
- Risk =
Likelihood x Impact
- Risk treatment:
--> accept
--> reduce / mitigate
--> refuse
--> transfer
- Impacts:
--> confidentiality
--> integrity
--> availability
- Security controls:
--> prevention
--> detection
--> reaction
Threat landscape:
- cybercrime (frauds, ransomware, data kidnapping...)
- script kiddies
- competitors
- espionnage & state-sponsored actors
- ...
- Laws, regulations, privacy, GDPR...
- Always keep thinking by yourself about what you are doing
- Definition:
--> bugs
--> configuration errors
--> conception mistakes
--> backdoors
- Some samples:
buffer overflows, injections, RCE, supply chain attacks... humans
Security testing
- Network (DMZ, IDS, WAF...)
- Emails and attachments filtering
- Web filtering
- Internal network segregation
- Vulnerability and patch management
- Hardening
- Antimalwares
- Cryptography
- Passwords and authentication
- Secure remote accesses
- Application security
Authentication:
- Something I know
- Something I own
- Something I am
--> Strong authentication: 2 of 3
Passwords at risks:
- Shouldersurfing
- Unencrypted flows
- Keylogger / malware
- Password written in cleartext
- Compromised database / reuse of passwords
Secure passwords:
- ... passphrases
- Long enough
- Not necessary often renewed
- Use 2FA
- Use password managers like https://keepass.info
- Check https://haveibeenpwned.com
Exercise: https://phishingquiz.withgoogle.com
- Social engineering: phishing, spear phishing...
- Security policy
- Security organization
- Security awareness
- In case of doubt, check: https://www.virustotal.com
- Logs and alerts
- Scans and pentests
- DFIR
- SOCs, CERTs, CSIRTs...
- Threat intell / survey