david shu ppt
DESCRIPTION
ppt about internet bankingTRANSCRIPT
David Shu
Cyber Security Issues in Internet Banking
Senior Architect Compliance & Security Standard Chartered March 2013
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Cisco Confidential 2 © 2010 Cisco and/or its affiliates. All rights reserved.
What is
Internet
Banking?
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Cisco Confidential 3 © 2010 Cisco and/or its affiliates. All rights reserved.
1660’s
1660 1950 1960 1970 1980 1990 2000 2010 2020+
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Cisco Confidential 4 © 2010 Cisco and/or its affiliates. All rights reserved. http://www.bbc.co.uk/ahistoryoftheworld/objects/becTP-jATkmwWfx7ol336w
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Cisco Confidential 5 © 2010 Cisco and/or its affiliates. All rights reserved.
Trust
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Cisco Confidential 6 © 2010 Cisco and/or its affiliates. All rights reserved.
1950-60s
1660 1950 1960 1970 1980 1990 2000 2010 2020+
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Cisco Confidential 7 © 2010 Cisco and/or its affiliates. All rights reserved.
http://www.tomshardware.com/picturestory/508-mainframe-computer-history.html
1965
Multics CTSS on IBM 7094 contains a flaw that may
disclose the contents of the password file. The issue
occurred when multiple instances of the system text
editor were invoked, causing the editor to create
temporary files with a constant name. This would
unexplicably cause the contents of the system
CTSS password file to display to any user logging
into the system.
http://osvdb.org/show/osvdb/23257
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Cisco Confidential 8 © 2010 Cisco and/or its affiliates. All rights reserved.
1960-80s
1660 1950 1960 1970 1980 1990 2000 2010 2020+
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Cisco Confidential 9 © 2010 Cisco and/or its affiliates. All rights reserved.
http://www.guardian.co.uk/money/gallery/2007/jun/27/1
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Cisco Confidential 10 © 2010 Cisco and/or its affiliates. All rights reserved.
Source: Wikipedia
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Cisco Confidential 11 © 2010 Cisco and/or its affiliates. All rights reserved.
1990s
1660 1950 1960 1970 1980 1990 2000 2010 2020+
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Cisco Confidential 12 © 2010 Cisco and/or its affiliates. All rights reserved.
http://www.canstar.com.au/online-banking/history-of-internet-banking/
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Cisco Confidential 13 © 2010 Cisco and/or its affiliates. All rights reserved.
http://www.phishing.org/history-of-phishing/
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Cisco Confidential 14 © 2010 Cisco and/or its affiliates. All rights reserved.
2000s
1660 1950 1960 1970 1980 1990 2000 2010 2020+
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 Cisco Confidential 15 © 2010 Cisco and/or its affiliates. All rights reserved.
http://www.yodlee.com/yodlee-moneycenter-blog/great-infographic-the-history-of-online-banking/
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Cisco Confidential 16 © 2010 Cisco and/or its affiliates. All rights reserved.
http://www.fbi.gov/news/stories/2010/october/cyber-banking-fraud/cyber-banking-fraud-graphic
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Cisco Confidential 17 © 2010 Cisco and/or its affiliates. All rights reserved.
2010-20+
1660 1950 1960 1970 1980 1990 2000 2010 2020+
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Cisco Confidential 18 © 2010 Cisco and/or its affiliates. All rights reserved.
Source: Versafe and Check Point Software Technologies
http://www.checkpoint.com/products/downloads/whitepapers/Eurograbber_White_Paper.pdf
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 Cisco Confidential 19 © 2010 Cisco and/or its affiliates. All rights reserved.
Source: Versafe and Check Point Software Technologies
http://www.checkpoint.com/products/downloads/whitepapers/Eurograbber_White_Paper.pdf
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 Cisco Confidential 20 © 2010 Cisco and/or its affiliates. All rights reserved. http://www.imperva.com/docs/hii_the_anatomy_of_an_anonymous_attack.pdf
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 Cisco Confidential 21 Cisco Confidential 21 © 2010 Cisco and/or its affiliates. All rights reserved.
Recap
Internet Banking is about Trust -Trust is the cornerstone of banking.
-As the threats increase so will the countermeasures.
- If you find this exciting, you should consider a career in IT Security
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Cisco Confidential 22 © 2010 Cisco and/or its affiliates. All rights reserved.
http://www.standardchartered.com.sg/move2013/
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 Cisco Confidential 23 © 2010 Cisco and/or its affiliates. All rights reserved.
Security Related Courses:
CCNA Security with Cisco Networking Academy
https://www.netacad.com/group/offerings/ccna-security
The ISC² courses: https://www.isc2.org/cissp/default.aspx
SANS training: http://www.sans.org/
ISACA courses: http://www.isaca.org/Education/