david shu ppt

23
David Shu Cyber Security Issues in Internet Banking Senior Architect Compliance & Security Standard Chartered March 2013

Upload: kyakpa123

Post on 21-Jul-2016

25 views

Category:

Documents


1 download

DESCRIPTION

ppt about internet banking

TRANSCRIPT

Page 1: David Shu PPT

David Shu

Cyber Security Issues in Internet Banking

Senior Architect Compliance & Security Standard Chartered March 2013

Page 2: David Shu PPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Cisco Confidential 2 © 2010 Cisco and/or its affiliates. All rights reserved.

What is

Internet

Banking?

Page 3: David Shu PPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Cisco Confidential 3 © 2010 Cisco and/or its affiliates. All rights reserved.

1660’s

1660 1950 1960 1970 1980 1990 2000 2010 2020+

Page 4: David Shu PPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Cisco Confidential 4 © 2010 Cisco and/or its affiliates. All rights reserved. http://www.bbc.co.uk/ahistoryoftheworld/objects/becTP-jATkmwWfx7ol336w

Page 5: David Shu PPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Cisco Confidential 5 © 2010 Cisco and/or its affiliates. All rights reserved.

Trust

Page 6: David Shu PPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Cisco Confidential 6 © 2010 Cisco and/or its affiliates. All rights reserved.

1950-60s

1660 1950 1960 1970 1980 1990 2000 2010 2020+

Page 7: David Shu PPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Cisco Confidential 7 © 2010 Cisco and/or its affiliates. All rights reserved.

http://www.tomshardware.com/picturestory/508-mainframe-computer-history.html

1965

Multics CTSS on IBM 7094 contains a flaw that may

disclose the contents of the password file. The issue

occurred when multiple instances of the system text

editor were invoked, causing the editor to create

temporary files with a constant name. This would

unexplicably cause the contents of the system

CTSS password file to display to any user logging

into the system.

http://osvdb.org/show/osvdb/23257

Page 8: David Shu PPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Cisco Confidential 8 © 2010 Cisco and/or its affiliates. All rights reserved.

1960-80s

1660 1950 1960 1970 1980 1990 2000 2010 2020+

Page 9: David Shu PPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Cisco Confidential 9 © 2010 Cisco and/or its affiliates. All rights reserved.

http://www.guardian.co.uk/money/gallery/2007/jun/27/1

Page 10: David Shu PPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Cisco Confidential 10 © 2010 Cisco and/or its affiliates. All rights reserved.

Source: Wikipedia

Page 11: David Shu PPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Cisco Confidential 11 © 2010 Cisco and/or its affiliates. All rights reserved.

1990s

1660 1950 1960 1970 1980 1990 2000 2010 2020+

Page 13: David Shu PPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Cisco Confidential 13 © 2010 Cisco and/or its affiliates. All rights reserved.

http://www.phishing.org/history-of-phishing/

Page 14: David Shu PPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Cisco Confidential 14 © 2010 Cisco and/or its affiliates. All rights reserved.

2000s

1660 1950 1960 1970 1980 1990 2000 2010 2020+

Page 15: David Shu PPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 Cisco Confidential 15 © 2010 Cisco and/or its affiliates. All rights reserved.

http://www.yodlee.com/yodlee-moneycenter-blog/great-infographic-the-history-of-online-banking/

Page 17: David Shu PPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Cisco Confidential 17 © 2010 Cisco and/or its affiliates. All rights reserved.

2010-20+

1660 1950 1960 1970 1980 1990 2000 2010 2020+

Page 18: David Shu PPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Cisco Confidential 18 © 2010 Cisco and/or its affiliates. All rights reserved.

Source: Versafe and Check Point Software Technologies

http://www.checkpoint.com/products/downloads/whitepapers/Eurograbber_White_Paper.pdf

Page 19: David Shu PPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 Cisco Confidential 19 © 2010 Cisco and/or its affiliates. All rights reserved.

Source: Versafe and Check Point Software Technologies

http://www.checkpoint.com/products/downloads/whitepapers/Eurograbber_White_Paper.pdf

Page 20: David Shu PPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 Cisco Confidential 20 © 2010 Cisco and/or its affiliates. All rights reserved. http://www.imperva.com/docs/hii_the_anatomy_of_an_anonymous_attack.pdf

Page 21: David Shu PPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 Cisco Confidential 21 Cisco Confidential 21 © 2010 Cisco and/or its affiliates. All rights reserved.

Recap

Internet Banking is about Trust -Trust is the cornerstone of banking.

-As the threats increase so will the countermeasures.

- If you find this exciting, you should consider a career in IT Security

Page 22: David Shu PPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Cisco Confidential 22 © 2010 Cisco and/or its affiliates. All rights reserved.

http://www.standardchartered.com.sg/move2013/

Page 23: David Shu PPT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 Cisco Confidential 23 © 2010 Cisco and/or its affiliates. All rights reserved.

Security Related Courses:

CCNA Security with Cisco Networking Academy

https://www.netacad.com/group/offerings/ccna-security

The ISC² courses: https://www.isc2.org/cissp/default.aspx

SANS training: http://www.sans.org/

ISACA courses: http://www.isaca.org/Education/