SECURITY

Talking Up Security At Iswec 2012 (Part 2)

7/24/2012 11:34:41 AM

After that was Azril Azam, Team Lead, Global Response Centre IMPACT, who talked about how secure it is to use cloud and its overall security. According to Azril. hackers will exploit weakness derived from future IT markets needs and growths (meaning hackers also learn finance and business), for example weaknesses derived from Bring Your Own Device (BYOD) in the cloud and finally the communication between devices. More flexibility between devices means lesser security. That's another route hackers can use to steal information.

Description: After that was Azril Azam, Team Lead, Global Response Centre IMPACT, who talked about how secure it is to use cloud and its overall security

After that was Azril Azam, Team Lead, Global Response Centre IMPACT, who talked about how secure it is to use cloud and its overall security

Azril says. "Back then, to access company flies, organisation will provide notebooks or other devices with certain amount of security in it. Nowadays, workers are using their own devices for work. Mobile Trojans have been rising. Viruses from Symbian arc now heading over to the Android and iOS platform. Imagine using your own device to access the enterprise cloud. The Trojans that arc already inside the device can go anywhere and even access the enterprise cloud. It can then open a backdoor for the hacker to do or place whatever files they want in this enterprise cloud.”

Azril also presented case studies done by them, of cyberthreats involving human factor, lousy codes and poor access control. The first case study saw them employing a less experienced technical person who was then allowed to install any security software on a virtual machine (VM), without having any kind of security knowledge or guided policy. What happened was due to lack of knowhow, security patches weren't updated resulting in a huge security loophole. “The human factor is the weakest link also because of social engineering," Azril emphasises.

Another case study was to do with bad programming practices and testers asked a less experienced programmer to develop code for cloud software with security in it Azril explains,

Description: According to Azril, hackers will exploit weakness derived from future IT markets needs and growths (meaning hackers also learn finance and business), for example weaknesses derived from Bring Your Own Device

According to Azril, hackers will exploit weakness derived from future IT markets needs and growths (meaning hackers also learn finance and business), for example weaknesses derived from Bring Your Own Device

“Even a senior programmer was told to take part by monitoring them. But because of unsecured development code, a SQL injection into the login page was all too easy." This was due to programmers not being educated and made aware of security.

Even poor system access controls can compromise a system. The last system, saw downloading of exploited binaries from a fake server because of a poisoned DNS. "Downloads or updates to clouds can also compromise cloud security. A senior system admin was asked to install a Qemu virtual machine, and sure enough, the poisoned DNS rerouted to a fake website with compromised Qemu software. This resulted in easy access to the servers that have the contaminated software. " Azril concludes with the moral of the story which is that free software comes with a 'penalty' that the provider may impose less security and contaminated software binaries.computing into three categories, namely public, private and hybrid.

According to Sykes, cloud computing is having your applications being installed in some place by someone so that it can be accessed from almost anywhere and at any time. Sykes says, from a security point of view, the problem with this is almost everything; when people start to move ahead with these things, overtime, history repeats itself. Security is always second in place.

He explains, "What tends to happen is that people tend to get carried away with an opportunity and go ahead to implement it. Then businesses will realise that they are dependent on this stuff and wonder if there is enough security for this? Then they need to spend more money on it and the people who develop these applications will say it's not their problem. In quick summary, people need to step back a little bit and start thinking about putting security in right from the start."

Description: “Mobile Trojans have been rising. Viruses from Symbian are now heading over to the Android and iOS platform” Azil says.

“Mobile Trojans have been rising. Viruses from Symbian are now heading over to the Android and iOS platform” Azil says.

After that was Azril Azam, Team Lead, Global Response Centre IMPACT, who talked about how secure it is to use cloud and its overall security. According to Azril, hackers will exploit weakness derived from future IT markets needs and growths (meaning hackers also learn finance and business), for example weaknesses derived from Bring Your Own Device (BYOD) in the cloud and finally the communication between devices. More flexibility between devices means lesser security.

That's another route hackers can use to steal information.

Azril says, "Back then, to access company files, organisation will provide notebooks or other devices with certain amount of security in it. Nowadays, workers are using their own devices for work. Mobile Trojans have been rising. Viruses from Symbian are now heading over to the Android and iOS platform. Imagine using your own device to access the enterprise cloud. The Trojans that are already inside the device can go anywhere and even access the enterprise cloud. It can then open a backdoor for the hacker to do or place whatever files they want in this enterprise cloud."

Azril also presented case studies done by them, of cyberthreats involving human factor, lousy codes and poor access control. The first case study saw them employing a less experienced technical person who was then allowed to install any security software on a virtual machine (VM), without having any kind of security knowledge or guided policy. What happened was due to lack of knowhow, security patches weren't updated resulting in a huge security loophole. "The human factor is the weakest link also because of social engineering," Azril emphasises.

Description:  "The human factor is the weakest link also because of social engineering," Azril emphasises.

"The human factor is the weakest link also because of social engineering," Azril emphasises.

Another case study was to do with bad programming practices and testers asked a less experienced programmer to develop code for cloud software with security in it. Azril explains, "Even a senior programmer was told to take part by monitoring them. But because of unsecured development code, a SQL injection into the login page was all too easy.” This was due to programmers not being educated and made aware of security.

Description: QEMU software

QEMU software

Even poor system access controls can compromise a system. The last system, saw downloading of exploited binaries from a fake server because of a poisoned DNS. "Downloads or updates to clouds can also compromise cloud security. A senior system admin was asked to install a Qemu virtual machine, and sure enough, the poisoned DNS rerouted to a fake website with compromised Qemu software. This resulted in easy access to the servers that have the contaminated software. ” Azril concludes with the moral of the story which is that free software comes with a ’penalty' that the provider may impose less security and contaminated software binaries.

Other  
 
Top 10
Review : Sigma 24mm f/1.4 DG HSM Art
Review : Canon EF11-24mm f/4L USM
Review : Creative Sound Blaster Roar 2
Review : Philips Fidelio M2L
Review : Alienware 17 - Dell's Alienware laptops
Review Smartwatch : Wellograph
Review : Xiaomi Redmi 2
Extending LINQ to Objects : Writing a Single Element Operator (part 2) - Building the RandomElement Operator
Extending LINQ to Objects : Writing a Single Element Operator (part 1) - Building Our Own Last Operator
3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
REVIEW
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
VIDEO TUTORIAL
- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
Popular Tags
Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8