Internet Privacy
Secure Your Information
Girindro Pringgo Digdo
Information Security Researcher
Bandung, May 13, 2014
Indonesia Security Incident Responses Team on Internet Infrastructure (ID-SIRTII)
whoami
● InfoSec Guy
● Over 5 years as Penetration Tester
● Instructor
● Founder of omega.or.id
Where Are We?
Where Are We?
Insecure Digital World
Headline Bad News
● Gmail users have no "reasonable expectation"
that their communications are confidential.
http://www.theguardian.com/technology/2013/aug/14/google-gmail-users-privacy-email-lawsuit
● Microsoft has admitted that it will hand over data to the U.S.
government, if properly requested, even if that data is stored
somewhere other than the U.S.
http://www.readwrite.com/2011/06/30/microsoft-says-it-will-give-yo
Information Security Myths
● Secure Socket Layer (SSL) will protect entire websites.
● Firewall will secure you against attack.
● No issues printed from Automatic Web Vulnerability Scanner.
● Annual Vulnerability Assessment is enough.
● Our developer has a good skill in programming.
● ?
Problems
● Difficult law enforcement in border-less world
● People can't expect privacy
● Social engineering works well due to lack of awareness makes
● Physical security
● Malware becoming more and more powerful
● Organized crime
● ?
What Should We Do?
Protect Your Information
Think before you share
personal information
● Read the website's privacy policy
● Do not share more than you need to
● Choose how private you want your profile or blog to be
● ?
Know the risk
● you use public internet
● you enter confidential data (eg username, password)
● you use credit/debit card at store
● ?
What if :
Minimize access to your information
● Lock your computer when you are away from it.
● Access with authentication.
eg bios password, account password, Encryption
This prevents another person from waiting for you
to leave and then sitting down at your computer
and accessing all of your information.
Encryption
● Protect your confidential information
● Only available for you
● End to end encryption
✔ PGP
● Good Integrity
● ?
Encryption
Encryption
● Full Disk Encryption
● Using things that:
✔ you know
✔ you have
✔ you are
● Always called as Multi Factor Authentication
Encryption
Technology
“If you think technology can solve your security problems,
then you don't understand the problems and you don't
understand the technology.”
~ Bruce Schneier
Trust But Verify
Feeling Secure is Dangerous
Question?
girindigdo@gmail.com
girin@omega.or.id

More Related Content

PDF
Protecting Digital Economy through Vulnerability Coordination Center
PDF
Threat Modeling Using STRIDE
PDF
20171106 - Privacy Design Lab - LINDDUN
PPTX
Threat Modeling Lessons from Star Wars
PPTX
Operationalizing Threat Intelligence to Battle Persistent Actors
PDF
When Insiders ATT&CK!
PPTX
Threat modeling (Hacker Stories) workshop
PPTX
Corporate Espionage without the Hassle of Committing Felonies
Protecting Digital Economy through Vulnerability Coordination Center
Threat Modeling Using STRIDE
20171106 - Privacy Design Lab - LINDDUN
Threat Modeling Lessons from Star Wars
Operationalizing Threat Intelligence to Battle Persistent Actors
When Insiders ATT&CK!
Threat modeling (Hacker Stories) workshop
Corporate Espionage without the Hassle of Committing Felonies

What's hot (20)

PDF
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
PPTX
Maltego Webinar Slides
PDF
MITRE ATTACKCon Power Hour - December
PPTX
Threat Modeling Lessons From Star Wars
PPTX
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
PDF
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
PPTX
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
PDF
Threat Activity Groups - Dragos
PDF
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
PDF
Cyber Threat hunting workshop
PDF
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
PDF
MITRE ATT&CKcon 2018: Playing Devil’s Advocate to Security Initiatives with A...
PDF
Security by Design: An Introduction to Drupal Security
PPTX
Defcon Crypto Village - OPSEC Concerns in Using Crypto
PDF
Developing a Threat Modeling Mindset
PDF
Blockade.io : One Click Browser Defense
PDF
"Meet Me in the Middle: Threat Indications & Warning to enable Operational Th...
PDF
In search of unique behaviour
PDF
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
PDF
Automation: The Wonderful Wizard of CTI (or is it?)
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Maltego Webinar Slides
MITRE ATTACKCon Power Hour - December
Threat Modeling Lessons From Star Wars
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Threat Activity Groups - Dragos
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
Cyber Threat hunting workshop
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
MITRE ATT&CKcon 2018: Playing Devil’s Advocate to Security Initiatives with A...
Security by Design: An Introduction to Drupal Security
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Developing a Threat Modeling Mindset
Blockade.io : One Click Browser Defense
"Meet Me in the Middle: Threat Indications & Warning to enable Operational Th...
In search of unique behaviour
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
Automation: The Wonderful Wizard of CTI (or is it?)
Ad

Similar to Internet Privacy (20)

PDF
Don't Diligence Information Security for Lawyers
PPTX
Securing your digital life - Jason Addie
PPTX
Computer Security For Activists & Everyone (Oct 2018)
PPT
Basic Digital Security
ODP
Cyber Security & User's Privacy Invasion
PDF
Information security & data security | Chandan Singh Ghodela
PPTX
Online Privacy & Computer Security Basics (September 2017)
PDF
Google FIDO Authentication Case Study
PDF
Password Overload_ Smart Ways to Manage Your Digital Keys in 2025.pdf
ODP
Hit by a Cyberattack: lesson learned
PDF
Mc physics colloquium2018-03-30.-handouts
PPTX
Data privacy and data classification
ODP
Cell phone security lite
PDF
Google Case Study - Towards simpler, stronger authentication
PPTX
Cyber Awareness 101 - essentials package for kids
PDF
Security for Data Scientists
PDF
Data security in the age of GDPR – most common data security problems
PDF
Cybersecurity Awareness Training Presentation v1.3
PDF
Becoming Unphishable
PPTX
Computer and Cyber Security for CSEC IT Grades 11
Don't Diligence Information Security for Lawyers
Securing your digital life - Jason Addie
Computer Security For Activists & Everyone (Oct 2018)
Basic Digital Security
Cyber Security & User's Privacy Invasion
Information security & data security | Chandan Singh Ghodela
Online Privacy & Computer Security Basics (September 2017)
Google FIDO Authentication Case Study
Password Overload_ Smart Ways to Manage Your Digital Keys in 2025.pdf
Hit by a Cyberattack: lesson learned
Mc physics colloquium2018-03-30.-handouts
Data privacy and data classification
Cell phone security lite
Google Case Study - Towards simpler, stronger authentication
Cyber Awareness 101 - essentials package for kids
Security for Data Scientists
Data security in the age of GDPR – most common data security problems
Cybersecurity Awareness Training Presentation v1.3
Becoming Unphishable
Computer and Cyber Security for CSEC IT Grades 11
Ad

Recently uploaded (20)

PPTX
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PDF
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
PPTX
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
PDF
JuanConnect E-Wallet Guide for new users.pdf
PPTX
Digital Project Mastery using Autodesk Docs Workshops
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PPTX
最新版美国埃默里大学毕业证(Emory毕业证书)原版定制文凭学历认证
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PPTX
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
PDF
Virtual Guard Technology Provider_ Remote Security Service Solutions.pdf
PDF
The_Decisive_Battle_of_Yarmuk,battle of yarmuk
PPTX
Cyber Hygine IN organizations in MSME or
PDF
Course Overview and Agenda cloud security
PPTX
Artificial_Intelligence_Basics use in our daily life
PPTX
Edit gdasgdkhagfhgfgfasdghhdgfhdgfj.pptx
PDF
Testing & QA Checklist for Magento to Shopify Migration Success.pdf
PPSX
AI AppSec Threats and Defenses 20250822.ppsx
PDF
How Technology Shapes Our Information Age
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
JuanConnect E-Wallet Guide for new users.pdf
Digital Project Mastery using Autodesk Docs Workshops
AI_Cyberattack_Solutions AI AI AI AI .pptx
最新版美国埃默里大学毕业证(Emory毕业证书)原版定制文凭学历认证
Alethe Consulting Corporate Profile and Solution Aproach
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
Virtual Guard Technology Provider_ Remote Security Service Solutions.pdf
The_Decisive_Battle_of_Yarmuk,battle of yarmuk
Cyber Hygine IN organizations in MSME or
Course Overview and Agenda cloud security
Artificial_Intelligence_Basics use in our daily life
Edit gdasgdkhagfhgfgfasdghhdgfhdgfj.pptx
Testing & QA Checklist for Magento to Shopify Migration Success.pdf
AI AppSec Threats and Defenses 20250822.ppsx
How Technology Shapes Our Information Age
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...

Internet Privacy

  • 1. Internet Privacy Secure Your Information Girindro Pringgo Digdo Information Security Researcher Bandung, May 13, 2014 Indonesia Security Incident Responses Team on Internet Infrastructure (ID-SIRTII)
  • 2. whoami ● InfoSec Guy ● Over 5 years as Penetration Tester ● Instructor ● Founder of omega.or.id
  • 4. Where Are We? Insecure Digital World
  • 5. Headline Bad News ● Gmail users have no "reasonable expectation" that their communications are confidential. http://www.theguardian.com/technology/2013/aug/14/google-gmail-users-privacy-email-lawsuit ● Microsoft has admitted that it will hand over data to the U.S. government, if properly requested, even if that data is stored somewhere other than the U.S. http://www.readwrite.com/2011/06/30/microsoft-says-it-will-give-yo
  • 6. Information Security Myths ● Secure Socket Layer (SSL) will protect entire websites. ● Firewall will secure you against attack. ● No issues printed from Automatic Web Vulnerability Scanner. ● Annual Vulnerability Assessment is enough. ● Our developer has a good skill in programming. ● ?
  • 7. Problems ● Difficult law enforcement in border-less world ● People can't expect privacy ● Social engineering works well due to lack of awareness makes ● Physical security ● Malware becoming more and more powerful ● Organized crime ● ?
  • 8. What Should We Do? Protect Your Information
  • 9. Think before you share personal information ● Read the website's privacy policy ● Do not share more than you need to ● Choose how private you want your profile or blog to be ● ?
  • 10. Know the risk ● you use public internet ● you enter confidential data (eg username, password) ● you use credit/debit card at store ● ? What if :
  • 11. Minimize access to your information ● Lock your computer when you are away from it. ● Access with authentication. eg bios password, account password, Encryption This prevents another person from waiting for you to leave and then sitting down at your computer and accessing all of your information.
  • 12. Encryption ● Protect your confidential information ● Only available for you ● End to end encryption ✔ PGP ● Good Integrity ● ?
  • 14. Encryption ● Full Disk Encryption ● Using things that: ✔ you know ✔ you have ✔ you are ● Always called as Multi Factor Authentication
  • 16. Technology “If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology.” ~ Bruce Schneier
  • 17. Trust But Verify Feeling Secure is Dangerous