• Keine Ergebnisse gefunden

How has Snowden changed the evaluation of the IT...

N/A
N/A
Protected

Academic year: 2021

Aktie "How has Snowden changed the evaluation of the IT..."

Copied!
9
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

1

Norbert Pohlmann

Chairman: IT security association TeleTrusT

Professor: Westphalian University of Applied Sciences

Director: Institute for Internet Security - if(is)

(2)

ISSE 2013

Programme

Panel: Cyber security in Europe - the next steps.

How to come back to a trustworthy Internet?

(3)

3

Norbert Pohlmann

Chairman: IT security association TeleTrusT

Professor: Westphalian University of Applied Sciences

Director: Institute for Internet Security - if(is)

How has Snowden changed the

(4)

Findings I

Hackers from “China” hacked everything very successful!  Google, Microsoft, RSA, …

 The New York Times, Washington Post, …  Every US Government Agency, …

 …

(5)

Findings II

5

NSA and Co. do everything which is possible

 Of course we all know the theoretical possibilities

 But we are shocked about what is really implemented  The US IT market leaders are assistants to the NSA  The laws make everything top secret and

therefore it is not discussible

 The NSA is buying the knowledge about new security vulnerability for own attacks, not for publishing  The end does not justify the means

(6)

What is the problem?

Manipulated IT and IT security technologies make our business insecure!

 Implementation errors in IT security technologies (SSL, …)  Using insecure Cipher Suite (RC4, DES, …)

 Bad random generators

 Backdoors in hardware and software (OS, App, …)

 Using NSA friendly e-mail accounts and cloud services  …

(7)

No transparency

 produces distrust!

7

Which IT company can we trust?

 Google, Facebook, Microsoft, Apple, … Which government can we trust?

 US, UK, Canada, …, Germany, … Can we still trust evaluation and

(8)

IT security situation today

How can we improve our IT security situation?  Can we stop the misuse of IT vulnerabilities?

 Is it possible to detect backdoors in technology and services?  Can we protect us against the economic espionage and the

power of the Intelligence Services and the Cyber soldiers from some countries?

 Which IT and IT security technology can stop the attackers?

 Will we find secure and trusted solutions so that we can use the global Internet with an appropriated level of risk?

(9)

Thank you very much for your

attention!

I wish everybody a very successful

ISSE 2013

in

Brussels

Referenzen

ÄHNLICHE DOKUMENTE

stock prices. It is generally accepted, by both proponents and opponents of shareholder-value ideology, that corporate executives in the United States have

This article shows how standards for the evaluation of IT security may be integrated with the KORA approach for law compatible technology design to the benefit of both –

Energy co-operation has been accompanied by the es- tablishment of closer political, economic and cultural relations, and Prime Minister Orban has expressed the opinion that the EU

Ein Programm hat das Be- triebssystem so manipuliert, dass der Benutzer und auch Antivirenprogramme Malware nicht mehr entdecken können?. Ein solches Programm wird

 Programme, die unabsichtlich installiert werden und dem Benutzer Werbung zeigen oder weitere Software

Synthesis Lectures on Data

Augsten (Univ. Salzburg) ITS – Statistical Databases Winter Semester 2015/16 1 / 5. All infos about the database part in

personnel “who may be temporarily in Belize in connection with military exercises and training, counter-drug related activities, United States security assistance programs, or