2015 Cost of Data Breach Study, reports conducted by Ponemon and sponsored by IBM

From IBM X-Force Research page

IBM is proud to sponsor the tenth annual Cost of Data Breach Study, the industry’s gold-standard benchmark research independently conducted by Ponemon Institute.

This is another interesting source of information when comparing your organization to the others, worth to have a look.

From 2015 Cost of Data Breach Study: Global Analysis:

IBM-databreachstudy2015-1

From 2015 Cost of Data Breach Study: Impact of Business Continuity Management:

IBM-databreachstudy2015-2

Posted in Cybersecurity, ICT Leadership and Management, Security Management, Security Training, Awareness and Reports | Comments Off on 2015 Cost of Data Breach Study, reports conducted by Ponemon and sponsored by IBM

Raspberry and RFID reader/writer, first test

An RFID system is always made up of two components:

  • the transponder, Proximity Integrated Circuit Card (PICC)
  • the detector or reader , Proximity Coupling Device (PCD)

rfid-basic-scheme

The RFID reader/writer (13.56MHz) RF522 for arduino can be used in Raspberry. In this first test, the steps described here and here were followed. They both are using the python source code. Please see these references for the correct connections between raspberry and the RC522 (see picture below).

raspberry-RC522

The reader can read MIFARE cards. The block diagram is shown below. The data in the EEPROM can be “read & write” with this RC522.

RFID-mirafecard

The 1024 x 8 bit EEPROM memory is organized in 16 sectors with 4 blocks of 16 bytes each.

RFID-mirafecard2

In the test, the source code worked out from the box without any changes..
A small modifications were made on the code to change the printout.

Reading a card:

pi@raspberrypi ~/SPI-Py/MFRC522-python $ sudo python Read2.py
/home/pi/SPI-Py/MFRC522-python/MFRC522.py:113: RuntimeWarning: This channel is already in use, continuing anyway.  Use GPIO.setwarnings(False) to disable warnings.
  GPIO.setup(22, GPIO.OUT)
Welcome to the MFRC522 data read example
Press Ctrl-C to stop.
Card detected
Card read UID: 77,84,46,59
Size: 8
Sector 0 [77, 84, 46, 59, 12, 8, 4, 0, 98, 99, 100, 101, 102, 103, 104, 105]
Sector 1 [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]
Sector 3 [0, 0, 0, 0, 0, 0, 255, 7, 128, 105, 255, 255, 255, 255, 255, 255]

Dumping the content of 1K card:

pi@raspberrypi ~/SPI-Py/MFRC522-python $ sudo python Dump2.py
/home/pi/SPI-Py/MFRC522-python/MFRC522.py:113: RuntimeWarning: This channel is already in use, continuing anyway.  Use GPIO.setwarnings(False) to disable warnings.
  GPIO.setup(22, GPIO.OUT)
Card detected
Card read UID(integer values): 77,84,46,59
Size: 8
 Sector 0 Block 0  4d 54 2e 3b 0c 08 04 00 62 63 64 65 66 67 68 69
 Sector 0 Block 1  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 0 Block 2  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 0 Block 3  00 00 00 00 00 00 ff 07 80 69 ff ff ff ff ff ff
Trailer            !------keyA-----! !-access--! !-----keyB------!
 Sector 1 Block 0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 1 Block 1  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 1 Block 2  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 1 Block 3  00 00 00 00 00 00 ff 07 80 69 ff ff ff ff ff ff
Trailer            !------keyA-----! !-access--! !-----keyB------!
 Sector 2 Block 0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 2 Block 1  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 2 Block 2  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 2 Block 3  00 00 00 00 00 00 ff 07 80 69 ff ff ff ff ff ff
Trailer            !------keyA-----! !-access--! !-----keyB------!
 Sector 3 Block 0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 3 Block 1  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 3 Block 2  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 3 Block 3  00 00 00 00 00 00 ff 07 80 69 ff ff ff ff ff ff
Trailer            !------keyA-----! !-access--! !-----keyB------!
 Sector 4 Block 0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 4 Block 1  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 4 Block 2  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 4 Block 3  00 00 00 00 00 00 ff 07 80 69 ff ff ff ff ff ff
Trailer            !------keyA-----! !-access--! !-----keyB------!
 Sector 5 Block 0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 5 Block 1  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 5 Block 2  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 5 Block 3  00 00 00 00 00 00 ff 07 80 69 ff ff ff ff ff ff
Trailer            !------keyA-----! !-access--! !-----keyB------!
 Sector 6 Block 0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 6 Block 1  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 6 Block 2  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 6 Block 3  00 00 00 00 00 00 ff 07 80 69 ff ff ff ff ff ff
Trailer            !------keyA-----! !-access--! !-----keyB------!
 Sector 7 Block 0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 7 Block 1  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 7 Block 2  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 7 Block 3  00 00 00 00 00 00 ff 07 80 69 ff ff ff ff ff ff
Trailer            !------keyA-----! !-access--! !-----keyB------!
 Sector 8 Block 0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 8 Block 1  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 8 Block 2  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 8 Block 3  00 00 00 00 00 00 ff 07 80 69 ff ff ff ff ff ff
Trailer            !------keyA-----! !-access--! !-----keyB------!
 Sector 9 Block 0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 9 Block 1  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 9 Block 2  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 Sector 9 Block 3  00 00 00 00 00 00 ff 07 80 69 ff ff ff ff ff ff
Trailer            !------keyA-----! !-access--! !-----keyB------!
Sector 10 Block 0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Sector 10 Block 1  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Sector 10 Block 2  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Sector 10 Block 3  00 00 00 00 00 00 ff 07 80 69 ff ff ff ff ff ff
Trailer            !------keyA-----! !-access--! !-----keyB------!
Sector 11 Block 0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Sector 11 Block 1  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Sector 11 Block 2  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Sector 11 Block 3  00 00 00 00 00 00 ff 07 80 69 ff ff ff ff ff ff
Trailer            !------keyA-----! !-access--! !-----keyB------!
Sector 12 Block 0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Sector 12 Block 1  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Sector 12 Block 2  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Sector 12 Block 3  00 00 00 00 00 00 ff 07 80 69 ff ff ff ff ff ff
Trailer            !------keyA-----! !-access--! !-----keyB------!
Sector 13 Block 0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Sector 13 Block 1  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Sector 13 Block 2  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Sector 13 Block 3  00 00 00 00 00 00 ff 07 80 69 ff ff ff ff ff ff
Trailer            !------keyA-----! !-access--! !-----keyB------!
Sector 14 Block 0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Sector 14 Block 1  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Sector 14 Block 2  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Sector 14 Block 3  00 00 00 00 00 00 ff 07 80 69 ff ff ff ff ff ff
Trailer            !------keyA-----! !-access--! !-----keyB------!
Sector 15 Block 0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Sector 15 Block 1  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Sector 15 Block 2  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Sector 15 Block 3  00 00 00 00 00 00 ff 07 80 69 ff ff ff ff ff ff
Trailer            !------keyA-----! !-access--! !-----keyB------!

Modified/New sources. Just add/overwrite these in the same directory.

  • Read2.py
    • tries to read blocks 0, 1 and 3 from sector 0 (printout says sectors 0, 1 and 3)
  • Dump2.py
    • the printout is formatted to show better the sectors and blocks, requires new MFRC522.py (see below)
  • MFRC522.py
    • the additional parts required by Dump2.py are added at the end of the file

Links

It is difficult to find good RFID overview articles or presentations. Good starting point is the excellent book RFID Handbook, 3rd Ed.

Security related aspects

Hacking community has been active on RFID for some years.

There are some ways to protect your RFID cards.

Posted in DIY, For Fun or Interest, Gadgets, Hobbies and Other Interests, Internet of Things and M2M, Raspberry Pi, Robotics, Tests | Comments Off on Raspberry and RFID reader/writer, first test

Cloud Information Governance: Data Security Study, by Ponemon

Safenet has sponsored a survey called “The Challenges of Cloud Information Governance: A Global Data Security Study“. The purpose of the survey is very interesting:

The purpose of this research is to focus on how organizations are putting confidential information at risk in the cloud because of the lack of appropriate governance policies and security practices.

They have concluded 7 reasons why cloud governance is a challenge, for example:

  • There is uncertainty about who is accountable for safeguarding confidential or sensitive information
  • IT security is out of the loop when companies are making decision

ponemon-safenet-2014

 

ponemon-safenet-2014B

Other links

Posted in Cloud Computing, Cloud Security, Security Management, Security Training, Awareness and Reports | Comments Off on Cloud Information Governance: Data Security Study, by Ponemon

Global heatmap, by G4S Risk Consulting

Global Intelligence System (GIS) is providing an online service, including a Heatmap and Global forecast reports.

G4S-heatmap

There are forecast reports freely available, and they can provide short and concise information about current threats and hazards globally. Please see the links below.

  • Global Forecast 2015
    • The number of cyber-attacks in India has grown nearly five-fold in the last three years and the trend is proliferating. Companies operating in India may face threats of large-scale hacking attacks from criminal groups and hactivist groups in Pakistan.
    • Corporations operating in Russia and beyond will face a serious threat from state-sponsored cyber espionage.

Other links

Posted in Security Incidents and Cases, Security Organizations, Security Threats | Comments Off on Global heatmap, by G4S Risk Consulting

Survey Report on Endpoint Security, by Ponemon

Yet another survey report from Ponemon, called 2015 State of Endpoint Report: User-Centric Risk. The survey covered about 700 security practitioners.

“This annual study is conducted to understand trends and changes in endpoint risk in organizations. An endpoint can include servers, desktops, laptops, smartphones, and even printers, ATMs and PoS devices. “

ponemon-endpoint2015

Posted in ICT Leadership and Management, Risk Management, Security Management, Security Training, Awareness and Reports | Comments Off on Survey Report on Endpoint Security, by Ponemon

Unintentional Insider Risk, report by Ponemon

Raytheon has published an interesting report called “The Unintentional Insider Risk in United States and German Organizations“, conducted by Ponemon Institute. Worth to have a look.

Some highlights:

  • IT practitioners agree unintentional employee negligence causes more security incidents than intentional and malicious acts
  • Telling the difference between malicious and negligent security incidents is difficult.
  • Long hours and multi-tasking are also red flags for risk

ponemon-unintentionalinsiderrisk

The report also contains results for “8 scenarios that often lead to security incidents”.

Posted in ICT Leadership and Management, Security Management, Security Threats | Comments Off on Unintentional Insider Risk, report by Ponemon

2015 Information security breaches survey, conducted by PwC

There is a survey report available (2015, UK specific). It contains several good information for security professionals and management.

From main site:

The information security breaches survey is carried out annually for Department for Business, Innovation and Skills (BIS) by PricewaterhouseCoopers (PwC) to assess the level of information security breaches in businesses and organisations.

Links:

From PwC site:

Links:

An example:

PWC2015-HM1

Posted in Security Incidents and Cases, Security Management | Comments Off on 2015 Information security breaches survey, conducted by PwC