presentatie infosecurity 2011
TRANSCRIPT
![Page 1: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/1.jpg)
Titel Spreker
Spotten van fraude in online bankieren via analyse netwerkverkeer Nieuwe problemen, nieuwe oplossingen
Infosecurity 2-3 November 2011 [email protected]
![Page 2: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/2.jpg)
Over vandaag
![Page 3: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/3.jpg)
Een stukje historie
![Page 4: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/4.jpg)
![Page 5: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/5.jpg)
![Page 6: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/6.jpg)
![Page 7: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/7.jpg)
![Page 8: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/8.jpg)
![Page 9: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/9.jpg)
![Page 10: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/10.jpg)
![Page 11: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/11.jpg)
![Page 12: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/12.jpg)
![Page 13: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/13.jpg)
Back office monitoring
Agent based monitoring
Hardening / Pentesting
![Page 14: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/14.jpg)
Bank’s infrastructure (trusted)
Back office monitoring
Intelligence
Agent based monitoring DetACT Online Banking
Hardening / Pentesting
![Page 15: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/15.jpg)
Data storage & processing
Tap
Copy traffic
Process data
Store data
Analyze data
![Page 16: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/16.jpg)
![Page 17: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/17.jpg)
![Page 18: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/18.jpg)
De toekomst
![Page 19: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/19.jpg)
![Page 20: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/20.jpg)
“That’s where the money is.”
![Page 21: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/21.jpg)
![Page 22: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/22.jpg)
![Page 23: Presentatie Infosecurity 2011](https://reader034.vdocuments.mx/reader034/viewer/2022052311/55a9c8d71a28ab535b8b4755/html5/thumbnails/23.jpg)