Your SlideShare is downloading. ×
0
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

DDos Attacks and Web Threats: How to Protect Your Site & Information

825

Published on

Hacking and data theft use to belong to expert hackers. Today, anybody can go online, download free hacking tools, and launch sophisticated Web attacks within minutes. Join InterDev as we host this …

Hacking and data theft use to belong to expert hackers. Today, anybody can go online, download free hacking tools, and launch sophisticated Web attacks within minutes. Join InterDev as we host this webinar presented by Imperva to see these tools in action and learn how to protect your Website from these attacks.

Imperva's Web application cloud based security solution, specifically designed for small and mid-sized organizations, can secure your Website against attacks from free hacking tools such as Havij.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
825
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
22
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • The Imperva Incapsula solution does four key things: Improve website security, protect against DDoS attacks, Optimize website performance, and help fulfill PCI 6.6 Compliance.
  • There are two points to this slide. 1. The system is setup as a giant reverse proxy network. 2. All customers who are on the network are contributing to the safety of the entire network. As attacks happen throughout the network (the red alert symbol) we are able to analyze the security event data and globally apply rules to better protect all users on the network (the green checks).
  • Transcript

    • 1. © 2013 Imperva, Inc. All rights reserved. DDos Attacks and Web Threats: How to Protect Your Site & Information Tina Shaw Account Executive 650-832-6087 tina.shaw@imperva.com
    • 2. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -2
    • 3. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -3
    • 4. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -4
    • 5. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -5
    • 6. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -6
    • 7. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -7
    • 8. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -8
    • 9. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -9
    • 10. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -10
    • 11. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -11
    • 12. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -12
    • 13. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -13
    • 14. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -14
    • 15. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -15
    • 16. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -16
    • 17. © 2013 Imperva, Inc. All rights reserved. - CONFIDENTIAL -17
    • 18. © 2013 Imperva, Inc. All rights reserved.  Low-Orbit Ion Canon (LOIC)  Purpose - DDoS  Windows desktop application, coded in C#  UDP/TCP/HTTP flooding Hacking Tools
    • 19. © 2013 Imperva, Inc. All rights reserved. Hacker Forum Discussion Topics DoS is Another Tool in the Hacker Toolbox 16% 22% 19% 10% 12% 12% 9% spam dos/ddos SQL Injection zero-day shell code brute-force HTML Injection Source: Imperva. Covers July 2010 -July 2011 across 600,000 discussions
    • 20. © 2013 Imperva, Inc. All rights reserved. A 100GB attack (Sept 24th) • Featured in eWeek on October 1, 2013 • The attack's load was distributed across our +350Gbps network. (each color represents a different data center)
    • 21. © 2013 Imperva, Inc. All rights reserved. Imperva Incapsula Overview Confidential21 Incapsula helps Website owners…
    • 22. © 2013 Imperva, Inc. All rights reserved. Imperva Incapsula Simplicity FlexibilityVersatility Imperva Incapsula Overview
    • 23. © 2013 Imperva, Inc. All rights reserved. Versatility “The idea of recognizing your strengths and using them in as versatile a way as you can is cool to me.” - Frank Ocean ^
    • 24. © 2013 Imperva, Inc. All rights reserved. Imperva Incapsula Versatility Confidential24 By routing Website traffic through Incapsula, bad traffic is removed and good traffic is accelerated Web Application Firewall (WAF)Distributed Denial of Service (DDOS)Distributed Denial of Service (DDOS)Load BalancingLoad BalancingContent Delivery Network (CDN)
    • 25. © 2013 Imperva, Inc. All rights reserved. Imperva Incapsula is Deployed as a Reverse Proxy Network 360 Global Threat Detection & Analysis: Enables early detection of threats and attack vectors and instant application of protection rules across the entire proxy network
    • 26. © 2013 Imperva, Inc. All rights reserved. Incapsula’s Global Content Delivery Network Confidential26  Datacenters • Currently 15 Datacenters  USA (Ashville NC, Ashburn VA, Los Angles CA, San Jose CA, Chicago IL, Miami FL, Dallas TX, New York NY), London, Singapore, Israel, Amsterdam, Tokyo, Frankfurt, Sydney • Plans for another 4 Datacenters  Toronto, Hong Kong, Sao Paulo, and Milan  Data Across Borders • Customer data can be locked into (or out of) specific countries
    • 27. © 2013 Imperva, Inc. All rights reserved. Simplicity “Life is really simple, but we insist on making it complicated.” - Confusius
    • 28. © 2013 Imperva, Inc. All rights reserved. The Activation Email
    • 29. © 2013 Imperva, Inc. All rights reserved. Creating a User Account
    • 30. © 2013 Imperva, Inc. All rights reserved. Logging into Incapsula and adding a website Confidential30
    • 31. © 2013 Imperva, Inc. All rights reserved. Incapsula Automatically Gathers Site Data Confidential31
    • 32. © 2013 Imperva, Inc. All rights reserved. Changing DNS Settings
    • 33. © 2013 Imperva, Inc. All rights reserved. Getting Lost in Go Daddy’s Horrible UI
    • 34. © 2013 Imperva, Inc. All rights reserved. Updating DNS Records
    • 35. © 2013 Imperva, Inc. All rights reserved. Completing Incapsula’s Setup
    • 36. © 2013 Imperva, Inc. All rights reserved. The Website is Protected Confidential36
    • 37. © 2013 Imperva, Inc. All rights reserved. Dashboard - Traffic Confidential37
    • 38. © 2013 Imperva, Inc. All rights reserved. Dashboard - Traffic Confidential38
    • 39. © 2013 Imperva, Inc. All rights reserved. Dashboard - Security Confidential39
    • 40. © 2013 Imperva, Inc. All rights reserved. Dashboard - Performance Confidential40
    • 41. © 2013 Imperva, Inc. All rights reserved. Dashboard – Datacenter Response Time Confidential41
    • 42. © 2013 Imperva, Inc. All rights reserved. Dashboard – Recent Updates Confidential42
    • 43. © 2013 Imperva, Inc. All rights reserved. Visits - CONFIDENTIAL -43
    • 44. © 2013 Imperva, Inc. All rights reserved. Visits - More Confidential44
    • 45. © 2013 Imperva, Inc. All rights reserved. Visits – Add to Whitelist Confidential45
    • 46. © 2013 Imperva, Inc. All rights reserved. Settings - General Confidential46
    • 47. © 2013 Imperva, Inc. All rights reserved. Settings – Login Protect Confidential47
    • 48. © 2013 Imperva, Inc. All rights reserved. Settings - Performance Confidential48
    • 49. © 2013 Imperva, Inc. All rights reserved. Settings - Performance Confidential49
    • 50. © 2013 Imperva, Inc. All rights reserved. Settings - Notifications Confidential50
    • 51. © 2013 Imperva, Inc. All rights reserved. Settings - Security Confidential51
    • 52. © 2013 Imperva, Inc. All rights reserved. Settings - Security Confidential52
    • 53. © 2013 Imperva, Inc. All rights reserved. Settings - WAF Confidential53
    • 54. © 2013 Imperva, Inc. All rights reserved. Settings - WAF Confidential54
    • 55. © 2013 Imperva, Inc. All rights reserved. Settings – WAF Whitelist Confidential55
    • 56. © 2013 Imperva, Inc. All rights reserved. Settings – WAF Whitelist Confidential56
    • 57. © 2013 Imperva, Inc. All rights reserved. Settings - Permissions Confidential57
    • 58. © 2013 Imperva, Inc. All rights reserved. Flexible “I like forms that are flexible, that can let you feel creative.” -John Scofield ^
    • 59. © 2013 Imperva, Inc. All rights reserved. Imperva Incapsula Customer Sample Confidential59
    • 60. © 2013 Imperva, Inc. All rights reserved. Incapsula Makes Security Simple Imperva Incapsula Simplicity FlexibilityVersatility
    • 61. © 2013 Imperva, Inc. All rights reserved. Questions?

    ×