Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Keeping ‘em Honest
Testing and Validation of
Network Security Devices

        Dustin D. Trammell
        Security Researc...
About Me
Dustin D. Trammell
  http://www.dustintrammell.com
Founder, Computer Academic Underground
(CAU)
Co-Founder, Austi...
Background  Terminology:
  Anatomy of an Attack
Anatomy of an Attack: Overview
Anatomy of an Attack: Network
Anatomy of an Attack: Target
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Keeping them Honest: Testing and Validation of Network Security Devices
Upcoming SlideShare
Loading in …5
×

Keeping them Honest: Testing and Validation of Network Security Devices

1,013 views

Published on

You know what your firewall, NAC system and IPS are supposed to do, but do you know how well they're doing it? Learn how to verify that your network security devices are working appropriately and doing so under load. Learn methodologies for testing these various types of devices, where these devices commonly fail and how to design dynamic and comprehensive test cases to identify these failures.

Published in: Technology
  • Be the first to comment

Keeping them Honest: Testing and Validation of Network Security Devices

  1. 1. Keeping ‘em Honest Testing and Validation of Network Security Devices Dustin D. Trammell Security Researcher BreakingPoint Systems, Inc.
  2. 2. About Me Dustin D. Trammell http://www.dustintrammell.com Founder, Computer Academic Underground (CAU) Co-Founder, Austin Hacker Association (AHA!) Employed by BreakingPoint Systems, Inc. Security Researcher Research properties and scope of vulnerabilities Development of dynamic attacks and exploits
  3. 3. Background Terminology: Anatomy of an Attack
  4. 4. Anatomy of an Attack: Overview
  5. 5. Anatomy of an Attack: Network
  6. 6. Anatomy of an Attack: Target

×