Noah Maina - WIAChief Network Architect - Trainer - Speaker - IPv6 Evangelist – Ethical Hacker
Overview   What is the Internet   The use of the Internet   Problems related to the use of the Internet   What is Secu...
The Internet The Internet is a global system of interconnected computer networks  that use the standard Internet Protocol...
Use of the internet
Problems related to the use of the Internet Security Incident Categories    Hacking:- Internal and External        Pass...
Hacking A hacker can be anyone with a deep interest in computer-  based technology; it does not necessarily define someon...
Malware Malware short for MALicious softWARE, is software designed to infiltrate a computer system without the owners inf...
What is Security?
Security DefinitionLiterally, there is no clear cut definition!!!!! “Security is a process not an end state.”
Security is the process of maintaining an    acceptable level of perceived risk No organization can be considered “secure...
Cyber Crime Cybercrime refers to any crime that involves a computer  and a network. The computer may have been used in t...
The Threat is Real
Important Landmark
Remarks ICT is a single point of failure to business and its  processes. Let us join forces under CERT and fight the ene...
What is CERT Computer Emergency Response Team is a name given to  expert groups that handle computer security incidents....
Terminology There exist various abbreviations for the same sort  of teams   CERT or CERT/CC - Computer Emergency Respons...
Africa-CERT In Africa, few countries have started their security project  and fulfilled some good steps;    Other countr...
Objectives To become a focal point and means for providing a continental  platform for African countries to enhance regio...
Promoters The following individuals are promoting the AfricaCERT initiatives In  partnership with APCERT and JPCERT    D...
National CERT National CERTs can play an important role by helping their  internet-connected sites;   Protect their syst...
National Cert Benefits From a technical security standpoint national teams can   Serve as a trusted point of contact   ...
Local CERTS Under National CERT there could be some of the following  CERT:    GovCERT    MilCERT    PoliceCERT    Fi...
Any ???                      Cheers./noah
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
Upcoming SlideShare
Loading in …5
×

Noah Maina: Computer Emergency Response Team (CERT)

3,388 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
3,388
On SlideShare
0
From Embeds
0
Number of Embeds
1,245
Actions
Shares
0
Downloads
70
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Noah Maina: Computer Emergency Response Team (CERT)

  1. 1. Noah Maina - WIAChief Network Architect - Trainer - Speaker - IPv6 Evangelist – Ethical Hacker
  2. 2. Overview What is the Internet The use of the Internet Problems related to the use of the Internet What is Security? Categories of Security Incidents  Hacking  Malware  Virus – Worms – BotNet – Spyware – Adware - Trojan Horse  DDOS Attack  Other types of Security Incidents Important Landmark: CERT
  3. 3. The Internet The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It’s a network-of-networks that consists of millions of;  Private,  Public,  Academic,  Business,  and government networks,  That are linked by abroad array of electronic, wireless and optical networking technologies. Source Wikipedia
  4. 4. Use of the internet
  5. 5. Problems related to the use of the Internet Security Incident Categories  Hacking:- Internal and External  Password cracking – Dictionary attacks – Brute force attacks  Malware  BoTnet – Worms – Viruses – Trojan Horses - Spywares  Denial of Service  DOS and DDOS  Compromised Asset and Unlawful activities  Root accounts – Rootkits – Theft – Fraud – Child Porno  E-mail and Policy Violations  Spoofed Emails – SPAM – Copyright material
  6. 6. Hacking A hacker can be anyone with a deep interest in computer- based technology; it does not necessarily define someone who wants to do harm. The term attacker can be used to describe a malicious hacker. Another term for an attacker is a black hat. Security engineers are often called white hats.  white-hat analysis is the use of hacking for defensive purposes.
  7. 7. Malware Malware short for MALicious softWARE, is software designed to infiltrate a computer system without the owners informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program codes. Amongst the most dangerous Malware one can name, is the famous Stuxnet discovered during the last quarter of the year 2010.  Stuxnet Malware – Play Video
  8. 8. What is Security?
  9. 9. Security DefinitionLiterally, there is no clear cut definition!!!!! “Security is a process not an end state.”
  10. 10. Security is the process of maintaining an acceptable level of perceived risk No organization can be considered “secure“ for any time beyond the last verification of adherence to its security policy.  If your manager asks, "Are we secure? "  You should answer, "Let me check !!! "  If they asks, “ Will we be secure tomorrow? ”  You should answer, “ I dont know   “ Such honesty will not be popular, but this mind-set will produce greater success for the organization in the long run.
  11. 11. Cyber Crime Cybercrime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. It’s a well planned process
  12. 12. The Threat is Real
  13. 13. Important Landmark
  14. 14. Remarks ICT is a single point of failure to business and its processes. Let us join forces under CERT and fight the enemy. Computer Emergency Response Team - CERT
  15. 15. What is CERT Computer Emergency Response Team is a name given to expert groups that handle computer security incidents. It is an organization or team that provides, to a defined constituency, services and support for both preventing and responding to computer security incidents
  16. 16. Terminology There exist various abbreviations for the same sort of teams  CERT or CERT/CC - Computer Emergency Response Team/ Coordination Centre  CSIRT - Computer Security Incidence Response Team  IRT - Incident Response Team  CIRT - Computer Incidence Response Team  SERT - Security Emergency Response Team  FIRST : is the global Forum for Incident Response and Security Teams - www.first.org
  17. 17. Africa-CERT In Africa, few countries have started their security project and fulfilled some good steps;  Other countries have now started implementing national mechanisms for combating cybercrime and other related threats;  However, a sizeable number of African countries still do not have a strategic plan and are unable to start their first actions. AFRICA-CERT : The African response to capacity development on cyber security was formed in Kigali, Rwanda, 30th of May 2010 under the umbrella of Africa- cert.  http://africacert.org/home/index.php
  18. 18. Objectives To become a focal point and means for providing a continental platform for African countries to enhance regional and international cooperation on information security; Through Africa-cert, countries would assist each other to establish national Computer Security Incident Response Teams (CSIRT) and thereby improve their incident handling capabilities; Milestone 2011 - First BoF on AfricaCERT (during AfNOG Meeting) 2011 - AfricaCERT Workshop (during AfriNIC Meeting) 2012 - Inauguration of AfricaCERT
  19. 19. Promoters The following individuals are promoting the AfricaCERT initiatives In partnership with APCERT and JPCERT  Dr. Nii Quaynor(Ghana)  Pierre Dandzinou(Benin)  Haythem EL MIR (Tunisia)  Perpétus Jacques Houngbo(Benin)  Jean Robert Houtomey(Togo)  Vincent Ngundi(Kenya)  Mohamed Ibrahim (Somalia)  Marcus K. G. Adomey(Ghana) In Tanzania  TCRA and tzNIC are championing the creation of the .tz CERT so far.
  20. 20. National CERT National CERTs can play an important role by helping their internet-connected sites;  Protect their systems  Detect, recognize and analyze compromises to the security of those systems  Protect themselves from malicious activities and when cyber security incidents occur, quickly and effectively coordinate and respond to attacks. These teams can also be evangelists in promoting and helping other organizations within their national borders build effective incident management capabilities.
  21. 21. National Cert Benefits From a technical security standpoint national teams can  Serve as a trusted point of contact  Develop an infrastructure for coordinating response to computer security incidents within a country.  Develop a capability to support incident reporting across a broad spectrum of sectors within a nation’s borders  Conduct incident, vulnerability, and artifact analysis.  Disseminate information about reported vulnerabilities and offer strategic responses to such vulnerabilities  Share knowledge and relevant mitigation strategies with appropriate constituents, partners, stakeholders and other trusted collaborators.  Identify and maintain a list of CSIRT capabilities and points of contact within a country.  Make general security best practices and guidance available through publications, web sites, and other methods of communication.
  22. 22. Local CERTS Under National CERT there could be some of the following CERT:  GovCERT  MilCERT  PoliceCERT  FinanceCERT  HealthCERT  Academic CERT  ISPCERT  BankCERT  IndustryCERT
  23. 23. Any ???  Cheers./noah

×