SlideShare a Scribd company logo
1/22
Theoritical Section
Practical Section
Designing Countermeasures For Tomorrows
Threats
Darwish Ahmad Herati
Herat University
Computer Science Faculty
Communication & Operatin System Department
SUPERVISOR
M.C.S. M. Sawaby Nezhat
December 21, 2014
Darwish Ahmad Herati Designing Countermeasures
2/22
Theoritical Section
Practical Section
Contents
1 Theoritical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
2 Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Darwish Ahmad Herati Designing Countermeasures
3/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Problem Statement
1st: AFG Ministries
2nd: Organizations
3rd: Airports
4th: Universities
5th: Banks
Darwish Ahmad Herati Designing Countermeasures
3/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Problem Statement
1st: AFG Ministries
2nd: Organizations
3rd: Airports
4th: Universities
5th: Banks
Darwish Ahmad Herati Designing Countermeasures
3/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Problem Statement
1st: AFG Ministries
2nd: Organizations
3rd: Airports
4th: Universities
5th: Banks
Darwish Ahmad Herati Designing Countermeasures
3/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Problem Statement
1st: AFG Ministries
2nd: Organizations
3rd: Airports
4th: Universities
5th: Banks
Darwish Ahmad Herati Designing Countermeasures
3/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Problem Statement
1st: AFG Ministries
2nd: Organizations
3rd: Airports
4th: Universities
5th: Banks
Darwish Ahmad Herati Designing Countermeasures
4/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Problem Statement
We Need To Learn :
Who is Attacking Us.
How We Are Being Attacked
What the Attackers Trying to Achieve.
Darwish Ahmad Herati Designing Countermeasures
5/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Motivation
Secure Afghanistan Internal Networks
Recognize the Enemies of Afghanistan and Their Actions
Show Our Ability to The Others
How to Defend Against the Attackers.
Network Security Specialist
Learning New Types, Tactics of Attacks
Lough to the Attackers :-)
Darwish Ahmad Herati Designing Countermeasures
5/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Motivation
Secure Afghanistan Internal Networks
Recognize the Enemies of Afghanistan and Their Actions
Show Our Ability to The Others
How to Defend Against the Attackers.
Network Security Specialist
Learning New Types, Tactics of Attacks
Lough to the Attackers :-)
Darwish Ahmad Herati Designing Countermeasures
5/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Motivation
Secure Afghanistan Internal Networks
Recognize the Enemies of Afghanistan and Their Actions
Show Our Ability to The Others
How to Defend Against the Attackers.
Network Security Specialist
Learning New Types, Tactics of Attacks
Lough to the Attackers :-)
Darwish Ahmad Herati Designing Countermeasures
5/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Motivation
Secure Afghanistan Internal Networks
Recognize the Enemies of Afghanistan and Their Actions
Show Our Ability to The Others
How to Defend Against the Attackers.
Network Security Specialist
Learning New Types, Tactics of Attacks
Lough to the Attackers :-)
Darwish Ahmad Herati Designing Countermeasures
6/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Goal
1st: IDEA
2nd: Info Gathering
3rd: Todays Technos
4th: Implementation
5th: Best Solution
Darwish Ahmad Herati Designing Countermeasures
6/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Goal
1st: IDEA
2nd: Info Gathering
3rd: Todays Technos
4th: Implementation
5th: Best Solution
Darwish Ahmad Herati Designing Countermeasures
6/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Goal
1st: IDEA
2nd: Info Gathering
3rd: Todays Technos
4th: Implementation
5th: Best Solution
Darwish Ahmad Herati Designing Countermeasures
6/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Goal
1st: IDEA
2nd: Info Gathering
3rd: Todays Technos
4th: Implementation
5th: Best Solution
Darwish Ahmad Herati Designing Countermeasures
6/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Goal
1st: IDEA
2nd: Info Gathering
3rd: Todays Technos
4th: Implementation
5th: Best Solution
Darwish Ahmad Herati Designing Countermeasures
7/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Thesis Structure
Chapter 1: Introduction
Chapter 2: Computer and Network Security
Chapter 3: Honeypot Systems
Chapter 4: Honeynet Systems
Chapter 5: Honeypot and Honeynet Technologies
Chapter 6: Implementation ( Designing Countermeasrues
For Tomorrows Threats )
Darwish Ahmad Herati Designing Countermeasures
8/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Zero Concept
Zero Hour,Day: Attacks, Threats and Vulnerabilities
Security Hole Unknown to its Vendor
Exploit Unknown Vulnerability and the patch is no available
Darwish Ahmad Herati Designing Countermeasures
9/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Honeypot Systems
Definition: A computer or network that is intentially left
with common vulnerabilities that a hacker would use to
hack the system, act as a TRAP!!!
History: Fred Cohen’s Deception ToolKit in 1998 And in
2004 Virtual Honeypot Introduced
Value: Data Collection=Little Data High Value
Darwish Ahmad Herati Designing Countermeasures
9/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Honeypot Systems
Definition: A computer or network that is intentially left
with common vulnerabilities that a hacker would use to
hack the system, act as a TRAP!!!
History: Fred Cohen’s Deception ToolKit in 1998 And in
2004 Virtual Honeypot Introduced
Value: Data Collection=Little Data High Value
Darwish Ahmad Herati Designing Countermeasures
10/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Classification of Honeypot Systems
Darwish Ahmad Herati Designing Countermeasures
11/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Honeynet Systems
Definition: Multiple honeypots can be set on a network to
form the Honeynet Systems
Darwish Ahmad Herati Designing Countermeasures
11/22
Theoritical Section
Practical Section
Introduction
Computer And Network Security
Honeypot Systems
Honeynet Systems
Honeynet Systems
Definition: Multiple honeypots can be set on a network to
form the Honeynet Systems
Darwish Ahmad Herati Designing Countermeasures
12/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Countries and Honeynet Systems
1st: IRAN
2nd: PAKISTAN
3rd: INDIA
4rd: SAUDI ARABIA
5rd: POLISH
6rd: GERMANY
Darwish Ahmad Herati Designing Countermeasures
12/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Countries and Honeynet Systems
1st: IRAN
2nd: PAKISTAN
3rd: INDIA
4rd: SAUDI ARABIA
5rd: POLISH
6rd: GERMANY
Darwish Ahmad Herati Designing Countermeasures
12/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Countries and Honeynet Systems
1st: IRAN
2nd: PAKISTAN
3rd: INDIA
4rd: SAUDI ARABIA
5rd: POLISH
6rd: GERMANY
Darwish Ahmad Herati Designing Countermeasures
12/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Countries and Honeynet Systems
1st: IRAN
2nd: PAKISTAN
3rd: INDIA
4rd: SAUDI ARABIA
5rd: POLISH
6rd: GERMANY
Darwish Ahmad Herati Designing Countermeasures
12/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Countries and Honeynet Systems
1st: IRAN
2nd: PAKISTAN
3rd: INDIA
4rd: SAUDI ARABIA
5rd: POLISH
6rd: GERMANY
Darwish Ahmad Herati Designing Countermeasures
12/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Countries and Honeynet Systems
1st: IRAN
2nd: PAKISTAN
3rd: INDIA
4rd: SAUDI ARABIA
5rd: POLISH
6rd: GERMANY
Darwish Ahmad Herati Designing Countermeasures
13/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Organizations and Honeynet Systems
1st: THE HONYNET
PROJECT
2nd: THE NORSE
3rd: THE FIREEYE
4th: THE GLOBAL
BOTNET
5th: THE WORLD MAP
6th: THE KASPRESKY
Darwish Ahmad Herati Designing Countermeasures
13/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Organizations and Honeynet Systems
1st: THE HONYNET
PROJECT
2nd: THE NORSE
3rd: THE FIREEYE
4th: THE GLOBAL
BOTNET
5th: THE WORLD MAP
6th: THE KASPRESKY
Darwish Ahmad Herati Designing Countermeasures
13/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Organizations and Honeynet Systems
1st: THE HONYNET
PROJECT
2nd: THE NORSE
3rd: THE FIREEYE
4th: THE GLOBAL
BOTNET
5th: THE WORLD MAP
6th: THE KASPRESKY
Darwish Ahmad Herati Designing Countermeasures
13/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Organizations and Honeynet Systems
1st: THE HONYNET
PROJECT
2nd: THE NORSE
3rd: THE FIREEYE
4th: THE GLOBAL
BOTNET
5th: THE WORLD MAP
6th: THE KASPRESKY
Darwish Ahmad Herati Designing Countermeasures
13/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Organizations and Honeynet Systems
1st: THE HONYNET
PROJECT
2nd: THE NORSE
3rd: THE FIREEYE
4th: THE GLOBAL
BOTNET
5th: THE WORLD MAP
6th: THE KASPRESKY
Darwish Ahmad Herati Designing Countermeasures
13/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Organizations and Honeynet Systems
1st: THE HONYNET
PROJECT
2nd: THE NORSE
3rd: THE FIREEYE
4th: THE GLOBAL
BOTNET
5th: THE WORLD MAP
6th: THE KASPRESKY
Darwish Ahmad Herati Designing Countermeasures
14/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Implement Different Technologies
Open Source: Honeyd, KippoSSH, Dionaa, Conpot,
Honeywall, etc...
Close Source: BackOfficer Friendly, Spectir, HoneyBot,
etc...
This Thesis: Honeyd, KippoSSH, Dionaa, Conpot,
BackOfficer Friendly, Spectir,
Let’s See The Implementation of Them. But Before!!!
Darwish Ahmad Herati Designing Countermeasures
14/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Implement Different Technologies
Open Source: Honeyd, KippoSSH, Dionaa, Conpot,
Honeywall, etc...
Close Source: BackOfficer Friendly, Spectir, HoneyBot,
etc...
This Thesis: Honeyd, KippoSSH, Dionaa, Conpot,
BackOfficer Friendly, Spectir,
Let’s See The Implementation of Them. But Before!!!
Darwish Ahmad Herati Designing Countermeasures
14/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Implement Different Technologies
Open Source: Honeyd, KippoSSH, Dionaa, Conpot,
Honeywall, etc...
Close Source: BackOfficer Friendly, Spectir, HoneyBot,
etc...
This Thesis: Honeyd, KippoSSH, Dionaa, Conpot,
BackOfficer Friendly, Spectir,
Let’s See The Implementation of Them. But Before!!!
Darwish Ahmad Herati Designing Countermeasures
15/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Used Technologies
LAMP: Apache 2, PHP, MySQL
Python: Powerful Scripting Language
Darwish Ahmad Herati Designing Countermeasures
16/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
We Love AFGHANISTAN and Proud To Be Afghans
Darwish Ahmad Herati Designing Countermeasures
17/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Solution for AFGHANISTAN
Darwish Ahmad Herati Designing Countermeasures
18/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Conclusion
The Network Security Problems In Everywhere:
Military, Organizations, Universities, Banks, Private Sectors,
ISPs, Airport, Transport... and
We Need to Learn Who, How , What.
Researches
Search about different solutions for the Problems and
Implement different Security Technologies Exist Today to
Achieve the best solution For DEFEND Against the Attackers.
Solution
The Best Solution For Afghanistan
Darwish Ahmad Herati Designing Countermeasures
19/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Challenges
Complex and Difficult Configurations
!!! NO PAIN NO GAIN !!!
Darwish Ahmad Herati Designing Countermeasures
19/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Challenges
Complex and Difficult Configurations
!!! NO PAIN NO GAIN !!!
Darwish Ahmad Herati Designing Countermeasures
20/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Future Work
Research on High Interaction Honeypot Systems
Research on Honeynet Systems
Darwish Ahmad Herati Designing Countermeasures
20/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Future Work
Research on High Interaction Honeypot Systems
Research on Honeynet Systems
Darwish Ahmad Herati Designing Countermeasures
21/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
References
Michael D. Bauer. (2005). Linux Server Security. January.
Andy Oram, John Viega. (2009). Beautiful Leading
Security Experts Explain How They Think. April
Nitesh Dhanjani, Billy Rios and Brett Hardin. (2009).
Hacking The Next Generation. September.
Lance Spitzner. (2002). Honeypots: Tracking
Hackers.September.
etc...
Darwish Ahmad Herati Designing Countermeasures
22/22
Theoritical Section
Practical Section
Countries and Honeynet Systems
Organizations and Honeynet Systems
Thesis Solution
Thank You For Your
Attention
Darwish Ahmad Herati Designing Countermeasures

More Related Content

What's hot

Ns lecture3: Introduction to Multi Protocol Label Switching(MPLS)
Ns lecture3: Introduction to Multi Protocol Label Switching(MPLS) Ns lecture3: Introduction to Multi Protocol Label Switching(MPLS)
Ns lecture3: Introduction to Multi Protocol Label Switching(MPLS)
Aksum Institute of Technology(AIT, @Letsgo)
 
Ns lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing ProtocolNs lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing Protocol
Aksum Institute of Technology(AIT, @Letsgo)
 
Router and types
Router and types Router and types
Router and types
Qazafie Mehrzad
 
Router
RouterRouter
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
kirbadh
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1CAVC
 
Design and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless NetworksDesign and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless Networks
Satish Reddy
 
Computer network and networking peripherals (ITM)
Computer network and networking peripherals (ITM)Computer network and networking peripherals (ITM)
Computer network and networking peripherals (ITM)Kapil Rode
 
Chapter 02 - Wan Router
Chapter 02 - Wan RouterChapter 02 - Wan Router
Chapter 02 - Wan Routerphanleson
 
Difference between Routing & Routed Protocol
Difference between Routing & Routed ProtocolDifference between Routing & Routed Protocol
Difference between Routing & Routed Protocol
Netwax Lab
 
It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch6It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch6
newbie2019
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
Irsandi Hasan
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)
Shweta Kumari
 
ROUTER PPT
ROUTER PPTROUTER PPT
ROUTER PPTJw Media
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to router
Farhan Galib
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic ConfigurationProf. Erwin Globio
 
Chandan singh seminar report pdf.......router
Chandan singh seminar report pdf.......routerChandan singh seminar report pdf.......router
Chandan singh seminar report pdf.......router
Chandan Singh
 
CCNA Routing Protocols
CCNA Routing Protocols CCNA Routing Protocols
CCNA Routing Protocols
Mansour Naslcheraghi
 
Ns lecture2: Introduction to LAN Technology
Ns lecture2: Introduction to LAN TechnologyNs lecture2: Introduction to LAN Technology
Ns lecture2: Introduction to LAN Technology
Aksum Institute of Technology(AIT, @Letsgo)
 
Advance hardware devices
Advance hardware devicesAdvance hardware devices
Advance hardware devices
Varinder Singh Walia
 

What's hot (20)

Ns lecture3: Introduction to Multi Protocol Label Switching(MPLS)
Ns lecture3: Introduction to Multi Protocol Label Switching(MPLS) Ns lecture3: Introduction to Multi Protocol Label Switching(MPLS)
Ns lecture3: Introduction to Multi Protocol Label Switching(MPLS)
 
Ns lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing ProtocolNs lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing Protocol
 
Router and types
Router and types Router and types
Router and types
 
Router
RouterRouter
Router
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
 
Design and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless NetworksDesign and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless Networks
 
Computer network and networking peripherals (ITM)
Computer network and networking peripherals (ITM)Computer network and networking peripherals (ITM)
Computer network and networking peripherals (ITM)
 
Chapter 02 - Wan Router
Chapter 02 - Wan RouterChapter 02 - Wan Router
Chapter 02 - Wan Router
 
Difference between Routing & Routed Protocol
Difference between Routing & Routed ProtocolDifference between Routing & Routed Protocol
Difference between Routing & Routed Protocol
 
It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch6It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch6
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)
 
ROUTER PPT
ROUTER PPTROUTER PPT
ROUTER PPT
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to router
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
 
Chandan singh seminar report pdf.......router
Chandan singh seminar report pdf.......routerChandan singh seminar report pdf.......router
Chandan singh seminar report pdf.......router
 
CCNA Routing Protocols
CCNA Routing Protocols CCNA Routing Protocols
CCNA Routing Protocols
 
Ns lecture2: Introduction to LAN Technology
Ns lecture2: Introduction to LAN TechnologyNs lecture2: Introduction to LAN Technology
Ns lecture2: Introduction to LAN Technology
 
Advance hardware devices
Advance hardware devicesAdvance hardware devices
Advance hardware devices
 

Viewers also liked

Basic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationBasic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentation
Darwish Ahmad
 
Como ser um Hacker Ético Profissional
Como ser um Hacker Ético ProfissionalComo ser um Hacker Ético Profissional
Como ser um Hacker Ético Profissional
Strong Security Brasil
 
Oracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best PracticesOracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best Practices
Brian Huff
 
Patent Risk and Countermeasures Related to Open Management in Interaction Design
Patent Risk and Countermeasures Related to Open Management in Interaction DesignPatent Risk and Countermeasures Related to Open Management in Interaction Design
Patent Risk and Countermeasures Related to Open Management in Interaction Design
Yosuke Sakai
 
Apresenta cyber (2)
Apresenta cyber (2)Apresenta cyber (2)
Apresenta cyber (2)
Orlando Simões
 
Apresentação Cyberpunk
Apresentação CyberpunkApresentação Cyberpunk
Apresentação Cyberpunk
Orlando Simões
 
Formulario 3C
Formulario 3CFormulario 3C
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesLuis Nassif
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesLuis Nassif
 
Formulario 3C
Formulario 3CFormulario 3C
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
AirTight Networks
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
Jorge Sebastiao
 
Dstl Medical Countermeasures for Dangerous Pathogens
Dstl   Medical Countermeasures for Dangerous PathogensDstl   Medical Countermeasures for Dangerous Pathogens
Dstl Medical Countermeasures for Dangerous Pathogens
warwick_amr
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Jeremiah Grossman
 
VoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldVoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate World
Jason Edelstein
 
Seminar Presentation
Seminar PresentationSeminar Presentation
Seminar Presentation
Sergey Rubinsky, Ph.D.
 
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and CountermeasuresBone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
American Astronautical Society
 
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
International Atomic Energy Agency
 
Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hacking
polichen
 
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na praticaPenetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Campus Party Brasil
 

Viewers also liked (20)

Basic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationBasic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentation
 
Como ser um Hacker Ético Profissional
Como ser um Hacker Ético ProfissionalComo ser um Hacker Ético Profissional
Como ser um Hacker Ético Profissional
 
Oracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best PracticesOracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best Practices
 
Patent Risk and Countermeasures Related to Open Management in Interaction Design
Patent Risk and Countermeasures Related to Open Management in Interaction DesignPatent Risk and Countermeasures Related to Open Management in Interaction Design
Patent Risk and Countermeasures Related to Open Management in Interaction Design
 
Apresenta cyber (2)
Apresenta cyber (2)Apresenta cyber (2)
Apresenta cyber (2)
 
Apresentação Cyberpunk
Apresentação CyberpunkApresentação Cyberpunk
Apresentação Cyberpunk
 
Formulario 3C
Formulario 3CFormulario 3C
Formulario 3C
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga Gomes
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga Gomes
 
Formulario 3C
Formulario 3CFormulario 3C
Formulario 3C
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Dstl Medical Countermeasures for Dangerous Pathogens
Dstl   Medical Countermeasures for Dangerous PathogensDstl   Medical Countermeasures for Dangerous Pathogens
Dstl Medical Countermeasures for Dangerous Pathogens
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
 
VoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldVoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate World
 
Seminar Presentation
Seminar PresentationSeminar Presentation
Seminar Presentation
 
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and CountermeasuresBone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
 
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
 
Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hacking
 
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na praticaPenetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
 

Similar to Designing Countermeasures For Tomorrows Threats

ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
Akhilesh Patel
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
bartholomeocoombs
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
annette228280
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdfPreprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
Christo Ananth
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
asharshaikh8
 
Advanced pc security final exam results
Advanced pc security final exam resultsAdvanced pc security final exam results
Advanced pc security final exam resultsDale Vick
 
Dealing with the Internet of Insecure Things
Dealing with the Internet of Insecure ThingsDealing with the Internet of Insecure Things
Dealing with the Internet of Insecure Things
Arosha Bandara
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Adnan Mansha
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Mohammad Affan
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
Rishab Gupta
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
Rachel Phillips
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
hamzakareem2
 
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Christo Ananth
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
IRJET Journal
 
Security
SecuritySecurity
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System

Similar to Designing Countermeasures For Tomorrows Threats (20)

ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdfPreprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Advanced pc security final exam results
Advanced pc security final exam resultsAdvanced pc security final exam results
Advanced pc security final exam results
 
Dealing with the Internet of Insecure Things
Dealing with the Internet of Insecure ThingsDealing with the Internet of Insecure Things
Dealing with the Internet of Insecure Things
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
G011123539
G011123539G011123539
G011123539
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
 
M0704071074
M0704071074M0704071074
M0704071074
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
 
Security
SecuritySecurity
Security
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 

Recently uploaded

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

Designing Countermeasures For Tomorrows Threats

  • 1. 1/22 Theoritical Section Practical Section Designing Countermeasures For Tomorrows Threats Darwish Ahmad Herati Herat University Computer Science Faculty Communication & Operatin System Department SUPERVISOR M.C.S. M. Sawaby Nezhat December 21, 2014 Darwish Ahmad Herati Designing Countermeasures
  • 2. 2/22 Theoritical Section Practical Section Contents 1 Theoritical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems 2 Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Darwish Ahmad Herati Designing Countermeasures
  • 3. 3/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Problem Statement 1st: AFG Ministries 2nd: Organizations 3rd: Airports 4th: Universities 5th: Banks Darwish Ahmad Herati Designing Countermeasures
  • 4. 3/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Problem Statement 1st: AFG Ministries 2nd: Organizations 3rd: Airports 4th: Universities 5th: Banks Darwish Ahmad Herati Designing Countermeasures
  • 5. 3/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Problem Statement 1st: AFG Ministries 2nd: Organizations 3rd: Airports 4th: Universities 5th: Banks Darwish Ahmad Herati Designing Countermeasures
  • 6. 3/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Problem Statement 1st: AFG Ministries 2nd: Organizations 3rd: Airports 4th: Universities 5th: Banks Darwish Ahmad Herati Designing Countermeasures
  • 7. 3/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Problem Statement 1st: AFG Ministries 2nd: Organizations 3rd: Airports 4th: Universities 5th: Banks Darwish Ahmad Herati Designing Countermeasures
  • 8. 4/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Problem Statement We Need To Learn : Who is Attacking Us. How We Are Being Attacked What the Attackers Trying to Achieve. Darwish Ahmad Herati Designing Countermeasures
  • 9. 5/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Motivation Secure Afghanistan Internal Networks Recognize the Enemies of Afghanistan and Their Actions Show Our Ability to The Others How to Defend Against the Attackers. Network Security Specialist Learning New Types, Tactics of Attacks Lough to the Attackers :-) Darwish Ahmad Herati Designing Countermeasures
  • 10. 5/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Motivation Secure Afghanistan Internal Networks Recognize the Enemies of Afghanistan and Their Actions Show Our Ability to The Others How to Defend Against the Attackers. Network Security Specialist Learning New Types, Tactics of Attacks Lough to the Attackers :-) Darwish Ahmad Herati Designing Countermeasures
  • 11. 5/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Motivation Secure Afghanistan Internal Networks Recognize the Enemies of Afghanistan and Their Actions Show Our Ability to The Others How to Defend Against the Attackers. Network Security Specialist Learning New Types, Tactics of Attacks Lough to the Attackers :-) Darwish Ahmad Herati Designing Countermeasures
  • 12. 5/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Motivation Secure Afghanistan Internal Networks Recognize the Enemies of Afghanistan and Their Actions Show Our Ability to The Others How to Defend Against the Attackers. Network Security Specialist Learning New Types, Tactics of Attacks Lough to the Attackers :-) Darwish Ahmad Herati Designing Countermeasures
  • 13. 6/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Goal 1st: IDEA 2nd: Info Gathering 3rd: Todays Technos 4th: Implementation 5th: Best Solution Darwish Ahmad Herati Designing Countermeasures
  • 14. 6/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Goal 1st: IDEA 2nd: Info Gathering 3rd: Todays Technos 4th: Implementation 5th: Best Solution Darwish Ahmad Herati Designing Countermeasures
  • 15. 6/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Goal 1st: IDEA 2nd: Info Gathering 3rd: Todays Technos 4th: Implementation 5th: Best Solution Darwish Ahmad Herati Designing Countermeasures
  • 16. 6/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Goal 1st: IDEA 2nd: Info Gathering 3rd: Todays Technos 4th: Implementation 5th: Best Solution Darwish Ahmad Herati Designing Countermeasures
  • 17. 6/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Goal 1st: IDEA 2nd: Info Gathering 3rd: Todays Technos 4th: Implementation 5th: Best Solution Darwish Ahmad Herati Designing Countermeasures
  • 18. 7/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Thesis Structure Chapter 1: Introduction Chapter 2: Computer and Network Security Chapter 3: Honeypot Systems Chapter 4: Honeynet Systems Chapter 5: Honeypot and Honeynet Technologies Chapter 6: Implementation ( Designing Countermeasrues For Tomorrows Threats ) Darwish Ahmad Herati Designing Countermeasures
  • 19. 8/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Zero Concept Zero Hour,Day: Attacks, Threats and Vulnerabilities Security Hole Unknown to its Vendor Exploit Unknown Vulnerability and the patch is no available Darwish Ahmad Herati Designing Countermeasures
  • 20. 9/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Honeypot Systems Definition: A computer or network that is intentially left with common vulnerabilities that a hacker would use to hack the system, act as a TRAP!!! History: Fred Cohen’s Deception ToolKit in 1998 And in 2004 Virtual Honeypot Introduced Value: Data Collection=Little Data High Value Darwish Ahmad Herati Designing Countermeasures
  • 21. 9/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Honeypot Systems Definition: A computer or network that is intentially left with common vulnerabilities that a hacker would use to hack the system, act as a TRAP!!! History: Fred Cohen’s Deception ToolKit in 1998 And in 2004 Virtual Honeypot Introduced Value: Data Collection=Little Data High Value Darwish Ahmad Herati Designing Countermeasures
  • 22. 10/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Classification of Honeypot Systems Darwish Ahmad Herati Designing Countermeasures
  • 23. 11/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Honeynet Systems Definition: Multiple honeypots can be set on a network to form the Honeynet Systems Darwish Ahmad Herati Designing Countermeasures
  • 24. 11/22 Theoritical Section Practical Section Introduction Computer And Network Security Honeypot Systems Honeynet Systems Honeynet Systems Definition: Multiple honeypots can be set on a network to form the Honeynet Systems Darwish Ahmad Herati Designing Countermeasures
  • 25. 12/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Countries and Honeynet Systems 1st: IRAN 2nd: PAKISTAN 3rd: INDIA 4rd: SAUDI ARABIA 5rd: POLISH 6rd: GERMANY Darwish Ahmad Herati Designing Countermeasures
  • 26. 12/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Countries and Honeynet Systems 1st: IRAN 2nd: PAKISTAN 3rd: INDIA 4rd: SAUDI ARABIA 5rd: POLISH 6rd: GERMANY Darwish Ahmad Herati Designing Countermeasures
  • 27. 12/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Countries and Honeynet Systems 1st: IRAN 2nd: PAKISTAN 3rd: INDIA 4rd: SAUDI ARABIA 5rd: POLISH 6rd: GERMANY Darwish Ahmad Herati Designing Countermeasures
  • 28. 12/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Countries and Honeynet Systems 1st: IRAN 2nd: PAKISTAN 3rd: INDIA 4rd: SAUDI ARABIA 5rd: POLISH 6rd: GERMANY Darwish Ahmad Herati Designing Countermeasures
  • 29. 12/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Countries and Honeynet Systems 1st: IRAN 2nd: PAKISTAN 3rd: INDIA 4rd: SAUDI ARABIA 5rd: POLISH 6rd: GERMANY Darwish Ahmad Herati Designing Countermeasures
  • 30. 12/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Countries and Honeynet Systems 1st: IRAN 2nd: PAKISTAN 3rd: INDIA 4rd: SAUDI ARABIA 5rd: POLISH 6rd: GERMANY Darwish Ahmad Herati Designing Countermeasures
  • 31. 13/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Organizations and Honeynet Systems 1st: THE HONYNET PROJECT 2nd: THE NORSE 3rd: THE FIREEYE 4th: THE GLOBAL BOTNET 5th: THE WORLD MAP 6th: THE KASPRESKY Darwish Ahmad Herati Designing Countermeasures
  • 32. 13/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Organizations and Honeynet Systems 1st: THE HONYNET PROJECT 2nd: THE NORSE 3rd: THE FIREEYE 4th: THE GLOBAL BOTNET 5th: THE WORLD MAP 6th: THE KASPRESKY Darwish Ahmad Herati Designing Countermeasures
  • 33. 13/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Organizations and Honeynet Systems 1st: THE HONYNET PROJECT 2nd: THE NORSE 3rd: THE FIREEYE 4th: THE GLOBAL BOTNET 5th: THE WORLD MAP 6th: THE KASPRESKY Darwish Ahmad Herati Designing Countermeasures
  • 34. 13/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Organizations and Honeynet Systems 1st: THE HONYNET PROJECT 2nd: THE NORSE 3rd: THE FIREEYE 4th: THE GLOBAL BOTNET 5th: THE WORLD MAP 6th: THE KASPRESKY Darwish Ahmad Herati Designing Countermeasures
  • 35. 13/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Organizations and Honeynet Systems 1st: THE HONYNET PROJECT 2nd: THE NORSE 3rd: THE FIREEYE 4th: THE GLOBAL BOTNET 5th: THE WORLD MAP 6th: THE KASPRESKY Darwish Ahmad Herati Designing Countermeasures
  • 36. 13/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Organizations and Honeynet Systems 1st: THE HONYNET PROJECT 2nd: THE NORSE 3rd: THE FIREEYE 4th: THE GLOBAL BOTNET 5th: THE WORLD MAP 6th: THE KASPRESKY Darwish Ahmad Herati Designing Countermeasures
  • 37. 14/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Implement Different Technologies Open Source: Honeyd, KippoSSH, Dionaa, Conpot, Honeywall, etc... Close Source: BackOfficer Friendly, Spectir, HoneyBot, etc... This Thesis: Honeyd, KippoSSH, Dionaa, Conpot, BackOfficer Friendly, Spectir, Let’s See The Implementation of Them. But Before!!! Darwish Ahmad Herati Designing Countermeasures
  • 38. 14/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Implement Different Technologies Open Source: Honeyd, KippoSSH, Dionaa, Conpot, Honeywall, etc... Close Source: BackOfficer Friendly, Spectir, HoneyBot, etc... This Thesis: Honeyd, KippoSSH, Dionaa, Conpot, BackOfficer Friendly, Spectir, Let’s See The Implementation of Them. But Before!!! Darwish Ahmad Herati Designing Countermeasures
  • 39. 14/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Implement Different Technologies Open Source: Honeyd, KippoSSH, Dionaa, Conpot, Honeywall, etc... Close Source: BackOfficer Friendly, Spectir, HoneyBot, etc... This Thesis: Honeyd, KippoSSH, Dionaa, Conpot, BackOfficer Friendly, Spectir, Let’s See The Implementation of Them. But Before!!! Darwish Ahmad Herati Designing Countermeasures
  • 40. 15/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Used Technologies LAMP: Apache 2, PHP, MySQL Python: Powerful Scripting Language Darwish Ahmad Herati Designing Countermeasures
  • 41. 16/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution We Love AFGHANISTAN and Proud To Be Afghans Darwish Ahmad Herati Designing Countermeasures
  • 42. 17/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Solution for AFGHANISTAN Darwish Ahmad Herati Designing Countermeasures
  • 43. 18/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Conclusion The Network Security Problems In Everywhere: Military, Organizations, Universities, Banks, Private Sectors, ISPs, Airport, Transport... and We Need to Learn Who, How , What. Researches Search about different solutions for the Problems and Implement different Security Technologies Exist Today to Achieve the best solution For DEFEND Against the Attackers. Solution The Best Solution For Afghanistan Darwish Ahmad Herati Designing Countermeasures
  • 44. 19/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Challenges Complex and Difficult Configurations !!! NO PAIN NO GAIN !!! Darwish Ahmad Herati Designing Countermeasures
  • 45. 19/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Challenges Complex and Difficult Configurations !!! NO PAIN NO GAIN !!! Darwish Ahmad Herati Designing Countermeasures
  • 46. 20/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Future Work Research on High Interaction Honeypot Systems Research on Honeynet Systems Darwish Ahmad Herati Designing Countermeasures
  • 47. 20/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Future Work Research on High Interaction Honeypot Systems Research on Honeynet Systems Darwish Ahmad Herati Designing Countermeasures
  • 48. 21/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution References Michael D. Bauer. (2005). Linux Server Security. January. Andy Oram, John Viega. (2009). Beautiful Leading Security Experts Explain How They Think. April Nitesh Dhanjani, Billy Rios and Brett Hardin. (2009). Hacking The Next Generation. September. Lance Spitzner. (2002). Honeypots: Tracking Hackers.September. etc... Darwish Ahmad Herati Designing Countermeasures
  • 49. 22/22 Theoritical Section Practical Section Countries and Honeynet Systems Organizations and Honeynet Systems Thesis Solution Thank You For Your Attention Darwish Ahmad Herati Designing Countermeasures