SlideShare a Scribd company logo
1 of 50
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill BuchananAuthor: Prof Bill Buchanan
Incident Response
 Introduction.
 Risk Analysis.
 Risk Management.
 Outline of threats.
 Data Loss.
 Fundamentals.
Alice
Bob
Eve
Trent
Bob
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
TypesIncResponse
Author: Prof Bill Buchanan
Some data breaches
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill BuchananAuthor: Prof Bill Buchanan
IncidentResponse
Incident Taxonomy
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill BuchananAuthor: Prof Bill Buchanan
IncidentResponse
Data Sources/Timeline
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
IncidentsIntroduction
Author: Prof Bill Buchanan
Incidents
During IncidentBefore Incident After Incident
Intruder
Intrusion Detection
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
DatastatesInc.Response
Data in-motion, data in-use and data at-rest
Intrusion
Detection
System
Intrusion
Detection
System
Firewall
Internet
Switch
Router
Proxy
server
Email
server
Web
server
DMZ
FTP
server
Firewall
Domain name
server
Database
server
Bob
Alice
Eve
Data in-
motion
Data at-
rest
Data in-
use Data at-
rest
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
IncidentsIntroduction
Author: Prof Bill Buchanan
Incidents
During IncidentBefore Incident After Incident
Timeline
Data At Rest
Data In-Motion
Data In-Process
Files, Directories, File Rights,
Domain Rights, etc.
File changes, File CRUD
(Create, Delete, Update,
Delete), Thumbprints
Network packet logs, Web
logs, Security logs
Network scanners, Intrusion
Detection Systems, Firewall
logs, etc
Processes, Threads, Memory,
etc.
Security Log, Application Log,
Registry, Domain Rights.
Intruder
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
IntroductionIncResponse
Four Vs of Big Data
Intrusion
Detection
System
Firewall
Router
Proxy
server
Email
server
Web
server
FTP
server
Switch
Alice
Management report
Sales analysis
Targeted marketing
Trending/Correlation
V- Volume
[Scale of data]
V- Variety
[Different forms of
data]
V- Velocity
[Speed of data generation]
V- Veracity
[Trustworthiness]
Incident Response
Eve
Bob
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
IntroductionIncResponse
Data Capture
Web
server
IT Ops
Nagios.
NetApp.
Cisco UCS.
Apache.
IIS.
Web Services
Firewall
Router
Proxy
server
Email
server
FTP
server
Switch
Eve
Bob
Microsoft
Infrastructure
Active Directory.
Exchange.
SharePoint.
Structured Data
CSV.
JSON.
XML.
Database Sys
Oracle.
My SQL.
Microsoft SQL.
Network/Security
Syslog/SNMP.
Cisco NetFlow.
Snort.
Intrusion
Detection
System
Alice
Cloud
AWS Cloudtrail.
Amazon S3.
Azure.
Application Serv
Weblogic.
WebSphere.
Tomcat
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
IntroductionIncResponse
Investigation sources
Web
server
Firewall
Router
Proxy
server
Email
server
FTP
server
Bob
Eve
Internal systems
Cloud service providers
Communication service
providers
Trusted partners
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
IntroductionIncResponse
Basic timeline
Eve
Cloud service providers
Communication service
providers
Web services
Phone
call
Wifi
connect
Tweet
Facebook
post
Email
send
Web page
access
Web log
Call record
Location
record
Corporate login
Web/Domain
Log
Device
switch-on
Logs/Email
Time line
Device logs
System Log Internet cache
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
IntroductionIncResponse
Eve
Eve
Logs/alerts
Bob
SIEM Package (Splunk)
News feeds
Security alerts
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill BuchananAuthor: Prof Bill Buchanan
IncidentResponse
Patterns of Intrusion
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
TypesIncResponse
Author: Prof Bill Buchanan
Typical pattern of intrusion …
Outside
reconnaissance
Inside
reconnaissance
Exploit
FootholdProfit
Intruder gains public information
about the systems, such as DNS and
IP information
Intruder gains more specific
information such as subnet layout, and
networked devices.
Intruder finds a
weakness, such as
cracking a password,
breaching
a firewall, and so on.
Once into the system, the
intruder can then advance
up the privilege levels,
Data stealing, system
damage,
user abuse, and so on.
From code yellow to code
red ...
Intrusion
Detection
Intrusion
Detection
Intrusion
Detection
Intrusion
Detection
Eve
Bob
Intrusion
Detection
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
TypesIncResponse
Author: Prof Bill Buchanan
Cyber Kill Chain ®
From code yellow to
code red ...
Eve
Reconnaissance Weaponization
Preparation (hrs to mons)
Delivery
Explotation
Installation
Intrusion
(minutes)
Command and
Control
Action on
Objective
Bob
Active Breach (months)
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill BuchananAuthor: Prof Bill Buchanan
IncidentResponse
Risk Analysis
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
RiskanalysisIntroduction
Author: Prof Bill Buchanan
Risk analysis (Cost/likelihood)
Highly Likely, Low Cost
- Worth mitigating against
High Likelihood, High
Cost
- Maybe worth mitigating
against.
Low Likelihood, Low
Cost
- Maybe worth mitigating
against.
Low Likelihood, High
Cost
- Probably not worth
mitigating against
Cost
Likelihood
High
cost
Low
cost
High
likelihood
Low
likelihood
Intruder
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill BuchananAuthor: Prof Bill Buchanan
IncidentResponse
Risk Management
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill BuchananAuthor: Prof Bill Buchanan
IncidentResponse
Some Threats
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Risk 2: Rogue SSID/Gateway
Free Moonbucks Wireless
Moonbucks Wireless
Rogue Gateway
Internet Gateway
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Risk 3: Lack of Separation
Business Life
Home Life
Corporate Firewall
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Risk 4: One Password Fits All
150 million accounts
compromised
# Count Ciphertext Plaintext
--------------------------------------------------------------
1. 1911938 EQ7fIpT7i/Q= 123456
2. 446162 j9p+HwtWWT86aMjgZFLzYg== 123456789
3. 345834 L8qbAD3jl3jioxG6CatHBw== password
4. 211659 BB4e6X+b2xLioxG6CatHBw== adobe123
5. 201580 j9p+HwtWWT/ioxG6CatHBw== 12345678
6. 130832 5djv7ZCI2ws= qwerty
7. 124253 dQi0asWPYvQ= 1234567
8. 113884 7LqYzKVeq8I= 111111
9. 83411 PMDTbP0LZxu03SwrFUvYGA== photoshop
10. 82694 e6MPXQ5G6a8= 123123
1 million accounts – in
plain text. 77 million
compromised
47 million accounts
200,000 client accounts
Dropbox
compromised 2013
One account hack … leads to others
6.5 million accounts
(June 2013)
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Risk 4: One Password Fits All
150 million accounts
compromised
# Count Ciphertext Plaintext
--------------------------------------------------------------
1. 1911938 EQ7fIpT7i/Q= 123456
2. 446162 j9p+HwtWWT86aMjgZFLzYg== 123456789
3. 345834 L8qbAD3jl3jioxG6CatHBw== password
4. 211659 BB4e6X+b2xLioxG6CatHBw== adobe123
5. 201580 j9p+HwtWWT/ioxG6CatHBw== 12345678
6. 130832 5djv7ZCI2ws= qwerty
7. 124253 dQi0asWPYvQ= 1234567
8. 113884 7LqYzKVeq8I= 111111
9. 83411 PMDTbP0LZxu03SwrFUvYGA== photoshop
10. 82694 e6MPXQ5G6a8= 123123
Two-factor everything in
the Cloud
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Risk 5: Device Poisoning
Gateway
(192.168.0.1)
Who has this IP
address (192.168.0.1)?
Here is my MAC
address
(11:22:33:44:55:66)
Eve
Here is my MAC
address
(22:33:44:55:66)DHCP Request ...
Eve
1 0.000000 0.0.0.0 255.255.255.255 DHCP 314 DHCP Discover - Transaction ID 0x3d1d
Frame 1: 314 bytes on wire (2512 bits), 314 bytes captured (2512 bits)
Ethernet II, Src: Grandstr_01:fc:42 (00:0b:82:01:fc:42), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
Internet Protocol Version 4, Src: 0.0.0.0 (0.0.0.0), Dst: 255.255.255.255 (255.255.255.255)
User Datagram Protocol, Src Port: bootpc (68), Dst Port: bootps (67)
2 0.000295 192.168.0.1 192.168.0.10 DHCP 342 DHCP Offer - Transaction ID 0x3d1d
Frame 2: 342 bytes on wire (2736 bits), 342 bytes captured (2736 bits)
Ethernet II, Src: DellComp_ad:f1:9b (00:08:74:ad:f1:9b), Dst: Grandstr_01:fc:42 (00:0b:82:01:fc:42)
Internet Protocol Version 4, Src: 192.168.0.1 (192.168.0.1), Dst: 192.168.0.10 (192.168.0.10)
User Datagram Protocol, Src Port: bootps (67), Dst Port: bootpc (68)
3 0.070031 0.0.0.0 255.255.255.255 DHCP 314 DHCP Request - Transaction ID 0x3d1e
Frame 3: 314 bytes on wire (2512 bits), 314 bytes captured (2512 bits)
Ethernet II, Src: Grandstr_01:fc:42 (00:0b:82:01:fc:42), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
Internet Protocol Version 4, Src: 0.0.0.0 (0.0.0.0), Dst: 255.255.255.255 (255.255.255.255)
User Datagram Protocol, Src Port: bootpc (68), Dst Port: bootps (67)
4 0.070345 192.168.0.1 192.168.0.10 DHCP 342 DHCP ACK - Transaction ID 0x3d1e
Frame 4: 342 bytes on wire (2736 bits), 342 bytes captured (2736 bits)
Ethernet II, Src: DellComp_ad:f1:9b (00:08:74:ad:f1:9b), Dst: Grandstr_01:fc:42 (00:0b:82:01:fc:42)
Internet Protocol Version 4, Src: 192.168.0.1 (192.168.0.1), Dst: 192.168.0.10 (192.168.0.10)
User Datagram Protocol, Src Port: bootps (67), Dst Port: bootpc (68)
ARP
Poisoning
DNS
Poisoning
Here is your IP address,
Gateway, and DNS IP
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Risk 6: Unpatched Systems
Eve
CVE-2013-5331
Adobe Flash Player.
Run code on
machine.
CVE-2007-0071
Adobe Flash Player.
Integer overflow
CVE-2013-1723
Java Exploit
CrimeBoss
Phoenix Exploit Kit
http://asecuritysite.com/subjects/chapter14
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill BuchananAuthor: Prof Bill Buchanan
IncidentResponse
A Few Fundamentals
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
DataFormatsDLP
Hex and Base-64
Bob
Encryption/
Encoding
01000001 01000010
01000011 01000100
‘A’ ‘B’ ‘C’ ‘D’
Byte values
ASCII characters
01011110 00100000
11100110 10101010
5e 20 e6 aa
Hex
XiDmqg==
Base-64
13610163252
^ æª
Octal
ASCII
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
DataFormatsDLP
Hex
Bob
0101 1110 0010 0000 1110 0110 1010 1010
5 e 2 0 e 6 a a
Hex
Bit stream
What is 0100111011110001?
Decimal Binary Oct
0 000 0
1 001 1
2 010 2
3 011 3
4 100 4
5 101 5
6 110 6
7 111 7
Decimal Binary Hex
0 0000 0
1 0001 1
2 0010 2
3 0011 3
4 0100 4
5 0101 5
6 0110 6
7 0111 7
8 1000 8
9 1001 9
10 1010 A
11 1011 B
12 1100 C
13 1101 D
14 1110 E
15 1111 F
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
DataFormatsDLP
Base-64
Bob
010111 100010 000011 100110 101010 100000
X I D m q g = = Base-64
Bit stream
0101 1110 0010 0000 1110 0110 1010 1010
010111 100010 000011 100110 101010 100000 = =
24-bit width
Val Enc Val Enc Val Enc Val Enc
0 A 16 Q 32 g 48 w
1 B 17 R 33 h 49 x
2 C 18 S 34 i 50 y
3 D 19 T 35 j 51 z
4 E 20 U 36 k 52 0
5 F 21 V 37 l 53 1
6 G 22 W 38 m 54 2
7 H 23 X 39 n 55 3
8 I 24 Y 40 o 56 4
9 J 25 Z 41 p 57 5
10 K 26 a 42 q 58 6
11 L 27 b 43 r 59 7
12 M 28 c 44 s 60 8
13 N 29 d 45 t 61 9
14 O 30 e 46 u 62 +
15 P 31 f 47 v 63 /
abc 24 bits (4*6) YWJj
abcd 32 bits (5*6) + (2+4) + 12 bits YWJjZA==
abcde 40 bits (8*6) + (2+4) + 4 bits YWJjZGU=
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
DataFormatsDLP
MD5
hello
5D41402ABC4B2A76B9719D911017C592MD5
128 bits (32 hex characters)
AAF4C61DDCC5E8A2DABEDE0F3B482CD9AEA9434DSHA-1
160 bits (40 hex characters)
SHA-256 SHA-384 SHA-512
$ cat hello.txt
Hello
$ openssl md5 hello.txt
MD5(c:hello.txt)=
5d41402abc4b2a76b9719d911017c592
$ echo -n "hello" | openssl md5
(stdin)= 5d41402abc4b2a76b9719d911017c592
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill Buchanan
[ character_group ]
Matches any single character in character_group. By default, the match is case-sensitive.
DataFormatsDLP
RegEx
[ character_group ] Match any single character in character_group Example: gr[ae]y – gray, grey
[ ^character_group ] Match any single character in character_group Example: gr[^ae]y – grby, grcy
[a-z] Character range Example a, b, c … z
{n} Matches previous character repeated n times
a{n,m} Matches between n and m or a
d Matches a digit
. Single character
(a | b) Matches a or b
a? Zero or one match of a
a* Zero or more match of a
a+ One or more match of a
$ Match at the end
Escape: s (space)
Telephone: d{3}[-.]?d{3}[-.]?d{4}
Email: [a-zA-Z0-9._%+-]+@[a-zA-Z0-9._%+-]
444.444.2312
test@home.com
Master: 5d{3}(s|-)?d{4}(s|-)?d{4}(s|-)?d{4}
Am Ex: 3d{3}(s|-)?d{6}(s|-)?d{5}
Visa: 4d{3}(s|-)?d{4}(s|-)?d{4}(s|-)?d{4}
5555-1234-3456-4312
Year: [0-9]{4}
IP: [0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}
1.2.3.4
1961
Author:BillBuchananAuthor:BillBuchanan
StatefulfirewallNetworkSecurity
Stateful firewall
PIX/ASAConfigNetworkSecurity
PIX/ASA
Author: Prof Bill BuchananAuthor: Prof Bill Buchanan
Incident Response
 Introduction.
 Risk Analysis.
 Risk Management.
 Outline of threats.
 Data Loss.
 Fundamentals.
Alice
Bob
Eve
Trent
Bob

More Related Content

Viewers also liked

e-Frality - Adrian Smales and Brian Brown (CM2000)
e-Frality - Adrian Smales and Brian Brown (CM2000)e-Frality - Adrian Smales and Brian Brown (CM2000)
e-Frality - Adrian Smales and Brian Brown (CM2000)Napier University
 
Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care Napier University
 
Blockchain and Health - James Little-john
Blockchain and Health - James Little-johnBlockchain and Health - James Little-john
Blockchain and Health - James Little-johnNapier University
 
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre  Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre Napier University
 
Population Health Management - Angus McCann
Population Health Management - Angus McCannPopulation Health Management - Angus McCann
Population Health Management - Angus McCannNapier University
 
LIquidity and Validity - Jan Gill
LIquidity and Validity - Jan GillLIquidity and Validity - Jan Gill
LIquidity and Validity - Jan GillNapier University
 
Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat DetectionNapier University
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanDr David Probert
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...Dr David Probert
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningLior Rokach
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityDr David Probert
 
Incident response: Advanced Network Forensics
Incident response: Advanced Network ForensicsIncident response: Advanced Network Forensics
Incident response: Advanced Network ForensicsNapier University
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...XEventsHospitality
 

Viewers also liked (15)

e-Frality - Adrian Smales and Brian Brown (CM2000)
e-Frality - Adrian Smales and Brian Brown (CM2000)e-Frality - Adrian Smales and Brian Brown (CM2000)
e-Frality - Adrian Smales and Brian Brown (CM2000)
 
Untuk penggiat Cyber Security dan Sertifikasi dari isaca csx-update-18_apr - ...
Untuk penggiat Cyber Security dan Sertifikasi dari isaca csx-update-18_apr - ...Untuk penggiat Cyber Security dan Sertifikasi dari isaca csx-update-18_apr - ...
Untuk penggiat Cyber Security dan Sertifikasi dari isaca csx-update-18_apr - ...
 
Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care
 
Blockchain and Health - James Little-john
Blockchain and Health - James Little-johnBlockchain and Health - James Little-john
Blockchain and Health - James Little-john
 
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre  Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
 
Incident Response: SIEM
Incident Response: SIEMIncident Response: SIEM
Incident Response: SIEM
 
Population Health Management - Angus McCann
Population Health Management - Angus McCannPopulation Health Management - Angus McCann
Population Health Management - Angus McCann
 
LIquidity and Validity - Jan Gill
LIquidity and Validity - Jan GillLIquidity and Validity - Jan Gill
LIquidity and Validity - Jan Gill
 
Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat Detection
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine Learning
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for Cybersecurity
 
Incident response: Advanced Network Forensics
Incident response: Advanced Network ForensicsIncident response: Advanced Network Forensics
Incident response: Advanced Network Forensics
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 

More from Napier University

10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and PandasNapier University
 
The Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan DelatinneThe Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan DelatinneNapier University
 
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-WattNapier University
 
RMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergRMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergNapier University
 
Browser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinBrowser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinNapier University
 
Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...Napier University
 
IoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeIoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeNapier University
 
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK ShyamasundarRobust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK ShyamasundarNapier University
 
Using Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael PrabuckiUsing Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael PrabuckiNapier University
 
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...Napier University
 
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata FereirraEmerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata FereirraNapier University
 

More from Napier University (20)

Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systems
 
Networks
NetworksNetworks
Networks
 
Memory, Big Data and SIEM
Memory, Big Data and SIEMMemory, Big Data and SIEM
Memory, Big Data and SIEM
 
What is Cyber Data?
What is Cyber Data?What is Cyber Data?
What is Cyber Data?
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
 
10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas
 
2. Defence Systems
2. Defence Systems2. Defence Systems
2. Defence Systems
 
1. Cyber and Intelligence
1. Cyber and Intelligence1. Cyber and Intelligence
1. Cyber and Intelligence
 
The Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan DelatinneThe Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan Delatinne
 
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 
ARTiFACTS, Emma Boswood
ARTiFACTS, Emma BoswoodARTiFACTS, Emma Boswood
ARTiFACTS, Emma Boswood
 
RMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergRMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris Berg
 
Keynote, Naseem Naqvi
Keynote, Naseem Naqvi Keynote, Naseem Naqvi
Keynote, Naseem Naqvi
 
Browser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinBrowser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F Mondschein
 
Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...
 
IoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeIoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair Duke
 
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK ShyamasundarRobust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
 
Using Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael PrabuckiUsing Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael Prabucki
 
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
 
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata FereirraEmerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
 

Recently uploaded

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 

Recently uploaded (20)

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 

Incident response: Introduction