SlideShare a Scribd company logo
Understanding Security
THE KNOWLEDGE TO PROTECT OURSELVES
Why Do We Need Security?
IS M Y COMPANY AT RISK?
Cybercrime
• $575 Billion / year
http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf
http://www.cgma.org/magazine/news/pages/201411089.aspx
• Slows Innovation
• 48% increase in 2014
• Ransomware up 127% this year
• 1 million new malware
threats every day
Attack Trends
Advances in Hacking Technologies
• Powerful Hardware
• Multi-core CPU
• Cheap RAM
• Smart software
http://www.slideshare.net/ignmantra/seminar-cyber-defence-unsoed-21-september-2014
• Metasploit
• Kali Linux
• Faster Internet
How are Attacks Chosen?
• Port Scanning
• BigTarget
• TargetedAttacks
• Insider / Employee
• DDoS
• Targeted Malware
How Do We Protect Ourselves?
WHAT ARE WE PROTECTING OURSELVES FROM?
Life Cycle of a Hack
• Advanced PersistentThreat
https://en.wikipedia.org/wiki/Advanced_persistent_threat
• CommodityThreat
• “Hacktivism”
Who is attacking us? Why?
• Script Kiddies
• Unproven hackers
• Hack for fun
• “Hacktivist”
• Inexperienced hackers
Who is attacking us? Why?
• Veteran Hackers
• Political
• Monetary
• Fraud: IdentityTheft
• Botnet
• Mal-vertizing
• Ransom-ware: CryptoVirus
• “Hacktivist”
Who is attacking us? Why?
• Inflict Damage
• Irate Customer
• “Hacktivist”
• Disgruntled Employee
• Veteran Hackers (cont)
• Cyber-Warfare
• “Ghost Security”
• Government sponsored
Types of Attacks
• Email /Websites
• USB Drop / Sympathy
• Phishing / Social Engineering
• Theft
• Destruction
• Physical
• Preparing for larger attack
• Finding vulnerabilities
• Scanning
Types of Attacks cont.
• Denial of Service
• SYN Attack
• Take Server Down
• DoS / DDoS
• Intercept communications
• Gather information
• Man InThe Middle MITM
• Diversion
Types of Attacks cont.
• Web-app based
• Pull data from server
• Gather information
• Client information
• Billing information
• SQL Injection
• Imitate legitimate site
• Gather credentials / information
• Spoofing
Types of Attacks cont.
• Indirect attack
• Paired with Spoofing
• DNS Hijack
Types of Attacks cont.
• Masquerade as end user
• Gather credentials / information
• Session Hijack
How Do We Protect Ourselves?
STEPS WE CAN TAKE TO PROTECT OURSELVES
Steps we can take
• How can someone take advantage of this situation
• Change our thought process
• Strict access rules
• Firewalls
• File permissions
• Least privilege access
• Web/email filtering
• Updates/Patches
Steps we can take
• Network design
• Security Policy
• Sign / encrypt emails
• Anti-malware / anti-virus
• Encryption
• Network segmentation
• NAT
• Implement DMZ
• Proxy / reverse proxy
Steps we can take
• Download verification
• Education
• Traffic scrubbing service
• Testing and Ethical hacking
• Message Digest (MD5/SHA1)
Howdy = CA11A8D225A16796859BE939A4AF562
Howdy! = 7105F32280940271293EE00AC97DA5A7
More on Encryption
KEEPING OUR DATA SECURE
Application Level Encryption
• HTTP over SSL (HTTPS)
• Web Browsing
• FileTransfer
• FileTransfer Protocol over SSL (FTPS)
• Secure Shell SSH
• Connectivity / Administration
Public Key Infrastructure PKI
• Public / Private Key
• Public encrypts / private decrypts
Digital Signature
• Public / Private Key
• Public decrypts / private encrypts
Transport Encryption
• Wireless (WiFi)
• Pre-Shared Key PSK
• Enterprise Authentication Protocol EAP
• Shared Password
• Unique username and password
• WiFi Protected Access WPA2
• Authenticate to 3rd party device
Transport Encryption
• IP Secure - IPSEC
• Software client required
• Secure Socket Layer (SSL)VPN
• Establish through web browser
• Various encryption algorithms
• 3DES – AES – SHA1
• Virtual Private Network -VPN
Local Encryption
• File Level Encryption
• Laptops/Desktops
• Bit Locker
• Databases
• File Shares
• Email Store
• Hard Drive Encryption
Summary
• You are at risk!
• You need to understand….
• New vulnerabilities every day!
• Threat
• Vulnerabilities
• Ways to attack
• Motivation of attack
• Your technology
Questions?
THANK YOU!
Things to Think about
• Everything is vulnerable
• Everything is hackable
• Hackers are smart!

More Related Content

What's hot

Computer security
Computer securityComputer security
Computer security
Ayesha Arshad
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
Syazzey Waniey II
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
AditiPatni3
 
Network security
Network securityNetwork security
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
Community IT Innovators
 
Cyber security
Cyber securityCyber security
Cyber security
Eduonix
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
Kabul Education University
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking Overview
Sam Bowne
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
hanna91
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
SumanPramanik7
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
AT-NET Services, Inc. - Charleston Division
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
Cyber security
Cyber securityCyber security
Cyber security
Ankush Verma
 
Ceh intro
Ceh introCeh intro
Ceh intro
Animesh Roy
 
Security tools
Security toolsSecurity tools
Security tools
arfan shahzad
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
Quick Heal Technologies Ltd.
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
Marie Elisabeth Gaup Moe
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
Ali Habeeb
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Aditya Ratnaparkhi
 

What's hot (20)

Computer security
Computer securityComputer security
Computer security
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 
Network security
Network securityNetwork security
Network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking Overview
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ceh intro
Ceh introCeh intro
Ceh intro
 
Security tools
Security toolsSecurity tools
Security tools
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 

Viewers also liked

Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)
ainizbahari97
 
Skyscraper Security Mgt Part II- by Richard Garrity
Skyscraper Security Mgt  Part II- by Richard GarritySkyscraper Security Mgt  Part II- by Richard Garrity
Skyscraper Security Mgt Part II- by Richard Garrity
Richard Garrity
 
Security Measure
Security MeasureSecurity Measure
Security Measure
syafiqa
 
Web application security: how to start?
Web application security: how to start?Web application security: how to start?
Web application security: how to start?
Antonio Fontes
 
Improving web application security, part ii
Improving web application security, part iiImproving web application security, part ii
Improving web application security, part ii
Kangkan Goswami
 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & Testing
Deepu S Nath
 
Concern of Web Application Security
Concern of Web Application SecurityConcern of Web Application Security
Concern of Web Application Security
Mahmud Ahsan
 

Viewers also liked (7)

Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)Security measures (Microsoft Powerpoint)
Security measures (Microsoft Powerpoint)
 
Skyscraper Security Mgt Part II- by Richard Garrity
Skyscraper Security Mgt  Part II- by Richard GarritySkyscraper Security Mgt  Part II- by Richard Garrity
Skyscraper Security Mgt Part II- by Richard Garrity
 
Security Measure
Security MeasureSecurity Measure
Security Measure
 
Web application security: how to start?
Web application security: how to start?Web application security: how to start?
Web application security: how to start?
 
Improving web application security, part ii
Improving web application security, part iiImproving web application security, part ii
Improving web application security, part ii
 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & Testing
 
Concern of Web Application Security
Concern of Web Application SecurityConcern of Web Application Security
Concern of Web Application Security
 

Similar to Network Security

It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
Brian Pichman
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
Precisely
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
Precisely
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
Brian Pichman
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
Ahmed Sayed-
 
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
Sam Bowne
 
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Kelly Robertson
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3
Eoin Keary
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
AlgoSec
 
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Innovators
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
Charles Cline
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
APNIC
 
Database Security Threats - MariaDB Security Best Practices
Database Security Threats - MariaDB Security Best PracticesDatabase Security Threats - MariaDB Security Best Practices
Database Security Threats - MariaDB Security Best Practices
MariaDB plc
 
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Chris Gates
 
Scottish Rite Security Presentation.pptx
Scottish Rite Security Presentation.pptxScottish Rite Security Presentation.pptx
Scottish Rite Security Presentation.pptx
jeremylivin
 
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal BallPlanning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
AlienVault
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
Tudor Damian
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
EduclentMegasoftel
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
Precisely
 

Similar to Network Security (20)

It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application Security
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
 
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
 
Database Security Threats - MariaDB Security Best Practices
Database Security Threats - MariaDB Security Best PracticesDatabase Security Threats - MariaDB Security Best Practices
Database Security Threats - MariaDB Security Best Practices
 
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
 
Scottish Rite Security Presentation.pptx
Scottish Rite Security Presentation.pptxScottish Rite Security Presentation.pptx
Scottish Rite Security Presentation.pptx
 
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal BallPlanning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
 

Recently uploaded

一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
Integrating Physical and Cybersecurity to Lower Risks in Healthcare!
Integrating Physical and Cybersecurity to Lower Risks in Healthcare!Integrating Physical and Cybersecurity to Lower Risks in Healthcare!
Integrating Physical and Cybersecurity to Lower Risks in Healthcare!
Alec Kassir cozmozone
 

Recently uploaded (14)

一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
Integrating Physical and Cybersecurity to Lower Risks in Healthcare!
Integrating Physical and Cybersecurity to Lower Risks in Healthcare!Integrating Physical and Cybersecurity to Lower Risks in Healthcare!
Integrating Physical and Cybersecurity to Lower Risks in Healthcare!
 

Network Security

  • 2. Why Do We Need Security? IS M Y COMPANY AT RISK?
  • 3. Cybercrime • $575 Billion / year http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf http://www.cgma.org/magazine/news/pages/201411089.aspx • Slows Innovation • 48% increase in 2014 • Ransomware up 127% this year • 1 million new malware threats every day
  • 5. Advances in Hacking Technologies • Powerful Hardware • Multi-core CPU • Cheap RAM • Smart software http://www.slideshare.net/ignmantra/seminar-cyber-defence-unsoed-21-september-2014 • Metasploit • Kali Linux • Faster Internet
  • 6. How are Attacks Chosen? • Port Scanning • BigTarget • TargetedAttacks • Insider / Employee • DDoS • Targeted Malware
  • 7. How Do We Protect Ourselves? WHAT ARE WE PROTECTING OURSELVES FROM?
  • 8. Life Cycle of a Hack • Advanced PersistentThreat https://en.wikipedia.org/wiki/Advanced_persistent_threat • CommodityThreat • “Hacktivism”
  • 9. Who is attacking us? Why? • Script Kiddies • Unproven hackers • Hack for fun • “Hacktivist” • Inexperienced hackers
  • 10. Who is attacking us? Why? • Veteran Hackers • Political • Monetary • Fraud: IdentityTheft • Botnet • Mal-vertizing • Ransom-ware: CryptoVirus • “Hacktivist”
  • 11. Who is attacking us? Why? • Inflict Damage • Irate Customer • “Hacktivist” • Disgruntled Employee • Veteran Hackers (cont) • Cyber-Warfare • “Ghost Security” • Government sponsored
  • 12. Types of Attacks • Email /Websites • USB Drop / Sympathy • Phishing / Social Engineering • Theft • Destruction • Physical • Preparing for larger attack • Finding vulnerabilities • Scanning
  • 13. Types of Attacks cont. • Denial of Service • SYN Attack • Take Server Down • DoS / DDoS • Intercept communications • Gather information • Man InThe Middle MITM • Diversion
  • 14. Types of Attacks cont. • Web-app based • Pull data from server • Gather information • Client information • Billing information • SQL Injection • Imitate legitimate site • Gather credentials / information • Spoofing
  • 15. Types of Attacks cont. • Indirect attack • Paired with Spoofing • DNS Hijack
  • 16. Types of Attacks cont. • Masquerade as end user • Gather credentials / information • Session Hijack
  • 17. How Do We Protect Ourselves? STEPS WE CAN TAKE TO PROTECT OURSELVES
  • 18. Steps we can take • How can someone take advantage of this situation • Change our thought process • Strict access rules • Firewalls • File permissions • Least privilege access • Web/email filtering • Updates/Patches
  • 19. Steps we can take • Network design • Security Policy • Sign / encrypt emails • Anti-malware / anti-virus • Encryption • Network segmentation • NAT • Implement DMZ • Proxy / reverse proxy
  • 20. Steps we can take • Download verification • Education • Traffic scrubbing service • Testing and Ethical hacking • Message Digest (MD5/SHA1) Howdy = CA11A8D225A16796859BE939A4AF562 Howdy! = 7105F32280940271293EE00AC97DA5A7
  • 21. More on Encryption KEEPING OUR DATA SECURE
  • 22. Application Level Encryption • HTTP over SSL (HTTPS) • Web Browsing • FileTransfer • FileTransfer Protocol over SSL (FTPS) • Secure Shell SSH • Connectivity / Administration
  • 23. Public Key Infrastructure PKI • Public / Private Key • Public encrypts / private decrypts
  • 24. Digital Signature • Public / Private Key • Public decrypts / private encrypts
  • 25. Transport Encryption • Wireless (WiFi) • Pre-Shared Key PSK • Enterprise Authentication Protocol EAP • Shared Password • Unique username and password • WiFi Protected Access WPA2 • Authenticate to 3rd party device
  • 26. Transport Encryption • IP Secure - IPSEC • Software client required • Secure Socket Layer (SSL)VPN • Establish through web browser • Various encryption algorithms • 3DES – AES – SHA1 • Virtual Private Network -VPN
  • 27. Local Encryption • File Level Encryption • Laptops/Desktops • Bit Locker • Databases • File Shares • Email Store • Hard Drive Encryption
  • 28. Summary • You are at risk! • You need to understand…. • New vulnerabilities every day! • Threat • Vulnerabilities • Ways to attack • Motivation of attack • Your technology
  • 30. Things to Think about • Everything is vulnerable • Everything is hackable • Hackers are smart!