SlideShare a Scribd company logo
SIMOC PLATFORM
Agenda
o About RustCon
o Introduction to CyberSecurity
o CyberSecurity - Concepts
o SIMOC as a platform to build and manage a cyber safety
environment
o DEMO
About RustCon
• Founded on 2011, RustCon is a Brazilian Consulting Company
• Focus on Defense and Security Industry
• We are a Strategic Defense Company (or EED in Portuguese),
certified by the Brazilian Ministry of Defense
INTRODUCTION TO
CYBERSECURITY
What would happen if the electrical
system of this city was shutting down?
... And if all air systems of
that country stops?
... and also if the data of Social Security
is hacked?
What can we expect if we face
situations like these?
CHAOS
ECONOMIC LOSSES
Delivery of a Safety Cybernetic Environment
CHALLENGES
It is a LONG process...
require COMPLEX tasks
Manual process is error-prone
and non-repeatable
Safety Cybernetic Environment
ACTIVITIES
Require multiples IT
planning meeting
Define applications,
middleware and
budget
Coordination across
teams
Design Architecture
Design Deployment
and Configuration
Setup Network
Create VMs Create Applications Assemble Workflow
Generate the traffic Test and qualify
Manage the App
lifecycle
Several weeks to be complete
Value Proposition
provides agility to create a complete Software Defined Environment
Catalog of Scenarios which will support you to perform security tests.
CYBERSECURITY - CONCEPT
Cyber Security Concept
to PROTECT and to ENSURE the availability
of NETWORK SERVICES
in charge to the management
and control of
the CRITICAL INFRASTRUCTURE
of an ORGANIZATION
“customized” cyber
attack modes for specific
Company.
Current Scenario
Increasing number of cyber
incidents against
government organizations
Increasing networks
interconnections. 50 Billon de
devices with the Internet of
Things till 2020.
GAP of 2.2 Millon security
professionals till 2017
source: Websense Security Labs
source: Websense Security Labs
Fast Growth in Number of Incidents
Main Threats
o violation of the National Security
o Sabotage
o DDOS
o Data theft
Energy,
Oil&Gas
Telecommunications
Banks
Targets
How to Act
Capability
It’s all about
to build
knowledge
into the team.
Prevent
To define
safety process
in order to
implement
new cyber
infrastructures
Action
Monitoring cyber
infrastructues
and put in place
the plan for
defence, to fix
the issues and to
recover the
disasters
Unsafe
environment
Safe
Environment
Point-of-View
PreventMonitor
Quick
Response
Regulation Capability
Infrastructure
Decision Support System
Inteligence
THE SIMOC
Simulador de Operações Cibernéticas
What is The SIMOC?
It is a platform that allows the creation of cyber environments,
with focus on security.
SIMOC
Capability
Assessment
Operations
of Security
Services
Capability
How to
• Scenarios already designed in
Cyber attack and defense
• Real-time monitoring and the
possibility of interfering in the
progress of the training (pause, fast
forward, rewind)
• Possibility of recording the training
for further evaluation of students.
Benefits
• Training expertise from an
environment that reflects the
specifications of your own network
• knowledge Leveling with significant
reduction of OPEX and CAPEX
• Capability development Continuously
Its goals are to form, train and update
cyber analysts.
Assessment
Assessment of services and network elements
Vulnerability and Risk Analysis
How to
• Create of a replica of the TIC
infrastructure in a seggregated
environment
• Emulate links (ADSL / Satelital /
Ethernet / Customized)
• Traffic generation
• Automated Cyber attacks and
defence
Benefits
• Support to Change Management
• Support to Capacity
Management (Stress Test)
• Support to Quality Management
(Regulation/certification)
• Agility
• OPEX / CAPEX reduction
Operations of Security Services
Creation of Secure Services to be
used in a production environmen
How to
• Utilization of pre-configured
secure service packages
(Templates)
• Integration with real and
virtualized networks
Benefits
• OPEX / CAPEX optimization
• Services with high-level of
security
Catalog of Scenarios
23
Catalog of Scenarios
The SIMOC platform brings along a list of more than 50 ready-to-use
scenarios. And additionally allows the operator to add new
scenarios. Check a few examples of scenarios in the catalog:
o Overcome protections (networks with Snort, Firewall and Squid)
o Execute an SQL Injection attack
o Modify the content of a web page with an FTP server vulnerable to Buffer Overflow
o Obtain access to source code in execution on the web server and find flaws in the code
o Attach a client machine through sending a malicious link in an e-mail. The installed
malware will send files with confidential information from the client via e-mail
o Attack a network with DHCP service, depleting the IP addresses of the official DHCP
server to personify the server
o Overcome the access control, passing the conection through a DNS tunnel DNS to have
acccess to blocked services
Scenario of a power plant invasion - network
Hamilton Oliveira
Business Developer Manager - CyberSecurity
mailto:hamilton.oliveira@rustcon.com.br
Office:+552135543181

More Related Content

What's hot

TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
SaraPia5
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
FireEye, Inc.
 
Next Generation Firewalls
Next Generation FirewallsNext Generation Firewalls
Next Generation Firewalls
The eCore Group
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
IceQUICK
 
Cyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceCyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General Audience
Tom K
 
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They OccurAnticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Skybox Security
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
Prime Infoserv
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
marketingunitrends
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Security
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
Valery Yelanin
 
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
Edureka!
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
Prime Infoserv
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
Quest
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
Rajendra Menon
 
FireEye
FireEyeFireEye
FireEye
gigamon
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and Availability
Lai Yoong Seng
 
FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not
MarketingArrowECS_CZ
 
Creating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVaultCreating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVault
AlienVault
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?
marketingunitrends
 
Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpoints
Cisco Canada
 

What's hot (20)

TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
Next Generation Firewalls
Next Generation FirewallsNext Generation Firewalls
Next Generation Firewalls
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
 
Cyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceCyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General Audience
 
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They OccurAnticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
FireEye
FireEyeFireEye
FireEye
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and Availability
 
FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not
 
Creating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVaultCreating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVault
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?
 
Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpoints
 

Viewers also liked

Wk 1 motivational pp
Wk 1 motivational ppWk 1 motivational pp
Wk 1 motivational pp
anroge09
 
Yuanyuan tan should government control media
Yuanyuan tan should government control mediaYuanyuan tan should government control media
Yuanyuan tan should government control media
Annette Yuan-Yuan Tan
 
Manual camera settings
Manual camera settingsManual camera settings
Manual camera settings
BenHolmes1995
 
Mt1 trends in translation mon
Mt1 trends in translation monMt1 trends in translation mon
Mt1 trends in translation monMABS LLC
 
Presentaciones GS1 University. Aguascalientes 2016
Presentaciones GS1 University. Aguascalientes 2016Presentaciones GS1 University. Aguascalientes 2016
Presentaciones GS1 University. Aguascalientes 2016
Martín Angeles González
 
Mamta Darji CV
Mamta Darji CVMamta Darji CV
Mamta Darji CV
Mamta Darji
 
bhakti and sufism
bhakti and sufismbhakti and sufism
bhakti and sufism
Dibyendu Dolai
 
User sustainable empowerment
User sustainable empowermentUser sustainable empowerment
User sustainable empowerment
Edward Nyameri
 
Leccion 2 a
Leccion 2 aLeccion 2 a
Leccion 2 a
Virtual Confecoop
 
Fenaljurídico #2 marzo abril 2017
Fenaljurídico #2 marzo abril 2017Fenaljurídico #2 marzo abril 2017
Fenaljurídico #2 marzo abril 2017
Fenalco Antioquia
 
La crisis mundial de 1929
La crisis mundial de 1929La crisis mundial de 1929
La crisis mundial de 1929
Serge Ivoire
 
WorldHist- Industrial revolution (Ch.18)
WorldHist- Industrial revolution (Ch.18)WorldHist- Industrial revolution (Ch.18)
WorldHist- Industrial revolution (Ch.18)
cmonafu
 
6.1.4.08.09
6.1.4.08.096.1.4.08.09
6.1.4.08.09
Iyan Shofyan
 
Gastcollege NHTV Breda
Gastcollege NHTV BredaGastcollege NHTV Breda
Gastcollege NHTV Breda
Danny Steigerwald
 

Viewers also liked (15)

Wk 1 motivational pp
Wk 1 motivational ppWk 1 motivational pp
Wk 1 motivational pp
 
Yuanyuan tan should government control media
Yuanyuan tan should government control mediaYuanyuan tan should government control media
Yuanyuan tan should government control media
 
Manual camera settings
Manual camera settingsManual camera settings
Manual camera settings
 
Mt1 trends in translation mon
Mt1 trends in translation monMt1 trends in translation mon
Mt1 trends in translation mon
 
Presentaciones GS1 University. Aguascalientes 2016
Presentaciones GS1 University. Aguascalientes 2016Presentaciones GS1 University. Aguascalientes 2016
Presentaciones GS1 University. Aguascalientes 2016
 
Mamta Darji CV
Mamta Darji CVMamta Darji CV
Mamta Darji CV
 
bhakti and sufism
bhakti and sufismbhakti and sufism
bhakti and sufism
 
User sustainable empowerment
User sustainable empowermentUser sustainable empowerment
User sustainable empowerment
 
Leccion 2 a
Leccion 2 aLeccion 2 a
Leccion 2 a
 
Fenaljurídico #2 marzo abril 2017
Fenaljurídico #2 marzo abril 2017Fenaljurídico #2 marzo abril 2017
Fenaljurídico #2 marzo abril 2017
 
La crisis mundial de 1929
La crisis mundial de 1929La crisis mundial de 1929
La crisis mundial de 1929
 
WorldHist- Industrial revolution (Ch.18)
WorldHist- Industrial revolution (Ch.18)WorldHist- Industrial revolution (Ch.18)
WorldHist- Industrial revolution (Ch.18)
 
6.1.4.08.09
6.1.4.08.096.1.4.08.09
6.1.4.08.09
 
Gastcollege NHTV Breda
Gastcollege NHTV BredaGastcollege NHTV Breda
Gastcollege NHTV Breda
 
Sessió 1
Sessió 1 Sessió 1
Sessió 1
 

Similar to Plataforma de Operação e Simulação Cibernética

CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
CSO_Presentations
 
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cloudflare_Everywhere_Security_Solution_Brief (1).pdfCloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
petchphumsanit40
 
Is it an internal affair
Is it an internal affairIs it an internal affair
Is it an internal affair
George Delikouras
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
scoopnewsgroup
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation
Cisco DevNet
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
Leonardo Antichi
 
BreakingPoint от Ixia
BreakingPoint от IxiaBreakingPoint от Ixia
BreakingPoint от Ixia
BAKOTECH
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
Kashyap Kunal
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
CloudExpoEurope
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps Journey
Derek E. Weeks
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
Michele Vecchione
 
Become a cloud security expert
Become a cloud security expertBecome a cloud security expert
Become a cloud security expert
billysmit3
 
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
NetworkCollaborators
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the Cloud
Alert Logic
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the Cloud
Alert Logic
 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptx
GhofraneFerchichi2
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
ClubHack
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
Alert Logic
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
Interop
 

Similar to Plataforma de Operação e Simulação Cibernética (20)

CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cloudflare_Everywhere_Security_Solution_Brief (1).pdfCloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
 
Is it an internal affair
Is it an internal affairIs it an internal affair
Is it an internal affair
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
BreakingPoint от Ixia
BreakingPoint от IxiaBreakingPoint от Ixia
BreakingPoint от Ixia
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps Journey
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
 
Become a cloud security expert
Become a cloud security expertBecome a cloud security expert
Become a cloud security expert
 
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the Cloud
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the Cloud
 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptx
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 

Plataforma de Operação e Simulação Cibernética

  • 2. Agenda o About RustCon o Introduction to CyberSecurity o CyberSecurity - Concepts o SIMOC as a platform to build and manage a cyber safety environment o DEMO
  • 3. About RustCon • Founded on 2011, RustCon is a Brazilian Consulting Company • Focus on Defense and Security Industry • We are a Strategic Defense Company (or EED in Portuguese), certified by the Brazilian Ministry of Defense
  • 5. What would happen if the electrical system of this city was shutting down?
  • 6. ... And if all air systems of that country stops?
  • 7. ... and also if the data of Social Security is hacked? What can we expect if we face situations like these? CHAOS ECONOMIC LOSSES
  • 8. Delivery of a Safety Cybernetic Environment CHALLENGES It is a LONG process... require COMPLEX tasks Manual process is error-prone and non-repeatable
  • 9. Safety Cybernetic Environment ACTIVITIES Require multiples IT planning meeting Define applications, middleware and budget Coordination across teams Design Architecture Design Deployment and Configuration Setup Network Create VMs Create Applications Assemble Workflow Generate the traffic Test and qualify Manage the App lifecycle Several weeks to be complete
  • 10. Value Proposition provides agility to create a complete Software Defined Environment Catalog of Scenarios which will support you to perform security tests.
  • 12. Cyber Security Concept to PROTECT and to ENSURE the availability of NETWORK SERVICES in charge to the management and control of the CRITICAL INFRASTRUCTURE of an ORGANIZATION
  • 13. “customized” cyber attack modes for specific Company. Current Scenario Increasing number of cyber incidents against government organizations Increasing networks interconnections. 50 Billon de devices with the Internet of Things till 2020. GAP of 2.2 Millon security professionals till 2017 source: Websense Security Labs source: Websense Security Labs
  • 14. Fast Growth in Number of Incidents
  • 15. Main Threats o violation of the National Security o Sabotage o DDOS o Data theft Energy, Oil&Gas Telecommunications Banks Targets
  • 16. How to Act Capability It’s all about to build knowledge into the team. Prevent To define safety process in order to implement new cyber infrastructures Action Monitoring cyber infrastructues and put in place the plan for defence, to fix the issues and to recover the disasters Unsafe environment Safe Environment
  • 18. THE SIMOC Simulador de Operações Cibernéticas
  • 19. What is The SIMOC? It is a platform that allows the creation of cyber environments, with focus on security. SIMOC Capability Assessment Operations of Security Services
  • 20. Capability How to • Scenarios already designed in Cyber attack and defense • Real-time monitoring and the possibility of interfering in the progress of the training (pause, fast forward, rewind) • Possibility of recording the training for further evaluation of students. Benefits • Training expertise from an environment that reflects the specifications of your own network • knowledge Leveling with significant reduction of OPEX and CAPEX • Capability development Continuously Its goals are to form, train and update cyber analysts.
  • 21. Assessment Assessment of services and network elements Vulnerability and Risk Analysis How to • Create of a replica of the TIC infrastructure in a seggregated environment • Emulate links (ADSL / Satelital / Ethernet / Customized) • Traffic generation • Automated Cyber attacks and defence Benefits • Support to Change Management • Support to Capacity Management (Stress Test) • Support to Quality Management (Regulation/certification) • Agility • OPEX / CAPEX reduction
  • 22. Operations of Security Services Creation of Secure Services to be used in a production environmen How to • Utilization of pre-configured secure service packages (Templates) • Integration with real and virtualized networks Benefits • OPEX / CAPEX optimization • Services with high-level of security
  • 24. Catalog of Scenarios The SIMOC platform brings along a list of more than 50 ready-to-use scenarios. And additionally allows the operator to add new scenarios. Check a few examples of scenarios in the catalog: o Overcome protections (networks with Snort, Firewall and Squid) o Execute an SQL Injection attack o Modify the content of a web page with an FTP server vulnerable to Buffer Overflow o Obtain access to source code in execution on the web server and find flaws in the code o Attach a client machine through sending a malicious link in an e-mail. The installed malware will send files with confidential information from the client via e-mail o Attack a network with DHCP service, depleting the IP addresses of the official DHCP server to personify the server o Overcome the access control, passing the conection through a DNS tunnel DNS to have acccess to blocked services
  • 25. Scenario of a power plant invasion - network
  • 26. Hamilton Oliveira Business Developer Manager - CyberSecurity mailto:hamilton.oliveira@rustcon.com.br Office:+552135543181

Editor's Notes

  1. Founded on 2011 by Mr. Carlos Rust, the RustCon brings on its DNA consulting projects, which cames with Mr. Rust from its more than 20 years as a partner of Accenture Company. Our main focus are on Defense and Security Industry I can brief quickly some of those important projects that have built our history and reputation: First I’d like to comment about project of The military world games. This is the second sport event that brings together more athletes in the world. On this case we have delivered a Comand and Control System. (The system was in charge to schecule and monitor all the events and activities of the organization of the games. It trigger alarms in case something goes wrong and start procedures for the alternative plans) We was also engaged on the SISFROM Project. The goal of this project is to monitor and manage the activities on the land borders of Brazil. We have had 3 participations: the first one was a consultancy to evaluate the software architecture of the Decision Support System; Our second sub-project on SISFROM was to develop the Logistcs Management System, actually we are still working on this project. And on the last January we have started the third project which is a “Simulator for the SISFROM”. Than after to build a good reputation with delivering projects to the ARMY on outstanding manner, the ARMY gave us the challenge to develop a The Brazilian cyber operations and simulations system, The SIMOC. This project allowed us to be recognized as a Strategic Defense Company, it is a certification provided by the Ministry of Defence We are very proud for to be recognized with this certification. Today we will talk about The SIMOC.
  2. In the next Slides we will present some questions to setup the context and for reflections about cybersecurity.
  3. So, to delivery a safety cyber environment is a long process, which requires the execution of complex tasks, and manual process is error-prone and non-repeatable.
  4. These list of activities is required... ... It will take several weeks to be complete...
  5. SIMOC is a dramatic changes. You can design, provisioning and execute in a day, not in months. With SIMOC you will be able to create a complete cyber security environment.
  6. In our point-of-view CyberSecurity is about to protect and to ensure the availability of network services in charge to manage and control the critical infrestructure of an organization.
  7. Looking at the current scenario of Cyber Environment, we can highlight some important points. The number of devices connected in a net is increasing very quickily. According to the Websense report, till 2020 we will gonna have 50 billon of devices connected “Especialized” attacks is a concern as well. It’s not enough to be prepared for the standard attacks, specially when we consider critical infrastrucure of governments, rackers are hired to perform “custom” attacks with very specific goal. It was also reported by Websense that security segment will face a gap of 2.2 million of security professionals. It is a red flag when we consider the tremendous number of devices connected, new technologies, and also the fast growth of cyber incidends... Let’s take a look in the graph of the next slide...
  8. It’s showing that on 2014 the number of cyber incidents was 300% higher than in the year before. This is scary...
  9. Still regarding the CyberSecurity, we are pointing here some of the main threats identified, for instance DDOS and Data Theft Also, the critical infrastructures are tipicaly the main targes of attacks.
  10. And finally, how to act in order to move from an “unsafe environment” to a “safe environment” Capability: It’s all about to build internal knowledgment. It’s important to train not only the analysts, who will execute the tasks, but the Management team as well in order to give them the proper knowledgement to define security strategies. Prevent: There is no way to prevent attacks if your cyber environment is not under control. Polices and process is a must to create a safety cyber environment. and Action: Continuos observation of the environment and further analises of traffic behavor will support you to define a defence plan, to create procedures to fix issues and for desaster recovery.
  11. On this functional diagram we are presenting our Point-of-View to move to a safety cyber security environment: - Capability development To define police and process to build scenarious of use Tools to model and deploy complex infraestuctures quickly Decision support systems to help to define a security strategies ... ... and also, tools to monitor your traffic in order to give you a complete situation awareness of your network, to give you a quick possibility to taste and deploy new options of prevent attacks, and those can give the possibility to counterattack, ---- The SIMOC can support you on it. INTELIGÊNCIA and finnaly to give you the possibility to record all scenarious of attacks that your company suffered and to be linked with sources ....
  12. SIMOC is platform that allows the creation of cyber environments, with important CAPEX and OPEX optimization. We will explore 3 aspects of the SIMOC: Capability development Assessment of network elements and services and Operations of Security Services
  13. With the Capability module you can train your team continuously in order to build knowledge leveling inside the team. This module cames with ready-to-use scenarios for cyber attacks and defense; give to the instructor habilities to follow up the execution of the training in real-time; The instructor is able to increase or reduce complexity of the tasks while the activities are running; Also the module can measure the achievements of the students by pre-defined metrics. Regarding the Benefits, we can highlight the OPEX AND CAPEX REDUCTION, and not least, the environment that your team will perform the train can be exactly like your production environment.
  14. The Assessment module provide features with which the IT team can homologate network elements and services before to apply the changes on the production environment. With that, you can create a separate and independent “copy” of your entire TIC environment quickily and than to perform the proper validations tests. As benefits some importante points are hightlighted here:
  15. With the Operations module Your organization will do not depends on of a banch of security experts. You will be able to create a secure services based on the templates ready-to-use. Thanks to SIMOC features you can integrate physical network elements with services deployed on the virtual environment. It can bring again very importante OPEX and CAPEX optimization.