Chris D Hicks Director of IT MCSE, MCP + Internet Security

Slides:



Advertisements
Similar presentations
SSH Operation and Techniques - © William Stearns 1 SSH Operation and Techniques The Swiss Army Knife of encryption tools…
Advertisements

Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Monitoring Your Network Chris Bamber, IT Systems Manager Somerville College Confidentiality: The contents of this presentation and workshop discussion.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
System Security Scanning and Discovery Chapter 14.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Case Studies for Projects. Network Audit A brief description of the systems (via fingerprinting, if black box is used) Network perimeter should be described.
Chapter 9: Troubleshooting and Repairing Networking.
Assessing Vulnerabilities ISA 4220 Server Systems Security James A. Edge Jr., CISSP, CISM, CISA, CPTE, MCSE Sr. Security Analyst Cincinnati Bell Technology.
Computer Security and Penetration Testing
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Thessaloniki November Penetration Testing with Android Devices Hacking with our pocket device, made easy! Thomas Sermpinis a.k.a. Cr0wTom.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
University of Maryland I.T. Security Gerry Sneeringer IT Security Officer
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
Nikto LUCA ALEXANDRA ADELA. Nikto  Web server assessment tool  Written by Chris Solo and David Lodge  Released on December 27, 2001  Stable release:
Security Audit Tools Project. CT 395 IT Security I Professor Igbeare Summer Quarter 2009 August 25, 2009.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Linux Deploy This application is open source software for quick and easy installation of the operating system (OS) GNU/Linux on your Android device. The.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
Honeypot and Intrusion Detection System
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Module 14: Configuring Server Security Compliance
Software Security Testing Vinay Srinivasan cell:
Module 11: Remote Access Fundamentals
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
Security at NCAR David Mitchell February 20th, 2007.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Module 11: Designing Security for Network Perimeters.
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
CS101 Network Setup. Parts of a network Everything on a network is called a ____ Three main types of _____: –__________ Devices = Printers, Scanners,
Enumeration. Definition Scanning identifies live hosts and running services Enumeration probes the identified services more fully for known weaknesses.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Top 10 Hacking Tool Welcome TO hackaholic Kumar shubham.
Unit 2: Cyber Security Part 3 Monitoring Tools & other Security Products.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
1.4 wired and wireless networks lesson 1
Defining your requirements for a successful security (and compliance
[blank page for bug work-around]
The BEST Citrix/Microsoft RDS alternative
Penetration Testing Scanning
Introduction to Network Scanning
Critical Security Controls
CITA 352 Chapter 5 Port Scanning.
Secure Software Confidentiality Integrity Data Security Authentication
Penetration Testing Karen Miller.
Network Exploitation Tool
Securing the Network Perimeter with ISA 2004
Click to edit Master subtitle style
CIT 480: Securing Computer Systems
Physics Network Integration
Backtracking Intrusions
Everything You Need To Know About Penetration Testing.
RECONNAISSANCE & ENUMERATION
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
ISMS Information Security Management System
Network hardening Chapter 14.
Cybersecurity Threat Assessment
Engineering Secure Software
Hacking Windows Damian Gordon.
6. Application Software Security
Presentation transcript:

Chris D Hicks Director of IT MCSE, MCP + Internet Security MCP: 2175419 Since 2000 August 17, 2016

Cybersecurity Basics Cyber terrorism is a real and growing threat. Standards and guides have been developed, vetted, and widely accepted to assist with protection from cyber attack. Organizations like DHS have put more recourses into prevention and detection incident response, education and information sharing. http://www.dhs.gov/topic/cybersecurity http://www.pureetfs.com/purefunds-etfs/hack/ Coast Guard local Cyber Security on Home Port https://homeport.uscg.mil

Basic Steps to Start Identify Equipment & Connections computers, servers, firewall and routers, wireless devices and printers, legacy devices and remote equipment. Categorize & Prioritize Groups accounting system, server room, wireless access and mobile devices, public wifi and legacy devices, remote and external devices, any type of virtual machine, device or server. Determine Vulnerabilities firewall ports, email server, vpn and remote access software; Team Viewer, LogMeIn, wireless access points, usb and portable devices, wireless printers.

Start C-SET Questions

Question based, Key or Universal

Requirements

Cybersecurity Framework http://www.nist.gov/cyberframework/cybersecurity-framework-faqs-framework-components.cfm

Security Assurance Level

Network Diagram

Templates

Tools and Scanners Scan & Inventory Your Network Nmap, Solar Winds, Belarc Advisor, Wire Shark, JDSU Network Analyzer

Questions and Comments

Reports and Ranking

Firewalls and IBM X Force Watchguard XTM Dimension Server https://exchange.xforce.ibmcloud.com

9 Open Source Security Tools 1. Nmap - map your network and ports with the number one port scanning tool. Nmap now features powerful NSE scripts that can detect vulnerabilities, misconfiguration and security related information around network services. After you have nmap installed be sure to look at the features of the included ncat - its netcat on steroids. 2. OpenVAS - open source vulnerability scanning suite that grew from a fork of the Nessus engine when it went commercial. Manage all aspects of a security vulnerability management system from web based dashboards. For a fast and easy external scan with OpenVAS try our online OpenVAS scanner. 3. OSSEC - host based intrusion detection system or HIDS, easy to setup and configure. OSSEC has far reaching benefits for both security and operations staff. 4. Security Onion - a network security monitoring distribution that can replace expensive commercial grey boxes with blinking lights. Security Onion is easy to setup and configure. With minimal effort you will start to detect security related events on your network. Detect everything from brute force scanning kids to those nasty APT's. 5. Metasploit Framework - test all aspects of your security with an offensive focus. Primarily a penetration testing tool, Metasploit has modules that not only include exploits but also scanning and auditing. 6. OpenSSH - secure all your traffic between two points by tunnelling insecure protocols through an SSH tunnel. Includes scp providing easy access to copy files securely. Can be used as poor mans VPN for Open Wireless Access points (airports, coffee shops). Tunnel back through your home computer and the traffic is then secured in transit. Access internal network services through SSH tunnels using only one point of access. From Windows, you will probably want to have putty as a client and winscp for copying files. Under Linux just use the command line ssh and scp. 7. Wireshark - view traffic in as much detail as you want. Use Wireshark to follow network streams and find problems. Tcpdump and Tshark are command line alternatives. Wireshark runs on Windows, Linux, FreeBSD or OSX based systems. 8. BackTrack - an Ubuntu based Linux distribution that is configured with hundreds of security testing tools and scripts. Backtrack is well known with penetration testers and hobbyists alike. 9. Nikto - a web server testing tool that has been kicking around for over 10 years. Nikto is great for firing at a web server to find known vulnerable scripts, configuration mistakes and related security problems. It won't find your XSS and SQL web application bugs, but it does find many things that other tools miss. To get started try the Nikto Tutorial or the online hosted version.

Chris D Hicks Director of IT MCSE, MCP + Internet Security MCP: 2175419 Since 2000