Cyber Security Types of Threats How an attack happens

Slides:



Advertisements
Similar presentations
Intrusion Detection/Prevention Systems Charles Poff Bearing Point.
Advertisements

HONEYPOTS Mathew Benwell, Sunee Holland, Grant Pannell.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Network Security and Audits LITN Fall Conference 2006 Presented by Katie Givens Mosaic.
Web Server Administration TEC 236 Securing the Web Environment.
Security+ Guide to Network Security Fundamentals
Jonas Lippuner. Overview IPCop  Introduction  Network Structure  Services  Addons Installing IPCop on a SD card  Hardware  Installation.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
Threats to I.T Internet security By Cameron Mundy.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Intrusion Detection Systems Austen Hayes Cameron Hinkel.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Software Security Testing Vinay Srinivasan cell:
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Network Security Part III: Security Appliances Firewalls.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
HONEYPOTS An Intrusion Detection System. Index Intrusion Detection System Host bases Intrusion Detection System Network Based Intrusion Detection System.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Network Security SUBMITTED BY:- HARENDRA KUMAR IT-3 RD YR. 1.
Network System Security - Task 2. Russell Johnston.
OSSEC HIDS ● Jonathan Schipp ● Dubois County Linux User Group ● Sept 4 th, 2011 ● jonschipp (at) gmail.com.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Securing Information Systems
CompTIA Security+ Study Guide (SY0-401)
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Risk management.
Top 5 Open Source Firewall Software for Linux User
Working at a Small-to-Medium Business or ISP – Chapter 8
The Linux Operating System
Secure Software Confidentiality Integrity Data Security Authentication
EN Lecture Notes Spring 2016
Chris D Hicks Director of IT MCSE, MCP + Internet Security
E-commerce companies Here the focus is on the different business models for selling online: Business-to-consumer (B2C): when a company sells to an individual;
Wireless Network Security
Rules of Thumb to Mathematical Rule- A Cyber Security Journey
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Chapter 11 crime and security in the networked economy
Security of a Local Area Network
CompTIA Security+ Study Guide (SY0-401)
CANVAS Report for CTF Event at USAFA on 4/25/2007
NETWORK SECURITY LAB Lab 9. IDS and IPS.
CompTIA Security+ Study Guide (SY0-501)
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
LINUX SECURITY Dongmei Wu ID: /25/00.
Intrusion Detection Systems (IDS)
ISMS Information Security Management System
Figure 1-7: Eavesdropping on a Dialog
Intrusion detection systems?
Firewalls and Security
Encryption and Hacking
Implementing Client Security on Windows 2000 and Windows XP Level 150
Network hardening Chapter 14.
Test 3 review FTP & Cybersecurity
In the attack index…what number is your Company?
Presentation transcript:

Cyber Security Types of Threats How an attack happens Protecting the Computer Protecting the Network Fun with Software

Pyramid of Pain Low Med High

Types of threats in 2010 MalWare (more on this later) Spam Exploits (more on this later)

Spam Mostly e-mal based Annoying Sent mostly by Zombie networks 7.7 Trillion spams sent from Brazil in 2009

Autonomy of a hack Recon Recon Recon Gaining a foot hold Extraction of information Getting Caught

Scary Fact Over 60% of those who are penetrated have it discovered by a 3rd party.

Protecting the Computer Firewalls are your friend Passwords, your friend and comforter Encryption.. Behold the power of... Wireless Telnet... Let all read along.

Protecting your network Firewalls, now with logging Proxy servers Labtop encryption Syslog Host Based intrusion detection (HIDS) SSH keys, SSL, X509, RSA, and others

Building A network The DMZ, not just for countries If you lose the war, try proxy in reverse IF you = BIG network, segment :) Proxy, because known where your boss goes is fun Hardening Standards

Hardening Standars CIS (Center for internet security)Benchmarks Many Operating systems and Applications

Fun with Software... Linux style Snort Need a Firewall, have some old hardware? That syslog thing we were talking about... That HIDS thing again

Snort IDS software Custom rules, many different rule sets Base = For more then 1 sensor See snort.org for more

Rsyslog Default Ubuntu Syslog system Avaliable for all Distros Logs to SQL anyone? Go log surfing with the web Need alerts? Try logsurfer

Hids Aide Checksums System files, e-mails you results Tripwire for the corporate types

Zenoss Monitors systems, lets you know when something goes down Also great for trending, makes boss approved reports

Questions ???? ckrieger@tcgmi.com