Internet Service Provider Attack Scenario

Slides:



Advertisements
Similar presentations
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Advertisements

4/14/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
1 Telstra in Confidence Managing Security for our Mobile Technology.
System and Network Security Practices COEN 351 E-Commerce Security.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Enterprise Network Security Accessing the WAN – Chapter 4.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Software Security Testing Vinay Srinivasan cell:
Michael McDonnell GIAC Certified Intrusion Analyst Creative Commons License: You are free to share and remix but you must provide.
Before: Servers Behind Firewalls Today: Servers Migrate Out Business drivers: E-Business Supply chain management CRM.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Maritime Cyber Vulnerabilities in the Energy Sector Center for Joint Operations of the Sea ODU Maritime Institute Students Crow, Fresco, Lee.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
IT-320 Chapter 16 Network Security. Objectives 1. Define threat, vulnerability, and exploit, explaining how they relate to each other. 2. Given a scenario,
Security (Keep your site secure at extension level) Sergey Gorstka Fastw3b.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Enterprise Network Security Accessing the WAN – Chapter 4.
Module 11: Designing Security for Network Perimeters.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Application Security in a cyber security program
Introduction to Security Dr. John P. Abraham Professor UTPA.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
Aaron Corso COSC Spring What is LAMP?  A ‘solution stack’, or package of an OS and software consisting of:  Linux  Apache  MySQL  PHP.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Final Project: Advanced Security Blade IPS and DLP blades.
Information Technology Network and Security. Networking In the world of computers, networking is the practice of linking two or more computing devices.
 Abstract  Introduction  Literature Survey  Conclusion on Literature Survey  Threat model and system architecture  Proposed Work  Attack Scenarios.
Clouding with Microsoft Azure
Accelerating Your Journey to a Safe Cloud
Your Partner for Superior Cybersecurity
Final Project: Advanced security blade
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Firmware threat Dhaval Chauhan MIS 534.
| Data Connectors: Atlanta, GA
CompTIA Security+ SY0-401 Real Exam Question Answer
Enterprise Network Security
Secure Software Confidentiality Integrity Data Security Authentication
Chris D Hicks Director of IT MCSE, MCP + Internet Security
Intrusion Prevention Systems
Exam Review.
IT Vocab IT = information technology Server Client or host
ISMS Information Security Management System
Home Internet Vulnerabilities
Enterprise Network Security
الانترنت والبريد الإلكتروني
Intrusion Prevention Systems
Secure once, run anywhere Simplify your security with Sophos
How to Mitigate the Consequences What are the Countermeasures?
Unit 36: Internet Server Management
Cybersecurity Threat Assessment
Cyber security and Computer Misuse
Enterprise Network Security
Presentation transcript:

Internet Service Provider Attack Scenario MENOG 2018

About me Mohammad Reza Mostame Expert in information security Email: info@rnpg.ir

Internet Service Provider threats Service unavailability Data leakage Abuse of network resources Mohammad Reza Mostame – CTO of RNPG

Network access through web applications Web application vulnerability SQL Injection OS access Privilege escalation Layer 2 network attack Mohammad Reza Mostame – CTO of RNPG

Routers access method monitoring software vulnerabilities Routers vulnerabilities Routers misconfigurations Mohammad Reza Mostame – CTO of RNPG

Attack scenario against Internet Service Provider Getting access to the routers and hijack the network traffic Mohammad Reza Mostame – CTO of RNPG

Attack scenario against Internet Service Provider BGP hijack Mohammad Reza Mostame – CTO of RNPG

Attack scenario against Internet Service Provider Remote File Inclusion’s vulnerability leads to Firewall bypass Mohammad Reza Mostame – CTO of RNPG

Attack scenario against Internet Service Provider LDAP Injection attack Pass The Hash vulnerability Escalate privileges to the administrator in Active Directory Mohammad Reza Mostame – CTO of RNPG

How to secure the Internet Service Provider’s infrastructure! Mohammad Reza Mostame – CTO of RNPG

First: Identify threats Penetration testing can help us to find the threats. ISP’s threats divided into 4 sections Web application vulnerability and exploitation Misuse of Network resources Misuse of OS vulnerability Mobile applications threats Mohammad Reza Mostame – CTO of RNPG

Penetration testing benefits Preventing Information Loss Preventing Financial Loss Protect Your Brand in Market Essential part of compliance standards or certifications for your business Mohammad Reza Mostame – CTO of RNPG

Second: Secure your business Web application hardening Network hardening OS hardening DLP Mohammad Reza Mostame – CTO of RNPG

Web application hardening Runtime Application Self-Protection (RASP) Web Application Firewall (WAF) Secure Software Development Life Cycle (SDLC) Database Firewall (DBFW) Mohammad Reza Mostame – CTO of RNPG

Network hardening Service hardening Device hardening Intrusion Prevention System & Firewall Mohammad Reza Mostame – CTO of RNPG

OS hardening Application hardening Sandbox Vulnerability management Mandatory Access Control (SE Linux) Mohammad Reza Mostame – CTO of RNPG

Data Loss Prevention AD RMS (Active Directory Rights Management Services) Host Based DLP Network Based DLP Mohammad Reza Mostame – CTO of RNPG

Defense In Depth Mohammad Reza Mostame – CTO of RNPG

Questions and Answer Thanks http://rnpg.ir