Chris Romano Andrew Shepardson IA 456

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
PhoenixPro Procurement. technology. contracts. projects.
Institutional Insurance: Creating a Comprehensive Campus-wide IT Security Risk Management Program Brian Davis IT Security & Policy Office of Information.
Protection of Information Assets I. Joko Dewanto 1.
SECURITY EVALUATION OF AN ORGANIZATION TA Md Morshedul Islam.
Penetration Testing Anand Sudula, CISA,CISSP SSA Global Technologies, India Anand Sudula, CISA,CISSP SSA Global Technologies, India.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Increase Information Assurance Awareness through Secure Operations/Management Training and Certification Percent Trained & Certified Goal = 100% Percentage.
August 9, 2005UCCSC Converting Policy to Reality Building Campus Security Programs Karl Heins -- Director of IT Audit Services Office of the University.
Vulnerability Assessment & Penetration Testing By: Michael Lassiter Jr.
Security Posture Assessment (SPA) Headquarters: Ofisgate Sdn Bhd ( A), 2-15 Jalan Jalil Perkasa 13 Aked Esplanad, Bukit Jalil, Kuala Lumpur,
Vulnerability Assessment Course Terms, Methodology, Preparation, Obstacles, and Pitfalls.
VULNERABILITY MANAGEMENT Moving Away from the Compliance Checkbox Towards Continuous Discovery.
Introduction to Network Defense
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
Performing a Penetration Test.  Penetration Tester  Attempts to reveal potential consequences of a real attack  Security Audit / Vulnerability Assessment.
CMGT400 Intro to Information Assurance and Security (University of Phoenix) Lecture, Week 4 Tom Olzak, MBA, CISSP.
 Jonathan Trull, Deputy State Auditor, Colorado Office of the State Auditor  Travis Schack, Colorado’s Information Security Officer  Chris Ingram,
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
Information Systems Security Computer System Life Cycle Security.
N-Wave Shareholders Meeting May 23, 2012 N-Wave Security Update Lisa
CMGT400 Intro to Information Assurance and Security (University of Phoenix) Lecture, Week 5 Tom Olzak, MBA, CISSP.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Chapter 6 of the Executive Guide manual Technology.
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
VULNERABILITY ASSESSMENT FOR THE POLICE DEPARTMENT’S NETWORK.
Copyright Security-Assessment.com 2004 Vulnerability Management Explained By Peter Benson.
IS Network and Telecommunications Risks Chapter Six.
CSCE 522 Secure Software Development Best Practices.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
HIPAA Security A Quantitative and Qualitative Risk Assessment Rosemary B. Abell Director, National Healthcare Vertical Keane, Inc. HIPAA Summit VII September.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Scott Charney Cybercrime and Risk Management PwC.
CSCE 548 Secure Software Development Security Operations.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
CSCE 201 Secure Software Development Best Practices.
Conduct A Strong Evaluation Soar to New Heights! 2013 National Equipment Finance Summit, Albuquerque, NM.
SecSDLC Chapter 2.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Collaboration Process 1. IC Objectives and Risk Tolerances Define, document, and implement top-down internal control objectives and risk tolerances: 
Tuesday March 15, 2016 Session 19-D Technology Forum David Finkelstein, CIO RiverSpring Health.
Vulnerability Analysis Dr. X. Computer system Design Implementation Maintenance Operation.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
CSCE 548 Secure Software Development Penetration Testing.
Snowfensive At Snowfensive.com, we provide specialized cyber security risk assessments for organizations. We also give security awareness training for.
Defining your requirements for a successful security (and compliance
Penetration Testing in Financial Institutions
Team 1 – Incident Response
Patch Management Patch Management Best Practices
Security Testing Methods
Security Standard: “reasonable security”
Unauthorized Access Risk Mitigation Techniques
John Butters Running Tiger Teams
Everything You Need To Know About Penetration Testing.
Intercept X for Server Early Access Program Sophos Tester
Skybox Cyber Security Best Practices
Security Essentials for Small Businesses
Security Consulting and Strategic Research
Cyber Risk & Cyber Insurance - Overview
EMS DoD Instruction Overview
IS Risk Management Report (Template)
HIPAA Security A Quantitative and Qualitative Risk Assessment
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Cyber Security in a Risk Management Framework
Presentation transcript:

Chris Romano Andrew Shepardson IA 456 Penetration Tests Chris Romano Andrew Shepardson IA 456

Pen-Test?

Vulnerability Assessment == Find Differences Vulnerability Assessment == Find  Penetration Test == Exploit  https://www.youtube.com/watch?v=4gYYVghLVEY

Pen-Test? Evaluating a system’s security infrastructure by trying to exploit vulnerabilities A set goal to be reached  Started by the DoD in mid-1960’s One component of a full security audit

Do I need a Pen-Test? Find entry points before an attacker does Test development environments Compliance

What’s Vulnerable?

Everything https://www.youtube.com/watch?v=_MMAK-dJm1o

The Steps Obtain information Conduct Identify & Confirm Address Exposures

Types of Pen Tests External: outside attacker Internal: inside attacker Blind: tester only given name of organization Double Blind: 1-2 individuals aware of testing Targeted: tester + security team work together

Should I be assessed? Avoid Breaches Compliance Improve policies

Testing Tools

Scanning Tools

Basic Pen Testing Example https://www.youtube.com/watch?v=YIV0xvatX0M

How to get involved https://www.youtube.com/watch?v=q8JB-ausv2o