Detection Detect the breach and protect the data. By,

Slides:



Advertisements
Similar presentations
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
Advertisements

Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Ch.5 It Security, Crime, Compliance, and Continuity
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Host Intrusion Prevention Systems & Beyond
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
SEC835 Database and Web application security Information Security Architecture.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
BUSINESS B1 Information Security.
The Changing World of Endpoint Protection
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Network security Product Group 2 McAfee Network Security Platform.
Cryptography and Network Security Sixth Edition by William Stallings.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Safe’n’Sec IT security solutions for enterprises of any size.
IS3220 Information Technology Infrastructure Security
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Cosc 5/4765 NAC Network Access Control. What is NAC? The core concept: –Who you are should govern what you’re allowed to do on the network. Authentication.
Introduction to Machine Learning, its potential usage in network area,
Is Endpoint security dead?
Protect your Digital Enterprise
Law Firm Data Security: What In-house Counsel Need to Know
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Deployment Planning Services
Threat Modeling for Cloud Computing
Understanding DATA LOSS PREVENTION
ISSeG Integrated Site Security for Grids WP2 - Methodology
(A CORPORATE NETWORK APPROACH)
Real-time protection for web sites and web apps against ATTACKS
Data Compromises: A Tax Practitioners “Nightmare”
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Evaluating a Real-time Anomaly-based IDS
Dr Paul Lewis Chief Technology Officer
Securing Information Systems
Forensics Week 11.
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Call AVG Antivirus Support | Fix Your PC
Valid And Updated CS0-001 Exam Certifications Dumps Questions
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Threat Landscape for Data Security
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
PROACTIVE SNOOPING ANALYSIS
Home Internet Vulnerabilities
Intrusion detection Lewis Knight.
12 STEPS TO A GDPR AWARE NETWORK
Intrusion Prevention Systems
Secure once, run anywhere Simplify your security with Sophos
Chapter 4: Protecting the Organization
How to Mitigate the Consequences What are the Countermeasures?
Faculty of Science IT Department By Raz Dara MA.
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
By: Dorian Lockhart Wilston Johnston
WJEC GCSE Computer Science
6. Application Software Security
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Houston Code Wars Bob Moore March 2, 2019 WWAS 2019 | Confidential.
Presentation transcript:

Detection Detect the breach and protect the data. By, Kaushik Thallapally. STUDENT Computer Science Department. Concordia University Ann arbor. Professor DR. William Mcmillan.

What is Detection?

How to Detect the hack?

Old generation Detection Techniques: Intrusion Detection System An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any detected activity or violation is typically reported either to an administrator. Security Information and Event management. security information and event management (SIEM) software products and services combine security information management (SIM) and security event management(SEM). They provide real-time analysis of security alerts generated by applications and network hardware.

Why IDS and SIEM Not so Effective?

Data Breaches: What is Data Breach? A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve personal health information(PHI), personally identifiable information (PII), trade secrets or intellectual property. The most common concept of a data breach is an attacker hacking into a corporate network to steal sensitive data. 

Prominent Data Breaches: Ameriprise solution stolen laptop(2005). Department of veteran Affairs(2006). GE Money and General Electric (2008). Play station Data Breach(2011). Citi group Data Breach(2011). Adobe Systems (2013). Apple iCloud Data breach(2014). Equifax Data breach(2017). Military Documents of USA and South Korea(2017).

How to Protect Sensitive data?

Breach Detection Breach detection systems (BDS) are a category of applications and security devices designed to detect the activity of malware inside a network after a breach has occurred. BDS has 3 different deployment methods: Out-of band systems scan data mirrored from port scans from a switch or network tap. In-line systems are deployed between the network and WAN interface just like tier 1 firewalls and intrusion prevention systems. Endpoint deployments that use a client installed on endpoint machines.

What’s Next? Behavioral Focus. Improved threat intelligence. Better analytics capabilities. Automated detection and response. Longer Data Retention and historical Forensics.

Deploying Machine Learning and Deep Learning Algorithms in Detection and Prevention:

Machine Learning in Data Security: Machine is a science of designing and applying algorithms that are able to learn things from past cases. It uses complex algorithms that iterate over large data sets and analyze the patterns in data. Machine Learning converts data intensive and confusing information into a simple format that suggests actions to decision makers. A user further trains the ML system by continually adding data and experience. Thus at its core, machine learning is a 3-part cycle i.e. Train-Test-Predict. Optimizing the cycle can make predictions more accurate and relevant to the specific use-case.

Empowering People About Detection of security attack:

Empowering People About Detection of security attack: Each person in an organization plays a key role in helping to ward off a potential data breach.  Conversely, IT’s job is to educate and equip employees through cybersecurity awareness training, including internal tests like phishing training, targeted attacks and even social engineering to make sure employees understand the various methods hackers will use to gain entry to the enterprise.  The beauty of this is that identity governance gives us the power to do it, while keeping our data safely in our hands.

Any Questions?

References: “Data Breach” http://searchsecurity.techtarget.com/definition/data-breach. “Detection Technologies” http://www.data- technologies.com/about.html. Jonathon Ng, Deepti Joshi, Shankar M. Banik, "Applying Data Mining Techniques to Intrusion Detection", 2015 12th International Conference on Information Technology - New Generations (ITNG), vol. 00, no. , pp. 800-801, 2015, doi:10.1109/ITNG.2015.146 Fu Zhu, Amr Youssef, Walaa Hamouda, "Detection techniques for data-level spoofing in GPS-based phasor measurement units", 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT), vol. 00, no. , pp. 1-8, 2016, doi:10.1109/MoWNet.2016.7496634

Thank You. Kaushik Thallapally. Concordia University Ann Arbor.