FORESEC Academy FORESEC Academy Security Essentials (II)

Slides:



Advertisements
Similar presentations
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Advertisements

Chapter 1.  Security Problem  Virus and Worms  Intruders  Types of Attack  Avenues of Attack 2 Prepared by Mohammed Saher Hasan.
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
HALDEBIQUE Geoffroy ROYER Johan  Crime motivated attacks  Hacktivism  Cyber Warfare.
AVG- Protecting those who are vulnerable.  Free Anti-Virus Software ◦ J.R. Smith President of AVG oversees a lineup of antivirus products used by 110.
Managing A Secure Infrastructure – Tales From the Trenches November 6, 2003.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Hands-On Ethical Hacking and Network Defense
Copyright Security-Assessment.com 2005 From The Trenches (Australia) What We Are Seeing Within Security Today by Peter Benson.
Safe Information By Eli Salazar. The Government The Internet A strategic way to communicate top secret plans. The government used Internet for its safety.
Copyright Security-Assessment.com 2005 From The Trenches What we are seeing within security today by Nick von Dadelszen.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
Threats and Attacks Principles of Information Security, 2nd Edition
Comp 8130 Presentation Security Testing Group Members: U Hui Chen U Ming Chen U Xiaobin Wang.
K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
APA of Isfahan University of Technology In the name of God.
Instilling rigor and imagination in analysis Countering the Iranian Nuclear Threat Stuxnet and its Broader Implications Randolph H. Pherson Mary C. Boardman.
Viruses.
CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT.
Natick Public Schools Technology Presentation February 6, 2006 Dennis Roche, CISA Director of Technology.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
1 Korea’s Approach to Network Security 21 May 2002 Cha, Yang-Shin Ministry of Information and Communication.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Information Warfare Playgrounds to Battlegrounds.
Viruses Articles Article 1 - Computer virus hits second energy firm Article 2 - Online bank robbers face.
Security at NCAR David Mitchell February 20th, 2007.
Presidential Election of 2000 Kaitlyn Shoemaker Vanessa Hinojosa.
SAS ‘05 Reducing Software Security Risk through an Integrated Approach David P. Gilliam, John D. Powell Jet Propulsion Laboratory, California Institute.
Update on State of Connecticut Year 2000 Activities Peter Sullivan Year 2000 Program Office Director Department of Information Technology State of Connecticut.
Virus Hits Wikipedia The virus writers created a page on the German Wikipedia that linked to a fake fix for a new version of an old malicious Windows worm.
Geopolitical Energy Hotspots ‘Geopolitics’ is the study of the ways in which political decisions and processes affect the way resources and space are used.
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Hurdles in implementation of cyber security in India.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Infrastructure Protection
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
Malicious Software.
Information Warfare Playgrounds to Battlegrounds.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
CONTROLLING INFORMATION SYSTEMS
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
 Samy (also known as JS.Spacehero)  XSS worm that was designed to propagate across the MySpace social-networking site. At the time of release, it.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
 Computer Network Attack  “… actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers.
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
October 28, 2015 Cyber Security Awareness Update.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Securing Information Systems
Cyber Security Zafar Sadik
What is the CYBERSECURITY plan for tomorrow?
The New Military-Industrial Complex?
Threats to computers Andrew Cormack UKERNA.
A Gift of Fire Third edition Sara Baase
Security Essentials for Small Businesses
Aim: What were the most significant accomplishments of the presidencies of George W. Bush and Barack Obama? January 20, 2001 – January 20, 2009 January.
George W. Bush Lecture 7.
Cybercrime and Canadian Businesses
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Laws Against Computer Hacking
Presentation transcript:

FORESEC Academy FORESEC Academy Security Essentials (II)

FORESEC Academy Information Warfare Tools  Perception management/social engineering  Malicious code  Virus Blitz  Predictable response

FORESEC Academy Could a Company be Destroyed? February 2002, following the attack, Cloud Nine’s management assessed the cost of attempting to improve the ISP’s security, and realized that they could not afford the extra investment required, and the loss of income while the work was carried out, said Miszti. They were forced to close, and sold their assets to fellow ISP ZetNet shortly after the attack. In 2002 ISPs themselves were vulnerable to DDOS attacks

FORESEC Academy Could the Presidency be Affected? Republican Web site hit by hacker, taken off-line By MARC L. SONGINI (November 07, 2000) A hacker crept into the Republican National Committee's Web site early this morning and planted a rambling tirade against Texas Gov. George W. Bush, forcing the site to be temporarily taken off-line on the day when voters are casting their ballots in the presidential election. How close was that election? What if it was well done?

FORESEC Academy Could Anyone be Killed? “almost anyone with a little technical savvy could break into the system and shut down radar at major air hubs around the nation.” Please take a minutes to read and consider the notes page

FORESEC Academy Could Currency be Destabilized? A band of 50 terrorists with $10 million or less could buy the training, computers and other tools needed to launch a cyberattack against a major bank or investments firm. even through secure phone lines, says Michael Erbschloe, a computer security consultant with Computer Economics. Please take a minute to read the notes page.

FORESEC Academy Could a City be Destroyed? The Russian Federal Security Service (FSB) department in Voronezh Region completed a hacking investigation, on October 18, against a programmer at a rocket plant who allegedly used malicious code to gain unauthorized access to online systems and communications with other space industry companies. Think about satellite with nuclear propulsion!

FORESEC Academy Y2K Fever  Large investment in corrections in the USA  What about patching mission critical systems?  In the end, low impact, the reality perception gap  The rush to y2k certify was a predictable response

FORESEC Academy Y2K Fixes a Year Later  Many organizations did not have programming staff to accomplish Y2K fixes  They used contractors that used off shore contractors  NIPC published an article warning about malicious code. try finding it now!

FORESEC Academy Terrorism and Economic Warfare (The business of terrorism)

FORESEC Academy Information Warfare Theory  Asymmetry  Indications and Warning  Players and roles  Measures of effectiveness  Cycle time

FORESEC Academy Code Red Worm July 2001 #Probes#UniqueSRC IP 07/ / / / / / / * As of 1200 EDT Ken Eichman cas.org