Chapter 1 Introduction. Art of War  If you know the enemy and know yourself, you need not fear the result of a hundred battles.  If you know yourself.

Slides:



Advertisements
Similar presentations
What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory Professor Peter P. Swire George Washington.
Advertisements

Welcome Cyber Defense Bootcamp for High School Teacher
Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link.
Copyright © Houghton Mifflin Company. All rights reserved.Lecture Outlines, 8–1 “If you know neither yourself nor your enemy, you will succumb in every.
Network Security Policy Why do I need a network security policy? Dr. Charles T. Wunker.
Competitive Dynamics.
Microsoft Security Development Lifecycle for IT Rob Labbé Security Engagement Manager MSIT Infosec – ACE
Introduction to Ethical Hacking, Ethics, and Legality.
Kneeling to Victory. Three steps to gaining positive forward momentum in the spiritual life.
Global Forum V on Fighting Corruption and Safeguarding Integrity (GF V) 2-5 April, 07 Strengthening actions for effective implementation of anti-corruption.
Information Security in Mergers & Acquisitions. Introduction.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
IC322 Fall 2013 Cyber Ethics. Background World population: 7,000,000,000 (7 billion) humans 80,000,000 (80 million) added to population each year 1,600,000,000.
Forces that Have Brought the world to it’s knees over the centuries.
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Hands-On Ethical Hacking and Network Defense
Intro 1 Intro Intro 2 Counter Hack Chapters 1. Introduction --- explains why emphasis is on tools and techniques 2. Networking Overview --- we will cover.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
Footprinting Richard Newman “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the.
CIT 380: Securing Computer Systems Security Solutions.
Microsoft Australia Security Summit Rocky Heckman CISSP MVP Senior Consultant Security and Monitoring Readify.
Herradura, Costa Rica WELCOMES YOU TO. Reminders The 5 Laws that determine all of Life’s Outcomes Look for your transfer information RSPA Certification.
SORTING DATA VENN DIAGRAMS.
The “Word of God”. It is the only book that promises hope for humanity....
World Future Society Washington, DC Executive Office of the President of the United States: The Need for New Capabilities Lessons From Singapore and the.
“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself and not the enemy, for every victory.
Lesson 5 Knowing the Threat. Unauthorized use of Computer Systems 2000 CSI/FBI Survey Trend.
HACKER Someone who attempts to break into computer system. Typically, this kind of hacker would be a proficient programmer or engineer with sufficient.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—1-1 Building a Simple Network Securing the Network.
Ch2-1 Chapter 4: Competitor Analysis “What are they going to do?”
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
CC3020N Fundamentals of Security Management CC3020N Fundamentals of Security Management Lecture 2 Risk Identification and Risk Assessment.
Lecture 31 Risk Management. Introduction Information security departments are created primarily to manage IT risk Managing risk is one of the key responsibilities.
CJ416 Eric Salvador. Housekeeping Lets finish strong in Unit 9 discussions Alternative seminars Final submission of work – Tues. May 29 th at midnight.
Unit 9.  Lets finish strong in Unit 9 discussions  Alternative seminars  Final submission of work – Tuesday, October 9 th at midnight.
JMU GenCyber Boot Camp Summer, Welcome Cyber Defense Boot camp for High School Teachers Cyber Defense Lab (ISAT/CS Room 140) Department of Computer.
Best Practices to Prevent Internet Fraud Presented by: Ori Eisen Founder & Chief Innovation Officer.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Chinese Hackers Tyler McGough & Douglas Edmonson.
Mapping web applications Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
INFRASTRUCTURE SELF-ASSESSMENT (ISA) For public and private stakeholders Chad Fullmer Critical Infrastructure Protection (CIP) Office: (907)
1 Figure 11-7: Mobilizing Users User Training  Security Awareness  Accountability Training  Self-Defense Training Social engineering threats and correct.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Sun Tzu. Introduction Sun Tzu was a military strategist best known for his masterpiece, The Art of War. The Art of War was praised by past and current.
Cyber Security – Anatomy of a Hack
Ethical #Hacking. Ethical Hacking !! Content !! * Overview of Ethical Hacking * Prospectus of Ethical Hacking * Evaluation of Ethical Hacking * Training.
Competitive Dynamics In the Marketplace EMBA Class of 2017.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
JMU GenCyber Boot Camp Summer, 2016
Unit 1: Marketing Competitor analysis 05/02/2018.
Risk management «Once we know our weaknesses, they cease to do us any harm.» G.C. Lichtenberg.
Seminar On Ethical Hacking Submitted To: Submitted By:
Presented by : - Ankit kumar Mishra Rohit gir
Know Your Enemy 1 Peter 5:5-9.
The Psychology of Hackers: Steps Toward a New Taxonomy
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Steven Hartman State Information Security Officer State of Nebraska
Risk Management: Principles of risk, Types of risk and Risk strategies
Understanding your enemy!
Edvinas Pranculis MM, CISA, CISM
Chapter 1: Introduction
إدارة مصادر المعلومات جرائم الحاسب ومبادئ الأمن للعاملين في نظم المعلومات إعداد الطالبة: غادة فوزي مطر إشراف أ. محمود رفيق الفرا
Game Planning If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every.
IS Risk Management Framework Overview
Cybersecurity considerations at the Strategic Systems Level
“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory.
Presentation transcript:

Chapter 1 Introduction

Art of War  If you know the enemy and know yourself, you need not fear the result of a hundred battles.  If you know yourself but not the enemy, for every victory gained you will also suffer a defeat.  If you know neither the enemy nor yourself, you will succumb in every battle –Sun Tzu, Art of War

Inside &Outside Threats  The competition  Hacktivists  Organized crime  Terrorists  Governments  Hired Guns  Disgruntled Employees  Customers  Suppliers  Vendors  Business Parters  Contracters  Temps  Consultants

Attacker Skill Levels  Script Kiddies  Click Kiddies  Moderately skilled attackers  Elite Attackers

Attackers vs Defenders  Hackers  Crackers  White Hats  Black Hats

Common Phases of an Attack  Phase 1:Reconnaissance  Phase 2:Scanning  Phase 3: Gaining Access  Phase 4: Maintaining Access  Phase 5: Covering Tracks