Anonymous ACG 6415 Conley, Justin Glenn, Cassady Zhang, Fan.

Slides:



Advertisements
Similar presentations
PROFESSIONAL ASSOCIATIONS: WHY PARTICIPATE? Presenter Name Company IIA Chapter/Institute.
Advertisements

Challenges of freedom of speech online Andrej Petrovski, SHARE Defence BalCCon 2k14.
Jinhyun CHO Senior Researcher Korea Internet and Security Agency.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
1 Sarbanes-Oxley Section 404 June 29,  SOX 404 Background 3  SOX 404 Goals 4  SOX 404 Requirements 5  SOX 404 Assertions 6  SOX 404 Compliance.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
1 Sarbanes-Oxley IT Audits. 2 Sarbanes-Oxley 2002 Recommended “audit firms place a high priority on enhancing the overall effectiveness of auditors’ work.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Application Security Chapter 8 Copyright Pearson Prentice Hall 2013.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Network security policy: best practices
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Cracking down on international cyberterrorism
Privacy and Security Risks in Higher Education
Special Anatomy of an Attack Or Layered Security Failure.
Internet Safety Part II CyberBullying. Judson Independent School District … strives to provide a safe, positive learning environment for students in our.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
7 IPv6: transition and security challenges Selected Topics in Information Security – Bazara Barry.
Alabama Supercomputer Authority A partnership of … and.
Study Results Advanced Persistent Threat Awareness.
報告者:劉旭哲 Anonymous: We didn't hack PlayStation Network.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
Agenda Review route summarization Cisco acquire Sourcefire Review Final Exam.
Implementation Issues of Sarbanes-Oxley CASE Presentation September 23, 2004 By Denise Farnan.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Public Company Accounting Oversight Board
Finding and Applying for Jobs. Sources of Job leads 1.Networking 2.Professional and Trade Organizations 3.Job/Career Fairs.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
Michael McDonnell GIAC Certified Intrusion Analyst Creative Commons License: You are free to share and remix but you must provide.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
In the Crossfire International Cooperation and Computer Crime Stewart Baker.
 Anonymous is a loosely knit internet activist group mainly focusing on standing up against internet censorship.  The group is completely democratic,
PREPARED BY: SHOUA VANG ABHINAV JUWA CHASE PAUL EASy Security Project Anonymous vs HBGary Inc.
IS Network and Telecommunications Risks Chapter Six.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
The Security Circus.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Network Security. Announcements Review Assignment - Assessment 3 (due Tuesday, before class) Assessment 3 – Next Thursday Reminders: Network Design Project.
The Security Circus MPICT Summer Conference, June, 2011.
Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
Information Security: Current Threats Marc Scarborough Information Security Officer
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
MIS323 – Business Telecommunications Chapter 10 Security.
Garda Bureau of Fraud Investigation Computer Crime Investigation Unit Sgt Paul Johnstone LLB MLitt An Garda Síochána Cybercrime and Cyber Risks Credit.
IS3220 Information Technology Infrastructure Security
National Citizen Service Community Management Protocol Version 4 – July 2012.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
Network Security Analysis Name : Waleed Al-Rumaih ID :
What is the CYBERSECURITY plan for tomorrow?
Who should be responsible for risks to basic Internet infrastructure?
Securing Information Systems
Cyber Security Case Study 2011 Playstation Network Hack
Red Flags Rule An Introduction County College of Morris
Religious Freedom: It’s Freedom to Think for Yourself
Should Schools Be Allowed to Limit Students’ Online Speech?
Access Control and Site Security
TALKING POINTS Introduce yourself
Anatomy of a Common Cyber Attack
Presentation transcript:

Anonymous ACG 6415 Conley, Justin Glenn, Cassady Zhang, Fan

History Concepts  In its early form, the concept had been adopted by a decentralized online community acting anonymously in a synchronized manner, usually in the direction of a loosely group-chosen goal, but the primary focus was to entertain them.  Began in 2008 as a decentralized network of individuals, and became focused on promoting access to information, free speech, and transparency.

History Membership  if you identify with or say you are Anonymous, you are Anonymous and no one has the authority to say you are not except yourself.

History Activities in 2012  Anti-ACTA activism in Europe Jan. 21st, a series of DDoS attacks on Polish government websites took place.

 Syrian Government Hack Feb. 6th, Anonymous broke into the mail server of the Syrian Ministry of Presidential Affairs, accessing some 78 inboxes of Bashar al-Assad's staffers.  AntiSec Leak and CIA Attack. Feb. 10th, Anonymous claimed responsibility for taking down the Central Intelligence Agency's website for more than 5 hours.

 AIPAC Attack March 4 th, Anonymous took down the American Israel Public Affairs Committee website.  Vatican website DDoS Attacks March 12 th, Anonymous took down the Vatican’s website

History Reactions from the Society  Media: Reports  People: Comments  Law enforcement: Arrest

History Habbo Hotel Attack  African-American, grey suits, afros  “Closed due to AIDS”  Claimed Habbo was racist 11/25/2015

History Project Chanology  Church interviews Tom Cruise  Copyright violation claim  DoS attacks, prank calls, worldwide protest 11/25/2015

History Epilepsy Foundation Attack  Posted flash videos  Evidence points to Anonymous  Anonymous says it was Church of Scientology 11/25/2015

History HB Gary Federal Hack  Aaron Barr announces infiltration of Anonymous  Anonymous hacks:  Website  & Phone System  Twitter  Greg Hoglund fires back 11/25/2015

History Operation Payback (#opsony)  George Hotz and Alexander Egorenov  Breach of freedom of speech  Took down PS Network and related sites  Personal action against employees and families 11/25/2015

Controls  Main attacks are SQL injections and distributed denial of service attacks.  Hardening applications to prevent SQL injections.  Public key authentication

Controls  Routers and firewalls should be configured to stop invalid IP addresses and filter out protocols that are not needed  Intrusion detection/prevention system  Incident plan  Multi-cast Source Delivery Protocol or anycast.  Specialty security company

Controls  DDOS attacks are hard to stop and prevent  A large enough attack will take down a website no matter how much security is in place

Sarbanes-Oxley  Section 302 – Financial statements and internal controls surrounding them must be certified.  Section Effectiveness of its internal controls must be assessed and reported annually to the SEC.  PCAOB - IT controls should only be part of the SOX 404 assessment to the extent that specific financial risks are addressed

Sarbanes-Oxley  Security is not patched or updated  Relevance of IT to financial statements