Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber Security Types of Threats How an attack happens

Similar presentations


Presentation on theme: "Cyber Security Types of Threats How an attack happens"— Presentation transcript:

1 Cyber Security Types of Threats How an attack happens
Protecting the Computer Protecting the Network Fun with Software

2 Pyramid of Pain Low Med High

3 Types of threats in 2010 MalWare (more on this later) Spam
Exploits (more on this later)

4 Spam Mostly e-mal based Annoying Sent mostly by Zombie networks
7.7 Trillion spams sent from Brazil in 2009

5 Autonomy of a hack Recon Recon Recon Gaining a foot hold
Extraction of information Getting Caught

6 Scary Fact Over 60% of those who are penetrated have it discovered by a 3rd party.

7 Protecting the Computer
Firewalls are your friend Passwords, your friend and comforter Encryption.. Behold the power of... Wireless Telnet... Let all read along.

8 Protecting your network
Firewalls, now with logging Proxy servers Labtop encryption Syslog Host Based intrusion detection (HIDS) SSH keys, SSL, X509, RSA, and others

9 Building A network The DMZ, not just for countries
If you lose the war, try proxy in reverse IF you = BIG network, segment :) Proxy, because known where your boss goes is fun Hardening Standards

10 Hardening Standars CIS (Center for internet security)Benchmarks
Many Operating systems and Applications

11 Fun with Software... Linux style
Snort Need a Firewall, have some old hardware? That syslog thing we were talking about... That HIDS thing again

12 Snort IDS software Custom rules, many different rule sets
Base = For more then 1 sensor See snort.org for more

13 Rsyslog Default Ubuntu Syslog system Avaliable for all Distros
Logs to SQL anyone? Go log surfing with the web Need alerts? Try logsurfer

14 Hids Aide Checksums System files, e-mails you results
Tripwire for the corporate types

15 Zenoss Monitors systems, lets you know when something goes down
Also great for trending, makes boss approved reports

16 Questions ????


Download ppt "Cyber Security Types of Threats How an attack happens"

Similar presentations


Ads by Google