Download presentation
Presentation is loading. Please wait.
Published byAgnes Fields Modified over 9 years ago
1
SIM 302
9
Unprepared UninformedUnaware Untrained Unused
10
Source: Dreamtime
12
DroidDream malware iPhone/Privacy
17
Gatherer/hunter Learn Communicate Socio interactivity Socio isolation Loss of information control
22
Virtual business services of all sorts, accounting, payroll, and even sales would come to a halt, as would many companies
23
$1.5 to $2 billion $80 to $120 million What does a stealth bomber cost? What does a stealth fighter cost? $1 to $2 million What does an cruise missile cost? $300 to $50,000 What does a cyber weapon cost?
24
Nuclear Weapons Facility Cyber Weapons Facility Where’s the Cyber Weapons Facility?
40
Step 1 Reconnaissance Step 1 Reconnaissance Step 2 Initial intrusion into the network Step 2 Initial intrusion into the network Step 3 Establish a backdoor into the network Step 3 Establish a backdoor into the network Step 4 Obtain user credentials Step 4 Obtain user credentials Step 5 Install various utilities Step 5 Install various utilities Step 6 Privilege escalation /lateral movement /data exfiltration Step 6 Privilege escalation /lateral movement /data exfiltration Step 7 Maintain persistence Step 7 Maintain persistence
50
http://googleblog.blogspot.com/2010/01/new-approach-to-china.html
51
Thanks to Dreamtime
53
Thanks to BBC.co.uk
55
demo
61
Security Management Threat and Vulnerability Management, Monitoring and Response Edge Routers, Firewalls, Intrusion Detection, Vulnerability Scanning Network Perimeter Dual-factor Authorization, Intrusion Detection, Vulnerability Scanning Internal Network Access Control and Monitoring, Anti-Malware, Patch and Configuration Management Host Secure Engineering (SDL), Access Control and Monitoring, Anti-Malware Application Access Control and Monitoring, File/Data Integrity Data User Account Management, Training and Awareness, Screening Facility Physical Controls, Video Surveillance, Access Control Strategy: Employ a risk-based, multi-dimensional approach to safeguarding services and data
63
Required Slide Speakers, please list the Breakout Sessions, Interactive Discussions, Labs, Demo Stations and Certification Exam that relate to your session. Also indicate when they can find you staffing in the TLC.
66
www.microsoft.com/teched Sessions On-Demand & CommunityMicrosoft Certification & Training Resources Resources for IT ProfessionalsResources for Developers www.microsoft.com/learning http://microsoft.com/technet http://microsoft.com/msdn http://northamerica.msteched.com Connect. Share. Discuss.
68
Scan the Tag to evaluate this session now on myTechEd Mobile
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.