0wn1ng the Enterprise 2.0

Size: px
Start display at page:

Download "0wn1ng the Enterprise 2.0"

Transcription

1 0wn1ng the Enterprise 2.0 relatore: Igor Falcomatà nuove tipologie di attacco alle reti aziendali nell'epoca dei social network e del web 2.0 Broadband Business Forum 25 nov 09 - Roma free advertising > 0wn1ng the Enterprise 2.0 Broadband Business Forum 25 nov 09 Roma Igor Falcomatà alcuni diritti riservati: - Pagina 1

2 about: aka koba attività professionale: analisi delle vulnerabilità e penetration testing security consulting formazione altro: sikurezza.org (Er bz)lug Relatore: Igor Falcomatà Chief Technical Officer Igor Falcomatà alcuni diritti riservati: - Pagina 2

3 0wn1ng the Enterprise 1.0 in una Internet remota, molti anni fa.. terminale wan router terminale Igor Falcomatà alcuni diritti riservati: - Pagina 3

4 Discovery... 0wn1ng the Enterprise 1.0 Mr. Malicious 1.0 terminale wan router terminale Igor Falcomatà alcuni diritti riservati: - Pagina 4

5 Discovery... 0wn1ng the Enterprise 1.0 Mr. Malicious 1.0 terminale wan router terminale Igor Falcomatà alcuni diritti riservati: - Pagina 5

6 Discovery... 0wn1ng the Enterprise 1.0 Mr. Malicious 1.0 terminale wan router terminale Igor Falcomatà alcuni diritti riservati: - Pagina 6

7 Exploiting... 0wn1ng the Enterprise 1.0 Mr. Malicious 1.0 terminale wan router terminale Igor Falcomatà alcuni diritti riservati: - Pagina 7

8 Exploiting... 0wn1ng the Enterprise 1.0 Mr. Malicious 1.0 terminale wan router terminale Igor Falcomatà alcuni diritti riservati: - Pagina 8

9 0wn1ng the Enterprise 1.5 web applications, WiFi, VPNs,... firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 9

10 0wn1ng the Enterprise 1.5 web applications, WiFi, VPNs,... firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 10

11 Discovery... 0wn1ng the Enterprise 1.5 Mr. Malicious 1.5 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 11

12 Discovery... 0wn1ng the Enterprise 1.5 Mr. Malicious 1.5 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 12

13 Discovery... 0wn1ng the Enterprise 1.5 Mr. Malicious 1.5 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 13

14 Exploiting... 0wn1ng the Enterprise Mr. Malicious 1.5 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 14

15 Exploiting... 0wn1ng the Enterprise Mr. Malicious 1.5 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 15

16 0wn1ng the Enterprise 2.0 0wn1ng the Enterprise 2.0 Mr. Malicious 2.0 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 16

17 Discovery... see mom.. no direct traffic.. Mr. Malicious 2.0 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 17

18 Discovery... 0wn1ng the Enterprise 2.0 Mr. Malicious 2.0 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 18

19 Exploiting... 0wn1ng the Enterprise 2.0 3rd party Mr. Malicious 2.0 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 19

20 Exploiting... 0wn1ng the Enterprise 2.0 3rd party Mr. Malicious 2.0 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 20

21 Social engineering 2.0 img src: 3rd party Mr. Malicious 2.0 vittima Hey, sono Bill, il collega di Canicattì... ti ricordi? Hey Bill.. come va? sei ancora al marketing?... Igor Falcomatà alcuni diritti riservati: - Pagina 21

22 Phishing...non solo verso siti di banking 3rd party Mr. Malicious 2.0 vittima Igor Falcomatà alcuni diritti riservati: - Pagina 22

23 Tinyurl & co....come offuscare un link con un semplice click 3rd party Mr. Malicious 2.0 vittima Igor Falcomatà alcuni diritti riservati: - Pagina 23

24 un semplice XSS? 3rd party Mr. Malicious 2.0 vittima Igor Falcomatà alcuni diritti riservati: - Pagina 24

25 xss-proxy 3rd party Mr. Malicious 2.0 vittima Igor Falcomatà alcuni diritti riservati: - Pagina 25

26 xss shell 3rd party Mr. Malicious 2.0 vittima Igor Falcomatà alcuni diritti riservati: - Pagina 26

27 Exploiting... the good ol'way.. 3rd party Mr. Malicious 2.0 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 27

28 Exploiting... messenger/browser/clients 0 days.. 3rd party Mr. Malicious 2.0 vittima Igor Falcomatà alcuni diritti riservati: - Pagina 28

29 Command & Conquer Welcome, master! 3rd party Mr. Malicious 2.0 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 29

30 Command & Conquer 3rd party Mr. Malicious 2.0 firewall access point VPN gw Igor Falcomatà alcuni diritti riservati: - Pagina 30

31 0wn1ng the Enterprise 2.0 relatore: Igor Falcomatà grazie Broadband Business Forum 25 nov 09 - Roma free advertising > 0wn1ng the Enterprise 2.0 Broadband Business Forum 25 nov 09 Roma Igor Falcomatà alcuni diritti riservati: - Pagina 31

The Hacker's Corner. Privacy e sicurezza.. ..per giornalisti in rete. Igor Falcomatà koba@sikurezza.org

The Hacker's Corner. Privacy e sicurezza.. ..per giornalisti in rete. Igor Falcomatà koba@sikurezza.org The Hacker's Corner International Journalism Festival Perugia 2 maggio 2014 Privacy e sicurezza....per giornalisti in rete Igor Falcomatà koba@sikurezza.org Sempre più spesso emerge come i giornalisti

More information

Android e mobile security (for developers)

Android e mobile security (for developers) Android e mobile security (for developers) Igor Falcomatà CTO, Enforcer ifalcomata@enforcer.it -Italy Day2012 Rome, 23 November 2012 Copyright 2008 - The Foundation Permission is granted to copy, distribute

More information

(GNU/Linux) Host Intrusion Detection

(GNU/Linux) Host Intrusion Detection (GNU/Linux) Host Intrusion Detection breve panoramica sulle tecnologie e gli strumenti di host intrusion detection, exploit mitigation e analisi dei log su piattaforma GNU/Linux CLUSIT Security Summit

More information

Android e mobile security

Android e mobile security Android e mobile security relatore: Igor Falcomatà client side, server side, privacy do android malware writers dream of electric sheep? Linux Day 2012 Firenze free advertising > Android e mobile security:

More information

Industrial Control Systems Security. Denny Gregianin_Sales Area Manager

Industrial Control Systems Security. Denny Gregianin_Sales Area Manager Industrial Control Systems Security Denny Gregianin_Sales Area Manager VEM in Numbers 5 29 170 800 495 5000 Dipendenti e Fatturato Design & Delivery NOC SOC HR & Quality Operations Custom Application Development

More information

SCADA / Smart Grid Security Who is really in control of our Control Systems?

SCADA / Smart Grid Security Who is really in control of our Control Systems? SCADA / Smart Grid Security Who is really in control of our Control Systems? Simone Riccetti Certified SCADA Security Architect Agenda Overview of Security landscape SCADA security problem How to protect

More information

Quick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support December 2011

Quick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support December 2011 Quick Note 026 Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server Digi International Technical Support December 2011 Contents 1 Introduction... 3 1.1 Outline... 3 1.2 Assumptions...

More information

INVESTIRE IN BORSA CON I TREND PDF

INVESTIRE IN BORSA CON I TREND PDF INVESTIRE IN BORSA CON I TREND PDF ==> Download: INVESTIRE IN BORSA CON I TREND PDF INVESTIRE IN BORSA CON I TREND PDF - Are you searching for Investire In Borsa Con I Trend Books? Now, you will be happy

More information

The New Luxury World: l identità digitale nel lusso fa la differenza

The New Luxury World: l identità digitale nel lusso fa la differenza The New Luxury World: l identità digitale nel lusso fa la differenza Massimo Fubini Founder & CEO di ContactLab 7 Luxury Summit, Il Sole 24ORE, 10 giugno 2015 It may not be modified, organized or reutilized

More information

The New Luxury World: l identità digitale nel lusso fa la differenza

The New Luxury World: l identità digitale nel lusso fa la differenza The New Luxury World: l identità digitale nel lusso fa la differenza Massimo Fubini Founder & CEO di ContactLab 7 Luxury Summit, Il Sole 24ORE, 10 giugno 2015 It may not be modified, organized or reutilized

More information

Presentation title here

Presentation title here Come abbattere il costo delle Presentation title here licenzesoracle Database ubtitle here Maurizio Priano Informatica Roma, 5 Novembre 2013 Problema: come

More information

Document No. FO1004 Issue Date: Draft: Work Group: FibreOP Technical Team July 23, 2013 Final: Single Static IP Customer Owned LAN Router Support

Document No. FO1004 Issue Date: Draft: Work Group: FibreOP Technical Team July 23, 2013 Final: Single Static IP Customer Owned LAN Router Support Document No. FO1004 Issue Date: Draft: Work Group: FibreOP Technical Team July 23, 2013 Final: Title: Single Static IP Customer Owned LAN Router Support Version 1.0 Summary: Use the following method to

More information

Source code security testing

Source code security testing Source code security testing Simone Riccetti EMEA PSS Security Services All information represents IBM's current intent, is subject to change or withdrawal without notice, and represents only IBM ISS goals

More information

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,

More information

Cloud ibrido, è tutta questione di località delle risorse. (e risparmi)

Cloud ibrido, è tutta questione di località delle risorse. (e risparmi) Cloud ibrido, è tutta questione di località delle risorse (e risparmi) Primo passo IaaS Non solo IaaS Cloud storage cloud tiering Object store private cloud Object store public cloud Primary Storage Cloud

More information

CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer

CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati Patrick Gada 18 March 2015 Senior Sales Engineer CryptoLocker Rossi Mario, CryptoLocker CryptoLocker Attacco del 27 gennaio

More information

Catalogo Corsi 2013/2014

Catalogo Corsi 2013/2014 Catalogo Corsi 2013/2014 Area Brand Titolo gg Aula gg 1 to 1 Grafica Ottimizzazioni immagini per schermo 1 1 Grafica Adobe After Effect CS5 base 3 3 Grafica Adobe After Effect CS6 base 3 3 Grafica Adobe

More information

8 Steps for Network Security Protection

8 Steps for Network Security Protection 8 Steps for Network Security Protection cognoscape.com 8 Steps for Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because

More information

8 Steps For Network Security Protection

8 Steps For Network Security Protection 8 Steps For Network Security Protection 8 Steps For Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because of their

More information

Big Data, Big True. IDC Big Data Conference II, Bologna 19 novembre 2013. Fabio Rizzotto IT Research&Consulting Director, IDC Italy

Big Data, Big True. IDC Big Data Conference II, Bologna 19 novembre 2013. Fabio Rizzotto IT Research&Consulting Director, IDC Italy Big Data, Big True IDC Big Data Conference II, Bologna 19 novembre 2013 Fabio Rizzotto IT Research&Consulting Director, IDC Italy Il sorpasso dei Big Data sulla BI Business Intelligence Big Data Worldwide

More information

Client Side Cross Site Scripting

Client Side Cross Site Scripting Client Side Cross Site Scripting 1 Client Side Cross Site Scripting CLIENT SIDE XSS - DI PAOLA 2 Soluzioni e sicurezza per applicazioni mobile e payments Consorzio Triveneto, azienda leader nei sistemi

More information

Le tecnologie del Web 2.0: RSS. Prof. Filippo Lanubile. ovvero: semplice diffusione di contenuti

Le tecnologie del Web 2.0: RSS. Prof. Filippo Lanubile. ovvero: semplice diffusione di contenuti Le tecnologie del Web 2.0: RSS Cos è RSS Really Simple Syndication ovvero: semplice diffusione di contenuti Formato di dati per distribuire agli utenti web gli aggiornamenti di siti web, dei blog, l'audio

More information

Ubiquity getting started

Ubiquity getting started Introduction This document describes the most important steps to quickly get started with Ubiquity Installation Domain creation Device registration and activation Version Description Date 1 First emission

More information

Alberto Meneghini! Security Leader, IBM Italia! IBM Security. 2015 IBM Corporation. 12015 IBM Corporation

Alberto Meneghini! Security Leader, IBM Italia! IBM Security. 2015 IBM Corporation. 12015 IBM Corporation Alberto Meneghini! Security Leader, IBM Italia! 12015 IBM Corporation Esistono istituzioni finanziarie che sanno cosa significa essere attaccate ed altre che neppure lo immaginano. In quale vi riconoscete?!

More information

Number: 08.04 NETWORK SECURITY

Number: 08.04 NETWORK SECURITY NETWORK SECURITY December 2003 TABLE OF CONTENTS 1 INTRODUCTION... 1 1.1 NETWORK SECURITY OVERVIEW... 1 1.2 EXCLUSIONS... 1 1.3 COMMENTS AND SUGGESTIONS... 1 2 NETWORK SECURITY RESPONSIBILITIES... 3 2.1

More information

Corso: Core Solutions of Microsoft Skype for Business 2015 Codice PCSNET: MSKY-5 Cod. Vendor: 20334 Durata: 5

Corso: Core Solutions of Microsoft Skype for Business 2015 Codice PCSNET: MSKY-5 Cod. Vendor: 20334 Durata: 5 Corso: Core Solutions of Microsoft Skype for Business Codice PCSNET: MSKY-5 Cod. Vendor: 20334 Durata: 5 Obiettivi Al termine del corso i partecipanti saranno in grado di: Descrivere l'architettura di

More information

VoIP : Voice over Internet Privacy. Alessio L.R. Pennasilico mayhem@aipsi.org http://www.aipsi.org

VoIP : Voice over Internet Privacy. Alessio L.R. Pennasilico mayhem@aipsi.org http://www.aipsi.org VoIP : Alessio L.R. Pennasilico http://www.aipsi.org Alessio L.R. Pennasilico Security Evangelist @ Alba S.T. Member / Board of Directors: AIP, AIPSI, CLUSIT, HPP, ILS, IT-ISAC, LUGVR, OPSI, Metro Olografix,

More information

IBM Security Services

IBM Security Services IBM Security Services - Penetration Testing - July 15, 2014 12014 IBM Corporation THE EVOLVING THREAT LANDSCAPE 2 Success in today s dynamic, data driven global marketplace requires effective enterprise

More information

TDD da un capo all altro. Matteo Vaccari vaccari@pobox.com matteo.vaccari@xpeppers.com (cc) Alcuni diritti riservati

TDD da un capo all altro. Matteo Vaccari vaccari@pobox.com matteo.vaccari@xpeppers.com (cc) Alcuni diritti riservati TDD da un capo all altro Matteo Vaccari vaccari@pobox.com matteo.vaccari@xpeppers.com (cc) Alcuni diritti riservati 1 Introduzione Quando si parla di Test-Driven Development spesso si sente dire facciamo

More information

Custom Integration Solutions

Custom Integration Solutions Welcome to this introduction into a true business class network solution for you and your clients This solution has been designed, by integrators, for integrators. We look forward to producing an ever

More information

L informatica nel mondo industriale

L informatica nel mondo industriale Gian Luca Sacco - Marketing Director South & Central Europe L informatica nel mondo industriale Page 1 Smarter decisions, better products. Today s Product Challenges are More Difficult Than Ever Before

More information

IBM Academic Initiative

IBM Academic Initiative IBM Academic Initiative Sistemi Centrali Modulo 3- Il sistema operativo z/os (quarta parte) Unix Services Sapienza- Università di Roma - Dipartimento Informatica 2007-2008 UNIX System Services POSIX XPG4

More information

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services

More information

Next Step Publishing. Federico Ruberti Fake Press. Roma, 7 dicembre 2010, Digital Cafè, Più libri più liberi 2010.

Next Step Publishing. Federico Ruberti Fake Press. Roma, 7 dicembre 2010, Digital Cafè, Più libri più liberi 2010. Next Step Publishing Federico Ruberti Fake Press Roma, 7 dicembre 2010, Digital Cafè, Più libri più liberi 2010. Fake Press Think-tank italiano e internazionale che investiga, sviluppa e realizza modelli

More information

Quali sono i rischi che derivano dall utilizzo del mobile e quali le precauzioni da prendere contro gli attacchi informatici.

Quali sono i rischi che derivano dall utilizzo del mobile e quali le precauzioni da prendere contro gli attacchi informatici. Quali sono i rischi che derivano dall utilizzo del mobile e quali le precauzioni da prendere contro gli attacchi informatici. Nicola D Ottavio Security Sales Specialist 1 The required roadmap disclaimer

More information

Maestri formaggiai dal 1921

Maestri formaggiai dal 1921 formaggiai dal 1921 Sono passati PIÙ DI NOVANT ANNI da quando Giuseppe Colla fondò il CASEIFICIO COLLA. Ancora OGGI dopo 4 GENERAZIONI, produciamo un FORMAGGIO di ALTISSIMA QUALITÀ, mantenendo inalterata

More information

WH-Display. G EPROM d e s i g n > ESPOSITORI A PARETE/VETRINA WALL DISPLAY STAND/DISPLAY CASE

WH-Display. G EPROM d e s i g n > ESPOSITORI A PARETE/VETRINA WALL DISPLAY STAND/DISPLAY CASE G EPROM > ESPOSITORI A PARETE/VETRINA WALL DISPLAY STAND/DISPLAY CASE L espositore è concepito per un cambio rapido del messaggio. È costituito da una tasca piatta in Plexiglas antiurto trasparente, sostenuta

More information

Public Affairs & Communication Huawei Italia

Public Affairs & Communication Huawei Italia Security Level: Talent Lab A training program sponsored by Huawei and MIUR Public Affairs & Communication Huawei Italia www.huawei.com HUAWEI TECHNOLOGIES CO., LTD. The project : TALENT LAB Talent Lab

More information

The Case for Enterprise Ready Virtual Private Clouds

The Case for Enterprise Ready Virtual Private Clouds The Case for Enterprise Ready Virtual Private Clouds Timothy Wood, Alexandre Gerber *, K.K. Ramakrishnan *, Jacobus van der Merwe *, and Prashant Shenoy University of Massachusetts Amherst *AT&T Research

More information

Sicurezza Data Center 22 giugno 2015. Fabio Paravani Regional Account Manager

Sicurezza Data Center 22 giugno 2015. Fabio Paravani Regional Account Manager Sicurezza Data Center 22 giugno 2015 Fabio Paravani Regional Account Manager A world safe for exchanging digital information CEO Founded Headquarters Employees Offices 2012 Sales Eva Chen 1988, United

More information

Made in Italy ENABLING ITALIAN BUSINESSES TO GROW GLOBALLY WITH DIGITAL. Alessandra Domizi Giulia Pierangeli Google

Made in Italy ENABLING ITALIAN BUSINESSES TO GROW GLOBALLY WITH DIGITAL. Alessandra Domizi Giulia Pierangeli Google Made in Italy ENABLING ITALIAN BUSINESSES TO GROW GLOBALLY WITH DIGITAL Alessandra Domizi Giulia Pierangeli Google ITALIAN ECONOMY IS SLIDING BACKWARDS BY 13 YEARS GDP down 3.8% since 2010 12.6% Unemployment

More information

Edgewater Routers User Guide

Edgewater Routers User Guide Edgewater Routers User Guide For use with 8x8 Service Version 1.0, March 2011 Table of Contents EdgeMarc 200AE1-10 Router Overview...3 EdgeMarc 4550-15 Router Overview...4 Basic Setup of the 200AE1 and

More information

P2PSIP P2PSIP P2P-SIP P2P SIP SIPP2P SIP-P2P SIP P2P

P2PSIP P2PSIP P2P-SIP P2P SIP SIPP2P SIP-P2P SIP P2P P2PSIP P2PSIP P2P-SIP P2P SIP SIPP2P SIP-P2P SIP P2P Xché Per brillare di luce riflessa Perché sembra un'alternativa a Skype Per non essere tagliati fuori Per estendere la copertura Perché è una tecnologia

More information

Edgewater Routers User Guide

Edgewater Routers User Guide Edgewater Routers User Guide For use with 8x8 Service May 2012 Table of Contents EdgeMarc 250w Router Overview.... 3 EdgeMarc 4550-15 Router Overview... 4 Basic Setup of the 250w, 200AE1 and 4550... 5

More information

Corso: Supporting and Troubleshooting Windows 10 Codice PCSNET: MW10-3 Cod. Vendor: 10982 Durata: 5

Corso: Supporting and Troubleshooting Windows 10 Codice PCSNET: MW10-3 Cod. Vendor: 10982 Durata: 5 Corso: Supporting and Troubleshooting Windows 10 Codice PCSNET: MW10-3 Cod. Vendor: 10982 Durata: 5 Obiettivi Al termine del corso i partecipanti saranno in grado di: Descrivere i processi coinvolti nella

More information

Internet and Intranet Calling with Polycom PVX 8.0.1

Internet and Intranet Calling with Polycom PVX 8.0.1 Internet and Intranet Calling with Polycom PVX 8.0.1 An Application Note Polycom PVX is an advanced conferencing software application that delivers Polycom's premium quality audio, video, and content sharing

More information

Display racks for Wine

Display racks for Wine E R R E E N N E 48 Espositori per vino in plexiglass Nuova linea espositori in plexiglass per vino, eleganti soluzioni d arredo dalle forme armoniose che si rifanno alle più prestigiose disposizioni di

More information

Palo Alto Networks AAC Lab Creation Guidelines v1.0

Palo Alto Networks AAC Lab Creation Guidelines v1.0 Palo Alto Networks AAC Lab Creation Guidelines v1.0 Contact Information Corporate Headquarters: Palo Alto Networks 3300 Olcott Street Santa Clara, CA 95054 http://www.paloaltonetworks.com/ About this Guide

More information

APC-Pro sa Computer Service

APC-Pro sa Computer Service Configuring, Managing and Troubleshooting Microsoft Exchange Service Pack 2 (10135B) Durata: 5 giorni Orario: 8:30 12:00 / 13:30-17.00 Costo per persona: CHF 1 900.-- (Min. 5 partecipanti) Obiettivi di

More information

Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel.

Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel. 30. VoIP Example 3 (VoIP over VPN) Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel. In this example 3300V

More information

Course Title: Penetration Testing: Communication Media Testing, 1st Edition

Course Title: Penetration Testing: Communication Media Testing, 1st Edition Course Title: Penetration Testing: Communication Media Testing, 1st Edition Page 1 of 6 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad

More information

AT&T Global Network Client Domain Logon Guide. Version 9.6

AT&T Global Network Client Domain Logon Guide. Version 9.6 Version 9.6 AT&T Global Network Client Domain Logon Guide 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual

More information

REVIEW OF THE FIREWALL ARRANGEMENTS

REVIEW OF THE FIREWALL ARRANGEMENTS WEST DORSET DISTRICT COUNCIL REVIEW OF THE FIREWALL ARRANGEMENTS Report issued: December 2007 The matters raised in this report are only those, which came to the attention of the auditor during the course

More information

Using IPsec VPN to provide communication between offices

Using IPsec VPN to provide communication between offices Using IPsec VPN to provide communication between offices This example provides secure, transparent communication between two FortiGates located at different offices using route-based IPsec VPN. In this

More information

Websense TRITON. Ferdinando Mancini Sr. Sales Engineer

Websense TRITON. Ferdinando Mancini Sr. Sales Engineer Websense TRITON Raggiungere un elevato livello di integrazione di soluzioni e piattaforme grazie ad una nuova ed unica suite dedicata alla sicurezza dei contenuti Ferdinando Mancini Sr. Sales Engineer

More information

Dall Information Security alla Cyber Security, e ritorno

Dall Information Security alla Cyber Security, e ritorno Dall Information Security alla Cyber Security, e ritorno (Come migliorare la sicurezza dell azienda attraverso un efficace governo degli incidenti) Luca Bechelli (CLUSIT) Marco Di Leo (HP) Fabio Vernacotola

More information

Lesson 201: Use of il quale

Lesson 201: Use of il quale Lesson 201: Use of il quale by Keith A Preble, info@ilgur.com Il quale can be used as a relative pronoun when it is combined with the definite article, il, la, i, le or when it is articulated with a simple

More information

MCSE SERVER INFRASTRUCTURE PERCORSO COMPLETO

MCSE SERVER INFRASTRUCTURE PERCORSO COMPLETO MCSE SERVER INFRASTRUCTURE PERCORSO COMPLETO Descrizione Il corso è destinato ai professionisti dell'information Technology (IT) responsabili della pianificazione, progettazione e implementazione di un

More information

FLAVIO D ANNUNZIO Digital for Business

FLAVIO D ANNUNZIO Digital for Business ITALIAN ORPHAN DRUGS DAY Venerdì 13 febbraio 2015 Sala conferenze Digital for Business - Sesto San Giovanni (MI) FLAVIO D ANNUNZIO Digital for Business www.digitalforacademy.com Find the Patients, Drive

More information

Security perimeter. Internet. - Access control, monitoring and management. Differentiate between insiders and outsiders - Different types of outsiders

Security perimeter. Internet. - Access control, monitoring and management. Differentiate between insiders and outsiders - Different types of outsiders Network Security Part 2: protocols and systems (f) s and VPNs (overview) Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Security perimeter Insider - Access control,

More information

ITU-T Kaleidoscope Conference Innovations in NGN. Architecture for Broadband and Mobile VPN over NGN

ITU-T Kaleidoscope Conference Innovations in NGN. Architecture for Broadband and Mobile VPN over NGN ITU-T Kaleidoscope Conference Innovations in NGN Architecture for Broadband and Mobile VPN over NGN Masahisa Kawashima NTT Information Sharing Platform Laboratories kawashima.masahisa@lab.ntt.co.jp Architecture

More information

Community sites powered by Drupal LinuxDay 2014 @ IIS F. Alberghetti. Andrea franz Francesconi andrea.francesconi@gmail.com

Community sites powered by Drupal LinuxDay 2014 @ IIS F. Alberghetti. Andrea franz Francesconi andrea.francesconi@gmail.com Community sites powered by Drupal LinuxDay @ IIS F. Alberghetti Andrea franz Francesconi andrea.francesconi@gmail.com LinuxDay Topic... Il messaggio di quest'anno fa esplicito riferimento alle libertà

More information

WEBINARS. Realtà Aumentata e casi studio rilevanti nel settore industriale. Mauro Rubin. Copyright 2015 by InfoComm International

WEBINARS. Realtà Aumentata e casi studio rilevanti nel settore industriale. Mauro Rubin. Copyright 2015 by InfoComm International WEBINARS Realtà Aumentata e casi studio rilevanti nel settore industriale Mauro Rubin Copyright 2015 by InfoComm International About Mauro Rubin JoinPad President & Founder Tags: #Geek #VR #Entrepreneur

More information

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview Configuration Guide How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall Overview This document describes how to implement IPSec with pre-shared secrets establishing

More information

Basic IPv6 WAN and LAN Configuration

Basic IPv6 WAN and LAN Configuration Basic IPv6 WAN and LAN Configuration This quick start guide provides basic IPv6 WAN and LAN configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N. For complete IPv6 configuration

More information

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog. Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course

More information

Deploying Silver Peak VXOA Physical And Virtual Appliances with Dell EqualLogic Isolated iscsi SANs including Dell 3-2-1

Deploying Silver Peak VXOA Physical And Virtual Appliances with Dell EqualLogic Isolated iscsi SANs including Dell 3-2-1 Deploying Silver Peak VXOA Physical And Virtual Appliances with Dell EqualLogic Isolated iscsi SANs including Dell 3-2-1 Tech Note June 2012 This tech note describes the deployment of Silver Peak physical

More information

CCNA Security 2.0 Scope and Sequence

CCNA Security 2.0 Scope and Sequence CCNA Security 2.0 Scope and Sequence Last Updated August 26, 2015 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security

More information

Definition of firewall

Definition of firewall Internet Firewalls Definitions: firewall, policy, router, gateway, proxy NAT: Network Address Translation Source NAT, Destination NAT, Port forwarding NAT firewall compromise via UPnP/IGD Packet filtering

More information

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 info@coresecurity.com

More information

Learning Module title: Promoting ICT with migrants in the ICT centre

Learning Module title: Promoting ICT with migrants in the ICT centre Learning Module title: Promoting ICT with migrants in the ICT centre Position within the curriculum: Stage 2 (consolidation) / Category 2 (Methodological skills in working with groups of participants)

More information

Scenario 1: One-pair VPN Trunk

Scenario 1: One-pair VPN Trunk VPN Trunk Load-Balance between Vigor3200 and Other Vigor Router This section will discuss how to build VPN Trunk with load-balance between Vigor3200 and other router (e.g., Vigor3300). Scenario 1: One-pair

More information

SCHEMI PREPARAZIONE CAVI per cabling del Beam Splitter

SCHEMI PREPARAZIONE CAVI per cabling del Beam Splitter SCHEMI PREPARAZIONE CAVI per cabling del Beam Splitter INFORMAZIONI GENERALI...2 IDENTIFICAZIONE COMPONENTI...2 LEGENDA...3 PINOUT OF THE MAIN DEVICES...3 CABLE A (VACUUM SIDE)...5 CABLE B (VACUUM SIDE)...6

More information

Smart Transport for Sustainable City

Smart Transport for Sustainable City Smart Transport for Sustainable City Dipartimento di Ingegneria dell Informazione University of Pisa, Italy E-mail: francesco.marcelloni@unipi.it Alessio Bechini, Beatrice Lazzerini Projects SMARTY (SMArt

More information

Reti Informatiche. WireShark. www.wireshark.org

Reti Informatiche. WireShark. www.wireshark.org Reti Informatiche WireShark www.wireshark.org What is WireShark Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data

More information

24 novembre 2014. Relatrici: Monica Proto e Carmela Cornacchia CNR-IMAA. Sportello APRE Basilicata/TeRN

24 novembre 2014. Relatrici: Monica Proto e Carmela Cornacchia CNR-IMAA. Sportello APRE Basilicata/TeRN BANDI DI INTERESSE in H2020 (SC2) 24 novembre 2014 Relatrici: Monica Proto e Carmela Cornacchia CNR-IMAA Sportello APRE Basilicata/TeRN Food security, sustainable agriculture and forestry, marine and maritime

More information

100% Renewable Power Nightmare, Dream or Reality? Antonella Battaglini Kyoto Club, Roma 16-02-2011

100% Renewable Power Nightmare, Dream or Reality? Antonella Battaglini Kyoto Club, Roma 16-02-2011 100% Renewable Power Nightmare, Dream or Reality? Antonella Battaglini Kyoto Club, Roma 16-02-2011 Energiekonzept Global and European Development Roadmap to 2050 Slide 2 Nightmare - Incubo... Affinché

More information

ENDIAN Topologies Setup of different Network topologies with Endian Firewalls

ENDIAN Topologies Setup of different Network topologies with Endian Firewalls ewon Application User Guide You Select, We Connect AUG 027 / Rev 1.0 ENDIAN Topologies Setup of different Network topologies with Endian Firewalls Table of Contents 1. Hardware and software requirements...3

More information

Enterprise Risk Management: Strategie e Soluzioni a confronto

Enterprise Risk Management: Strategie e Soluzioni a confronto Enterprise Risk Management: Strategie e Soluzioni a confronto - Milano 25 Settembre 2008 Fabio Battelli, CISSP, CISA Practice Manager - Advisory Services Symantec Consulting Services Symantec Global Services

More information

Appendix C Network Planning for Dual WAN Ports

Appendix C Network Planning for Dual WAN Ports Appendix C Network Planning for Dual WAN Ports This appendix describes the factors to consider when planning a network using a firewall that has dual WAN ports. This appendix contains the following sections:

More information

Creating a VPN with overlapping subnets

Creating a VPN with overlapping subnets Creating a VPN with overlapping subnets This recipe describes how to construct a VPN connection between two networks with overlapping IP addresses in such a way that traffic will be directed to the correct

More information

Using Remote Desktop Software with the LAN-Cell 3

Using Remote Desktop Software with the LAN-Cell 3 Using Remote Desktop Software with the LAN-Cell 3 Technote LCTN3010 Proxicast, LLC 312 Sunnyfield Drive Suite 200 Glenshaw, PA 15116 1-877-77PROXI 1-877-777-7694 1-412-213-2477 Fax: 1-412-492-9386 E-Mail:

More information

A6- Sensitive Data Exposure

A6- Sensitive Data Exposure OWASP Vulnerabilities and Attacks Simplifie d: Business Manager Series Part 2 Have you heard of the times when Fantastic Frank from Randomland was furious? Money and critical data was being stolen from

More information

NGN. Giulio Signorelli WIND Telecomunicazioni S.p.A.

NGN. Giulio Signorelli WIND Telecomunicazioni S.p.A. NGN Giulio Signorelli WIND Telecomunicazioni S.p.A. NGN & Wi-FI Bologna, 26 settembre 2011 Agenda Current Broadband situation In Italy FTTH models Conclusion - Page 2 - - Page 3 - Fixed Broadband in Italy

More information

Vulnerabilità e Attacchi alle Infrastrutture IT Simone Riccetti. Sr. IT Security Architect

Vulnerabilità e Attacchi alle Infrastrutture IT Simone Riccetti. Sr. IT Security Architect Vulnerabilità e Attacchi alle Infrastrutture IT Simone Riccetti Sr. IT Security Architect Agenda Team di Ricerca X-Force Vulnerabilità e Minacce Tecnologie di Protezione Attack Lifecycle Live Demo 2 The

More information

Percorso Mcsa Managing and Mainting Windows 8

Percorso Mcsa Managing and Mainting Windows 8 Percorso Mcsa Managing and Mainting Windows 8 Descrizione In questo corso, gli studenti imparano a progettare l'installazione, la configurazione e la manutenzione di Windows 8. Due caratteristiche uniche

More information

ONLINE COLLABORATION USING DATABASES IMAGE EDITING SPECIALISED LEVEL CAD2D SPECIALISED LEVEL

ONLINE COLLABORATION USING DATABASES IMAGE EDITING SPECIALISED LEVEL CAD2D SPECIALISED LEVEL POLO BIANCIARDI CERTIFICAZIONE AICA ECDL PROFILE IT SECURYTI SPECIALISED SPECIALISED CAD2D SPECIALISED ADVANCED HEALTH ECDL SPECIALISED ADVANCED CAD2D SPECIALISED HEALTH 1 ESAME ECDL BASE SPECIALISED ADVANCED

More information

ipratico POS Quick Start Guide v. 1.0

ipratico POS Quick Start Guide v. 1.0 ipratico POS Quick Start Guide v. 1.0 Version History Version Pages Comment Date Author 1.0 First Release 5/Marzo/2012 Luigi Riva 2 SUMMARY 1 GETTING STARTED 4 1.1 What do you need? 4 1.2 ipad 5 1.3 Antenna

More information

Infrastructure-less networks

Infrastructure-less networks Infrastructure-less networks Csaba Simon Dept. of Telecommunications and Media Informatics simon@tmit.bme.hu Convergent Networks and Services (VITMM156) 1 Mobility management 2 Mobility Mobile station,

More information

PROGRAMMA CORSO DI LOGIC PRO 9

PROGRAMMA CORSO DI LOGIC PRO 9 PROGRAMMA CORSO DI LOGIC PRO 9 1-VIDEO ANTEPRIMA Durata: 4 27 2-VIDEO n.1 Durata: 1 07 - APRIRE UNA NUOVA SESSIONE 3-VIDEO n.2 Durata: 3 36 - CREARE UNA NUOVA TRACCIA - SOFTWARE INSTRUMENT : - Aprire una

More information

Lezione 10 Introduzione a OPNET

Lezione 10 Introduzione a OPNET Corso di A.A. 2007-2008 Lezione 10 Introduzione a OPNET Ing. Marco GALEAZZI 1 What is OPNET? Con il nome OPNET viene indicata una suite di prodotti software sviluppati e commercializzati da OPNET Technologies,

More information

Chapter 3 Security and Firewall Protection

Chapter 3 Security and Firewall Protection Chapter 3 Security and Firewall Protection This chapter describes how to use the basic firewall features of the ADSL2+ Modem Router to protect your network. Firewall Settings You can set up the ADSL2+

More information

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Objective Scenario Topology In this lab, the students will complete the following tasks: Prepare to configure Virtual Private Network (VPN)

More information

TechNote. Configuring SonicOS for Amazon VPC

TechNote. Configuring SonicOS for Amazon VPC Network Security SonicOS Contents Overview... 1 System or Network Requirements / Prerequisites... 3 Deployment Considerations... 3 Configuring Amazon VPC with a Policy-Based VPN... 4 Configuring Amazon

More information

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network Configuring an IPsec VPN to provide ios devices with secure, remote access to the network This recipe uses the IPsec VPN Wizard to provide a group of remote ios users with secure, encrypted access to the

More information

TRADING ONLINE E STATISTICA PDF

TRADING ONLINE E STATISTICA PDF TRADING ONLINE E STATISTICA PDF ==> Download: TRADING ONLINE E STATISTICA PDF TRADING ONLINE E STATISTICA PDF - Are you searching for Trading Online E Statistica Books? Now, you will be happy that at this

More information

Network Services Internet VPN

Network Services Internet VPN Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order

More information

Curriculum Vitae Europass

Curriculum Vitae Europass Curriculum Vitae Europass Personal Information DEL PLATO GRAZIELLA Via Trento n 6 Meda (MB) +39 338/1921426 graziellamanfredi@hotmail.it Female Employment Professional Experience From 23/06/2014 a 15/09/2014

More information

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP belka@att.net Security Security is recognized as essential to protect vital processes and the systems that provide those

More information