Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald
|
|
|
- Catherine Richards
- 9 years ago
- Views:
Transcription
1 Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald
2 About DN-Systems Global Consulting and Technology Services Planning Evaluation Auditing Operates own Security Lab Project Management Integral Security (not only ICT) Malware and APT Analysis Investigation / Digital Forensics Government needs
3 Global Service
4 Our Customers Datacenter ISP and Backbone Supply-Chain Transport und Logistics International Groups (DAX 30, Fortune 500) Banks and Finance (Credit card clearing) Vendors of Security Hardware and Software Agencies and Governments
5 Hype or reality? Gartner: Cloud computing is the most over-hyped term in IT Services like Amazon EC2 and Azure are publicly available Even if you don t use Cloud technology they are only few/little ways to avoid them Millions of customer data end up at Salesforce.com
6 Cloud concepts: IaaS
7 Cloud concepts: IaaS IaaS - Infrastructure as a Service Highest level of control available to customers: Customers build VMs and deploy them Cloud service providers network Network security ISP System security customer IaaS provider offers Compute power, cooling, and network connectivity The rest of the security equation is the customer s problem Examples: Amazon EC2
8 Cloud concepts: PaaS
9 Cloud concepts: PaaS PaaS - Platform as a Service Programming model on a development framework. These platforms expose APIs: To developers Abstract the database services and computing platforms Offers rapid development of web enabled services Examples: Cisco Webex Connect, Amazon Web Services
10 Cloud concepts: PaaS PaaS - Platform as a Service Security: Core security is usually handled by the PaaS provider The applications themselves must follow secure coding practices Provider is not claiming to enforce security on systems Network Security by provider System Security by provider Database Security by provider Logical System Separation is handled by provider
11 Cloud concepts: SaaS
12 Cloud concepts: SaaS SaaS Software as a Service Most common cloud offering Allows a user to purchase seats for an application that is: Hosted by provider Maintained by provider Administered by provider System security by provider Network security by provider Examples: Cisco Webex, Salesforce.com, etc
13 Cloud concepts: SaaS SaaS Software as a Service Security issues: This cloud model offers limited visibility into the security process of the service provider. SLAs are pretty much all you will have to enforce your own security requirements. A SaaS provider often promise a stronger security posture for an organization that does not have: The budget or the manpower to implement strong security.
14 Cloud concepts: SaaS SaaS Software as a Service Security issues: This cloud model offers limited visibility into the security process of the service provider. SLAs are pretty much all you will have to enforce your own security requirements. A SaaS provider often promise a stronger security posture for an organization that does not have: The budget or the manpower to implement strong security.
15 Cloud types: VPC Virtual Private cloud Deployment utilizes VPN technology Create a secure pipe via cloud provider s network Dedicated computing resources. No shared environment VPN-technology is essential Network-paths are shared but secured by VPN
16 Cloud types: VPC
17 Cloud types: C-Cloud
18 Cloud types: C-Cloud Community Cloud A consortium of organizations with similar Service requirements Policies Interests Join together to benefit from a common infrastructure. Examples: Group of schools, collectives, agricultural production cooperative,
19 Public Cloud
20 Cloud types: Public-Cloud Public cloud services Offered to the public for a fee Operated by a cloud service provider Everyone who pays for it can be part of this Example: Google Apps, Amazon, Microsoft Azure,
21 Cloud types: Hybrid-Cloud Hybrid Cloud A model that uses any combination of Public, Private or Virtual private Community Mixture of internal applications and services Provides a mechanism to increase capacity on demand Optionally moves less sensitive applications to cloud services.
22 Top Threats: #1 Malicious use of cloud computing IaaS providers offer customers the illusion of unlimited compute, network, and storage capacity A simple registration process with free trial is offered A valid (stolen) credit card allows a user to immediately use cloud services with total anonymity
23 Top Threats: #1 Malicious use of cloud computing Criminals like clouds: Spammers, malicious code authors, hackers and other criminals have been able to conduct their activities on a large scale. PaaS providers have traditionally suffered most from this kind of attacks; however, recent evidence shows that hackers have begun to target IaaS vendors as well.
24 Top Threats: #1 Malicious use of cloud computing Actual Services on a malicious cloud are: Password and key cracking (DES in 5 min). DDoS as a service Launching dynamic attack points Hosting malicious data and botnet command and control servers Building rainbow tables and captcha solving farms (to crack GSM cipher, etc ).
25 Top Threats: #1 Malicious use of cloud computing examples: Hosted the Zeus botnet, InfoStealer trojans Cloud Cracker offers: WPA/WPA2, NTLM, SHA-512 (UNIX PW), MD5 (UNIX PW), MS-CHAPv2 (PPTE,WPA-E) cracking Reduces the security of these security protocols
26 Top Threats: #1
27 Top Threats: #2 Cloud Computing providers expose software interfaces or APIs to: Customers and attackers From authentication and access control to encryption and activity monitoring, these interfaces must be designed to protect against both accidental and malicious attempts to be broken Many times they introduce an additional complexity of new layered API (KISS violation)
28 Top Threats: #2 Examples of Cloud Computing providers break-ins: LinkedIn lost Password-Hashes Cloud can be used to crack the leaked passwords (Thread #1) Sony Playstation Network Lost all user credentials as well all credit card numbers)
29 Top 10 Threats: #2 Hashes lost, Cloud helps to recover clear-text password from hash
30 Top Threats: #3 Malicious Insiders The threat of a malicious insider is well-known to most organizations, but within the cloud you give up your control. Much profitable data on one place This kind of situation clearly creates an attractive opportunity for the full scale of attackers from the hobbyist hacker over organized crime to corporate espionage
31 Top Threats: #4 Shared Technology Cloud vendors deliver their services cheap by sharing infrastructure. Most underlying components (e.g., CPU caches, GPUs, etc.) are not designed to offer strong isolation A virtualization hypervisor promise to mediates access between guest operating systems and the physical compute resources Hypervisors are software, and software will fail!
32 Top Threats: #4 Shared Technology - Example Cloud Burst Exploit for VMWare bases virtualization, to break from a Guest OS into the hypervisor or Host OS. Attacker can take over control of the whole cloud Full paper: 09/KORTCHINSKY/BHUSA09-Kortchinsky- Cloudburst-PAPER.pdf
33 Top Threats: #5 Data Loss or Leakage Cloud provider was not able to provide proper backup or authentic state of the data. Customer does not have control over his data, so backup media might be shared, and so can be accidently mixed or given away
34 Top Threats: #5 Data Loss or Leakage Example Amazon's huge EC2 cloud services crash permanently destroyed customer data The Sidekick (Microsoft) data outage of ,000 Smartphone Users lost: Personal data ( s, address books & photos)
35 Top Threats: #6 Account or Service Hijacking Known and old attack methods get a full new impact Phishing, fraud, and exploitation of software vulnerabilities get a much bigger impact Separation and private operation gets very complicated with access from everywhere any time concepts Tapping of or injection of malware into the infrastructure is a big issue
36 Top Threats: #6 Account or Service Hijacking Examples: Virtual Machine Sniffer on ESX Hosts EBay and PayPal targeted or spear fishing attacks
37 Top Threats: #7 Unknown Risk Profile Cloud users shifts the focus from security concerns and infrastructure to core business strengths Users can easy lose track of secure states and key security indicators: Versions of software, code updates, security practices, vulnerability profiles, intrusion attempts, and security design In addition to network intrusion logs, redirection attempts and/or successes, and other logs
38 Top Threats: #7 Unknown Risk Profile - Examples Heartland Data Breach: Heartland s payment processing systems were using known-vulnerable software and actually infected has_no_heart_for_violated_customers.html
39 Attack Matrix Attacks apply to multiply cloud concepts Customer is loosing track of issues compared to fiscal benefit Security is up on the service provider Security does not sell unless something bad already happened Malicous use API- Exploitation Insider attack Shared Technology Data loss Account Hijacking IaaS PaaS SaaS X X O X X X X X X X X O X X X X X X Unknown Risk Profile X X X
40 Challenges: Cloud security Identify specific issues Cloud requirements: Confidentiality For traffic and user data Integrity For software and data Availability For customers
41 Cloud Security Poisoning the well Expanding the defense perimeter is never a good idea Need multiple Lines of Defense and separation
42 Provider Reliability More security will be handled / delivered from service provider Shift from operation to security operations Single end-user or enterprise security solutions might not fit to service providers Providers need large scale security solutions for: Access Control, Monitoring Encryption and User Separation (VPN, storage, compute)
43 Cloud and the SME SME will benefit Organization with no or very little security Costly security will: Competitive for SME IDS/IDP can be centrally managed and results correlated Security will be homogeneous
44 Who will benefit? Service provider will benefit Suppliers for them as well: Network Equipment Large scale storage Hypervisors, Central Management, large scale security Unaffordable computing problems will get cheap
45 Who will suffer? Private data will more likely be lost Organizations with high security policy and standards will lower them Unsecure private applications will be exposed to the whole hacker community Security evolution will be speeded up DES, 3DES, MD4, RC4 etc get obsolete Unprepared service provider will lose business Some business models will shift to the cloud
46 Questions?
47 Thank You DN-Systems GmbH Hornemannstr Hildesheim, Germany Phone: Mail:
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
How To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
TOP THREATS IN CLOUD COMPUTING
TOP THREATS IN CLOUD COMPUTING Pooja Sharma 1, Rajkumar Singh Rathore 2 1 PG Scholar, Masters of Technology, Galgotias College of Engineering and Technology, Greater Noida (India) 2 Assistant Professor,
D. L. Corbet & Assoc., LLC
Demystifying the Cloud OR Cloudy with a Chance of Data D. L. Corbet & Assoc., LLC [email protected] Why 'The Cloud' Common Clouds Considerations and Risk Why 'The Cloud' Distributed Very Large / Very
10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected]. Agenda. Security Cases What is Cloud? Road Map Security Concerns
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected] Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST
CENTER FOR ADVANCED SECURITY TRAINING 618 Designing and Implementing Cloud Security About EC-Council Center of Advanced Security Training () The rapidly evolving information security landscape now requires
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Top Threats to Cloud Computing V1.0. Prepared by the Cloud Security Alliance March 2010
Top Threats to Cloud Computing V1.0 Prepared by the Cloud Security Alliance March 2010 Top Threats to Cloud Computing V1.0 Introduction The permanent and official location for the Cloud Security Alliance
Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto
Cloud Computing: What needs to Be Validated and Qualified Ivan Soto Learning Objectives At the end of this session we will have covered: Technical Overview of the Cloud Risk Factors Cloud Security & Data
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
FACING SECURITY CHALLENGES
24 July 2013 TimeTec Cloud Security FACING SECURITY CHALLENGES HEAD-ON - by Mr. Daryl Choo, Chief Information Officer, FingerTec HQ Cloud usage and trend Cloud Computing is getting more common nowadays
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Public Cloud Security: Surviving in a Hostile Multitenant Environment
Public Cloud Security: Surviving in a Hostile Multitenant Environment SESSION ID: EXP-R01 Mark Russinovich Technical Fellow Windows Azure, Microsoft @markrussinovich The Third Computing Era Security Could
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Jort Kollerie SonicWALL
Jort Kollerie Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 68% of spend in private cloud solutions. - Bain and Dell 3 Confidential
Top 10 Cloud Risks That Will Keep You Awake at Night
Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com .. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING
SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING Amina AIT OUAHMAN Royal Moroccan Armed Forces Today, cloud computing is defi ned and talked about across the ICT industry under different contexts and with
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk
A Survey on Security Issues in Service Delivery Models of Cloud Computing
A Survey on Security Issues in Service Delivery Models of Cloud Computing { S. Subashini and V. Kavitha (2011) Presented by: Anthony Postiglione Outline Introduction What is Cloud Computing Pros/Cons of
International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: 2347-3622, Volume-1, Issue-5, February 2014
An Overview on Cloud Computing Services And Related Threats Bipasha Mallick Assistant Professor, Haldia Institute Of Technology [email protected] Abstract. Cloud computing promises to increase the velocity
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1
Fidelis XPS Power Tools Gaining Visibility Into Your Cloud: Cloud Services Security February 2012 PAGE 1 PAGE 1 Introduction Enterprises worldwide are increasing their reliance on Cloud Service providers
Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser
Security and Billing for Azure Pack Presented by 5nine Software and Cloud Cruiser Meet our Speakers Symon Perriman VP of Business Development 5nine Software [email protected] @SymonPerriman Paul Zinn Senior
Cloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Attacks from the Inside
Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
Whitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"
To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: [email protected] Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of
Cloud Computing. Adam Barker
Cloud Computing Adam Barker 1 Overview Introduction to Cloud computing Enabling technologies Different types of cloud: IaaS, PaaS and SaaS Cloud terminology Interacting with a cloud: management consoles
CLOUD COMPUTING SECURITY CONCERNS
CLOUD COMPUTING SECURITY CONCERNS ABSTRACT ASMA GULAM MOHAMED Saveetha School of Engineering Cloud computing is set of resources including data storage, programs and hardware offered through the Internet.
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
Security & Cloud Services IAN KAYNE
Security & Cloud Services IAN KAYNE CloudComponents CLOUD SERVICES Dynamically scalable infrastructure, services and software based on broad network accessibility NETWORK ACCESS INTERNAL ESTATE CloudComponents
CSE543 Computer and Network Security Module: Cloud Computing
CSE543 Computer and Network Security Module: Computing Professor Trent Jaeger 1 Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory 2 Computing Is Here Systems and Internet
Security Issues In Cloud Computing And Their Solutions
Security Issues In Cloud Computing And Their Solutions Mr. Vinod K. Lalbeg Lecturer (Management), NWIMSR, Pune-1 & Ms. Anjali S. Mulik Lecturer (Management), NWIMSR, Pune-1 ABSTRACT Cloud Computing offers
Cloud Security Overview
UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Security Overview Murat Kantarcioglu Outline Current cloud security techniques Amazon Web services Microsoft Azure Cloud Security Challengers
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro [email protected] 26.03.2013
An Effective Measurement of Data Security in a Cloud Computing Environment
An Effective Measurement of Data Security in a Cloud Computing Environment A.A. Elusoji Computer Technology Department Yaba College of Technology, Yaba Lagos State, Nigeria [email protected] L.N. Onyejegbu
Cloud Security. DLT Solutions LLC June 2011. #DLTCloud
Cloud Security DLT Solutions LLC June 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) [email protected] www.dlt.com/cloud Your Hosts Van Ristau Chief Technology Officer, DLT Solutions
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Cloud Security. Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation
Cloud Security Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA
IT TRENDS AND FUTURE CONSIDERATIONS Paul Rainbow CPA, CISA, CIA, CISSP, CTGA AGENDA BYOD Cloud Computing PCI Fraud Internet Banking Questions The Mobile Explosion Mobile traffic data in 2011 was nearly
Survey on Security Attacks and Solutions in Cloud Infrastructure
Survey on Security Attacks and Solutions in Cloud Infrastructure Shilpa D 1, Nagashree C 2, Divya C 3, Spurthi G S 4 Assistant Professor, Department of Computer Science and Engineering, SVIT, Bangalore,
Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Cloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing
Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
WHITE PAPER Security in M2M Communication What is secure enough?
WHITE PAPER Security in M2M Communication What is secure enough? Motivation Wireless Machine-To-Machine (M2M) communication has grown dramatically over the past decade and is still growing rapidly. In
I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform
WHITE PAPER Cloud-Based, Automated Breach Detection The Seculert Platform Table of Contents Introduction 3 Automatic Traffic Log Analysis 4 Elastic Sandbox 5 Botnet Interception 7 Speed and Precision 9
Security Landscape of Cloud Computing
Security Landscape of Cloud Computing Amrith Nawoor Sales Consulting Team Leader East Africa & SADC 1 This document is for informational purposes. It is not a commitment to deliver any material, code,
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
A Network Administrator s Guide to Web App Security
A Network Administrator s Guide to Web App Security Speaker: Orion Cassetto, Product Marketing Manager, Incapsula Moderator: Rich Nass, OpenSystems Media Agenda Housekeeping Presentation Questions and
CIT 668: System Architecture
CIT 668: System Architecture Cloud Security Topics 1. The Same Old Security Problems 2. Virtualization Security 3. New Security Issues and Threat Model 4. Data Security 5. Amazon Cloud Security Data Loss
Stephen Coty Director, Threat Research
Emerging threats facing Cloud Computing Stephen Coty Director, Threat Research Cloud Environments 101 Cloud Adoption is Gaining Momentum Cloud market revenue will increase at a 36% annual rate Analyst
Cloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
IBM Cloud Academy Conference ICACON 2015
by Eman Hossny, Sherif Khattab, Fatma Omara, Hesham Hassan Faculty of Computers and Information, Cairo University IBM Cloud Academy Conference ICACON 2015 Background Motivation Objective BTB Service EASI-CLOUDS
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)
Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security
International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January-2014 ISSN 2229-5518 1299
1299 TITLE Virtualization security in Data Centres & cloud Prof Sarita Dhawale. Ashoka Center for Business & Computer Studies,Nashik Head of Department of Computer Science University of Pune, Maharashtra.
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 4 (Mar. - Apr. 2013), PP 33-37 Security and Privacy Issues of Cloud Computing; Solutions and Secure
Metasploit The Elixir of Network Security
Metasploit The Elixir of Network Security Harish Chowdhary Software Quality Engineer, Aricent Technologies Shubham Mittal Penetration Testing Engineer, Iviz Security And Your Situation Would Be Main Goal
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
The Case For A Cloud Access Security Broker
The Case For A Cloud Access Security Broker 1 Executive summary The SaaS era is here. According to Gartner, SaaS and cloud-based business application services revenue will grow from $13.5 billion in 2011
Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages
Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the
Top virtualization security risks and how to prevent them
E-Guide Top virtualization security risks and how to prevent them There are multiple attack avenues in virtual environments, but this tip highlights the most common threats that are likely to be experienced
Proactively Secure Your Cloud Computing Platform
Proactively Secure Your Cloud Computing Platform Dr. Krutartha Patel Security Engineer 2010 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Agenda 1 Cloud
PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud
PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud Blue skies ahead? Yes if you are protected when you move to the cloud. Lately, it seems as if every enterprise
OVERVIEW. Enterprise Security Solutions
Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s
