CERT's role in national Cyber Security: policy suggestions
|
|
- Ralf Gallagher
- 8 years ago
- Views:
Transcription
1 CERT's role in national Cyber Security: policy suggestions Subject: Legal Aspect of Cyber Security. Author: Vladimir Chitashvili Lecture: Anna-Maria Osula
2 What is national Cyber Security is? In another words we can say it is Information Security of a State, it is to many other words with which we can explain Cyber security. Let's continue with state, in our world every state has something important in Cyber Space. For example it can be any important e- Service for citizens or organizations. Also everything around us become much more ICT: water and electricity stations, health care, payments can be done directly from your home or work office. What I want to say in this explanations is that States Cyber Space is not only Governmental Space but also commercial. Imagen state where citizens can not use bank services? Or without Internet connection? Imagen that someone attacking this services, nobody not only can made payments from a bank but also from Internet bank. Ok maybe it is not so critical for population health but now think if your water and electricity stations are under attack, and you can not provide this services for your citizens, it can be dangerous for a populations life. In real world you will say it is apocalypses for moder population. This services also must be protected as well as Governmental services. In my opinion it must be prioritized which is much more critical and which not so much. So in one sentence it is information security of everything (governmental and commercial). Now I would like to continue with CERT (Computer Emergency Response Team) and what kind of CERT's can be. First of all I want to speak about National CERT's. What are they doing and which roles they are hold. We can say that national CERT is responsible for handling critical incidents which are occur withing the state. CERT specialized in identification and analysis of critical computer incidents. Another role is information security recommendations and policies not only for government organization but for commercial and even for international institutions. CERT plays really important role in rising national Information security level. They also shares many useful information regarding last exploits, bugs, vulnerabilities and solutions how to fix them. Communication of CERT, I can not say that every national CERT are communicates and shears information between each other, but many of them working in one party or maybe we can say communities and they really help each other. Also I want mentioned that such cooperation are very important, for instance in 2008 during war in Georgia, Estonia helped Georgia and sent them Information Security experts to deal with cyber attacks. Also Estonian CERT was supporting Georgia in that time. I want to say that it is really important to cooperate and share information and knowledge between each other. Such information can be very helpful, Imagen 0 day exploit, one of the CERT for example national CERT of Latvia catches this exploit analyzed it and create a fix. And did not share this information and fix with other CERT's and organizations, in this case you are in a critical situation, because you even don't know what can happen. But if they will do it, it will help other countries to protect themselves. There is also some communities which are doing the same things and they also offer their services in Information Security they called Abus Teams. It is like CERT teams but not governmental organizations. CERT's are actively use different type of monitoring and data collection solutions which help them to analyze traffic which is smoothed through their country. How CERT participate in national security, which role it holds and which regulations it can provide and effects to the state. Now I want to combine CERT with national cyber security. On eof the most important role which CERT do is incident handling. This incidents are categorized and prioritized by their severity level. Let's start with one of the example, for instance I will take one of the bank and IT staff or security officers find some strange network activity, of course they will start monitoring it and analyzing it, also they can ask a CERT to help them in such situation. Such strange network activities can be very harmful not only for bank but also on a national level. Because for example it can be malware which can spread within a network to other systems and this systems will be infected, Imagen that states critical infrastructure is infected and goes wrong. Such situation can cause big damage for state and population. CERT helps to analyze such malware and provide a solution how to fix it and this information is shared, such information is very important for states national security level
3 and it realy can rise level of information security, because as I mentioned national cyber security is not only government but it is also commercial sector. Let me say that all malware, virus, bot or trojan which will be detected withing a state will be uploaded to central database for analyses. CERT will be responsible for analyses and reports how to fix such infections. It is difficult and also I will say impossible to control who will upload it and who not? It really depends to population of the state, how they relate to security of a state and how deep is there understanding about this subject. It is kind of solution how CERT can rise national security level, but I will say it is impossible to achieve, imagine law which will punish people who will not be care about collection of threads? I think it is impossible to control. But in some case it can be rewards for such participations which will rise motivation. Second important thing is cooperation with ISP, CERT is connected to many different security institutions which are gigs and gigs of useful information. As we know it is not surprise if we hear that something was under DdoS attack, it is becoming much often and often. CERT can share very important information for ISP, for example IP which are part of the botnet, such information can help not only to reduce a chance but also to prevent DDoS attack from the outside. The most effctive solution how to protect from DdoS attack it cooperation with ISP, it will cut this flood traffic on the edge. As I mentioned one of the most interesting part for CERT can be ISP, because they transfer all of the data across the state or route it inside. In my opinion ISP must provide statistics, logs, netflow data to CERT, it will help CERT to made correct analyses and realize whole situation in the state. If we will speak about privacy, it will not be a problem for organizations because all important and secret information all the time are encrypted by certificates or smoothed through VPN tunnels, so all encrypted data will be safe and not usable. Such solution will help CERT to secure national space and also will not disturb organizations privacy. Let's continue with connections. Communication, information and solution shearing. In my opinion communication plays one of the biggest role, not only in Information Security but also in any field. How it helps CERT to increase national security of a state? In my opinion communications with any organization, it will be another CERT or just organization maybe even international, will help increase CERT performance and quality of solutions. I will start with very casual situation, for example even when organization or ministry contacting a CERT in any kind of incident, such small things can play big role. Small bags can be so critical and harmful for system. So such communications inform the CERT that something new is happening or something old was spreed. And such bunch of small incidents can draw a big picture which can be analyzed, maybe it is something more important, for instance one of the hacker team preparing big attack to your cyber space. As I know in our day it is not compulsory to inform a CERT about incident or strange activity and nobody will come to you and punish you. In some reasons I can understand why, let say one of the biggest bank was hacked and some of the client information was leaked, which bank would like to publish such information? It can reduce trust to your system what will cause client lose, and what is happening with bank? Exactly it loosing the money. What is much more important banks reputation or security on a national level? Because such incident can be on a national level which can cause secret information leaking for example. My opinion is that we must think widely, state is like one organism if something is wrong, we must cure all part of it and not only one component of it. I think if it will be law that every incident or something strange what is happening must be reported to CERT in other hand you will be punished, I don't mean you will be jailed but maybe penalties. Such law will rise quality and performance of a CERT, what will rise cyber security on a national level. Imagen that CERT will be in touch with all of the incidents which are happening in the state. Or it is also possible to implement everywhere logging and event agent which will sent data to centralized system where will be all statistics, also netflow traffic can be collected for beginning from the most important and critical infrastructures. Such information will play big role in Information Security level, this events can be prioritized and analyzed which event is much more important to fix. What it will give, it will give CERT big understanding what is happening in the state, for what state must be ready in a future, it will help to prepare correct
4 solutions and fixing etc. All of such things will rise national cyber security level. Another question is give such power to CERT or not? In some case organization will say that it is our privacy rights and why I must show you which data I am sending or receiving, we moved to topic privacy or security? In our case it is national security, so what is much more important? I will say both of them, but it is 2 sides of it, in some case imagen that state made a law that all events. Logs and netflow data must be collected in centralized system which will be analyzed by CERT, maybe for native company's it will be ok, but what do s international offices? They can say that I don't want to send you my data, it is my organization policy. So such law can be harmful for a state also because you can lose international organizations in your country. But in some way it can be a strong regulation mechanism. Recommendations and security standards, many CERT's provide recommendations an standards how to rise security level in organization. For example as we told that national security is everything, I can say that if security level of organizations governmental or commercial in a state is high it will mean that national security level also will be higher. As I mentioned CERT provides recommendations about information security strategies, standards, malware analyses and how to behave in critical situation, how manage situation. For instance I can say that CERT's recommendations can be used at least as a part of security framework of the country. If it will be compulsory for organizations to follow this recommendations, manuals and standards, it will rise information security level in the state. I don't want to say that use the latest hardware and solutions to protect your organization, because not every organization can have expansive solutions and also maybe they don't need them at all. But at least all critical infrastructures must follow security policies, standards and strategies. I think that it is not so difficult to achieve some common idea, what is basis of information security and what must be done at the first time. Yes it is very difficult to have common ideas about international cyber security, because it is too many states and ideas and concepts are different which frameworks to use and which information security strategy implement. In this way CERT will play some of the role which will rise national security level. In my opinion such tasks can be separated, for example CERT can write manuals about malware analyses, how to prepare virtual environment, which technique use for static and dynamic analyses etc. Also management of incidents, t hay are really good in management incidents, how to get requests, through which process this request will go, how to reply and gather information and how to report them. In some case it is info, but it is really important how you will handle incidents. Such things must implemented in critical infrastructure. Prioritize of incident plays big role in cyber security. This is also important thing what CERT is doing. It is not only find and fix incident, but also you must realize and choose which incident much more critical and important. Because if you will fix incidents which don't are so important, it can harm many systems before you will even start to analyze it ant it will play on national security level. Also I think that first of all as a organization which is relayed to Cyber Security, CERT's first and critical role is to save people from cyber attacks which can be harmful for populations health or death. In our day cyber space can be used to achieve very terrible aims, which will kill thouthent of people. I am one hundred percent sure that cyber is one of the battlefield. And you can achieve many goals even without using physical contact. Such protection is very important and I can say that CERT is a part of this protections, because they prioritized all incidents. One of the small role of CERT also is to publish helpful information, articles and news about latest incidents. Providing such information will prevent not big amount of incidents, but at least some of them, because be in touch with latest information security news from trust source, in some way important, you can just come to your office and review this news, something can start you thinking about your situation, it can be really helpful. In some case it look like impossible to implement such things in real life, but many things 10 year ago was also impossible for us what we are using now, I mean we must start do something what will bring good result in a future. Nothing happens immediately, in case of the law related cyber space, will be very difficult to regulate and hold cyber space in secure.
5 Also I want to mention that such organizations like CERT's are not only connected with national security, this organizations are much more bigger, I would say that it is international level and in my point of view they are improving security not only on a national level but also on international, because cooperation with other organizations like other states CERT's help them to improve and high a level of security in other states also. I want to say that it is very difficult to say what is national cyber security? As cyber space don't have territory's, how to realize what is national and what is not? For example it is too many hosting and cloud services in many states. Can I say that I am a part of national security of the state where I am using cloud or hosting services? Or maybe I use this services for harm reasons. It is why I want to say that national security is linked with everything what is in a state. In this case the thread is inside state and it becomes easier to gather something. Imagen if one IT company using ISP service for cloud or hosting, where they can store information about sold hardware and software. And one of the important infrastructure using this IT company for outsourcing for hardware or software. If this information will misses to wrong hands. They will know what are you using and after that they will start preparing attacks and searching bugs end vulnerabilities of this hardware or software. I think that everything is connected and we must close our eyes for some things when it is retaliated to much more hight level like national security. I think that it is important to give power to such organizations like CERT, because the roles which they are playing in national cyber security is pretty big. And when we are speaking about national level of information security we cover everything what covers Information technology, and in real life it is everything. For lawyers it is difficult and hard job to understand and realize how it works in cyber space. But I think it must done, in some case we can apply some things at least from international law. I hop that in the future it will be more regulated and safe for users to use cyber space.
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
More informationCSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/05-2007
CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/05-2007 Written by Dennis Rand rand@csis.dk http://www.csis.dk Table of contents Table of contents...
More informationSecurity A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
More informationMcAfee.com Personal Firewall
McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...
More informationNCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.
NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities
More informationN-CAP Users Guide. Everything You Need to Know About Using the Internet! How Worms Spread via Email (and How to Avoid That)
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Worms Spread via Email (and How to Avoid That) How Worms Spread via Email (and How to Avoid That) Definitions of: A Virus: is
More informationCSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks - 5 month later Date: 19 th October 2007
CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks - 5 month later Date: 19 th October 2007 Written by Dennis Rand rand@csis.dk http://www.csis.dk Table of
More informationSimple. Smart. Professional. A 2BSecured Company
Cloud7 Managed Security Services Simple. Smart. Professional A 2BSecured Company Cloud7 is the Managed service division of 2bsecure What is security managed service? managed security services (MSS) are
More informationKaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com
Kaseya White Paper Endpoint Security Fighting Cyber Crime with Automated, Centralized Management www.kaseya.com To win the ongoing war against hackers and cyber criminals, IT professionals must do two
More informationThe Impact of Computer Engineering 1. The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015
The Impact of Computer Engineering 1 The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015 The Impact of Computer Engineering 2 Introduction My research project included: Talking
More informationCyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
More informationRSA Security Analytics
RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources
More informationInformation Collection on DDoS Attacks. Anna Claiborne Prolexic Technologies
Information Collection on DDoS Attacks Anna Claiborne Prolexic Technologies Statistics United States Secret Service report less than 0.1% of DDoS attacks ending in an arrest A Major US corporation lost
More informationWhat s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
More informationWHITE PAPER WHAT HAPPENED?
WHITE PAPER WHAT HAPPENED? ENSURING YOU HAVE THE DATA YOU NEED FOR EFFECTIVE FORENSICS AFTER A DATA BREACH Over the past ten years there have been more than 75 data breaches in which a million or more
More informationITAR Compliance Best Practices Guide
ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations
More informationDigital Barracuda Information Security Reports that the Risk from Viruses and Worms is Only the Tip of the Iceberg FACT SHEET
Digital Barracuda Information Security Worms is Only the Tip FACT SHEET from Viruses and Worms is Only the Tip Do you have security with teeth? You had better, because if the worms don t get you, the viruses
More informationINTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: victorkleo@live.com ABSTRACT Internet security
More informationCopyright (c) 2015 Christopher Small and The Art of Lawyering. All rights reserved.
Copyright (c) 2015 Christopher Small and The Art of Lawyering. All rights reserved. 1 In this special report, I ll be sharing with you the ten biggest mistakes that lawyers make when marketing their law
More informationOtas%serumquis%es%explibu%sanimet%et%aut%omnisse Otas%serumquis%es%explibu%sanimet%et%aut%omnisse%nimpore%rendae% nonecerum% NUCLEUS BVBA MATTIAS GENIAR SENIOR SYSTEM ENGINEER dolorem.% MATTIAS@NUCLEUS.BE
More informationAB 1149 Compliance: Data Security Best Practices
AB 1149 Compliance: Data Security Best Practices 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: AB 1149 is a new California
More informationDistributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.
Distributed Denial of Service (DDoS) attacks Imminent danger for financial systems Presented by Tata Communications Arbor Networks 1 Agenda Importance of DDoS for BFSI DDoS Industry Trends DDoS Technology
More informationTop Five Ways to Protect Your Network. A MainNerve Whitepaper
A MainNerve Whitepaper Overview The data security challenges within the business world have never been as challenging as they are today. Not only must organizations providers comply with stringent State
More informationMONTHLY WEBSITE MAINTENANCE PACKAGES
MONTHLY WEBSITE MAINTENANCE PACKAGES The security and maintenance of your website is serious business, and what you don t know can certainly hurt you. A hacked or spamvertised site can wreak havoc on search
More informationHOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
More informationCERT-GOV-GE Activities & International Partnerships
CERT-GOV-GE Activities & International Partnerships Zurich, Switzerland 2014 CERT-GOV-GE Manager David Kvatadze www.dea.gov.ge CERT-GOV-GE - Structural unit was formed within the Information Security and
More information3 Email Marketing Security Risks. How to combat the threats to the security of your Email Marketing Database
3 Email Marketing Security Risks How to combat the threats to the security of your Email Marketing Database Email Marketing Guide June 2013 Security Threats PROTECTING YOUR EMAIL DATABASE FROM HACKERS
More informationCOURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
More informationWHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber
More informationLinux and Law Enforcement
Linux and Law Enforcement Challenges and Opportunities Dr. Joshua I. James Digital Forensic Investigation Research Laboratory SoonChunHyang University Joshua@cybercrimetech.com http://forensics.sch.ac.kr
More information10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
More informationThis guide will go through the common ways that a user can make their computer more secure.
A beginners guide in how to make a Laptop/PC more secure. This guide will go through the common ways that a user can make their computer more secure. Here are the key points covered: 1) Device Password
More informationRoger s Cyber Security and Compliance Mini-Guide
Roger s Cyber Security and Compliance Mini-Guide A Mini Guide for Small and Medium Business and not for profit organisations. By Roger Smith Managed Service Provider and Cyber Security Coach R & I ICT
More informationInspection of Encrypted HTTPS Traffic
Technical Note Inspection of Encrypted HTTPS Traffic StoneGate version 5.0 SSL/TLS Inspection T e c h n i c a l N o t e I n s p e c t i o n o f E n c r y p t e d H T T P S T r a f f i c 1 Table of Contents
More informationSecurity Incidents And Trends In Croatia. Domagoj Klasić dklasic@cert.hr
Security Incidents And Trends In Croatia Domagoj Klasić dklasic@cert.hr Croatian National CERT About us Founded in 2008. in accordance with the Information Security Act We are a department of the Croatian
More informationN-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
More informationPART D NETWORK SERVICES
CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC
More informationDetailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
More informationUncover security risks on your enterprise network
Uncover security risks on your enterprise network Sign up for Check Point s on-site Security Checkup. About this presentation: The key message of this presentation is that organizations should sign up
More informationFinancial Services and Technology Forum 10 July 2013. TOPIC: Cyber Security
Financial Services and Technology Forum 10 July 2013 Panellists: TOPIC: Cyber Security MEP Christian Engström (Greens, Sweden) Emmanuel Cabau, DG CONNECT, European Commission Cathrin Bauer-Bulst, DG HOME,
More informationPractical guide for secure Christmas shopping. Navid
Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security
More informationCRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
More informationGlobal Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team The Internet is in the midst of a global network pandemic. Millions of computers
More informationCloud Computing Risks & Reality. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com
Cloud Computing Risks & Reality Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com What is Cloud Security The quality or state of being secure to be free from danger & minimize risk To be protected from
More informationDefensible Strategy To. Cyber Incident Response
Cyber Incident Response Defensible Strategy To Cyber Incident Response Cyber Incident Response Plans Every company should develop a written plan (cyber incident response plan) that identifies cyber attack
More informationGuide Antivirus. You wouldn t leave the door to your premises open at night. So why risk doing the same with your network?
You wouldn t leave the door to your premises open at night. So why risk doing the same with your network? Most businesses know the importance of installing antivirus products on their PCs to securely protect
More informationCurrent counter-measures and responses by CERTs
Current counter-measures and responses by CERTs Jeong, Hyun Cheol hcjung@kisa.or.kr April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure
More informationReferences NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
More informationData Security. So many businesses leave their data exposed, That doesn t mean you have to. 2014 Computerbilities, Inc.
Data Security So many businesses leave their data exposed, That doesn t mean you have to. 2014 Computerbilities, Inc. Table of Contents: 1. Introduction 3 2. Cybersecurity: The loopholes in the system
More informationOctober Is National Cyber Security Awareness Month!
(0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life
More informationCyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
More informationThe Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them
The Increasing Threat of Malware for Android Devices 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them INTRODUCTION If you own a smartphone running the Android operating system, like the
More informationKeyloggers ETHICAL HACKING EEL-4789 GROUP 2: WILLIAM LOPEZ HUMBERTO GUERRA ENIO PENA ERICK BARRERA JUAN SAYOL
Keyloggers ETHICAL HACKING EEL-4789 GROUP 2: WILLIAM LOPEZ HUMBERTO GUERRA ENIO PENA ERICK BARRERA JUAN SAYOL Contents Abstract: Keyloggers... 3 Introduction... 3 History... 4 Security... 4 Implementation...
More informationCountry Case Study on Incident Management Capabilities CERT-TCC, Tunisia
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia helmi.rais@ansi.tn helmi.rais@gmail.com Framework
More informationCloud and Security (Cloud hacked via Cloud) Lukas Grunwald
Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald About DN-Systems Global Consulting and Technology Services Planning Evaluation Auditing Operates own Security Lab Project Management Integral
More informationAvoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
More informationComputer Security Maintenance Information and Self-Check Activities
Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.
More informationEmerging Trends in Malware - Antivirus and Beyond
Malware White Paper April 2011 Emerging Trends in Malware - Antivirus and Beyond One need only listen to the news or read the latest Twitter and media updates to hear about cyber crime and be reminded
More informationCyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
More informationAvoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
More informationResearch Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era
Sponsored by Oracle Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era Introduction About Survey Respondents The Internet of Things (IoT) and the rise of
More informationEXIN Information Security Foundation based on ISO/IEC 27002. Sample Exam
EXIN Information Security Foundation based on ISO/IEC 27002 Sample Exam Edition June 2016 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored
More informationD m i t r y S l i n k o v, C I S M SWISS C Y B E R S TO R M 2015. Black market of cybercrime in Russia
D m i t r y S l i n k o v, C I S M SWISS C Y B E R S TO R M 2015 Black market of cybercrime in Russia WHOAMI Information Security Manager (Russia and CIS) Information Security Officer Information Security
More informationKASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection
KASPERSKY DDoS PROTECTION Protecting your business against financial and reputational losses A Distributed Denial of Service (DDoS) attack is one of the most popular weapons in the cybercriminals arsenal.
More informationFIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
More informationHow To Perform A Large Scale Attack On A Large Network
95 95 9. Exercise: Large Scale Incident Handling Main Objective Targeted Audience Total Duration Time Schedule The main objective of the exercise is to teach incident handlers the key information and actions
More informationNetwork that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE
Network that Know Rasmus Andersen Lead Security Sales Specialist North & RESE Email Gateway vendor CERT AV vendor Law enforcement Web Security Vendor Network security appliance vendor IT Department App
More informationDatacenter Hosting - The Best Form of Protection
Datacenter Hosting Scalable Technology and Insurance for Your Business nsacom.com Datacenter Hosting Scalable Technology and Insurance for Your Business Datacenter Hosting Gives You the Best of Both Worlds
More informationDenial of Service (DoS) Technical Primer
Denial of Service (DoS) Technical Primer Chris McNab Principal Consultant, Matta Security Limited chris.mcnab@trustmatta.com Topics Covered What is Denial of Service? Categories and types of Denial of
More informationAVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationAdvanced Persistent Threats
Advanced Persistent Threats Craig Harwood Channel Manager SADC and Indian Ocean Islands 1 Agenda Introduction Today s Threat landscape What is an Advance persistent Threat How are these crimes perpetrated
More informationHow To Perform A Large Scale Attack On A Large Computer System
CERT Exercises Toolset 91 9. Exercise: Large Scale Incident Handling Main Objective Targeted Audience Total Duration Time Schedule Frequency The main objective of the exercise is to teach incident handlers
More informationRemote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
More informationSECURITY SOLUTIONS AND SERVICES
SECURITY SOLUTIONS AND SERVICES OVERVIEW The Internet brings us closer together. Via Internet, the several of utilities are shared that also means many risks of information security are threatening users.
More informationWHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
More informationCHAPTER 10: COMPUTER SECURITY AND RISKS
CHAPTER 10: COMPUTER SECURITY AND RISKS Multiple Choice: 1. In a survey of more than 500 companies and government agencies, percent detected computer security breaches. A. 20 B. 75 C. 85 D. 99 Answer:
More informationCyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology
Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification
More informationResult of the Attitude Survey on Information Security
Presentation Result of the Attitude Survey on Information Security Conducted toward the companies Operating in Thailand February, 2009 Center of the International Cooperation for Computerization of Japan
More informationA Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
More informationOpen an attachment and bring down your network?
Open an attachment and bring down your network? Many people think this will never happen to them, but virus attacks can come from unlikely sources and can strike when you least expect it. They can wreak
More informationWhat You Should Know About Cloud- Based Data Backup
What You Should Know About Cloud- Based Data Backup An Executive s Guide to Data Backup and Disaster Recovery Matt Zeman 3Fold IT, LLC PO Box #1350 Grafton, WI 53024 Telephone: (844) 3Fold IT Email: Matt@3FoldIT.com
More informationThreat Intelligence. How to Implement Software-Defined Protection. Nir Naaman, CISSP Senior Security Architect
How to Implement Software-Defined Protection Nir Naaman, CISSP Senior Security Architect Threat Intelligence 1 The Spanish flu, 1918 killing at least 50-100 million people worldwide. 2 The H1N1 Pandemic,
More informationCyber Confrontation: Hackers Convincing Victory Over the Security Industry
Your texte here. Cyber Confrontation: Hackers Convincing Victory Over the Security Industry Ilia Kolochenko, High-Tech Bridge, CEO Regional Cyber Security Summit 20 th of April 2014 From where does the
More informationComputer Networks & Computer Security
Computer Networks & Computer Security Software Engineering 4C03 Project Report Hackers: Detection and Prevention Prof.: Dr. Kartik Krishnan Due Date: March 29 th, 2004 Modified: April 7 th, 2004 Std Name:
More informationDSL and Cable Modems: The Dangers of Having a Static IP Address
DSL and Cable Modems: The Dangers of Having a Static IP Address By Joe Edwards ECE 478 Spring 2000 1.0 Introduction As computer technology continues to rapidly progress, more and more people are abandoning
More informationTop tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
More informationSurviving the Ever Changing Threat Landscape
Surviving the Ever Changing Threat Landscape Kevin Jordan Cyber Security Specialist Dell GLBA FFIEC NCUA PCI HIPAA NERC CIP FISMA 700+ Percentage of U.S. adults who Federal named online and banking state
More informationLevel 3 Cambridge Technical in IT 05839/ 05840/ 05841/ 05842 Unit 3 Cyber security. Date Morning/Afternoon Time Allowed: 1 hour
SAMPLE ASSESSMENT MATERIAL Level 3 Cambridge Technical in IT 05839/ 05840/ 05841/ 05842 Unit 3 Cyber security Date Morning/Afternoon Time Allowed: 1 hour You must have: The Insert (clean copy case study)
More informationSociety for Information Management
Society for Information Management The Projected Top 5 Security Issues of 2010 Steve Erdman CSO and Staff Security Consultant of SecureState Network +, MCP Precursor 2009 has been a difficult year in Information
More informationUnderstanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them
Lab Exercises Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Review Questions 1) In class, we made the distinction between a front-door attack and
More informationCHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals
CHECK POINT Mobile Security Revolutionized [Restricted] ONLY for designated groups and individuals 2014 Check Point Software Technologies Ltd. 1 Rapidly Expanding Mobile Threats MOBILE THREATS are ESCALATING
More informationJort Kollerie SonicWALL
Jort Kollerie Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 68% of spend in private cloud solutions. - Bain and Dell 3 Confidential
More informationAssessing the strength of your security operating model
www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems
More informationHOW TO PROTECT YOUR BUSINESS AGAINST A CYBER ATTACK
HOW TO PROTECT YOUR BUSINESS AGAINST A CYBER ATTACK LIVE CHAT: QUESTIONS AND ANSWERS INTRODUCTION Any business that holds information is exposed to a cyber attack. The reality of doing business in 2015
More informationHong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
More informationTopic 1 Lesson 1: Importance of network security
Topic 1 Lesson 1: Importance of network security 1 Initial list of questions Why is network security so important? Why are today s networks so vulnerable? How does Melissa virus work? How does I love you
More informationBE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
More informationKorea s experience of massive DDoS attacks from Botnet
Korea s experience of massive DDoS attacks from Botnet April 12, 2011 Heung Youl YOUM Ph.D. SoonChunHyang University, Korea President, KIISC, Korea Vice-chairman, ITU-T SG 17 1 Table of Contents Overview
More informationInto the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
More informationRefog. Maxim Ananov, REFOG Help Desk
Refog Maxim Ananov, REFOG Help Desk 1. How does it work? Is it installed locally or does it work in the cloud? System administrator installs Refog Monitor on a computer that is to be used to. Installation
More information