Information Security: Trends and Issues December 2014
|
|
|
- Marshall Murphy
- 10 years ago
- Views:
Transcription
1 Learning goals Challenges in Information Security Prof. Bart Preneel COSIC KU Leuven Belgium Firstname.Lastname(at)esat.kuleuven.be December 2014 What are the goals for information security and privacy? What are the threats and causes that create these problems? Why is securing information systems hard? technical aspects non-technical aspects: legal, economical, psychological 1 2 Information processing PCs and LANs (10 7 ) mainframe (10 5 ) mechanical processing (10 4 ) manual processing the Internet of things, ubiquitous computing, pervasive computing, ambient intelligence (10 12 ) Internet and mobile (10 9 ) 3 4 Exponential growth Ray Kurzweil, KurzweilAI.net Human brain: ops and bits memory 2025: 1 computer can perform ops (2 53 ) 2013: RAM bits (1 Terabyte) cost 1000$ Outline COMSEC versus COMPUSEC IT Security threats Privacy risks e-business Taking a step backwards Non-technical dimension Conclusions 5 6 1
2 Military security terminology INFOSEC COMSEC: securing (electronic) communications COMPUSEC: computer security Information Collection Signal Intelligence (SIGINT) COMINT: communications intelligence traffic analysis ELINT: electronic intelligence TEMPEST: electromagnetic emanations Human Intelligence (HUMINT) Imagery Intelligence (IMINT) Measurement and Signature Intelligence (MASINT) Technical Intelligence (TECHINT) COMSEC pre-1915: manual encryption or simple devices 1917: one time pad 1915: rotor machines: (electro-)mechanical 1960 s: electronic encryption 1975: integrated hardware 1990: software Open Source Intelligence (OSINT) 7 8 COMSEC in practice wired SSL/TLS VPN: IPsec VOIP wireless GSM, 3G WLAN: WPA2 (RSN) PAN: Bluetooth, Zigbee 9 1 G (analog) COMSEC Confidentiality Data authentication Entity authentication 2 G (GSM) weak unilateral 3G WLAN TLS IPsec optional unilateral Skype not open not open not open/meet in the middle attack 10 Not end to end COMSEC: network security COMSEC: DNSSec fundamental protocols of the Internet do not have adequate security this is well understood, but there is no preventive patching panic response to ever improving attacks changing widely used protocols is hard DNS attack [Kaminsky, Black Hat 08] BGP attack [Kapela-Pilosov, Defcon 08] long and winding road (started in 1997) several attacks (e.g. cache poisoning [Kaminsky08]) several TLDs signed live in July 2010 for root Versign signed.com early 2011 More examples: IPV6 attacks SNMPv3 Bug [Wes Hardakar] Insecure SSL-VPN [Mike Zusman] Insecure Cookies [Mike Perry]
3 Use of crypto: COMPUSEC data at rest: hard disk (Bitlocker) database USB/memory card mobile devices secure execution TPM Trusted Execution Technology (TXT) ARM TrustZone COMPUSEC entity authentication access control protection of stored data: hard disk, USB device authentication and remote attestation correctness of execution sandboxing covert channels 14 Insider attacks COMPUSEC in practice Which technology would have stopped them? 15 Java sandboxing DRM Electronic payments: EMV Access control: Mifare TPM BitLocker Electronic ID cards E-voting E-auctions COMPUSEC is much harder than COMSEC 16 IT security threats Government interception Financial fraud End systems security (bugs, viruses, rootkits) Botnets SPAM Phishing Communications systems security Social networks Consumerization Cloud computing
4 Interception by governments 3. Traffic data (DNR) 1. PRISM (server) 2. Upstream (fiber) traffic data is not plaintext itself, but it is very informative it may contain URLs of websites it allows to map networks 6 June 2013: NSA collecting phone records of millions of Verizon customers daily Top secret court order requiring Verizon to hand over all call data shows scale of domestic surveillance under Obama EU: data retention directive (2006/24/EC) Muscular Snowden revelations (ctd) Most spectacular: active defense networks Quantum insertion: answer before the legitimate website inject malware in devices devices malware based on backdoors and 0-days (FoxAcid) supply chain subversion Translation in human terms: complete control of networks and systems, including bridging the air gaps Jan : In the preceding 30 days, field collectors had processed and sent back 181,280,466 new records including metadata, which would indicate who sent or received s and when, as well as content such as text, audio and video (from Yahoo! and Google) No longer deniable Oversight weak TEMPORA architecture (GCHQ) (1) Gain access to raw content: intercept (cable, satellite), hack, buy, ask. Turbulence Selectors Target Selectors (2) Selector based promotion Promoted Traffic Selectors Target Enrichment Slide credit: George Danezis, UCL Ring Buffer (4) Map Reduce Queries Queries Long Term Intel. Database 3 days:125 Petabyte (US$ 200M) Promoted Traffic (3) Standard Queries Tempora / Xks Meta- Data Signals Intelligence Translation, collation, Analysis, products Credit Card Fraud (USA) Fraud (Million US$) Source: Celent Communications, via Lafferty Publications : B$ total on-line Fraud rates 24 on-line (%) off-line (%) 4
5 Financial fraud SEPA : 1.16 billion EUR, 0.04% of transactions Share of Card Not Present increased to more than 50% UK Source: APACS 2010 Virus: spread via executables (software, Word documents, ) Worm: spread via network Trojan horse: secret malicious functionality Rootkit: control computer Ransomeware: encrypt Malware 25 Transmission: , Internet, intranet, web pages, GSM, 3G, Bluetooth, WiFi, USB drives, CDs, memory cards, 26 Proof of concept: 1970s First threat: mid 1980s Explosion: mid 1990s 6.3 Million in 2011 Virus Some anti-virus companies have stopped counting in 2009 Malware trends Kaspersky volution_q2_2013 detected and neutralized almost 1 billion malicious objects millions of malicious URLs mobile malware reached 100K Sophos growth: Facebook, cloud, Android, OS X polymorphism and targeting Source: F-Secure APT Advanced Persistent Threats Targeted theft or damage, but less visible Google Aurora Q3/Q Stuxnet July 2010 Duqu September 2011 Flame May 2012 Red October October 2012 Regin November Stuxnet used four 0-day vulnerabilities, 2 specific for Siemens PLCs PLC rootkit 2 stolen private keys to sign its files 7 forms of replication (rather than 2) bridged air gap via USB meant to destroy: from espionage to sabotage (high speed spinning of centrifugres deception: recorded normal operation and played them back could disable the kill switch of the device (to prevent operator intervention) affected 20% of nuclear centrifuges in Iran Is this the tip of the iceberg? 30 5
6 Botnets SPAM in 2012 Application: rent for SPAM, hacking, DDOS (distributed denial of service) Attacker controls computers SPAM makes up 65% of the Internet traffic 7% in 2001; 90-95% around 2005; 82% in billion SPAM messages/day 5% carries malware 40% of all social media accounts are created by spammers billions of dollars spent on spam defense cost to large company a few million $/year cost to society vector for malware spoiling as communication tool: time and attention ISP/mobile fees storage and bandwidth Bill Gates (2004): Spam Will Be 'Solved' In 2 Years SPAM 2013 statistics SPAM content [Source: M86 security lab] Latest trend: on-line casinos SPAM by botnet [Source: M86 security lab] 33 SPAM and economics list of good names cost per message: ~ ; total cost hit ratio: 10-3 to 10-4 : 30, ,000 responses SPAM only works because users respond cost per click is 0.30 compared to 0.07 for commercial advertising this explains reduction botnet: machines for sale for a few dozen EURO can be used for SPAM and for DDOS attacks most SPAM messages come from a dozen botnets see e.g., Phishing reports received Jan 05-March 10 (source Oct. 2004: Phishing 0.1%-1% of is phishing related more than 31,000 new phishing sites per month peak of 41,000 in 2009; only 25,000 in 2006 consumers react very naively (human factor) even experts can t distinguish some phishing messages from real ones direct losses from Phishing costed banks and credit card issuers $2.8 Billion per year (e.g., theft, call center activity) targeted attack: spear phishing 36 6
7 Phishing targets by industry Spying: war driving and Bluetooth Bluesniper rifle (2004): 10m becomes 1km Spying: surveillance software and key loggers 99.95$ at eblaster.com 67.88$ at keyllama.com can memorize 8 MByte key presses Social networks vector for malware Facebook rogue application toolkit social engineering leaking company secrets personal privacy risk $ WiFi Pineapple 4 Mbyte key PS/2 key logger hard to detect 74.88$ at keyllama.com establish your organization s presence before anyone else does Consumerization Personal smart phones, tablets, enter the workplace, not provisioned by company March 2011 survey by Vanson Bourne of 300 CIOs of companies with more than 3000 employees 67% concerned about protecting their corporate data since WikiLeaks 78% don t know what devices are connected to the corporate network 77% don t know what data is lurking on all of those devices. 33% can track these devices 50% can secure these devices should they be lost or stolen 75% security headaches are actually caused by the mobile devices 41 Cloud security: is it different? What s the same can do intrusion detection/monitoring can encrypt stored data availability? Service/network/power - SLA What s different AV could be easier pen testing? forensics? personnel security localization Privacy Large and attractive target What if someone takes over the infrastructure management? VMWare isn't an additional security layer, it's just another layer to find bugs in [Kostya Kortchinsky] 42 7
8 Outline COMSEC versus COMPUSEC IT Security threats Privacy risks e-business Taking a step backwards Non-technical dimension Conclusions Largest (known) privacy breaches 152,000, Adobe 145,000, /03 Ebay 130,000, Heartland Payment Systems 94,000, TJX Companies Inc. 90,000, TRW, Sears Roebuck 77,000, Sony Corporation (120 MEURO) 76,000, ?? JP Morgan 76,000, National Archives and Records Administration 70,000, Target credit card data 50,000, LivingSocial (daily deals) 50,000, Evernote 40,000, CardSystems, Visa, MasterCard, Amex 35,000, SK Communications, Nate, Cyworld 32,000, RockYou Inc. 26,500, U.S. Department of Veterans Affairs 25,000, HM Revenue and Customs, TNT (CD) 43 only 10K-500K in individual health care breaches (total a few million) Data loss: lost media 45 Privacy and technology search engines XML biometry location (GSM!!, GPS) printers DRM spyware and cookies huge databases data mining video cameras RFID PET: Privacy Enhancing Technologies proxies pseudonyms cryptology mixes credentials 46 Privacy violations Security for everyone key escrow Government Users privacy Industry DRM 47 warning: this is an oversimplification e.g. privacy is a security property 48 8
9 The privacy debate Business perspective on security user: convenience and improved service businesses: protect company assets ( , DRM) price discrimination law enforcement: fraud, theft, stalking, counterfeiting national security privacy is essential for a democracy legislation technology Direct Losses theft money confidential information computer resources productivity loss data corruption recovery and continuity Indirect losses secondary loss sales competitive advantage brand legal exposure privacy regulations legal obligations contract breach U.S. E-commerce (retail) Q3 2014: e-commerce (retail): 78 B$ total (retail) commerce: B$ Taking a step backwards computer security research is about 40 years old thousands of researchers, ten thousands of scientific articles, thousands of security products and services Gartner: security services spending 35 B$ in 2011 increased accountability [Sarbanes-Oxley 02] [Basel II 04] critical infrastructure protection [Adi Shamir 07] We are winning yesterday s information security battles, but we are losing the war. Security gets worse by a factor of 2 every year. Somehow humanity can deal with imperfect systems Walled fortress closed doors, physical isolation security as protection defend data, networks and systems IT environment Open metropolis open, unbounded, interconnected trust as an enabler share content and resources protect data Feudal system impose central rules data for protection loss of control Complexity of technology IC: 2 B transistors Windows/Linux: M lines of code Application: 1-20 M lines of code Internet: 3 B computers/tablets Mobile phones: 6 B Securing a complex system: difficult, expensive and slow Fast evolution of ICT world 54 9
10 Complexity and security do not mix O/S network architecture applications mobile code services: XML, SOAP, VoIP always on connections IP everywhere K Vista Million lines of code CERT/CC Statistics due to automated attack tools and growing complexity, collection of statistics has stopped Incidents Vulnerabilities Mail handled 1 million Source: CERT 2008 Window of exposure Intruder knowledge vs. attack sophistication asymmetric warfare patched popular announce discover Life cycle of a vulnerability time Nature of threat has changed Legal complexity From hacking for fun or bragging rights to hacking for money to hacking by governments Underground ecosystem Tools to create malware and find vulnerabilities Finding vulnerabilities and writing exploits Using exploits to get valuable data credit cards, social security numbers, company secrets Turning bits into money: credit card scams, money mules, blackmailing 59 Legislation is national compliance drives security Industry is in part national Attackers operation on a worldwide scale International coordination suboptimal NATO, OECD, Council of Europe, EU (ENISA) Militarization of cybersecurity? 60 10
11 Economic problems in ICT world: market share is more important than security Success requires 40-80% adoption market of lemons: user cannot distinguish between secure and insecure products players do not want to pay for security or privacy of others ( tragedy of the commons ): market failure botnets payment systems software exploits Humans have problems making security decisions always a tradeoff Security costs time, memory, effort humans are very bad at making e-security decisions our brains have developed to take security decisions in the African highlands about 100,000 years ago stay or flee reflex in amygdala (very fast) heuristics in neocortex large gap between being secure and feeling secure exploited by politics and marketing any sufficiently advanced technology is indistinguishable from magic [Arthur C Clarke 1961] R. Anderson: Why Information Security is Hard. An Economic Perspective, 2006, R. Anderson, R. Böhme, R. Clayton, T. Moore, Security Economics and the B. Schneier, The Psychology of Security, 2008, Internal Market, report for ENISA, How do we judge risks? Usability issues overestimate spectacular rare personal outside our control in the news intentional Immediate new and unfamiliar w.r.t. kids and loves ones underestimate daily frequent anonymous under our control unmentioned natural long term familiar w.r.t. ourselves From risk avoidance to risk management accept the risk reduce risk with technology reduce risk with procedures reduce risk with insurance reduce risk with disclaimers transfer the risk Process approach to security prevention response detection
12 Information security: a puzzle Audit/logging/Intr. Det. Network Security Logical security Security Policy Physical Security Secure Operating System Cryptology Organisational Security Personnel Security 67 12
Great ideas, big data and little privacy? Bart Preneel iminds and COSIC KU Leuven
Great ideas, big data and little privacy? Bart Preneel iminds and COSIC KU Leuven 2 3 NSA calls the iphone users public 'zombies' who pay for their own surveillance 4 Snowden revelations NSA: Collect it
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
The Information Security Problem
Chapter 10 Objectives Describe the major concepts and terminology of EC security. Understand phishing and its relationship to financial crimes. Describe the information assurance security principles. Identify
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
Cyber liability threats, trends and pointers for the future
Cyber liability threats, trends and pointers for the future Tim Smith Partner, BLM t: 020 7865 3313 e: [email protected] February 2013 Cyber liability threats, trends and pointers for the future The
When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald
Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald About DN-Systems Global Consulting and Technology Services Planning Evaluation Auditing Operates own Security Lab Project Management Integral
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
E-Business, E-Commerce
E-Business, E-Commerce Lecture Outline 11 Instructor: Kevin Robertson Introduction to Information Systems Explain the differences between extranets and intranets as well as show how organizations utilize
Security strategies to stay off the Børsen front page
Security strategies to stay off the Børsen front page Steve Durkin, Channel Director for Europe, Q1 Labs, an IBM Company 1 2012 IBM Corporation Given the dynamic nature of the challenge, measuring the
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014
Knowing Your Enemy How Your Business is Attacked Andrew Rogoyski June 2014 Why Cyber is the New Security 1986: Lawrence Berkeley NL discovers attempt to copy US Government Information on Arpanet 1988:
Firewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
Jort Kollerie SonicWALL
Jort Kollerie Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 68% of spend in private cloud solutions. - Bain and Dell 3 Confidential
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure.
Data Center security trends
Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
GlobalSign Malware Monitoring
GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...
IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA
IT TRENDS AND FUTURE CONSIDERATIONS Paul Rainbow CPA, CISA, CIA, CISSP, CTGA AGENDA BYOD Cloud Computing PCI Fraud Internet Banking Questions The Mobile Explosion Mobile traffic data in 2011 was nearly
Emerging Security Technological Threats
Emerging Security Technological Threats Jamie Gillespie Training and Education Team Leader, AusCERT About AusCERT Australia s national CERT Collect, monitor, advise on threats and vulnerabilities Incident
Cyber Security and Critical Information Infrastructure
Cyber Security and Critical Information Infrastructure Dr. Gulshan Rai Director General Indian Computer Emergency Response Team (CERT- In) grai [at] cert-in.org.in The Complexity of Today s Network Changes
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall A FORTINET WHITE PAPER www.fortinet.com Introduction Denial of Service attacks are rapidly becoming a popular attack vector used
If you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 If you know the enemy and know yourself, you
Almost 400 million people 1 fall victim to cybercrime every year.
400,000000 Almost 400 million people 1 fall victim to cybercrime every year. A common way for criminals to attack people is via websites, unfortunately this includes legitimate sites that have been hacked
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led
Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Course Description This class will immerse the student into an interactive environment where they will
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd [email protected]
Protection against DDoS and WEB attacks Michael Soukonnik Radware Ltd [email protected] Landscape Ponemon Research 2012: Cyber security threats Cyber security threats according to risk mitigation priority
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
ENDPOINT SECURITY WHITE PAPER. Endpoint Security and Advanced Persistent Threats WWW.COMODO.COM
WHITE PAPER Endpoint Security and Advanced Persistent Threats The Invisible Threat They re out there waiting. Sitting at their computers hoping for you to make a mistake. And you will. Because no one is
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
6. ecommerce Security and Payment Systems. Alexander Nikov. Teaching Objectives. Video: Online Banking, Is It Secure?
INFO 3435 ecommerce 6. ecommerce Security and Payment Systems Alexander Nikov Teaching Objectives Explain the scope of ecommerce crime and security problems. Describe the key dimensions of e-commerce security.
Chapter 15: Computer and Network Security
Chapter 15: Computer and Network Security Complete CompTIA A+ Guide to PCs, 6e What is in a security policy Mobile device security methods and devices To perform operating system and data protection How
Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013
Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational
Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:[email protected] Outline of Information Security Introduction Impact of information Need
Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee
Web 2.0 and Data Protection Paul Tsang Security Consultant McAfee Criminal Motivators For Profit Targeted Attacks Cyber Warfare (Credit Cards, PII, Criminal Infrastructure) (Nation-State Secrets, Trade
EECS 588: Computer and Network Security. Introduction January 14, 2014
EECS 588: Computer and Network Security Introduction January 14, 2014 Today s Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components of your grade
OCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Current Threat Scenario and Recent Attack Trends
Current Threat Scenario and Recent Attack Trends Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In) Objectives Current Cyber space Nature of cyberspace and associated risks
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
Vulnerability Assessment & Compliance
www.pwc.com Vulnerability Assessment & Compliance August 3 rd, 2011 Building trust through Information security* Citizen-Centric egovernment state Consultantion workshop Agenda VAPT What and Why Threats
Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat
Addressing the blind spots in your security strategy BT, Venafi & Blue Coat Agenda Welcome & Introductions Phil Rodrigues, Director of Security Architecture, Asia Pacific, BT A blueprint for the perfect
Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
F-Secure Internet Security 2014 Data Transfer Declaration
F-Secure Internet Security 2014 Data Transfer Declaration The product s impact on privacy and bandwidth usage F-Secure Corporation April 15 th 2014 Table of Contents Version history... 3 Abstract... 3
Cybercrimes: A Multidisciplinary Analysis
Sumit Ghosh Elliot Turrini Editors Cybercrimes: A Multidisciplinary Analysis fyj Springer Part I Introducing Cybercrimes 1 A Pragmatic, Experiential Definition of Computer Crimes 3 1.1 Introducing Computer
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. May 2012 Agenda Intel + McAfee: What it means Computing trends
Practical Steps To Securing Process Control Networks
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
