Introduction to Cyber Defense Competition. Module 16
|
|
|
- Brendan Tucker
- 10 years ago
- Views:
Transcription
1 Introduction to Cyber Defense Competition Module 16
2 Objectives of the CDC Establish a safe and functional environment that: Encourages students to discover the applied meaning of information/cyber security concepts Facilitates the development of operational environments for which students design, implement and manage its security controls Enhances mastery of security concepts, practices and skills by compressing the time between design and rigorous realistic security-threat based testing Develops practical experiences that will inform future learning and decision making relevant to real operational environments 2
3 CDC Experience Defenders, the Blue Team: Build and secure an IT environment On attack day, defenders operate and defend their IT environment under nearly constant threat conditions Attackers, the Red Team, penetrate defenses to acquire flags located on key systems in each Blue Team environment Blue Teams compete by attempting to accumulate the most points 3
4 CDC Environment Two Environments Virtual VMWare-based platform hosts IT environments competitors will defend ISEAGE residing on another VMWare platform emulates the entire Internet Physical All competitors assemble in their teams in a common space Attackers, Red Team, will be located in another room 4
5 Competition Roles Four roles or teams Blue Team Competitors who defend their environments from attack Red Team Experienced penetration testers and ethical attackers Green Team Volunteers who behave as common users of the services provided by the Blue Team White Team Organizers, technical support and judges of the CDC 5
6 Role Objectives Blue Teams build and defend their IT environment Red Team attacks the Blue Teams in order for Blue Teams to take stock in their defensive skills and understanding Green Team performs the role of service users (Blue Teams customers). Their activity gives purpose to Blue Team environments and source of background activity clutter in which the Red Team can hide White Team performs the functions of event coordination, judging and technology management 6
7 Rules Each role or team is governed by rules Training focus is on the rules that govern the Blue Team 7
8 CDC Rules for Blue Teams Must provide access to all scenario defined public services to all IP addresses and networks Must place specially crafted flag files in locations specified by the scenario Flags are symbols that represent data commonly located in the specific locations They may only be protected to the same level as other files within the directories they reside These files must remain in the same form as provided and its file name must remain as specified in the scenario description A flag found to be missing will be considered captured unless the Blue Team can prove otherwise 8
9 CDC Rules for Blue Teams Some scenario specified information provided by users, Green Team, is valued, and loss of this information to the attackers results in a loss of points User credentials (usernames and passwords) for public services will be provided and must be enabled They will be used by the Green Team Passwords may not be changed without permission from the Green Team leader 9
10 CDC Rules for Blue Team Prior to start of the competition each team must submit environment documentation that contains: Network Diagram(s) Operating System list Versions and services hosted on these OSes IP address lists Documenting any NATed addresses Description of the measures taken to secure the environment Any other preparations you feel the White Team should consider while judging 10
11 CDC Rules for Blue Team User documentation is required Provide user instructions on how to use the services provided Provide a contact that allows users to provide you potentially valuable feedback Both documents must be provided as a PDF and submitted before the competition Professionalism is expected Be clear and concise in your explanations 11
12 CDC Rules for Blue Team During the Attack Phase: Facilitate communications between yourselves and the Green Team Green team may communicate via or in-person announcements In-person announcements require one team member to leave the team to attend the announcement meeting Green team flags will be placed by users on your systems These flags represent valuable information and successful placement is a sign of the functionality and usability of the services your team is providing Users will check periodically for those flags throughout the remainder of the competition Be sure they can get to them Response rules Long-term blocking of specific IP addresses or IP address ranges is prohibited Temporary port blocking and account lockout is permitted Temporary security-policy violation based blocking must be documented in the environment documentation 12
13 CDC Rules for Blue Team During the Attack Phase (continued): Service availability will be measured throughout the attack phase and will be scored Intrusion Summary Reports Reports are helpful for earning points for your team Reports may be submitted every two hours or defined schedule Reports summarize any identified intrusions, your team s assessment of their impact and your team s response to these intrusions in order to minimize their impact and risk See the scoring section for details on point assignments Blue Teams may not perform offensive actions towards fellow competitors or the CDC environment, such as the ISEAGE infrastructure Penalties are loss of points or disqualification Blue Teams may not receive help from anyone not a registered member of the team during the Attack Phase Blue Team members may not contact Green Team or Red Team members without going through the Green Team or White Team leaders 13
14 Scoring Scoring is managed by an ISEAGE service called iscore Document submission is done via iscore Scoring objectives breakdown by phases Preparation Focus is on design and documentation Attack phase Focus is on security operations: controls management, detection and response Rewards given for documentation, service availability, service usability and user support 14
15 Scoring Phase Category Weight Description Preparation Green Team Documentation 5% User documentation submittedto iscore prior to Attack Phase Preparation White Team Documentation 5% IT environment and controls design documentation submitted to iscore prior to Attack Phase Attack Service Availability 15% iscore scans for service availability every 5 10 minutes Attack Intrusion Reports 5% Summary of intrusion detection efforts and responses, submittedto iscore Attack RedTeam Evaluation 10% Scoring based on categories: preparations, response, additional factors Attack Red and Blue Flags 30% Penalties for losing Blue flags and Red Team s ability to plant Red flags Attack Green Usability 15% Scoring based on Green Team s ability to use the functionality provided by the public services. Scenario compliance is also investigated Attack Green Team Anomalies 15% Rewards for voluntarily servicing Green Team requests for support and accepting their challenges. They may be costly distractions or jeopardize your environment (e.g. permission changes) 15
16 Scoring White Team Documentation Description of the implemented IT environment and security controls 5% contribution to final score Up to 100 points awarded Detail (0-40 pts), Professionalism (0-30 pts), Supporting diagrams, figures and tables (0-20 pts), Effectiveness of design (0-10 pts) 16
17 Scoring Green Team Documentation User documentation that helps users use the services and environment you designed 5% contribution to final score Up to 100 points awarded Detail (0-20 pts), Professionalism (0-20 pts), Supporting diagrams, figures and graphics (0-20 pts), Clarity (0-40 pts) 17
18 Scoring Service Availability Availability of public services during Attack Phase 15% contribution to final score Scans for service every 5-10 minutes 1 point awarded for every service running during the scan 18
19 Scoring Intrusion Reports Describing any intrusions detected and the response actions taken 5% contribution to final score Reports are submitted on a set schedule. Reports may not be submitted more frequently Up to 25 points per report will be awarded as follows: Detail (0-7 pts), Insightful analysis (0-5 pts), Supporting evidence (0-5 pts), Mitigating actions (0-8 pts) 19
20 Scoring Red Team Evaluation Red Team s assessment of your team s performance 10% contribution to final score Assessment over three categories Up to 100 points awarded on Blue Team's security preparations based on the criteria of whether they would be acceptable in real-world environments in terms of technical appropriateness and political/business acceptability Up to 100 points awarded on Blue Team's responses to attacks based on criterion of whether the responses would have been acceptable in a real-world setting Up to 50 points for a Blue Team's performance regarding: physical security, social engineering, professionalism and factors judges may consider noteworthy 20
21 Scoring Red and Blue Flags A measure of compromise Lost blue flags represent data theft and planting of flags, red flags, represent host integrity compromise 30% contribution to final score Loss of any the assigned "blue" flags results in 50 points lost per flag. "Red" flags are planted by the Red Team and each time they are successful the Blue Team loses 50 points. As many as 25 points can be earned back by documenting Your understanding of the attack, The weaknesses that resulted in the successful capture or planting of a flag How the team would prevent the attack in the future. The Red Team judges the documentation on the Blue Team's accuracy of understanding the attack. 21
22 Scoring Green Usability A measure of the functional performance of your IT environment 15% contribution to final score Green Team will perform 2-4 full service usability checks, using the provided user documentation, over the period of the Attack Phase. Full service usability involves users using services to achieve scenario oriented objectives Green Team verifies the environment complies with requirements specified in the competition scenario. Many listed requirements under a host description within the scenario description are assigned a point value Compliance to a scored requirement will result in receiving points Not all requirements are assigned a point value, be sure to comply with the scenario to ensure receiving all the points possible 22
23 Scoring Green Usability Shell Server Scenario Requirements: Users should be allowed at least 1GB of storage on this server (even though they may not use that much). File sizes must be able to grow to 250MB, as some users need to store large amounts of data on this system. Users should be able to have at least 25 processes. SSH/SFTP should be running on standard port 22 SSH/SFTP should be offered via the DNS name shell.siten.cdc.com Users must be able to compile and execute C, C++, Java, and Python code Administrators (ben and nolan) must be able to use sudo to run commands as root User files must be backed up 23
24 Scoring Green Team Anomalies Introduced distractions both from a technical operational and human interaction perspectives 15% contribution to final score Green team will generate a series of user-oriented requests or security challenges that are common in operational environments. Points are awarded for servicing these "anomalies", but servicing them is voluntary. Partial points will be awarded for some of the anomalies that allow for meaningful partial completion Be aware that Green Team requests may come at a price. Request may ultimately reduce the security posture of a service or host Request may distract team members from response activities 24
25 Scoring Penalties Blue flag loss and Red flag planting results in a 50 point per flag penalty Late White and Green Team documentation, Documents due prior to the start of the Attack Phase, Results in a penalty of 25% document-score reduction for each document that is late Additional 25% document-score reductions will occur after each subsequent 30 minute period past the deadline Restore image penalty of 75 points In the event a VM image must be reinstalled by the White Team Manage the provided VM s so that you can restore a CDC relevant image to its original state using copies and snapshots Offensive action towards fellow competitors and ISEAGE infrastructure Number of points lost is not specified, but disqualification is a possible penalty. Penalty of 500 points for receiving external help during the Attack Phase Only registered team members and advisers and mentors may contribute to a team s efforts Penalty for inconsiderate or irresponsible use of the CDC environment Unacceptable attributable activity that comes to the attention of the White Team The size of the penalties is not specified allowing for the White Team to pick the appropriate size of penalty 25
26 Challenge Scenario Technology, rules, roles and scoring objectives provide the CDC framework The challenge scenario operates within the framework and changes from one CDC to the next Challenge scenario provides: Design and operating context Useful for interpreting priorities Useful for interpreting observed activities Useful for assessing response actions Useful for determining the value of information assets Scenario specific rules, scoring and penalties, if necessary 26
CyberNEXS Global Services
CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
What is Penetration Testing?
White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing? Penetration testing is the process of identifying security gaps in your IT infrastructure by mimicking
Penetration Testing. Presented by
Penetration Testing Presented by Roadmap Introduction to Pen Testing Types of Pen Testing Approach and Methodology Side Effects Demonstration Questions Introduction and Fundamentals Penetration Testing
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
Contestant Requirements:
2014 Overview Why Participate? Explore: Discover the world of cybersecurity Encourage: Motivate participants towards cybersecurity careers Educate: Learn and improve cybersecurity skills Enhance: Teamwork,
ISERink Installation Guide
ISERink Installation Guide Version 1.1 January 27, 2015 First developed to support cyber defense competitions (CDCs), ISERink is a virtual laboratory environment that allows students an opportunity to
Project 2: Penetration Testing (Phase II)
Project 2: Penetration Testing (Phase II) CS 161 - Joseph/Tygar November 17, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report 28 September 2012 Submitted to: Donald Lafleur IS Audit Manager ND State Auditor
Vulnerability analysis
Vulnerability analysis License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents License Contents
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Digital Pathways. Penetration Testing
Penetration Testing [email protected] Penetration testing, vulnerability tests, assurance projects, ethical hacking it all means broadly the same thing; testing a corporate network to determine
13.1 Backup virtual machines running on VMware ESXi / ESX Server
13 Backup / Restore VMware Virtual Machines Tomahawk Pro This chapter describes how to backup and restore virtual machines running on VMware ESX, ESXi Server or VMware Server 2.0. 13.1 Backup virtual machines
IDS and Penetration Testing Lab ISA656 (Attacker)
IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible
Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201
Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
Cyber Defense Operations Graduate Certificate
The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Top 20 Critical Security Controls
Top 20 Critical Security Controls July 2015 Contents Compliance Guide 01 02 03 04 Introduction 1 How Rapid7 Can Help 2 Rapid7 Solutions for the Critical Controls 3 About Rapid7 11 01 INTRODUCTION The Need
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning
Extreme Networks Security Analytics G2 Risk Manager
DATA SHEET Extreme Networks Security Analytics G2 Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance HIGHLIGHTS Visualize current and potential
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Guide for Designing Cyber Security Exercises
Guide for Designing Cyber Security Exercises VICTOR-VALERIU PATRICIU Computer Science Department Military Technical Academy Bucharest, Bd. George Cosbuc, no. 81-83 ROMANIA [email protected] ADRIAN
Security-as-a-Service (Sec-aaS) Framework. Service Introduction
Security-as-a-Service (Sec-aaS) Framework Service Introduction Need of Information Security Program In current high-tech environment, we are getting more dependent on information systems. This dependency
AUTOMATED PENETRATION TESTING PRODUCTS
AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI) EXECUTIVE SUMMARY This paper will help you justify the need for automated penetration testing software and demonstrate
Cyber R &D Research Roundtable
Cyber R &D Research Roundtable 2 May 2013 N A T I O N A L S E C U R I T Y E N E R G Y & E N V I R O N M E N T H E A L T H C Y B E R S E C U R I T Y Changing Environment Rapidly Evolving Threat Changes
Self assessment tool. The Leadership Framework. Leadership Academy
The Leadership Framework Self assessment tool Leadership in the health and care services is about delivering high quality services to patients by: demonstrating personal qualities working with others managing
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
When a testbed does more than testing
When a testbed does more than testing The Internet-Scale Event Attack and Generation Environment (ISEAGE) providing learning and synthesizing experiences for cyber security students. Julie A. Rursch, Doug
Threat Intelligence Pty Ltd [email protected] 1300 809 437. Specialist Security Training Catalogue
Threat Intelligence Pty Ltd [email protected] 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?
During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) 192.168.0.2 /24
Introduction The Network Vulnerabilities module provides you with the instruction and Server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:
Penetration Testing. Security Testing
Penetration Testing Gleneesha Johnson Advanced Topics in Software Testing Fall 2004 Security Testing Method of risk evaluation Testing security mechanisms to ensure that their functionality is properly
Hackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
Foundstone ERS remediation System
Expediting Incident Response with Foundstone ERS Foundstone Inc. August, 2003 Enterprise Risk Solutions Platform Supports Successful Response and Remediation Introduction The Foundstone Enterprise Risk
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
Department of Homeland Security
Department of Homeland Security National Cybersecurity Assessments & Technical Services (NCATS) Service Overview, Success and Challenges 3/18/2016 1 Agenda Discussion about NCATS Current Programs and Services
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
The Nexpose Expert System
Technical Paper The Nexpose Expert System Using an Expert System for Deeper Vulnerability Scanning Executive Summary This paper explains how Rapid7 Nexpose uses an expert system to achieve better results
A Love Affair: Cyber Security, Big-data and Risk
A Love Affair: Cyber Security, Big-data and Risk Mark Seward, Senior Director Security and Compliance, Splunk Inc. Professional Techniques - Session 31 Security what s at stake On average, organizations
INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:
PENETRATION TESTING A SYSTEMATIC APPROACH INTRODUCTION: The basic idea behind writing this article was to put forward a systematic approach that needs to be followed to perform a successful penetration
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
ASDI Full Audit Guideline Federal Aviation Administration
ASDI Full Audit Guideline Federal Aviation Administration Purpose of this Document This document is intended to provide guidance on the contents of the Aircraft Situation Display to Industry (ASDI) full
IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection
IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection Description Lab flow At the end of this lab, you should be able to Discover how to harness the power and capabilities
ICTN 4040. Enterprise Database Security Issues and Solutions
Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of
How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How
Course Title: Penetration Testing: Network & Perimeter Testing
Course Title: Penetration Testing: Network & Perimeter Testing Page 1 of 7 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics
SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES *
SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES * Alexandru G. Bardas and Xinming Ou Computing and Information Sciences Kansas State University Manhattan, KS 66506 [email protected], [email protected]
Cyber Exercises, Small and Large
First International Conference on Cyber Crisis Cooperation: Cyber Exercises 27 June 2012 Cyber Exercises, Small and Large Commander Mike Bilzor Computer Science Department U.S. Naval Academy Annpolis,
The Open Cyber Challenge Platform *
The Open Cyber Challenge Platform * Jacob Fonseca, Kevin Bryan, Lisa DiPippo, Victor Fay-Wolfe * Supported By The U.S. National Science Foundation grants: Federal Cyber Service Scholarship For Service
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
Signiant Agent installation
Signiant Agent installation Release 11.3.0 March 2015 ABSTRACT Guidelines to install the Signiant Agent software for the WCPApp. The following instructions are adapted from the Signiant original documentation
Spigit, Inc. Web Application Vulnerability Assessment/Penetration Test. Prepared By: Accuvant LABS
Web Application Vulnerability Assessment/enetration Test repared By: Accuvant LABS November 20, 2012 Web Application Vulnerability Assessment/enetration Test Introduction Defending the enterprise against
SECURING SELF-SERVICE PASSWORD RESET
SECURING SELF-SERVICE PASSWORD RESET FUNCTIONALITY IN WEB APPLICATIONS David A. Shpritz July, 2010 INTRODUCTION Many web applications requiring user authentication also provide self-service password reset
White Paper The Dynamic Nature of Virtualization Security
White Paper The Dynamic Nature of Virtualization Security The need for real-time vulnerability management and risk assessment Introduction Virtualization is radically shifting how enterprises deploy, deliver,
IDS and Penetration Testing Lab ISA 674
IDS and Penetration Testing Lab ISA 674 Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible Use
Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 3.0 to 3.1
Payment Card Industry (PCI) Data Security Standard Summary of Changes from PCI DSS Version 3.0 to 3.1 April 2015 Introduction This document provides a summary of changes from PCI DSS v3.0 to PCI DSS v3.1.
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011
NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011 Executive Summary BACKGROUND The NYS Local Government Vulnerability Scanning Project was funded by a U.S. Department of Homeland Security
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
Continuous Penetration Testing
Continuous Penetration Testing SyCom Technologies 1.0 Continuous Penetration Testing Imagine a service that continuously monitors and reports on any new threats that emerge real time and provides a tactical
JAMF Software Server Installation Guide for Linux. Version 8.6
JAMF Software Server Installation Guide for Linux Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate.
Microsoft Technologies
NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use
Payment Card Industry (PCI) Penetration Testing Standard
Payment Card Industry (PCI) Penetration Testing Standard Issued Date: 14 May 2015 Effective Date: 14 May 2015 Purpose This standard outlines penetration-testing requirements for the university's Payment
Seven Strategies to Defend ICSs
INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take
Building a Penetration Testing Virtual Computer Laboratory
Building a Penetration Testing Virtual Computer Laboratory User Guide 1 A. Table of Contents Collaborative Virtual Computer Laboratory A. Table of Contents... 2 B. Introduction... 3 C. Configure Host Network
New Zealand Company Six full time technical staff Offices in Auckland and Wellington
INCREASING THE VALUE OF PENETRATION TESTING ABOUT YOUR PRESENTER Brett Moore Insomnia Security New Zealand Company Six full time technical staff Offices in Auckland and Wellington Penetration Testing Web
Information Security Attack Tree Modeling for Enhancing Student Learning
Information Security Attack Tree Modeling for Enhancing Student Learning Jidé B. Odubiyi, Computer Science Department Bowie State University, Bowie, MD and Casey W. O Brien, Network Technology Department
Payment Card Industry (PCI) Terminal Software Security. Best Practices
Payment Card Industry (PCI) Terminal Software Security Best Version 1.0 December 2014 Document Changes Date Version Description June 2014 Draft Initial July 23, 2014 Core Redesign for core and other August
Management (CSM) Capability
CDM Configuration Settings Management (CSM) Capability Department of Homeland Security National Cyber Security Division Federal Network Security Network & Infrastructure Security Table of Contents 1 PURPOSE
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
External Scanning and Penetration Testing in PCI DSS 3.0. Gary Glover, Sr. Director of Security Assessments
External Scanning and Penetration Testing in PCI DSS 3.0 Gary Glover, Sr. Director of Security Assessments About SecurityMetrics Helping organizations comply with mandates, avoid security breaches, and
Locked Shields 2013. Kaur Kasak 24 Sept 2013
Locked Shields 2013 Kaur Kasak 24 Sept 2013 Disclaimer: This briefing is a product of the CCD COE. It does not represent the opinions or policies of NATO and is designed to provide an independent position.
Introduction to Ethical Hacking and Network Defense. Objectives. Hackers
Introduction to Ethical Hacking and Network Defense January 14, 2010 MIS 4600 - Abdou Illia Objectives Describe the role of an ethical hacker Describe what can an ethical hacker legally do Describe what
