HEY! YOU! GET OFF MY CLOUD! ATTACKS AGAINST CLOUD HONEYPOTS. Martin Lee Neil Rankin
|
|
|
- Myrtle Cooper
- 10 years ago
- Views:
Transcription
1 HEY! YOU! GET OFF MY CLOUD! ATTACKS AGAINST CLOUD HONEYPOTS Martin Lee Neil Rankin
2 Cloud Adoption Choose two: Fast Cheap Good
3 Cloud Models Public IaaS PaaS SaaS Private
4 Cloud Models Public IaaS PaaS SaaS Private
5 IaaS Cloud Security Layers SECURE API / GUI Application Code Operating System Your problem Virtual Machine Hypervisor Device Network Provider s responsibility Facility
6 Threat Model Cyber Criminal Hacktivist APT
7 Elastic Computing Development Deployment Low utilisation Low cost Heavy utilisation High cost
8 Elastic Computing Source: Quora.com
9 Threat Types - Customers Cloud Environment On Premise Environment application-attack brute-force suspicious-activity recon trojan-activity denial-of-service other application-attack brute-force trojan-activity suspicious-activity recon denial-of-service other Source: Alert Logic ASR 2015
10 Relative Threats - Cloud vs On Premise trojan-activity other application-attack brute-force recon suspicious-activity denial-of-service Source: Alert Logic ASR 2015
11 Cloud Threats by Customer Industry Vertical Suspicious Recon Brute force 100% 90% 80% 70% 60% 50% 40% DoS Application attack 30% 20% 10% 0% Source: Alert Logic ASR 2015
12 Subtle Differences Cloud threats On premise threats Your threats Your neighbour s threats
13 Honeypot Infrastructure share.example.com sys.example.com db.example.com Cloud Honeypot Cloud Production System Increased Protection Cloud Honeypot Threat Intelligence Threat Intelligence
14 Honeypot Types Low Interaction Medium Interaction Simulates high level services Collects basic information Simulates generic functions Records interaction High Interaction Simulates specific environment Collects details of attack
15 Medium Interaction Kippo medium interaction Simulates SSH shell Fake file system Easily detected! we use heavily modified version We used to log brute force attacks & replay session
16 Medium Interaction Dionaea medium interaction Simulates network services SMB / HTTP / FTP / MySQL / SIP (VOIP) Simulates shellcode execution We see mostly SMB activity
17 Low Interaction Amun low interaction Modular Honeypot Simulates vulnerable services We see mostly SMB activity
18 Low Interaction p0f low interaction Fingerprint connecting IPs Run in tandem
19 Custom Interaction Create your own Modify modular honeypot Reflect your environment Respond to new threats Research attacks against specific vulnerabilities
20 Results What do we find? April 2015
21 Findings Top 20 IP Addresses Number of Attacks
22 Findings Top 20 Source Countries Japan Taiwan Venezuela China Georgia Japan Brazil Unknown United States Georgia Romania Mexico Brazil Russian Federation Netherlands Taiwan Bulgaria United Kingdom China Armenia India Venezuela Kazakhstan Korea, Republic of Ukraine Iran, Islamic Republic of
23 Findings Attacker OS Win 7/8 Linux 2.2.x Linux 3.1 Win XP Linux 2.4.x Linux 2.4.x Windows XP Linux Linux 2.2.x-3.x Windows 7 or 8 Linux 2.6.x Linux 3.11 and newer Linux 2.4.x-2.6.x Linux 2.2.x-3.x (no timestamps) Linux 3.x Linux 2.2.x-3.x (barebone) Windows NT kernel Linux 2.0
24 Findings Top 20 Destination Ports Active Directory Service / SMB (445) SSH (22) Secure Shell (SSH) Microsoft Directory Service Remote Desktop Protocol NETBIOS Session Service SMTP HTTP Active API Server Port (Proxy) Telnet POP3 HTTP Alternate (Proxy) MySQL Microsoft SQL Server Abyess Web Server HTTPS FTP Socks (Proxy) Universal Plug 'N Play (UPnP) Microsoft DCOM IMAP Apple OSX RPC Services
25 Findings Top 20 Brute Forced Usernames Root (98.5%) root oracle support test MGR administrator ftpuser admindb info pi admin ubnt user guest ubuntu operator PlcmSpIp Administrator db01
26 Findings Top 20 Brute Forced Username/Password root/admin admin/admin root/ root/default root/zaq1xsw2 root/a root/ root/changeme root/qwerty root/admin1 root/123456] root/ root/administrator root/qazwsx root/ root/aaaaaa root/root root/ root/meiyoumima root/vision
27 Findings Top 20 Uploads Troj/Agent-AMRO PsExec?.exe Mal/HckPk-A Troj/Agent-AMRO Unknown Troj/Agent-AMRO Mal/PWS-JJ Mal/HckPk-A Unknown Unknown Unknown Unknown Mal/Spy-Y PsExec Mal/HckPk-A Troj/DLoad-IK W32/Parite-B Mal/Spy-Y Unknown Unknown Unknown Unknown Unknown
28 Deployment Honeypots in Operation
29 Honeypots for Managed Services Connecting IPs Cloud Honeypot Customer Cloud System Security Agent Blocklist update Threat Intelligence
30 Honeypots for Managed Services Malware Cloud Honeypot Customer Cloud System Security Agent Correlate Threat Intelligence
31 Conclusion Cloud environments have a specific threat profile. Well placed honeypots provide timely intelligence. Apply intelligence to protect production systems.
32 Get linkedin.com/company/alert-logic alertlogic.com/resources/blog/ youtube.com/user/alertlogictv brighttalk.com/channel/11587
33 Thank you Will Semple VP ActiveIntelligence Brian Wilson Director, Intelligence Michael Laughlin Tools Engineer
34 Thank you.
Threat Intelligence Report. April, 2015
Threat Intelligence Report April, 2015 2 Table of Contents I Executive Summary 3 II Global Data Analysis 4 Malicious Activities Source Countries 4 Attack Distribution Top 03 Foreign Attackers 4 III Malware
Managing Ports and System Services using BT NetProtect Plus firewall
Managing Ports and System Services using BT NetProtect Plus firewall To work properly, certain programs (including web servers and file-sharing server programs) must accept unsolicited connections from
Chapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
THREAT INTELLIGENCE REPORT
THREAT INTELLIGENCE REPORT JANUARY - APRIL 2015 WWW.REWTERZ.COM!1 EXECUTIVE SUMMARY Welcome to the Rewterz Threat Intelligence report for January to April 2015. This report aims to provide the latest analysis
Computer Forensics and Incident Response in the Cloud. Stephen Coty AlertLogic, Inc. @Twitter AlertLogic_ACID
Computer Forensics and Incident Response in the Cloud SESSION ID: ANF-T07A Stephen Coty AlertLogic, Inc. @Twitter AlertLogic_ACID Why forensics in the cloud? Cloud market revenue will increase at a 36%
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
USE HONEYPOTS TO KNOW YOUR ENEMIES
USE HONEYPOTS TO KNOW YOUR ENEMIES SHERIF MOUSA (EG-CERT) 9 MAY 2012 WHAT ARE WE GOING TO TALK ABOUT? What exactly happens on the end of your Internet connection. Open Source tools to set up your own Honeypot
How Vulnerable are Unprotected Machines on the Internet?
How Vulnerable are Unprotected Machines on the Internet? Yuanyuan Grace Zeng 1, David Coffey 2, and John Viega 1 1 SilverSky [email protected], [email protected] 2 McAfee,Inc. david [email protected]
Network Monitoring Tool to Identify Malware Infected Computers
Network Monitoring Tool to Identify Malware Infected Computers Navpreet Singh Principal Computer Engineer Computer Centre, Indian Institute of Technology Kanpur, India [email protected] Megha Jain, Payas
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
PERDIX: A FRAMEWORK FOR REALTIME BEHAVIORAL EVALUATION OF SECURITY THREATS IN CLOUD COMPUTING ENVIRONMENT
PERDIX: A FRAMEWORK FOR REALTIME BEHAVIORAL EVALUATION OF SECURITY THREATS IN CLOUD COMPUTING ENVIRONMENT December 6, 2013 Julien Lavesque CTO Itrust [email protected] Security experts company founded
Cyber Essentials. Test Specification
Cyber Essentials Test Specification Contents Scope of the Audit...2 Assumptions...3 Success Criteria...3 External systems...4 Required tests...4 Test Details...4 Internal systems...7 Tester pre-requisites...8
VMware vcenter Log Insight Security Guide
VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Introduction to Network Discovery and Identity
The following topics provide an introduction to network discovery and identity policies and data: Host, Application, and User Detection, page 1 Uses for Host, Application, and User Discovery and Identity
SonicWALL Unified Threat Management. Alvin Mann April 2009
SonicWALL Unified Threat Management Alvin Mann April 2009 Agenda Who is SonicWALL? Networking Drivers & Trends SonicWALL Unified Threat Management (UTM) Next Generation Protection SonicWALL CONFIDENTIAL
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Attacks from the Inside
Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
Honeypots in the Cloud
Honeypots in the Cloud Stephen Brown, Rebecca Lam, Shishir Prasad, Sivasubramanian Ramasubramanian, and Josh Slauson University of Wisconsin - Madison December 19, 2012 Abstract Honeypots are systems used
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel
Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel Gregory Fresnais Director of International Business Development Email: [email protected],
Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!
Sample Penetration Testing Report Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$%&'#)*)&'+,-./0.-121.030045.5675895.467:;83-/;0383; th, yyyy A&0#0+4*M:+:#&*#0%+C:,#0+4N:
Chapter 1 Network Security
Chapter 1 Network Security 1.1 Network Security Router Functions Routers connect networks generally based on network addresses, usually IP network addresses. They create subnets (sub-networks) which isolate
WEB APPLICATION FIREWALLS: DO WE NEED THEM?
DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer [email protected] www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection
GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate
GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS Joe Goldberg Splunk Session ID: SPO-W09 Session Classification: Intermediate About Me Joe Goldberg Current: Splunk - Security Evangelist
D m i t r y S l i n k o v, C I S M SWISS C Y B E R S TO R M 2015. Black market of cybercrime in Russia
D m i t r y S l i n k o v, C I S M SWISS C Y B E R S TO R M 2015 Black market of cybercrime in Russia WHOAMI Information Security Manager (Russia and CIS) Information Security Officer Information Security
Cyber Essentials PLUS. Common Test Specification
Cyber Essentials PLUS Common Test Specification Page 1 Version Control Version Date Description Released by 1.0 07/08/14 Initial Common Test Specification release SR Smith 1.1 19/08/14 Updated Scope SR
Attack and Penetration Testing 101
Attack and Penetration Testing 101 Presented by Paul Petefish [email protected] July 15, 2009 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2 Agenda Penetration Testing
Security Advice for Instances in the HP Cloud
Security Advice for Instances in the HP Cloud Introduction: HPCS protects the infrastructure and management services offered to customers including instance provisioning. An instance refers to a virtual
Global Honeypot Trends
Global Honeypot Trends Adventures with Kippo! Elliott Brink @ebrinkster /usr/bin/whoami Elliott Brink (@ebrinkster) Senior Penetration Tester at McGladrey (soon to be ) Internal Penetration Testing External
List of Common TCP/IP port numbers
List of Common TCP/IP port numbers For those of you who configure firewalls, routers, port forwarding, and applications connectivity, this regularly updated document lists all standard, common, well known,
Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok
CLOUD COMPUTING PRACTICE 82 Chapter 9 PUBLIC CLOUD LABORATORY Hand on laboratory based on AWS Sucha Smanchat, PhD Faculty of Information Technology King Mongkut s University of Technology North Bangkok
Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers
Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers The Cisco Intrusion Prevention System Advanced Integration Module
IceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Windows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
Comodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013
Comodo MyDLP Software Version 2.0 Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features... 3
Managing your Red Hat Enterprise Linux guests with RHN Satellite
Managing your Red Hat Enterprise Linux guests with RHN Satellite Matthew Davis, Level 1 Production Support Manager, Red Hat Brad Hinson, Sr. Support Engineer Lead System z, Red Hat Mark Spencer, Sr. Solutions
NAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS TESTING DECEPTIVE HONEYPOTS by Aymen Yahyaoui September 2014 Thesis Advisor: Second Reader: Neil C. Rowe J. D. Fulp Approved for public release; distribution
MSP End User. Version 3.0. Technical Solution Guide
MSP End User Version 3.0 Technical Solution Guide N-Compass Remote Networking Monitoring Architecture How Does N-Compass Help Small & Medium Businesses? Proactive IT management The ability to do predictive
A radical approach to secure LAN network using novel hardening techniques
A radical approach to secure LAN network using novel hardening techniques Sakshi Sharma 1, Gurleen Singh 2 and Prabhdeep Singh 3 1,2,3 Computer Science Department, Punjab Technical University, Kapurthala,
ICS, SCADA, and Non-Traditional Incident Response. Kyle Wilhoit Threat Researcher, Trend Micro
ICS, SCADA, and Non-Traditional Incident Response Kyle Wilhoit Threat Researcher, Trend Micro 1 $whoami Threat Researcher, FTR, Trend Micro Threat Researcher at Trend Micro- research and blogger on criminal
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Introduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
JAMF Software Server Installation and Configuration Guide for Windows. Version 9.3
JAMF Software Server Installation and Configuration Guide for Windows Version 9.3 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
JAMF Software Server Installation and Configuration Guide for Linux. Version 9.2
JAMF Software Server Installation and Configuration Guide for Linux Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide
The Advanced Cyber Attack Landscape
The Advanced Cyber Attack Landscape FireEye, Inc. The Advanced Cyber Attack Landscape 1 Contents Executive Summary 3 Introduction 4 The Data Source for this Report 5 Finding 1 5 Malware has become a multinational
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Defending Against Attacks by Modeling Threat Behaviors
Defending Against Attacks by Modeling Threat Behaviors John Benninghoff Transvasive Security Transparent and Pervasive Security 2013 Verizon DBIR Recommendations What can we do about it? Collect, analyze
NETWORK SECURITY HACKS *
NETWORK SECURITY HACKS * Andrew %pckhart Ji O'REILLY* Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Contents Credits Preface ix xi Chapter 1. Unix Host Security 1 1. Secure Mount Points
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak CR V4.1 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents
JAMF Software Server Installation and Configuration Guide for OS X. Version 9.2
JAMF Software Server Installation and Configuration Guide for OS X Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide
JAMF Software Server Installation and Configuration Guide for Linux. Version 9.0
JAMF Software Server Installation and Configuration Guide for Linux Version 9.0 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide
Synthetic Application Monitoring
Synthetic Application Monitoring... Andrew Martin Senior Technical Consultant Contents End User Experience Monitoring - Synthetic Transactions 3 Argent and Synthetic Transactions 3 Web Based Application
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software
OpenText Secure MFT Network and Firewall Requirements
NETWORK OpenText Secure MFT Network and Firewall Requirements Secure MFT is a client-server solution that provides accelerated transfer of large files over any network connection. The solution architecture
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents
Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond
Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research
Clustered Data ONTAP 8.3
Clustered Data ONTAP 8.3 Remote Support Agent Configuration Guide For Use with Clustered Data ONTAP NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)
Penetration Testing - a way for improving our cyber security
OWASP EU Tour Bucharest 2013 The OWASP Foundation http://www.owasp.org Penetration Testing - a way for improving our cyber security Adrian Furtunǎ, PhD, OSCP, CEH [email protected] Copyright The OWASP
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Honeypots & Honeynets Overview. Adli Wahid Security Specialist, APNIC.net [email protected]
Honeypots & Honeynets Overview Adli Wahid Security Specialist, APNIC.net [email protected] 1 Contents 1. ObjecCves 2. DefiniCon of Honeypot & Honeynets 3. Benefits & Risk consideracon 4. Example of Honeypot
MyPBX Security Configuration Guide
MyPBX Security Configuration Guide Version: V1.4 Date: March 25 th, 2013 Yeastar Technology Co., Ltd. http://www.yeastar.com 1/16 Contents 1. Security Configuration for Web GUI..3 1.1 Change the default
JAMF Software Server Installation and Configuration Guide for OS X. Version 9.0
JAMF Software Server Installation and Configuration Guide for OS X Version 9.0 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide
Support Guide: Managing the Subject machine s Firewall.
Support Guide: Managing the Subject machine s Firewall. Note: This guide assumes you have successfully deployed F-Response to the subject/target machine. If not, then we recommend you look at one of the
Installing GFI LANguard Network Security Scanner
Installing GFI LANguard Network Security Scanner System requirements Install GFI LANguard Network Security Scanner on a computer which meets the following requirements: Windows 2000 (SP4) / XP (SP2) /
Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours
Ethical Hacking and Information Security Duration Detailed Module Foundation of Information Security Lecture with Hands On Session: 90 Hours Elements of Information Security Introduction As technology
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
Installing The SysAidTM Server Locally
Installing The SysAidTM Server Locally Document Updated: 17 October 2010 Introduction SysAid is available in two editions: a fully on-demand ASP solution and an installed, in-house solution for your server.
Security Considerations White Paper for Cisco Smart Storage 1
Security Considerations White Paper for Cisco Smart Storage An open network is like a bank s vault with windows Bill Thomson Network-Attached Storage (NAS) is a relatively simple and inexpensive way to
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
OCS Virtual image. User guide. Version: 1.3.1 Viking Edition
OCS Virtual image User guide Version: 1.3.1 Viking Edition Publication date: 30/12/2012 Table of Contents 1. Introduction... 2 2. The OCS virtualized environment composition... 2 3. What do you need?...
NAS 109 Using NAS with Linux
NAS 109 Using NAS with Linux Access the files on your NAS using Linux A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Use Linux to access files on
Cisco IOS Advanced Firewall
Cisco IOS Advanced Firewall Integrated Threat Control for Router Security Solutions http://www.cisco.com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 All-in-One Security
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
Mobile Admin Architecture
Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile
Tcl and Cloud Computing Automation
Tcl and Cloud Computing Automation Tclcloud, Tclwinrm & Cato Patrick Dunnigan Chief Architect, Cloud Sidekick cloudsidekick.com @CloudSidekick Tclcloud - Tcl api for AWS public cloud / Ecualyptus private
Configure a Microsoft Windows Workstation Internal IP Stateful Firewall
70 Lab #5 Lab #5 Assessment Spreadsheet A Review the default settings for Windows Firewall on your student workstation and indicate your settings below: GENERAL Recommended (Firewall On/Off) Don t Allow
Oracle public Database and Java Cloud for Trials 19.03.2015
Oracle public Database and Java Cloud for Trials 19.03.2015 Arnold Keller, Senior Sales Consultant Core Technology Hannes Gütlin, Senior Sales Consultant Middleware Agenda 1 2 3 4 Oracle Cloud Introduction
Virtualization and Cloud Computing
Written by Zakir Hossain, CS Graduate (OSU) CEO, Data Group Fed Certifications: PFA (Programming Foreign Assistance), COR (Contracting Officer), AOR (Assistance Officer) Oracle Certifications: OCP (Oracle
Network Security In Linux: Scanning and Hacking
Network Security In Linux: Scanning and Hacking Review Lex A lexical analyzer that tokenizes an input text. Yacc A parser that parses and acts based on defined grammar rules involving tokens. How to compile
Transition Networks White Paper. Network Security. Why Authentication Matters YOUR NETWORK. OUR CONNECTION.
Transition Networks White Paper Why Authentication Matters YOUR NETWORK. OUR CONNECTION. : Why Authentication Matters For most organizations physical security is a given. Whether it is video surveillance,
Five Steps to Improve Internal Network Security. Chattanooga ISSA
Five Steps to Improve Internal Network Security Chattanooga ISSA 1 Find Me AverageSecurityGuy.info @averagesecguy [email protected] github.com/averagesecurityguy ChattSec.org 2 Why? The methodical
