Vulnerability and Threat Management and Prevention



Similar documents
Easy To Use PDDOS. :Burner Phone DDOS 2 Dollars a day:70 Calls a Min Weston Hecker Security Expert

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

FORBIDDEN - Ethical Hacking Workshop Duration

Internet threats: steps to security for your small business

INFORMATION SECURITY FOR YOUR AGENCY

Loophole+ with Ethical Hacking and Penetration Testing

Introduction to Penetration Testing Graham Weston

A Decision Maker s Guide to Securing an IT Infrastructure

EC-Council. Certified Ethical Hacker. Program Brochure

Why The Security You Bought Yesterday, Won t Save You Today

Senaca Shield Presents 10 Top Tip For Small Business Cyber Security

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Threat Events: Software Attacks (cont.)

InfoSec Academy Pen Testing & Hacking Track

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Windows Operating Systems. Basic Security

Data Security for the Hospitality

Project 25 Security Services Overview

CEH Version8 Course Outline

Presented by Frederick J. Santarsiere

Visa CREDIT Card General Guidelines

CYBERSECURITY HOT TOPICS

Cyber Essentials KAMI VANIEA 2

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS


SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

2015 TRUSTWAVE GLOBAL SECURITY REPORT

Topic 1 Lesson 1: Importance of network security

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Security aspects of e-tailing. Chapter 7

IQware's Approach to Software and IT security Issues

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Penetration testing & Ethical Hacking. Security Week 2014

The Top Web Application Attacks: Are you vulnerable?

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

Digi Device Cloud: Security You Can Trust

To ensure independence, PSC does not represent, resell or receive commissions from any third party hardware, software or solutions vendors.

EC Council Certified Ethical Hacker V8

What Do You Mean My Cloud Data Isn t Secure?

SanDisk Enterprise Secure USB Flash Drive Security Vulnerability

HOW SECURE IS YOUR PAYMENT CARD DATA?

Professional Penetration Testing Techniques and Vulnerability Assessment ...

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

InfoSec Academy Application & Secure Code Track

Cyber R &D Research Roundtable

The Roles of Software Testing & QA in Security Testing

WEB APPLICATION SECURITY

CHAPTER 10: COMPUTER SECURITY AND RISKS

PUBLIC REPORT. Red Team Testing of the ES&S Unity Voting System. Freeman Craft McGregor Group (FCMG) Red Team

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

Cybersecurity: Protecting Your Business. March 11, 2015

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Reducing Application Vulnerabilities by Security Engineering

Penetration Testing in Romania

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Ethical Hacking Course Layout

A Network Administrator s Guide to Web App Security

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

Trust Digital Best Practices

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

2012 Data Breach Investigations Report

Passing PCI Compliance How to Address the Application Security Mandates

Detailed Description about course module wise:

CYBERTRON NETWORK SOLUTIONS

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Metasploit The Elixir of Network Security

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

Langara College PCI Awareness Training

Transcription:

A1 Vulnerability and Threat Management and Prevention Weston Hecker Security Expert With KLJ Systems Network Analyst/Penetration Tester/President Of Computer Security Association Of North Dakota

Slide 1 A1 Author, 9/16/2013

About Me About Me: CISSP, CEH, CCNP Security, Certified Microsoft Professional, Security + Licensed Penetration Tester, Computer Science/Geophysics, and spoke at Defcon 22 About 10 years pen testing, disaster recovery, security design, and security research experience Research including DHS contract to attack 911 systems in the USA. Skim Bad software project. NERC, FFIEC, FISMA/NIST, ISO, GLBA and FDIC, Compliance audits HIPAA, Omnibus, HI TECH

What is being covered How is it different in The Midwest? What are hackers using to compromise networks? How has it changed, Why is hacking in the news so much. Tools of the trade Fleet of Fake I phones. Key loggers and Raspberry Pi hacking machines. RFID Radio Badges and physical security portion of Pentesting. Distributed Denial of Service Phone Systems What it is how its used How it affects businesses Credit card skimming methods, POS memory scraping malware, and phone DDOS.

Methods Blackhat Hackers Use to Get Into Networks/Methods Found In ND Findings from Pentests in ND and the Midwest How does it differ from rest of USA Why would people target ND we are to small to be noticed Types of audits Need for Security Framework Forced compliance What can IT staff do to secure their networks When does a 3 rd party pay? Everyone thinks North Dakota has oil money why are companies still paying 90s prices for security services

Fleet of Fake iphones With Teensy 3.0

Key Stroke Catchers Rouge USB Drives

Computers Used Specifically for Password Cracking, USB Plugged into USB Monitor GPU Farm Built for $2400, 13 Billion Password attempts a second

Raspberry Pi Hacking Boxes, Alfa Card with promiscuous mode chip set, RP Recording calls from VOIP phone.

Bump Keys 80% of Locks Can Be Bumped Physical Security RFID Badge Hacking Tailgating Doors Left Open

RFID Badge Cloning Hardware, Front door Cards Read up to 10ft Away

RFID Badge Reader Scans Through Seat Where Customers Wallet Would Be.

Everyone is familiar with DDOS it has been a problem for more than 15 years Computers are asked to respond to more requests than it can handle Think of it as 30 people driving threw a drive threw at lunch hour and ordering food then driving off.

This Prepaid Cell Phone Can Deny Legitimate Phone Calls for 5 Days Strait Anonymous Purchase 2 Dollars Days That it is Used Untraceable Can be Charged With Solar USB Charger PRL List Hopping. GPS Not Recoverable Unless in 911 Mode.

Cell Phone DDOS call Some one non stop two times a second for 5 days for $14.00 $14 Dollar Prepaid Phone Firmware Flashed To Become Anonymous DDOS Attack

Malware, DDOS, Ransomware, Web Application Injection, Spearfishing. What is a SQL Injection Why Scanning tools don t always catch these methods?

Sanitize your inputs Most application exploits come from not sanitizing inputs. Assume that any data you do not have control over is malicious. Have web applications made by third parties undergo an audit. Scanning tools are ineffective at finding any more than the most basic vulnerabilities.

Malware, DDOS, Ransomware, Spearfishing. Targeted Malware In ND Spoofed Emails, J:// Encrypted over the weekend Ooooo no. Malware custom made for customers in ND

What Are The Hackers After? Personally identifiable information Financial information ex. Credit card number, Bank account numbers Trade secrets ex. Customer data, Bid information, Volume license information Network Resources ex. Servers, email accounts, desktops used to attack and infect other systems

Credit Card Skimmer Used to Steal Magnetic Data on Cards.

Where Do they Sell Credit card Data and SSN#

POS Skimming Malware How It Works How It Can Be Defeated.

Thank You For Inviting Me and For Your Time Any Questions, Please Contact Me. Weston.Hecker@kljeng.com westonhecker@twitter WWW.KLJNETWORKSOLUTIONS.COM Phone Number 701 934 1292