SlideShare a Scribd company logo
1 of 33
Download to read offline
ABOUT YOUR INSTRUCTOR
• JUAN ORTIZ
• JORTIZ@BITSNCS.COM
• BLOG: JUANORTIZ.PRO
• BORN AND RAISED IN PUERTO RICO
• INFO SEC, VIRTUALIZATION, CLOUD,
ARCHITECTURE AND BUSINESS INTEGRATION
COURSE SCHEDULE
Start End Content
8:30 9:00 Class Introduction
9:00 10:15 Module 1: Basic facts, myths and sad realities
10:15 10:30 Morning Break
10:30 12:00 Module 1: Labs
12:00 1:00 Lunch Break
1:00 2:15 Module 2: Securing the Infrastructure
2:15 2:30 Afternoon Break
2:30 4:00 Module 2: Labs
4:00 4:15 Wrap up and Q&A
AGENDA
• DEFINE AND UNDERSTAND COMPONENTS OF INFORMATION SECURITY
• UNDERSTAND INFOSEC ENEMIES
• DEFINE VULNERABILITIES
• EXPLAIN COUNTERMEASURES
• DEMO & LABS
PURPOSE AND METHODOLOGY
• THIS IS AN INTRODUCTORY COURSE
• DESIGNED TO BE A FAST WAY TO GET UP TO SPEED IN INFORMATION SECURITY
• THIS COURSE COVERS A BROAD SPECTRUM OF SECURITY TOPICS AND IS LIBERALLY SPRINKLED WITH REAL LIFE EXAMPLES
• A BALANCED MIX OF TECHNICAL AND MANAGERIAL ISSUES MAKES THIS COURSE APPEALING TO ATTENDEES WHO NEED TO UNDERSTAND THE SALIENT
FACETS OF
• INFORMATION SECURITY BASICS
• THE BASICS OF RISK MANAGEMENT.
• WE BEGIN BY COVERING BASIC TERMINOLOGY AND CONCEPTS
• THEN MOVE TO EXAMPLES OF THREATS
• WE COVER THE BASICS OF CRYPTOGRAPHY, SECURITY MANAGEMENT, AND WIRELESS TECHNOLOGY
• THEN WE LOOK AT POLICY AS A TOOL TO EFFECT CHANGE IN YOUR ORGANIZATION.
• IN THE FINAL DAY OF THE COURSE, WE PUT IT ALL TOGETHER WITH AN IMPLEMENTATION OF DEFENSE IN-DEPTH.
CAVEATS
• THE COURSE IS DESIGNED TO BE PERFORMED ON A WINDOWS ENVIRONMENT
• YOU SHOULD NOT BRING A REGULAR PRODUCTION LAPTOP FOR THIS CLASS! WHEN INSTALLING
SOFTWARE, THERE IS ALWAYS A CHANCE OF BREAKING SOMETHING ELSE ON THE SYSTEM. STUDENTS
SHOULD ASSUME THAT ALL DATA COULD BE LOST.
• IT IS CRITICAL THAT STUDENTS BE ABLE TO LOGIN TO THE ADMINISTRATOR LEVEL ACCOUNT
• END POINT SECURITY SOLUTIONS CAN PREVENT PROGRAMS FROM BEING INSTALLED CORRECTLY ON THE
SYSTEM. STUDENTS NEED TO BE ABLE TO TEMPORARILY DISABLE END POINT SECURITY SOLUTIONS OR
MAKE EXCEPTIONS TO ALLOW PROGRAMS TO RUN.
MODULE 1 - BASIC FACTS, MYTHS AND SAD REALITIES
A FRAMEWORK FOR INFORMATION SECURITY
SECURITY
• IT HAS MANY DEFINITIONS
• IN REALITY IT IS A SENSE OF SECURITY
• KEY TERMS: THREAT, EXPOSITION, VULNERABILITY COPING, RISK
• CAT AND MOUSE GAME
• THERE ARE MANY STRATEGIES
• DEFENSE IN-DEPTH
ESSENTIAL TERMINOLOGIES
ELEMENTS OF INFORMATION TECHNOLOGY
DEFENSE IN-DEPTH
“
”
THINGS TO DO IF YOU WANT TO GET
HACKED
DON’T DO THEM, PLEASE
BAD PASSWORDS, BAD IDEA
WE ARE STILL NOT LEARNING
REPEAT YOUR PASSWORDS
• Facebook
• Twitter
• Gmail
• Youtube
• eBay
• PayPal
• BPPR
• Yahoo
• Instagram
• Pinterest
• Amazon
• Netflix
• Microsoft
• Spotify
• Pandora
• Dropbox
• OneDrive
• SmartPhone
• iCloud
• GoDaddy
• Linkedin
• IMDB
• Wikipedia
• Muchas más
DON’T USE MULTI FACTOR AUTHENTICATION
• AUTENTICACIÓN
• ALGO QUE SABES
• ALGO QUE TIENES
• ALGO QUE ERES
• EN QUE LUGAR ESTAS
• DISPONIBLE COMÚNMENTE
• AUTORIZACIÓN
CLICK EVERY POSIBLE LINK
PAY RANSOMS WHEN ASKED
DON’T ENCRYPT YOUR DATA
• FTP
• Telnet
• Simple Mail Transfer Protocol (SMTP)
• HTTP
• Post Office Protocol 3 (POP3)
• Internet Message Access Protocol (IMAPv4)
• Network Basic Input/OutputSystem
(NetBIOS),
• Simple Network Management Protocol
(SNMP)
DON’T USE ANTI-MALWARE
• Any system can be
vulnerable to
infection
• The attacker uses
naiveness as
weapon
• There are many
effective tools
Before After
DO NOT PATCH YOUR MACHINE
• ERVERY HUMAN MADE SOFTWARE HAS FLAWS
• THIS APPLIES TO OS, FIRMWARE, DRIVERS AND SOFTWARE
• BE AWARE – WINDOWS UPDATE DOES NOT PATCH THIRD PARTY SOFTWARE
DOWNLOAD FREE STUFF
• THE PIRATE BAY
• KICKASSTORRENTS
• TORRENTZ
• EXTRATORRENT
• YIFY-TORRENTS
• EZTV
• ISOHUNT.TO
• LuckyWire
• BearShare
• Morpheus
• LimeZilla
• Nodezilla
• Warez
• Blubster
DO NOT BE SUSPICIOUS
• COMMON SENSE IS THE LEAST COMMON OF THE SENSES
• IF ITS TOO GOOD TO BE TRUE, IT PROBABLY IS
• IF A LIE IS WELL DEVELOPED, WE WILL NOT HESITATE TO CLICK THAT MALICIOUS LINK
• POLL: ASK A RANDOM PERSON WHAT IS HIS WEAKEST PASSWORD IN EXCHANGE FOR A PEN
• RECIPROCITY: IT’S NATURAL TO RETURN THE FAVOR.
• PEOPLE LIKE TO BE PRAISED
• PEOPLE ARE AFRAID OF POWER POSITIONS
MODULE 1 - EXERCISES AND LABS
• LAB 1 - CREATE A STANDARD USER ACCOUNT
• LAB 2 - CONFIGURE MICROSOFT UPDATES
• LAB 3 - CONFIGURE THIRD PARTY SOFTWARE UPDATES (SECUNIA PERSONAL SOFTWARE INSPECTOR)
• LAB 4 - CONFIGURE PASSWORD MANAGEMENT (LASTPASS, KEEPASS)
MODULE 2 - SECURING THE INFRASTRUCTURE
APPRECIATING THE RISKS ASSOCIATED WITH BEING CONNECTED TO THE INTERNET
WHAT DOES A HACKER DO
NETWORK DESIGNS
ATTACK TYPES
• PUBLIC INFORMATION - SEARCH ENGINES, SOCIAL NETWORKS AND EVEN JOB SEARCH
• NAME RESOLUTION ATTACKS
• SESSION HIJACKING, SPOOFING, MAN IN THE MIDDLE
• DENIAL OF SERVICE
• CROSS SITE SCRIPTING, COOKIE STEALING
• VIRUS, TROJANS, KEYLOGGERS AND WORMS
• VULNERABILITIES
• COVERT TRACKS
ATTACKER RESOURCES
• LACK OF PLANNING AND PROTECTION PROVIDE THE BEST ATTACKING ENVIRONMENT
• THERE ARE A LOT OF TOOLS FREELY AVAILABLE, OTHERS READY FOR SELL
• THERE ARE REALLY BAD PEOPLE ON THE INTERNET, ON BUSINESS
• DEEP WEB AND ANONYMIZERS – THEY EXIST AND ARE PRETTY EFFICIENT
DEFENSE MECHANISMS
• POLICIES AND DATA WIPING
• UPDATES AND CLIENT SECURITY SOFTWARE
• ENCRYPTION – SYMMETRIC VS ASYMMETRIC, ONE WAY HASHES, CERTIFICATES AND DISK ENCRYPTION
• FIREWALLS, IDS, DMZ, HONEY POTS
• SECURE NETWORK PROTOCOLS
• SEGMENTATION
• BACKUP, REPLICATION AND REDUNDANCY
• SECURITY AWARENESS TRAINING
• ASSESSMENTS – PENTEST AND VA
MODULE 2 - EXERCISES AND LABS
• LAB 5 - CONFIGURE FILE BACKUP (SYNCBACK, AZURE BACKUP)
• LAB 6 - CONFIGURE ENCRYPTION AND SECURE CONTAINERS (TRUECRYPT/VERACRYPT/BITLOCKER)
• LAB 7 – CALCULATING HASHES (HASHCALC)
• LAB 8 – SCANNING FOR MALWARE (MALWAREBYTES)
• LAB 9 – WIPE HARD DRIVE SPACE (CCLEANER, KILLDISK)
CONCLUSION
• THERE IS NO SUCH THING AS “COMPLETELY SECURE”
• IF IT IS TOO GOOD TO BE TRUE, IT PROBABLY IS
• A LAYERED PLAN WILL BE THE MOST EFFECTIVE
• KEEP IT SIMPLE, WHEN POSSIBLE
• MOST ATTACKS ARE EFFECTIVE DUE TO IGNORANCE
• ONCE YOU RUN YOUR SECURITY PLAN, DO NOT LEAVE IT AS IT IS. VERIFY IT CONSTANTLY
• MAKE DRILLS AND TESTS
WRAP UP AND Q&A

More Related Content

What's hot

Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...Eric Vanderburg
 
IAEM cybersecurity 101
IAEM cybersecurity 101IAEM cybersecurity 101
IAEM cybersecurity 101Sarah K Miller
 
Untangled Conference - November 8, 2014 - Security Awareness
Untangled Conference - November 8, 2014 - Security AwarenessUntangled Conference - November 8, 2014 - Security Awareness
Untangled Conference - November 8, 2014 - Security AwarenessEric Vanderburg
 
St. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
St. Mark Lutheran Cyber safety seminar - JurInnov - Eric VanderburgSt. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
St. Mark Lutheran Cyber safety seminar - JurInnov - Eric VanderburgEric Vanderburg
 
Appsec2013 presentation
Appsec2013 presentationAppsec2013 presentation
Appsec2013 presentationdrewz lin
 
Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)Tanja Drca
 
SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)Priyanka Aash
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile SecurityAVG Technologies AU
 
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security DefenceAlex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security DefencePro Mrkt
 
CyberCamp 2015: Low Hanging Fruit
CyberCamp 2015: Low Hanging FruitCyberCamp 2015: Low Hanging Fruit
CyberCamp 2015: Low Hanging FruitChema Alonso
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Lookout
 
Wireless Keyboard Threats
Wireless Keyboard ThreatsWireless Keyboard Threats
Wireless Keyboard ThreatsWill Hatcher
 
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...Aggregage
 
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityEmerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityAVG Technologies AU
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generationTony Lauro
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Securing blockchain assets
Securing blockchain assetsSecuring blockchain assets
Securing blockchain assetsSimon Wilson
 

What's hot (20)

Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
 
IAEM cybersecurity 101
IAEM cybersecurity 101IAEM cybersecurity 101
IAEM cybersecurity 101
 
Untangled Conference - November 8, 2014 - Security Awareness
Untangled Conference - November 8, 2014 - Security AwarenessUntangled Conference - November 8, 2014 - Security Awareness
Untangled Conference - November 8, 2014 - Security Awareness
 
St. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
St. Mark Lutheran Cyber safety seminar - JurInnov - Eric VanderburgSt. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
St. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
 
Appsec2013 presentation
Appsec2013 presentationAppsec2013 presentation
Appsec2013 presentation
 
Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)
 
SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security DefenceAlex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
 
CyberCamp 2015: Low Hanging Fruit
CyberCamp 2015: Low Hanging FruitCyberCamp 2015: Low Hanging Fruit
CyberCamp 2015: Low Hanging Fruit
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
 
Heartbleed
HeartbleedHeartbleed
Heartbleed
 
Wireless Keyboard Threats
Wireless Keyboard ThreatsWireless Keyboard Threats
Wireless Keyboard Threats
 
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...
 
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityEmerging Threats and Trends in Online Security
Emerging Threats and Trends in Online Security
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generation
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Securing blockchain assets
Securing blockchain assetsSecuring blockchain assets
Securing blockchain assets
 
Honeypot
HoneypotHoneypot
Honeypot
 

Similar to Seguridad de la Información y Controles contra Hackers - Getting hacked 101 intro to info sec and controls

Ethical hacking for fun and profit
Ethical hacking for fun and profitEthical hacking for fun and profit
Ethical hacking for fun and profitFlorent Batard
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)Ojal Katiyar
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Deepak Khari
 
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Endpoint (big) Data In The Age of Compromise, Ian RainsburghEndpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Endpoint (big) Data In The Age of Compromise, Ian RainsburghNapier University
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Paul C. Van Slyke
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCharles Cline
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptxdhumaletiku
 
Six steps for securing offshore development
Six steps for securing offshore developmentSix steps for securing offshore development
Six steps for securing offshore developmentgmaran23
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and HealthcareJonathon Coulter
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking RedefinedPawan Patil
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
Security is not a feature
Security is not a featureSecurity is not a feature
Security is not a featureElizabeth Smith
 
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...bugcrowd
 
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKelly Robertson
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraIGN MANTRA
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 

Similar to Seguridad de la Información y Controles contra Hackers - Getting hacked 101 intro to info sec and controls (20)

Ethical hacking for fun and profit
Ethical hacking for fun and profitEthical hacking for fun and profit
Ethical hacking for fun and profit
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
 
PALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..pptPALM VEIN TECHNOLOGY..ppt
PALM VEIN TECHNOLOGY..ppt
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Endpoint (big) Data In The Age of Compromise, Ian RainsburghEndpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
 
introtomalware
introtomalwareintrotomalware
introtomalware
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
 
Six steps for securing offshore development
Six steps for securing offshore developmentSix steps for securing offshore development
Six steps for securing offshore development
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Security is not a feature
Security is not a featureSecurity is not a feature
Security is not a feature
 
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
 
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application Security
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 

Recently uploaded

SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 

Recently uploaded (20)

SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 

Seguridad de la Información y Controles contra Hackers - Getting hacked 101 intro to info sec and controls

  • 1.
  • 2. ABOUT YOUR INSTRUCTOR • JUAN ORTIZ • JORTIZ@BITSNCS.COM • BLOG: JUANORTIZ.PRO • BORN AND RAISED IN PUERTO RICO • INFO SEC, VIRTUALIZATION, CLOUD, ARCHITECTURE AND BUSINESS INTEGRATION
  • 3. COURSE SCHEDULE Start End Content 8:30 9:00 Class Introduction 9:00 10:15 Module 1: Basic facts, myths and sad realities 10:15 10:30 Morning Break 10:30 12:00 Module 1: Labs 12:00 1:00 Lunch Break 1:00 2:15 Module 2: Securing the Infrastructure 2:15 2:30 Afternoon Break 2:30 4:00 Module 2: Labs 4:00 4:15 Wrap up and Q&A
  • 4. AGENDA • DEFINE AND UNDERSTAND COMPONENTS OF INFORMATION SECURITY • UNDERSTAND INFOSEC ENEMIES • DEFINE VULNERABILITIES • EXPLAIN COUNTERMEASURES • DEMO & LABS
  • 5. PURPOSE AND METHODOLOGY • THIS IS AN INTRODUCTORY COURSE • DESIGNED TO BE A FAST WAY TO GET UP TO SPEED IN INFORMATION SECURITY • THIS COURSE COVERS A BROAD SPECTRUM OF SECURITY TOPICS AND IS LIBERALLY SPRINKLED WITH REAL LIFE EXAMPLES • A BALANCED MIX OF TECHNICAL AND MANAGERIAL ISSUES MAKES THIS COURSE APPEALING TO ATTENDEES WHO NEED TO UNDERSTAND THE SALIENT FACETS OF • INFORMATION SECURITY BASICS • THE BASICS OF RISK MANAGEMENT. • WE BEGIN BY COVERING BASIC TERMINOLOGY AND CONCEPTS • THEN MOVE TO EXAMPLES OF THREATS • WE COVER THE BASICS OF CRYPTOGRAPHY, SECURITY MANAGEMENT, AND WIRELESS TECHNOLOGY • THEN WE LOOK AT POLICY AS A TOOL TO EFFECT CHANGE IN YOUR ORGANIZATION. • IN THE FINAL DAY OF THE COURSE, WE PUT IT ALL TOGETHER WITH AN IMPLEMENTATION OF DEFENSE IN-DEPTH.
  • 6. CAVEATS • THE COURSE IS DESIGNED TO BE PERFORMED ON A WINDOWS ENVIRONMENT • YOU SHOULD NOT BRING A REGULAR PRODUCTION LAPTOP FOR THIS CLASS! WHEN INSTALLING SOFTWARE, THERE IS ALWAYS A CHANCE OF BREAKING SOMETHING ELSE ON THE SYSTEM. STUDENTS SHOULD ASSUME THAT ALL DATA COULD BE LOST. • IT IS CRITICAL THAT STUDENTS BE ABLE TO LOGIN TO THE ADMINISTRATOR LEVEL ACCOUNT • END POINT SECURITY SOLUTIONS CAN PREVENT PROGRAMS FROM BEING INSTALLED CORRECTLY ON THE SYSTEM. STUDENTS NEED TO BE ABLE TO TEMPORARILY DISABLE END POINT SECURITY SOLUTIONS OR MAKE EXCEPTIONS TO ALLOW PROGRAMS TO RUN.
  • 7. MODULE 1 - BASIC FACTS, MYTHS AND SAD REALITIES A FRAMEWORK FOR INFORMATION SECURITY
  • 8. SECURITY • IT HAS MANY DEFINITIONS • IN REALITY IT IS A SENSE OF SECURITY • KEY TERMS: THREAT, EXPOSITION, VULNERABILITY COPING, RISK • CAT AND MOUSE GAME • THERE ARE MANY STRATEGIES • DEFENSE IN-DEPTH
  • 12. “ ” THINGS TO DO IF YOU WANT TO GET HACKED DON’T DO THEM, PLEASE
  • 14. WE ARE STILL NOT LEARNING
  • 15. REPEAT YOUR PASSWORDS • Facebook • Twitter • Gmail • Youtube • eBay • PayPal • BPPR • Yahoo • Instagram • Pinterest • Amazon • Netflix • Microsoft • Spotify • Pandora • Dropbox • OneDrive • SmartPhone • iCloud • GoDaddy • Linkedin • IMDB • Wikipedia • Muchas más
  • 16. DON’T USE MULTI FACTOR AUTHENTICATION • AUTENTICACIÓN • ALGO QUE SABES • ALGO QUE TIENES • ALGO QUE ERES • EN QUE LUGAR ESTAS • DISPONIBLE COMÚNMENTE • AUTORIZACIÓN
  • 19. DON’T ENCRYPT YOUR DATA • FTP • Telnet • Simple Mail Transfer Protocol (SMTP) • HTTP • Post Office Protocol 3 (POP3) • Internet Message Access Protocol (IMAPv4) • Network Basic Input/OutputSystem (NetBIOS), • Simple Network Management Protocol (SNMP)
  • 20. DON’T USE ANTI-MALWARE • Any system can be vulnerable to infection • The attacker uses naiveness as weapon • There are many effective tools Before After
  • 21. DO NOT PATCH YOUR MACHINE • ERVERY HUMAN MADE SOFTWARE HAS FLAWS • THIS APPLIES TO OS, FIRMWARE, DRIVERS AND SOFTWARE • BE AWARE – WINDOWS UPDATE DOES NOT PATCH THIRD PARTY SOFTWARE
  • 22. DOWNLOAD FREE STUFF • THE PIRATE BAY • KICKASSTORRENTS • TORRENTZ • EXTRATORRENT • YIFY-TORRENTS • EZTV • ISOHUNT.TO • LuckyWire • BearShare • Morpheus • LimeZilla • Nodezilla • Warez • Blubster
  • 23. DO NOT BE SUSPICIOUS • COMMON SENSE IS THE LEAST COMMON OF THE SENSES • IF ITS TOO GOOD TO BE TRUE, IT PROBABLY IS • IF A LIE IS WELL DEVELOPED, WE WILL NOT HESITATE TO CLICK THAT MALICIOUS LINK • POLL: ASK A RANDOM PERSON WHAT IS HIS WEAKEST PASSWORD IN EXCHANGE FOR A PEN • RECIPROCITY: IT’S NATURAL TO RETURN THE FAVOR. • PEOPLE LIKE TO BE PRAISED • PEOPLE ARE AFRAID OF POWER POSITIONS
  • 24. MODULE 1 - EXERCISES AND LABS • LAB 1 - CREATE A STANDARD USER ACCOUNT • LAB 2 - CONFIGURE MICROSOFT UPDATES • LAB 3 - CONFIGURE THIRD PARTY SOFTWARE UPDATES (SECUNIA PERSONAL SOFTWARE INSPECTOR) • LAB 4 - CONFIGURE PASSWORD MANAGEMENT (LASTPASS, KEEPASS)
  • 25. MODULE 2 - SECURING THE INFRASTRUCTURE APPRECIATING THE RISKS ASSOCIATED WITH BEING CONNECTED TO THE INTERNET
  • 26. WHAT DOES A HACKER DO
  • 28. ATTACK TYPES • PUBLIC INFORMATION - SEARCH ENGINES, SOCIAL NETWORKS AND EVEN JOB SEARCH • NAME RESOLUTION ATTACKS • SESSION HIJACKING, SPOOFING, MAN IN THE MIDDLE • DENIAL OF SERVICE • CROSS SITE SCRIPTING, COOKIE STEALING • VIRUS, TROJANS, KEYLOGGERS AND WORMS • VULNERABILITIES • COVERT TRACKS
  • 29. ATTACKER RESOURCES • LACK OF PLANNING AND PROTECTION PROVIDE THE BEST ATTACKING ENVIRONMENT • THERE ARE A LOT OF TOOLS FREELY AVAILABLE, OTHERS READY FOR SELL • THERE ARE REALLY BAD PEOPLE ON THE INTERNET, ON BUSINESS • DEEP WEB AND ANONYMIZERS – THEY EXIST AND ARE PRETTY EFFICIENT
  • 30. DEFENSE MECHANISMS • POLICIES AND DATA WIPING • UPDATES AND CLIENT SECURITY SOFTWARE • ENCRYPTION – SYMMETRIC VS ASYMMETRIC, ONE WAY HASHES, CERTIFICATES AND DISK ENCRYPTION • FIREWALLS, IDS, DMZ, HONEY POTS • SECURE NETWORK PROTOCOLS • SEGMENTATION • BACKUP, REPLICATION AND REDUNDANCY • SECURITY AWARENESS TRAINING • ASSESSMENTS – PENTEST AND VA
  • 31. MODULE 2 - EXERCISES AND LABS • LAB 5 - CONFIGURE FILE BACKUP (SYNCBACK, AZURE BACKUP) • LAB 6 - CONFIGURE ENCRYPTION AND SECURE CONTAINERS (TRUECRYPT/VERACRYPT/BITLOCKER) • LAB 7 – CALCULATING HASHES (HASHCALC) • LAB 8 – SCANNING FOR MALWARE (MALWAREBYTES) • LAB 9 – WIPE HARD DRIVE SPACE (CCLEANER, KILLDISK)
  • 32. CONCLUSION • THERE IS NO SUCH THING AS “COMPLETELY SECURE” • IF IT IS TOO GOOD TO BE TRUE, IT PROBABLY IS • A LAYERED PLAN WILL BE THE MOST EFFECTIVE • KEEP IT SIMPLE, WHEN POSSIBLE • MOST ATTACKS ARE EFFECTIVE DUE TO IGNORANCE • ONCE YOU RUN YOUR SECURITY PLAN, DO NOT LEAVE IT AS IT IS. VERIFY IT CONSTANTLY • MAKE DRILLS AND TESTS
  • 33. WRAP UP AND Q&A