Soumettre la recherche
Mettre en ligne
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
•
Télécharger en tant que PPT, PDF
•
1 j'aime
•
444 vues
Eric Vanderburg
Suivre
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 11
Télécharger maintenant
Recommandé
Hardware Security
Hardware Security
Mani Rathnam
Network Security Tools and applications
Network Security Tools and applications
webhostingguy
Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
Kabul Education University
Technical seminar on Security
Technical seminar on Security
STS
Network Security
Network Security
Joe Baker
Understanding the need for security measures
Understanding the need for security measures
joy grace bagui
Network Security 1st Lecture
Network Security 1st Lecture
babak danyal
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
Shafaan Khaliq Bhatti
Recommandé
Hardware Security
Hardware Security
Mani Rathnam
Network Security Tools and applications
Network Security Tools and applications
webhostingguy
Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
Kabul Education University
Technical seminar on Security
Technical seminar on Security
STS
Network Security
Network Security
Joe Baker
Understanding the need for security measures
Understanding the need for security measures
joy grace bagui
Network Security 1st Lecture
Network Security 1st Lecture
babak danyal
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
Shafaan Khaliq Bhatti
Network Forensics
Network Forensics
primeteacher32
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
HTS Hosting
Cs8792 cns - unit v
Cs8792 cns - unit v
ArthyR3
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015
mauimarketing
Hardware firewall
Hardware firewall
Subrata Kumer Paul
Security in Computer System
Security in Computer System
Manesh T
Firewall & packet filter new
Firewall & packet filter new
Karnav Rana
Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar War
Nasir Bhutta
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
vishnukp34
Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1
Saksham Agrawal
Firewall
Firewall
Muhammad Sohaib Afzaal
Firewall
Firewall
reddivarihareesh
Basic security concepts_chapter_1
Basic security concepts_chapter_1
abdifatah said
Firewall presentation
Firewall presentation
TayabaZahid
Intrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
Amr Rashed
Lesson 2 - IDPS
Lesson 2 - IDPS
MLG College of Learning, Inc
Lesson 3- Remote Access
Lesson 3- Remote Access
MLG College of Learning, Inc
Network Security Topic 1 intro
Network Security Topic 1 intro
Khawar Nehal khawar.nehal@atrc.net.pk
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
RootedCON
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
Eric Vanderburg
Konsys 20
Konsys 20
ajhevfsjehv
Contenu connexe
Tendances
Network Forensics
Network Forensics
primeteacher32
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
HTS Hosting
Cs8792 cns - unit v
Cs8792 cns - unit v
ArthyR3
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015
mauimarketing
Hardware firewall
Hardware firewall
Subrata Kumer Paul
Security in Computer System
Security in Computer System
Manesh T
Firewall & packet filter new
Firewall & packet filter new
Karnav Rana
Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar War
Nasir Bhutta
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
vishnukp34
Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1
Saksham Agrawal
Firewall
Firewall
Muhammad Sohaib Afzaal
Firewall
Firewall
reddivarihareesh
Basic security concepts_chapter_1
Basic security concepts_chapter_1
abdifatah said
Firewall presentation
Firewall presentation
TayabaZahid
Intrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
Amr Rashed
Lesson 2 - IDPS
Lesson 2 - IDPS
MLG College of Learning, Inc
Lesson 3- Remote Access
Lesson 3- Remote Access
MLG College of Learning, Inc
Network Security Topic 1 intro
Network Security Topic 1 intro
Khawar Nehal khawar.nehal@atrc.net.pk
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
RootedCON
Tendances
(20)
Network Forensics
Network Forensics
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
Cs8792 cns - unit v
Cs8792 cns - unit v
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015
Hardware firewall
Hardware firewall
Security in Computer System
Security in Computer System
Firewall & packet filter new
Firewall & packet filter new
Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar War
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1
Firewall
Firewall
Firewall
Firewall
Basic security concepts_chapter_1
Basic security concepts_chapter_1
Firewall presentation
Firewall presentation
Intrusion detection and prevention system
Intrusion detection and prevention system
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
Lesson 2 - IDPS
Lesson 2 - IDPS
Lesson 3- Remote Access
Lesson 3- Remote Access
Network Security Topic 1 intro
Network Security Topic 1 intro
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
En vedette
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
Eric Vanderburg
Konsys 20
Konsys 20
ajhevfsjehv
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
Dre Armeda
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Druva
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence
Cyphort
WordPress End-User Security
WordPress End-User Security
Dre Armeda
It security training
It security training
gethumamaravi
Step FWD IT_Ransomware-Guide
Step FWD IT_Ransomware-Guide
chrismannering
How to stay protected against ransomware
How to stay protected against ransomware
Sophos Benelux
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in Cybersecurity
Cyphort
User security awareness
User security awareness
K. A. M Lutfullah
Security Hole #18 - Cryptolocker Ransomware
Security Hole #18 - Cryptolocker Ransomware
Igor Beliaiev
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
mrzapper
2011.2.03 Marketing
2011.2.03 Marketing
Stephan Langdon
Itsa end user 2013
Itsa end user 2013
salleh1n
Basic Security Training for End Users
Basic Security Training for End Users
Community IT Innovators
70 640 Lesson01 Ppt 041009
70 640 Lesson01 Ppt 041009
Coffeyville Community College
Sophos paul ducklin
Sophos paul ducklin
BigDataExpo
PSConfEU - Offensive Active Directory (With PowerShell!)
PSConfEU - Offensive Active Directory (With PowerShell!)
Will Schroeder
En vedette
(20)
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
Konsys 20
Konsys 20
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence
WordPress End-User Security
WordPress End-User Security
It security training
It security training
Step FWD IT_Ransomware-Guide
Step FWD IT_Ransomware-Guide
How to stay protected against ransomware
How to stay protected against ransomware
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in Cybersecurity
User security awareness
User security awareness
Security Hole #18 - Cryptolocker Ransomware
Security Hole #18 - Cryptolocker Ransomware
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
2011.2.03 Marketing
2011.2.03 Marketing
Itsa end user 2013
Itsa end user 2013
Basic Security Training for End Users
Basic Security Training for End Users
70 640 Lesson01 Ppt 041009
70 640 Lesson01 Ppt 041009
Sophos paul ducklin
Sophos paul ducklin
PSConfEU - Offensive Active Directory (With PowerShell!)
PSConfEU - Offensive Active Directory (With PowerShell!)
Similaire à Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 3 - Basics - Eric Vanderburg
Information Security Lesson 3 - Basics - Eric Vanderburg
Eric Vanderburg
Coud discovery chap 5
Coud discovery chap 5
Alain Charpentier
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
MarketingArrowECS_CZ
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
gocybersec
Ch8ed12romney
Ch8ed12romney
woyaoni
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
PROIDEA
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
Brent Bernard, CISSP & PCI-QSA
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
Austin Ross
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
Brent Bernard, CISSP & PCI-QSA
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
Brent Bernard, CISSP & PCI-QSA
Six steps for securing offshore development
Six steps for securing offshore development
gmaran23
Power Grid Communications & Control Systems
Power Grid Communications & Control Systems
fajjarrehman
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
TI Safe
Data Governance and Management in Cloud pak nam
Data Governance and Management in Cloud pak nam
PT Datacomm Diangraha
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
BabyBoy55
security in is.pptx
security in is.pptx
selvapriyabiher
Network security and protocols
Network security and protocols
Online
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery
Brian Pichman
ML13198A410.pdf
ML13198A410.pdf
ParasPatel967737
ML13198A410.pdf
ML13198A410.pdf
KalsoomTahir2
Similaire à Information Security Lesson 13 - Advanced Security - Eric Vanderburg
(20)
Information Security Lesson 3 - Basics - Eric Vanderburg
Information Security Lesson 3 - Basics - Eric Vanderburg
Coud discovery chap 5
Coud discovery chap 5
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
Ch8ed12romney
Ch8ed12romney
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
Six steps for securing offshore development
Six steps for securing offshore development
Power Grid Communications & Control Systems
Power Grid Communications & Control Systems
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
Data Governance and Management in Cloud pak nam
Data Governance and Management in Cloud pak nam
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
security in is.pptx
security in is.pptx
Network security and protocols
Network security and protocols
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery
ML13198A410.pdf
ML13198A410.pdf
ML13198A410.pdf
ML13198A410.pdf
Plus de Eric Vanderburg
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
Mobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
Eric Vanderburg
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Eric Vanderburg
Principles of technology management
Principles of technology management
Eric Vanderburg
Japanese railway technology
Japanese railway technology
Eric Vanderburg
Evaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Eric Vanderburg
Japanese current and future technology management challenges
Japanese current and future technology management challenges
Eric Vanderburg
Technology management in Japan: Robotics
Technology management in Japan: Robotics
Eric Vanderburg
Incident response table top exercises
Incident response table top exercises
Eric Vanderburg
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Eric Vanderburg
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Eric Vanderburg
Plus de Eric Vanderburg
(20)
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Mobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Principles of technology management
Principles of technology management
Japanese railway technology
Japanese railway technology
Evaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Japanese current and future technology management challenges
Japanese current and future technology management challenges
Technology management in Japan: Robotics
Technology management in Japan: Robotics
Incident response table top exercises
Incident response table top exercises
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Dernier
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
SeasiaInfotech2
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
charlottematthew16
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Rizwan Syed
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Slibray Presentation
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Enterprise Knowledge
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
The Digital Insurer
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Safe Software
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Alex Barbosa Coqueiro
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scott Keck-Warren
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Miki Katsuragi
Dernier
(20)
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
1.
Information Security Chapter 13 Advanced
Security & Beyond Information Security © 2006 Eric Vanderburg
2.
Computer Forensics • Retrieving
information from computers for use in an investigation • The need for forensics knowledge will increase due to: – Increased digital information being stored – Higher criminal computer skill – Mistakes in the handling of evidence can make it inadmissable in court Information Security © 2006 Eric Vanderburg
3.
Forensics • Electronic data
is harder to destroy – Search programs – RAM slack – data from RAM that is inserted to fill the rest of the sector – File or drive slack – previous data from the drive that is contained in any additional unused sectors in an allocated cluster. – Page file • Difficulties – – – – – Much data to look through 1 day of email is equal to a years worth of snail mail. Data may be stored in many places under different controls Dynamic content makes data different each time it is accessed Data can be changed simply by accessing it Information Security © 2006 Eric Vanderburg
4.
Forensics • Metadata –
data about data – Can be useful to find information about a file. – Could be false because some metadata is not updated properly or is coded by the author • Steganography – hiding data in data – Use hashes to uncover data within system files and application files. – Other files must be scanned by steganography programs. Information Security © 2006 Eric Vanderburg
5.
Responding to the
incident 1. Secure the crime scene a) 2. Collect the evidence a) b) c) 3. Data can be easily destroyed (take proper care of it) Before shutting the computer down, record some information (RAM contents, network connections, running programs, current user, open files or URLs, and current configurations) Before data is changed or scanned, hard disks are secured and mirrored using a bit-stream backup. Establish a chain of custody a) 4. Photograph the equipment placement with analog film before it is touched (protect against accusations of planting or tampering) Show that the equipment/evidence was secure at all times and show who had access to it at all times to protect against tampering. Examine and preserve the evidence Information Security © 2006 Eric Vanderburg
6.
Attacks • Attacks are
quicker than ever • Attacks are more frequent Information Security © 2006 Eric Vanderburg
7.
Technology • Encryption extensions
are being built into processors – TPM (Trusted Platform Model) – making a cryptographic coprocessor standard on each processor • Behavior blocking – rather than using a specific signature, we watch for behavior. (more false positives) • Antispam • Cap network connections (average is 2 per second) – could be much larger for those using file sharing or chat programs. • Sandboxing through virtual machines • Baselining (Internet traffic, ports, programs) • DRM (Digital Rights Management) – control access and use of information. Information Security © 2006 Eric Vanderburg
8.
Employment • The need
for security workers is higher than any other IT need. (Programming comes in close second) • Security Certifications Information Security © 2006 Eric Vanderburg
9.
Certifications • • • • • Security+ CWSP (Certified Wireless
Security Professional) CCSP (Cisco Certified Security Professional) MCSE: Security (Microsoft Certified Systems Engineer): Security (ISC)2 (International Information Systems Security Certification Consortium) – CISSP (Certified Information Systems Security Professional) – SSCP (Systems Security Certified Practitioner) • EC-Council – CEH (Certified Ethical Hacker) – CHFI (Computer Hacking Forensics Investigator) • Checkpoint – CCSA (Checkpoint Certified Security Administrator) – CCSE (Checkpoint Certified Security Expert) • RSA – RCSE (RSA Certified Systems Engineer) – RCSA (RSA Certified Systems Administrator) Information Security © 2006 Eric Vanderburg
10.
Skills • Networking knowledge –
TCP/IP – Network equipment (routers, firewalls, VLANs, switching) – Intrusion detection systems • People skills – People are the largest threat so you must understand them. – Training • Legal – Understand your responsibilities and your limitations (privacy) – Operate under the guidance of your security policy (this will protect you against legal action) Information Security © 2006 Eric Vanderburg
11.
Acronyms • HIP, Host
Intrusion Prevention • TPM, Trusted Platform Model Information Security © 2006 Eric Vanderburg
Télécharger maintenant