SlideShare une entreprise Scribd logo
1  sur  20
A Seminar by Shinto. T. Jose
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],ULP TCP IP DATA LINK LAYER RDMA
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ARCHITECTURE ,[object Object],[object Object],Privileged Resource Manager Privileged ULP Non-privileged ULP RNIC Engine internet RNIC interface ULP interface
ARCHITECTURE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ARCHITECTURE ,[object Object],[object Object],[object Object],[object Object],[object Object]
ATTACKS THAT CAN BE MITIGATED WITH END-TO-END SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ATTACKS THAT CAN BE MITIGATED WITH END-TO-END SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ATTACKS THAT CAN BE MITIGATED WITH END-TO-END SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ATTACKS THAT CAN BE MITIGATED WITH END-TO-END SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ATTACKS THAT CAN BE MITIGATED WITH END-TO-END SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ATTACKS FROM LOCAL PEERS ,[object Object],[object Object],[object Object],[object Object],[object Object]
ATTACKS FROM LOCAL PEERS ,[object Object],[object Object],[object Object],[object Object]
ATTACKS FROM REMOTE PEERS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ATTACKS FROM REMOTE PEERS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ATTACKS FROM REMOTE PEERS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CONCLUTION ,[object Object],[object Object]
REFERENCES ,[object Object],[object Object]

Contenu connexe

Tendances

STAAF, An Efficient Distributed Framework for Performing Large-Scale Android ...
STAAF, An Efficient Distributed Framework for Performing Large-Scale Android ...STAAF, An Efficient Distributed Framework for Performing Large-Scale Android ...
STAAF, An Efficient Distributed Framework for Performing Large-Scale Android ...
Praetorian
 
A robust fsm watermarking scheme for ip protection
A robust fsm watermarking scheme for ip protectionA robust fsm watermarking scheme for ip protection
A robust fsm watermarking scheme for ip protection
Mohan Raj
 
SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3
Wen-Pai Lu
 
Defcon23 why nation-state_malware_target_telco_omercoskun
Defcon23 why nation-state_malware_target_telco_omercoskunDefcon23 why nation-state_malware_target_telco_omercoskun
Defcon23 why nation-state_malware_target_telco_omercoskun
Ömer Coşkun
 
Lte and future frauds
Lte and future fraudsLte and future frauds
Lte and future frauds
Ranjeet Kumar
 
Firewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaFirewall arch by Tareq Hanaysha
Firewall arch by Tareq Hanaysha
Hanaysha
 

Tendances (20)

Enterprise security in Practice
Enterprise security in PracticeEnterprise security in Practice
Enterprise security in Practice
 
DDoS Attack Preparation and Mitigation
DDoS Attack Preparation and MitigationDDoS Attack Preparation and Mitigation
DDoS Attack Preparation and Mitigation
 
Мобильная связь небезопасна. Аргументы, подкрепленные фактами
Мобильная связь небезопасна. Аргументы, подкрепленные фактамиМобильная связь небезопасна. Аргументы, подкрепленные фактами
Мобильная связь небезопасна. Аргументы, подкрепленные фактами
 
Cloud Security or: How I Learned to Stop Worrying & Love the Cloud
Cloud Security or: How I Learned to Stop Worrying & Love the CloudCloud Security or: How I Learned to Stop Worrying & Love the Cloud
Cloud Security or: How I Learned to Stop Worrying & Love the Cloud
 
Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!
Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!
Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!
 
STAAF, An Efficient Distributed Framework for Performing Large-Scale Android ...
STAAF, An Efficient Distributed Framework for Performing Large-Scale Android ...STAAF, An Efficient Distributed Framework for Performing Large-Scale Android ...
STAAF, An Efficient Distributed Framework for Performing Large-Scale Android ...
 
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
 
A robust fsm watermarking scheme for ip protection
A robust fsm watermarking scheme for ip protectionA robust fsm watermarking scheme for ip protection
A robust fsm watermarking scheme for ip protection
 
INTERNET SECURITY SYSTEM
INTERNET SECURITY SYSTEMINTERNET SECURITY SYSTEM
INTERNET SECURITY SYSTEM
 
ConnectiKR0N - Presentation for LiDAR
ConnectiKR0N - Presentation for LiDARConnectiKR0N - Presentation for LiDAR
ConnectiKR0N - Presentation for LiDAR
 
SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3
 
NetBeez - Distributed network monitoring with Raspberry Pi
NetBeez - Distributed network monitoring with Raspberry PiNetBeez - Distributed network monitoring with Raspberry Pi
NetBeez - Distributed network monitoring with Raspberry Pi
 
Defcon23 why nation-state_malware_target_telco_omercoskun
Defcon23 why nation-state_malware_target_telco_omercoskunDefcon23 why nation-state_malware_target_telco_omercoskun
Defcon23 why nation-state_malware_target_telco_omercoskun
 
Network Security and Visibility through NetFlow
Network Security and Visibility through NetFlowNetwork Security and Visibility through NetFlow
Network Security and Visibility through NetFlow
 
Leveraging Honest Users: Stealth Command-and-Control of Botnets
Leveraging Honest Users: Stealth Command-and-Control of BotnetsLeveraging Honest Users: Stealth Command-and-Control of Botnets
Leveraging Honest Users: Stealth Command-and-Control of Botnets
 
Lte and future frauds
Lte and future fraudsLte and future frauds
Lte and future frauds
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques
 
A1 Presentation
A1 PresentationA1 Presentation
A1 Presentation
 
Firewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaFirewall arch by Tareq Hanaysha
Firewall arch by Tareq Hanaysha
 

En vedette

VietnamRealEstate_E-Directory_VN_Q1_2009
VietnamRealEstate_E-Directory_VN_Q1_2009VietnamRealEstate_E-Directory_VN_Q1_2009
VietnamRealEstate_E-Directory_VN_Q1_2009
internationalvr
 
11. Social 2.0 The Next Generation Of Social Media Forum In Hong Kong Joe...
11. Social 2.0   The Next Generation Of Social Media Forum In Hong Kong   Joe...11. Social 2.0   The Next Generation Of Social Media Forum In Hong Kong   Joe...
11. Social 2.0 The Next Generation Of Social Media Forum In Hong Kong Joe...
HKAIM
 
Donne Al Volante
Donne Al VolanteDonne Al Volante
Donne Al Volante
markokr007
 
Guión para la sesión auditiva inglés g8 1-24-11
Guión para la sesión auditiva inglés g8 1-24-11Guión para la sesión auditiva inglés g8 1-24-11
Guión para la sesión auditiva inglés g8 1-24-11
Briscilides Burgos
 

En vedette (20)

VietnamRealEstate_E-Directory_VN_Q1_2009
VietnamRealEstate_E-Directory_VN_Q1_2009VietnamRealEstate_E-Directory_VN_Q1_2009
VietnamRealEstate_E-Directory_VN_Q1_2009
 
11. Social 2.0 The Next Generation Of Social Media Forum In Hong Kong Joe...
11. Social 2.0   The Next Generation Of Social Media Forum In Hong Kong   Joe...11. Social 2.0   The Next Generation Of Social Media Forum In Hong Kong   Joe...
11. Social 2.0 The Next Generation Of Social Media Forum In Hong Kong Joe...
 
18 De Diciembre Bocetos
18 De Diciembre Bocetos18 De Diciembre Bocetos
18 De Diciembre Bocetos
 
e-Museum of Wat Makutkasattriyaram
e-Museum of Wat Makutkasattriyarame-Museum of Wat Makutkasattriyaram
e-Museum of Wat Makutkasattriyaram
 
Experiences from Digital Archive Development
Experiences from Digital Archive DevelopmentExperiences from Digital Archive Development
Experiences from Digital Archive Development
 
Donne Al Volante
Donne Al VolanteDonne Al Volante
Donne Al Volante
 
Ole Dppt
Ole DpptOle Dppt
Ole Dppt
 
Basics of GnuPG (gpg) command in linux
Basics of GnuPG (gpg) command in linuxBasics of GnuPG (gpg) command in linux
Basics of GnuPG (gpg) command in linux
 
Guión para la sesión auditiva inglés g8 1-24-11
Guión para la sesión auditiva inglés g8 1-24-11Guión para la sesión auditiva inglés g8 1-24-11
Guión para la sesión auditiva inglés g8 1-24-11
 
Cambio Climatico
Cambio ClimaticoCambio Climatico
Cambio Climatico
 
Themes from Ascent of a Leader
Themes from Ascent of a LeaderThemes from Ascent of a Leader
Themes from Ascent of a Leader
 
DRFtech-Kyoto
DRFtech-KyotoDRFtech-Kyoto
DRFtech-Kyoto
 
Imprementation of Virtual Reality Technology for Museum's Presentation
Imprementation of Virtual Reality Technology for Museum's PresentationImprementation of Virtual Reality Technology for Museum's Presentation
Imprementation of Virtual Reality Technology for Museum's Presentation
 
Urban Leadership Slides
Urban Leadership SlidesUrban Leadership Slides
Urban Leadership Slides
 
Mapas Finales Wakoo
Mapas Finales WakooMapas Finales Wakoo
Mapas Finales Wakoo
 
DrupalCon jQuery
DrupalCon jQueryDrupalCon jQuery
DrupalCon jQuery
 
9 building blocks for success block stars.io
9 building blocks for success   block stars.io9 building blocks for success   block stars.io
9 building blocks for success block stars.io
 
Sowing Seeds - District 30 Keynote
Sowing Seeds - District 30 KeynoteSowing Seeds - District 30 Keynote
Sowing Seeds - District 30 Keynote
 
Magic activity
Magic activityMagic activity
Magic activity
 
1 plan financiero proyecto emprendedor (1)
1 plan financiero proyecto emprendedor (1)1 plan financiero proyecto emprendedor (1)
1 plan financiero proyecto emprendedor (1)
 

Similaire à Rdmap Security

Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
Utkarsh Verma
 
Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; Firewalls
Marrion Kujinga
 
Linux randomnumbergenerator
Linux randomnumbergeneratorLinux randomnumbergenerator
Linux randomnumbergenerator
jhonce
 

Similaire à Rdmap Security (20)

E Snet Authentication Fabric Pilot
E Snet Authentication Fabric PilotE Snet Authentication Fabric Pilot
E Snet Authentication Fabric Pilot
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
 
Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; Firewalls
 
Hunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentation
 
Make the internet safe with DNS Firewall
Make the internet safe with DNS FirewallMake the internet safe with DNS Firewall
Make the internet safe with DNS Firewall
 
Nuage Networks: Gluecon 2013 Keynote: The True Potential of Network Virtualiz...
Nuage Networks: Gluecon 2013 Keynote: The True Potential of Network Virtualiz...Nuage Networks: Gluecon 2013 Keynote: The True Potential of Network Virtualiz...
Nuage Networks: Gluecon 2013 Keynote: The True Potential of Network Virtualiz...
 
SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.
 
Firewalls
FirewallsFirewalls
Firewalls
 
How to Analyze an Android Bot
How to Analyze an Android BotHow to Analyze an Android Bot
How to Analyze an Android Bot
 
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISPMake Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
 
Nuage Networks: Delivering Datacenter Networks As Consumable as Computee_scot...
Nuage Networks: Delivering Datacenter Networks As Consumable as Computee_scot...Nuage Networks: Delivering Datacenter Networks As Consumable as Computee_scot...
Nuage Networks: Delivering Datacenter Networks As Consumable as Computee_scot...
 
Linux randomnumbergenerator
Linux randomnumbergeneratorLinux randomnumbergenerator
Linux randomnumbergenerator
 
Network Intelligence for a secured Network (2014-03-12)
Network Intelligence for a secured Network (2014-03-12)Network Intelligence for a secured Network (2014-03-12)
Network Intelligence for a secured Network (2014-03-12)
 
Router forensics
Router forensicsRouter forensics
Router forensics
 
Port scanning
Port scanningPort scanning
Port scanning
 
Port scanning
Port scanningPort scanning
Port scanning
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
From SDN to Cloud Networking
From SDN to Cloud NetworkingFrom SDN to Cloud Networking
From SDN to Cloud Networking
 
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
 
It’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
It’s in the Air(waves): Deconstructing 2017’s Biggest RF AttacksIt’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
It’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
 

Dernier

Dernier (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Rdmap Security

  • 1. A Seminar by Shinto. T. Jose
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.