SlideShare une entreprise Scribd logo
1  sur  22
Lec-4: Cyber Security
Mr. Islahuddin Jalal
MS (Cyber Security) – UKM Malaysia
Research Title – 3C-CSIRT Model for Afghanistan
BAKHTAR UNIVERSITY ‫باخترپوهنتون‬ ‫د‬
Enterprise Cybersecurity Architecture
• There are 11 functional areas which needs to be organized and managed
enterprise cybersecurity
1. System administration
2. Network Security
3. Application Security
4. Endpoint, Server, and Device Security
5. Identity, Authentication, and Access Management
6. Data Protection and Cryptography
7. Monitoring, vulnerability and patch management
8. High availability, Disaster recovery, and Physical Protection
9. Incident Response
10. Asset Management and supply chain
11. Policy, Audit, E-Discovery and Training
System administration Security
System administration
• Provides for securing administration of
• Enterprise infrastructure
• Security infrastructure
• Secure system administration is the foundation for enterprise security
measures
Reasons for targeting system administration
• Consolidation in IT
• Now a days system administrator controls thousands of computers, often
from a single console
• System administration security is poor
• Systems administration technology is relatively immature with few
built-in checks and balances to detect malicious activity or prevent in
the first place
System administration Goals and Objectives
• Goal
• To protect the enterprise's administrative channels from being used by
adversary
• Objectives
• Preventive (make it harder for the attackers to get system control)
• Detective (detect attacks on system administration channels or malicious
systems administration activity when it occurs)
• Forensics (focus on creating detailed audit logs of all privileged systems
administration activities)
SA: Threat Vectors
• Keeping attackers from conducting malicious systems administration
activities in the enterprise.
• Compromise credentials of system administrator
• Compromise the computer of system administrator
• Compromise the computing infrastructure (virtualization, storage etc) and use
the computing capabilities to take control of systems
• Compromise systems administration infrastructure (computer mangt. Patch
magt. Or other systems to take control of the enterprise
• Compromise monitoring systems that have administrative access
• Use local computer administrative accounts to move from one personal
computer to another with administrative rights
SA: Capabilities
• SA capabilities help
• Isolate command and control networks and protocols
• Provide cryptographic protection for systems administration
• Allow for auditing of systems administration activities to detect attacks
• In this functional area, it is good to have redundancy in protection.
• For example, using network isolation along with strong authentication helps
ensure that the breach of one protection mechanism alone will not be
disastrous.
SA capabilities
• Bastion hosts
• Out-of-Band (OOB) management
• Network isolation
• Integrated Lights-Out (ILO), Keyboard Video Mouse (KVM), and power
controls
• Virtualization and Storage Area Network (SAN) management
• Segregation of administration from services
• Multi-factor authentication for Systems Administrators (SAs)
• Administrator audit trail(s)
• Command logging and analytics
Network Security
Network Security
• Purpose
• To protect the enterprise network from unauthorized access
• Needs to be considered in terms of the following security controls
• Preventive control (firewall and separate sections of the network from each
other)
• Detective control (IDS: detect attacker activity that cannot be blocked)
• Monitoring control (capture activity that is input to correlation engines that
support forensics.)
Containment capability
• Containment involves
• isolating attacker activity in one part of the enterprise (for example, end-user
workstations or Internet-facing web servers) from other IT functions such as
financial systems in order to provide for a layered defense
NS: Goals and Objectives
• Block malicious traffic
• Monitor and analyze network traffic
• Log information about network traffic
NS: Threat Vectors
• Attackers enter the enterprise through outbound network connections from
servers or clients on the internal network.
• Attackers enter the enterprise through the network connections of Internet-
facing servers.
• Attackers use internal networks to move laterally between computers inside the
enterprise.
• Attackers use enterprise networks to extract data and remove it from the
enterprise.
• Attackers take control of network infrastructure components and then leverage
them to gain entry to the enterprise or to bypass other security measures.
NS: Capabilities
• Switches and routers
• Software Defined Networking (SDN)
• Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP)
• Network Time Protocol (NTP)
• Network service management
• Firewall and virtual machine firewall
• Network Intrusion Detection/Network Intrusion Prevention System (IDS/IPS)
• Wireless networking (Wi-Fi)
• Packet intercept and capture
• Secure Sockets Layer (SSL) intercept
• Network Access Control (NAC)
• Virtual Private Networking (VPN) and Internet Protocol Security (IPSec)
• Network Traffic Analysis (NTA)
• Network Data Analytics (NDA)
Application Security
Application Security
• Application security involves security measures that are specific to
certain applications or protocols running over the network.
• By this simple definition, application security technologies and capabilities
include
• e-mail security
• application-aware firewall features
• database gateways
• forward web proxies.
• Application security operates alongside network security.
AS: Goal and objectives
• Goal
• to protect the enterprise applications from use or attack
• Objective
• The preventive objective is to block exploitation of applications and
application communications protocols for malicious use.
• The detective objective is to detect compromises of applications and attempts
to exploit them for malicious purposes.
• The forensic objective is to log data about application activity that can be
used for audits and investigations of incidents.
• The audit objective is for auditors to be able to collect evidence and artifacts
that suggest that applications are safe and not being used or manipulated by
attackers.
AS: Threat Vectors
• Initial entry by leveraging email to send malicious
messages(attachment or links) to users.
• For gaining control of end user, servers, mobile device
• Leverage vulnerabilities in web browsers and web-plugins
• For gaining control
• Exploiting vulnerabilities in enterprise server applications.
• For gaining control
• During the development of an application the attacker may find and
then exploit the flaw of software for gaining control
AS: Capabilities
• E-mail security
• Web-shell detection
• Application firewalls
• Database firewalls
• Forward proxy and web filters
• Reverse proxy
• Data Leakage Protection (DLP)
• Secure application and database software development
• Software code vulnerability analysis (including source code verification and
bug tracking)
Continued………. Next Lecture
• Endpoint, Server, and Device Security
• Identity, Authentication, and Access Management
• Data Protection and Cryptography
Thank You
For Your Patience

Contenu connexe

Tendances

Traversing Graph Databases with Gremlin
Traversing Graph Databases with GremlinTraversing Graph Databases with Gremlin
Traversing Graph Databases with GremlinMarko Rodriguez
 
Oracle Real Application Clusters (RAC) 12c Rel. 2 - Operational Best Practices
Oracle Real Application Clusters (RAC) 12c Rel. 2 - Operational Best PracticesOracle Real Application Clusters (RAC) 12c Rel. 2 - Operational Best Practices
Oracle Real Application Clusters (RAC) 12c Rel. 2 - Operational Best PracticesMarkus Michalewicz
 
Zero to 60 with Azure Cosmos DB
Zero to 60 with Azure Cosmos DBZero to 60 with Azure Cosmos DB
Zero to 60 with Azure Cosmos DBAdnan Hashmi
 
HA, Scalability, DR & MAA in Oracle Database 21c - Overview
HA, Scalability, DR & MAA in Oracle Database 21c - OverviewHA, Scalability, DR & MAA in Oracle Database 21c - Overview
HA, Scalability, DR & MAA in Oracle Database 21c - OverviewMarkus Michalewicz
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Oracle BH
 
OMG DDS: The Data Distribution Service for Real-Time Systems
OMG DDS: The Data Distribution Service for Real-Time SystemsOMG DDS: The Data Distribution Service for Real-Time Systems
OMG DDS: The Data Distribution Service for Real-Time SystemsAngelo Corsaro
 
Oracle ASM 11g - The Evolution
Oracle ASM 11g - The EvolutionOracle ASM 11g - The Evolution
Oracle ASM 11g - The EvolutionAlex Gorbachev
 
Java EE Introduction
Java EE IntroductionJava EE Introduction
Java EE Introductionejlp12
 
Distributed sagas a protocol for coordinating microservices
Distributed sagas a protocol for coordinating microservicesDistributed sagas a protocol for coordinating microservices
Distributed sagas a protocol for coordinating microservicesJ On The Beach
 
Migration to Alibaba Cloud
Migration to Alibaba CloudMigration to Alibaba Cloud
Migration to Alibaba CloudAlibaba Cloud
 
Azure SQL Database Managed Instance
Azure SQL Database Managed InstanceAzure SQL Database Managed Instance
Azure SQL Database Managed InstanceJames Serra
 
Application Portfolio Assessment and the 6Rs in Cloud Migrations
Application Portfolio Assessment and the 6Rs in Cloud MigrationsApplication Portfolio Assessment and the 6Rs in Cloud Migrations
Application Portfolio Assessment and the 6Rs in Cloud MigrationsAmazon Web Services
 
What are the Business Benefits of Microsoft Azure
What are the Business Benefits of Microsoft AzureWhat are the Business Benefits of Microsoft Azure
What are the Business Benefits of Microsoft AzureChris Roche
 
Cadence: The Only Workflow Platform You'll Ever Need
Cadence: The Only Workflow Platform You'll Ever NeedCadence: The Only Workflow Platform You'll Ever Need
Cadence: The Only Workflow Platform You'll Ever NeedMaxim Fateev
 
Services comparison among Microsoft Azure AWS and Google Cloud Platform
Services comparison among Microsoft Azure AWS and Google Cloud PlatformServices comparison among Microsoft Azure AWS and Google Cloud Platform
Services comparison among Microsoft Azure AWS and Google Cloud Platformindu Yadav
 
Dapr: the glue to your microservices
Dapr: the glue to your microservicesDapr: the glue to your microservices
Dapr: the glue to your microservicesMoaid Hathot
 
Building and deploying microservices with event sourcing, CQRS and Docker (Be...
Building and deploying microservices with event sourcing, CQRS and Docker (Be...Building and deploying microservices with event sourcing, CQRS and Docker (Be...
Building and deploying microservices with event sourcing, CQRS and Docker (Be...Chris Richardson
 

Tendances (20)

Traversing Graph Databases with Gremlin
Traversing Graph Databases with GremlinTraversing Graph Databases with Gremlin
Traversing Graph Databases with Gremlin
 
Oracle Real Application Clusters (RAC) 12c Rel. 2 - Operational Best Practices
Oracle Real Application Clusters (RAC) 12c Rel. 2 - Operational Best PracticesOracle Real Application Clusters (RAC) 12c Rel. 2 - Operational Best Practices
Oracle Real Application Clusters (RAC) 12c Rel. 2 - Operational Best Practices
 
Zero to 60 with Azure Cosmos DB
Zero to 60 with Azure Cosmos DBZero to 60 with Azure Cosmos DB
Zero to 60 with Azure Cosmos DB
 
HA, Scalability, DR & MAA in Oracle Database 21c - Overview
HA, Scalability, DR & MAA in Oracle Database 21c - OverviewHA, Scalability, DR & MAA in Oracle Database 21c - Overview
HA, Scalability, DR & MAA in Oracle Database 21c - Overview
 
Event Storming and Saga
Event Storming and SagaEvent Storming and Saga
Event Storming and Saga
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
 
Microsoft Azure
Microsoft AzureMicrosoft Azure
Microsoft Azure
 
OMG DDS: The Data Distribution Service for Real-Time Systems
OMG DDS: The Data Distribution Service for Real-Time SystemsOMG DDS: The Data Distribution Service for Real-Time Systems
OMG DDS: The Data Distribution Service for Real-Time Systems
 
Oracle ASM 11g - The Evolution
Oracle ASM 11g - The EvolutionOracle ASM 11g - The Evolution
Oracle ASM 11g - The Evolution
 
Java EE Introduction
Java EE IntroductionJava EE Introduction
Java EE Introduction
 
Distributed sagas a protocol for coordinating microservices
Distributed sagas a protocol for coordinating microservicesDistributed sagas a protocol for coordinating microservices
Distributed sagas a protocol for coordinating microservices
 
Migration to Alibaba Cloud
Migration to Alibaba CloudMigration to Alibaba Cloud
Migration to Alibaba Cloud
 
Azure SQL Database Managed Instance
Azure SQL Database Managed InstanceAzure SQL Database Managed Instance
Azure SQL Database Managed Instance
 
Application Portfolio Assessment and the 6Rs in Cloud Migrations
Application Portfolio Assessment and the 6Rs in Cloud MigrationsApplication Portfolio Assessment and the 6Rs in Cloud Migrations
Application Portfolio Assessment and the 6Rs in Cloud Migrations
 
What are the Business Benefits of Microsoft Azure
What are the Business Benefits of Microsoft AzureWhat are the Business Benefits of Microsoft Azure
What are the Business Benefits of Microsoft Azure
 
Cadence: The Only Workflow Platform You'll Ever Need
Cadence: The Only Workflow Platform You'll Ever NeedCadence: The Only Workflow Platform You'll Ever Need
Cadence: The Only Workflow Platform You'll Ever Need
 
Services comparison among Microsoft Azure AWS and Google Cloud Platform
Services comparison among Microsoft Azure AWS and Google Cloud PlatformServices comparison among Microsoft Azure AWS and Google Cloud Platform
Services comparison among Microsoft Azure AWS and Google Cloud Platform
 
Domain Driven Design
Domain Driven Design Domain Driven Design
Domain Driven Design
 
Dapr: the glue to your microservices
Dapr: the glue to your microservicesDapr: the glue to your microservices
Dapr: the glue to your microservices
 
Building and deploying microservices with event sourcing, CQRS and Docker (Be...
Building and deploying microservices with event sourcing, CQRS and Docker (Be...Building and deploying microservices with event sourcing, CQRS and Docker (Be...
Building and deploying microservices with event sourcing, CQRS and Docker (Be...
 

Similaire à Cyber Security # Lec 4

Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxyasirkhokhar7
 
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Schneider Electric
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hackingDesmond Devendran
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)Sam Bowne
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security PresentationWajahat Rajab
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptxdotco
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Knoldus Inc.
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Trupti Shiralkar, CISSP
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform ServiceSoumitra Bhattacharyya
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptxrahulkumarcscsf21
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectATMOSPHERE .
 
Dncybersecurity
DncybersecurityDncybersecurity
DncybersecurityAnne Starr
 
Information systems security(1)
Information systems security(1)Information systems security(1)
Information systems security(1)Sandeep Agarwal
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdfdhanywahyudi17
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliJürgen Ambrosi
 

Similaire à Cyber Security # Lec 4 (20)

Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
 
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security Presentation
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptx
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
 
Vulenerability Management.pptx
Vulenerability Management.pptxVulenerability Management.pptx
Vulenerability Management.pptx
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform Service
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
 
Security and Control.ppt
Security and Control.pptSecurity and Control.ppt
Security and Control.ppt
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Information systems security(1)
Information systems security(1)Information systems security(1)
Information systems security(1)
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdf
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentali
 

Plus de Kabul Education University

Plus de Kabul Education University (20)

Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
 
ITIL # Lecture 9
ITIL # Lecture 9ITIL # Lecture 9
ITIL # Lecture 9
 
Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7
 
ITIL # Lecture 8
ITIL # Lecture 8ITIL # Lecture 8
ITIL # Lecture 8
 
Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6
 
ITIL # Lecture 7
ITIL # Lecture 7ITIL # Lecture 7
ITIL # Lecture 7
 
Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5
 
ITIL # Lecture 6
ITIL # Lecture 6ITIL # Lecture 6
ITIL # Lecture 6
 
ITIL # Lecture 5
ITIL # Lecture 5ITIL # Lecture 5
ITIL # Lecture 5
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
ITIL # Lecture 4
ITIL # Lecture 4ITIL # Lecture 4
ITIL # Lecture 4
 
Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
 
ITIL # Lecture 3
ITIL # Lecture 3ITIL # Lecture 3
ITIL # Lecture 3
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
ITIL # Lecture 2
ITIL # Lecture 2ITIL # Lecture 2
ITIL # Lecture 2
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
ITIL # Lecture 1
ITIL # Lecture 1ITIL # Lecture 1
ITIL # Lecture 1
 
Network security # Lecture 2
Network security # Lecture 2Network security # Lecture 2
Network security # Lecture 2
 
Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
 

Dernier

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Dernier (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Cyber Security # Lec 4

  • 1. Lec-4: Cyber Security Mr. Islahuddin Jalal MS (Cyber Security) – UKM Malaysia Research Title – 3C-CSIRT Model for Afghanistan BAKHTAR UNIVERSITY ‫باخترپوهنتون‬ ‫د‬
  • 2. Enterprise Cybersecurity Architecture • There are 11 functional areas which needs to be organized and managed enterprise cybersecurity 1. System administration 2. Network Security 3. Application Security 4. Endpoint, Server, and Device Security 5. Identity, Authentication, and Access Management 6. Data Protection and Cryptography 7. Monitoring, vulnerability and patch management 8. High availability, Disaster recovery, and Physical Protection 9. Incident Response 10. Asset Management and supply chain 11. Policy, Audit, E-Discovery and Training
  • 4. System administration • Provides for securing administration of • Enterprise infrastructure • Security infrastructure • Secure system administration is the foundation for enterprise security measures
  • 5. Reasons for targeting system administration • Consolidation in IT • Now a days system administrator controls thousands of computers, often from a single console • System administration security is poor • Systems administration technology is relatively immature with few built-in checks and balances to detect malicious activity or prevent in the first place
  • 6. System administration Goals and Objectives • Goal • To protect the enterprise's administrative channels from being used by adversary • Objectives • Preventive (make it harder for the attackers to get system control) • Detective (detect attacks on system administration channels or malicious systems administration activity when it occurs) • Forensics (focus on creating detailed audit logs of all privileged systems administration activities)
  • 7. SA: Threat Vectors • Keeping attackers from conducting malicious systems administration activities in the enterprise. • Compromise credentials of system administrator • Compromise the computer of system administrator • Compromise the computing infrastructure (virtualization, storage etc) and use the computing capabilities to take control of systems • Compromise systems administration infrastructure (computer mangt. Patch magt. Or other systems to take control of the enterprise • Compromise monitoring systems that have administrative access • Use local computer administrative accounts to move from one personal computer to another with administrative rights
  • 8. SA: Capabilities • SA capabilities help • Isolate command and control networks and protocols • Provide cryptographic protection for systems administration • Allow for auditing of systems administration activities to detect attacks • In this functional area, it is good to have redundancy in protection. • For example, using network isolation along with strong authentication helps ensure that the breach of one protection mechanism alone will not be disastrous.
  • 9. SA capabilities • Bastion hosts • Out-of-Band (OOB) management • Network isolation • Integrated Lights-Out (ILO), Keyboard Video Mouse (KVM), and power controls • Virtualization and Storage Area Network (SAN) management • Segregation of administration from services • Multi-factor authentication for Systems Administrators (SAs) • Administrator audit trail(s) • Command logging and analytics
  • 11. Network Security • Purpose • To protect the enterprise network from unauthorized access • Needs to be considered in terms of the following security controls • Preventive control (firewall and separate sections of the network from each other) • Detective control (IDS: detect attacker activity that cannot be blocked) • Monitoring control (capture activity that is input to correlation engines that support forensics.)
  • 12. Containment capability • Containment involves • isolating attacker activity in one part of the enterprise (for example, end-user workstations or Internet-facing web servers) from other IT functions such as financial systems in order to provide for a layered defense
  • 13. NS: Goals and Objectives • Block malicious traffic • Monitor and analyze network traffic • Log information about network traffic
  • 14. NS: Threat Vectors • Attackers enter the enterprise through outbound network connections from servers or clients on the internal network. • Attackers enter the enterprise through the network connections of Internet- facing servers. • Attackers use internal networks to move laterally between computers inside the enterprise. • Attackers use enterprise networks to extract data and remove it from the enterprise. • Attackers take control of network infrastructure components and then leverage them to gain entry to the enterprise or to bypass other security measures.
  • 15. NS: Capabilities • Switches and routers • Software Defined Networking (SDN) • Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) • Network Time Protocol (NTP) • Network service management • Firewall and virtual machine firewall • Network Intrusion Detection/Network Intrusion Prevention System (IDS/IPS) • Wireless networking (Wi-Fi) • Packet intercept and capture • Secure Sockets Layer (SSL) intercept • Network Access Control (NAC) • Virtual Private Networking (VPN) and Internet Protocol Security (IPSec) • Network Traffic Analysis (NTA) • Network Data Analytics (NDA)
  • 17. Application Security • Application security involves security measures that are specific to certain applications or protocols running over the network. • By this simple definition, application security technologies and capabilities include • e-mail security • application-aware firewall features • database gateways • forward web proxies. • Application security operates alongside network security.
  • 18. AS: Goal and objectives • Goal • to protect the enterprise applications from use or attack • Objective • The preventive objective is to block exploitation of applications and application communications protocols for malicious use. • The detective objective is to detect compromises of applications and attempts to exploit them for malicious purposes. • The forensic objective is to log data about application activity that can be used for audits and investigations of incidents. • The audit objective is for auditors to be able to collect evidence and artifacts that suggest that applications are safe and not being used or manipulated by attackers.
  • 19. AS: Threat Vectors • Initial entry by leveraging email to send malicious messages(attachment or links) to users. • For gaining control of end user, servers, mobile device • Leverage vulnerabilities in web browsers and web-plugins • For gaining control • Exploiting vulnerabilities in enterprise server applications. • For gaining control • During the development of an application the attacker may find and then exploit the flaw of software for gaining control
  • 20. AS: Capabilities • E-mail security • Web-shell detection • Application firewalls • Database firewalls • Forward proxy and web filters • Reverse proxy • Data Leakage Protection (DLP) • Secure application and database software development • Software code vulnerability analysis (including source code verification and bug tracking)
  • 21. Continued………. Next Lecture • Endpoint, Server, and Device Security • Identity, Authentication, and Access Management • Data Protection and Cryptography
  • 22. Thank You For Your Patience

Notes de l'éditeur

  1. System Administration (SA)
  2. Integrated Lights-Out (iLO) is a remote server management processor embedded on the system boards of HP ProLiant and Blade servers that allows controlling and monitoring of HP servers from a remote location. A KVM (keyboard, video, mouse) switch is a hardware device that allows a user to control multiple computers from a single keyboard, video display monitor andmouse. KVM switches are often found in data centers where multiple servers are placed in a single rack. Out of band Management: This management method involves an alternate and dedicated connection to the system separate from the actual network that the system runs on. This allows an administrator to ensure the establishment of trust boundaries since there would only be a single entry point for the management interface.
  3. NS=Network Security
  4. AS: Application Security
  5. Reverse Proxy: In computer networks, a reverse proxy is a type of proxy server that retrieves resources on behalf of a client from one or more servers. These resources are then returned to the client as if they originated from the Web server itself. It hide the identity of a server while forward proxy hide the identity of the client