Introduction To Information Security

B
What is Security ? Part I Meletis A. Belsis Information Security Consultant MPhil  / MSc / BSc CWNA/CWSP, C|EH, CCSA, Network+, ISO27001LA Computer Crime
Setting the Scene ,[object Object],[object Object],[object Object],[object Object],[object Object]
Profiling Adversaries ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security through obscurity  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security: easy to understand, difficult to implement  ,[object Object],[object Object],[object Object]
Security: easy to understand, difficult to implement ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security: easy to understand, difficult to implement ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Attacking Corporate Systems
Information Gathering ,[object Object],[object Object],[object Object],[object Object]
Information Gathering : Searching the Corporate Web site ,[object Object],[object Object],[object Object],[object Object],[object Object]
Information Gathering : Searching the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Gathering :Being Polite….. ,[object Object],[object Object],[object Object],[object Object]
NeoTrace: Windows Based TraceRT
Information Gathering :Identify Running Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SuperScan: Windows Based Port Scanner
Information Gathering :Scanning undetected  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Password Cracking ,[object Object],[object Object],[object Object],[object Object]
L0phtCrack: Windows Password Cracking
VIRUSES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SubSeven: Visual Interface to Control Infected PC
Denial of Service Attack (DoS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SynFlood Attack
Smurf Attack
Domain Name System DoS
Distributed Denial of Service (DDoS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sniffing ,[object Object],[object Object],[object Object],[object Object],[object Object]
SnifferPro: A windows based Sniffer
System Flaws and Exploits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Simpsons’:  A CGI vulnerability scanner
Social Engineering ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IP Spoofing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A4 Proxy : Using multiple anonymous proxies to hide the IP address
The Next Step  ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Information Security Measures
Is it possible ? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Creating a DMZ zone ,[object Object],[object Object],[object Object],[object Object]
Firewalls ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intrusion Detection Systems (IDS) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Honey Pots ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Anti sniffing ,[object Object],[object Object],[object Object],[object Object]
L0pht Antisniff : A windows based program to detect sniffers
Antivirus  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security Awareness ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Awareness
Penetration Testing and Security analyzers ,[object Object],[object Object],[object Object],[object Object]
Microsoft Baseline Security Analyzer: Tests the systems for known bugs
Additional Security Measures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You.
1 sur 49

Recommandé

Introduction to information security par
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
3.4K vues19 diapositives
Cybersecurity Employee Training par
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
3.4K vues23 diapositives
Network security par
Network securityNetwork security
Network securityEstiak Khan
1.2K vues28 diapositives
CYBER SECURITY par
CYBER SECURITYCYBER SECURITY
CYBER SECURITYVaishak Chandran
2.6K vues18 diapositives
Information security par
Information securityInformation security
Information securityavinashbalakrishnan2
2K vues59 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityAman Pradhan
2.4K vues45 diapositives

Contenu connexe

Tendances

Network security (vulnerabilities, threats, and attacks) par
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
12K vues34 diapositives
The CIA triad.pptx par
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptxGulnurAzat
2K vues9 diapositives
Information Security Awareness par
Information Security AwarenessInformation Security Awareness
Information Security AwarenessAli Hassan Ba-Issa
6.4K vues55 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityBhavin Shah
1.4K vues26 diapositives
Cyber security system presentation par
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
2.2K vues25 diapositives
Network security par
Network securityNetwork security
Network securityNkosinathi Lungu
2.7K vues10 diapositives

Tendances(20)

Network security (vulnerabilities, threats, and attacks) par Fabiha Shahzad
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad12K vues
Cyber security system presentation par A.S. Sabuj
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj2.2K vues
INFORMATION SECURITY SYSTEM par ANAND MURALI
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
ANAND MURALI1.1K vues
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA par Dheeraj Kataria
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Dheeraj Kataria588 vues
Application Security | Application Security Tutorial | Cyber Security Certifi... par Edureka!
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!2K vues
INFORMATION SECURITY par Ahmed Moussa
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa154.5K vues
Information Security Awareness par SnapComms
Information Security Awareness Information Security Awareness
Information Security Awareness
SnapComms4.4K vues
cyber security presentation.pptx par kishore golla
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
kishore golla11.8K vues
Application Security par florinc
Application SecurityApplication Security
Application Security
florinc1.7K vues
Cybersecurity Attack Vectors: How to Protect Your Organization par TriCorps Technologies
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization

Similaire à Introduction To Information Security

Hacking 1224807880385377-9 par
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9Geoff Pesimo
1.9K vues63 diapositives
Hacking by Pratyush Gupta par
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush GuptaTenet Systems Pvt Ltd
732 vues29 diapositives
Network Security & Ethical Hacking par
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical HackingSripati Mahapatra
2.5K vues51 diapositives
Hacking Presentation par
Hacking PresentationHacking Presentation
Hacking PresentationAnimesh Behera
79 vues30 diapositives
Hacking par
HackingHacking
Hackingrameswara reddy venkat
47 vues63 diapositives
Hacking par
HackingHacking
HackingRoshan Chaudhary
1.4K vues63 diapositives

Similaire à Introduction To Information Security(20)

Hacking 1224807880385377-9 par Geoff Pesimo
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
Geoff Pesimo1.9K vues
Module 5 (system hacking) par Wail Hassan
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)
Wail Hassan235 vues
Introduction of hacking and cracking par Harshil Barot
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot1.7K vues
Information security & EthicalHacking par Ave Nawsh
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
Ave Nawsh292 vues
Final project.ppt par shreyng
Final project.pptFinal project.ppt
Final project.ppt
shreyng313 vues
What Are The Advantages And Disadvantages Of I-Voting System par Alejandra Rodriguez
What Are The Advantages And Disadvantages Of I-Voting SystemWhat Are The Advantages And Disadvantages Of I-Voting System
What Are The Advantages And Disadvantages Of I-Voting System
Internet safety and you par Art Ocain
Internet safety and youInternet safety and you
Internet safety and you
Art Ocain835 vues

Dernier

AGAM COLLECTIONS.docx par
AGAM COLLECTIONS.docxAGAM COLLECTIONS.docx
AGAM COLLECTIONS.docxSimarpreetKaur198008
12 vues1 diapositive
Valuation Quarterly Webinar Dec23.pdf par
Valuation Quarterly Webinar Dec23.pdfValuation Quarterly Webinar Dec23.pdf
Valuation Quarterly Webinar Dec23.pdfFelixPerez547899
73 vues12 diapositives
The Talent Management Navigator Performance Management par
The Talent Management Navigator Performance ManagementThe Talent Management Navigator Performance Management
The Talent Management Navigator Performance ManagementSeta Wicaksana
42 vues36 diapositives
Mistakes Young Entrepreneurs Make When Approaching Problem Solving par
Mistakes Young Entrepreneurs Make When Approaching Problem SolvingMistakes Young Entrepreneurs Make When Approaching Problem Solving
Mistakes Young Entrepreneurs Make When Approaching Problem SolvingYasser Takie Eddine Abdesselam
113 vues31 diapositives
VCOSA - VIETNAM COTTON - YARN MARKET REPORT - 11/2023 ISSUE par
VCOSA - VIETNAM COTTON - YARN MARKET REPORT - 11/2023 ISSUEVCOSA - VIETNAM COTTON - YARN MARKET REPORT - 11/2023 ISSUE
VCOSA - VIETNAM COTTON - YARN MARKET REPORT - 11/2023 ISSUEVietnam Cotton & Spinning Association
40 vues26 diapositives
Learning from Failure_ Lessons from Failed Startups.pptx par
Learning from Failure_ Lessons from Failed Startups.pptxLearning from Failure_ Lessons from Failed Startups.pptx
Learning from Failure_ Lessons from Failed Startups.pptxCodeventures
20 vues7 diapositives

Dernier(20)

The Talent Management Navigator Performance Management par Seta Wicaksana
The Talent Management Navigator Performance ManagementThe Talent Management Navigator Performance Management
The Talent Management Navigator Performance Management
Seta Wicaksana42 vues
Learning from Failure_ Lessons from Failed Startups.pptx par Codeventures
Learning from Failure_ Lessons from Failed Startups.pptxLearning from Failure_ Lessons from Failed Startups.pptx
Learning from Failure_ Lessons from Failed Startups.pptx
Codeventures20 vues
3Q23_EN.pdf par irhcs
3Q23_EN.pdf3Q23_EN.pdf
3Q23_EN.pdf
irhcs21 vues
Gross_TownHall_Summit Conf 2023 BRC Intro slides.pptx par bradgallagher6
Gross_TownHall_Summit Conf 2023 BRC Intro slides.pptxGross_TownHall_Summit Conf 2023 BRC Intro slides.pptx
Gross_TownHall_Summit Conf 2023 BRC Intro slides.pptx
bradgallagher651 vues
Hoole_Summit 2023 - Opening Remarks.pptx par bradgallagher6
Hoole_Summit 2023 - Opening Remarks.pptxHoole_Summit 2023 - Opening Remarks.pptx
Hoole_Summit 2023 - Opening Remarks.pptx
bradgallagher615 vues
SaaStr Workshop Wednesdays: State of SaaS with Altimeter Capital par saastr
SaaStr Workshop Wednesdays: State of SaaS with Altimeter CapitalSaaStr Workshop Wednesdays: State of SaaS with Altimeter Capital
SaaStr Workshop Wednesdays: State of SaaS with Altimeter Capital
saastr11 vues
December 2023 - Meat on the Bones par NZSG
December 2023 - Meat on the BonesDecember 2023 - Meat on the Bones
December 2023 - Meat on the Bones
NZSG46 vues
Super Solar Mounting Solutions 20230509(1).pdf par carrie55bradshaw
Super Solar Mounting Solutions 20230509(1).pdfSuper Solar Mounting Solutions 20230509(1).pdf
Super Solar Mounting Solutions 20230509(1).pdf
Engaging Senior Leaders to Accelerate Your Continuous Improvement Program par KaiNexus
Engaging Senior Leaders to Accelerate Your Continuous Improvement ProgramEngaging Senior Leaders to Accelerate Your Continuous Improvement Program
Engaging Senior Leaders to Accelerate Your Continuous Improvement Program
KaiNexus101 vues
Better Appeals and Solicitations - Bloomerang.pdf par Bloomerang
Better Appeals and Solicitations - Bloomerang.pdfBetter Appeals and Solicitations - Bloomerang.pdf
Better Appeals and Solicitations - Bloomerang.pdf
Bloomerang124 vues

Introduction To Information Security