Soumettre la recherche
Mettre en ligne
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
•
Télécharger en tant que PPT, PDF
•
1 j'aime
•
444 vues
Eric Vanderburg
Suivre
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 11
Télécharger maintenant
Recommandé
Hardware Security
Hardware Security
Mani Rathnam
Network Security Tools and applications
Network Security Tools and applications
webhostingguy
Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
Kabul Education University
Technical seminar on Security
Technical seminar on Security
STS
Network Security
Network Security
Joe Baker
Understanding the need for security measures
Understanding the need for security measures
joy grace bagui
Network Security 1st Lecture
Network Security 1st Lecture
babak danyal
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
Shafaan Khaliq Bhatti
Recommandé
Hardware Security
Hardware Security
Mani Rathnam
Network Security Tools and applications
Network Security Tools and applications
webhostingguy
Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
Kabul Education University
Technical seminar on Security
Technical seminar on Security
STS
Network Security
Network Security
Joe Baker
Understanding the need for security measures
Understanding the need for security measures
joy grace bagui
Network Security 1st Lecture
Network Security 1st Lecture
babak danyal
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
Shafaan Khaliq Bhatti
Network Forensics
Network Forensics
primeteacher32
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
HTS Hosting
Cs8792 cns - unit v
Cs8792 cns - unit v
ArthyR3
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015
mauimarketing
Hardware firewall
Hardware firewall
Subrata Kumer Paul
Security in Computer System
Security in Computer System
Manesh T
Firewall & packet filter new
Firewall & packet filter new
Karnav Rana
Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar War
Nasir Bhutta
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
vishnukp34
Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1
Saksham Agrawal
Firewall
Firewall
Muhammad Sohaib Afzaal
Firewall
Firewall
reddivarihareesh
Basic security concepts_chapter_1
Basic security concepts_chapter_1
abdifatah said
Firewall presentation
Firewall presentation
TayabaZahid
Intrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
Amr Rashed
Lesson 2 - IDPS
Lesson 2 - IDPS
MLG College of Learning, Inc
Lesson 3- Remote Access
Lesson 3- Remote Access
MLG College of Learning, Inc
Network Security Topic 1 intro
Network Security Topic 1 intro
Khawar Nehal khawar.nehal@atrc.net.pk
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
RootedCON
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
Eric Vanderburg
Konsys 20
Konsys 20
ajhevfsjehv
Contenu connexe
Tendances
Network Forensics
Network Forensics
primeteacher32
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
HTS Hosting
Cs8792 cns - unit v
Cs8792 cns - unit v
ArthyR3
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015
mauimarketing
Hardware firewall
Hardware firewall
Subrata Kumer Paul
Security in Computer System
Security in Computer System
Manesh T
Firewall & packet filter new
Firewall & packet filter new
Karnav Rana
Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar War
Nasir Bhutta
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
vishnukp34
Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1
Saksham Agrawal
Firewall
Firewall
Muhammad Sohaib Afzaal
Firewall
Firewall
reddivarihareesh
Basic security concepts_chapter_1
Basic security concepts_chapter_1
abdifatah said
Firewall presentation
Firewall presentation
TayabaZahid
Intrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
Amr Rashed
Lesson 2 - IDPS
Lesson 2 - IDPS
MLG College of Learning, Inc
Lesson 3- Remote Access
Lesson 3- Remote Access
MLG College of Learning, Inc
Network Security Topic 1 intro
Network Security Topic 1 intro
Khawar Nehal khawar.nehal@atrc.net.pk
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
RootedCON
Tendances
(20)
Network Forensics
Network Forensics
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
Cs8792 cns - unit v
Cs8792 cns - unit v
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015
Hardware firewall
Hardware firewall
Security in Computer System
Security in Computer System
Firewall & packet filter new
Firewall & packet filter new
Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar War
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1
Firewall
Firewall
Firewall
Firewall
Basic security concepts_chapter_1
Basic security concepts_chapter_1
Firewall presentation
Firewall presentation
Intrusion detection and prevention system
Intrusion detection and prevention system
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
Lesson 2 - IDPS
Lesson 2 - IDPS
Lesson 3- Remote Access
Lesson 3- Remote Access
Network Security Topic 1 intro
Network Security Topic 1 intro
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
En vedette
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
Eric Vanderburg
Konsys 20
Konsys 20
ajhevfsjehv
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
Dre Armeda
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Druva
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence
Cyphort
WordPress End-User Security
WordPress End-User Security
Dre Armeda
It security training
It security training
gethumamaravi
Step FWD IT_Ransomware-Guide
Step FWD IT_Ransomware-Guide
chrismannering
How to stay protected against ransomware
How to stay protected against ransomware
Sophos Benelux
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in Cybersecurity
Cyphort
User security awareness
User security awareness
K. A. M Lutfullah
Security Hole #18 - Cryptolocker Ransomware
Security Hole #18 - Cryptolocker Ransomware
Igor Beliaiev
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
mrzapper
2011.2.03 Marketing
2011.2.03 Marketing
Stephan Langdon
Itsa end user 2013
Itsa end user 2013
salleh1n
Basic Security Training for End Users
Basic Security Training for End Users
Community IT Innovators
70 640 Lesson01 Ppt 041009
70 640 Lesson01 Ppt 041009
Coffeyville Community College
Sophos paul ducklin
Sophos paul ducklin
BigDataExpo
PSConfEU - Offensive Active Directory (With PowerShell!)
PSConfEU - Offensive Active Directory (With PowerShell!)
Will Schroeder
En vedette
(20)
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
Konsys 20
Konsys 20
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence
WordPress End-User Security
WordPress End-User Security
It security training
It security training
Step FWD IT_Ransomware-Guide
Step FWD IT_Ransomware-Guide
How to stay protected against ransomware
How to stay protected against ransomware
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in Cybersecurity
User security awareness
User security awareness
Security Hole #18 - Cryptolocker Ransomware
Security Hole #18 - Cryptolocker Ransomware
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
2011.2.03 Marketing
2011.2.03 Marketing
Itsa end user 2013
Itsa end user 2013
Basic Security Training for End Users
Basic Security Training for End Users
70 640 Lesson01 Ppt 041009
70 640 Lesson01 Ppt 041009
Sophos paul ducklin
Sophos paul ducklin
PSConfEU - Offensive Active Directory (With PowerShell!)
PSConfEU - Offensive Active Directory (With PowerShell!)
Similaire à Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 3 - Basics - Eric Vanderburg
Information Security Lesson 3 - Basics - Eric Vanderburg
Eric Vanderburg
Coud discovery chap 5
Coud discovery chap 5
Alain Charpentier
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
MarketingArrowECS_CZ
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
gocybersec
Ch8ed12romney
Ch8ed12romney
woyaoni
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
PROIDEA
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
Brent Bernard, CISSP & PCI-QSA
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
Brent Bernard, CISSP & PCI-QSA
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
Austin Ross
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
Brent Bernard, CISSP & PCI-QSA
Six steps for securing offshore development
Six steps for securing offshore development
gmaran23
Power Grid Communications & Control Systems
Power Grid Communications & Control Systems
fajjarrehman
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
TI Safe
Data Governance and Management in Cloud pak nam
Data Governance and Management in Cloud pak nam
PT Datacomm Diangraha
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
BabyBoy55
security in is.pptx
security in is.pptx
selvapriyabiher
Network security and protocols
Network security and protocols
Online
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery
Brian Pichman
ML13198A410.pdf
ML13198A410.pdf
ParasPatel967737
ML13198A410.pdf
ML13198A410.pdf
KalsoomTahir2
Similaire à Information Security Lesson 13 - Advanced Security - Eric Vanderburg
(20)
Information Security Lesson 3 - Basics - Eric Vanderburg
Information Security Lesson 3 - Basics - Eric Vanderburg
Coud discovery chap 5
Coud discovery chap 5
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
Ch8ed12romney
Ch8ed12romney
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
Six steps for securing offshore development
Six steps for securing offshore development
Power Grid Communications & Control Systems
Power Grid Communications & Control Systems
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
Data Governance and Management in Cloud pak nam
Data Governance and Management in Cloud pak nam
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
security in is.pptx
security in is.pptx
Network security and protocols
Network security and protocols
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery
ML13198A410.pdf
ML13198A410.pdf
ML13198A410.pdf
ML13198A410.pdf
Plus de Eric Vanderburg
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
Mobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
Eric Vanderburg
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Eric Vanderburg
Principles of technology management
Principles of technology management
Eric Vanderburg
Japanese railway technology
Japanese railway technology
Eric Vanderburg
Evaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Eric Vanderburg
Japanese current and future technology management challenges
Japanese current and future technology management challenges
Eric Vanderburg
Technology management in Japan: Robotics
Technology management in Japan: Robotics
Eric Vanderburg
Incident response table top exercises
Incident response table top exercises
Eric Vanderburg
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Eric Vanderburg
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Eric Vanderburg
Plus de Eric Vanderburg
(20)
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Mobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Principles of technology management
Principles of technology management
Japanese railway technology
Japanese railway technology
Evaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Japanese current and future technology management challenges
Japanese current and future technology management challenges
Technology management in Japan: Robotics
Technology management in Japan: Robotics
Incident response table top exercises
Incident response table top exercises
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Dernier
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Dernier
(20)
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
1.
Information Security Chapter 13 Advanced
Security & Beyond Information Security © 2006 Eric Vanderburg
2.
Computer Forensics • Retrieving
information from computers for use in an investigation • The need for forensics knowledge will increase due to: – Increased digital information being stored – Higher criminal computer skill – Mistakes in the handling of evidence can make it inadmissable in court Information Security © 2006 Eric Vanderburg
3.
Forensics • Electronic data
is harder to destroy – Search programs – RAM slack – data from RAM that is inserted to fill the rest of the sector – File or drive slack – previous data from the drive that is contained in any additional unused sectors in an allocated cluster. – Page file • Difficulties – – – – – Much data to look through 1 day of email is equal to a years worth of snail mail. Data may be stored in many places under different controls Dynamic content makes data different each time it is accessed Data can be changed simply by accessing it Information Security © 2006 Eric Vanderburg
4.
Forensics • Metadata –
data about data – Can be useful to find information about a file. – Could be false because some metadata is not updated properly or is coded by the author • Steganography – hiding data in data – Use hashes to uncover data within system files and application files. – Other files must be scanned by steganography programs. Information Security © 2006 Eric Vanderburg
5.
Responding to the
incident 1. Secure the crime scene a) 2. Collect the evidence a) b) c) 3. Data can be easily destroyed (take proper care of it) Before shutting the computer down, record some information (RAM contents, network connections, running programs, current user, open files or URLs, and current configurations) Before data is changed or scanned, hard disks are secured and mirrored using a bit-stream backup. Establish a chain of custody a) 4. Photograph the equipment placement with analog film before it is touched (protect against accusations of planting or tampering) Show that the equipment/evidence was secure at all times and show who had access to it at all times to protect against tampering. Examine and preserve the evidence Information Security © 2006 Eric Vanderburg
6.
Attacks • Attacks are
quicker than ever • Attacks are more frequent Information Security © 2006 Eric Vanderburg
7.
Technology • Encryption extensions
are being built into processors – TPM (Trusted Platform Model) – making a cryptographic coprocessor standard on each processor • Behavior blocking – rather than using a specific signature, we watch for behavior. (more false positives) • Antispam • Cap network connections (average is 2 per second) – could be much larger for those using file sharing or chat programs. • Sandboxing through virtual machines • Baselining (Internet traffic, ports, programs) • DRM (Digital Rights Management) – control access and use of information. Information Security © 2006 Eric Vanderburg
8.
Employment • The need
for security workers is higher than any other IT need. (Programming comes in close second) • Security Certifications Information Security © 2006 Eric Vanderburg
9.
Certifications • • • • • Security+ CWSP (Certified Wireless
Security Professional) CCSP (Cisco Certified Security Professional) MCSE: Security (Microsoft Certified Systems Engineer): Security (ISC)2 (International Information Systems Security Certification Consortium) – CISSP (Certified Information Systems Security Professional) – SSCP (Systems Security Certified Practitioner) • EC-Council – CEH (Certified Ethical Hacker) – CHFI (Computer Hacking Forensics Investigator) • Checkpoint – CCSA (Checkpoint Certified Security Administrator) – CCSE (Checkpoint Certified Security Expert) • RSA – RCSE (RSA Certified Systems Engineer) – RCSA (RSA Certified Systems Administrator) Information Security © 2006 Eric Vanderburg
10.
Skills • Networking knowledge –
TCP/IP – Network equipment (routers, firewalls, VLANs, switching) – Intrusion detection systems • People skills – People are the largest threat so you must understand them. – Training • Legal – Understand your responsibilities and your limitations (privacy) – Operate under the guidance of your security policy (this will protect you against legal action) Information Security © 2006 Eric Vanderburg
11.
Acronyms • HIP, Host
Intrusion Prevention • TPM, Trusted Platform Model Information Security © 2006 Eric Vanderburg
Télécharger maintenant