Enviar búsqueda
Cargar
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
•
Descargar como PPT, PDF
•
1 recomendación
•
444 vistas
Eric Vanderburg
Seguir
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Leer menos
Leer más
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 11
Descargar ahora
Recomendados
Hardware Security
Hardware Security
Mani Rathnam
Network Security Tools and applications
Network Security Tools and applications
webhostingguy
Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
Kabul Education University
Technical seminar on Security
Technical seminar on Security
STS
Network Security
Network Security
Joe Baker
Understanding the need for security measures
Understanding the need for security measures
joy grace bagui
Network Security 1st Lecture
Network Security 1st Lecture
babak danyal
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
Shafaan Khaliq Bhatti
Recomendados
Hardware Security
Hardware Security
Mani Rathnam
Network Security Tools and applications
Network Security Tools and applications
webhostingguy
Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
Kabul Education University
Technical seminar on Security
Technical seminar on Security
STS
Network Security
Network Security
Joe Baker
Understanding the need for security measures
Understanding the need for security measures
joy grace bagui
Network Security 1st Lecture
Network Security 1st Lecture
babak danyal
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
Shafaan Khaliq Bhatti
Network Forensics
Network Forensics
primeteacher32
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
HTS Hosting
Cs8792 cns - unit v
Cs8792 cns - unit v
ArthyR3
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015
mauimarketing
Hardware firewall
Hardware firewall
Subrata Kumer Paul
Security in Computer System
Security in Computer System
Manesh T
Firewall & packet filter new
Firewall & packet filter new
Karnav Rana
Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar War
Nasir Bhutta
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
vishnukp34
Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1
Saksham Agrawal
Firewall
Firewall
Muhammad Sohaib Afzaal
Firewall
Firewall
reddivarihareesh
Basic security concepts_chapter_1
Basic security concepts_chapter_1
abdifatah said
Firewall presentation
Firewall presentation
TayabaZahid
Intrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
Amr Rashed
Lesson 2 - IDPS
Lesson 2 - IDPS
MLG College of Learning, Inc
Lesson 3- Remote Access
Lesson 3- Remote Access
MLG College of Learning, Inc
Network Security Topic 1 intro
Network Security Topic 1 intro
Khawar Nehal khawar.nehal@atrc.net.pk
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
RootedCON
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
Eric Vanderburg
Konsys 20
Konsys 20
ajhevfsjehv
Más contenido relacionado
La actualidad más candente
Network Forensics
Network Forensics
primeteacher32
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
HTS Hosting
Cs8792 cns - unit v
Cs8792 cns - unit v
ArthyR3
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015
mauimarketing
Hardware firewall
Hardware firewall
Subrata Kumer Paul
Security in Computer System
Security in Computer System
Manesh T
Firewall & packet filter new
Firewall & packet filter new
Karnav Rana
Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar War
Nasir Bhutta
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
vishnukp34
Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1
Saksham Agrawal
Firewall
Firewall
Muhammad Sohaib Afzaal
Firewall
Firewall
reddivarihareesh
Basic security concepts_chapter_1
Basic security concepts_chapter_1
abdifatah said
Firewall presentation
Firewall presentation
TayabaZahid
Intrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
Amr Rashed
Lesson 2 - IDPS
Lesson 2 - IDPS
MLG College of Learning, Inc
Lesson 3- Remote Access
Lesson 3- Remote Access
MLG College of Learning, Inc
Network Security Topic 1 intro
Network Security Topic 1 intro
Khawar Nehal khawar.nehal@atrc.net.pk
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
RootedCON
La actualidad más candente
(20)
Network Forensics
Network Forensics
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
Cs8792 cns - unit v
Cs8792 cns - unit v
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015
Hardware firewall
Hardware firewall
Security in Computer System
Security in Computer System
Firewall & packet filter new
Firewall & packet filter new
Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar War
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1
Firewall
Firewall
Firewall
Firewall
Basic security concepts_chapter_1
Basic security concepts_chapter_1
Firewall presentation
Firewall presentation
Intrusion detection and prevention system
Intrusion detection and prevention system
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
Lesson 2 - IDPS
Lesson 2 - IDPS
Lesson 3- Remote Access
Lesson 3- Remote Access
Network Security Topic 1 intro
Network Security Topic 1 intro
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Destacado
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
Eric Vanderburg
Konsys 20
Konsys 20
ajhevfsjehv
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
Dre Armeda
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Druva
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence
Cyphort
WordPress End-User Security
WordPress End-User Security
Dre Armeda
It security training
It security training
gethumamaravi
Step FWD IT_Ransomware-Guide
Step FWD IT_Ransomware-Guide
chrismannering
How to stay protected against ransomware
How to stay protected against ransomware
Sophos Benelux
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in Cybersecurity
Cyphort
User security awareness
User security awareness
K. A. M Lutfullah
Security Hole #18 - Cryptolocker Ransomware
Security Hole #18 - Cryptolocker Ransomware
Igor Beliaiev
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
mrzapper
2011.2.03 Marketing
2011.2.03 Marketing
Stephan Langdon
Itsa end user 2013
Itsa end user 2013
salleh1n
Basic Security Training for End Users
Basic Security Training for End Users
Community IT Innovators
70 640 Lesson01 Ppt 041009
70 640 Lesson01 Ppt 041009
Coffeyville Community College
Sophos paul ducklin
Sophos paul ducklin
BigDataExpo
PSConfEU - Offensive Active Directory (With PowerShell!)
PSConfEU - Offensive Active Directory (With PowerShell!)
Will Schroeder
Destacado
(20)
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
Konsys 20
Konsys 20
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence
WordPress End-User Security
WordPress End-User Security
It security training
It security training
Step FWD IT_Ransomware-Guide
Step FWD IT_Ransomware-Guide
How to stay protected against ransomware
How to stay protected against ransomware
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in Cybersecurity
User security awareness
User security awareness
Security Hole #18 - Cryptolocker Ransomware
Security Hole #18 - Cryptolocker Ransomware
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
2011.2.03 Marketing
2011.2.03 Marketing
Itsa end user 2013
Itsa end user 2013
Basic Security Training for End Users
Basic Security Training for End Users
70 640 Lesson01 Ppt 041009
70 640 Lesson01 Ppt 041009
Sophos paul ducklin
Sophos paul ducklin
PSConfEU - Offensive Active Directory (With PowerShell!)
PSConfEU - Offensive Active Directory (With PowerShell!)
Similar a Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 3 - Basics - Eric Vanderburg
Information Security Lesson 3 - Basics - Eric Vanderburg
Eric Vanderburg
Coud discovery chap 5
Coud discovery chap 5
Alain Charpentier
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
MarketingArrowECS_CZ
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
gocybersec
Ch8ed12romney
Ch8ed12romney
woyaoni
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
PROIDEA
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
Brent Bernard, CISSP & PCI-QSA
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
Brent Bernard, CISSP & PCI-QSA
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
Austin Ross
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
Brent Bernard, CISSP & PCI-QSA
Six steps for securing offshore development
Six steps for securing offshore development
gmaran23
Power Grid Communications & Control Systems
Power Grid Communications & Control Systems
fajjarrehman
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
TI Safe
Data Governance and Management in Cloud pak nam
Data Governance and Management in Cloud pak nam
PT Datacomm Diangraha
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
BabyBoy55
security in is.pptx
security in is.pptx
selvapriyabiher
Network security and protocols
Network security and protocols
Online
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery
Brian Pichman
ML13198A410.pdf
ML13198A410.pdf
ParasPatel967737
ML13198A410.pdf
ML13198A410.pdf
KalsoomTahir2
Similar a Information Security Lesson 13 - Advanced Security - Eric Vanderburg
(20)
Information Security Lesson 3 - Basics - Eric Vanderburg
Information Security Lesson 3 - Basics - Eric Vanderburg
Coud discovery chap 5
Coud discovery chap 5
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
Ch8ed12romney
Ch8ed12romney
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
Six steps for securing offshore development
Six steps for securing offshore development
Power Grid Communications & Control Systems
Power Grid Communications & Control Systems
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
Data Governance and Management in Cloud pak nam
Data Governance and Management in Cloud pak nam
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
security in is.pptx
security in is.pptx
Network security and protocols
Network security and protocols
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery
ML13198A410.pdf
ML13198A410.pdf
ML13198A410.pdf
ML13198A410.pdf
Más de Eric Vanderburg
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
Mobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
Eric Vanderburg
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Eric Vanderburg
Principles of technology management
Principles of technology management
Eric Vanderburg
Japanese railway technology
Japanese railway technology
Eric Vanderburg
Evaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Eric Vanderburg
Japanese current and future technology management challenges
Japanese current and future technology management challenges
Eric Vanderburg
Technology management in Japan: Robotics
Technology management in Japan: Robotics
Eric Vanderburg
Incident response table top exercises
Incident response table top exercises
Eric Vanderburg
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Eric Vanderburg
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Eric Vanderburg
Más de Eric Vanderburg
(20)
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Mobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Principles of technology management
Principles of technology management
Japanese railway technology
Japanese railway technology
Evaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Japanese current and future technology management challenges
Japanese current and future technology management challenges
Technology management in Japan: Robotics
Technology management in Japan: Robotics
Incident response table top exercises
Incident response table top exercises
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Último
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Softradix Technologies
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Neo4j
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
Último
(20)
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
1.
Information Security Chapter 13 Advanced
Security & Beyond Information Security © 2006 Eric Vanderburg
2.
Computer Forensics • Retrieving
information from computers for use in an investigation • The need for forensics knowledge will increase due to: – Increased digital information being stored – Higher criminal computer skill – Mistakes in the handling of evidence can make it inadmissable in court Information Security © 2006 Eric Vanderburg
3.
Forensics • Electronic data
is harder to destroy – Search programs – RAM slack – data from RAM that is inserted to fill the rest of the sector – File or drive slack – previous data from the drive that is contained in any additional unused sectors in an allocated cluster. – Page file • Difficulties – – – – – Much data to look through 1 day of email is equal to a years worth of snail mail. Data may be stored in many places under different controls Dynamic content makes data different each time it is accessed Data can be changed simply by accessing it Information Security © 2006 Eric Vanderburg
4.
Forensics • Metadata –
data about data – Can be useful to find information about a file. – Could be false because some metadata is not updated properly or is coded by the author • Steganography – hiding data in data – Use hashes to uncover data within system files and application files. – Other files must be scanned by steganography programs. Information Security © 2006 Eric Vanderburg
5.
Responding to the
incident 1. Secure the crime scene a) 2. Collect the evidence a) b) c) 3. Data can be easily destroyed (take proper care of it) Before shutting the computer down, record some information (RAM contents, network connections, running programs, current user, open files or URLs, and current configurations) Before data is changed or scanned, hard disks are secured and mirrored using a bit-stream backup. Establish a chain of custody a) 4. Photograph the equipment placement with analog film before it is touched (protect against accusations of planting or tampering) Show that the equipment/evidence was secure at all times and show who had access to it at all times to protect against tampering. Examine and preserve the evidence Information Security © 2006 Eric Vanderburg
6.
Attacks • Attacks are
quicker than ever • Attacks are more frequent Information Security © 2006 Eric Vanderburg
7.
Technology • Encryption extensions
are being built into processors – TPM (Trusted Platform Model) – making a cryptographic coprocessor standard on each processor • Behavior blocking – rather than using a specific signature, we watch for behavior. (more false positives) • Antispam • Cap network connections (average is 2 per second) – could be much larger for those using file sharing or chat programs. • Sandboxing through virtual machines • Baselining (Internet traffic, ports, programs) • DRM (Digital Rights Management) – control access and use of information. Information Security © 2006 Eric Vanderburg
8.
Employment • The need
for security workers is higher than any other IT need. (Programming comes in close second) • Security Certifications Information Security © 2006 Eric Vanderburg
9.
Certifications • • • • • Security+ CWSP (Certified Wireless
Security Professional) CCSP (Cisco Certified Security Professional) MCSE: Security (Microsoft Certified Systems Engineer): Security (ISC)2 (International Information Systems Security Certification Consortium) – CISSP (Certified Information Systems Security Professional) – SSCP (Systems Security Certified Practitioner) • EC-Council – CEH (Certified Ethical Hacker) – CHFI (Computer Hacking Forensics Investigator) • Checkpoint – CCSA (Checkpoint Certified Security Administrator) – CCSE (Checkpoint Certified Security Expert) • RSA – RCSE (RSA Certified Systems Engineer) – RCSA (RSA Certified Systems Administrator) Information Security © 2006 Eric Vanderburg
10.
Skills • Networking knowledge –
TCP/IP – Network equipment (routers, firewalls, VLANs, switching) – Intrusion detection systems • People skills – People are the largest threat so you must understand them. – Training • Legal – Understand your responsibilities and your limitations (privacy) – Operate under the guidance of your security policy (this will protect you against legal action) Information Security © 2006 Eric Vanderburg
11.
Acronyms • HIP, Host
Intrusion Prevention • TPM, Trusted Platform Model Information Security © 2006 Eric Vanderburg
Descargar ahora