SlideShare una empresa de Scribd logo
1 de 34
Hizmete Özel / Restricted
Enterprise Security &
Cyber Security Cases
Hakan YUKSEL @yukselistwit
Hizmete Özel / Restricted
Agenda
• Cyber Security
• Enterprise Security
• Information Security
• Framework, Landscape, Reference Architecture
• Security Threat
• Cases
• Career, Certification
Hizmete Özel / Restricted
3
What is Cyber
With an increasing amount of people, things getting
connected to Internet, the security threats that cause massive
harm are increasing also.
The term cyber security is used to refer to the security offered
through on-line services to protect your information.
cyber
relating to or characteristic of the culture of computers, information technology,
and virtual reality
cybernetics
the science of communications and automatic control systems in both machines and
living things.
Hizmete Özel / Restricted
4
Information
information
facts provided or learned about something
or someone.
information assets
data as processed, stored, or transmitted
by information presence.
Hizmete Özel / Restricted
5
Information Security
Uluslararası Bilgi Güvenliği
Standardı – ISO 27001
BDDK - Bankalarda
Bilgi Sistemleri
Yönetiminde Esas
Alınacak İlkelere
İlişkin Tebliğ
COBIT – Bilgi ve
İlgili Teknolojiler
İçin Kontrol
Hedefleri
Uluslararası Payment Card
Industry Data Security
Standard
Hizmete Özel / Restricted
6
Security Threat
• Breach of confidentiality (Gizlilik)
• Unauthorized reading of data
• Breach of integrity (Bütünlük)
• Unauthorized modification of data
• Breach of availability (Kullanılabilirlik)
• Unauthorized destruction of data
Hizmete Özel / Restricted
7
Security Threat
• Internal
• Application, Process, Hardware, People, ..
• External
• Attack, Theft, DDOS, Malware, ..
• Natural and Physical
• Earthquake, Flood, Terror, ..
Internal
External
% 80
%20
Security is as weak as the weakest link in the chain
Hizmete Özel / Restricted
8
Security Level
Security must occur at four levels to be
effective:
Physical
Data centers, servers, connected terminals
Human
Avoid social engineering, phishing,
dumpster diving
Operating System
Protection mechanisms, debugging
Network
Intercepted communications, interruption,
DOS
Hizmete Özel / Restricted
9
Why do Hackers Hack ?
Hizmete Özel / Restricted
10
Why Hackers Hack Me !
• Same Password Usage
• Drop Bank Account
• Trust Relationship
Hizmete Özel / Restricted
11
Enterprise Security Framework
https://www.nist.gov/sites/default/files/documents////draft-cybersecurity-framework-v1.11.pdf
Hizmete Özel / Restricted
12
Cybersecurity Landscape
Hizmete Özel / Restricted
13
Reference Architecture
Hizmete Özel / Restricted
Cyber Security Investment
Hizmete Özel / Restricted
15
Attack Map
Hizmete Özel / Restricted
16
Biometric Authentication
Hizmete Özel / Restricted
17
Malware
• The word "malware" comes from the
term "MALicious softWARE."
• Malware is any software that infects
and damages a computer system
without the owner's knowledge or
permission.
Hizmete Özel / Restricted
https://cicbuai.gdn/panel2/
Malware Analysis
Hizmete Özel / Restricted
Ransomwares
• A software based attack on your network with
the goal of extortion.
• Ransomware is typically delivered through an
exploit kit or phishing attack
• Code created to take advantage of an
unpatched or unknown system vulnerability.
Example: Windows® OS, JavaScript® or Adobe Reader®
• Wanna Cry (MS17-00)
• Petya
Hizmete Özel / Restricted
20
Software Security
Hizmete Özel / Restricted
Software Security
Most developers today test after the software is built.
Hizmete Özel / Restricted
Enigma
• The Enigma machine is invented by
a German during World War Two.
• British tried to break the German
Enigma Machine.
• The American, Russians, French and
Germans too, think that Enigma is
unbreakable.
Hizmete Özel / Restricted
Stuxnet
• July, 2010: Stuxnet worm was discovered
attacking Siemens PCS7 S7 PLC and WIN
Siemens PCS7, S7 PLC and WIN-CC systems CC
systems around the world
• Most sophisticated malware ever seen in
public
• Uses up to 6 Vulnerabilities (5 in Win and 1
in Siemens)
• Its code is 500 KB
• Spreads via USB Flash Memory and Network
Shares
• Infects SCADA Systems
Hizmete Özel / Restricted
24
WhatsApp
Hizmete Özel / Restricted
25
Angry Birds
The National Security Agency has
targeted popular smartphone-based
social games like "Candy Crush" and
"Angry Birds" to pilfer personal
information, including phone numbers,
e-mails and codes that identify the
user's device, according to documents
leaked by former NSA
contractor Edward Snowden.
Hizmete Özel / Restricted
26
Intel ME
Concerns over the Intel Management Engine (ME)
have been ongoing for years. In May, Intel patched a
critical vulnerability that dated back nine years in the
company’s Active Management Technology, which is
based on Intel ME. That vulnerability could allow an
attacker to gain remote access to AMT services such
as the keyboard, video and mouse (KVM), IDE
Redirection, Serial over LAN, and BIOS setup and
editing.
Suspicions date back to 2012 over Intel’s
implementation of Active Management
Technology (AMT) with some labeling it a
“backdoor enabled by default.” A reported flaw
identified in June 2016
Hizmete Özel / Restricted
27
AirHopper
AirHopper — Hacking Into an
Isolated Computer Using FM Radio
Signals
The technology works by using the
FM radio receiver included in some
mobile phones. AirHopper is able to
capture keystrokes by intercepting
certain radio emissions from the
monitor or display unit of the
isolated computer.
Hizmete Özel / Restricted
28
Black Friday
Hizmete Özel / Restricted
29
Cases
Hizmete Özel / Restricted
30
Darknet: The Underground for the “Underground”
Hizmete Özel / Restricted
31
Cybercrime Price List
Hizmete Özel / Restricted
32
Career - Certification
• Black Hat, White Hat
• Pentest
• Forensic
• Security Information and
Even Management (SIEM)
• Security Administration
• Audit
Hizmete Özel / Restricted
Bug Bounty
Hizmete Özel / Restricted
THANKS

Más contenido relacionado

La actualidad más candente

CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
 
Icit analysis-identity-access-management
Icit analysis-identity-access-managementIcit analysis-identity-access-management
Icit analysis-identity-access-managementMark Gibson
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber securitySandip Juthani
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introductionAfna Crcs
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber securitySAHANAHK
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityAvantika University
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security pptkaranramani4
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysisdadkhah077
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security TechnologiesRuchikaSachdeva4
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsJohn Gilligan
 
Masters in cyber security
Masters in cyber securityMasters in cyber security
Masters in cyber securityVihaanBajaj
 
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project TopicsMatlab Simulation
 

La actualidad más candente (20)

CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber securitycyber security
cyber security
 
Icit analysis-identity-access-management
Icit analysis-identity-access-managementIcit analysis-identity-access-management
Icit analysis-identity-access-management
 
Cyber security
Cyber securityCyber security
Cyber security
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
cyber security
cyber securitycyber security
cyber security
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introduction
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
 
Masters in cyber security
Masters in cyber securityMasters in cyber security
Masters in cyber security
 
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project Topics
 

Similar a Enterprise Security and Cyber Security Cases

IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliJürgen Ambrosi
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdfMetaorange
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...PlatformSecurityManagement
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptxMetaorange
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptxSharmaAnirudh2
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiClubHack
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresAlexander Benoit
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationHans Klos
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeemu Tiainen
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxAkshayKhade21
 
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsSAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsAndreas Mai
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla IsolationCybryx
 
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Dalia Reda
 
Presentation defend your company against cyber threats with security solutions
Presentation   defend your company against cyber threats with security solutionsPresentation   defend your company against cyber threats with security solutions
Presentation defend your company against cyber threats with security solutionsxKinAnx
 

Similar a Enterprise Security and Cyber Security Cases (20)

IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentali
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh Belgi
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included features
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure Communication
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsSAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...
 
Presentation defend your company against cyber threats with security solutions
Presentation   defend your company against cyber threats with security solutionsPresentation   defend your company against cyber threats with security solutions
Presentation defend your company against cyber threats with security solutions
 
AGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-iAGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-i
 

Más de Hakan Yüksel

TOGAFcertificate_90354
TOGAFcertificate_90354TOGAFcertificate_90354
TOGAFcertificate_90354Hakan Yüksel
 
ITILCertificate.AXELOS
ITILCertificate.AXELOSITILCertificate.AXELOS
ITILCertificate.AXELOSHakan Yüksel
 
Sosyal Medya Marka Yönetimi
Sosyal Medya Marka YönetimiSosyal Medya Marka Yönetimi
Sosyal Medya Marka YönetimiHakan Yüksel
 
Failover Clustering Sql Server
Failover Clustering Sql ServerFailover Clustering Sql Server
Failover Clustering Sql ServerHakan Yüksel
 
Bulut Bilişim El Kitabı
Bulut Bilişim El KitabıBulut Bilişim El Kitabı
Bulut Bilişim El KitabıHakan Yüksel
 
Dell Tarzı / Dell Way
Dell Tarzı / Dell WayDell Tarzı / Dell Way
Dell Tarzı / Dell WayHakan Yüksel
 
Webcast - Failover Cluster Architecture
Webcast - Failover Cluster Architecture Webcast - Failover Cluster Architecture
Webcast - Failover Cluster Architecture Hakan Yüksel
 
WebCast - Remote Desktop Services
WebCast - Remote Desktop ServicesWebCast - Remote Desktop Services
WebCast - Remote Desktop ServicesHakan Yüksel
 

Más de Hakan Yüksel (11)

DevOps
DevOps DevOps
DevOps
 
PSM I
PSM IPSM I
PSM I
 
TOGAFcertificate_90354
TOGAFcertificate_90354TOGAFcertificate_90354
TOGAFcertificate_90354
 
ITILCertificate.AXELOS
ITILCertificate.AXELOSITILCertificate.AXELOS
ITILCertificate.AXELOS
 
Sosyal Medya Marka Yönetimi
Sosyal Medya Marka YönetimiSosyal Medya Marka Yönetimi
Sosyal Medya Marka Yönetimi
 
İş Sürekliliği
İş Sürekliliğiİş Sürekliliği
İş Sürekliliği
 
Failover Clustering Sql Server
Failover Clustering Sql ServerFailover Clustering Sql Server
Failover Clustering Sql Server
 
Bulut Bilişim El Kitabı
Bulut Bilişim El KitabıBulut Bilişim El Kitabı
Bulut Bilişim El Kitabı
 
Dell Tarzı / Dell Way
Dell Tarzı / Dell WayDell Tarzı / Dell Way
Dell Tarzı / Dell Way
 
Webcast - Failover Cluster Architecture
Webcast - Failover Cluster Architecture Webcast - Failover Cluster Architecture
Webcast - Failover Cluster Architecture
 
WebCast - Remote Desktop Services
WebCast - Remote Desktop ServicesWebCast - Remote Desktop Services
WebCast - Remote Desktop Services
 

Último

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Enterprise Security and Cyber Security Cases

  • 1. Hizmete Özel / Restricted Enterprise Security & Cyber Security Cases Hakan YUKSEL @yukselistwit
  • 2. Hizmete Özel / Restricted Agenda • Cyber Security • Enterprise Security • Information Security • Framework, Landscape, Reference Architecture • Security Threat • Cases • Career, Certification
  • 3. Hizmete Özel / Restricted 3 What is Cyber With an increasing amount of people, things getting connected to Internet, the security threats that cause massive harm are increasing also. The term cyber security is used to refer to the security offered through on-line services to protect your information. cyber relating to or characteristic of the culture of computers, information technology, and virtual reality cybernetics the science of communications and automatic control systems in both machines and living things.
  • 4. Hizmete Özel / Restricted 4 Information information facts provided or learned about something or someone. information assets data as processed, stored, or transmitted by information presence.
  • 5. Hizmete Özel / Restricted 5 Information Security Uluslararası Bilgi Güvenliği Standardı – ISO 27001 BDDK - Bankalarda Bilgi Sistemleri Yönetiminde Esas Alınacak İlkelere İlişkin Tebliğ COBIT – Bilgi ve İlgili Teknolojiler İçin Kontrol Hedefleri Uluslararası Payment Card Industry Data Security Standard
  • 6. Hizmete Özel / Restricted 6 Security Threat • Breach of confidentiality (Gizlilik) • Unauthorized reading of data • Breach of integrity (Bütünlük) • Unauthorized modification of data • Breach of availability (Kullanılabilirlik) • Unauthorized destruction of data
  • 7. Hizmete Özel / Restricted 7 Security Threat • Internal • Application, Process, Hardware, People, .. • External • Attack, Theft, DDOS, Malware, .. • Natural and Physical • Earthquake, Flood, Terror, .. Internal External % 80 %20 Security is as weak as the weakest link in the chain
  • 8. Hizmete Özel / Restricted 8 Security Level Security must occur at four levels to be effective: Physical Data centers, servers, connected terminals Human Avoid social engineering, phishing, dumpster diving Operating System Protection mechanisms, debugging Network Intercepted communications, interruption, DOS
  • 9. Hizmete Özel / Restricted 9 Why do Hackers Hack ?
  • 10. Hizmete Özel / Restricted 10 Why Hackers Hack Me ! • Same Password Usage • Drop Bank Account • Trust Relationship
  • 11. Hizmete Özel / Restricted 11 Enterprise Security Framework https://www.nist.gov/sites/default/files/documents////draft-cybersecurity-framework-v1.11.pdf
  • 12. Hizmete Özel / Restricted 12 Cybersecurity Landscape
  • 13. Hizmete Özel / Restricted 13 Reference Architecture
  • 14. Hizmete Özel / Restricted Cyber Security Investment
  • 15. Hizmete Özel / Restricted 15 Attack Map
  • 16. Hizmete Özel / Restricted 16 Biometric Authentication
  • 17. Hizmete Özel / Restricted 17 Malware • The word "malware" comes from the term "MALicious softWARE." • Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
  • 18. Hizmete Özel / Restricted https://cicbuai.gdn/panel2/ Malware Analysis
  • 19. Hizmete Özel / Restricted Ransomwares • A software based attack on your network with the goal of extortion. • Ransomware is typically delivered through an exploit kit or phishing attack • Code created to take advantage of an unpatched or unknown system vulnerability. Example: Windows® OS, JavaScript® or Adobe Reader® • Wanna Cry (MS17-00) • Petya
  • 20. Hizmete Özel / Restricted 20 Software Security
  • 21. Hizmete Özel / Restricted Software Security Most developers today test after the software is built.
  • 22. Hizmete Özel / Restricted Enigma • The Enigma machine is invented by a German during World War Two. • British tried to break the German Enigma Machine. • The American, Russians, French and Germans too, think that Enigma is unbreakable.
  • 23. Hizmete Özel / Restricted Stuxnet • July, 2010: Stuxnet worm was discovered attacking Siemens PCS7 S7 PLC and WIN Siemens PCS7, S7 PLC and WIN-CC systems CC systems around the world • Most sophisticated malware ever seen in public • Uses up to 6 Vulnerabilities (5 in Win and 1 in Siemens) • Its code is 500 KB • Spreads via USB Flash Memory and Network Shares • Infects SCADA Systems
  • 24. Hizmete Özel / Restricted 24 WhatsApp
  • 25. Hizmete Özel / Restricted 25 Angry Birds The National Security Agency has targeted popular smartphone-based social games like "Candy Crush" and "Angry Birds" to pilfer personal information, including phone numbers, e-mails and codes that identify the user's device, according to documents leaked by former NSA contractor Edward Snowden.
  • 26. Hizmete Özel / Restricted 26 Intel ME Concerns over the Intel Management Engine (ME) have been ongoing for years. In May, Intel patched a critical vulnerability that dated back nine years in the company’s Active Management Technology, which is based on Intel ME. That vulnerability could allow an attacker to gain remote access to AMT services such as the keyboard, video and mouse (KVM), IDE Redirection, Serial over LAN, and BIOS setup and editing. Suspicions date back to 2012 over Intel’s implementation of Active Management Technology (AMT) with some labeling it a “backdoor enabled by default.” A reported flaw identified in June 2016
  • 27. Hizmete Özel / Restricted 27 AirHopper AirHopper — Hacking Into an Isolated Computer Using FM Radio Signals The technology works by using the FM radio receiver included in some mobile phones. AirHopper is able to capture keystrokes by intercepting certain radio emissions from the monitor or display unit of the isolated computer.
  • 28. Hizmete Özel / Restricted 28 Black Friday
  • 29. Hizmete Özel / Restricted 29 Cases
  • 30. Hizmete Özel / Restricted 30 Darknet: The Underground for the “Underground”
  • 31. Hizmete Özel / Restricted 31 Cybercrime Price List
  • 32. Hizmete Özel / Restricted 32 Career - Certification • Black Hat, White Hat • Pentest • Forensic • Security Information and Even Management (SIEM) • Security Administration • Audit
  • 33. Hizmete Özel / Restricted Bug Bounty
  • 34. Hizmete Özel / Restricted THANKS

Notas del editor

  1. insanların bilgisayarlar yoluyla haberleştikleri gözle görülüp elle tutulmayan boşluğu anlatan 
  2. Bilgi: Yazılı, basılı ya da dijital ortamda bulunan her türlü anlamlandırılmış veridir. Bilgi Varlığı: Bilginin üretilmesinde, işlenmesinde, paylaşılmasında, saklanmasında, imha edilmesinde kullanılan her türlü varlık bilgi varlığıdır.
  3. Bilgi güvenliğinin temel amacı organizasyonun maruz kalacağı olumsuz etkileri kabul edilebilir bir seviyeye çekmektir.
  4. Bilginin çalınması confidentiality Integrity, tabloların bozulması, dosya içeriğinin değiştirilmesi Availability tarafında sunmuş olduğunuz servislerin availabilitysine engel olan saldırılar var Kaynakların yetkisiz kişiler tarafından erişilmesi, kaynağın çalıması, benim internet hizmetime erişip çalıyor, botnetler benim bilgisayarımım yada modemimi kullanmakta Gizlilik: Bilginin yalnızca yetkili ve bilmesi gereken kişiler tarafından erişilebilir olması Bütünlük: Bilginin doğru ve tam olması Erişilebilirlik: Bilgiye ihtiyaç duyulan her an erişilebilmesi ve kullanıma hazır olması Threat = tehdit
  5. İç Tehditler: firmanın iş süreçlerinden, kullanılan uygulamalar ve donanımlardan, çalışanlardan kaynaklanan tehditlerdir. Örneğin; yetkisiz işlemler, uygulama ve donanım hataları, farkındalık eksiklikleri… Dış Tehditler: firmanın dışından gelen çevresel tehditlerdir. Örneğin; hırsızlıklar, saldırılar, virüs saldırıları… Doğal ve Fiziksel Tehditler: Deprem, sel, yangın, terör amaçlı saldırılar vb tehditlerdir.
  6. . Tum ortamlarda ayni sifre kullanilmasi . bamka hesaplarinin illegal kullanilmasi . sizin uzerinizden ulasilmak istenilen ksilere zararli yaz gomdermek
  7. Download an anti-malware program that also helps prevent infections. Activate Network Threat Protection, Firewall, Antivirus.
  8. İzinler • Harici diske veri yazma • İnternete erişme • Ekran kilidini devre dışı bırakma İlk zararlı Yukarıda belirtilen izinler ile şüpheli uygulamanın cihaz üzerinde elde ettiği yetkilerden bazıları aşağıda listelenmiştir. • SMS gönderme • SMS okuma • Arama yapma • İnternete erişme • Diske yazma yazılım, asıl saldırıyı gerçekleştirecek yazılımın cihaza indirilip kurulmasını sağlamaktadır.
  9. WannaCry : İngiltere’de sağlık hizmetleri sekteye uğradı Renault bazı yerlerde üretimi durdurdu (Bursa dahil) Petya : Çernobil2deki radyasonu izleyen sistemler Merck – Dünyanın en büyük ilaç şirketlerinden Maersk – Dünyanın en büyük taşımacılık şirketlerinden MS17-010 güncellemesi ile önlem alınmalıydı.
  10. 2. Dünya Savaşı’nda Naziler’in kullandığı cihaz Elektro-mekanik şifreleme ve şifre çözme cihazı İngilizler tarafından bir kopyası çalındı Çalışma mantığı çözüldükten sonra Alman mesajları deşifre edildi Naziler’in savaşı kaybetmesinde önemli bir yeri vardır
  11. 2010’da fark edildi SCADA sistemleri üzerinden İran’ın nükleer tesislerini hedef aldı Santrifüjleri parçalayarak çalışmaları sekteye uğrattı İnternete bağlı olmayan bilgisayarların hacklenebileceğine dair en önemli örneklerdendir. SANAL TEHDİT, GERÇEK RİSK örneği. SİBER SAVAŞ
  12. Citibank’ın hacklenmesi 210.000 müşteriyi etkiledi Hacker atağının ardından PlayStation networkü süresiz olarak hizmet dışı kaldı NATO olası bir veri sızması olayını araştırıyor Sony Pictures 37.000 kullanıcısının bilgilerinin Çalındığını kabul etti. Amerikan Ulusal Sağlık Servisi’nin çalınan bir laptopu milyonlarca kayıt veriyi riske attı HSBC = 2014 senesinde Türkiye’de yaşandı 2.7 milyon kredi kartı ve debit kart müşteri bilgisi çalındı Banka açıklama yaparak risk olmadığını belirtse de müşteri bilgilerinin kullanıldığından şüpheleniliyor AKBANK 2016’da Türkiye’de yaşandı Banka’nın SWIFT sistemi hacklendi Açıklanan kayıp : $10-20 Milyon Gerçek kayıp : $100-120 Milyon Yöntem : Klasik Phishing (Macro’lu Excel)