이충구부장 - Apps & Security 총괄 / IXIA Korea 지능형지속공격을위한진화된테스트방법. -Next Generation Security Validation
|
|
- Joella Berry
- 6 years ago
- Views:
Transcription
1 이충구부장 - Apps & Security 총괄 / IXIA Korea 지능형지속공격을위한진화된테스트방법 -Next Generation Security Validation 1
2 App PLANET
3 앱플래닛 변화무쌍한세상 매일생겨나는수백만에이르는다양한앱 데이터접속을위한앱커뮤니케이션
4 모바일멀웨어는가장빠르게진화하고있다 How does it change the threat landscape 수백만의폰사용자, Tablet/PC 사용자 BYOD 로인한신뢰받지않은네트워크와내부네트워크로의접속 모바일멜웨어의급속한진화
5 APT (Advanced Persistent Threats) -Understanding each phase
6 Phase 1, 2: 엔트리포인트 정보수집 / Recon and Phishing
7 Phase 1, 2: 엔트리포인트 스미싱 Many url s on mobile phones are shortened by agencies like Bit.Ly Websites look different Mobile phones. SMS, Whatsapp, Viber messages, easier to generate click
8 최신스미싱기법
9 Phase 3: 최초침입및백도어생성 Knock Knock Shocking Video Knock Knock Bank Confirmation Knock Knock World Cup Stream App WELCOME BOSS
10 Phase 4, 5: 권한획득및유틸리티설치 Extract personal information Install Utilities Dig Deeper into the system Corrupt/Encrypt or Hide Data Make you a Bot Do Nothing
11 Phase 6: 데이터유출 Leakage through Video cams Recording Keystrokes/History Record meeting/call data SMS copiers like SMSZombie Variable Behaviour(Polymorphism) Date Leakage in APT- Has many forms
12 정교한 APT 의창조물 - Malnets Zombie Devices Malnets are now a reality Rootaged devices with powerful LTE GTP encapsulated/ssl encapsulated difficult to identify
13 Kill-Chain -Validating each phase
14 차세대보안테스트 Validation of APT and Botnets Recon-Information Gathering ( 정찰 / 정보수집 ) Validate Phishing/Spam Social Networking ( 스피어피싱 / 스팸 ) Validate Validate User Information Malware Installations ( 권한획득 / 유틸리티 ) Validate Intrusions and Backdoors ( 침입 / 백도어 ) Information Exfiltration Lateral Movements ( 정보유출 ) Validate Further Destruction Persistence ( 지속적관리 - 멀넷 )
15 Validation: Phishing and Spam Test APT Step 1- Phishing and Spam generation 다른타입의피싱 생성 새로운변종스팸생성 -Pictured Spam, Scrambled Spam 100 가지이상의피싱기술가진대규모피싱생성
16 Validation: Malware/Exploit and Vulnerability APT Step 2- User compromise and Bot to C&C message simulation Malware/Vulnerability delivery through various apps. Facebook, Gmail, SMTP, Youtube every app/protocol can be a delivery vehicle. Simulate Bot to C&C communication.
17 Validatioin: Data Leakage, Data Ex-filteration, Lateral Movements APT Step 3- Data Leakage and Persistency Leakage simulation through encrypted and non-encrypted apps. Data Leakage policy validation Lawful Interception efficiency Assessments
18 Every Malware, Every Virus s, Every Exploits Can be Hidden APT Advanced Polymorphic evasive attacks IP Fragmentation
19 DDoS Simulation by IXIA BreakingPoint 19 OLD DDOS Assessments Layer 3 IP / ICMP DDoS IP Frag Attack DDoS ICMP Request Flood Attack DDoS ICMP Response Flood Attack Layer 4 UDP LOIC UDP53 DoS Attack DDoS UDP Fragmentation DDoS Non-Spoofed UDP Flood DDoS UDP Flood Layer 4 TCP DDoS SYN Flood DDoS PSH-ACK Attack DDoS Fake Session Attack DDOS SYN-ACK Flood Attack DDoS Rcv Wnd Size Next Generation DDOS Layer 7 Apps DDoS DNS Reflect - Attack DDoS DNS Reflect - Zombie LOIC HTTP DoS Attack DDoS SIP Invite Flood DDoS Redirect DDoS DNS Flood DDoS Excessive GET POST DDoS Slow POST DDoS Recursive GET DDOS NTP Unique DDoS SlowLoris DDoS Smurf Attack DDoS TDL4 CC HTTP Flood MultiVERB DDoS RUDY DDoS LOIC TCP8080 DoS Attack
20 Pre-Built Botnet Life cycle Simulations Cutwail Zeus SpyEye ZeroAccess Duqu BlackEnergy TDL4 PushDO TDW Customization in Application Editor
21 무엇을해야하나요? Robust Networks LDAP/DHCP/DNS Proxy Services/LAN Network WAN Tap IPS/Firewall/SLB/IPSec GW DMZ Firewall - LAN Edge Core LAN Database Internet IDS Systems Sandboxes Log Server/SIEM Inside Entity Hardware Infrastructure Forensic and Investigation Efficient Network Design Active Directory DHCP VPN Web Proxy IDS/IPS Firewall/Router ACL IPSec Gateways HIDS/HIPS Endpoint Protections Redundant Hardware Robust Logging Proxy Logs Authentication Logs IDS Alerts Host-based Logs Firewall Logs Full Content Traffic Captures Netflow Server Event Logs Workstation Event Logs Common Central Logging Proper Network Segmentation Well Defined DMZ Wifi and Wireless Zoning IP Address Schemas Public Facing device control Overview of NW Infrastructure
22 Test Validation - Diverse Application Traffic Emulation
23 전형적인테스트방법 RFC 2544: Right Standard, Wrong Time UDP traffic to measure maximum throughput & latency across a range of frame sizes Introduced 1999, No value for content aware devices RFC 3511 : False Sense of Security Benchmarking methodology for stateful firewall Performance Issued in 2003, however HTTP is NOT an Application X
24 어떤 Application 을테스트할것인가? Applications Layer 1: Cat 5, Fiber, Wifi Layer 2: Ethernet Layer 3: IPv4, IPv6 Layer 4: TCP, UDP Layer 7: HTTP RFC 2544 RFC 3511 Applications Drive Business
25 익시아 (IXIA) 의도전과제 More devices GLOBAL Connecting from more places Accessing more data From more sources And attacks continue to rise..and you can see less of it and now its all moving And your users want it all now And it has to be fast And it has to work over wireless always
26 Case Study 1 Banking Enterprise NGFW Deployment Target: Single Vendor Deployment Enterprise had four district use cases All vender NGFW advertised as 10Gbps NGFW 3 Days to Quantifiable Data TCP baseline test Web Partner Portal Office Vendor A Vendor B Vendor C Trading Vendor A Vendor B Vendor C Avg Sec effectiveness * 48% 52% 28% *BreakingPoint Strike Level l0-5
27 Content Aware Device Performance Testing Demonstration NGFW 10GbE 10GbE Client/Server Client/Server
28 Content Aware Device Performance Test
29 Case Study 2 Service Provider DDoS Appliance Valid Users /Attacker Internal Network DDoS Defenses Appliance POC Time to detect and mitigate (secs) Mitigation speed Vendor A Vendor B Vendor C Syn flood UDP flood 13 ND 15 DNS flood SMTP flood SIP flood LOIC Slowloris Excessive get post ND Sockstress Botnet TDL ND Botnet Evil ND 15 ND Botnet Rudy ND 10 ND ND=Not Detected
30 Case Study 3 Financial Exchange DDoS Traffic Volumetric DDoS traffic Directed to target web servers Cloud-Based DDoS Protection DDoS Traffic Volumetric DDoS Traffic re-directed by DDoS Service Provider 1-Arm Testing Web-based Application Traffic http transactional traffic Between BreakingPoint client and target web servers Good Application Traffic Transactional web-based Application traffic through DDoS Service Provider DDoS Service Provider Target Web Servers BreakingPoint Load Generation DDoS Defenses Validation
31 A step beyond NAT Validation DNS Validation Proxy Validation Anti DDOS Validation FW Validation DLP/DPI Validation ADC Validation DHCP Validation Data Center Validation Local DNS NGFW IPS/ SPAM ADC WAN Opt Data Center NAT Proxy Anti DDOS DPI/DLP SSL/HTTP Proxy IDS DHCP 네트워크구성요소의인증
32 Testing Solution - 익시아 (IXIA) Point Overview
33 테스트가두렵나요? We Now Need I know to Test, how to, Assess what and to and Validate when to But we Don t know how to, what to and when to 어플리케이션과보안 네트워크인프라리질리언시 사이버보안트레이닝 Pre-created, pre-packaged profiles, configurations and scenarios Popular Botnets of the world Advanced Persistent Threats Canned Enterprise and Datacenter Application Mixes Service provider Mix from around the world Resiliency Labs Lawful Intercept validations Information Security validations Cyber Range Labs SLA/QoE/QoS 인증
34 Perfectstorm has everything in L47 that Ixia has Voice & Video Network Security Application Storage Wireless/LTE Holistic Network and Datacenter Assessments Datacenter Device and Service Evaluation Service and SLA Assurance Device and Application Test and QOE/QOS Assessment Device Test and Evaluation Resiliency Testing IP Security V4/V6 Transition Mobile Scale and Security Assessments
35 How Ixia Helps : 다양한가상시나리오를통한인증 LDAP/DHCP/DNS SIEM/IDS Services/LAN Network WAN Firewall/IPS/SLB/VPN Firewall - LAN Edge Tap Core Internet IDS Systems Sandboxes Log Server Ixia BPS as a traffic generator: Baseline Network Traffic Device validation with Realistic Application traffic Practice every stage of APT Mitigations Phishing Attack Malware Delivery Data Ex-filteration Lateral Movements Continuously improve Attack Detection Time(ADT) Continuous practice of C.D.A.R cycle (Detect ->Collect -> Assess -> Remediate Database Inside Entity
36 PerfectStorm ONE 통합테스팅솔루션
37 Application and Threat Intelligence (ATI) Simulation and Testing Applications & Security Real Attacks 6,000+ live security attacks 35,000+ pieces of live malware 180+ evasions classes DDoS and botnet simulation Custom attacks Research and frequent updates Real-World Applications 250+ application protocols Social, peer-to-peer, voice, video Web, SSL, enterprise applications, Gaming Mobile Storage workloads Custom applications Frequent updates 26 biweekly updates NEW applications NEW DDoS/APT
38 END-TO-END PRODUCT FAMILY Founded in 1997 IP Testing Wireless Testing Acquired June 2009 Increased Router Testing Acquired Oct 2009 Wi-Fi, WLAN Testing Acquired July 2011 Network Visibility Acquired Jun-e 2012 Actionable Security Intelligence (ASI) Acquired August 2012
39 Application Performance and Security Resilience 감사합니다
IxLoad-Attack TM : Network Security Testing
IxLoad-Attack TM : Network Security Testing IxLoad-Attack tests network security appliances to validate that they effectively and accurately block attacks while delivering high end-user quality of experience
More informationF5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe
F5 comprehensive protection against application attacks Jakub Sumpich Territory Manager Eastern Europe j.sumpich@f5.com Evolving Security Threat Landscape cookie tampering Identity Extraction DNS Cache
More informationEndpoint Protection : Last line of defense?
Endpoint Protection : Last line of defense? First TC Noumea, New Caledonia 10 Sept 2018 Independent Information Security Advisor OVERVIEW UNDERSTANDING ENDPOINT SECURITY AND THE BIG PICTURE Rapid development
More informationSpirent Avalanche. Applications and Security Testing Solutions. Application. Features & Benefits. Data Sheet. Network Performance Testing
Data Sheet Spirent Avalanche Spirent s Avalanche Layer 4-7 testing solution provides capacity, security and performance testing for network infrastructures, cloud and virtual environments, Web application
More informationBusiness Strategy Theatre
Business Strategy Theatre Security posture in the age of mobile, social and new threats Steve Pao, GM Security Business 01 May 2014 In the midst of chaos, there is also opportunity. - Sun-Tzu Security:
More informationPROTECTING INFORMATION ASSETS NETWORK SECURITY
PROTECTING INFORMATION ASSETS NETWORK SECURITY PAUL SMITH 20 years of IT experience (desktop, servers, networks, firewalls.) 17 years of engineering in enterprise scaled networks 10+ years in Network Security
More informationSecurity Assessment Checklist
Security Assessment Checklist Westcon Security Checklist - Instructions The first step to protecting your business includes a careful and complete assessment of your security posture. Our Security Assessment
More informationTestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified
TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145
More informationInsight Guide into Securing your Connectivity
Insight Guide I Securing your Connectivity Insight Guide into Securing your Connectivity Cyber Security threats are ever present in todays connected world. This guide will enable you to see some of the
More informationTestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified
TestOut Network Pro - English 5.0.x COURSE OUTLINE Modified 2018-03-06 TestOut Network Pro Outline - English 5.0.x Videos: 130 (17:10:31) Demonstrations: 78 (8:46:15) Simulations: 88 Fact Sheets: 136 Exams:
More informationGladiator Incident Alert
Gladiator Incident Alert Allen Eaves Sabastian Fazzino FINANCIAL PERFORMANCE RETAIL DELIVERY IMAGING PAYMENT SOLUTIONS INFORMATION SECURITY & RISK MANAGEMENT ONLINE & MOBILE 1 2016 Jack Henry & Associates,
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationCTS2134 Introduction to Networking. Module 08: Network Security
CTS2134 Introduction to Networking Module 08: Network Security Denial of Service (DoS) DoS (Denial of Service) attack impacts system availability by flooding the target system with traffic or by exploiting
More informationCorrigendum 3. Tender Number: 10/ dated
(A premier Public Sector Bank) Information Technology Division Head Office, Mangalore Corrigendum 3 Tender Number: 10/2016-17 dated 07.09.2016 for Supply, Installation and Maintenance of Distributed Denial
More informationRethinking Security: The Need For A Security Delivery Platform
Rethinking Security: The Need For A Security Delivery Platform Cybercrime In Asia: A Changing Environment & Shifting Focus Asia, more vulnerable to cybercrime because of diversity and breadth of countries
More informationChanging face of endpoint security
Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L
More informationSecurity+ SY0-501 Study Guide Table of Contents
Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators
More informationIXVISION: VISIBILITY ARCHITECTURE Eliminating Blind spots
IXVISION: VISIBILITY ARCHITECTURE Eliminating Blind spots Ernst Hillerkus, Regional Sales Manager Germany 2016 IXIA AN D /OR IT S AF FILIATES. ALL R IGH TS R ESERVED. 1 IXIA SOLUTIONS ARCHITECTURE IxTEST
More informationImplementing Cisco Network Security (IINS) 3.0
Implementing Cisco Network Security (IINS) 3.0 COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY
ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY OUTLINE Advanced Threat Landscape (genv) Why is endpoint protection essential? Types of attacks and how to prevent them
More informationComprehensive datacenter protection
Comprehensive datacenter protection There are several key drivers that are influencing the DDoS Protection market: DDoS attacks are increasing in frequency DDoS attacks are increasing in size DoS attack
More informationSynchronized Security
Synchronized Security 2 Endpoint Firewall Synchronized Security Platform and Strategy Admin Manage All Sophos Products Self Service User Customizable Alerts Partner Management of Customer Installations
More informationCisco Cyber Range. Paul Qiu Senior Solutions Architect
Cisco Cyber Range Paul Qiu Senior Solutions Architect Cyber Range Service A platform to experience the intelligent Cyber Security for the real world What I hear, I forget What I see, I remember What I
More informationCisco Systems Korea
(kiseo@cisco.com) Cisco Systems Korea 2008 Cisco Systems, Inc. All rights reserved. 1 Agenda 2008 Cisco Systems, Inc. All rights reserved. 2 2008 Cisco Systems, Inc. All rights reserved. 3 Threats Are
More informationUSG2110 Unified Security Gateways
USG2110 Unified Security Gateways The USG2110 series is Huawei's unified security gateway developed to meet the network security needs of various organizations including the small enterprises, branch offices,
More informationThis course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N
CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT
More informationJuniper SRX Services Gateway Performance Testing
Juniper SRX Services Gateway Performance Testing June 2017 DR170517D Miercom.com www.miercom.com Contents Executive Summary... 3 Products Tested... 5 SRX300 Series... 5 SRX550... 5 SRX1500... 6 How We
More informationValidating the Security of the Borderless Infrastructure
SESSION ID: CDS-R01 Validating the Security of the Borderless Infrastructure David DeSanto Director, Product Management Spirent Communications, Inc. @david_desanto Agenda 2 The Adversary The Adversary
More informationECE 435 Network Engineering Lecture 23
ECE 435 Network Engineering Lecture 23 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 30 November 2017 HW#11 will be posted Announcements Don t forget projects next week Presentation
More informationThe Internet of Everything is changing Everything
The Internet of Everything is changing Everything Intelligent Threat Defense for the Enterprise Mobility Nikos Mourtzinos, CCIE #9763 Global Security Sales Organization Changing Business Models Any Device
More informationHardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012
Hardening the Education IT Environment with NGFW Narongveth Yutithammanurak Business Development Manager 23 Feb 2012 Technology Trends Security Performance Bandwidth Efficiency Manageability Page 2 What
More informationSeceon s Open Threat Management software
Seceon s Open Threat Management software Seceon s Open Threat Management software (OTM), is a cyber-security advanced threat management platform that visualizes, detects, and eliminates threats in real
More informationService Provider Security Architecture
Service Provider Security Architecture Andrew Turner Technical Marketing, Security Business Group April 12 th 2017 Digitization is disrupting the SP business The world has gone mobile Traffic growth, driven
More informationDistributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013
Distributed Systems 27. Firewalls and Virtual Private Networks Paul Krzyzanowski Rutgers University Fall 2013 November 25, 2013 2013 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive
More informationNetwork Security. Thierry Sans
Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability
More informationNew methods to protect the network. Deeper visibility with Cisco NGFW Next Generation Firewall
New methods to protect the network. Deeper visibility with Cisco NGFW Next Generation Firewall Claudiu Onisoru, Senior Network Specialist Cisco Connect - 15 May 2014 1 Agenda Frontal Communication: Who
More informationFIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?
WHAT IS FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT? While firewalls started life simply protecting networks from outside hacks and attacks, the role of the firewall has greatly evolved to take
More informationFRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months
FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES
More informationCyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems
Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems Section 1: Command Line Tools Skill 1: Employ commands using command line interface 1.1 Use command line commands to gain situational
More informationSynchronized Security
Synchronized Security Revolutionizing Advanced Threat Protection Per Söderqvist Sales Engineer Nordics and Baltics 1 A Proven Market Leader Endpoint Encryption Leader UTM Unified Threat Management EPP
More informationTESTING DDOS DEFENSE EFFECTIVENESS AT 300 GBPS SCALE AND BEYOND
TEST REPORT TESTING DDOS DEFENSE EFFECTIVENESS AT 300 GBPS SCALE AND BEYOND Ixia BreakingPoint DDoS Defense Test Methodology Report TABLE OF CONTENTS EXECUTIVE SUMMARY... 3 WHAT IS A DDOS ATTACK... 5 DDOS
More informationCloudStorm TM 100GE Application and Security Test Load Module
CloudStorm TM 100GE Application and Security Test Load Module CLOUD-SCALE APPLICATION DELIVERY & NETWORK SECURITY TEST PLATFORM PROBLEM: AN ALL-ENCRYPTED WORLD AND INCREASING USER EXPERIENCE EXPECTATIONS
More informationHerding Cats. Carl Brothers, F5 Field Systems Engineer
Herding Cats Carl Brothers, F5 Field Systems Engineer Agenda Introductions Security is easy, right Trivia Protecting your apps, one layer at a time How to survive an Attack Time permitting F5 Networks,
More informationCompTIA Network+ Study Guide Table of Contents
CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies
More informationPracticeDump. Free Practice Dumps - Unlimited Free Access of practice exam
PracticeDump http://www.practicedump.com Free Practice Dumps - Unlimited Free Access of practice exam Exam : SY0-501 Title : CompTIA Security+ Certification Exam Vendor : CompTIA Version : DEMO Get Latest
More informationChapter 10: Denial-of-Services
Chapter 10: Denial-of-Services Technology Brief This chapter, "Denial-of-Service" is focused on DoS and Distributed Denial-of-Service (DDOS) attacks. This chapter will cover understanding of different
More informationNetwork Security: Firewall, VPN, IDS/IPS, SIEM
Security: Firewall, VPN, IDS/IPS, SIEM Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
More informationCyberP3i Course Module Series
CyberP3i Course Module Series Spring 2017 Designer: Dr. Lixin Wang, Associate Professor Firewall Configuration Firewall Configuration Learning Objectives 1. Be familiar with firewalls and types of firewalls
More informationTOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS
TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS 1 Introduction Your data and infrastructure are at the heart of your business. Your employees, business partners, and
More informationThe IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title.
I n t r o d u c t i o n The CCNA Security IINS exam topics have been refreshed from version 2.0 to version 3.0. This document will highlight exam topic changes between the current 640-554 IINS exam and
More informationNetwork Security. Kitisak Jirawannakool Electronics Government Agency (public organisation)
1 Network Security Kitisak Jirawannakool Electronics Government Agency (public organisation) A Brief History of the World 2 OSI Model vs TCP/IP suite 3 TFTP & SMTP 4 ICMP 5 NAT/PAT 6 ARP/RARP 7 DHCP 8
More informationRadware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper
Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper Table of Contents Abstract...3 Understanding Online Business
More informationImproved C&C Traffic Detection Using Multidimensional Model and Network Timeline Analysis
Improved C&C Traffic Detection Using Multidimensional Model and Elad Menahem Avidan Avraham Modern Threats Are More Sophisticated & Evasive CYBER KILL CHAIN: Infection Phase Post-Infection Recon Weaponization
More informationDDOS RESILIENCY SCORE (DRS) "An open standard for quantifying an Organization's resiliency to withstand DDoS attacks" Version July
DDOS RESILIENCY SCORE (DRS) "An open standard for quantifying an Organization's resiliency to withstand DDoS attacks" Version 1.01.01 17 July 2017... Text is available under the GNU Free Documentation
More informationValidVCE. ValidVCE - Free valid vce dumps for certification exam test prep
ValidVCE http://www.validvce.com ValidVCE - Free valid vce dumps for certification exam test prep Exam : 210-250 Title : Understanding Cisco Cybersecurity Fundamentals Vendor : Cisco Version : DEMO Get
More informationANATOMY OF AN ATTACK!
ANATOMY OF AN ATTACK! Are Your Crown Jewels Safe? Dom Kapac, Security Evangelist WHAT DO WE MEAN BY CROWN JEWELS? Crown jewels for most organizations are critical infrastructure and data Data is a valuable
More informationArchitecture: Consolidated Platform. Eddie Augustine Major Accounts Manager: Federal
Architecture: Consolidated Platform Eddie Augustine Major Accounts Manager: Federal Current DoD Situation Stovepipes of Technology icontrol Customization irules Solutions Security Access Availability Load
More informationF5 Synthesis Information Session. April, 2014
F5 Synthesis Information Session April, 2014 Agenda Welcome and Introduction to Customer Technology Challenges Software Defined Application Services Reference Architectures for Today s Customer Challenges
More informationVenusense UTM Introduction
Venusense UTM Introduction Featuring comprehensive security capabilities, Venusense Unified Threat Management (UTM) products adopt the industry's most advanced multi-core, multi-thread computing architecture,
More informationECE 435 Network Engineering Lecture 23
ECE 435 Network Engineering Lecture 23 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 4 December 2018 Announcements HW#9 graded Don t forget projects next week Presentation schedule
More informationCisco Self Defending Network
Cisco Self Defending Network Integrated Network Security George Chopin Security Business Development Manager, CISSP 2003, Cisco Systems, Inc. All rights reserved. 1 The Network as a Strategic Asset Corporate
More informationProtecting Against Online Fraud. F5 EMEA Webinar August 2014
Protecting Against Online Fraud F5 EMEA Webinar August 2014 Agenda Fraud threat trends and business challenges Web fraud protection Mobile fraud protection Security operations center Example architecture
More informationCisco Firepower with Radware DDoS Mitigation
Cisco Firepower with Radware DDoS Mitigation Business Decision Maker Presentation Eric Grubel VP Business development, Radware February 2017 DDoS in the news French hosting firm flooded with 1 Tbps traffic
More informationTraining UNIFIED SECURITY. Signature based packet analysis
Training UNIFIED SECURITY Signature based packet analysis At the core of its scanning technology, Kerio Control integrates a packet analyzer based on Snort. Snort is an open source IDS/IPS system that
More informationACS / Computer Security And Privacy. Fall 2018 Mid-Term Review
ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified
More informationTOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION
INFORMATION TECHNOLOGY SECURITY GUIDANCE TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION ITSM.10.189 October 2017 INTRODUCTION The Top 10 Information Technology (IT) Security
More informationCopyright 2011 Trend Micro Inc.
Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF
More informationRadware s Attack Mitigation Solution Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper
SHARE THIS WHITEPAPER Radware s Attack Mitigation Solution Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper Table of Contents Understanding the Threat
More informationDDoS Protector. Simon Yu Senior Security Consultant. Block Denial of Service attacks within seconds CISSP-ISSAP, MBCS, CEH
DDoS Protector Block Denial of Service attacks within seconds Simon Yu Senior Security Consultant CISSP-ISSAP, MBCS, CEH 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012
More informationCourse Outline Topic 1: Current State Assessment, Security Operations Centers, and Security Architecture
About this Course This course will best position your organization to analyse threats and detect anomalies that could indicate cybercriminal behaviour. The payoff for this new proactive approach would
More informationWe re Different. Founded in 2007, Secure Source specializes in Network Security technology and compliance solutions.
COMPANY PROFILE We re Different Founded in 2007, Secure Source specializes in Network Security technology and compliance solutions. A Value-Added Distributor (VAD) with focus on end-to-end security product
More informationEvaluation criteria for Next-Generation Firewalls
Evaluation criteria for Next-Generation Firewalls This document outlines many of the important features and capabilities to look for when evaluating a Next-Generation Firewall (NGFW), in order to help
More informationn Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network
Always Remember Chapter #1: Network Device Configuration There is no 100 percent secure system, and there is nothing that is foolproof! 2 Outline Learn about the Security+ exam Learn basic terminology
More informationSymantec Ransomware Protection
Symantec Ransomware Protection Protection Against Ransomware Defense in depth across all control points is required to stop ransomware @ Email Symantec Email Security.cloud, Symantec Messaging Gateway
More informationAuthor: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0
Author: Tonny Rabjerg Version: 20150730 Company Presentation WSF 4.0 WSF 4.0 Cybercrime is a growth industry. The returns are great, and the risks are low. We estimate that the likely annual cost to the
More informationCheck Point DDoS Protector Introduction
Check Point DDoS Protector Introduction Petr Kadrmas SE Eastern Europe pkadrmas@checkpoint.com Agenda 1 (D)DoS Trends 2 3 4 DDoS Protector Overview Protections in Details Summary 2 (D)DoS Attack Methods
More informationIBM Next Generation Intrusion Prevention System
IBM Next Generation Intrusion Prevention System Fadly Yahaya SWAT Optimizing the World s Infrastructure Oct 2012 Moscow 2012 IBM Corporation Please note: IBM s statements regarding its plans, directions,
More informationUnderstanding Networking Fundamentals
Understanding Networking Fundamentals Training Details Training Time : 5 Days Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training A strong foundation
More informationSynchronized Security In Action
Synchronized Security In Action 99% Reduction in incident response time Firewall Web Wireless Email Sophos Central Server Encryption Mobile Endpoint ~5K Firewalls w/ Security Heartbeat 2 Avg. firewalls
More informationAppliance Comparison Chart
Security Gateway Appliances 300 300 500 500 5400 5600 5800 5900 Branch Office Small Enterprise Mid-Size Enterprise Real-World Production Conditions Security 60 50 340 45 600 950 750 400 Firewall (Gbps)..
More information10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
More informationThreat Pragmatics. Target 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:
Threat Pragmatics 25-29 June 2018 PacNOG 22, Honiara, Solomon Islands Supported by: Issue Date: Revision: 1 Target Many sorts of targets: Network infrastructure Network services Application services User
More informationSurat Smart City Development Ltd. Surat Municipal Corporation 1
Surat Smart City Development Ltd. Surat Municipal Corporation 1 Surat Smart City Development Limited (SSCDL) ADDENDUM AND CORRIGENDUM-1 Name of the work: - [SSCDL-Network-01-2018] The Bidders are requested
More informationWEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING
WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING A STRONG PARTNER COMPANY Link11 - longstanding security experience Link11 is a European IT security provider, headquartered in Frankfurt, Germany
More informationDDoS Mitigation & Case Study Ministry of Finance
DDoS Mitigation Service @Belnet & Case Study Ministry of Finance Julien Dandoy, FODFin Technical Architect Grégory Degueldre, Belnet Network Architect Agenda DDoS : Definition and types DDoS Mitigation
More informationThreat Detection and Mitigation for IoT Systems using Self Learning Networks (SLN)
Threat Detection and Mitigation for IoT Systems using Self Learning Networks (SLN) JP Vasseur, PhD - Cisco Fellow jpv@cisco.com Maik G. Seewald, CISSP Sr. Technical Lead maseewal@cisco.com June 2016 Cyber
More informationSECURITY FOR SMALL BUSINESSES
SECURITY FOR SMALL BUSINESSES 2017 UNCOMPROMISING PERFORMANCE A common problem with firewalls used by small businesses has to do with hardware performance. Most often, vendor-stated bandwidth claims fall
More informationWhat s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics
What s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics Vision: Everything as a service Speed Scalability Speed to Market
More informationCisco CCIE Security Written.
Cisco 400-251 CCIE Security Written http://killexams.com/pass4sure/exam-detail/400-251 QUESTION: 193 Which two of the following ICMP types and code should be allowed in a firewall to enable traceroute?
More informationCyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX
Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security HTML PHP Database Linux Operating System and Networking: LINUX NETWORKING Information Gathering:
More informationDisclaimer CONFIDENTIAL 2
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationMeeting 39. Guest Speaker Dr. Williams CEH Networking
Cyber@UC Meeting 39 Guest Speaker Dr. Williams CEH Networking If You re New! Join our Slack ucyber.slack.com Feel free to get involved with one of our committees: Content, Finance, Public Affairs, Outreach,
More informationAPT Protection.
Sangfor NGAF v7.4 Professional APT Protection tech.support@sangfor.com www.sangfor.com What is APT Gartner: Defining Advanced Persistent Threats Page 2 What is APT SANGFOR: APT is Not An Attack, But a
More informationCisco AnyConnect Secure Mobility Solution. György Ács Regional Security Consultant
Cisco AnyConnect Secure Mobility Solution György Ács Regional Security Consultant Mobile User Challenges Mobile and Security Services Web Security Deployment Methods Live Q&A 2011 Cisco and/or its affiliates.
More informationUnderstanding Cisco Cybersecurity Fundamentals
210-250 Understanding Cisco Cybersecurity Fundamentals NWExam.com SUCCESS GUIDE TO CISCO CERTIFICATION Exam Summary Syllabus Questions Table of Contents Introduction to 210-250 Exam on Understanding Cisco
More informationCisco Cloud Security. How to Protect Business to Support Digital Transformation
Cisco Cloud Security How to Protect Business to Support Digital Transformation Dragan Novakovic Cybersecurity Consulting Systems Engineer January 2018. Security Enables Digitization Digital Disruption,
More informationPaloalto Networks PCNSA EXAM
Page No 1 m/ Paloalto Networks PCNSA EXAM Palo Alto Networks Certified Network Security Administrator Product: Full File For More Information: /PCNSA-dumps 2 Product Questions: 50 Version: 8.0 Question:
More informationIntroduction. The Safe-T Solution
Secure Application Access Product Brief Contents Introduction 2 The Safe-T Solution 3 How It Works 3 Capabilities 4 Benefits 5 Feature List 6 6 Introduction As the world becomes much more digital and global,
More informationAccessEnforcer Version 4.0 Features List
AccessEnforcer Version 4.0 Features List AccessEnforcer UTM Firewall is the simple way to secure and manage your small business network. You can choose from six hardware models, each designed to protect
More information