Uploaded by Wilson Prakash

s1 Cyber Security

advertisement
CYBER SECURITY
GOPALAKRISHNAN MANISEKARAN
CYBER SECURITY
NETWORK
SYSTEMS
MOBILE
NETWORK BASICS
MOST IMPORTANT FOR NETWORK SECURITY
OSI LAYER
PORTS AND PROTOCOLS
 Ports 0–1023 –well-known ports
 Ports 1024–49151 –registered ports
 Ports 49152–65535 – dynamic ports
 EX:

HTTP -80

HTTPS-443
Why protocols and ports matters here ????????????
HIGHLY TARGETED PROTOCOLS/PORT
•TCP and UDP port 135 — Windows RPC
•TCP and UDP ports 137–139 — Windows NetBIOS over TCP/IP
•TCP port 1433 and UDP port 1434 — Microsoft SQL Server
•RDP-3389
CIA – CONFIDENTIALITY INTEGRITY AVAILABILITY
INCIDENT / ALERT TRIAGE
 False Positive
 False Negative
 True Positive
 True Negative
THREAT – VULNERABILITY – RISK
 Threat – Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage,
or destroy an asset.
 Vulnerability – Weaknesses or gaps in a security program that can be exploited by threats to gain
unauthorized access to an asset.
 Risk – The potential for loss, damage or destruction of an asset as a result of a threat exploiting a
vulnerability.
INFRASTRUCTURE SECURITY
 Router
 Firewall
 Application Delivery Controller aka Load Balancer
 Proxy(Forward and Reverse)
 WAF – Web Application Firewall
 UTM
 AV
 IDS
 IPS (IDPS)
MALWARE
 Malicious Executable –( MAL + Ware = Malicious Software )

Types

Adware

Spyware

Ransomware

Trojan

Malveristing

Worm

Viruses
(More About :: Ransomware )
INFRA ARCHITECTURE
PROXY
PROXY
Forward Proxy
Reverse Proxy
CAN WE SPOOF ?
EMAIL ANALYSIS
 Process during the digital forensic investigation to detect the criminal activities occurs through the
communication of the email messages
 Phishing (URL Phishing/ Hyperlink Spoofing)
CAN WE SPOOF ?
PREVENT FROM CYBER ATTACKS
 Keep Upto date your Software
 Don’t install unnecessary Tools
 Don’t visit unnecessary/malicious websites
 Install AV protection
 Use Secure Communication Link
CAN WE SPOOF ?
WEB SECURITY
 What is Web security
 Why ? Web security is important ?
 How can protect ?
OWASP –TOP 10
•
A1-Injection
•
A2-Broken Authentication
•
A3-Sensitive Data Exposure
•
A4-XML External Entities (XXE)
•
A5-Broken Access Control
•
A6-Security Misconfiguration
•
A7-Cross-Site Scripting XSS
•
A8-Insecure Deserialization
•
A9-Using Components with Known Vulnerabilities
•
A10-Insufficient Logging and Monitoring
THANK YOU
Download