SlideShare a Scribd company logo
Information Security
Assistant Professor Pramote Kuacharoen, Ph.D.
Network Attacks
Information Security Curriculum
• เป็นสาขาเกี่ยวกับการรักษาความมั่นคงปลอดภัยของสารสนเทศขององค์กร ซึ่ง
มุ่งเน้นพัฒนาบุคลากรที่สามารถ วิเคราะห์ความเสี่ยงและวางแผนความมั่นคง
ปลอดภัยขององค์กร สร้างนโยบายความมั่นคงปลอดภัย รักษาความมั่นคง
ปลอดภัย และสามารถตอบสนองต่อภัยคุกคามต่าง ๆ เพื่อส่งเสริมพันธกิจของ
องค์กร
• ผู้ที่ศึกษาในสาขานี้จะได้ความรู้ ความเชี่ยวชาญทั้งทางด้านเทคโนโลยีเกี่ยวกับ
ความมั่นคงสารสนเทศและการบริหารจัดการความมั่นคงสารสนเทศ
• Technology Is Concrete
• Can visualize devices and transmission lines
• Can understand device and software operation
• Management Is Abstract
• Management Is More Important
• Security is a process, not a product (Bruce Schneier)
4
Management is the Hard Part
Courses
• Information Security Management
• Computer and Network Security
• Information Security Risk Analysis
• Software Development Security
• Information Security Policy
• Internet Security
• Database Security
• Software Development Security
• Cloud Computing Security
• Penetration Testing and Vulnerability Analysis
• Digital Forensics and Investigations
Security Management Process
Plan
ProtectRespond
• Identify Current IT Security Gaps
• Identify Driving Forces
• The threat environment
• Compliance laws and regulations
• Corporate structure changes, such as mergers
• Identify Corporate Resources Needing
Protection
• Enumerate all resources
• Rate each by sensitivity
7
Strategic IT Security Planning
• Develop Remediation Plans
• Develop a remediation plan for all security gaps
• Develop a remediation plan for every resource unless
it is well protected
• Develop an Investment Portfolio
• You cannot close all gaps immediately
• Choose projects that will provide the largest returns
• Implement these
8
Strategic IT Security Planning
In The News
Stealing Money using fake ID
IDENTITY THEFT
SOCIAL
ENGINEERING
OTP
TWO-FACTOR
AUTHENTICATION
Campus Area Networks
AAA Server
DHCP Server
ESA/WSA
Web ServerEmail Server
VPN
Hosts
Layer 3 Switches
Layer 2 Switches
IPSFirewall
Internet
Small Office and Home Office Networks
Wireless Router
Layer 2 Switch
Internet
Wide Area Networks
POP
VPN
Corporate
Branch Site
Regional Site
SOHO Site
Mobile Worker
The Evolving Network Border
• Critical MDM functions for BYOD network
– Data encryption
– PIN enforcement
– Data wipe
– Data loss prevention
– Jailbreak/root detection
The Hacker & The Evolution of Hackers
Modern hacking titles:
• Script Kiddies
• Vulnerability Brokers
• Hacktivists
• Cyber Criminals
• State-Sponsored Hackers
Traditional Hackers
• Motivated by thrill, validation of skills,
sense of power
• Motivated to increase reputation among
other hackers
• Often do damage as a byproduct
• Often engage in petty crime
Script Kiddie
Cyber Criminals
Hacktivists
State-Sponsored Hackers
Attack Tools vs. Knowledge
Penetration Testing Tools
Password Crackers
Wireless Hacking
Network Scanning
and Hacking
Packet Crafting
Packet Sniffers
Rootkit Detectors
Fuzzers to Search
Vulnerability
Forensic
Debuggers
Hacking OS
Encryption Tools
Vulnerability
Exploitation
Vulnerability
Scanners
Network Hacking Attacks
• Eavesdropping
• Data modification
• IP address spoofing
• Password-based
• Denial-of-service
• Man-in-the-middle
• Compromised-key
• Sniffer
Reconnaissance Attacks
Access Attacks
DoS Attacks
Network Security Organizations
Domains of Security
The Security Artichoke
Security
Goals
Confidentiality
IntegrityAvailability
Evolution of Network Security Tools
IDS IPS
Software
Firewall
Security
Appliance
Next Generation Firewall (NGFW)
• An integrated network platform that combines a
traditional firewall with other network device
filtering functionalities such as an application
firewall using in-line deep packet inspection (DPI),
an intrusion prevention system (IPS)
Cloud-Based Protections
www.example.com
Corporate
Network
Cloud Security Service
Borderless Network
Any
Device
Any
Location
Any
Resource
Protecting Modern Endpoints
Modern
Security
Solutions
AMP
ESA
WSA
NAC
Encryption of Local Data
Hardware
Software
Switch Attack Categories
Layer 2
Attacks
CAM
Table
VLAN
DHCP
ARP
Address
Spoofing
STP
Network Security Professionals
Top 10 Highest Paying Jobs in
Information Security
1. Chief Information Security Officer (CISO) $81,000-
$240,000
2. Security Architect $84,000-$160,000
3. Security Director $66,000-$180,000
4. Security Manager $71,433-$143,374
5. Security Engineer $57,000-$128,000
6. Incident Responder $50,000-$150,000
7. Security Consultant $46,000-$147,000
8. Computer Forensics Expert $56,000-$119,000
9. Malware Analyst $48,000-$100,000
10. Security Specialist $43,000-$113,000
Cybersecurity Jobs
• One Million Cybersecurity Job Openings In 2016
• Top Cyber Security Salaries In U.S. Metros Hit
$380,000
Common Career Path

More Related Content

PDF
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
PDF
SIEM and Threat Hunting
PPTX
6 Steps for Operationalizing Threat Intelligence
PPTX
Threat Hunting - Moving from the ad hoc to the formal
PPTX
Threat intelligence in security
PPTX
Cyber Threat Intelligence: Building and maturing an intelligence program that...
PPTX
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
PPTX
Actionable Threat Intelligence
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
SIEM and Threat Hunting
6 Steps for Operationalizing Threat Intelligence
Threat Hunting - Moving from the ad hoc to the formal
Threat intelligence in security
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Actionable Threat Intelligence

What's hot (20)

PDF
Application Security Verification Standard Project
ODP
Unlock Security Insight from Machine Data
PPTX
Bsides 2019 - Intelligent Threat Hunting
PPTX
What is Threat Hunting? - Panda Security
PPTX
Threat Hunting 101: Intro to Threat Detection and Incident Response
PPTX
Cyber Threat Intelligence Solution Demonstration
PPTX
Building a Successful Threat Hunting Program
PPTX
Big Data Analytics for Cyber Security: A Quick Overview
PDF
Cyber Threat Intelligence
PDF
Threat Intelligence 101 - Steve Lodin - Submitted
PPTX
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PPTX
Application of threat intelligence in security operation
PDF
Cyber Threat Intelligence
PDF
Threat Intelligence Workshop
PDF
Threat Intelligence
PDF
Secure Software Design for Data Privacy
PDF
WhyNormShield
PPTX
SurfWatch Labs Threat Intelligence Solution Demo
PDF
Artificial Intelligence – Time Bomb or The Promised Land?
Application Security Verification Standard Project
Unlock Security Insight from Machine Data
Bsides 2019 - Intelligent Threat Hunting
What is Threat Hunting? - Panda Security
Threat Hunting 101: Intro to Threat Detection and Incident Response
Cyber Threat Intelligence Solution Demonstration
Building a Successful Threat Hunting Program
Big Data Analytics for Cyber Security: A Quick Overview
Cyber Threat Intelligence
Threat Intelligence 101 - Steve Lodin - Submitted
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
Effective Threat Hunting with Tactical Threat Intelligence
Application of threat intelligence in security operation
Cyber Threat Intelligence
Threat Intelligence Workshop
Threat Intelligence
Secure Software Design for Data Privacy
WhyNormShield
SurfWatch Labs Threat Intelligence Solution Demo
Artificial Intelligence – Time Bomb or The Promised Land?
Ad

Viewers also liked (19)

PDF
Machine Learning: An introduction โดย รศ.ดร.สุรพงค์ เอื้อวัฒนามงคล
PDF
ระบบการเรียนการสอนระยะไกลโดยใช้เทคโนโลยีคลาวด์ โดย รศ. ดร. พิพัฒน์ หิรัญวณิชช...
PDF
Cyber Security โดย ณัฐ พยงค์ศรี นักวิชาการคอมพิวเตอร์ชำนาญการ -พนักงานเจ้าหน้...
PDF
Thailand household's disparity of socioeconomic statust: A cluster analysis โ...
PDF
Spatial regression model predicting Thailand’s election โดย อาจารย์ ดร. อานน...
PDF
Text Mining in Business Intelligence โดย รศ.ดร.โอม ศรนิล
PDF
การเกื้อหนุนบิดามารดาสูงอายุวัยปลายจากบุตรวัยผู้ใหญ่ โดย ร.ท.กนกกร ศักดิ์แหลม...
PDF
Agile Development for Startup โดย ผศ.ดร.รัฐกร พูลทรัพย์
PDF
DevOps : Integrate, Deliver and Deploy continuously with Visual Studio Team S...
PDF
Data Analytics in your IoT Solution Fukiat Julnual, Technical Evangelist, Mic...
PDF
ปัจจัยที่มีอิทธิพลต่อการเปลี่ยนแปลงการใช้จ่ายของครัวเรือนไทย โดย รศ.ดร.เดือนเ...
PDF
Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์
PDF
สถิติทางการกับการพัฒนาประเทศ บทบาทของสำนักงานสถิติแห่งชาติ โดย นางหทัยชนก พรร...
PDF
From fraudulence to adversarial learning จรัล งามวิโรจน์เจริญ chief data sci...
PDF
วิชาการสถิติเกี่ยวข้องกับงานวิจัยเกษตรอย่างไร โดย พุฒนา รุ่งระวี วทม. (NIDA)
PDF
Internet of Things and Complex event processing (CEP)/Data fusion
PDF
Face recognition and deep learning โดย ดร. สรรพฤทธิ์ มฤคทัต NECTEC
PDF
Big data technology by Data Sciences Thailand ในงาน THE FIRST NIDA BUSINESS A...
PDF
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Machine Learning: An introduction โดย รศ.ดร.สุรพงค์ เอื้อวัฒนามงคล
ระบบการเรียนการสอนระยะไกลโดยใช้เทคโนโลยีคลาวด์ โดย รศ. ดร. พิพัฒน์ หิรัญวณิชช...
Cyber Security โดย ณัฐ พยงค์ศรี นักวิชาการคอมพิวเตอร์ชำนาญการ -พนักงานเจ้าหน้...
Thailand household's disparity of socioeconomic statust: A cluster analysis โ...
Spatial regression model predicting Thailand’s election โดย อาจารย์ ดร. อานน...
Text Mining in Business Intelligence โดย รศ.ดร.โอม ศรนิล
การเกื้อหนุนบิดามารดาสูงอายุวัยปลายจากบุตรวัยผู้ใหญ่ โดย ร.ท.กนกกร ศักดิ์แหลม...
Agile Development for Startup โดย ผศ.ดร.รัฐกร พูลทรัพย์
DevOps : Integrate, Deliver and Deploy continuously with Visual Studio Team S...
Data Analytics in your IoT Solution Fukiat Julnual, Technical Evangelist, Mic...
ปัจจัยที่มีอิทธิพลต่อการเปลี่ยนแปลงการใช้จ่ายของครัวเรือนไทย โดย รศ.ดร.เดือนเ...
Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์
สถิติทางการกับการพัฒนาประเทศ บทบาทของสำนักงานสถิติแห่งชาติ โดย นางหทัยชนก พรร...
From fraudulence to adversarial learning จรัล งามวิโรจน์เจริญ chief data sci...
วิชาการสถิติเกี่ยวข้องกับงานวิจัยเกษตรอย่างไร โดย พุฒนา รุ่งระวี วทม. (NIDA)
Internet of Things and Complex event processing (CEP)/Data fusion
Face recognition and deep learning โดย ดร. สรรพฤทธิ์ มฤคทัต NECTEC
Big data technology by Data Sciences Thailand ในงาน THE FIRST NIDA BUSINESS A...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Ad

Similar to Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ (20)

PPTX
Starting your Career in Information Security
PDF
Chapter 6 Security of Information and Cyber Security(FASS)
PDF
Information Security - Goals, Challenges, and Best Practices Discussed | USCSI®
PPTX
It security the condensed version
PPTX
unit -ii security1.pptx for Information system management
PPTX
Network Security & Ethical Hacking
PPTX
Intro Foundations of Information Security.pptx
PDF
Fundamentals of Information Security..pdf
PPTX
Information security[277]
PPTX
Week 1 - Introduction to CyberSecurity.pptx
PPTX
Information Security
PPTX
CS5300 class presentation on managing information systems
PDF
cyber security
PPT
Principles of information security Chapter 1 (1).ppt
PPT
Chapter 1 (1) (1).pptghtrtt76utrurtutrut
PPTX
Cyber-Security-Unit-1.pptx
PDF
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
PPTX
Cybersecurity.pptx
PPTX
Topic – cyber security, Introduction,future scope
PPTX
Information-Security_System_Notes__.pptx
Starting your Career in Information Security
Chapter 6 Security of Information and Cyber Security(FASS)
Information Security - Goals, Challenges, and Best Practices Discussed | USCSI®
It security the condensed version
unit -ii security1.pptx for Information system management
Network Security & Ethical Hacking
Intro Foundations of Information Security.pptx
Fundamentals of Information Security..pdf
Information security[277]
Week 1 - Introduction to CyberSecurity.pptx
Information Security
CS5300 class presentation on managing information systems
cyber security
Principles of information security Chapter 1 (1).ppt
Chapter 1 (1) (1).pptghtrtt76utrurtutrut
Cyber-Security-Unit-1.pptx
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
Cybersecurity.pptx
Topic – cyber security, Introduction,future scope
Information-Security_System_Notes__.pptx

More from BAINIDA (20)

PDF
ดนตรีของพระเจ้าแผ่นดิน อานนท์ ศักดิ์วรวิชญ์ สุรพงษ์ บ้านไกรทอง หอประชุมวปอ 7...
PDF
Mixed methods in social and behavioral sciences
PDF
Advanced quantitative research methods in political science and pa
PPTX
Latest thailand election2019report
PDF
Data science in medicine
PPTX
Nursing data science
PDF
Financial time series analysis with R@the 3rd NIDA BADS conference by Asst. p...
PDF
Statistics and big data for justice and fairness
PDF
Data science and big data for business and industrial application
PDF
Update trend: Free digital marketing metrics for start-up
PDF
Advent of ds and stat adjustment
PPTX
เมื่อ Data Science เข้ามา สถิติศาสตร์จะปรับตัวอย่างไร
PPTX
Data visualization. map
PPTX
Dark data by Worapol Alex Pongpech
PDF
Deepcut Thai word Segmentation @ NIDA
PPTX
Professionals and wanna be in Business Analytics and Data Science
PDF
Deep learning and image analytics using Python by Dr Sanparit
PDF
Visualizing for impact final
PPTX
Python programming workshop
PDF
Second prize business plan @ the First NIDA business analytics and data scien...
ดนตรีของพระเจ้าแผ่นดิน อานนท์ ศักดิ์วรวิชญ์ สุรพงษ์ บ้านไกรทอง หอประชุมวปอ 7...
Mixed methods in social and behavioral sciences
Advanced quantitative research methods in political science and pa
Latest thailand election2019report
Data science in medicine
Nursing data science
Financial time series analysis with R@the 3rd NIDA BADS conference by Asst. p...
Statistics and big data for justice and fairness
Data science and big data for business and industrial application
Update trend: Free digital marketing metrics for start-up
Advent of ds and stat adjustment
เมื่อ Data Science เข้ามา สถิติศาสตร์จะปรับตัวอย่างไร
Data visualization. map
Dark data by Worapol Alex Pongpech
Deepcut Thai word Segmentation @ NIDA
Professionals and wanna be in Business Analytics and Data Science
Deep learning and image analytics using Python by Dr Sanparit
Visualizing for impact final
Python programming workshop
Second prize business plan @ the First NIDA business analytics and data scien...

Recently uploaded (20)

PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Cell Types and Its function , kingdom of life
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Introduction to Building Materials
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
Hazard Identification & Risk Assessment .pdf
PDF
Classroom Observation Tools for Teachers
PDF
IGGE1 Understanding the Self1234567891011
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Trump Administration's workforce development strategy
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
Empowerment Technology for Senior High School Guide
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Computing-Curriculum for Schools in Ghana
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Complications of Minimal Access Surgery at WLH
Cell Types and Its function , kingdom of life
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Introduction to Building Materials
What if we spent less time fighting change, and more time building what’s rig...
Orientation - ARALprogram of Deped to the Parents.pptx
LDMMIA Reiki Yoga Finals Review Spring Summer
Hazard Identification & Risk Assessment .pdf
Classroom Observation Tools for Teachers
IGGE1 Understanding the Self1234567891011
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Trump Administration's workforce development strategy
Weekly quiz Compilation Jan -July 25.pdf
Empowerment Technology for Senior High School Guide
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Final Presentation General Medicine 03-08-2024.pptx
Computing-Curriculum for Schools in Ghana

Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ

  • 1. Information Security Assistant Professor Pramote Kuacharoen, Ph.D.
  • 3. Information Security Curriculum • เป็นสาขาเกี่ยวกับการรักษาความมั่นคงปลอดภัยของสารสนเทศขององค์กร ซึ่ง มุ่งเน้นพัฒนาบุคลากรที่สามารถ วิเคราะห์ความเสี่ยงและวางแผนความมั่นคง ปลอดภัยขององค์กร สร้างนโยบายความมั่นคงปลอดภัย รักษาความมั่นคง ปลอดภัย และสามารถตอบสนองต่อภัยคุกคามต่าง ๆ เพื่อส่งเสริมพันธกิจของ องค์กร • ผู้ที่ศึกษาในสาขานี้จะได้ความรู้ ความเชี่ยวชาญทั้งทางด้านเทคโนโลยีเกี่ยวกับ ความมั่นคงสารสนเทศและการบริหารจัดการความมั่นคงสารสนเทศ
  • 4. • Technology Is Concrete • Can visualize devices and transmission lines • Can understand device and software operation • Management Is Abstract • Management Is More Important • Security is a process, not a product (Bruce Schneier) 4 Management is the Hard Part
  • 5. Courses • Information Security Management • Computer and Network Security • Information Security Risk Analysis • Software Development Security • Information Security Policy • Internet Security • Database Security • Software Development Security • Cloud Computing Security • Penetration Testing and Vulnerability Analysis • Digital Forensics and Investigations
  • 7. • Identify Current IT Security Gaps • Identify Driving Forces • The threat environment • Compliance laws and regulations • Corporate structure changes, such as mergers • Identify Corporate Resources Needing Protection • Enumerate all resources • Rate each by sensitivity 7 Strategic IT Security Planning
  • 8. • Develop Remediation Plans • Develop a remediation plan for all security gaps • Develop a remediation plan for every resource unless it is well protected • Develop an Investment Portfolio • You cannot close all gaps immediately • Choose projects that will provide the largest returns • Implement these 8 Strategic IT Security Planning
  • 9. In The News Stealing Money using fake ID IDENTITY THEFT SOCIAL ENGINEERING OTP TWO-FACTOR AUTHENTICATION
  • 10. Campus Area Networks AAA Server DHCP Server ESA/WSA Web ServerEmail Server VPN Hosts Layer 3 Switches Layer 2 Switches IPSFirewall Internet
  • 11. Small Office and Home Office Networks Wireless Router Layer 2 Switch Internet
  • 12. Wide Area Networks POP VPN Corporate Branch Site Regional Site SOHO Site Mobile Worker
  • 13. The Evolving Network Border • Critical MDM functions for BYOD network – Data encryption – PIN enforcement – Data wipe – Data loss prevention – Jailbreak/root detection
  • 14. The Hacker & The Evolution of Hackers Modern hacking titles: • Script Kiddies • Vulnerability Brokers • Hacktivists • Cyber Criminals • State-Sponsored Hackers Traditional Hackers • Motivated by thrill, validation of skills, sense of power • Motivated to increase reputation among other hackers • Often do damage as a byproduct • Often engage in petty crime
  • 19. Attack Tools vs. Knowledge
  • 20. Penetration Testing Tools Password Crackers Wireless Hacking Network Scanning and Hacking Packet Crafting Packet Sniffers Rootkit Detectors Fuzzers to Search Vulnerability Forensic Debuggers Hacking OS Encryption Tools Vulnerability Exploitation Vulnerability Scanners
  • 21. Network Hacking Attacks • Eavesdropping • Data modification • IP address spoofing • Password-based • Denial-of-service • Man-in-the-middle • Compromised-key • Sniffer Reconnaissance Attacks Access Attacks DoS Attacks
  • 26. Evolution of Network Security Tools IDS IPS Software Firewall Security Appliance
  • 27. Next Generation Firewall (NGFW) • An integrated network platform that combines a traditional firewall with other network device filtering functionalities such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS)
  • 31. Encryption of Local Data Hardware Software
  • 32. Switch Attack Categories Layer 2 Attacks CAM Table VLAN DHCP ARP Address Spoofing STP
  • 34. Top 10 Highest Paying Jobs in Information Security 1. Chief Information Security Officer (CISO) $81,000- $240,000 2. Security Architect $84,000-$160,000 3. Security Director $66,000-$180,000 4. Security Manager $71,433-$143,374 5. Security Engineer $57,000-$128,000 6. Incident Responder $50,000-$150,000 7. Security Consultant $46,000-$147,000 8. Computer Forensics Expert $56,000-$119,000 9. Malware Analyst $48,000-$100,000 10. Security Specialist $43,000-$113,000
  • 35. Cybersecurity Jobs • One Million Cybersecurity Job Openings In 2016 • Top Cyber Security Salaries In U.S. Metros Hit $380,000

Editor's Notes

  • #15: 1.2.1.1 The Hacker 1.2.1.2 The Evolution of Hackers 1.2.1.3 Cyber Criminals 1.2.1.4 Hacktivists 1.2.1.5 State-Sponsored Hackers
  • #23: 1.3.1.2 Network Security Organizations
  • #25: 1.3.3.1 The Security Artichoke
  • #34: 1.3.1.1 Network Security Professionals