SlideShare a Scribd company logo
Seguridad de la Información y Controles contra Hackers - Getting hacked 101   intro to info sec and controls
ABOUT YOUR INSTRUCTOR
• JUAN ORTIZ
• JORTIZ@BITSNCS.COM
• BLOG: JUANORTIZ.PRO
• BORN AND RAISED IN PUERTO RICO
• INFO SEC, VIRTUALIZATION, CLOUD,
ARCHITECTURE AND BUSINESS INTEGRATION
COURSE SCHEDULE
Start End Content
8:30 9:00 Class Introduction
9:00 10:15 Module 1: Basic facts, myths and sad realities
10:15 10:30 Morning Break
10:30 12:00 Module 1: Labs
12:00 1:00 Lunch Break
1:00 2:15 Module 2: Securing the Infrastructure
2:15 2:30 Afternoon Break
2:30 4:00 Module 2: Labs
4:00 4:15 Wrap up and Q&A
AGENDA
• DEFINE AND UNDERSTAND COMPONENTS OF INFORMATION SECURITY
• UNDERSTAND INFOSEC ENEMIES
• DEFINE VULNERABILITIES
• EXPLAIN COUNTERMEASURES
• DEMO & LABS
PURPOSE AND METHODOLOGY
• THIS IS AN INTRODUCTORY COURSE
• DESIGNED TO BE A FAST WAY TO GET UP TO SPEED IN INFORMATION SECURITY
• THIS COURSE COVERS A BROAD SPECTRUM OF SECURITY TOPICS AND IS LIBERALLY SPRINKLED WITH REAL LIFE EXAMPLES
• A BALANCED MIX OF TECHNICAL AND MANAGERIAL ISSUES MAKES THIS COURSE APPEALING TO ATTENDEES WHO NEED TO UNDERSTAND THE SALIENT
FACETS OF
• INFORMATION SECURITY BASICS
• THE BASICS OF RISK MANAGEMENT.
• WE BEGIN BY COVERING BASIC TERMINOLOGY AND CONCEPTS
• THEN MOVE TO EXAMPLES OF THREATS
• WE COVER THE BASICS OF CRYPTOGRAPHY, SECURITY MANAGEMENT, AND WIRELESS TECHNOLOGY
• THEN WE LOOK AT POLICY AS A TOOL TO EFFECT CHANGE IN YOUR ORGANIZATION.
• IN THE FINAL DAY OF THE COURSE, WE PUT IT ALL TOGETHER WITH AN IMPLEMENTATION OF DEFENSE IN-DEPTH.
CAVEATS
• THE COURSE IS DESIGNED TO BE PERFORMED ON A WINDOWS ENVIRONMENT
• YOU SHOULD NOT BRING A REGULAR PRODUCTION LAPTOP FOR THIS CLASS! WHEN INSTALLING
SOFTWARE, THERE IS ALWAYS A CHANCE OF BREAKING SOMETHING ELSE ON THE SYSTEM. STUDENTS
SHOULD ASSUME THAT ALL DATA COULD BE LOST.
• IT IS CRITICAL THAT STUDENTS BE ABLE TO LOGIN TO THE ADMINISTRATOR LEVEL ACCOUNT
• END POINT SECURITY SOLUTIONS CAN PREVENT PROGRAMS FROM BEING INSTALLED CORRECTLY ON THE
SYSTEM. STUDENTS NEED TO BE ABLE TO TEMPORARILY DISABLE END POINT SECURITY SOLUTIONS OR
MAKE EXCEPTIONS TO ALLOW PROGRAMS TO RUN.
MODULE 1 - BASIC FACTS, MYTHS AND SAD REALITIES
A FRAMEWORK FOR INFORMATION SECURITY
SECURITY
• IT HAS MANY DEFINITIONS
• IN REALITY IT IS A SENSE OF SECURITY
• KEY TERMS: THREAT, EXPOSITION, VULNERABILITY COPING, RISK
• CAT AND MOUSE GAME
• THERE ARE MANY STRATEGIES
• DEFENSE IN-DEPTH
ESSENTIAL TERMINOLOGIES
ELEMENTS OF INFORMATION TECHNOLOGY
DEFENSE IN-DEPTH
“
”
THINGS TO DO IF YOU WANT TO GET
HACKED
DON’T DO THEM, PLEASE
BAD PASSWORDS, BAD IDEA
WE ARE STILL NOT LEARNING
REPEAT YOUR PASSWORDS
• Facebook
• Twitter
• Gmail
• Youtube
• eBay
• PayPal
• BPPR
• Yahoo
• Instagram
• Pinterest
• Amazon
• Netflix
• Microsoft
• Spotify
• Pandora
• Dropbox
• OneDrive
• SmartPhone
• iCloud
• GoDaddy
• Linkedin
• IMDB
• Wikipedia
• Muchas más
DON’T USE MULTI FACTOR AUTHENTICATION
• AUTENTICACIÓN
• ALGO QUE SABES
• ALGO QUE TIENES
• ALGO QUE ERES
• EN QUE LUGAR ESTAS
• DISPONIBLE COMÚNMENTE
• AUTORIZACIÓN
CLICK EVERY POSIBLE LINK
PAY RANSOMS WHEN ASKED
DON’T ENCRYPT YOUR DATA
• FTP
• Telnet
• Simple Mail Transfer Protocol (SMTP)
• HTTP
• Post Office Protocol 3 (POP3)
• Internet Message Access Protocol (IMAPv4)
• Network Basic Input/OutputSystem
(NetBIOS),
• Simple Network Management Protocol
(SNMP)
DON’T USE ANTI-MALWARE
• Any system can be
vulnerable to
infection
• The attacker uses
naiveness as
weapon
• There are many
effective tools
Before After
DO NOT PATCH YOUR MACHINE
• ERVERY HUMAN MADE SOFTWARE HAS FLAWS
• THIS APPLIES TO OS, FIRMWARE, DRIVERS AND SOFTWARE
• BE AWARE – WINDOWS UPDATE DOES NOT PATCH THIRD PARTY SOFTWARE
DOWNLOAD FREE STUFF
• THE PIRATE BAY
• KICKASSTORRENTS
• TORRENTZ
• EXTRATORRENT
• YIFY-TORRENTS
• EZTV
• ISOHUNT.TO
• LuckyWire
• BearShare
• Morpheus
• LimeZilla
• Nodezilla
• Warez
• Blubster
DO NOT BE SUSPICIOUS
• COMMON SENSE IS THE LEAST COMMON OF THE SENSES
• IF ITS TOO GOOD TO BE TRUE, IT PROBABLY IS
• IF A LIE IS WELL DEVELOPED, WE WILL NOT HESITATE TO CLICK THAT MALICIOUS LINK
• POLL: ASK A RANDOM PERSON WHAT IS HIS WEAKEST PASSWORD IN EXCHANGE FOR A PEN
• RECIPROCITY: IT’S NATURAL TO RETURN THE FAVOR.
• PEOPLE LIKE TO BE PRAISED
• PEOPLE ARE AFRAID OF POWER POSITIONS
MODULE 1 - EXERCISES AND LABS
• LAB 1 - CREATE A STANDARD USER ACCOUNT
• LAB 2 - CONFIGURE MICROSOFT UPDATES
• LAB 3 - CONFIGURE THIRD PARTY SOFTWARE UPDATES (SECUNIA PERSONAL SOFTWARE INSPECTOR)
• LAB 4 - CONFIGURE PASSWORD MANAGEMENT (LASTPASS, KEEPASS)
MODULE 2 - SECURING THE INFRASTRUCTURE
APPRECIATING THE RISKS ASSOCIATED WITH BEING CONNECTED TO THE INTERNET
WHAT DOES A HACKER DO
NETWORK DESIGNS
ATTACK TYPES
• PUBLIC INFORMATION - SEARCH ENGINES, SOCIAL NETWORKS AND EVEN JOB SEARCH
• NAME RESOLUTION ATTACKS
• SESSION HIJACKING, SPOOFING, MAN IN THE MIDDLE
• DENIAL OF SERVICE
• CROSS SITE SCRIPTING, COOKIE STEALING
• VIRUS, TROJANS, KEYLOGGERS AND WORMS
• VULNERABILITIES
• COVERT TRACKS
ATTACKER RESOURCES
• LACK OF PLANNING AND PROTECTION PROVIDE THE BEST ATTACKING ENVIRONMENT
• THERE ARE A LOT OF TOOLS FREELY AVAILABLE, OTHERS READY FOR SELL
• THERE ARE REALLY BAD PEOPLE ON THE INTERNET, ON BUSINESS
• DEEP WEB AND ANONYMIZERS – THEY EXIST AND ARE PRETTY EFFICIENT
DEFENSE MECHANISMS
• POLICIES AND DATA WIPING
• UPDATES AND CLIENT SECURITY SOFTWARE
• ENCRYPTION – SYMMETRIC VS ASYMMETRIC, ONE WAY HASHES, CERTIFICATES AND DISK ENCRYPTION
• FIREWALLS, IDS, DMZ, HONEY POTS
• SECURE NETWORK PROTOCOLS
• SEGMENTATION
• BACKUP, REPLICATION AND REDUNDANCY
• SECURITY AWARENESS TRAINING
• ASSESSMENTS – PENTEST AND VA
MODULE 2 - EXERCISES AND LABS
• LAB 5 - CONFIGURE FILE BACKUP (SYNCBACK, AZURE BACKUP)
• LAB 6 - CONFIGURE ENCRYPTION AND SECURE CONTAINERS (TRUECRYPT/VERACRYPT/BITLOCKER)
• LAB 7 – CALCULATING HASHES (HASHCALC)
• LAB 8 – SCANNING FOR MALWARE (MALWAREBYTES)
• LAB 9 – WIPE HARD DRIVE SPACE (CCLEANER, KILLDISK)
CONCLUSION
• THERE IS NO SUCH THING AS “COMPLETELY SECURE”
• IF IT IS TOO GOOD TO BE TRUE, IT PROBABLY IS
• A LAYERED PLAN WILL BE THE MOST EFFECTIVE
• KEEP IT SIMPLE, WHEN POSSIBLE
• MOST ATTACKS ARE EFFECTIVE DUE TO IGNORANCE
• ONCE YOU RUN YOUR SECURITY PLAN, DO NOT LEAVE IT AS IT IS. VERIFY IT CONSTANTLY
• MAKE DRILLS AND TESTS
WRAP UP AND Q&A

More Related Content

PPTX
Internet Etiqute
PPTX
Aegis Personal Cybersecurity 101
PPTX
Audit and security
PPTX
Webinar On Ethical Hacking & Cybersecurity - Day2
PDF
ISACA Ethical Hacking Presentation 10/2011
PPTX
Introduction of computer security
PPTX
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...
Internet Etiqute
Aegis Personal Cybersecurity 101
Audit and security
Webinar On Ethical Hacking & Cybersecurity - Day2
ISACA Ethical Hacking Presentation 10/2011
Introduction of computer security
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...

What's hot (20)

PPTX
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
PPTX
IAEM cybersecurity 101
PPTX
Untangled Conference - November 8, 2014 - Security Awareness
PPTX
St. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
PPTX
Appsec2013 presentation
PDF
Mobile #Infosec hackathon for journalists(2)
PDF
SACON - Deception Technology (Sahir Hidayatullah)
PPTX
Computing on the Move - Mobile Security
PPTX
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
PPTX
CyberCamp 2015: Low Hanging Fruit
PDF
Trial by Fire: Security @ DEF CON 21
PDF
Datashur Presentation pin flash drive - Kingfin
PPT
Heartbleed
PDF
Wireless Keyboard Threats
PDF
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...
PPTX
Emerging Threats and Trends in Online Security
PPS
Information security in the starbucks generation
PPT
Introduction To Computer Security
PDF
Securing blockchain assets
PPT
Honeypot
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
IAEM cybersecurity 101
Untangled Conference - November 8, 2014 - Security Awareness
St. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
Appsec2013 presentation
Mobile #Infosec hackathon for journalists(2)
SACON - Deception Technology (Sahir Hidayatullah)
Computing on the Move - Mobile Security
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
CyberCamp 2015: Low Hanging Fruit
Trial by Fire: Security @ DEF CON 21
Datashur Presentation pin flash drive - Kingfin
Heartbleed
Wireless Keyboard Threats
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...
Emerging Threats and Trends in Online Security
Information security in the starbucks generation
Introduction To Computer Security
Securing blockchain assets
Honeypot

Similar to Seguridad de la Información y Controles contra Hackers - Getting hacked 101 intro to info sec and controls (20)

PDF
Ethical hacking for fun and profit
PDF
Cybersecurity Basics - Aravindr.com
PPTX
1.palm vein technology(final)
PPT
PALM VEIN TECHNOLOGY..ppt
PPTX
Cyber Security Tips for students_Deepak
PDF
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
PPTX
introtomalware
PPTX
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
PPTX
Cyber Security Overview for Small Businesses
PPTX
cybersecurity notes important points.pptx
PPTX
Six steps for securing offshore development
PPTX
Network Security
PPTX
Cyber Security and Healthcare
PPTX
Ethical Hacking Redefined
PPTX
It security the condensed version
PPTX
Security is not a feature
PPTX
and safety Cybersecurity_Presentation.pptx
PDF
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
PPTX
Keeping Secrets on the Internet of Things - Mobile Web Application Security
PDF
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Ethical hacking for fun and profit
Cybersecurity Basics - Aravindr.com
1.palm vein technology(final)
PALM VEIN TECHNOLOGY..ppt
Cyber Security Tips for students_Deepak
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
introtomalware
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Cyber Security Overview for Small Businesses
cybersecurity notes important points.pptx
Six steps for securing offshore development
Network Security
Cyber Security and Healthcare
Ethical Hacking Redefined
It security the condensed version
Security is not a feature
and safety Cybersecurity_Presentation.pptx
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Workshop incident response n handling-bssn 12 nop 2019-ignmantra

Recently uploaded (20)

PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Digital Strategies for Manufacturing Companies
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
top salesforce developer skills in 2025.pdf
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
assetexplorer- product-overview - presentation
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Digital Systems & Binary Numbers (comprehensive )
PPTX
L1 - Introduction to python Backend.pptx
PPT
Introduction Database Management System for Course Database
PDF
Nekopoi APK 2025 free lastest update
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
Design an Analysis of Algorithms II-SECS-1021-03
How to Choose the Right IT Partner for Your Business in Malaysia
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Digital Strategies for Manufacturing Companies
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
top salesforce developer skills in 2025.pdf
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Wondershare Filmora 15 Crack With Activation Key [2025
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 41
assetexplorer- product-overview - presentation
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Digital Systems & Binary Numbers (comprehensive )
L1 - Introduction to python Backend.pptx
Introduction Database Management System for Course Database
Nekopoi APK 2025 free lastest update
2025 Textile ERP Trends: SAP, Odoo & Oracle
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Upgrade and Innovation Strategies for SAP ERP Customers

Seguridad de la Información y Controles contra Hackers - Getting hacked 101 intro to info sec and controls

  • 2. ABOUT YOUR INSTRUCTOR • JUAN ORTIZ • JORTIZ@BITSNCS.COM • BLOG: JUANORTIZ.PRO • BORN AND RAISED IN PUERTO RICO • INFO SEC, VIRTUALIZATION, CLOUD, ARCHITECTURE AND BUSINESS INTEGRATION
  • 3. COURSE SCHEDULE Start End Content 8:30 9:00 Class Introduction 9:00 10:15 Module 1: Basic facts, myths and sad realities 10:15 10:30 Morning Break 10:30 12:00 Module 1: Labs 12:00 1:00 Lunch Break 1:00 2:15 Module 2: Securing the Infrastructure 2:15 2:30 Afternoon Break 2:30 4:00 Module 2: Labs 4:00 4:15 Wrap up and Q&A
  • 4. AGENDA • DEFINE AND UNDERSTAND COMPONENTS OF INFORMATION SECURITY • UNDERSTAND INFOSEC ENEMIES • DEFINE VULNERABILITIES • EXPLAIN COUNTERMEASURES • DEMO & LABS
  • 5. PURPOSE AND METHODOLOGY • THIS IS AN INTRODUCTORY COURSE • DESIGNED TO BE A FAST WAY TO GET UP TO SPEED IN INFORMATION SECURITY • THIS COURSE COVERS A BROAD SPECTRUM OF SECURITY TOPICS AND IS LIBERALLY SPRINKLED WITH REAL LIFE EXAMPLES • A BALANCED MIX OF TECHNICAL AND MANAGERIAL ISSUES MAKES THIS COURSE APPEALING TO ATTENDEES WHO NEED TO UNDERSTAND THE SALIENT FACETS OF • INFORMATION SECURITY BASICS • THE BASICS OF RISK MANAGEMENT. • WE BEGIN BY COVERING BASIC TERMINOLOGY AND CONCEPTS • THEN MOVE TO EXAMPLES OF THREATS • WE COVER THE BASICS OF CRYPTOGRAPHY, SECURITY MANAGEMENT, AND WIRELESS TECHNOLOGY • THEN WE LOOK AT POLICY AS A TOOL TO EFFECT CHANGE IN YOUR ORGANIZATION. • IN THE FINAL DAY OF THE COURSE, WE PUT IT ALL TOGETHER WITH AN IMPLEMENTATION OF DEFENSE IN-DEPTH.
  • 6. CAVEATS • THE COURSE IS DESIGNED TO BE PERFORMED ON A WINDOWS ENVIRONMENT • YOU SHOULD NOT BRING A REGULAR PRODUCTION LAPTOP FOR THIS CLASS! WHEN INSTALLING SOFTWARE, THERE IS ALWAYS A CHANCE OF BREAKING SOMETHING ELSE ON THE SYSTEM. STUDENTS SHOULD ASSUME THAT ALL DATA COULD BE LOST. • IT IS CRITICAL THAT STUDENTS BE ABLE TO LOGIN TO THE ADMINISTRATOR LEVEL ACCOUNT • END POINT SECURITY SOLUTIONS CAN PREVENT PROGRAMS FROM BEING INSTALLED CORRECTLY ON THE SYSTEM. STUDENTS NEED TO BE ABLE TO TEMPORARILY DISABLE END POINT SECURITY SOLUTIONS OR MAKE EXCEPTIONS TO ALLOW PROGRAMS TO RUN.
  • 7. MODULE 1 - BASIC FACTS, MYTHS AND SAD REALITIES A FRAMEWORK FOR INFORMATION SECURITY
  • 8. SECURITY • IT HAS MANY DEFINITIONS • IN REALITY IT IS A SENSE OF SECURITY • KEY TERMS: THREAT, EXPOSITION, VULNERABILITY COPING, RISK • CAT AND MOUSE GAME • THERE ARE MANY STRATEGIES • DEFENSE IN-DEPTH
  • 12. “ ” THINGS TO DO IF YOU WANT TO GET HACKED DON’T DO THEM, PLEASE
  • 14. WE ARE STILL NOT LEARNING
  • 15. REPEAT YOUR PASSWORDS • Facebook • Twitter • Gmail • Youtube • eBay • PayPal • BPPR • Yahoo • Instagram • Pinterest • Amazon • Netflix • Microsoft • Spotify • Pandora • Dropbox • OneDrive • SmartPhone • iCloud • GoDaddy • Linkedin • IMDB • Wikipedia • Muchas más
  • 16. DON’T USE MULTI FACTOR AUTHENTICATION • AUTENTICACIÓN • ALGO QUE SABES • ALGO QUE TIENES • ALGO QUE ERES • EN QUE LUGAR ESTAS • DISPONIBLE COMÚNMENTE • AUTORIZACIÓN
  • 19. DON’T ENCRYPT YOUR DATA • FTP • Telnet • Simple Mail Transfer Protocol (SMTP) • HTTP • Post Office Protocol 3 (POP3) • Internet Message Access Protocol (IMAPv4) • Network Basic Input/OutputSystem (NetBIOS), • Simple Network Management Protocol (SNMP)
  • 20. DON’T USE ANTI-MALWARE • Any system can be vulnerable to infection • The attacker uses naiveness as weapon • There are many effective tools Before After
  • 21. DO NOT PATCH YOUR MACHINE • ERVERY HUMAN MADE SOFTWARE HAS FLAWS • THIS APPLIES TO OS, FIRMWARE, DRIVERS AND SOFTWARE • BE AWARE – WINDOWS UPDATE DOES NOT PATCH THIRD PARTY SOFTWARE
  • 22. DOWNLOAD FREE STUFF • THE PIRATE BAY • KICKASSTORRENTS • TORRENTZ • EXTRATORRENT • YIFY-TORRENTS • EZTV • ISOHUNT.TO • LuckyWire • BearShare • Morpheus • LimeZilla • Nodezilla • Warez • Blubster
  • 23. DO NOT BE SUSPICIOUS • COMMON SENSE IS THE LEAST COMMON OF THE SENSES • IF ITS TOO GOOD TO BE TRUE, IT PROBABLY IS • IF A LIE IS WELL DEVELOPED, WE WILL NOT HESITATE TO CLICK THAT MALICIOUS LINK • POLL: ASK A RANDOM PERSON WHAT IS HIS WEAKEST PASSWORD IN EXCHANGE FOR A PEN • RECIPROCITY: IT’S NATURAL TO RETURN THE FAVOR. • PEOPLE LIKE TO BE PRAISED • PEOPLE ARE AFRAID OF POWER POSITIONS
  • 24. MODULE 1 - EXERCISES AND LABS • LAB 1 - CREATE A STANDARD USER ACCOUNT • LAB 2 - CONFIGURE MICROSOFT UPDATES • LAB 3 - CONFIGURE THIRD PARTY SOFTWARE UPDATES (SECUNIA PERSONAL SOFTWARE INSPECTOR) • LAB 4 - CONFIGURE PASSWORD MANAGEMENT (LASTPASS, KEEPASS)
  • 25. MODULE 2 - SECURING THE INFRASTRUCTURE APPRECIATING THE RISKS ASSOCIATED WITH BEING CONNECTED TO THE INTERNET
  • 26. WHAT DOES A HACKER DO
  • 28. ATTACK TYPES • PUBLIC INFORMATION - SEARCH ENGINES, SOCIAL NETWORKS AND EVEN JOB SEARCH • NAME RESOLUTION ATTACKS • SESSION HIJACKING, SPOOFING, MAN IN THE MIDDLE • DENIAL OF SERVICE • CROSS SITE SCRIPTING, COOKIE STEALING • VIRUS, TROJANS, KEYLOGGERS AND WORMS • VULNERABILITIES • COVERT TRACKS
  • 29. ATTACKER RESOURCES • LACK OF PLANNING AND PROTECTION PROVIDE THE BEST ATTACKING ENVIRONMENT • THERE ARE A LOT OF TOOLS FREELY AVAILABLE, OTHERS READY FOR SELL • THERE ARE REALLY BAD PEOPLE ON THE INTERNET, ON BUSINESS • DEEP WEB AND ANONYMIZERS – THEY EXIST AND ARE PRETTY EFFICIENT
  • 30. DEFENSE MECHANISMS • POLICIES AND DATA WIPING • UPDATES AND CLIENT SECURITY SOFTWARE • ENCRYPTION – SYMMETRIC VS ASYMMETRIC, ONE WAY HASHES, CERTIFICATES AND DISK ENCRYPTION • FIREWALLS, IDS, DMZ, HONEY POTS • SECURE NETWORK PROTOCOLS • SEGMENTATION • BACKUP, REPLICATION AND REDUNDANCY • SECURITY AWARENESS TRAINING • ASSESSMENTS – PENTEST AND VA
  • 31. MODULE 2 - EXERCISES AND LABS • LAB 5 - CONFIGURE FILE BACKUP (SYNCBACK, AZURE BACKUP) • LAB 6 - CONFIGURE ENCRYPTION AND SECURE CONTAINERS (TRUECRYPT/VERACRYPT/BITLOCKER) • LAB 7 – CALCULATING HASHES (HASHCALC) • LAB 8 – SCANNING FOR MALWARE (MALWAREBYTES) • LAB 9 – WIPE HARD DRIVE SPACE (CCLEANER, KILLDISK)
  • 32. CONCLUSION • THERE IS NO SUCH THING AS “COMPLETELY SECURE” • IF IT IS TOO GOOD TO BE TRUE, IT PROBABLY IS • A LAYERED PLAN WILL BE THE MOST EFFECTIVE • KEEP IT SIMPLE, WHEN POSSIBLE • MOST ATTACKS ARE EFFECTIVE DUE TO IGNORANCE • ONCE YOU RUN YOUR SECURITY PLAN, DO NOT LEAVE IT AS IT IS. VERIFY IT CONSTANTLY • MAKE DRILLS AND TESTS
  • 33. WRAP UP AND Q&A