SlideShare a Scribd company logo
Introduction
Master Class 7
Internet Security
Josep Bardallo
2
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
Internet Security: Definitions
Internet security is a branch of computer
security specifically related to the
Internet, involving Web Server security
but also network security on a more
general level as it applies to other
applications or operating systems on a
whole. Also called Cybersecurity.
Its objective is to establish rules and
measures to use against attacks over the
Internet.
3
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
Internet Security: Definitions
From Internet Security Glossary, Version 2 (rfc4949)
Security is about protect resources
4
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
Internet Security: Definitions
Secure Web Services is about secure CIA:
From NIST: Guide to Secure Web Services (SP800-95)
5
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
Internet Security: Definitions
Threat, attack and Vulnerability:
From CISSP Guide to Security Essentials
6
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
Internet Security: Evolution
• From Information Security to
Information Assurance (process of
continuous Analysis and Risk
Management
• Information assurance (IA) is the
practice of assuring information
and managing risks related to the
use, processing, storage, and
transmission of information or
data and the systems and
processes used for those
purposes. Information assurance
includes protection of the
integrity, availability,
authenticity, non-repudiation and
confidentiality of user data. It
uses physical, technical and
administrative controls to
accomplish these tasks
7
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
Internet Security Threats
Main Cybersecurity Threats
•Threats against information
• Spy
• Information Theft
• Identity Theft
• Fraud
• APT (advanced Persistent threats)
•Threats against infrastructure
• Critical Infrastructures attacks
• Networks and systems attacks
• Industrial systems attacks
• Malware infection
• Third party attacks
8
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
Internet Security Threats: 2012 Real data
9
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
Attack types
 From States
 From private entities
 Terrorism, political or ideological attacks
 Hacktivism: Professional Hacking
 Low profile attack
 Insiders attacks
10
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
State promoted Attacks
 Estonia 2007
 Russia to Georgia (2008) before terrestrial
invasion
 Israel/USA to Iran with Stuxnet
 USA classified networks from Chinese hackers
11
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
Professional Hacking: DDoS, trojan
 DDoS http://www.youtube.com/watch?v=c9MuuW0HfS
12
NetworkingServices&infr.//MasterinICTStrategicManagement
Professional Hacking: Trojan
13 / 11 / 2012Josep Bardallo
13
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
Professional Hacking: Socks bot
14
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
Professional Hacking: Spam service
15
NetworkingServices&infr.//MasterinICTStrategicManagement
Professional Hacking: Botnet
13 / 11 / 2012Josep Bardallo
16
NetworkingServices&infr.//MasterinICTStrategicManagement
Professional Hacking: Zeus Botnet
13 / 11 / 2012Josep Bardallo
17
NetworkingServices&infr.//MasterinICTStrategicManagement
Professional Hacking: Any kind of hacking
13 / 11 / 2012Josep Bardallo
18
NetworkingServices&infr.//MasterinICTStrategicManagement
Professional Hacking: Value of Hacked PC
13 / 11 / 2012Josep Bardallo
19
NetworkingServices&infr.//MasterinICTStrategicManagement
Professional Hacking: Top attack method by vertical
13 / 11 / 2012Josep Bardallo
20
NetworkingServices&infr.//MasterinICTStrategicManagement
Low profile attacks: More easy
13 / 11 / 2012Josep Bardallo
http://builtwith.com/  Easy to obtain info from any web
21
NetworkingServices&infr.//MasterinICTStrategicManagement
Low profile attacks: More easy. Steps
13 / 11 / 2012Josep Bardallo
http://www.t1shopper.com/tools/port-scan//  Easy to open ports
22
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
Data Breach's in 2012
 Global Payments (1.5 million records)
 Yahoo! (450k passwords)
 Wyndham Hotels (600k credit cards)
 eHarmony (1.5 millions passwords)
 Linkedin (6.5 millions passwords)
 Zappos (24 millions records)
 Gamigo (3 millions records)
 Texas Attorney General’s Office (6.6 million recors)
Average insurance cost per databreach: $3.7M
23
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
Malware
 31,6 Worldwide PC infected by malware
 24% infected by a Trojan (16% in Spain)
24
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
New attacks
25
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
Today Threats
26
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
Defense technologies ?
27
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
Internet Security Defense Technologies
28
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
Internet Security Defense Technologies
29
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
Internet Security Defense Technologies
30
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
Internet Security Defense Technologies
31
NetworkingServices&infr.//MasterinICTStrategicManagement
13 / 11 / 2012Josep Bardallo
Bibliography
 http://www.ietf.org/rfc/rfc2828.txt
 http://tools.ietf.org/html/rfc4949
 http://www.itu.int/rec/T-REC-X.800-199103-I/e
 http://csrc.nist.gov/publications/nistpubs/800-95/SP800-95.pdf
 http://www.ismsforum.es/ficheros/descargas/informe-scsi1348666221.pdf
 http://www.t1shopper.com/tools/port-scan/
 http://builtwith.com/
 http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-russian-
underground-101.pdf
 http://www.businessinsurance.com/article/20121009/NEWS07/121009907?template=smartphoneart
 http://www.netdiligence.com/files/CyberClaimsStudy-2012sh.pdf
 http://pandalabs.pandasecurity.com/es/principales-amenazas-para-tu-ordenador-troyanos-infografia/
 http://www.cloudtweaks.com/2012/10/cloud-infographic-safeguarding-the-internet/
 http://www.akamai.com/html/technology/dataviz1.html
 https://www.bit9.com/cyber-security/graphic.php
 http://www.reg8.net/users/0012/expo2011/gartners_hype_cycle_special__215667.pdf

More Related Content

PPT
M8 privacy & regulatory in internet
PPTX
InfraGard Webinar October 2015 102815
PDF
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
PPTX
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
PDF
SecureMAG Vol 3
PPTX
General Version 8 Jul 09
PPTX
Cyberthreats: causes, consequences, prevention
PDF
Data Masking: Testing with Near-real Data
M8 privacy & regulatory in internet
InfraGard Webinar October 2015 102815
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
SecureMAG Vol 3
General Version 8 Jul 09
Cyberthreats: causes, consequences, prevention
Data Masking: Testing with Near-real Data

What's hot (19)

PDF
SecureMAG Volume 6 - 2014
PPTX
Mobile Forensics and Cybersecurity
PDF
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
PDF
FIDO, Federation & Facebook Social login
PDF
Introduction to FIDO Alliance
PDF
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
PDF
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
PPTX
OpenChain Third Monday Work Team Call Agenda 2020-02-17
PPTX
Iot cyber security
PDF
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar
PPTX
Blockchain Defined Perimeter for Cloud Security
PDF
Odoo iot box integration
PDF
Drawing the Line Correctly: Enough Security, Everywhere
PDF
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
PPTX
Global Regulatory Landscape for Strong Authentication
PPTX
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
PPTX
Privacy and video surveillance: Advanced technology and best practices protec...
PPTX
Identity Live Sydney 2017 - Daniel Raskin
PDF
Cert Overview
SecureMAG Volume 6 - 2014
Mobile Forensics and Cybersecurity
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
FIDO, Federation & Facebook Social login
Introduction to FIDO Alliance
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
OpenChain Third Monday Work Team Call Agenda 2020-02-17
Iot cyber security
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar
Blockchain Defined Perimeter for Cloud Security
Odoo iot box integration
Drawing the Line Correctly: Enough Security, Everywhere
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Global Regulatory Landscape for Strong Authentication
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Privacy and video surveillance: Advanced technology and best practices protec...
Identity Live Sydney 2017 - Daniel Raskin
Cert Overview
Ad

Viewers also liked (9)

PPTX
PPT
M6 cloud computing
DOC
Am visio's and table
PPT
S4 public or private datacenter
PPTX
Securima ti ca 2013 - seguridad en la nube
PDF
hdsmithss
PDF
2020 Social Workshop on Social Media for Non-Pofits
PDF
Social Media in companies
PPTX
Bua 235 teamwork
M6 cloud computing
Am visio's and table
S4 public or private datacenter
Securima ti ca 2013 - seguridad en la nube
hdsmithss
2020 Social Workshop on Social Media for Non-Pofits
Social Media in companies
Bua 235 teamwork
Ad

Similar to M7 internet security (20)

PPTX
It security the condensed version
PPTX
Digital Defense for Activists (and the rest of us)
PPTX
Implementing security for your library | PLAN Tech Day Conference
PPT
Module0&1 intro-foundations-b
PDF
20101012 isa larry_clinton
PDF
The Threat Landscape & Network Security Measures
PPT
The need for security
PDF
INFORMATION ASSURANCE AND SECURITY 1.pdf
PPTX
Emerging Threats to Infrastructure
PPTX
CYBER SECURITY PPT.pptxhshhshshdgddggdgddgdg
PPTX
chapitre 1 introduction to ethical hakcing.pptx
PPTX
Cyber Security
PPTX
c13 Security and Ethics(1)(1)(1).pptsasdax
PPTX
Management Information Systems ( Security and Control.pptx
PDF
Top Security Trends for 2013
PDF
Top Security Threats to Look Out for in 2023
PPTX
Cyber security
PDF
A Guide to Internet Security For Businesses- Business.com
PPTX
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
PPTX
CyberSecurity Threats in the Digital Age(1).pptx
It security the condensed version
Digital Defense for Activists (and the rest of us)
Implementing security for your library | PLAN Tech Day Conference
Module0&1 intro-foundations-b
20101012 isa larry_clinton
The Threat Landscape & Network Security Measures
The need for security
INFORMATION ASSURANCE AND SECURITY 1.pdf
Emerging Threats to Infrastructure
CYBER SECURITY PPT.pptxhshhshshdgddggdgddgdg
chapitre 1 introduction to ethical hakcing.pptx
Cyber Security
c13 Security and Ethics(1)(1)(1).pptsasdax
Management Information Systems ( Security and Control.pptx
Top Security Trends for 2013
Top Security Threats to Look Out for in 2023
Cyber security
A Guide to Internet Security For Businesses- Business.com
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
CyberSecurity Threats in the Digital Age(1).pptx

More from Josep Bardallo (17)

PDF
DNIe como acceso universal en entornos multiplataforma
PPTX
Svt cloud security services - Catalogo de Servicios
PPT
M10 service management
PPT
M9 cloud & open source
PPT
M4 internet systems & applications I
PPT
M5 internet systems & applications ii
PPT
M1 network types & internet
PPT
S6 cloud hype cycle
PPT
S5 email dying
PPT
S3 internet business with user data
PPT
S1 internet, secure place for business
PPTX
SVT CloudJacket Service
PPTX
SVT. innovacion y crecimiento con Cloud 2013
PPT
Ahorro De Costes Con Esso. Best Practices
PDF
PPTX
ITIL v3 Problem Management
PPSX
ITIL - IAM (Access Management)
DNIe como acceso universal en entornos multiplataforma
Svt cloud security services - Catalogo de Servicios
M10 service management
M9 cloud & open source
M4 internet systems & applications I
M5 internet systems & applications ii
M1 network types & internet
S6 cloud hype cycle
S5 email dying
S3 internet business with user data
S1 internet, secure place for business
SVT CloudJacket Service
SVT. innovacion y crecimiento con Cloud 2013
Ahorro De Costes Con Esso. Best Practices
ITIL v3 Problem Management
ITIL - IAM (Access Management)

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
A Presentation on Artificial Intelligence
PDF
Empathic Computing: Creating Shared Understanding
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPT
Teaching material agriculture food technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Machine learning based COVID-19 study performance prediction
PDF
KodekX | Application Modernization Development
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
cuic standard and advanced reporting.pdf
MYSQL Presentation for SQL database connectivity
20250228 LYD VKU AI Blended-Learning.pptx
Network Security Unit 5.pdf for BCA BBA.
A Presentation on Artificial Intelligence
Empathic Computing: Creating Shared Understanding
Diabetes mellitus diagnosis method based random forest with bat algorithm
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Spectral efficient network and resource selection model in 5G networks
Reach Out and Touch Someone: Haptics and Empathic Computing
Teaching material agriculture food technology
Encapsulation_ Review paper, used for researhc scholars
Machine learning based COVID-19 study performance prediction
KodekX | Application Modernization Development
The Rise and Fall of 3GPP – Time for a Sabbatical?
Per capita expenditure prediction using model stacking based on satellite ima...
Building Integrated photovoltaic BIPV_UPV.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
cuic standard and advanced reporting.pdf

M7 internet security