Содержание
- 3. After completing this learning unit, you will have an understanding of: The impact security has, the
- 4. Lesson 1: Security, attacks and threats Introduction Lesson 2: Securing the environment Basics Help protect credentials
- 5. Security Threat Landscape Lesson 1: Security, attacks and threats Section: Introduction
- 6. Increasing incidents Multiple motivations Bigger risk Security is a Top Priority for IT
- 7. Evolution of Attacks
- 8. Source: McKinsey, Ponemon Institute, Verizon “Cyber security is a CEO issue.” -McKinsey
- 10. Corporate secrets are public knowledge; potential loss of competitive advantage
- 11. Different Attack Vectors
- 12. Attack Timeline 24–48 hours Mean dwell time 150+ days (varies by industry) First host compromised Domain
- 13. Malicious Attachment Execution Browser or Doc Exploit Execution Stolen Credential Use Internet Service Compromise Kernel-mode Malware
- 14. Example Attack Scenario Domain controllers Directory database(s) Persist presence
- 15. Schoolboard 50 Employees 300 Students Public funds Construction 4,000 Employees $30 millions YR Private funds Energy
- 16. Schoolboard, from the Attacker’s Perspective June the 3rd Email sent to [email protected] with a PPTX attached
- 17. Schoolboard, from the Attacker’s Perspective June the 3rd + 6 minutes The malware is extracting credentials
- 18. Schoolboard, from the Attacker’s Perspective June the 4th The attacker takes remote control of one of
- 19. Schoolboard, from the Attacker’s Perspective August the 1st The attacker fires its fake employees and delete
- 20. Schoolboard, from the Other Side June the 4th One helpdesk user reports receiving spam to its
- 21. Schoolboard, from the Other Side August the 15th The bank calls the accountant to inform him
- 22. Spam/phishing detection Phishing awareness training Suspicious activities reporting process (Security Incident Management) No separation of privileged
- 23. Construction 4,000 Employees $30 millions YR Private funds
- 24. Construction, from the Attacker’s Perspective January the 3rd A mobile server room disappears from a construction
- 25. Construction, from the Attacker’s Perspective January the 10th VPN connection made on behalf of CONSTRUCTION\Joe January
- 26. Construction, from the Attacker’s Perspective March the 1st Some identities are sold The attacker prepares the
- 27. Construction, from the Attacker’s Perspective April the 14th After 12 days of work without IT data,
- 28. Construction, from the Other Side January the 6th A construction site is back to work after
- 29. Construction, from the Other Side March the 15th DBA are complaining about backups failing March the
- 30. Physical protection Procedures in case of theft Inefficient monitoring What went wrong?
- 31. Energy 95,000 Employees $5 billions YR Private funds Shareholders Networks Corporate network Closed network in production
- 32. Energy, from the Attacker’s Perspective March the 3rd The attacker got a valid account from a
- 33. Energy, from the Attacker’s Perspective April the 5th Giga bytes of data are extracted The attacker
- 34. Energy, from the Attacker’s Perspective May the 7th The production is down in one critical site
- 35. Energy, from the Other Side April the 4th AV team clean up malwares found on several
- 36. Energy, from the Other Side May the 8th Ransomware on many systems June the 1st The
- 37. More than 200 days (varies by industry) Typical Attack Timeline & Observations Attack Sophistication Attack operators
- 38. Cost of an attack The cost of these attacks to the global economy, and to an
- 39. Security Threat Landscape Lesson 2: Securing the environment Section: Basics
- 40. Hard Lessons…
- 41. Windows Server Security Posture
- 42. Secure the OS Managed privileged identities Secure virtualization What do we need to secure and how?
- 43. Fundamentals of Information Security
- 44. Information Security Concepts and Fundamental Principles Confidentiality Integrity Availability The CIA Triad
- 45. The three pillars Fundamentals of Information Security
- 46. References for Canada • Annex 1 - Departmental IT Security Risk Management Activities: IT Security Risk
- 47. Constraints Fundamentals of Information Security
- 48. You want to make it… Harder Longer More noisy … for the attacker You want to
- 49. Defense-in-Depth Modeling Layers of Defense: When talking about the various layers to protect, we want to
- 52. Strategic shift Defense-in-Depth Modeling From perimeter security … … to assumed breach Protect information Establish security
- 53. Risk Management
- 54. What is a vulnerability? A flaw or weakness in a system’s design, implementation, or operation and
- 55. Basic Security Principles Security decisions are risk management decisions Risk can never be reduced to zero
- 56. Basic Security Principles: How We Protect It Principle of Least Privilege (POLP) Access varies based on
- 57. The 10 Immutable Laws of Security Administration: Nobody believes that anything bad can happen to them,
- 58. The 10 Immutable Laws of Security Administration: If a bad guy can persuade you to run
- 59. Sample AD assets Domain Controllers Active Directory Backups Administrative Accounts and Groups Identities and attributes Group
- 60. Vulnerabilities A flaw or weakness in a system’s design, implementation, or operation and management that could
- 61. Vulnerabilities (continued) Hardware Outdated firmware Systems not physically secured Misconfigured systems Software Out-of-date antivirus software Missing
- 62. Vulnerabilities (continued) Communications Unencrypted network protocols Connections to multiple networks No filtering between network segments Human
- 63. Vulnerabilities (continued) Poorly written or secured scripts Weak admin accounts security Poorly secured AD objects Unnecessary
- 64. Security Threat Landscape Lesson 2: Securing the environment Section: Help protect credentials and privileged access
- 65. Challenges in Protecting Credentials Ben Mary Jake Admin Domain admin Typical administrator Capability Time Social engineering
- 66. Helping Protect Privileged Credentials Ben Mary Jake Admin Domain admin JEA and JIT administration Capability Time
- 67. Helping Protect Privileged Credentials Ben Mary Jake Admin Domain admin JEA and JIT administration Capability Time
- 68. Helping Protect Privileged Credentials Ben Mary Jake Admin Domain admin JEA and JIT administration Capability Time
- 69. Security Threat Landscape Lesson 2: Securing the environment Section: Help protect applications and data in any
- 70. Challenges Protecting the OS and Applications New exploits can attack the OS boot-path all the way
- 71. Helping Protect OS and Applications Device Guard Ensure that only permitted binaries can be executed from
- 72. Security Threat Landscape Lesson 2: Securing the environment Section: Help protect the virtualization fabric
- 73. Help Protect the Virtualization Fabric
- 74. Challenges Protecting Virtual Machines Any compromised or malicious fabric administrators can access guest virtual machines. Health
- 75. Helping Protect Virtual Machines Shielded Virtual Machines Use BitLocker to encrypt the disk and state of
- 76. Decryption keys: controlled by external system HYPER-V HOST 1 + KEY PROTECTION + HEALTH ATTESTATION HOST
- 77. Decryption keys: controlled by external system HYPER-V HOST 1 + KEY PROTECTION + HEALTH ATTESTATION HOST
- 78. Philip Moss Chief Product Officer Acuutech Shielded Virtual Machines remove a hosting obstacle and are a
- 79. Security Threat Landscape Lesson 2: Securing the environment Section: Protect with just enough OS
- 80. Challenges in Protecting New Apps Developers are protecting by making use of packaging and deployment tools
- 81. Windows Server 2016 Approach Hyper-V containers Provide hypervisor isolation for each container with no additional coding
- 82. Security Threat Landscape Lesson 2: Securing the environment Section: Windows Server 2016 security summary
- 83. Windows Server 2016 Security Summary
- 84. DO NOT REMOVE: this is a hidden slide for notes purposes
- 85. Question #1: What is the new security perimeter? Question #2: What are the four option we
- 87. Скачать презентацию




















































































Железобетонные и каменные устройства
Урок –лекция по литературному чтению«Пушкин- великий русский поэт»
Бескаркаская мебель
2020-2021 учебный год. Отчет по производственной практике
Тест по русскому языкутема «Имя прилагательное»
как работодателя Инна Кузьменко УЦ «Компаньон» www.2474141.ru
Геометрический смысл производной
Polical system of Great Britain
Интеграция Сирены-2.3 с международными системами резервирования
07.09
Австралийский Союз. Противоречие между законами Союза и Штатов
Сборка ПК
Организационная структура управления. Лекция 7
Невьянская Икона. Начало пути
Ассоциация российских экспедиторов Подготовила: Клеутина Светалана ДС_01
Современные школы семиотики
Успешные кейсы развития бизнеса с помощью интернета Константин Миска 24.11.2011. - презентация
08. Із чого все складається
Круглова Ирина Александровна Учитель изобразительного искусства высшей квалификационной категории Негосударственного образова
Процесс центробежного распыления электрода под воздействием плазменного потока инертного газа
Культура Древней Руси IX- XI вв
Типология стран мира. Формы правления и государственного устройства
Презентация на тему: Раскрасим корабль
Рудольф Арнхейм
Неопределенная форма глагола (задания)
Определение белков
Формирование информационно-коммуникационной компетентности субъектов образовательного процесса.
Художественный шрифт