1 / 9

March 2011 attack against RSA

By: K Brenner IST522 Spring 2013. March 2011 attack against RSA . SOUND ENABLED. AUTO RUN PRESENTATION. About RSA Token . RSA Algorithm. Thanks for posting this video on BB, Jemakai Blyden . N = P x Q. Social Engineering Phishing Attack.

clark
Télécharger la présentation

March 2011 attack against RSA

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. By: K Brenner IST522 Spring 2013 March 2011attack against RSA SOUND ENABLED AUTO RUN PRESENTATION

  2. About RSA Token

  3. RSA Algorithm Thanks for posting this video on BB, JemakaiBlyden. N = P x Q

  4. Social Engineering Phishing Attack Low Level Intrusion Manifested to Higher Value Targets. Need for Server Segmentation Access Control by Least Privileged Source: http://upload.wikimedia.org/wikipedia/en/1/12/Sample-network-diagram.png

  5. Lessens Learned - Solutions WE’RE RSA AND WE GOT SCHOOLED!

  6. Lessens Learned – Better Secured Network Diagram Proposed Network Diagram (Users Outside)VPN Connection Firewall & Radius servers (Users Inside) Denial Network with routers and switches DMZ Web servers Application Servers Radius Servers Active Directories

  7. Regulations http://en.wikipedia.org/wiki/Cyber_Intelligence_Sharing_and_Protection_Act CISPA Status: Bill Delayed in Senate

  8. Regulations Uniform Breach Disclosure Act

  9. Works Cited IST 522 Class Notes. (2013, Spring). Retrieved from https://bbgroupa.syr.edu Blog. (n.d.). Retrieved Feb. 15, 2013, from Berkman Center for Internet & Society at Harvard University: http://cyber.law.harvard.edu/cybersecurity/Main_Page Coviello, A. (2011). RSA Conference Europe 2011. Retrieved Feb. 15, 2013, from www.emc.com/rsa: http://www.emc.com/collateral/corporation/coviello-rsac-europe-2011-keynote.pdf Flaniga, K. (2012, November 27). Syracuse University G.E.T. Speaker Series. Vacca, J. (2009). Computer and Information Security Handbook. Boston: Morgan Kaufmann.

More Related