1 / 42

Gap in Information Security The GIS Paradox

Gap in Information Security The GIS Paradox. Jay Bavisi President EC-Council. Partneri. Medijski pokrovitelji. FYI 285 MILLION RECORDS WERE COMPROMISED IN 2008. Image Courtsey:www.lloyds.com. Source: 2009 Data Breach Investigations Report by Verizon.

graceland
Télécharger la présentation

Gap in Information Security The GIS Paradox

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Gap in Information SecurityThe GIS Paradox Jay Bavisi President EC-Council

  2. Partneri Medijski pokrovitelji

  3. FYI 285 MILLION RECORDS WERE COMPROMISED IN 2008 Image Courtsey:www.lloyds.com Source: 2009 Data Breach Investigations Report by Verizon

  4. The Computing Transformation

  5. Typical Enterprise Network Complex Indeed!

  6. Revisiting 2008 Sophos Security threat report, 2008

  7. Sophistication of the Underground

  8. Typical Threats to Security

  9. Common Threats & Methodologies

  10. Or so we thought. We are well-protected.

  11. 2009 Data Breach Investigation Report Source: 2009 Data Breach Investigations Report by Verizon

  12. Why are Security Mistakes Made?

  13. Defense Mechanism

  14. Breach Mechanism

  15. Examples of Virus Construction Kits

  16. Defense Mechanism

  17. Breach Mechanism Source: http://www.ccc.de/biometrie/

  18. Breach Mechanism Source: http://www.ccc.de/biometrie/

  19. Defense Mechanism

  20. Breach Mechanism Encryption:Screenshot Capture?

  21. Breach Mechanism Cracking Passwords

  22. Hardware keyloggers : KeyGhost

  23. Hardware keyloggers : KeyKatcher

  24. Firewalls Defense Mechanism

  25. Breach Mechanism

  26. Insider Attack

  27. Preventing Insider Threat Ana Belen Montes, who had been a Senior Intelligence Analyst for Defense Intelligence Agency, was convicted of spying for Cuba on October 16, 2002 and sentenced to 25 years in prison.

  28. Breach Mechanism

  29. Placing Backdoors Through Firewalls

  30. Physical Security Defense Mechanism

  31. Breach Mechanism

  32. Why are Security Mistakes Made?

  33. Typical Organization : Security Technologies Used So Who Manages these Technologies?

  34. Did you know? Humans are the weakest link of a security chain!

  35. Mistakes committed by Information Security Professionals

  36. “D-SHIP” Approach towards Enterprise Security Secure your Data/Application /Network Hack Your Data/Application /Network 2 3 Security 1 DR and BCP 5 4 Investigate (Forensics) Prosecute (Legal)

  37. Who is an Ethical Hacker? To Catch A Hacker, you have to think like one!

  38. You can reach me at jay@eccouncil.org

  39. Hvala.

More Related