420 likes | 518 Vues
Explore the importance of information security, common threats, breach mechanisms, defense strategies, and the role of ethical hackers in protecting data. Learn from experts about securing your enterprise against cyber threats. Contact: jay@eccouncil.org
E N D
Gap in Information SecurityThe GIS Paradox Jay Bavisi President EC-Council
Partneri Medijski pokrovitelji
FYI 285 MILLION RECORDS WERE COMPROMISED IN 2008 Image Courtsey:www.lloyds.com Source: 2009 Data Breach Investigations Report by Verizon
Typical Enterprise Network Complex Indeed!
Revisiting 2008 Sophos Security threat report, 2008
Or so we thought. We are well-protected.
2009 Data Breach Investigation Report Source: 2009 Data Breach Investigations Report by Verizon
Breach Mechanism Source: http://www.ccc.de/biometrie/
Breach Mechanism Source: http://www.ccc.de/biometrie/
Breach Mechanism Encryption:Screenshot Capture?
Breach Mechanism Cracking Passwords
Firewalls Defense Mechanism
Preventing Insider Threat Ana Belen Montes, who had been a Senior Intelligence Analyst for Defense Intelligence Agency, was convicted of spying for Cuba on October 16, 2002 and sentenced to 25 years in prison.
Physical Security Defense Mechanism
Typical Organization : Security Technologies Used So Who Manages these Technologies?
Did you know? Humans are the weakest link of a security chain!
“D-SHIP” Approach towards Enterprise Security Secure your Data/Application /Network Hack Your Data/Application /Network 2 3 Security 1 DR and BCP 5 4 Investigate (Forensics) Prosecute (Legal)
Who is an Ethical Hacker? To Catch A Hacker, you have to think like one!