Presentation is loading. Please wait.

Presentation is loading. Please wait.

SIM 302. Unprepared UninformedUnaware Untrained Unused.

Similar presentations


Presentation on theme: "SIM 302. Unprepared UninformedUnaware Untrained Unused."— Presentation transcript:

1 SIM 302

2

3

4

5

6

7

8

9 Unprepared UninformedUnaware Untrained Unused

10 Source: Dreamtime

11

12 DroidDream malware iPhone/Privacy

13

14

15

16

17 Gatherer/hunter Learn Communicate Socio interactivity Socio isolation Loss of information control

18

19

20

21

22 Virtual business services of all sorts, accounting, payroll, and even sales would come to a halt, as would many companies

23 $1.5 to $2 billion $80 to $120 million What does a stealth bomber cost? What does a stealth fighter cost? $1 to $2 million What does an cruise missile cost? $300 to $50,000 What does a cyber weapon cost?

24 Nuclear Weapons Facility Cyber Weapons Facility Where’s the Cyber Weapons Facility?

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40 Step 1 Reconnaissance Step 1 Reconnaissance Step 2 Initial intrusion into the network Step 2 Initial intrusion into the network Step 3 Establish a backdoor into the network Step 3 Establish a backdoor into the network Step 4 Obtain user credentials Step 4 Obtain user credentials Step 5 Install various utilities Step 5 Install various utilities Step 6 Privilege escalation /lateral movement /data exfiltration Step 6 Privilege escalation /lateral movement /data exfiltration Step 7 Maintain persistence Step 7 Maintain persistence

41

42

43

44

45

46

47

48

49

50 http://googleblog.blogspot.com/2010/01/new-approach-to-china.html

51 Thanks to Dreamtime

52

53 Thanks to BBC.co.uk

54

55 demo

56

57

58

59

60

61 Security Management Threat and Vulnerability Management, Monitoring and Response Edge Routers, Firewalls, Intrusion Detection, Vulnerability Scanning Network Perimeter Dual-factor Authorization, Intrusion Detection, Vulnerability Scanning Internal Network Access Control and Monitoring, Anti-Malware, Patch and Configuration Management Host Secure Engineering (SDL), Access Control and Monitoring, Anti-Malware Application Access Control and Monitoring, File/Data Integrity Data User Account Management, Training and Awareness, Screening Facility Physical Controls, Video Surveillance, Access Control Strategy: Employ a risk-based, multi-dimensional approach to safeguarding services and data

62

63 Required Slide Speakers, please list the Breakout Sessions, Interactive Discussions, Labs, Demo Stations and Certification Exam that relate to your session. Also indicate when they can find you staffing in the TLC.

64

65

66 www.microsoft.com/teched Sessions On-Demand & CommunityMicrosoft Certification & Training Resources Resources for IT ProfessionalsResources for Developers www.microsoft.com/learning http://microsoft.com/technet http://microsoft.com/msdn http://northamerica.msteched.com Connect. Share. Discuss.

67

68 Scan the Tag to evaluate this session now on myTechEd Mobile

69


Download ppt "SIM 302. Unprepared UninformedUnaware Untrained Unused."

Similar presentations


Ads by Google