Académique Documents
Professionnel Documents
Culture Documents
Course
Part of subject
ITE516: Hacking Countermeasures
Part of the
Master of Information Systems
Security
Master of Management (IT)
#StopCyberCrime
#S
top
Hacking Countermeasures
WEEK 1
Erdal Ozkaya
Erdal.Ozkaya@itmasters.edu.au
eozkaya@csu.edu.au
www.YourMCT.com
Cy
be
rC
rim
University Electives
(choose 1):
ITC514 Network and Security
Administration
ITC596 IT Risk Management
Source: DEET
504
377
338
315
257
200
182
: Erdal.Ozkaya@itmasters.edu.au
Blog
: www.ErdalOzkaya.com
Facebook : www.Facebook.com\YourMCT
Twitter
: www.twitter.com\Erdal_Ozkaya
LinkedIn : au.linkedin.com/pub/erdal-ozkaya/11/384/844/
Windows Store: Search: Erdal Ozkaya
Windows Phone app:
http://www.windowsphone.com/en-us/store/app/erdal-ozkaya/89dafdf6-61c0-493b-b51a-c556e4f5987d
Android App
https://play.google.com/store/apps/details?id=com.appypie.appypie9d090adb2c30
Who am I ?
Master of Information Security, Bachelor of Science in Information
Technology (B.I.T.), MVP, Microsoft Certified Trainer, ISO27001 Consultant,
Certified Ethical Hacker (CEH), Certified Ethical Instructor, is an educator at
Charles Sturt University.
I am also completing my Doctor of Philosophy (Ph.D.) in IT security and
working for KEMP Technologies as Regional Director.
I am a speaker, proctor for hands-on labs, and technical expert in
worldwide conferences such as TechEd, Hacker Halted, Microsoft
Management Summit, trade shows and in webcasts for Microsoft and ECCouncil. Erdal has also developed and consulted on Microsoft Official Exams
and Courses. You can visit his blog for more information
www.erdalozkaya.com
#StopCyberCrime
https://learn.itmasters.edu.au
Hacking Countermeasures
Module 1:
Introduction toHacking Countermeasures
Lets
START ;)
Warning!
Bankin
g
Small
Online
Business
Small
Online
Business
Small
Online
Business
Small
Online
Business
Attackers steal
~75%
of from
users
passwords
Attackers
smallthe
online
use
same
know this
businesses
password
and
useexploit
the same
and
on
everytosite
password
the
(Robert
Siciliano
access
more
Security
Researcher - McAfee)
weakness
interesting
accounts
HEADLINES
Cyberspace changes
the fog of war
Politics.co.uk [2013]
Malware burrows
deep into computer
BIOS to escape AV
Forget carjacking,
soon it will be
carhacking
Cyberattacks on the
rise against US
corporations
New York Times [2013]
Universities face a
rising barrage of
cyberattacks
Ars Technica [2013]
Espionage malware
infects rafts of
governments,
industries around
the world
Ars Technica [2013]
TODAY
Not every
network
administrator
is a security
expert
But, all
network
administrato
rs must
understand
the basics
Follow the
Key
Principals
to secure
your
network(s)
Conseque
nce
#StopCyberCrime
Ris
k
Golden Rules
Asset
Identification of Assets
A possible classification
Hardware
Software
#StopCyber
Crime
Site
Org. Structure
Personnel
Threat
Potential cause of an unwanted
incident, which may result in harm
to a system or organization
#StopCyberCrime
Crash
Vulnerability
Weakness of an asset or group of assets
that can be exploited by one or more
threats
Locked
Information Security
Is the protection of
information from a wide
range of threats, in
order to ensure
business continuity,
minimize business risk,
and maximize return on
investment and
business opportunities.
Confidentiality
The property that information is not
made available or disclosed to
unauthorized individuals, entities,
or processes
Confidential
Integrity
The property of safeguarding the
accuracy and completeness of
assets
Confidential
Availability
The property of being accessible
and usable upon demand by an
authorized entity
Data
Security Principles
Security
Granting
by Design,
the
Least
Default
Privilege
Deployment
Required
Protecting,
Defending
Detecting
Each
Network
andand
Responding
Layer
Reducing
Avoiding
the
Assumptions
Attack
Surface
Understandin
g your
enemy!
Keep In Mind!
Knowing Yourself
Accurately assess your own skills.
Possess detailed documentation of your
network.
Understand the level of organizational
support you receive.
Hackers Beware
Understanding External Attackers
Novice Attackers
Intermediate Attackers
Advanced Attackers
Module 2
Footprinting and Reconnaissance
Phases of Hackers
Reconnaissa
nce
Clearing
Tracks
Maintaining
Access
Scanning
Gaining
Access
Reconnaissance
Scanning Types
Gaining Access
Attack occurs when the hacker moves from simply
probing the network to actually attacking it.
After hacker gained access, he begins to move
from system to system, spreading his damage
as progresses.
Comes down to skill level, amount of access
achieves, network architecture, and configuration
of the victim's network.
Maintaining Access
Clearing Tracks
Refer to activates carried out by an
attacker to hide the misdeeds
Reasons Inc. the need for prolonged stay,
continued use of resource, remove
evidence of hacking
Next Week:
Module 3: Scanning Networks
Module 4: Enumeration
Demo: U w1ll 0w3n T3hm 500n