информационная безопасность

Preview:

DESCRIPTION

 

Citation preview

Виктор Ашиккуратор практик

Информационная безопасность

Название раздела

Исторический экскурс

5 Julius Caesar

6 Caesar cipher

7 distribution of English letters

8 Tabula recta

9 One-time pad

ZDXWWW EJKAWO FECIFE WSNZIP PXPKIY URMZHI JZTLBC YLGDYJ HTSVTV RRYYEG EXNCGA GGQVRF FHZCIB EWLGGR BZXQDQ DGGIAK YHJYEQ TDLCQT HZBSIZ IRZDYS RBYJFZ AIRCWI UCVXTW YKPQMK CKHVEX VXYVCS WOGAAZ OUVVON GCNEVR LMBLYB SBDCDC PCGVJX QXAUIP PXZQIJ JIUWYH COVWMJ UZOJHL DWHPER UBSRUJ HGAAPR CRWVHI FRNTQW AJVWRT ACAKRD OZKIIB VIQGBK IJCWHF GTTSSE EXFIPJ KICASQ IOUQTP ZSGXGH YTYCTI BAZSTN JKMFXI RERYWE

General Douglas MacArthurUS WWII general & war hero (1880 - 1964)

There is no security on this earth, there is only opportunity.

Information Security

Cybersecurity

Кибербезопасность

CyberINsecurity

13

Cybercrime

• Hacker / Cracker• Black/Gray/White Hat

14

Vulnerability

• hardware• software• network• personnel• site• organizational

15

Spam

16

Cyberstalking

• stalking on the net for abuse

17

Malware–Virus–Trojan horse

•Dancing Pigs–Rootkit–Backdoor–Grayware / Adware

•Spyware•Dialer•Joke•Browser hijacking

18

Information warfare

• Cyberterrorism• Cyberwarfare

19

Denial-of-service

20

Exploit

• Zero-day

• Full Disclosure

• Shellcode

21

Eavesdropping

• Computer and network surveillance

• Fiber tapping

• Keystroke logging

• Man-in-the-middle attack

22

Social Engineering

• Hoax• Fraud• Phishing = phreaking + fishing

–phreaking = phone + freaking

23

Indirect Attack

• Proxy

• Tor

• Anonymizers

24

Backdoor

• Trojan horse

• Trapdoor

• Worms

• Cryptography

• Hardware

• Direct Access

Cybersecurity

26

Cybersecurity (1)

• Authentication• Authorization / Access Controls

–ACL–Mandatory Access Control–Capability

27

Cybersecurity (2)

• Chain of trust• Cryptography• Firewalls• Antivirus• Application whitelisting / blacklisting

28

Cybersecurity (3)

• Backups• Encryption

–Simmetric–Public key / certificates

• IDS/IPS/Honeypots• Social Engineering Awareness• End-point protection

29

Cybersecurity (4)

• Penetration testing• Proactive protection• Web security

30

Jobs

• Security Analyst• Security Engineer• Security Architect• Security Administrator• Chief Information Security Officer• Security Consultant/Expert

Спасибо

Recommended