Upload
yandex
View
13.851
Download
2
Tags:
Embed Size (px)
DESCRIPTION
Citation preview
Виктор Ашиккуратор практик
Информационная безопасность
Название раздела
Исторический экскурс
5 Julius Caesar
6 Caesar cipher
7 distribution of English letters
8 Tabula recta
9 One-time pad
ZDXWWW EJKAWO FECIFE WSNZIP PXPKIY URMZHI JZTLBC YLGDYJ HTSVTV RRYYEG EXNCGA GGQVRF FHZCIB EWLGGR BZXQDQ DGGIAK YHJYEQ TDLCQT HZBSIZ IRZDYS RBYJFZ AIRCWI UCVXTW YKPQMK CKHVEX VXYVCS WOGAAZ OUVVON GCNEVR LMBLYB SBDCDC PCGVJX QXAUIP PXZQIJ JIUWYH COVWMJ UZOJHL DWHPER UBSRUJ HGAAPR CRWVHI FRNTQW AJVWRT ACAKRD OZKIIB VIQGBK IJCWHF GTTSSE EXFIPJ KICASQ IOUQTP ZSGXGH YTYCTI BAZSTN JKMFXI RERYWE
General Douglas MacArthurUS WWII general & war hero (1880 - 1964)
There is no security on this earth, there is only opportunity.
Information Security
Cybersecurity
Кибербезопасность
CyberINsecurity
13
Cybercrime
• Hacker / Cracker• Black/Gray/White Hat
14
Vulnerability
• hardware• software• network• personnel• site• organizational
15
Spam
16
Cyberstalking
• stalking on the net for abuse
17
Malware–Virus–Trojan horse
•Dancing Pigs–Rootkit–Backdoor–Grayware / Adware
•Spyware•Dialer•Joke•Browser hijacking
18
Information warfare
• Cyberterrorism• Cyberwarfare
19
Denial-of-service
20
Exploit
• Zero-day
• Full Disclosure
• Shellcode
21
Eavesdropping
• Computer and network surveillance
• Fiber tapping
• Keystroke logging
• Man-in-the-middle attack
22
Social Engineering
• Hoax• Fraud• Phishing = phreaking + fishing
–phreaking = phone + freaking
23
Indirect Attack
• Proxy
• Tor
• Anonymizers
24
Backdoor
• Trojan horse
• Trapdoor
• Worms
• Cryptography
• Hardware
• Direct Access
Cybersecurity
26
Cybersecurity (1)
• Authentication• Authorization / Access Controls
–ACL–Mandatory Access Control–Capability
27
Cybersecurity (2)
• Chain of trust• Cryptography• Firewalls• Antivirus• Application whitelisting / blacklisting
28
Cybersecurity (3)
• Backups• Encryption
–Simmetric–Public key / certificates
• IDS/IPS/Honeypots• Social Engineering Awareness• End-point protection
29
Cybersecurity (4)
• Penetration testing• Proactive protection• Web security
30
Jobs
• Security Analyst• Security Engineer• Security Architect• Security Administrator• Chief Information Security Officer• Security Consultant/Expert
Спасибо