39

Building securable infrastructures

Embed Size (px)

Citation preview

1.

(YOUR MAIN PAY CHECK COMES FROM SECURITY WORK?)

2.

3.

4.

HTTP://WWW.TED.COM/TALKS/BRUCE_SCHNEIER.HTML

HTTP://WWW.YOUTUBE.COM/WATCH?V=NMV6MEXCKQO

60 BILLION DOLLARS

Cool Jobs Lame Jobs

PEN TESTER PATCH MGMT

RUN IDS/IPS, or HONEY POTS LOG REVIEW

INCIDENT RESPONSE BACKUPS

QSA (kinda cool???) AUDITOR

HTTP://WWW.THEREGISTER.CO.UK/2011/09/28/WINDOW_MALWARE_INFECTION_EXPOSED/

HTTP://SEARCHSECURITY.TECHTARGET.COM/DEFINITION/ATTACK-VECTOR

DATA

True story

<3

Classification Description

Sensitive Data that is to have the most limited access and requires

a high degree of integrity. Most damage to the

organization should it be disclosed

Confidential Might cause damage if disclosed

Private Might not do the company damage but must be keep

private for other reasons

Proprietary Disclosed outside the company on a limited basis

Public Public data least sensitive

HTTP://CISCOBASICS.BLOGSPOT.COM/2010/04/TIME-BASED-ACCESS-CONTROL-LISTS.HTML

HTTP://TECHNET.MICROSOFT.COM/EN-US/LIBRARY/CC781861(V=WS.10).ASPX

CHEAP FREE

HTTP://WWW.TECHOTOPIA.COM/INDEX.PHP/AUDITING_WINDOWS_SERVER_2008_FILE_AND_FOLDER_ACCESS

HTTP://WWW.WINDOWSECURITY.COM/ARTICLES-TUTORIALS/AUTHENTICATION_AND_ENCRYPTION/ATTACHING-TASKS-EVENT-

VIEWER-LOGS-EVENTS.HTML

•HTTP://OVERWORKEDADMIN.COM/

•HTTP://WINSRVTUTS.COM/2011/10/99-PERCENT-MORE-SECURE/

•HTTP://WINSRVTUTS.COM/2011/12/CONFIGURE-WINDOWS-FOR-SYSLOG-USING-SNARE/

•HTTP://WINSRVTUTS.COM/2012/08/CONFIGURE-FAILED-LOGIN-WARNINGS-WITH-WINDOWS-POWERSHELL/