The Security Game By: Erik A. Espinoza
Download
Report
Transcript The Security Game By: Erik A. Espinoza
The Security Game
By: Erik A. Espinoza
[email protected]
The Objective
Access Control
Trust
The Problem
People need to get work done!
The Players
People
Users
Crackers
White Hats – The
Good Guys
Black Hats – The
Bad Guys
Script Kiddies
Grey Hats –
Characteristics of
both
Computers
Trojans
Viruses
Worms
Malware
(spyware/adware)
Attack Vectors
Automated Attacks – Requires a
machine to be listening for
penetration. Not necessary for
Denial of Service attack.
Directed Attacks
Usually takes advantage of
misconfigured access control
Buffer overflows/underflows
Tricking Users
Risk Assessment
Budgetary Constraints
Usability Tradeoffs
Too Draconian to be Practical
Weapons
Acceptable Use Policy
Strict “Deny All” default policy
Disable unused functionality
Security Audits
Configuration Versioning & Control
Patching
Power Ups
Classes
Books
Mailing Lists
Tech Friends
Tech News