San Francisco Chapter San Francisco Chapter
Presented by: AAA Northern California, Nevada & Utah Derek Koopowitz – IT Audit Manager Norm Gutierrez – IT Audit Specialist
San Francisco Chapter San Francisco Chapter Presented by: AAA - - PowerPoint PPT Presentation
San Francisco Chapter San Francisco Chapter Presented by: AAA Northern California, Nevada & Utah Derek Koopowitz IT Audit Manager Norm Gutierrez IT Audit Specialist Infrastructure Vulnerability Assessment Infrastructure
San Francisco Chapter San Francisco Chapter
Presented by: AAA Northern California, Nevada & Utah Derek Koopowitz – IT Audit Manager Norm Gutierrez – IT Audit Specialist
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
Impartial assessment - should not be done by IT
Customer consent must be obtained Define the scope – general or specific depending on
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
Fields VER - Version HLEN – Header Length Service Type Length ID, Flags, and Flags Offset TTL – Time To Live Protocol Protocol Header Checksum Source IP Address Source IP Address Destination IP Address Destination IP Address IP Options Padding Data
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
When a hub receives a packet on one port, the hub sends out a copy of that packet on all ports except on the one where the hub received the packet On a switch, after the host B MAC address is learned, unicast traffic from A to B is only forwarded to the B port. Therefore, a sniffer would not be able to see this traffic.
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
IP fragment ID TCP sequence number Usually from compromised internal systems
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
SNMP Vulnerabilities
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
Routing Protocol Vulnerabilities
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
Based on the destination MAC address
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
Analyze the security of a web server
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
A database management system (DBMS) is the
An RDBMS is a DBMS which manages a relational
A relational database stores data in tables Tables are organized into columns, and each column
The data for a single “instance” of a table is stored as
San Francisco Chapter San Francisco Chapter
For example, the Customer table would have columns
Tables typically have keys, one or more columns that
To improve access time to a data table you define an
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter
What systems do we have?
Identify vulnerabilities and prioritize based on risk
Fixing the vulnerabilities
Evaluate the end result
San Francisco Chapter San Francisco Chapter
San Francisco Chapter San Francisco Chapter