August 15
Women in ICT and Newbie Night
Women in ICT and Newbie Night August 15 Introduction Statistics - - PowerPoint PPT Presentation
Women in ICT and Newbie Night August 15 Introduction Statistics Who here is from some form of social media? Who here is a developer? Cyber Security FM (Women in ICT and Newbie Night) August 15 Cyber Governance, Risk
August 15
Women in ICT and Newbie Night
Introduction…
August 15 Cyber Security FM (Women in ICT and Newbie Night)
August 15 Cyber Security FM (Women in ICT and Newbie Night)
Cyber Security can be difficult to define..
August 15 Cyber Security FM (Women in ICT and Newbie Night)
Integrity Auditability Confidentiality
August 15 Cyber Security FM (Women in ICT and Newbie Night)
Cyber risk - Think business risk, not IT
People Process Technology
device
Security Breach
Are we secure yet?
Firewall
August 15 Cyber Security FM (Women in ICT and Newbie Night)
Cyber Attack on US Military The attackers used a spear-phishing e- mail to penetrate the system and gain access to sensitive information. This attack was made possible by poor human performance. NSA Data Breach An American computer professional, former CIA employee, and former government contractor. He leaked classified information from the U.S. National Security Agency (NSA) in 2013 to reveal secrets about NSA surveillance programs.
August 15 Cyber Security FM (Women in ICT and Newbie Night)
Property Description Examples
Actor Person at the source of an attack with specific goal and motivation. Hackers Employees Third Parties Motive Deliberate or accidental To steal personal information Damage reputation Asset Assets which the threat actor intends to steal or affect in some way to achieve their goals. Sensitive data Mail server Staff member Outcome The effect of an attack. Disclosure of Information Service Disruption
Threat elements of a Cyber attack
Motive
August 15 Cyber Security FM (Women in ICT and Newbie Night)
Risk Actor Asset Risk Impact Mitigating Controls What is the business risk? Who performs the attack? What is the attacker targeting? What is the potential impact? What can we do to mitigate the risk? Data Breach – Company X is breached and sensitive information is stolen.
Sensitive data
Identifiable Data)
Information) Loss of confidential or sensitive data resulting in financial, reputation or compliance impact. People
for third party service provider Process
tapes Technology
Threat Scenario – Company X
Company X (Healthcare Service Provider) PII (Personally Identifiable Data), PHI (Personal Health Information) Personal information stored in backup tapes transferred to a bank safe Backup tapes stolen during transportation
Data Breach
August 15 Cyber Security FM (Women in ICT and Newbie Night)
Pentest
Try to break into things
Provide invalid input
August 15 Cyber Security FM (Women in ICT and Newbie Night)
Demo - SQLi
August 15 Cyber Security FM (Women in ICT and Newbie Night)
Demo - SQLi
Try using a single quote for a password:
August 15 Cyber Security FM (Women in ICT and Newbie Night)
Demo - SQLi
query expression 'username = 'admin' AND password = ''''. query expression 'username = 'admin' AND password = ''''. query expression 'username = 'admin' AND password = '1' OR '1'='1''. Huzzah !
August 15 Cyber Security FM (Women in ICT and Newbie Night)
“The Magic”
Carefully passed down through generations of pentesters
I will give you $10 if you enter this into every field for a week and nothing breaks.
August 15 Cyber Security FM (Women in ICT and Newbie Night)
Using “The Magic”
Proxy
In-browser
August 15 Cyber Security FM (Women in ICT and Newbie Night)
If you’re interested…
Wargames
Tools and techniques
August 15 Cyber Security FM (Women in ICT and Newbie Night)
Thank you!
August 15 Cyber Security FM (Women in ICT and Newbie Night)