Télécommunications

Cyber Security Introduction (Cyber Security Part 1)

Support Silicon Dojo at:
https://www.donorbox.org/etcg

Home

Cyber Security Introduction
Point of Cyber Security
Prevent Loss of Data
Prevent Down Time
Prevent Systems from Being Used Nefariously
Stay Compliant with Laws/ Regulations
Don’t Do Harm
If users can’t use systems because of security you fail
Your Environment
No environment looks like a college exam.
“Best Practices” don’t last 30 seconds in the real world
Focus on what you can fix NOW
Plan for the future
Building Trust
STOP… just stop… you are not as important as you think
Executives are juggling numerous priorities. Acting like an ass will not help your cause
You need to build peoples trust in you. They need to trust YOU not what you advise.
Office Politics IS PART OF YOUR JOB!!!!! !!!!! and a couple more !!
Cyber Security = Good Administration
Security should be built in to the infrastructure
Security is Layered
Any Single Layer Compromise Should Not Be a Killer
Zero Trust Environment
BYOD was the end of Trust
Remote workers
Convergence
Getting Decision Maker Buy In
Preventive Maintenance is a hard sell
Add Security to normal upgrades and purchases
CEO’s like “cool sh*t” – 100” LCD screens showing real time dashboards
Sell the “Sizzle” to get the “Steak”…
Visualizing the value of tech is hard, stupid gimmicks are not
Know who is actually in charge. Is it the CIO or the CFO?
Getting Employee Buy In
Training
Listening to Employees
Befriend Employees
Successful Attacks Require
A Vulnerability
A Vector to the Vulnerability
An Attack/ Event
Vulnerability or Feature?
You can’t hack a server that’s powered off.
You also can’t use the server
Limit the feature set of each server/ device
Instead of a single FTP, Web, SMTP, VPN server break them into individual systems.
Use virtualization
Use cheap hardware. Does your FTP server need a Xeon Processor?
Security is More Than Chinese Hackers
Security is a mentality not a product
Strategy should change with time.
A solution for one threat will prevent numerous other threats
Threat: Employee
Employees trying to game the system
Dumb Mistakes
Nefarious Actors
Threat: Natural Disaster
What happens in Flood/ Fire/ Earthquake?
Threat: Normal Crime
Crackheads don’t know what an Active Directory Server is….
Threat: Rats Nest
Don’t pull the wrong cable!
Threat: Stupid Problems
Backhoe through your fiber line
Unplugging Active Directory Server
SaaS single IP issues
Threat: Vendor Issues
Supply Chain Attacks
Facility Destruction
Vendor Hacked
Threat: Hackers
Actual Hackers are probably the least of your problems
By focusing on “hackers” you may miss much more pressing issues
Having a full Disaster Recovery System solves both the Flood AND Ransomeware problem
If your security prevents and administrator from doing something stupid it also will block “hackers”
Security Products
Support
Cost
Scalability
Reliability
TCO – Total Cost of Ownership
Interoperability
Disaster Recovery and Resiliency
Backups are not enough
Disaster Recovery is about having FUNCTIONALITY back ASAP.
High Availability
Failover
Hybrid Cloud

Views : 29135
cyber security

Source by Eli the Computer Guy

Mourad ELGORMA

Fondateur de summarynetworks, passionné des nouvelles technologies et des métiers de Réseautique , Master en réseaux et système de télécommunications. ,j’ai affaire à Pascal, Delphi, Java, MATLAB, php …Connaissance du protocole TCP / IP, des applications Ethernet, des WLAN …Planification, installation et dépannage de problèmes de réseau informatique……Installez, configurez et dépannez les périphériques Cisco IOS. Surveillez les performances du réseau et isolez les défaillances du réseau. VLANs, protocoles de routage (RIPv2, EIGRP, OSPF.)…..Manipuler des systèmes embarqués (matériel et logiciel ex: Beaglebone Black)…Linux (Ubuntu, kali, serveur Mandriva Fedora, …). Microsoft (Windows, Windows Server 2003). ……Paquet tracer, GNS3, VMware Workstation, Virtual Box, Filezilla (client / serveur), EasyPhp, serveur Wamp,Le système de gestion WORDPRESS………Installation des caméras de surveillance ( technologie hikvision DVR………..). ,

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *