SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
THE EVIL OVERLORD'S
GUIDE TO SECURITY
   @glynwintle | @sheilaellen
INTRODUCTION
        TO THE ORIGINAL EVIL OVERLORD LIST
            BY PETER ANSPACH © 1996-1997




Being an Evil Overlord seems to be
a good career choice. It pays well,
there are all sorts of perks and you
can set your own hours.



 http://www.eviloverlord.com/lists/overlord.html
INTRODUCTION
TO THE ORIGINAL EVIL OVERLORD LIST BY PETER ANSPACH © 1996-1997



  However every Evil Overlord I've read about in
  books or seen in movies invariably gets
  overthrown and destroyed in the end.

  I've noticed that no matter whether they are
  barbarian lords, deranged wizards, mad scientists
  or alien invaders, they always seem to make the
  same basic mistakes every single time.


     http://www.eviloverlord.com/lists/overlord.html
THE TOP 100
THINGS I'D DO
IF I EVER BECAME
AN EVIL OVERLORD
http://www.eviloverlord.com/lists/overlord.html
1          My Legions of Terror will have
           helmets with a clear plexiglass visor,
           not face‑concealing ones


TRANSLATION
I will ensure that it's
obvious when someone
attempts to gain
unauthorised access to
my systems
                                              JDHancock
1            I will ensure that it's obvious when
             someone attempts to gain
             unauthorised access to my systems


STRATEGIES
●   Log everything
●   Keep another log just for uncommon events
●   If someone has made 100 log-in attempts, send me
    an email
●   When a config file changes, send me an email
2          My ventilation ducts will be too
           small to crawl through



TRANSLATION

My ports will be
closed
2             My ports will be closed



STRATEGIES
●   Run a port scan on every computer you use
●   If it connects to a network, run a port scan on it,
    even the printer
●   Know what services you're running
●   Only open ports for services that you use
3
            My noble half-brother whose throne
            I usurped will be killed, not kept
            anonymously imprisoned in a
            forgotten cell of my dungeon.

TRANSLATION
When someone
leaves a project, I
will revoke all their
privileges
3           When someone leaves a project, I
            will revoke all their privileges



STRATEGIES
●   Delete their user account/s
●   Change all shared passwords
●   Hang on, why are we using shared
    passwords..?!
4    Shooting is not too good for my
     enemies




TRANSLATION          complexity == bugs
4    complexity == bugs



STRATEGIES
      It's complicated
5
            The artifact which is the source of my power
            will not be kept on the Mountain of Despair
            beyond the River of Fire guarded by the
            Dragons of Eternity.
            It will be in my safe‑deposit
            box.
            The same applies to the
            object which is my
            one weakness

TRANSLATION
If it doesn't need to be public,
it won't be
5           If it doesn't need to be public, it
            won't be



STRATEGIES
●   Hash passwords, don't store them as plain
    text
●   Don't store your pentest report on your
    webserver
●   Turn off debug
6           I will not gloat over my enemies'
            predicament before killing them



TRANSLATION

I will not claim to be
unhackable
6             I will not claim to be unhackable



STRATEGIES
●   I will patch my systems as soon as patches are
    published
●   I will monitor for patches...
●   If a server doesn't need to be connected to the
    internet, don't connect it
7
           When I've captured my adversary
           and he says, "Look, before you kill
           me, will you at least tell me what this
           is all about?" I'll say, "No." and shoot
           him. No, on second thought I'll shoot
           him then say "No."

TRANSLATION
I will not give away
information that does
not need to be shared
7           I will not give away information that
            doesn't need to be shared



STRATEGIES
●   Don't broadcast what hardware or software
    you're using, especially which version it is
●   Don't add a humans.txt file to your
    webserver
●   Don't accidentally give away valid usernames
8
           After I kidnap the beautiful princess,
           we will be married immediately in a
           quiet civil ceremony, not a lavish
           spectacle in three weeks' time
           during which the final phase of my
           plan will be carried out.

TRANSLATION
I will secure everything
from the beginning, not
as an afterthought
8             I will secure everything from the
              beginning, not as an afterthought



STRATEGIES
●   Think about how someone might abuse your
    system before you begin building it.
●   Hire a pentester
●   Ensure you have sufficient time to fix the bugs
    your pentester finds before the big launch
9
           I will not include a self-destruct
           mechanism unless absolutely necessary. If
           it is necessary, it will not be a large red
           button labelled "Danger: Do Not Push".
           The big red button marked "Do Not Push"
           will instead trigger a spray of bullets on
           anyone stupid enough to disregard it.
           Similarly, the ON/OFF switch will not
           clearly be labelled as such.

TRANSLATION
I will disable “features” that allow
people to take control of my system
9           I will disable “features” that allow
            people to take control of my system



STRATEGIES
●   Nothing that an ordinary user can do should
    have the potential to shut the system down
●   For bonus points, entrap intruders
10
              I will not interrogate my enemies
              in the inner sanctum – a small
              hotel well outside my borders
              will work just as well



TRANSLATION
I will apply a “need to
know” policy to segregate
and control access to my
data and systems
10               I will apply a “need to know”
                 policy to segregate and control
                 access to my data and systems


STRATEGIES
●   Use firewalls to isolate teams from each
    other
●   If they must talk to each other, do it through
    an intermediary

Mais conteúdo relacionado

Semelhante a The Evil Overlord's Guide to Security: 10 Ways to Improve Your Cyber Defenses

[Computer] hacking for dummies how to learn to hack in easy steps
[Computer] hacking for dummies   how to learn to hack in easy steps[Computer] hacking for dummies   how to learn to hack in easy steps
[Computer] hacking for dummies how to learn to hack in easy stepsfaouzib
 
Hacking - Breaking Into It
Hacking - Breaking Into ItHacking - Breaking Into It
Hacking - Breaking Into ItCTruncer
 
Coding Best practices (PHP)
Coding Best practices (PHP)Coding Best practices (PHP)
Coding Best practices (PHP)Christian Baune
 
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...JosephTesta9
 
Rugged Software Using Rugged Driven Development
Rugged Software Using Rugged Driven DevelopmentRugged Software Using Rugged Driven Development
Rugged Software Using Rugged Driven DevelopmentJames Wickett
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineJinger Jarrett
 
Secrets and Mysteries of Automated Execution Keynote slides
Secrets and Mysteries of Automated Execution Keynote slidesSecrets and Mysteries of Automated Execution Keynote slides
Secrets and Mysteries of Automated Execution Keynote slidesAlan Richardson
 
How you can become a hacker with no security experience
How you can become a hacker with no security experienceHow you can become a hacker with no security experience
How you can become a hacker with no security experienceAvădănei Andrei
 
IT Security Basics For Managers
IT Security Basics For ManagersIT Security Basics For Managers
IT Security Basics For ManagersDaniel Owens
 
Security Isn't Scary and It's Not Rocket Science either.
Security Isn't Scary and It's Not Rocket Science either.Security Isn't Scary and It's Not Rocket Science either.
Security Isn't Scary and It's Not Rocket Science either.Michele Butcher-Jones
 
Project: Intrusion Detection
Project: Intrusion DetectionProject: Intrusion Detection
Project: Intrusion DetectionJay Schulman
 
Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)Kit O'Connell
 
GDS-Austin - DevSecOps & Security Chaos Engineering
GDS-Austin - DevSecOps & Security Chaos EngineeringGDS-Austin - DevSecOps & Security Chaos Engineering
GDS-Austin - DevSecOps & Security Chaos EngineeringAaron Rinehart
 

Semelhante a The Evil Overlord's Guide to Security: 10 Ways to Improve Your Cyber Defenses (17)

[Computer] hacking for dummies how to learn to hack in easy steps
[Computer] hacking for dummies   how to learn to hack in easy steps[Computer] hacking for dummies   how to learn to hack in easy steps
[Computer] hacking for dummies how to learn to hack in easy steps
 
Hacking - Breaking Into It
Hacking - Breaking Into ItHacking - Breaking Into It
Hacking - Breaking Into It
 
Coding Best practices (PHP)
Coding Best practices (PHP)Coding Best practices (PHP)
Coding Best practices (PHP)
 
Passwords
PasswordsPasswords
Passwords
 
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...
 
Rugged Software Using Rugged Driven Development
Rugged Software Using Rugged Driven DevelopmentRugged Software Using Rugged Driven Development
Rugged Software Using Rugged Driven Development
 
Hackers secrets
Hackers secretsHackers secrets
Hackers secrets
 
amrapali builders@@hacking ciphers.pdf
amrapali builders@@hacking ciphers.pdfamrapali builders@@hacking ciphers.pdf
amrapali builders@@hacking ciphers.pdf
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
 
Secrets and Mysteries of Automated Execution Keynote slides
Secrets and Mysteries of Automated Execution Keynote slidesSecrets and Mysteries of Automated Execution Keynote slides
Secrets and Mysteries of Automated Execution Keynote slides
 
How you can become a hacker with no security experience
How you can become a hacker with no security experienceHow you can become a hacker with no security experience
How you can become a hacker with no security experience
 
IT Security Basics For Managers
IT Security Basics For ManagersIT Security Basics For Managers
IT Security Basics For Managers
 
Old Linux Security Talk
Old Linux Security TalkOld Linux Security Talk
Old Linux Security Talk
 
Security Isn't Scary and It's Not Rocket Science either.
Security Isn't Scary and It's Not Rocket Science either.Security Isn't Scary and It's Not Rocket Science either.
Security Isn't Scary and It's Not Rocket Science either.
 
Project: Intrusion Detection
Project: Intrusion DetectionProject: Intrusion Detection
Project: Intrusion Detection
 
Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)
 
GDS-Austin - DevSecOps & Security Chaos Engineering
GDS-Austin - DevSecOps & Security Chaos EngineeringGDS-Austin - DevSecOps & Security Chaos Engineering
GDS-Austin - DevSecOps & Security Chaos Engineering
 

Mais de Jose Casal-Gimenez FBCS CITP

Seeking Nirvana - Predictability in a Complex World
Seeking Nirvana - Predictability in a Complex WorldSeeking Nirvana - Predictability in a Complex World
Seeking Nirvana - Predictability in a Complex WorldJose Casal-Gimenez FBCS CITP
 
The Emergence of Business Agility - Agile Cymru (July 2018)
The Emergence of Business Agility - Agile Cymru  (July 2018)The Emergence of Business Agility - Agile Cymru  (July 2018)
The Emergence of Business Agility - Agile Cymru (July 2018)Jose Casal-Gimenez FBCS CITP
 
La Aparición de la Agilidad Empresarial - spanish
La Aparición de la Agilidad Empresarial - spanishLa Aparición de la Agilidad Empresarial - spanish
La Aparición de la Agilidad Empresarial - spanishJose Casal-Gimenez FBCS CITP
 
Why Agile? - Introducing Agility to non-agile organisations
Why Agile? - Introducing Agility to non-agile organisationsWhy Agile? - Introducing Agility to non-agile organisations
Why Agile? - Introducing Agility to non-agile organisationsJose Casal-Gimenez FBCS CITP
 
Kanban en el Gobierno Escocés - StarTechConf 2015
Kanban en el Gobierno Escocés - StarTechConf 2015Kanban en el Gobierno Escocés - StarTechConf 2015
Kanban en el Gobierno Escocés - StarTechConf 2015Jose Casal-Gimenez FBCS CITP
 
How motivated is your team? Going beyond the traditional performance management
How motivated is your team? Going beyond the traditional performance managementHow motivated is your team? Going beyond the traditional performance management
How motivated is your team? Going beyond the traditional performance managementJose Casal-Gimenez FBCS CITP
 
Kanban PMO v3.0 - How to use Kanban to bring sanity to your PMO
Kanban PMO v3.0 - How to use Kanban to bring sanity to your PMOKanban PMO v3.0 - How to use Kanban to bring sanity to your PMO
Kanban PMO v3.0 - How to use Kanban to bring sanity to your PMOJose Casal-Gimenez FBCS CITP
 
Usando Kanban en el Gobierno Escocés (Spanish talk at #LKSE15)
Usando Kanban en el Gobierno Escocés (Spanish talk at #LKSE15)Usando Kanban en el Gobierno Escocés (Spanish talk at #LKSE15)
Usando Kanban en el Gobierno Escocés (Spanish talk at #LKSE15)Jose Casal-Gimenez FBCS CITP
 
Introducing agility to non-agile organisations - LKUK14
Introducing agility to non-agile organisations - LKUK14Introducing agility to non-agile organisations - LKUK14
Introducing agility to non-agile organisations - LKUK14Jose Casal-Gimenez FBCS CITP
 
Using Agile in non-Agile Organisations (2014 version)
Using Agile in non-Agile Organisations (2014 version)Using Agile in non-Agile Organisations (2014 version)
Using Agile in non-Agile Organisations (2014 version)Jose Casal-Gimenez FBCS CITP
 
Using Agile in non-Agile Organisations - Jose Casal - BCS Agile SG
Using Agile in non-Agile Organisations - Jose Casal - BCS Agile SGUsing Agile in non-Agile Organisations - Jose Casal - BCS Agile SG
Using Agile in non-Agile Organisations - Jose Casal - BCS Agile SGJose Casal-Gimenez FBCS CITP
 
Improve Scrum Using Kanban - Jose Casal - Radtac & BCS Agile SG
Improve Scrum Using Kanban - Jose Casal - Radtac & BCS Agile SGImprove Scrum Using Kanban - Jose Casal - Radtac & BCS Agile SG
Improve Scrum Using Kanban - Jose Casal - Radtac & BCS Agile SGJose Casal-Gimenez FBCS CITP
 
Agile Adoptions that Work and Last - Jose Casal - BCS Agile Methods SG
Agile Adoptions that Work and Last - Jose Casal - BCS Agile Methods SGAgile Adoptions that Work and Last - Jose Casal - BCS Agile Methods SG
Agile Adoptions that Work and Last - Jose Casal - BCS Agile Methods SGJose Casal-Gimenez FBCS CITP
 

Mais de Jose Casal-Gimenez FBCS CITP (20)

Seeking Nirvana - Predictability in a Complex World
Seeking Nirvana - Predictability in a Complex WorldSeeking Nirvana - Predictability in a Complex World
Seeking Nirvana - Predictability in a Complex World
 
Ffliping Agility - Lean Agile Brighton - Oct 2018
Ffliping Agility - Lean Agile Brighton - Oct 2018Ffliping Agility - Lean Agile Brighton - Oct 2018
Ffliping Agility - Lean Agile Brighton - Oct 2018
 
Luna's Journey: The Evolution of a Kanban Board
Luna's Journey: The Evolution of a Kanban BoardLuna's Journey: The Evolution of a Kanban Board
Luna's Journey: The Evolution of a Kanban Board
 
The Emergence of Business Agility - Agile Cymru (July 2018)
The Emergence of Business Agility - Agile Cymru  (July 2018)The Emergence of Business Agility - Agile Cymru  (July 2018)
The Emergence of Business Agility - Agile Cymru (July 2018)
 
La Aparición de la Agilidad Empresarial - spanish
La Aparición de la Agilidad Empresarial - spanishLa Aparición de la Agilidad Empresarial - spanish
La Aparición de la Agilidad Empresarial - spanish
 
The Emergence of Business Agility
The Emergence of Business AgilityThe Emergence of Business Agility
The Emergence of Business Agility
 
Motivated People - ATLdn16
Motivated People - ATLdn16Motivated People - ATLdn16
Motivated People - ATLdn16
 
Are we really thinking?
Are we really thinking?Are we really thinking?
Are we really thinking?
 
Why Agile? - Introducing Agility to non-agile organisations
Why Agile? - Introducing Agility to non-agile organisationsWhy Agile? - Introducing Agility to non-agile organisations
Why Agile? - Introducing Agility to non-agile organisations
 
Kanban en el Gobierno Escocés - StarTechConf 2015
Kanban en el Gobierno Escocés - StarTechConf 2015Kanban en el Gobierno Escocés - StarTechConf 2015
Kanban en el Gobierno Escocés - StarTechConf 2015
 
How motivated is your team? Going beyond the traditional performance management
How motivated is your team? Going beyond the traditional performance managementHow motivated is your team? Going beyond the traditional performance management
How motivated is your team? Going beyond the traditional performance management
 
Kanban PMO v3.0 - How to use Kanban to bring sanity to your PMO
Kanban PMO v3.0 - How to use Kanban to bring sanity to your PMOKanban PMO v3.0 - How to use Kanban to bring sanity to your PMO
Kanban PMO v3.0 - How to use Kanban to bring sanity to your PMO
 
The Kanban PMO
The Kanban PMOThe Kanban PMO
The Kanban PMO
 
Using Kanban in the Scottish Government
Using Kanban in the Scottish GovernmentUsing Kanban in the Scottish Government
Using Kanban in the Scottish Government
 
Usando Kanban en el Gobierno Escocés (Spanish talk at #LKSE15)
Usando Kanban en el Gobierno Escocés (Spanish talk at #LKSE15)Usando Kanban en el Gobierno Escocés (Spanish talk at #LKSE15)
Usando Kanban en el Gobierno Escocés (Spanish talk at #LKSE15)
 
Introducing agility to non-agile organisations - LKUK14
Introducing agility to non-agile organisations - LKUK14Introducing agility to non-agile organisations - LKUK14
Introducing agility to non-agile organisations - LKUK14
 
Using Agile in non-Agile Organisations (2014 version)
Using Agile in non-Agile Organisations (2014 version)Using Agile in non-Agile Organisations (2014 version)
Using Agile in non-Agile Organisations (2014 version)
 
Using Agile in non-Agile Organisations - Jose Casal - BCS Agile SG
Using Agile in non-Agile Organisations - Jose Casal - BCS Agile SGUsing Agile in non-Agile Organisations - Jose Casal - BCS Agile SG
Using Agile in non-Agile Organisations - Jose Casal - BCS Agile SG
 
Improve Scrum Using Kanban - Jose Casal - Radtac & BCS Agile SG
Improve Scrum Using Kanban - Jose Casal - Radtac & BCS Agile SGImprove Scrum Using Kanban - Jose Casal - Radtac & BCS Agile SG
Improve Scrum Using Kanban - Jose Casal - Radtac & BCS Agile SG
 
Agile Adoptions that Work and Last - Jose Casal - BCS Agile Methods SG
Agile Adoptions that Work and Last - Jose Casal - BCS Agile Methods SGAgile Adoptions that Work and Last - Jose Casal - BCS Agile Methods SG
Agile Adoptions that Work and Last - Jose Casal - BCS Agile Methods SG
 

Último

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Último (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

The Evil Overlord's Guide to Security: 10 Ways to Improve Your Cyber Defenses

  • 1. THE EVIL OVERLORD'S GUIDE TO SECURITY @glynwintle | @sheilaellen
  • 2. INTRODUCTION TO THE ORIGINAL EVIL OVERLORD LIST BY PETER ANSPACH © 1996-1997 Being an Evil Overlord seems to be a good career choice. It pays well, there are all sorts of perks and you can set your own hours. http://www.eviloverlord.com/lists/overlord.html
  • 3. INTRODUCTION TO THE ORIGINAL EVIL OVERLORD LIST BY PETER ANSPACH © 1996-1997 However every Evil Overlord I've read about in books or seen in movies invariably gets overthrown and destroyed in the end. I've noticed that no matter whether they are barbarian lords, deranged wizards, mad scientists or alien invaders, they always seem to make the same basic mistakes every single time. http://www.eviloverlord.com/lists/overlord.html
  • 4. THE TOP 100 THINGS I'D DO IF I EVER BECAME AN EVIL OVERLORD http://www.eviloverlord.com/lists/overlord.html
  • 5. 1 My Legions of Terror will have helmets with a clear plexiglass visor, not face‑concealing ones TRANSLATION I will ensure that it's obvious when someone attempts to gain unauthorised access to my systems JDHancock
  • 6. 1 I will ensure that it's obvious when someone attempts to gain unauthorised access to my systems STRATEGIES ● Log everything ● Keep another log just for uncommon events ● If someone has made 100 log-in attempts, send me an email ● When a config file changes, send me an email
  • 7. 2 My ventilation ducts will be too small to crawl through TRANSLATION My ports will be closed
  • 8. 2 My ports will be closed STRATEGIES ● Run a port scan on every computer you use ● If it connects to a network, run a port scan on it, even the printer ● Know what services you're running ● Only open ports for services that you use
  • 9. 3 My noble half-brother whose throne I usurped will be killed, not kept anonymously imprisoned in a forgotten cell of my dungeon. TRANSLATION When someone leaves a project, I will revoke all their privileges
  • 10. 3 When someone leaves a project, I will revoke all their privileges STRATEGIES ● Delete their user account/s ● Change all shared passwords ● Hang on, why are we using shared passwords..?!
  • 11. 4 Shooting is not too good for my enemies TRANSLATION complexity == bugs
  • 12. 4 complexity == bugs STRATEGIES It's complicated
  • 13. 5 The artifact which is the source of my power will not be kept on the Mountain of Despair beyond the River of Fire guarded by the Dragons of Eternity. It will be in my safe‑deposit box. The same applies to the object which is my one weakness TRANSLATION If it doesn't need to be public, it won't be
  • 14. 5 If it doesn't need to be public, it won't be STRATEGIES ● Hash passwords, don't store them as plain text ● Don't store your pentest report on your webserver ● Turn off debug
  • 15. 6 I will not gloat over my enemies' predicament before killing them TRANSLATION I will not claim to be unhackable
  • 16. 6 I will not claim to be unhackable STRATEGIES ● I will patch my systems as soon as patches are published ● I will monitor for patches... ● If a server doesn't need to be connected to the internet, don't connect it
  • 17. 7 When I've captured my adversary and he says, "Look, before you kill me, will you at least tell me what this is all about?" I'll say, "No." and shoot him. No, on second thought I'll shoot him then say "No." TRANSLATION I will not give away information that does not need to be shared
  • 18. 7 I will not give away information that doesn't need to be shared STRATEGIES ● Don't broadcast what hardware or software you're using, especially which version it is ● Don't add a humans.txt file to your webserver ● Don't accidentally give away valid usernames
  • 19. 8 After I kidnap the beautiful princess, we will be married immediately in a quiet civil ceremony, not a lavish spectacle in three weeks' time during which the final phase of my plan will be carried out. TRANSLATION I will secure everything from the beginning, not as an afterthought
  • 20. 8 I will secure everything from the beginning, not as an afterthought STRATEGIES ● Think about how someone might abuse your system before you begin building it. ● Hire a pentester ● Ensure you have sufficient time to fix the bugs your pentester finds before the big launch
  • 21. 9 I will not include a self-destruct mechanism unless absolutely necessary. If it is necessary, it will not be a large red button labelled "Danger: Do Not Push". The big red button marked "Do Not Push" will instead trigger a spray of bullets on anyone stupid enough to disregard it. Similarly, the ON/OFF switch will not clearly be labelled as such. TRANSLATION I will disable “features” that allow people to take control of my system
  • 22. 9 I will disable “features” that allow people to take control of my system STRATEGIES ● Nothing that an ordinary user can do should have the potential to shut the system down ● For bonus points, entrap intruders
  • 23. 10 I will not interrogate my enemies in the inner sanctum – a small hotel well outside my borders will work just as well TRANSLATION I will apply a “need to know” policy to segregate and control access to my data and systems
  • 24. 10 I will apply a “need to know” policy to segregate and control access to my data and systems STRATEGIES ● Use firewalls to isolate teams from each other ● If they must talk to each other, do it through an intermediary