SlideShare uma empresa Scribd logo
1 de 30
Open Security
How Open Source Dominates InfoSec
Chad Cravens
Open Source Systems
www.ossys.com
About The Speaker
1Open Source Systems – www.ossys.com
2007 - Graduate of New Mexico Institute of Mining and Technology
(Scholarship for Service Recipient)
2007 – 2011 Federal Employee at SPAWAR
(Space and Naval Warfare Systems Center)
2012 – Software Engineer at Small Wall St Firm
2014 – Founded Open Source Systems
Chad Cravens
Charleston, SC
Software Fanatic
Stickler for Software Quality and Security!
What to Expect from Today’s Talk
2Open Source Systems – www.ossys.com
A Pragmatic and Realistic View of the Landscape
• What is the problem?
• What are the open source tools available?
• How have these tools been used and/or exploited?
• How is open source a double-edged sword?
Questions during presentation are welcomed!
Information Security
3Open Source Systems – www.ossys.com
The practice of defending information from
unauthorized access, use, disclosure, disruption,
modification, perusal, inspection, recording or
destruction.
- Confidentiality
- Availability
- Integrity
The Pillars of InfoSec
https://en.wikipedia.org/wiki/Information_security
A Brief History of Modern InfoSec
4Open Source Systems – www.ossys.com
1970 – John Draper uses famous Captain Crunch Whistle (2600
Mhz) to hack AT&T lines (Phreaking)
1986 – The “Brain” Computer Virus was released against MS-DOS.
Computer Fraud and Abuse Act of 1986 was passed as law.
1988 – The Morris Worm was one of the first Internet-distributed
worms to pop up
1990’s – As the popularity of the Internet grows, so do the
complexity and frequencies of attacks, in particular viruses
2000’s – Unprecedented levels of hacks, rise of Application-layer
attacks and self-propagating malware
What is Open Source?
5Open Source Systems – www.ossys.com
Open Source is Collaborative Development
We are all standing on the shoulders of giants
Programming Languages, a Foundation
6Open Source Systems – www.ossys.com
Gnu Compiler Collection (GCC)
Arguably one of the most widely-adopted compilers used by the hacker
community. Supports C, C++, Objective C, Java and Ado. Can be used to:
- Create tools
- Create exploits / shellcode
- Analyze (network / system calls / encryption / etc)
- Supports Linux / Unix variants, Mac OSX and Windows
Python
A go-to tool for hackers that is supported by default by
a large number of systems:
- Create tools
- Create exploits / shellcode
- Simply perform network operations
And more open source languages…
7Open Source Systems – www.ossys.com
Some of the most popular open source languages
And better late to the party than never…
Welcome Microsoft!
Open Standards
8Open Source Systems – www.ossys.com
A standard that is publicly available and has
various rights associated with it, and may also
have various properties of how it was designed
(e.g. open process).
https://en.wikipedia.org/wiki/Open_standard
Hackers Can Exploit These Standards
9Open Source Systems – www.ossys.com
Transmission Control Protocol (TCP)
RFC 793 Exploit an Open Standard
Using Open Source Programming
Languages
To create one of the most popular
open source network
reconnaissance tools available and
used by hackers
And this is how it starts…
10Open Source Systems – www.ossys.com
Open the flood gates for open source network security tools!
Real-time analysis of network traffic
Filtering and color-coding
Network and vulnerability recon
Analyze firewall rules and routing
Run exploits on remote systems
Create backdoors / control remote systems
Scan networks for vulnerable systems
Run exploits on remote systems
But wait, there’s more…
Open Source Systems – www.ossys.com
Open the flood gates for open source network security tools!
Real-time analysis of network traffic
Filtering and color-coding
Used to pipe network streams
“Swiss army knife” of network tools
Run exploits on remote systems
Create backdoors / control remote systems
Real-time analysis of network traffic
11
Open Source Security Distro
Open Source Systems – www.ossys.com
Kali Linux
Includes more than 600
open source security
tools, just like the ones
previously mentioned!!
Includes all the aforementioned tools and much more installed and ready to rock
• Vulnerability Scanning
• Service Discovery
• Password Cracking
• Security Tool Development
• WiFi Cracking
• … and much much more
12
Additional Open Standards / Groups
Open Source Systems – www.ossys.com
Open Source Vulnerability
Database
Open Web Application
Security Project
Open Vulnerability and
Assessment Language
Organization for the Advancement of
Structured Information Standards
And many more not mentioned here….
13
OSVDB - Searching Vulnerabilities
Open Source Systems – www.ossys.com
OSVDB’s goal is to provide accurate, detailed, current, and
unbiased technical security information. The project
currently covers 120,980 vulnerabilities, spanning 198,976
products from 4,735 researchers, over 113 years.
14
Application Layer
Security
Open Source Systems – www.ossys.com 15
Multiple Layers of Attack
Open Source Systems – www.ossys.com
All aforementioned tools
attack at this layer
We have not yet touched
this layer
Like an Onion
16
Application Layer vs Network Layer Attacks
Open Source Systems – www.ossys.com
Network Layer Attacks Application Layer Attacks
Open Standards
Reviewed Over Years
By The Best in the Industry
Open Source
Implementation
Reviewed by dozens or
hundreds of developers
over years
Open Source
Implementation
Reviewed by dozens or
hundreds
of developers over years
Hire a Team of Developers
Usually the lowest bidder
Knowledge and Skills..?
Deploy Your Custom App
Usually not reviewed
Hackers Exploit Your App
Direct Access to Your Data
17
Debunking the Myths
Open Source Systems – www.ossys.com
“My App is Closed Source, Therefore It’s
Secure”
Reality:
- Source code is not needed to circumvent security
- Licensing has little effect on the security of software
“We Use Open Source, Therefore we Are
Secure”
Reality:
- Open-sourcing bad / insecure code will not make it secure
- Only good coding practices will create secure code
- Having more reviewers may benefit the security of a project
18
Tools to Debunk the Myths
Open Source Systems – www.ossys.com
A tool used to exploit proprietary and
custom-developed applications
A tool used to exploit proprietary and
custom-developed applications
Nikto
Zed Attack Proxy (ZAP)
Proxy-based application vulnerability
assessment
19
Application Vulnerabilities
Open Source Systems – www.ossys.com
OWASP Top 10
A1 – Injection
A2 – Broken Authentication and Session Management
A3 – Cross-Site Scripting
A4 – Insecure Direct Object References
A5 – Security Misconfiguration
A6 – Sensitive Data Exposure
A7 – Missing Function Level Access Control
A8 – Cross-Site Request Forgery
A9 – Using Components with Known Vulnerabilities
A10 – Unvalidated Redirects and Forwards
20
The Other Side of the Coin
Open Source Systems – www.ossys.com
Open Standards along with Open Source IS Security
Open Source Security Tools
OpenSSH – De-facto Standard to Connect Securely to Remote Computers
OpenSSL – De-facto Standard for Secure Web SSL/TLS Communication
and much much much more…
Open Security Standards
SAML – Open Standard for Secure Web-Based Single Sign On (SSO)
CVE – Common Vulnerabilities and Exposures List
PCI DSS – Payment Card Industry Data Security Standard
AES – Advanced Encryption Standard
and much much much more…
US Federal Law
FISMA – Federal Information Security Management Act
HIPAA – Health Information Portability and Accountability Act
21
Open Source Digital
Forensics
Open Source Systems – www.ossys.com 22
Open Source Forensics
Open Source Systems – www.ossys.com
… a branch of forensic science encompassing the
recover and investigation of material found in
digital devices, often in relation to computer crime.
Sleuthkit & Autopsy
https://en.wikipedia.org/wiki/Digital_forensics
23
Open Source Security
Training
Open Source Systems – www.ossys.com 24
What’s the Missing Link?
Open Source Systems – www.ossys.com 25
Knowledge!!
Unlimited Learning Opportunities!!
Open Source Systems – www.ossys.com 26
Open Security Training
http://opensecuritytraining.info/
SecurityTube
http://www.securitytube.net/
MIT OCW
http://ocw.mit.edu/
Coursera
http://coursera.org/
The Open Source Security Ecosystem
Open Source Systems – www.ossys.com
Open Standards
Open Standards
Organizations
Open Source
Languages
Open Source
Security Tools
27
KSA
Open Source Breaks Barriers
Open Source Systems – www.ossys.com
Unlimited Opportunites / Unlimited Resources
- Learn About Cyber Security
- Implement Security in Your Organization
- Research Cyber Security
- Attend Cyber Security Conferences
- Start an Open Source Security Project
- Information Security Scholarship Programs
28
To make a career or….
Questions?
Open Source Systems – www.ossys.com
Thank you!
chad.cravens@ossys.com
29

Mais conteúdo relacionado

Destaque

Ukraine regulatory requirements 351
Ukraine regulatory requirements 351Ukraine regulatory requirements 351
Ukraine regulatory requirements 351porch edam
 
Potestad tributaria2
Potestad tributaria2Potestad tributaria2
Potestad tributaria2Carla Salgado
 
paradee satiman
paradee satimanparadee satiman
paradee satimannenemelody
 
Додаток 1, 2
Додаток 1, 2Додаток 1, 2
Додаток 1, 2270479
 
06.瑞士最夯的橋~朗德瓦薩橋landwasserviadukt(2016.05.26)
06.瑞士最夯的橋~朗德瓦薩橋landwasserviadukt(2016.05.26)06.瑞士最夯的橋~朗德瓦薩橋landwasserviadukt(2016.05.26)
06.瑞士最夯的橋~朗德瓦薩橋landwasserviadukt(2016.05.26)溫秀嬌
 
Досвід роботи вчителя музичного мистецтва Шапранової Л.В.
Досвід роботи вчителя музичного мистецтва Шапранової Л.В.Досвід роботи вчителя музичного мистецтва Шапранової Л.В.
Досвід роботи вчителя музичного мистецтва Шапранової Л.В.school-2
 
Il fisioterapista respiratorio al domicilio
Il fisioterapista respiratorio al domicilioIl fisioterapista respiratorio al domicilio
Il fisioterapista respiratorio al domicilioAngelo Longoni
 
部室の在籍状況を可視化した話
部室の在籍状況を可視化した話部室の在籍状況を可視化した話
部室の在籍状況を可視化した話Koutarou Yabe
 
Учительська презентація Тема: Народні музичні інструменти. 5 клас
Учительська презентація Тема: Народні  музичні інструменти. 5 класУчительська презентація Тема: Народні  музичні інструменти. 5 клас
Учительська презентація Тема: Народні музичні інструменти. 5 клас270479
 
Gender Inequality in Bangladesh
Gender Inequality in BangladeshGender Inequality in Bangladesh
Gender Inequality in BangladeshMaruf Hussain
 
презентація трудове виховання хороша паливодат.м.
презентація  трудове виховання хороша паливодат.м.презентація  трудове виховання хороша паливодат.м.
презентація трудове виховання хороша паливодат.м.Sveta Kovalets
 
Шинкарева О.О. «Художня праця як засіб розвитку творчих здібностей та креатив...
Шинкарева О.О. «Художня праця як засіб розвитку творчих здібностей та креатив...Шинкарева О.О. «Художня праця як засіб розвитку творчих здібностей та креатив...
Шинкарева О.О. «Художня праця як засіб розвитку творчих здібностей та креатив...dnz150of
 
Опис досвіду роботи
Опис досвіду роботи Опис досвіду роботи
Опис досвіду роботи Vladimir Smirnov
 

Destaque (19)

Ukraine regulatory requirements 351
Ukraine regulatory requirements 351Ukraine regulatory requirements 351
Ukraine regulatory requirements 351
 
Potestad tributaria2
Potestad tributaria2Potestad tributaria2
Potestad tributaria2
 
Урок 6
Урок 6Урок 6
Урок 6
 
paradee satiman
paradee satimanparadee satiman
paradee satiman
 
Урок 18
Урок 18Урок 18
Урок 18
 
Додаток 1, 2
Додаток 1, 2Додаток 1, 2
Додаток 1, 2
 
06.瑞士最夯的橋~朗德瓦薩橋landwasserviadukt(2016.05.26)
06.瑞士最夯的橋~朗德瓦薩橋landwasserviadukt(2016.05.26)06.瑞士最夯的橋~朗德瓦薩橋landwasserviadukt(2016.05.26)
06.瑞士最夯的橋~朗德瓦薩橋landwasserviadukt(2016.05.26)
 
貝聿銘 (2)
貝聿銘 (2)貝聿銘 (2)
貝聿銘 (2)
 
Досвід роботи вчителя музичного мистецтва Шапранової Л.В.
Досвід роботи вчителя музичного мистецтва Шапранової Л.В.Досвід роботи вчителя музичного мистецтва Шапранової Л.В.
Досвід роботи вчителя музичного мистецтва Шапранової Л.В.
 
Il fisioterapista respiratorio al domicilio
Il fisioterapista respiratorio al domicilioIl fisioterapista respiratorio al domicilio
Il fisioterapista respiratorio al domicilio
 
部室の在籍状況を可視化した話
部室の在籍状況を可視化した話部室の在籍状況を可視化した話
部室の在籍状況を可視化した話
 
Учительська презентація Тема: Народні музичні інструменти. 5 клас
Учительська презентація Тема: Народні  музичні інструменти. 5 класУчительська презентація Тема: Народні  музичні інструменти. 5 клас
Учительська презентація Тема: Народні музичні інструменти. 5 клас
 
Gender Inequality in Bangladesh
Gender Inequality in BangladeshGender Inequality in Bangladesh
Gender Inequality in Bangladesh
 
презентація трудове виховання хороша паливодат.м.
презентація  трудове виховання хороша паливодат.м.презентація  трудове виховання хороша паливодат.м.
презентація трудове виховання хороша паливодат.м.
 
Писатели и поэты родного края-юбиляры 2016
Писатели и поэты родного края-юбиляры 2016Писатели и поэты родного края-юбиляры 2016
Писатели и поэты родного края-юбиляры 2016
 
А-БА-БА-ГА-ЛА-МА-ГА
 А-БА-БА-ГА-ЛА-МА-ГА  А-БА-БА-ГА-ЛА-МА-ГА
А-БА-БА-ГА-ЛА-МА-ГА
 
Шинкарева О.О. «Художня праця як засіб розвитку творчих здібностей та креатив...
Шинкарева О.О. «Художня праця як засіб розвитку творчих здібностей та креатив...Шинкарева О.О. «Художня праця як засіб розвитку творчих здібностей та креатив...
Шинкарева О.О. «Художня праця як засіб розвитку творчих здібностей та креатив...
 
Опис досвіду роботи
Опис досвіду роботи Опис досвіду роботи
Опис досвіду роботи
 
Colonies2013
Colonies2013Colonies2013
Colonies2013
 

Semelhante a Open Security - Chad Cravens

Cyber Security and Open Source
Cyber Security and Open SourceCyber Security and Open Source
Cyber Security and Open SourcePOSSCON
 
Opensource Presentation
Opensource PresentationOpensource Presentation
Opensource PresentationSarah Cortes
 
Open source
Open sourceOpen source
Open sourceAshesh R
 
Vulnerability Intelligence and Assessment with vulners.com
Vulnerability Intelligence and Assessment with vulners.comVulnerability Intelligence and Assessment with vulners.com
Vulnerability Intelligence and Assessment with vulners.comAlexander Leonov
 
3/ Black Duck @ OPEN'16
3/ Black Duck @ OPEN'163/ Black Duck @ OPEN'16
3/ Black Duck @ OPEN'16Kangaroot
 
Security awareness for information security team
Security awareness for information security teamSecurity awareness for information security team
Security awareness for information security teamKirill Ermakov
 
SoftwareSecurity.ppt
SoftwareSecurity.pptSoftwareSecurity.ppt
SoftwareSecurity.pptssuserfb92ae
 
Securing your web apps before they hurt the organization
Securing your web apps before they hurt the organizationSecuring your web apps before they hurt the organization
Securing your web apps before they hurt the organizationAntonio Fontes
 
Open source technology
Open source technologyOpen source technology
Open source technologyaparnaz1
 
The Anatomy of Java Vulnerabilities (Devoxx UK 2017)
The Anatomy of Java Vulnerabilities (Devoxx UK 2017)The Anatomy of Java Vulnerabilities (Devoxx UK 2017)
The Anatomy of Java Vulnerabilities (Devoxx UK 2017)Steve Poole
 
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...Shannon Williams
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...ShivamSharma909
 
Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +infosec train
 

Semelhante a Open Security - Chad Cravens (20)

Cyber Security and Open Source
Cyber Security and Open SourceCyber Security and Open Source
Cyber Security and Open Source
 
OWASP an Introduction
OWASP an Introduction OWASP an Introduction
OWASP an Introduction
 
Opensource Presentation
Opensource PresentationOpensource Presentation
Opensource Presentation
 
Open source
Open sourceOpen source
Open source
 
Nethemba profil
Nethemba profilNethemba profil
Nethemba profil
 
Nethemba profil
Nethemba profilNethemba profil
Nethemba profil
 
Vulnerability Intelligence and Assessment with vulners.com
Vulnerability Intelligence and Assessment with vulners.comVulnerability Intelligence and Assessment with vulners.com
Vulnerability Intelligence and Assessment with vulners.com
 
3/ Black Duck @ OPEN'16
3/ Black Duck @ OPEN'163/ Black Duck @ OPEN'16
3/ Black Duck @ OPEN'16
 
Security awareness for information security team
Security awareness for information security teamSecurity awareness for information security team
Security awareness for information security team
 
SoftwareSecurity.ppt
SoftwareSecurity.pptSoftwareSecurity.ppt
SoftwareSecurity.ppt
 
Building your Open Source Security stack
Building your Open Source Security stackBuilding your Open Source Security stack
Building your Open Source Security stack
 
OWASP Top Ten in Practice
OWASP Top Ten in PracticeOWASP Top Ten in Practice
OWASP Top Ten in Practice
 
Securing your web apps before they hurt the organization
Securing your web apps before they hurt the organizationSecuring your web apps before they hurt the organization
Securing your web apps before they hurt the organization
 
Open source technology
Open source technologyOpen source technology
Open source technology
 
The Anatomy of Java Vulnerabilities (Devoxx UK 2017)
The Anatomy of Java Vulnerabilities (Devoxx UK 2017)The Anatomy of Java Vulnerabilities (Devoxx UK 2017)
The Anatomy of Java Vulnerabilities (Devoxx UK 2017)
 
Web app security essentials
Web app security essentialsWeb app security essentials
Web app security essentials
 
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
Securing Container Deployments from Build to Ship to Run - August 2017 - Ranc...
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
 
Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +
 
CompTIA Security+
CompTIA Security+CompTIA Security+
CompTIA Security+
 

Mais de IT-oLogy

Low Cost Tools for Security Challenges - Timothy De Block
Low Cost Tools for Security Challenges - Timothy De BlockLow Cost Tools for Security Challenges - Timothy De Block
Low Cost Tools for Security Challenges - Timothy De BlockIT-oLogy
 
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...IT-oLogy
 
National Cyber Security Awareness Month - Michael Kaiser
National Cyber Security Awareness Month - Michael KaiserNational Cyber Security Awareness Month - Michael Kaiser
National Cyber Security Awareness Month - Michael KaiserIT-oLogy
 
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserIT-oLogy
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisIT-oLogy
 
Cyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett CocoCyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett CocoIT-oLogy
 
Cybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les EisnerCybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les EisnerIT-oLogy
 
Live Exploit - Chad Cravens
Live Exploit - Chad CravensLive Exploit - Chad Cravens
Live Exploit - Chad CravensIT-oLogy
 
Software Security Assurance - Bruce Jenkins
Software Security Assurance - Bruce JenkinsSoftware Security Assurance - Bruce Jenkins
Software Security Assurance - Bruce JenkinsIT-oLogy
 
In the Wake of Ashley Madison - Jim Salter
In the Wake of Ashley Madison - Jim SalterIn the Wake of Ashley Madison - Jim Salter
In the Wake of Ashley Madison - Jim SalterIT-oLogy
 
Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterPasswords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterIT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...IT-oLogy
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy
 
IT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
IT-oLogy Summit on Information Technology: KEYNOTE: Matt GardnerIT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
IT-oLogy Summit on Information Technology: KEYNOTE: Matt GardnerIT-oLogy
 

Mais de IT-oLogy (20)

Low Cost Tools for Security Challenges - Timothy De Block
Low Cost Tools for Security Challenges - Timothy De BlockLow Cost Tools for Security Challenges - Timothy De Block
Low Cost Tools for Security Challenges - Timothy De Block
 
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Sant...
 
National Cyber Security Awareness Month - Michael Kaiser
National Cyber Security Awareness Month - Michael KaiserNational Cyber Security Awareness Month - Michael Kaiser
National Cyber Security Awareness Month - Michael Kaiser
 
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael Kaiser
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana Harris
 
Cyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett CocoCyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett Coco
 
Cybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les EisnerCybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les Eisner
 
Live Exploit - Chad Cravens
Live Exploit - Chad CravensLive Exploit - Chad Cravens
Live Exploit - Chad Cravens
 
Software Security Assurance - Bruce Jenkins
Software Security Assurance - Bruce JenkinsSoftware Security Assurance - Bruce Jenkins
Software Security Assurance - Bruce Jenkins
 
In the Wake of Ashley Madison - Jim Salter
In the Wake of Ashley Madison - Jim SalterIn the Wake of Ashley Madison - Jim Salter
In the Wake of Ashley Madison - Jim Salter
 
Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim SalterPasswords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim Salter
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
 
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
 
IT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
IT-oLogy Summit on Information Technology: KEYNOTE: Matt GardnerIT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
IT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Open Security - Chad Cravens

  • 1. Open Security How Open Source Dominates InfoSec Chad Cravens Open Source Systems www.ossys.com
  • 2. About The Speaker 1Open Source Systems – www.ossys.com 2007 - Graduate of New Mexico Institute of Mining and Technology (Scholarship for Service Recipient) 2007 – 2011 Federal Employee at SPAWAR (Space and Naval Warfare Systems Center) 2012 – Software Engineer at Small Wall St Firm 2014 – Founded Open Source Systems Chad Cravens Charleston, SC Software Fanatic Stickler for Software Quality and Security!
  • 3. What to Expect from Today’s Talk 2Open Source Systems – www.ossys.com A Pragmatic and Realistic View of the Landscape • What is the problem? • What are the open source tools available? • How have these tools been used and/or exploited? • How is open source a double-edged sword? Questions during presentation are welcomed!
  • 4. Information Security 3Open Source Systems – www.ossys.com The practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. - Confidentiality - Availability - Integrity The Pillars of InfoSec https://en.wikipedia.org/wiki/Information_security
  • 5. A Brief History of Modern InfoSec 4Open Source Systems – www.ossys.com 1970 – John Draper uses famous Captain Crunch Whistle (2600 Mhz) to hack AT&T lines (Phreaking) 1986 – The “Brain” Computer Virus was released against MS-DOS. Computer Fraud and Abuse Act of 1986 was passed as law. 1988 – The Morris Worm was one of the first Internet-distributed worms to pop up 1990’s – As the popularity of the Internet grows, so do the complexity and frequencies of attacks, in particular viruses 2000’s – Unprecedented levels of hacks, rise of Application-layer attacks and self-propagating malware
  • 6. What is Open Source? 5Open Source Systems – www.ossys.com Open Source is Collaborative Development We are all standing on the shoulders of giants
  • 7. Programming Languages, a Foundation 6Open Source Systems – www.ossys.com Gnu Compiler Collection (GCC) Arguably one of the most widely-adopted compilers used by the hacker community. Supports C, C++, Objective C, Java and Ado. Can be used to: - Create tools - Create exploits / shellcode - Analyze (network / system calls / encryption / etc) - Supports Linux / Unix variants, Mac OSX and Windows Python A go-to tool for hackers that is supported by default by a large number of systems: - Create tools - Create exploits / shellcode - Simply perform network operations
  • 8. And more open source languages… 7Open Source Systems – www.ossys.com Some of the most popular open source languages And better late to the party than never… Welcome Microsoft!
  • 9. Open Standards 8Open Source Systems – www.ossys.com A standard that is publicly available and has various rights associated with it, and may also have various properties of how it was designed (e.g. open process). https://en.wikipedia.org/wiki/Open_standard
  • 10. Hackers Can Exploit These Standards 9Open Source Systems – www.ossys.com Transmission Control Protocol (TCP) RFC 793 Exploit an Open Standard Using Open Source Programming Languages To create one of the most popular open source network reconnaissance tools available and used by hackers
  • 11. And this is how it starts… 10Open Source Systems – www.ossys.com Open the flood gates for open source network security tools! Real-time analysis of network traffic Filtering and color-coding Network and vulnerability recon Analyze firewall rules and routing Run exploits on remote systems Create backdoors / control remote systems Scan networks for vulnerable systems Run exploits on remote systems
  • 12. But wait, there’s more… Open Source Systems – www.ossys.com Open the flood gates for open source network security tools! Real-time analysis of network traffic Filtering and color-coding Used to pipe network streams “Swiss army knife” of network tools Run exploits on remote systems Create backdoors / control remote systems Real-time analysis of network traffic 11
  • 13. Open Source Security Distro Open Source Systems – www.ossys.com Kali Linux Includes more than 600 open source security tools, just like the ones previously mentioned!! Includes all the aforementioned tools and much more installed and ready to rock • Vulnerability Scanning • Service Discovery • Password Cracking • Security Tool Development • WiFi Cracking • … and much much more 12
  • 14. Additional Open Standards / Groups Open Source Systems – www.ossys.com Open Source Vulnerability Database Open Web Application Security Project Open Vulnerability and Assessment Language Organization for the Advancement of Structured Information Standards And many more not mentioned here…. 13
  • 15. OSVDB - Searching Vulnerabilities Open Source Systems – www.ossys.com OSVDB’s goal is to provide accurate, detailed, current, and unbiased technical security information. The project currently covers 120,980 vulnerabilities, spanning 198,976 products from 4,735 researchers, over 113 years. 14
  • 16. Application Layer Security Open Source Systems – www.ossys.com 15
  • 17. Multiple Layers of Attack Open Source Systems – www.ossys.com All aforementioned tools attack at this layer We have not yet touched this layer Like an Onion 16
  • 18. Application Layer vs Network Layer Attacks Open Source Systems – www.ossys.com Network Layer Attacks Application Layer Attacks Open Standards Reviewed Over Years By The Best in the Industry Open Source Implementation Reviewed by dozens or hundreds of developers over years Open Source Implementation Reviewed by dozens or hundreds of developers over years Hire a Team of Developers Usually the lowest bidder Knowledge and Skills..? Deploy Your Custom App Usually not reviewed Hackers Exploit Your App Direct Access to Your Data 17
  • 19. Debunking the Myths Open Source Systems – www.ossys.com “My App is Closed Source, Therefore It’s Secure” Reality: - Source code is not needed to circumvent security - Licensing has little effect on the security of software “We Use Open Source, Therefore we Are Secure” Reality: - Open-sourcing bad / insecure code will not make it secure - Only good coding practices will create secure code - Having more reviewers may benefit the security of a project 18
  • 20. Tools to Debunk the Myths Open Source Systems – www.ossys.com A tool used to exploit proprietary and custom-developed applications A tool used to exploit proprietary and custom-developed applications Nikto Zed Attack Proxy (ZAP) Proxy-based application vulnerability assessment 19
  • 21. Application Vulnerabilities Open Source Systems – www.ossys.com OWASP Top 10 A1 – Injection A2 – Broken Authentication and Session Management A3 – Cross-Site Scripting A4 – Insecure Direct Object References A5 – Security Misconfiguration A6 – Sensitive Data Exposure A7 – Missing Function Level Access Control A8 – Cross-Site Request Forgery A9 – Using Components with Known Vulnerabilities A10 – Unvalidated Redirects and Forwards 20
  • 22. The Other Side of the Coin Open Source Systems – www.ossys.com Open Standards along with Open Source IS Security Open Source Security Tools OpenSSH – De-facto Standard to Connect Securely to Remote Computers OpenSSL – De-facto Standard for Secure Web SSL/TLS Communication and much much much more… Open Security Standards SAML – Open Standard for Secure Web-Based Single Sign On (SSO) CVE – Common Vulnerabilities and Exposures List PCI DSS – Payment Card Industry Data Security Standard AES – Advanced Encryption Standard and much much much more… US Federal Law FISMA – Federal Information Security Management Act HIPAA – Health Information Portability and Accountability Act 21
  • 23. Open Source Digital Forensics Open Source Systems – www.ossys.com 22
  • 24. Open Source Forensics Open Source Systems – www.ossys.com … a branch of forensic science encompassing the recover and investigation of material found in digital devices, often in relation to computer crime. Sleuthkit & Autopsy https://en.wikipedia.org/wiki/Digital_forensics 23
  • 25. Open Source Security Training Open Source Systems – www.ossys.com 24
  • 26. What’s the Missing Link? Open Source Systems – www.ossys.com 25 Knowledge!!
  • 27. Unlimited Learning Opportunities!! Open Source Systems – www.ossys.com 26 Open Security Training http://opensecuritytraining.info/ SecurityTube http://www.securitytube.net/ MIT OCW http://ocw.mit.edu/ Coursera http://coursera.org/
  • 28. The Open Source Security Ecosystem Open Source Systems – www.ossys.com Open Standards Open Standards Organizations Open Source Languages Open Source Security Tools 27 KSA
  • 29. Open Source Breaks Barriers Open Source Systems – www.ossys.com Unlimited Opportunites / Unlimited Resources - Learn About Cyber Security - Implement Security in Your Organization - Research Cyber Security - Attend Cyber Security Conferences - Start an Open Source Security Project - Information Security Scholarship Programs 28 To make a career or….
  • 30. Questions? Open Source Systems – www.ossys.com Thank you! chad.cravens@ossys.com 29