SlideShare uma empresa Scribd logo
1 de 18
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object]
Anatomy of a Mail Transport System port 25 Forward port 25 traffic to internal mail server To: user@example.com Lookup MX record for  example.com example.com  MX record = 50.50.50.25 50.50.50.25
[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why Doesn’t Someone Stop Them? Legal: convictions require time and money ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why Doesn’t Someone Stop Them? Financial: convictions require MORE time and money ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What happens if email is SPAM? Antispam solution
Let’s zoom in… WatchGuard Training Internet Internet link Firewall Anti-spam Quarantine Email Server
[object Object]
How can we improve the current model? Using the cloud!!! WatchGuard Training Internet Internet link Firewall Anti-spam Quarantine Email Server
Some ReputationAuthority.org Statistics WatchGuard Training ,[object Object],[object Object]
Questions? [email_address] [email_address]
Visítenos en el stand de AEC Electrónica y regístrese para la rifa de un iPod Shuffle.

Mais conteúdo relacionado

Destaque

Transformation of the Academic Library
Transformation of the Academic LibraryTransformation of the Academic Library
Transformation of the Academic LibraryKurt De Belder
 
Impossible Flights - Rewind Italia
Impossible Flights - Rewind ItaliaImpossible Flights - Rewind Italia
Impossible Flights - Rewind ItaliaSean Cubitt
 
Building the Global Classroom: A Substitute Teacher's Twitter Journey
Building the Global Classroom: A Substitute Teacher's Twitter JourneyBuilding the Global Classroom: A Substitute Teacher's Twitter Journey
Building the Global Classroom: A Substitute Teacher's Twitter JourneyMichael Graffin
 
Electric Blue (Revised): Art and poem by Shelley M. House
Electric Blue (Revised): Art and poem by Shelley M. HouseElectric Blue (Revised): Art and poem by Shelley M. House
Electric Blue (Revised): Art and poem by Shelley M. HouseShelley House
 
Seanscreen2011projection
Seanscreen2011projectionSeanscreen2011projection
Seanscreen2011projectionSean Cubitt
 
Glitch Aesthetics: Exhibiting Video Conference
Glitch Aesthetics: Exhibiting Video ConferenceGlitch Aesthetics: Exhibiting Video Conference
Glitch Aesthetics: Exhibiting Video ConferenceSean Cubitt
 
Facebook Adding Friends
Facebook Adding FriendsFacebook Adding Friends
Facebook Adding FriendsBrad Sage
 
CBC: New York State Budget and Jobs Summit
CBC: New York State Budget and Jobs SummitCBC: New York State Budget and Jobs Summit
CBC: New York State Budget and Jobs SummitUnshackle Upstate
 
ISEA2011 Istanbul keynote: Time to Live
ISEA2011 Istanbul keynote: Time to LiveISEA2011 Istanbul keynote: Time to Live
ISEA2011 Istanbul keynote: Time to LiveSean Cubitt
 
Hpm7globalisation
Hpm7globalisationHpm7globalisation
Hpm7globalisationSean Cubitt
 

Destaque (18)

Portfolio
PortfolioPortfolio
Portfolio
 
Endorsements
EndorsementsEndorsements
Endorsements
 
Transformation of the Academic Library
Transformation of the Academic LibraryTransformation of the Academic Library
Transformation of the Academic Library
 
Rick Lynch
Rick Lynch Rick Lynch
Rick Lynch
 
Impossible Flights - Rewind Italia
Impossible Flights - Rewind ItaliaImpossible Flights - Rewind Italia
Impossible Flights - Rewind Italia
 
Hpm2colour
Hpm2colourHpm2colour
Hpm2colour
 
Building the Global Classroom: A Substitute Teacher's Twitter Journey
Building the Global Classroom: A Substitute Teacher's Twitter JourneyBuilding the Global Classroom: A Substitute Teacher's Twitter Journey
Building the Global Classroom: A Substitute Teacher's Twitter Journey
 
Social media
Social mediaSocial media
Social media
 
Electric Blue (Revised): Art and poem by Shelley M. House
Electric Blue (Revised): Art and poem by Shelley M. HouseElectric Blue (Revised): Art and poem by Shelley M. House
Electric Blue (Revised): Art and poem by Shelley M. House
 
Seanscreen2011projection
Seanscreen2011projectionSeanscreen2011projection
Seanscreen2011projection
 
Glitch Aesthetics: Exhibiting Video Conference
Glitch Aesthetics: Exhibiting Video ConferenceGlitch Aesthetics: Exhibiting Video Conference
Glitch Aesthetics: Exhibiting Video Conference
 
Facebook Adding Friends
Facebook Adding FriendsFacebook Adding Friends
Facebook Adding Friends
 
CBC: New York State Budget and Jobs Summit
CBC: New York State Budget and Jobs SummitCBC: New York State Budget and Jobs Summit
CBC: New York State Budget and Jobs Summit
 
Hpm6justice
Hpm6justiceHpm6justice
Hpm6justice
 
ISEA2011 Istanbul keynote: Time to Live
ISEA2011 Istanbul keynote: Time to LiveISEA2011 Istanbul keynote: Time to Live
ISEA2011 Istanbul keynote: Time to Live
 
Food Vocabulary
Food VocabularyFood Vocabulary
Food Vocabulary
 
Property Tax Law
Property Tax LawProperty Tax Law
Property Tax Law
 
Hpm7globalisation
Hpm7globalisationHpm7globalisation
Hpm7globalisation
 

Semelhante a Combatiendo Amenazas de Seguridad en la Nube - WatchGuard

Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...Eyal Doron
 
Electronic Evidence - The Special Case of Email
Electronic Evidence - The Special Case of EmailElectronic Evidence - The Special Case of Email
Electronic Evidence - The Special Case of EmailDan Michaluk
 
0926182320 Sophos[1]
0926182320 Sophos[1]0926182320 Sophos[1]
0926182320 Sophos[1]guest043f27
 
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...Eyal Doron
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
Seminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attackSeminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attackrohit2495
 
Sonic Wall Email Security End User
Sonic Wall Email Security End UserSonic Wall Email Security End User
Sonic Wall Email Security End UserRichard Daemen
 
Sonic Wall Email Security End User
Sonic Wall Email Security End UserSonic Wall Email Security End User
Sonic Wall Email Security End UserRichard Daemen
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attackClaranet UK
 
Paubox Social Mixer in Boston
Paubox Social Mixer in BostonPaubox Social Mixer in Boston
Paubox Social Mixer in BostonPaubox, Inc.
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigationedwardbel
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Jason Hong
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Jason Hong
 

Semelhante a Combatiendo Amenazas de Seguridad en la Nube - WatchGuard (20)

Phishing
PhishingPhishing
Phishing
 
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
 
Electronic Evidence - The Special Case of Email
Electronic Evidence - The Special Case of EmailElectronic Evidence - The Special Case of Email
Electronic Evidence - The Special Case of Email
 
0926182320 Sophos[1]
0926182320 Sophos[1]0926182320 Sophos[1]
0926182320 Sophos[1]
 
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Spam Morphs from a Nuisance to a Threat
Spam Morphs from a Nuisance to a ThreatSpam Morphs from a Nuisance to a Threat
Spam Morphs from a Nuisance to a Threat
 
Seminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attackSeminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attack
 
Sonic Wall Email Security End User
Sonic Wall Email Security End UserSonic Wall Email Security End User
Sonic Wall Email Security End User
 
Sonic Wall Email Security End User
Sonic Wall Email Security End UserSonic Wall Email Security End User
Sonic Wall Email Security End User
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
 
Paubox Social Mixer in Boston
Paubox Social Mixer in BostonPaubox Social Mixer in Boston
Paubox Social Mixer in Boston
 
Its presentation
Its presentationIts presentation
Its presentation
 
How to recognize an email scam
How to recognize an email scamHow to recognize an email scam
How to recognize an email scam
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigation
 
Research Report
Research ReportResearch Report
Research Report
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Spam!
Spam!Spam!
Spam!
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
 

Mais de AEC Networks

Soluciones de Seguridad para Banca & Finanzas
Soluciones de Seguridad para Banca & FinanzasSoluciones de Seguridad para Banca & Finanzas
Soluciones de Seguridad para Banca & FinanzasAEC Networks
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk managementAEC Networks
 
F5 Networks - Soluciones para Banca & Finanzas
F5 Networks - Soluciones para Banca & FinanzasF5 Networks - Soluciones para Banca & Finanzas
F5 Networks - Soluciones para Banca & FinanzasAEC Networks
 
The Extreme Experience
The Extreme ExperienceThe Extreme Experience
The Extreme ExperienceAEC Networks
 
Barracuda Networks Solutions
Barracuda Networks SolutionsBarracuda Networks Solutions
Barracuda Networks SolutionsAEC Networks
 
Barracuda Networks Overview
Barracuda Networks OverviewBarracuda Networks Overview
Barracuda Networks OverviewAEC Networks
 
Blue Coat: Application Delivery Networks
Blue Coat: Application Delivery NetworksBlue Coat: Application Delivery Networks
Blue Coat: Application Delivery NetworksAEC Networks
 
Zscaler - webcast de Gartner - Los peligros ocultos detrás de su motor de bús...
Zscaler - webcast de Gartner - Los peligros ocultos detrás de su motor de bús...Zscaler - webcast de Gartner - Los peligros ocultos detrás de su motor de bús...
Zscaler - webcast de Gartner - Los peligros ocultos detrás de su motor de bús...AEC Networks
 
Cifrado de Datos - PGP Corporation
Cifrado de Datos - PGP CorporationCifrado de Datos - PGP Corporation
Cifrado de Datos - PGP CorporationAEC Networks
 
Virtualización de Archivos - F5 Networks
Virtualización de Archivos - F5 NetworksVirtualización de Archivos - F5 Networks
Virtualización de Archivos - F5 NetworksAEC Networks
 
Virtualización en la Red del Data Center - Extreme Networks
Virtualización en la Red del Data Center - Extreme NetworksVirtualización en la Red del Data Center - Extreme Networks
Virtualización en la Red del Data Center - Extreme NetworksAEC Networks
 
Cata de Vinos de Chile
Cata de Vinos de ChileCata de Vinos de Chile
Cata de Vinos de ChileAEC Networks
 
Feliz Navidad 2009
Feliz Navidad 2009Feliz Navidad 2009
Feliz Navidad 2009AEC Networks
 
WatchGuard´s XCS Brochure
WatchGuard´s XCS BrochureWatchGuard´s XCS Brochure
WatchGuard´s XCS BrochureAEC Networks
 
Introduccion a enVision de RSA
Introduccion a enVision de RSAIntroduccion a enVision de RSA
Introduccion a enVision de RSAAEC Networks
 
Data Loss Prevention de RSA
Data Loss Prevention de RSAData Loss Prevention de RSA
Data Loss Prevention de RSAAEC Networks
 
Retos y Tendencias en Redes Convergentes
Retos y Tendencias en Redes ConvergentesRetos y Tendencias en Redes Convergentes
Retos y Tendencias en Redes ConvergentesAEC Networks
 

Mais de AEC Networks (18)

Soluciones de Seguridad para Banca & Finanzas
Soluciones de Seguridad para Banca & FinanzasSoluciones de Seguridad para Banca & Finanzas
Soluciones de Seguridad para Banca & Finanzas
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
F5 Networks - Soluciones para Banca & Finanzas
F5 Networks - Soluciones para Banca & FinanzasF5 Networks - Soluciones para Banca & Finanzas
F5 Networks - Soluciones para Banca & Finanzas
 
The Extreme Experience
The Extreme ExperienceThe Extreme Experience
The Extreme Experience
 
Barracuda Networks Solutions
Barracuda Networks SolutionsBarracuda Networks Solutions
Barracuda Networks Solutions
 
Barracuda Networks Overview
Barracuda Networks OverviewBarracuda Networks Overview
Barracuda Networks Overview
 
La Cerveza
La CervezaLa Cerveza
La Cerveza
 
Blue Coat: Application Delivery Networks
Blue Coat: Application Delivery NetworksBlue Coat: Application Delivery Networks
Blue Coat: Application Delivery Networks
 
Zscaler - webcast de Gartner - Los peligros ocultos detrás de su motor de bús...
Zscaler - webcast de Gartner - Los peligros ocultos detrás de su motor de bús...Zscaler - webcast de Gartner - Los peligros ocultos detrás de su motor de bús...
Zscaler - webcast de Gartner - Los peligros ocultos detrás de su motor de bús...
 
Cifrado de Datos - PGP Corporation
Cifrado de Datos - PGP CorporationCifrado de Datos - PGP Corporation
Cifrado de Datos - PGP Corporation
 
Virtualización de Archivos - F5 Networks
Virtualización de Archivos - F5 NetworksVirtualización de Archivos - F5 Networks
Virtualización de Archivos - F5 Networks
 
Virtualización en la Red del Data Center - Extreme Networks
Virtualización en la Red del Data Center - Extreme NetworksVirtualización en la Red del Data Center - Extreme Networks
Virtualización en la Red del Data Center - Extreme Networks
 
Cata de Vinos de Chile
Cata de Vinos de ChileCata de Vinos de Chile
Cata de Vinos de Chile
 
Feliz Navidad 2009
Feliz Navidad 2009Feliz Navidad 2009
Feliz Navidad 2009
 
WatchGuard´s XCS Brochure
WatchGuard´s XCS BrochureWatchGuard´s XCS Brochure
WatchGuard´s XCS Brochure
 
Introduccion a enVision de RSA
Introduccion a enVision de RSAIntroduccion a enVision de RSA
Introduccion a enVision de RSA
 
Data Loss Prevention de RSA
Data Loss Prevention de RSAData Loss Prevention de RSA
Data Loss Prevention de RSA
 
Retos y Tendencias en Redes Convergentes
Retos y Tendencias en Redes ConvergentesRetos y Tendencias en Redes Convergentes
Retos y Tendencias en Redes Convergentes
 

Último

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Combatiendo Amenazas de Seguridad en la Nube - WatchGuard

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. Anatomy of a Mail Transport System port 25 Forward port 25 traffic to internal mail server To: user@example.com Lookup MX record for example.com example.com MX record = 50.50.50.25 50.50.50.25
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. What happens if email is SPAM? Antispam solution
  • 13. Let’s zoom in… WatchGuard Training Internet Internet link Firewall Anti-spam Quarantine Email Server
  • 14.
  • 15. How can we improve the current model? Using the cloud!!! WatchGuard Training Internet Internet link Firewall Anti-spam Quarantine Email Server
  • 16.
  • 18. Visítenos en el stand de AEC Electrónica y regístrese para la rifa de un iPod Shuffle.

Notas do Editor

  1. WatchGuard XCSAdministration Training Copyright © 2004-2005 watchguard Technologies Inc. All Rights Reserved
  2. The other reasons cybercrooks are hard to stop are legal, political, and financial. I’m going to sum this point up by telling one story that stands in for many others like it. [first bullet] In 2003, a lawyer named Aaron Kornblum filed Microsoft’s first lawsuit against spammers. Kornblum was a former Air Force prosecutor, and the state of Washington had just passed the Commercial Electronic Mail Act. This gave him a legal basis to try to stop the millions of messages spammers were sending to people with Hotmail accounts. The federal CAN-SPAM act hadn’t been passed yet. Microsoft operates 130,000 email accounts outside of spam filters. They never send email from these accounts and the addresses are never posted – yet in 2003, they had received 18 million emails. They believed spammers were using “dictionary attacks” against all addresses ending in “@hotmail.com.” They also found a lot of emails from spammers that claimed they were FROM hotmail.com. [second bullet] Nobody knows who spammers are! They can hide behind various IP addresses and aliases. So Kornblum had to go through a discovery phase, sending subpoenas to Internet Service Providers, forcing them to reveal who controlled the addresses that the spam was coming from. His team sent out more than 150 “John Doe” subpoenas. [third bullet] Armed with the info from the ISPs, Kornblum and his staff pored through five million addresses, finding which email accounts were owned or controlled by the same entity. This was how they determined who the worst offenders were. Among the small-time spammers were certain individual companies responsible for millions of spam emails. They became the main targets of Microsoft’s legal team. [fourth bullet] Microsoft then reaches out to other companies plagued by spam. Pfizer is especially eager to help. Why? Because they make Viagra! Ever seen any spam related to Viagra? Anyone? …Bueller? [fifth bullet] The coalition does a great job of their detective work, because various state Attorneys General – most notably, the New York Attorney General, Eliot Spitzer – advise them on how to gather evidence so it will hold up in court. Law enforcement helps, too. The evidence leads to this guy [hit space bar]. Robert Soloway, caught and convicted in December 2003. He is ordered to stop sending spam email and to pay $7 million dollars in damages. Happy ending, right? It took nine months, but they captured a spam king. But.. .there’s more to the story.
  3. [first bullet] Soloway simply was not going to stop spamming. Endless fountain of excuses: “I didn’t send them, my company sent them.” “My company didn’t send them, our affiliates sent them, and I can’t control them.” [second bullet] Soloway owed seven million to Microsoft and ten million to a company in Oklahoma. He kept appealing until the appeals ran out. But he didn’t pay, and authorities could not find his bank accounts. [third bullet] With a permanent injunction forbidding him to send email in the United States, Soloway relocated his operation to a country where his activities are not illegal, and they won’t extradite him to the US. Back in business! [fourth bullet] Because he ignored the results of civil trials, he is arrested under criminal law. A federal jury indicted him on charges brought by the FBI, the IRS, the FTC, and the US Postal Service. More legal wrangling ensues. [fifth bullet] July 2008, after a plea deal, he agrees to serve nearly four years in prison. But think about it – his sentence is 47 months. It took 67 months to catch, convict, and stop him! [last sentence] Bottom line: It took five years in court, numerous major corporations, and several branches of Federal and State governments to stop this spammer. During most of that time, he kept operating. In one three-month period, he sent more than 90 million spam messages. This is just one spammer! So if you’re counting on the good guys to stop all the bad guys for you… you need a new plan. You’re gonna have to learn to defend yourself!
  4. WatchGuard XCSAdministration Training Copyright © 2004-2005 watchguard Technologies Inc. All Rights Reserved