SlideShare uma empresa Scribd logo
1 de 17
-           •
-                   •
        -           •
                -   •


    -


            -

        -



                    2
Spearphishing         .1
http://www.fbi.gov/news/stories/2009/april/spea
                       rphishing_040109


                                Hacktivism         .2
         http://en.wikipedia.org/wiki/Hacktivism


                               Anonymous           .3
                         hacktivist
            imageboard 4chan

                                        .

                                    Botnets        .4
                'bot


                                    Rootkits       .5




                                                        3
•

               •

USCYBERCOM).
               •



               •




                   (McAfee).
                          4
–
                                                                  –
                 Anonymous Hacktivism                             –
                                                                  –
                                                                  –
                                                                  –

   ( rootkits ) ( botnets                                         –
                                                                  –
                                                                  –
                                  rootkits botnets

                                                                        5
http://www.mcafee.com/us/resources/reports/rp-threat-predictions-2012.pdf
•

•

•



•


•


•




    6
•
-
-


    •


    •

    •

    •

        7
http://www.mcafee.com/us/resources/reports/rp-threat-predictions-2012.pdf



                                                    https://www.isc2.org/

                                                                     IEEE
                                 http://spectrum.ieee.org/telecom/security

                                                                       SAN
                                                      https://isc.sans.edu/

                                                        –
                              http://www.howstuffworks.com/firewall.htm


                                                  http://www.sawmill.net/


     http://www.fastcompany.com/magazine/160/visa-secret-security-center




                                                                              8
9
10
•
    –
    –
    –
•
    –
    –
    –
•


        11
.           •
        –
        –
        –
        –
        –
        –
        –
    •


            12
•

                                                          –
                                                          –
129.32.100.1       129.32.100.1 -255.255.255.0 ->     •
                                       129.32.100.255
 129.32.100.1 ->      129.32.100.1 – 0.0.0.255 ->     •
                                       129.32.100.255
                                                          –
129.32.100.1       129.32.100.1 -255.255.255.0 ->     •
                                       129.32.100.255
 129.32.100.1 ->      129.32.100.1 – 0.0.0.255 ->     •
                                       129.32.100.255
                                                          –
                                                          –

                                                          –


                                                              13
123.134.1.0 - 123.134.1.255                 -
    - 123.134.1.0 255.255.255.0                            -
                  - 123.134.1.0/24                         -
         123.134.1.0 0.0.0.255                              -
                        - "DMZ" - 123.134.1.0/24            -


                                                          -
    - 10.11.12.0-10.11.12.255       –                      -
–                                                         -
                                  10.11.12.13 - 10.11.12.13
                           –“                              -
                              10.11.12.13 10.11.12.13”
                                                      -
                                                           -
                                10.11.12.13 255.255.255.0”

                                                               14
-
               - 10.11.12.0-10.11.12.255     –                      -
      –                                                            -
                                           10.11.12.13 - 10.11.12.13
                                                                    -
” “10.11.12.13                                                 -
                                                   10.11.12.13
               !!!:                                            -
                                                                    -
 10.11.12.13                                                   -
                                                255.255.255.0”




                                                                        15
®                 - Hardware         –
                                (SMS)
    ®                  - Software       –
                                (SMS)
                              -         –
         Solar Winds        –           –
Novell ZENworks          –              –
Juniper Networks® -                 –
                          (NSM)
                        McAfee IDS -             –
     Clarity Inventory Manager -                 –
ObserveIt 3rd -                                  –
                                 Party Monitor
    Solar Winds -                                –
                       -                         –

Mais conteúdo relacionado

Destaque

Cheese Unit Day 2 August 16
Cheese Unit Day 2 August 16Cheese Unit Day 2 August 16
Cheese Unit Day 2 August 16Rachael Mann
 
Intro to Cheese August 15
Intro to Cheese August 15Intro to Cheese August 15
Intro to Cheese August 15Rachael Mann
 
Visualizing the Evolution of Systems and their Library Dependencies
Visualizing the Evolution of Systems and their Library DependenciesVisualizing the Evolution of Systems and their Library Dependencies
Visualizing the Evolution of Systems and their Library DependenciesAu Gai
 
扶青團經營建議方針
扶青團經營建議方針扶青團經營建議方針
扶青團經營建議方針mrJim Note
 
Ppt struc ture conditionaldfs
Ppt struc ture conditionaldfsPpt struc ture conditionaldfs
Ppt struc ture conditionaldfsBachtiar Idris
 
Outsmart.it plagiarism detection claim and debunk
Outsmart.it plagiarism detection claim and debunkOutsmart.it plagiarism detection claim and debunk
Outsmart.it plagiarism detection claim and debunkmauryeliz
 
คิว ใบงานที่ 3 เรื่อง ขอบข่ายและประเภทของโครงงาน
คิว ใบงานที่ 3 เรื่อง ขอบข่ายและประเภทของโครงงานคิว ใบงานที่ 3 เรื่อง ขอบข่ายและประเภทของโครงงาน
คิว ใบงานที่ 3 เรื่อง ขอบข่ายและประเภทของโครงงานChanon Saiatit
 
Connect and combine
Connect and combineConnect and combine
Connect and combineAjay Tyagi
 
01 modulo 1 guia instructor
01 modulo 1   guia instructor01 modulo 1   guia instructor
01 modulo 1 guia instructorEsly Rodezno
 
годишен Doklad министър-изпълнение2012-сайт
годишен Doklad министър-изпълнение2012-сайтгодишен Doklad министър-изпълнение2012-сайт
годишен Doklad министър-изпълнение2012-сайтniod
 

Destaque (12)

Cheese Unit Day 2 August 16
Cheese Unit Day 2 August 16Cheese Unit Day 2 August 16
Cheese Unit Day 2 August 16
 
192
192192
192
 
Intro to Cheese August 15
Intro to Cheese August 15Intro to Cheese August 15
Intro to Cheese August 15
 
Visualizing the Evolution of Systems and their Library Dependencies
Visualizing the Evolution of Systems and their Library DependenciesVisualizing the Evolution of Systems and their Library Dependencies
Visualizing the Evolution of Systems and their Library Dependencies
 
Seo shiksha
Seo shikshaSeo shiksha
Seo shiksha
 
扶青團經營建議方針
扶青團經營建議方針扶青團經營建議方針
扶青團經營建議方針
 
Ppt struc ture conditionaldfs
Ppt struc ture conditionaldfsPpt struc ture conditionaldfs
Ppt struc ture conditionaldfs
 
Outsmart.it plagiarism detection claim and debunk
Outsmart.it plagiarism detection claim and debunkOutsmart.it plagiarism detection claim and debunk
Outsmart.it plagiarism detection claim and debunk
 
คิว ใบงานที่ 3 เรื่อง ขอบข่ายและประเภทของโครงงาน
คิว ใบงานที่ 3 เรื่อง ขอบข่ายและประเภทของโครงงานคิว ใบงานที่ 3 เรื่อง ขอบข่ายและประเภทของโครงงาน
คิว ใบงานที่ 3 เรื่อง ขอบข่ายและประเภทของโครงงาน
 
Connect and combine
Connect and combineConnect and combine
Connect and combine
 
01 modulo 1 guia instructor
01 modulo 1   guia instructor01 modulo 1   guia instructor
01 modulo 1 guia instructor
 
годишен Doklad министър-изпълнение2012-сайт
годишен Doklad министър-изпълнение2012-сайтгодишен Doklad министър-изпълнение2012-сайт
годишен Doklad министър-изпълнение2012-сайт
 

Semelhante a Cyber Security Arabic

Deploying 3 times a day without a downtime @ Rocket Tech Summit in Berlin
Deploying 3 times a day without a downtime @ Rocket Tech Summit in BerlinDeploying 3 times a day without a downtime @ Rocket Tech Summit in Berlin
Deploying 3 times a day without a downtime @ Rocket Tech Summit in BerlinAlessandro Nadalin
 
Netclean Whitebox by Practeo
Netclean Whitebox by PracteoNetclean Whitebox by Practeo
Netclean Whitebox by Practeoflyingpotato
 
hacking-embedded-devices.pptx
hacking-embedded-devices.pptxhacking-embedded-devices.pptx
hacking-embedded-devices.pptxssuserfcf43f
 
001 network toi_basics_v1
001 network toi_basics_v1001 network toi_basics_v1
001 network toi_basics_v1Hisao Tsujimura
 
Usul Fiqh dan Kaedah Fiqh
Usul Fiqh dan Kaedah FiqhUsul Fiqh dan Kaedah Fiqh
Usul Fiqh dan Kaedah FiqhMuhammad Syahir
 
DevOps for Opensource Geospatial Applications
DevOps for Opensource Geospatial ApplicationsDevOps for Opensource Geospatial Applications
DevOps for Opensource Geospatial Applicationstlpinney
 
PLMCE - Security and why you need to review yours
PLMCE - Security and why you need to review yoursPLMCE - Security and why you need to review yours
PLMCE - Security and why you need to review yoursDavid Busby, CISSP
 
Keeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runitKeeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runitMen and Mice
 

Semelhante a Cyber Security Arabic (15)

Xakep
XakepXakep
Xakep
 
Xakep(eldew.miniih.com)
Xakep(eldew.miniih.com)Xakep(eldew.miniih.com)
Xakep(eldew.miniih.com)
 
Xakep
XakepXakep
Xakep
 
MySQL Monitoring 101
MySQL Monitoring 101MySQL Monitoring 101
MySQL Monitoring 101
 
Deploying 3 times a day without a downtime @ Rocket Tech Summit in Berlin
Deploying 3 times a day without a downtime @ Rocket Tech Summit in BerlinDeploying 3 times a day without a downtime @ Rocket Tech Summit in Berlin
Deploying 3 times a day without a downtime @ Rocket Tech Summit in Berlin
 
Netclean Whitebox by Practeo
Netclean Whitebox by PracteoNetclean Whitebox by Practeo
Netclean Whitebox by Practeo
 
Test
TestTest
Test
 
banthai
banthaibanthai
banthai
 
hacking-embedded-devices.pptx
hacking-embedded-devices.pptxhacking-embedded-devices.pptx
hacking-embedded-devices.pptx
 
001 network toi_basics_v1
001 network toi_basics_v1001 network toi_basics_v1
001 network toi_basics_v1
 
Usul Fiqh dan Kaedah Fiqh
Usul Fiqh dan Kaedah FiqhUsul Fiqh dan Kaedah Fiqh
Usul Fiqh dan Kaedah Fiqh
 
DevOps for Opensource Geospatial Applications
DevOps for Opensource Geospatial ApplicationsDevOps for Opensource Geospatial Applications
DevOps for Opensource Geospatial Applications
 
PLMCE - Security and why you need to review yours
PLMCE - Security and why you need to review yoursPLMCE - Security and why you need to review yours
PLMCE - Security and why you need to review yours
 
CloudKit
CloudKitCloudKit
CloudKit
 
Keeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runitKeeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runit
 

Cyber Security Arabic

  • 1.
  • 2. - • - • - • - • - - - 2
  • 3. Spearphishing .1 http://www.fbi.gov/news/stories/2009/april/spea rphishing_040109 Hacktivism .2 http://en.wikipedia.org/wiki/Hacktivism Anonymous .3 hacktivist imageboard 4chan . Botnets .4 'bot Rootkits .5 3
  • 4. • USCYBERCOM). • • (McAfee). 4
  • 5. – Anonymous Hacktivism – – – – ( rootkits ) ( botnets – – – rootkits botnets 5 http://www.mcafee.com/us/resources/reports/rp-threat-predictions-2012.pdf
  • 7. • - - • • • • 7
  • 8. http://www.mcafee.com/us/resources/reports/rp-threat-predictions-2012.pdf https://www.isc2.org/ IEEE http://spectrum.ieee.org/telecom/security SAN https://isc.sans.edu/ – http://www.howstuffworks.com/firewall.htm http://www.sawmill.net/ http://www.fastcompany.com/magazine/160/visa-secret-security-center 8
  • 9. 9
  • 10. 10
  • 11. – – – • – – – • 11
  • 12. . • – – – – – – – • 12
  • 13. – – 129.32.100.1 129.32.100.1 -255.255.255.0 -> • 129.32.100.255 129.32.100.1 -> 129.32.100.1 – 0.0.0.255 -> • 129.32.100.255 – 129.32.100.1 129.32.100.1 -255.255.255.0 -> • 129.32.100.255 129.32.100.1 -> 129.32.100.1 – 0.0.0.255 -> • 129.32.100.255 – – – 13
  • 14. 123.134.1.0 - 123.134.1.255 - - 123.134.1.0 255.255.255.0 - - 123.134.1.0/24 - 123.134.1.0 0.0.0.255 - - "DMZ" - 123.134.1.0/24 - - - 10.11.12.0-10.11.12.255 – - – - 10.11.12.13 - 10.11.12.13 –“ - 10.11.12.13 10.11.12.13” - - 10.11.12.13 255.255.255.0” 14
  • 15. - - 10.11.12.0-10.11.12.255 – - – - 10.11.12.13 - 10.11.12.13 - ” “10.11.12.13 - 10.11.12.13 !!!: - - 10.11.12.13 - 255.255.255.0” 15
  • 16. ® - Hardware – (SMS) ® - Software – (SMS) - – Solar Winds – – Novell ZENworks – –
  • 17. Juniper Networks® - – (NSM) McAfee IDS - – Clarity Inventory Manager - – ObserveIt 3rd - – Party Monitor Solar Winds - – - –

Notas do Editor

  1. Taken from President’s International Strategy for Cyberspace (ISC)
  2. Taken from President’s International Strategy for Cyberspace (ISC)