Enviar pesquisa
Carregar
Secret Nuclear Research Facility Risk Assessment
•
Transferir como ODP, PDF
•
2 gostaram
•
557 visualizações
Título melhorado com IA
Stefan Fodor
Seguir
Risk ass
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 18
Baixar agora
Recomendados
9.0 security (2)
9.0 security (2)
Frank Victory
Fingerprinting healthcare institutions
Fingerprinting healthcare institutions
securityxploded
Final mojor project risk assesment
Final mojor project risk assesment
conornorton
Psico
Psico
Karem Nuñez
Common digital project risks
Common digital project risks
Richard Adams
Ipma2010 Presentation Omer Ertekin
Ipma2010 Presentation Omer Ertekin
Ömer Ertekin
pfSense presentation
pfSense presentation
Simon Vass
Risk Management for digital projects
Risk Management for digital projects
Reactive, part of Accenture Interactive
Recomendados
9.0 security (2)
9.0 security (2)
Frank Victory
Fingerprinting healthcare institutions
Fingerprinting healthcare institutions
securityxploded
Final mojor project risk assesment
Final mojor project risk assesment
conornorton
Psico
Psico
Karem Nuñez
Common digital project risks
Common digital project risks
Richard Adams
Ipma2010 Presentation Omer Ertekin
Ipma2010 Presentation Omer Ertekin
Ömer Ertekin
pfSense presentation
pfSense presentation
Simon Vass
Risk Management for digital projects
Risk Management for digital projects
Reactive, part of Accenture Interactive
Threat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPR
Jürgen Ambrosi
Windows Live Forensics 101
Windows Live Forensics 101
Arpan Raval
Anton Chuvakin on Discovering That Your Linux Box is Hacked
Anton Chuvakin on Discovering That Your Linux Box is Hacked
Anton Chuvakin
Windows network security
Windows network security
Information Technology
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Vinod Kumar
Final presentation of IT security project
Final presentation of IT security project
Armandas Rokas
Ids 009 network attacks
Ids 009 network attacks
jyoti_lakhani
Computer Systems Security
Computer Systems Security
drkelleher
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
Miigaa Mine
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
tehkotak4
Seucrity in a nutshell
Seucrity in a nutshell
Yahia Kandeel
Penetration testing, What’s this?
Penetration testing, What’s this?
Dmitry Evteev
InsiderThreat-2016NDITS
InsiderThreat-2016NDITS
Mike Saunders
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
Dan Morrill
Reconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awareness
Leon Teale
SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
Splunk
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacks
Microsoft
Securing Open Source Databases
Securing Open Source Databases
Gazzang
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
Somyos U.
Coding Gateway - Exam Stefan
Coding Gateway - Exam Stefan
Stefan Fodor
Collaboration Tools and Methods in Software Development
Collaboration Tools and Methods in Software Development
Stefan Fodor
Mais conteúdo relacionado
Semelhante a Secret Nuclear Research Facility Risk Assessment
Threat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPR
Jürgen Ambrosi
Windows Live Forensics 101
Windows Live Forensics 101
Arpan Raval
Anton Chuvakin on Discovering That Your Linux Box is Hacked
Anton Chuvakin on Discovering That Your Linux Box is Hacked
Anton Chuvakin
Windows network security
Windows network security
Information Technology
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Vinod Kumar
Final presentation of IT security project
Final presentation of IT security project
Armandas Rokas
Ids 009 network attacks
Ids 009 network attacks
jyoti_lakhani
Computer Systems Security
Computer Systems Security
drkelleher
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
Miigaa Mine
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
tehkotak4
Seucrity in a nutshell
Seucrity in a nutshell
Yahia Kandeel
Penetration testing, What’s this?
Penetration testing, What’s this?
Dmitry Evteev
InsiderThreat-2016NDITS
InsiderThreat-2016NDITS
Mike Saunders
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
Dan Morrill
Reconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awareness
Leon Teale
SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
Splunk
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacks
Microsoft
Securing Open Source Databases
Securing Open Source Databases
Gazzang
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
Somyos U.
Semelhante a Secret Nuclear Research Facility Risk Assessment
(20)
Threat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPR
Windows Live Forensics 101
Windows Live Forensics 101
Anton Chuvakin on Discovering That Your Linux Box is Hacked
Anton Chuvakin on Discovering That Your Linux Box is Hacked
Windows network security
Windows network security
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Final presentation of IT security project
Final presentation of IT security project
Ids 009 network attacks
Ids 009 network attacks
Computer Systems Security
Computer Systems Security
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
Seucrity in a nutshell
Seucrity in a nutshell
Penetration testing, What’s this?
Penetration testing, What’s this?
InsiderThreat-2016NDITS
InsiderThreat-2016NDITS
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
Reconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awareness
SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacks
Securing Open Source Databases
Securing Open Source Databases
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
Mais de Stefan Fodor
Coding Gateway - Exam Stefan
Coding Gateway - Exam Stefan
Stefan Fodor
Collaboration Tools and Methods in Software Development
Collaboration Tools and Methods in Software Development
Stefan Fodor
PacMan Rebourn
PacMan Rebourn
Stefan Fodor
Attack of the BEAST
Attack of the BEAST
Stefan Fodor
It Security Project
It Security Project
Stefan Fodor
Squash that Bug!
Squash that Bug!
Stefan Fodor
Protocols for Embedded Node
Protocols for Embedded Node
Stefan Fodor
Qualys Threads
Qualys Threads
Stefan Fodor
2FLogin
2FLogin
Stefan Fodor
Lillebaelt Academy - ro
Lillebaelt Academy - ro
Stefan Fodor
Ruby on Rails 3
Ruby on Rails 3
Stefan Fodor
Side channel attacks
Side channel attacks
Stefan Fodor
Special Subject 1+2: RoR 2
Special Subject 1+2: RoR 2
Stefan Fodor
dry_run_exam
dry_run_exam
Stefan Fodor
Facebook
Facebook
Stefan Fodor
Logs
Logs
Stefan Fodor
Reconnaissance software
Reconnaissance software
Stefan Fodor
Special Subject 1+2: RoR 1
Special Subject 1+2: RoR 1
Stefan Fodor
Network proj 1.1
Network proj 1.1
Stefan Fodor
Network telnet ssh
Network telnet ssh
Stefan Fodor
Mais de Stefan Fodor
(20)
Coding Gateway - Exam Stefan
Coding Gateway - Exam Stefan
Collaboration Tools and Methods in Software Development
Collaboration Tools and Methods in Software Development
PacMan Rebourn
PacMan Rebourn
Attack of the BEAST
Attack of the BEAST
It Security Project
It Security Project
Squash that Bug!
Squash that Bug!
Protocols for Embedded Node
Protocols for Embedded Node
Qualys Threads
Qualys Threads
2FLogin
2FLogin
Lillebaelt Academy - ro
Lillebaelt Academy - ro
Ruby on Rails 3
Ruby on Rails 3
Side channel attacks
Side channel attacks
Special Subject 1+2: RoR 2
Special Subject 1+2: RoR 2
dry_run_exam
dry_run_exam
Facebook
Facebook
Logs
Logs
Reconnaissance software
Reconnaissance software
Special Subject 1+2: RoR 1
Special Subject 1+2: RoR 1
Network proj 1.1
Network proj 1.1
Network telnet ssh
Network telnet ssh
Último
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Neo4j
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
AndikSusilo4
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Último
(20)
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Secret Nuclear Research Facility Risk Assessment
1.
2.
3.
4.
Recommendations
5.
Resulted Documentation
6.
7.
8.
9.
10.
Office/Lab LAN
: 172.16.2.0/24
11.
VPN connection to
Headquarter
12.
One pfSense as
router, gateway and firewall
13.
14.
Web Server
15.
Database Server
16.
17.
18.
19.
Firefox web browser
20.
Thunderbird Mail Client
21.
Office Suite
22.
23.
CD-ROM
24.
4 x USB
port
25.
26.
(DVL OS for
Web Server)
27.
Specific Server Daemon
Running
28.
29.
CD-ROM
30.
4 x USB
port
31.
32.
Confidential organization files
33.
Work files
34.
35.
Mail
36.
Workstations
37.
Classified activities
38.
39.
Confidential organization files
EH
40.
Work files
M
41.
42.
Confidential organization files
H
43.
Work files
M
44.
45.
46.
Social Engineering
47.
48.
Information Theft
49.
Social Engineering
50.
51.
Physical damage
52.
53.
54.
DoS
55.
System failures
56.
57.
58.
DoS FTP server
used as “file server” Users, Hackers, Secret Agents Access to sensitive information Data tempering Oudates and unpatched software Malicious users System crash DoS System failures Remote Access Vulnerability Identification
59.
60.
61.
62.
63.
64.
65.
Baixar agora