Академический Документы
Профессиональный Документы
Культура Документы
2
Security is freedom from, or
resilience against, potential harm
(or other unwanted coercive
change) caused by others.
3
Problem One
4
VULNERABILITY SCANS
▹ Vulnerability scans search for known system vulnerabilities and can be done
automatically
▹ As it is necessary for maintaining information security of a company, the
frequency of vulnerability scan at least done quarterly. Some analysts have
observed some clients performing vulnerability scans even weekly
▹ Vulnerability scan provide a comprehensive baseline of what vulnerabilities
exist and what changed since the last report
▹ The focus is to list the known software vulnerabilities that could be exploited
▹ Typically, it is conducted by in-house staff using authenticated credentials.
▹ Through this scans, we are able to detect when equipment could be
compromised
5
PENETRATION TESTING
6
SOCIAL ENGINEERING
▹ Social engineering penetration testing is the practice of attempting typical social engineering
scams on a company’s employees to ascertain the organization’s level of vulnerability to that
type of exploit
▹ This test is designed to test employees’ adherence to the security policies and practices
defined by management
▹ This would provide a company with information about how easily an intruder could convince
employees to break security rules or provide access to sensitive information
▹ Social engineering testing can be performed in two modes: off-site and on-site
▹ Active off-site methods (phising) are designed to make employees divulge information
intended for internal use only. (example: phone phising, email phising, sms phising)
▹ On site engagement means that testers apply various techniques to gain physical access to
the office target company.
▹ The value of social engineering will uncover security weaknss in the physical security,
corporate security policies connected to proper usage and disposal of sensitive data, and
employees’ security awareness and implementation
7
PHYSICAL PENETRATION TESTING
8
WAR-DEALING
9
News
Find an article on a recent computer security incident or breach.
10
FACEBOOK
11
28 SEPTEMBER 2018
https://www.vox.com/2018/9/28/17914598/facebook-new-hack-data-breach-50-million
https://www.wired.com/story/facebook-security-breach-50-million-accounts/
12
Identify as many of the following elements as possible:
1. Threat Agent
2. Vulnerability
3. Assets Affected
4. Countermeasures Applied
13
Threat Agent
The term Threat Agent is used to indicate an individual or group that can
manifest a threat. It is fundamental to identify who would want to exploit the
assets of a company, and how they might use them against the company.
In this case, we can conclude that the Threat Agent comes from outside the
company. In this case, attackers exploited a vulnerability that allowed them access to
personal data. Those attackers are threat agents.
https://en.wikipedia.org/wiki/Threat_(computer)
https://techcrunch.com/2018/09/28/everything-you-need-to-know-about-facebooks-data-breach-affecting-50m-
users/
14
Vulnerability
In this case, the company stated in an official blog post that earlier this
week, on Tuesday, September 25, it identified a vulnerability in its code that
had been present and unnoticed for over a year. That vulnerability gave
hackers the ability to “take over people’s accounts” by stealing their access
tokens — basically, the “digital keys” that allow people to stay logged in for
days, weeks, or months at a time.
https://www.vox.com/2018/9/28/17914598/facebook-new-hack-data-breach-50-million
15
Assets Affected
https://techcrunch.com/2018/09/28/everything-you-need-to-know-about-facebooks-data-breach-affecting-50m-users/
https://www.wired.com/story/facebook-security-breach-50-million-accounts/
https://www.investopedia.com › Investing › Financial Analysis
16
Countermeasure Applied
In this case, not one but three bugs led to the data exposure;
1. The bug prompted Facebook’s video upload tool to mistakenly show
up on the View As page
2. Uploader generate an access token, what allows you to remain
logged into your account without having to sign in everything you
visit, that had the same sign-in permissions as the Facebook mobile
app.
3. When the video uploader did appear in “View As” mode, it triggered
an access code for whoever the hacker was searching for.
17
Countermeasure Applied
In other words, Facebook says it fixed the vulnerability, and then began
resetting the access tokens of people to protect the security of their
accounts.
https://techcrunch.com/2018/09/28/everything-you-need-to-know-about-facebooks-data-breach-affecting-50m-users/
18
Recommended Safeguards
Ways to improve
19
Safeguards
20
Safeguards
21
Thank you :)