SlideShare a Scribd company logo
Let's prepare for what's next, and not what was last...
Keet Malin Sugathadasa
Software Engineer
Sysco Labs
Cyber Security and
Cloud Computing
• What is Cyber Security?
• Cryptanalysis
• Computer Hacking
• Cloud Computing Architecture
• Cloud Security
• Notorious 9 threats in cloud computing
• AWS Cloud Security
AGENDA
Cyber Security
Are we really secure?
Best Practices and Measures
taken to protect a computer or
a computer system, against an
unauthorized access or attack
• Hardware, Software, Data...
• Security Standards
• Ethical Hacking
• Best Practices
CYBER SECURITY
Cyber Security

Recommended for you

Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation

The document provides tips for keeping a network secure, including always keeping virus software and Windows updates enabled, using firewalls, backing up data regularly, and using strong passwords. It warns about common password risks like using obvious words or writing passwords down. The document also covers securing laptops, email, wireless networks, and avoiding risks from open networks. Proper authentication, surge protection, and password protecting are emphasized as important security best practices.

Cyber attack
Cyber attackCyber attack
Cyber attack

CYBER ATTACK INTRODUCTION,TYPES OF CYBER ATTACK,DOS ATTACK,MAJOR CYBER ATTACK IN INDIA,PREVENTION TIPS

cyber attacktypes of cyber attackdos attack
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security

The presentation describes basics of cryptography and information security. It covers goals of cryptography, history of cipher symmetric and public key cryptography

symmetric crptographypublic key cryptographysize of key
• Interruption
• Interception
• Modification
• Fabrication
Threats and Attacks on Security
CYBER SECURITY
• Confidentiality (Privacy)
• Integrity (Trust)
• Availability
The CIA in Computer Security
CYBER SECURITY
Cryptanalysis
Analyzing and breaking encryption schemes
This uses a simple file containing
words that can be surprisingly
found in a dictionary.
• “Iamthebest”
• “Iloveblahblah”
CRYPTANALYSIS
Dictionary Attacks

Recommended for you

Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security

The term cyber security is used to refer to the security offered through on-line services to protect your online information. With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also.

aking
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos

This document provides an introduction to cyber security. It defines cyber security as protecting cyberspace from attacks, and defines a cyber attack. It explains that cyberspace is where online communication occurs, via the internet. Cyber security is important because it affects everyone who uses computers and networks. Cyber security training is needed to establish human controls. Cyber attacks can target businesses, governments, institutions and individuals. Attackers include hackers, criminals, spies and nation-states who use methods like malware, social engineering, and network attacks. Defenders of cyber security include ICT teams, security vendors, manufacturers, and governments. Information systems and quality data are important assets to protect. Emerging cyber threats include cloud services, ransomware, spear ph

Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence

Cyber Security & Data Protection India Summit 2018 aims to convene the best minds in Cybersecurity under one roof to create an interactive milieu for exchange of knowledge and ideas. The event will endeavour to address the emerging and continuing threats to Cybersecurity and its changing landscape, as well as respond to increasing risk of security breaches and security governance, application security, cloud based security, Network, Mobile and endpoint security and other cyber risks in the India and abroad.

#cybersecurity#cybercrime#artificalintelligence
dictionary + non-dictionary words
by working through all possible
alpha-numeric combinations
• “aaaa901”
• “Iloveblahblah2233a”
CRYPTANALYSIS
Brute Force Attack
Keeps a table of hashes for all
possible password combinations.
Adding salts will make this task
even tougher
• “aaaa901”
• “fsdfwer232532”
CRYPTANALYSIS
Rainbow Table Attack
Ask the user for his or her
password. A phishing email leads
the unsuspecting reader to a faked
portal and collect credentials
• Sending a fake email related to
bank payments
CRYPTANALYSIS
Phishing
Social engineering takes the whole
‘ask the user’ concept outside of
the inbox that phishing tends to
stick with and into the real world.
• Call a person posing as a bank
or other security guy
CRYPTANALYSIS
Social Engineering

Recommended for you

Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection

8.1 Intruders 8.2 Classes of intruders 8.3 Examples of Intrusion 8.4 Security Intrusion & Detection 8.5 Intrusion Techniques 8.6 Intrusion Detection Systems 8.7 IDS Principles 8.8 IDS Requirements 8.9 Host-Based IDS 8.10 Network-Based IDS 8.11 Intrusion Detection Exchange Format 8.12 Honeypot

 
by CAS
intrusion detectionidsintrusion
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing

Cloud computing provides a way for organizations to share distributed resources over a network. However, data security is a major concern in cloud computing since data is stored remotely. The document discusses several techniques used for data security in cloud computing including authentication, encryption, data masking, and data traceability. The latest technologies discussed are a cloud information gateway that can control data transmission and secure logic migration that transfers applications to an internal sandbox for secure execution.

Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt

This document discusses network security and cryptography. It begins by defining a network and common network threats. It then discusses network security, including transit and traffic security. It covers problems and attacks like secrecy, authentication, and integrity control. The document introduces cryptography and its use in encryption and decryption to securely transmit data. It describes algorithms like RSA, substitution ciphers, and transposition ciphers. It also covers advantages and disadvantages of cryptography along with a proposed concept to strengthen encryption security.

Computer Hacking
Cyber war is the new battlefield now...
Anonymous
Your ignorance is our Power...
• Trojans
• Backdoors
• Sniffers
• Rootkits
• Exploits
• Buffer overflows
• SQL injection
Hacking Technologies
COMPUTER HACKING
• Reconnaissance (“Gathering information about a potential target”)
• Scanning (“Using the info gathered during reconnaissance to examine
the network”)
• Gaining access (“Owning the system”)
• Maintaining access (“Backdoors, Rootkits, Trojans”)
• Covering tracks (“Alter log entries, removing alarms”)
5 Phases in Computer Hacking
COMPUTER HACKING

Recommended for you

Wireless network security
Wireless network securityWireless network security
Wireless network security

A presentation which on Wireless Network Security. It contains Introduction to wireless networking, security threats and risks, best practices on using wireless networks.

wireless network802.11802.11i
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks

Cyber attacks can take several forms, including cyber fraud aimed at monetary gain, cyber spying to obtain private information, cyber stalking and bullying to frighten or intimidate individuals, cyber assault to cause damage through malware or denial of service attacks, and cyber warfare between nation states seeking to disrupt critical infrastructure through digital means.

cyberfraudcyberattackcomputer security
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation

This document discusses different types of hackers - white hat hackers who use their skills ethically for security purposes, black hat hackers who hack illegally such as for credit card theft, and grey hat hackers who sometimes act ethically and sometimes not. It defines ethical hacking as using programming skills to test vulnerabilities in computer systems through penetration testing. The document outlines different hacking methods like website, email, and password hacking and computer hacking. It notes both advantages of ethical hacking for security and disadvantages of unethical hacking.

hacking
Hacker Classes
COMPUTER HACKING
• Discuss the need for testing
• Sign an NDA
• Tiger team prepares a schedule for testing
• Conduct tests
• Analysis and report preparation
• Present the report to the client
Conducting Ethical Hacking
COMPUTER HACKING
Legality in Sri Lanka
COMPUTER HACKING
source: http://www.slcert.gov.lk/Downloads/Acts/Computer_Crimes_Act_No_24_of_2007(E).pdf
Cloud Computer Architecture
Cloud is not magic, It’s just another computer...

Recommended for you

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security

This document discusses the history and definitions of cloud computing. It begins with various definitions of cloud computing from Wikipedia between 2007-2009 which evolved to emphasize dynamically scalable virtual resources provided over the internet. It then covers common characteristics of cloud computing like multi-tenancy, location independence, pay-per-use pricing and rapid scalability. The rest of the document details cloud computing models including public, private and hybrid clouds. It also outlines the different architectural layers of cloud computing from Software as a Service to Infrastructure as a Service. The document concludes with a discussion of security issues in cloud computing and a case study of security features in Amazon Web Services.

securitycloud computing
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges

Cloud Computing offers an on-demand and scalable access to a shared pool of resources hosted in a data center at providers’ site. It reduces the overheads of up-front investments and financial risks for the end-user. Regardless of the fact that cloud computing offers great advantages to the end users, there are several challenging issues that are mandatory to be addressed.

cloudsecurity
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY

This document discusses cyber security. It defines cyber security as technologies and processes designed to protect computers, networks, and data from unauthorized access and attacks over the internet. The three core principles of cyber security are confidentiality, integrity, and availability. Several types of cyber attacks are described such as malware, phishing, and denial of service attacks. Major historical cyber attacks are outlined including the Morris Worm in 1988 and the Anthem hack in 2015 that breached 80 million records. Common attack patterns and measures to prevent cyber attacks like using complex passwords and encryption are also summarized.

cybercrimeinternetattack
Definition of Cloud Computing - NIST
CLOUD COMPUTING ARCHITECTURE
source:
https://ww
w.nist.gov/
Service Models
CLOUD COMPUTING ARCHITECTURE
Cloud Security Basics
Security is a process, not a product...
Security in the cloud is much like
security in your on-premises data
centers - only without the costs of
maintaining facilities and
hardware.
In the cloud, you don’t have to manage
physical servers or storage devices.
Instead, you use software-based
security tools to monitor and
protect the flow of information into
and of out of your cloud resources.
CLOUD SECURITY BASICS
Cloud Security

Recommended for you

OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture

The document discusses the OSI security architecture and common network security threats and defenses. It begins with an introduction to the OSI security architecture proposed by ITU-T as a standard for defining and providing security across network layers. It then discusses (1) specific security mechanisms like encryption and digital signatures and pervasive mechanisms like security audits; (2) common passive and active security threats like eavesdropping and denial of service attacks; and (3) that passive attacks focus on prevention while active attacks require detection and recovery. It concludes with exercises asking about these topics.

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system

It's power-point presentation on software application that monitors a network or systems for malicious activity or policy violations.

networkinginformation securityinformation technology
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud

Whether you’re working exclusively on Azure or with multiple cloud environments, there are certain things you should consider when moving assets to the public cloud. As with any cloud deployment, security is a top priority, and moving your workloads to the Azure cloud doesn’t mean you’re not responsible for the security of your operating system, applications, and data. Building on the security of the Azure infrastructure, this shared security responsibility starts with making sure your environment is secure. In this session, we will discuss step-by-step what you need to do to secure access at the administrative, application and network layers.

azuremeetupsecurity
How Secure is the Cloud?
CLOUD SECURITY
source: https://www.youtube.com/watch?v=8g0NrHExD3g
Layer 1:
• Perimeter Defense
Layer 2:
• Clear Zone
Layer 3:
• Facility facade/ reception area
Layer 4:
• Hallway/ Escorted Area/ Gray Space
Layer 5:
• Data Center Room/ White Space
Layer 6:
• Data Center Cabinet/ White Space
CLOUD SECURITY
Strict Regulatory Standards Security Tools
Confidentiality DDoS Mitigation
Key Security Aspect in Cloud
CLOUD SECURITY
• Network Security
↳ Firewall
• Configuration Management
• Data Encryption
• Access Control
• Monitoring and Logging
Notorious Nine Threats
Cloud Security Alliance (CSA)

Recommended for you

Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...

Speech of Dmytro Shapovalov, Infrastructure Engineer at Cossack Labs, at Ruby Meditation #25 Kyiv 08.12.2018 Next conference - http://www.rubymeditation.com/ Making secure applications is not easy, especially when encryption tools are difficult and incomprehensible. We will talk about typical data security problems in web apps and how to implement encryption properly. We will review cryptographic approaches and exact tools that ensure that no sensitive data leaks from the application or database. Announcements and conference materials https://www.fb.me/RubyMeditation News https://twitter.com/RubyMeditation Photos https://www.instagram.com/RubyMeditation The stream of Ruby conferences (not just ours) https://t.me/RubyMeditation

#rubymeditation#ruby#rubyonrails
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud

This document discusses shared security responsibility in Azure. It provides an overview of security best practices when using Azure, including understanding the shared responsibility model, implementing network security practices, securing data and access, securely developing code, log management, and vulnerability management. It also describes Alert Logic security solutions that can help monitor Azure environments for threats across the application stack.

microsoftcloud securitycloud
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016

This deck was where good slides went to die and we felt they were useful in telling some of the journey more than we could in 50 minutes.

securityinnovationdevsecops
1. Data Breaches
2. Data Loss
3. Account or Service Traffic Hijacking
4. Insecure Interfaces and APIs
5. Denial of Service
6. Malicious Insiders
7. Abuse of Cloud Services
8. Insufficient Due Diligence
9. Shared Technology Vulnerabilities
NOTORIOUS NINE THREATS
AWS Cloud Security
Amazon Web Services Cloud Platform
AWS CLOUD SECURITY
Shared Responsibility
AWS Shield
AWS CLOUD SECURITY
• AWS Shield is a managed Distributed Denial
of Service (DDoS) protection service
• AWS Shield provides always-on detection and
automatic inline mitigations that minimize
application downtime and latency
• Happens real-time (No support needed)

Recommended for you

Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS Applications

This document provides an overview of Alert Logic's Security-as-a-Service offering. It describes Alert Logic's integrated multi-layer security solution that protects enterprise applications and cloud workloads from web application attacks, server and network activity, and vulnerabilities. It also discusses how Alert Logic assesses risks, blocks threats, detects anomalies, and ensures compliance. Alert Logic provides both security software and services to help secure hybrid and multi-cloud environments.

alert logicawsaws security
Managed Threat Detection and Response
Managed Threat Detection and ResponseManaged Threat Detection and Response
Managed Threat Detection and Response

This document discusses Alert Logic's Security-as-a-Service offering which provides an integrated multi-layer security solution to protect enterprise applications and cloud workloads across hosted data centers and hybrid environments. It protects against web application attacks, server and network activity, and vulnerabilities across software stacks. Alert Logic also provides security experts and services including assessment, blocking, detection, and compliance. The document then discusses best practices for securing an AWS environment including logical network segmentation, access management, configuration management, and understanding the shared responsibility model between cloud providers and customers.

alert logiccloud security
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...

The rapid rise of cloud data storage and applications has led to unease among adopters over the security of their data. Whether it is data stored in a public, private or hybrid cloud, or used in third party SaaS applications, companies have good reason to be concerned. In this session Protegrity CTO and data security thought leader Ulf Mattsson will focus on practical advice on what to look for in cloud service providers and a review of the technologies and architectures available to protect sensitive data in the cloud, both on- and off-site. Through real life use cases, Ulf will discuss solutions to some of the most common issues of data governance, usability, compliance and security in the cloud environment.

conferencedatarisk management
AWS WAF
AWS CLOUD SECURITY
• AWS WAF is a web application firewall that
helps protect your web applications from
common web exploits
• AWS WAF gives you control over which traffic
to allow or block to your web applications
• block common attack patterns, such as SQL
injection or cross-site scripting
AWS IAM
AWS CLOUD SECURITY
• Access Control
• Use AWS Identity and Access Management
(IAM) to control users' access to AWS services
• Create and manage users and groups, and
grant or deny access
1. AWS Artifact
2. AWS Certificate Manager
3. Amazon Cloud Directory
4. AWS CloudHSM
5. Amazon Cognito
6. AWS Directory Service
7. Amazon GuardDuty
8. Amazon Inspector
9. And many more...
AWS CLOUD SECURITY
source: https://aws.amazon.com/products/security/
Think twice
before you
connect

Recommended for you

Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014

A broad overview of what it takes to be secure. This is more of an introduction where we introduce the basic terms around Cloud Computing and how do we go about securing our information assets(Data, Applications and Infrastructure) The workshop was fun because all the slides were paired with real world examples of security breaches and attacks.

google compute engineazurecloud computing
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3

In early 2019, Microsoft created the AZ-900 Microsoft Azure Fundamentals certification. This is a certification for all individuals, IT or non IT background, who want to further their careers and learn how to navigate the Azure cloud platform. Learn about AZ-900 exam concepts and how to prepare and pass the exam

 
by CCG
Dark Insight: the Basic of Security - Alexander Obozinskiy
Dark Insight: the Basic of Security - Alexander ObozinskiyDark Insight: the Basic of Security - Alexander Obozinskiy
Dark Insight: the Basic of Security - Alexander Obozinskiy

The document discusses various topics related to cyber security including hardware threats, software threats, network threats, data threats, social engineering, securing systems, and recommended security tools. It lists examples of vulnerabilities and security issues across operating systems, software, networks, and data. It also provides recommendations for securing hardware, operating systems, software, networks, data, cryptography, and web applications.

information securitysecurity
Thank you

More Related Content

What's hot

Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
krprashant94
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
DDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceDDoS - Distributed Denial of Service
DDoS - Distributed Denial of Service
Er. Shiva K. Shrestha
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
Dr Naim R Kidwai
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Self-employed
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
Inderjeet Singh
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
Thushara92
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
Vishal Agarwal
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
sommerville-videos
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Ninh Nguyen
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
Yateesh Yadav
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
university of education,Lahore
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Roshan Ranabhat
 

What's hot (20)

Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
DDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceDDoS - Distributed Denial of Service
DDoS - Distributed Denial of Service
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 

Similar to Cyber Security and Cloud Computing

Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
Paulo Renato
 
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Ruby Meditation
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
Alert Logic
 
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
Shannon Lietz
 
Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS Applications
Alert Logic
 
Managed Threat Detection and Response
Managed Threat Detection and ResponseManaged Threat Detection and Response
Managed Threat Detection and Response
Alert Logic
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...
Ulf Mattsson
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3
CCG
 
Dark Insight: the Basic of Security - Alexander Obozinskiy
Dark Insight: the Basic of Security - Alexander ObozinskiyDark Insight: the Basic of Security - Alexander Obozinskiy
Dark Insight: the Basic of Security - Alexander Obozinskiy
Ruby Meditation
 
Cloud Security and some preferred practices
Cloud Security and some preferred practicesCloud Security and some preferred practices
Cloud Security and some preferred practices
Michael Pearce
 
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics ReadinessAlabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Toni de la Fuente
 
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptxDefenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Matthew Levy
 
Te chnical presentation networkexploits and security
Te chnical presentation networkexploits and securityTe chnical presentation networkexploits and security
Te chnical presentation networkexploits and security
Kartik Rao
 
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend MicroAWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
Amazon Web Services
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5
FRSecure
 
Cybersecurity Roadmap for Beginners
Cybersecurity Roadmap for BeginnersCybersecurity Roadmap for Beginners
Cybersecurity Roadmap for Beginners
Sanjeev Kumar Jaiswal
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
Karina Matos
 
Cloud Security Essentials 2.0 at RSA
Cloud Security Essentials 2.0 at RSACloud Security Essentials 2.0 at RSA
Cloud Security Essentials 2.0 at RSA
Shannon Lietz
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0
Trupti Shiralkar, CISSP
 

Similar to Cyber Security and Cloud Computing (20)

Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
 
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
 
Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS Applications
 
Managed Threat Detection and Response
Managed Threat Detection and ResponseManaged Threat Detection and Response
Managed Threat Detection and Response
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3
 
Dark Insight: the Basic of Security - Alexander Obozinskiy
Dark Insight: the Basic of Security - Alexander ObozinskiyDark Insight: the Basic of Security - Alexander Obozinskiy
Dark Insight: the Basic of Security - Alexander Obozinskiy
 
Cloud Security and some preferred practices
Cloud Security and some preferred practicesCloud Security and some preferred practices
Cloud Security and some preferred practices
 
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics ReadinessAlabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
 
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptxDefenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
 
Te chnical presentation networkexploits and security
Te chnical presentation networkexploits and securityTe chnical presentation networkexploits and security
Te chnical presentation networkexploits and security
 
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend MicroAWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5
 
Cybersecurity Roadmap for Beginners
Cybersecurity Roadmap for BeginnersCybersecurity Roadmap for Beginners
Cybersecurity Roadmap for Beginners
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
 
Cloud Security Essentials 2.0 at RSA
Cloud Security Essentials 2.0 at RSACloud Security Essentials 2.0 at RSA
Cloud Security Essentials 2.0 at RSA
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0
 

More from Keet Sugathadasa

Chaos Engineering - The Art of Breaking Things in Production
Chaos Engineering - The Art of Breaking Things in ProductionChaos Engineering - The Art of Breaking Things in Production
Chaos Engineering - The Art of Breaking Things in Production
Keet Sugathadasa
 
Site Reliability Engineering (SRE) - Tech Talk by Keet Sugathadasa
Site Reliability Engineering (SRE) - Tech Talk by Keet SugathadasaSite Reliability Engineering (SRE) - Tech Talk by Keet Sugathadasa
Site Reliability Engineering (SRE) - Tech Talk by Keet Sugathadasa
Keet Sugathadasa
 
Human Computer Interaction - Facebook Messenger
Human Computer Interaction - Facebook MessengerHuman Computer Interaction - Facebook Messenger
Human Computer Interaction - Facebook Messenger
Keet Sugathadasa
 
How to compete in hackathons
How to compete in hackathonsHow to compete in hackathons
How to compete in hackathons
Keet Sugathadasa
 
Quality Engineering - When to Stop Testing
Quality Engineering - When to Stop TestingQuality Engineering - When to Stop Testing
Quality Engineering - When to Stop Testing
Keet Sugathadasa
 
Training Report WSO2 internship
Training Report  WSO2 internshipTraining Report  WSO2 internship
Training Report WSO2 internship
Keet Sugathadasa
 
Object oriented programming interview questions
Object oriented programming interview questionsObject oriented programming interview questions
Object oriented programming interview questions
Keet Sugathadasa
 
Interview Facing Workshop
Interview Facing WorkshopInterview Facing Workshop
Interview Facing Workshop
Keet Sugathadasa
 
Revolutionizing digital authentication with gsma mobile connect
Revolutionizing digital authentication with gsma mobile connectRevolutionizing digital authentication with gsma mobile connect
Revolutionizing digital authentication with gsma mobile connect
Keet Sugathadasa
 

More from Keet Sugathadasa (9)

Chaos Engineering - The Art of Breaking Things in Production
Chaos Engineering - The Art of Breaking Things in ProductionChaos Engineering - The Art of Breaking Things in Production
Chaos Engineering - The Art of Breaking Things in Production
 
Site Reliability Engineering (SRE) - Tech Talk by Keet Sugathadasa
Site Reliability Engineering (SRE) - Tech Talk by Keet SugathadasaSite Reliability Engineering (SRE) - Tech Talk by Keet Sugathadasa
Site Reliability Engineering (SRE) - Tech Talk by Keet Sugathadasa
 
Human Computer Interaction - Facebook Messenger
Human Computer Interaction - Facebook MessengerHuman Computer Interaction - Facebook Messenger
Human Computer Interaction - Facebook Messenger
 
How to compete in hackathons
How to compete in hackathonsHow to compete in hackathons
How to compete in hackathons
 
Quality Engineering - When to Stop Testing
Quality Engineering - When to Stop TestingQuality Engineering - When to Stop Testing
Quality Engineering - When to Stop Testing
 
Training Report WSO2 internship
Training Report  WSO2 internshipTraining Report  WSO2 internship
Training Report WSO2 internship
 
Object oriented programming interview questions
Object oriented programming interview questionsObject oriented programming interview questions
Object oriented programming interview questions
 
Interview Facing Workshop
Interview Facing WorkshopInterview Facing Workshop
Interview Facing Workshop
 
Revolutionizing digital authentication with gsma mobile connect
Revolutionizing digital authentication with gsma mobile connectRevolutionizing digital authentication with gsma mobile connect
Revolutionizing digital authentication with gsma mobile connect
 

Recently uploaded

Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
BookNet Canada
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
Lidia A.
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
SynapseIndia
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
UiPathCommunity
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
Emerging Tech
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
Stephanie Beckett
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
KAMAL CHOUDHARY
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
Matthew Sinclair
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
RaminGhanbari2
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
Awais Yaseen
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
Vijayananda Mohire
 

Recently uploaded (20)

Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
 

Cyber Security and Cloud Computing

  • 1. Let's prepare for what's next, and not what was last... Keet Malin Sugathadasa Software Engineer Sysco Labs Cyber Security and Cloud Computing
  • 2. • What is Cyber Security? • Cryptanalysis • Computer Hacking • Cloud Computing Architecture • Cloud Security • Notorious 9 threats in cloud computing • AWS Cloud Security AGENDA
  • 3. Cyber Security Are we really secure?
  • 4. Best Practices and Measures taken to protect a computer or a computer system, against an unauthorized access or attack • Hardware, Software, Data... • Security Standards • Ethical Hacking • Best Practices CYBER SECURITY Cyber Security
  • 5. • Interruption • Interception • Modification • Fabrication Threats and Attacks on Security CYBER SECURITY
  • 6. • Confidentiality (Privacy) • Integrity (Trust) • Availability The CIA in Computer Security CYBER SECURITY
  • 8. This uses a simple file containing words that can be surprisingly found in a dictionary. • “Iamthebest” • “Iloveblahblah” CRYPTANALYSIS Dictionary Attacks
  • 9. dictionary + non-dictionary words by working through all possible alpha-numeric combinations • “aaaa901” • “Iloveblahblah2233a” CRYPTANALYSIS Brute Force Attack
  • 10. Keeps a table of hashes for all possible password combinations. Adding salts will make this task even tougher • “aaaa901” • “fsdfwer232532” CRYPTANALYSIS Rainbow Table Attack
  • 11. Ask the user for his or her password. A phishing email leads the unsuspecting reader to a faked portal and collect credentials • Sending a fake email related to bank payments CRYPTANALYSIS Phishing
  • 12. Social engineering takes the whole ‘ask the user’ concept outside of the inbox that phishing tends to stick with and into the real world. • Call a person posing as a bank or other security guy CRYPTANALYSIS Social Engineering
  • 13. Computer Hacking Cyber war is the new battlefield now...
  • 15. • Trojans • Backdoors • Sniffers • Rootkits • Exploits • Buffer overflows • SQL injection Hacking Technologies COMPUTER HACKING
  • 16. • Reconnaissance (“Gathering information about a potential target”) • Scanning (“Using the info gathered during reconnaissance to examine the network”) • Gaining access (“Owning the system”) • Maintaining access (“Backdoors, Rootkits, Trojans”) • Covering tracks (“Alter log entries, removing alarms”) 5 Phases in Computer Hacking COMPUTER HACKING
  • 18. • Discuss the need for testing • Sign an NDA • Tiger team prepares a schedule for testing • Conduct tests • Analysis and report preparation • Present the report to the client Conducting Ethical Hacking COMPUTER HACKING
  • 19. Legality in Sri Lanka COMPUTER HACKING source: http://www.slcert.gov.lk/Downloads/Acts/Computer_Crimes_Act_No_24_of_2007(E).pdf
  • 20. Cloud Computer Architecture Cloud is not magic, It’s just another computer...
  • 21. Definition of Cloud Computing - NIST CLOUD COMPUTING ARCHITECTURE source: https://ww w.nist.gov/
  • 23. Cloud Security Basics Security is a process, not a product...
  • 24. Security in the cloud is much like security in your on-premises data centers - only without the costs of maintaining facilities and hardware. In the cloud, you don’t have to manage physical servers or storage devices. Instead, you use software-based security tools to monitor and protect the flow of information into and of out of your cloud resources. CLOUD SECURITY BASICS Cloud Security
  • 25. How Secure is the Cloud? CLOUD SECURITY source: https://www.youtube.com/watch?v=8g0NrHExD3g Layer 1: • Perimeter Defense Layer 2: • Clear Zone Layer 3: • Facility facade/ reception area Layer 4: • Hallway/ Escorted Area/ Gray Space Layer 5: • Data Center Room/ White Space Layer 6: • Data Center Cabinet/ White Space
  • 26. CLOUD SECURITY Strict Regulatory Standards Security Tools Confidentiality DDoS Mitigation
  • 27. Key Security Aspect in Cloud CLOUD SECURITY • Network Security ↳ Firewall • Configuration Management • Data Encryption • Access Control • Monitoring and Logging
  • 28. Notorious Nine Threats Cloud Security Alliance (CSA)
  • 29. 1. Data Breaches 2. Data Loss 3. Account or Service Traffic Hijacking 4. Insecure Interfaces and APIs 5. Denial of Service 6. Malicious Insiders 7. Abuse of Cloud Services 8. Insufficient Due Diligence 9. Shared Technology Vulnerabilities NOTORIOUS NINE THREATS
  • 30. AWS Cloud Security Amazon Web Services Cloud Platform
  • 31. AWS CLOUD SECURITY Shared Responsibility
  • 32. AWS Shield AWS CLOUD SECURITY • AWS Shield is a managed Distributed Denial of Service (DDoS) protection service • AWS Shield provides always-on detection and automatic inline mitigations that minimize application downtime and latency • Happens real-time (No support needed)
  • 33. AWS WAF AWS CLOUD SECURITY • AWS WAF is a web application firewall that helps protect your web applications from common web exploits • AWS WAF gives you control over which traffic to allow or block to your web applications • block common attack patterns, such as SQL injection or cross-site scripting
  • 34. AWS IAM AWS CLOUD SECURITY • Access Control • Use AWS Identity and Access Management (IAM) to control users' access to AWS services • Create and manage users and groups, and grant or deny access
  • 35. 1. AWS Artifact 2. AWS Certificate Manager 3. Amazon Cloud Directory 4. AWS CloudHSM 5. Amazon Cognito 6. AWS Directory Service 7. Amazon GuardDuty 8. Amazon Inspector 9. And many more... AWS CLOUD SECURITY source: https://aws.amazon.com/products/security/