1. Cyber Attacks Stages of a smart attack Check for an open door!!! Get into the system Delete all tracks, which might prove you have being inside the system
2. The lasts attacks: Yahoo, CNN, Amazon & E-Bay Zombie University Web sites Million of Users DDOS Attack 900MB per sec. Group of Hackers Hackers breaks into powerful computers which are connected with fast lines to the web. The hacker send a program which sleeps on the target PC. The hacker cleans the way he got into the system so it can not be traced. A Target is selected by the hackers. This is bombed with lots of requests for information from the powerful PC. The large amount of requests causes overload on the target server. This one finally crashes. The Target server being down causes denial of service for million users which are trying to reach the site. +
3. I Love You vbs. Virus The last attacks: Million of Users System Crash ISP Modem ISP Extranet LAN In a few hours it spread through the net ISP
5. Encryption Standards SSL - Secure Socket Layer SET - Secure Electronic Transaction STRONG - 3 DES How can I recognize a secure site? Verisign Voltimore Entrust
6. Symmetric Encryption A B Encrypt Decrypt Key Key Lots of Security Problems The same keys is used both ways
7. Asymmetric Encryption A B Encrypt Decrypt Public Key Private Key Lots of Security Problems The same keys is used both ways
8. VPN FW FW Encrypt - Decrypt by the FW VPN Module Virtual Private Network Secure Area Secure Area
17. FAQ How can I get Info on the web? How can I trace an attacker ? How can I get Info on Ip address? Is there a thing such as maximum Security ? ISP obligations International jurisdiction
18. Solutions (for now): Awareness Disconnect systems from the public eye Anti-Virus (updated) FW (configuration) Intruder Detection Systems Proper Encryption Control & Inspection