90 likes | 250 Views
By: K Brenner IST522 Spring 2013. March 2011 attack against RSA . SOUND ENABLED. AUTO RUN PRESENTATION. About RSA Token . RSA Algorithm. Thanks for posting this video on BB, Jemakai Blyden . N = P x Q. Social Engineering Phishing Attack.
E N D
By: K Brenner IST522 Spring 2013 March 2011attack against RSA SOUND ENABLED AUTO RUN PRESENTATION
RSA Algorithm Thanks for posting this video on BB, JemakaiBlyden. N = P x Q
Social Engineering Phishing Attack Low Level Intrusion Manifested to Higher Value Targets. Need for Server Segmentation Access Control by Least Privileged Source: http://upload.wikimedia.org/wikipedia/en/1/12/Sample-network-diagram.png
Lessens Learned - Solutions WE’RE RSA AND WE GOT SCHOOLED!
Lessens Learned – Better Secured Network Diagram Proposed Network Diagram (Users Outside)VPN Connection Firewall & Radius servers (Users Inside) Denial Network with routers and switches DMZ Web servers Application Servers Radius Servers Active Directories
Regulations http://en.wikipedia.org/wiki/Cyber_Intelligence_Sharing_and_Protection_Act CISPA Status: Bill Delayed in Senate
Regulations Uniform Breach Disclosure Act
Works Cited IST 522 Class Notes. (2013, Spring). Retrieved from https://bbgroupa.syr.edu Blog. (n.d.). Retrieved Feb. 15, 2013, from Berkman Center for Internet & Society at Harvard University: http://cyber.law.harvard.edu/cybersecurity/Main_Page Coviello, A. (2011). RSA Conference Europe 2011. Retrieved Feb. 15, 2013, from www.emc.com/rsa: http://www.emc.com/collateral/corporation/coviello-rsac-europe-2011-keynote.pdf Flaniga, K. (2012, November 27). Syracuse University G.E.T. Speaker Series. Vacca, J. (2009). Computer and Information Security Handbook. Boston: Morgan Kaufmann.