Top Banner
Introduction to Information Security Field
52

Introduction to information security field

Apr 11, 2017

Download

Technology

Ahmed Abbas
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Introduction to information security field

Introduction to Information Security Field

Page 2: Introduction to information security field

Quick Survey

Page 3: Introduction to information security field

WHOAM I?

Page 4: Introduction to information security field

WhatIS

InformationSecurity?

Page 5: Introduction to information security field

Statistics ?

Page 6: Introduction to information security field

44%of organizations are short on staff with strong cyber security

and networking knowledge.

Page 7: Introduction to information security field

35%of organizations are unable to fill open security jobs,

despite the fact that 82 percent expect to be attacked this year.

Page 8: Introduction to information security field

37%Is the growth rate for demand on security analysts

between 2012 - 2020

Page 9: Introduction to information security field

74%The increase in security jobs postings between 2007 and 2013

Page 10: Introduction to information security field

103,226Dollars ($)

Page 11: Introduction to information security field

2.0Is the number of security jobs shortage by 2017

MILLION

Page 12: Introduction to information security field

Sounds Good ?

Page 13: Introduction to information security field
Page 14: Introduction to information security field

SecurityManagement

Page 15: Introduction to information security field
Page 16: Introduction to information security field

Security Manager

Responsibilities

Page 17: Introduction to information security field

Skills?

Page 18: Introduction to information security field

What to Learn?• Practices and methods of IT strategy, enterprise architecture and security architecture• Security concepts related to DNS, routing, authentication, VPN, proxy services and

DDOS mitigation technologies• ISO 27001/27002, ITIL and COBIT frameworks• PCI, HIPAA, NIST, GLBA and SOX compliance assessments• Windows, UNIX and Linux operating systems• C, C++, C#, Java and/or PHP programming languages• Firewall and intrusion detection/prevention protocols• Secure coding practices, ethical hacking and threat modeling• TCP/IP, computer networking, routing and switching• Network security architecture development and definition• Knowledge of third party auditing and cloud risk assessment methodologies.

Page 19: Introduction to information security field

Risk Analysis

Page 20: Introduction to information security field

Risk Analyst Responsibilities

Page 21: Introduction to information security field

Skills?

Page 22: Introduction to information security field

Penetration Testing

Page 23: Introduction to information security field

“A penetration test, or pen test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, service and application flaws, improper configurations, or risky end-user behavior.”

Page 24: Introduction to information security field

External Penetration TestingInternal Penetration Testing

Application Penetration TestingMobile App Penetration Testing

Wireless Penetration TestingSocial Engineering Testing

Page 25: Introduction to information security field

Penetration Tester

Responsibilities

Page 26: Introduction to information security field

Skills?

Page 27: Introduction to information security field

What to Learn?• Windows, UNIX and Linux operating systems• C, C++, C#, Java, ASM, PHP, PERL• Network servers and networking tools (e.g. Nessus, nmap, Burp, etc.)• Computer hardware and software systems• Web-based applications• Security frameworks (e.g. ISO 27001/27002, NIST, HIPPA, SOX, etc.)• Security tools and products (Fortify, AppScan, etc.)• Vulnerability analysis and reverse engineering• Metasploit framework• Forensics tools• Cryptography principles

Page 28: Introduction to information security field

DigitalForensics

Page 29: Introduction to information security field
Page 30: Introduction to information security field

Forensics Investigator

Responsibilities

Page 31: Introduction to information security field

Skills?

Page 32: Introduction to information security field

What to Learn?• Network skills, including TCP/IP-based network communications (much of modern forensics involves

reading network traces)• Windows, UNIX and Linux operating systems• C, C++, C#, Java and similar programming languages• Computer hardware and software systems• Operating system installation, patching and configuration• Backup and archiving technologies• Cryptography principles• eDiscovery tools (NUIX, Relativity, Clearwell, etc.)• Forensic software applications (e.g. EnCase, FTK, Helix, Cellebrite, XRY, etc.)• Data processing skills in electronic disclosure environments• Evidence handling procedures and ACPO guidelines• Cloud computing

Page 33: Introduction to information security field

ApplicationSecurity

Page 34: Introduction to information security field

Skills?

Page 35: Introduction to information security field

What to Learn?• An in-depth understanding of programming languages.

These can include C/C++, C#, Java/JSP, .NET, Perl, PHP, Ruby, Python, etc.• CERT/CC, MITRE, Sun and NIST secure coding guidelines

and standards• Software and web application development practices• Penetration testing and vulnerability assessments

Page 36: Introduction to information security field

NetworkSecurity

Page 37: Introduction to information security field

Security Admin Responsibilities

Page 38: Introduction to information security field

Skills?

Page 39: Introduction to information security field

What to Learn?• Knowledge of common L4-L7 protocols such as SSL, HTTP, DNS, SMTP

and IPSec• Strong understanding of firewall technologies• Juniper/Cisco/Checkpoint• Packet Shaper, Load Balancer and Proxy Server knowledge• Intermediate to expert IDS/IPS knowledge• TCP/IP, computer networking, routing and switching• Network protocols and packet analysis tools• Windows, UNIX and Linux operating systems• Firewall and intrusion detection/prevention protocols

Page 40: Introduction to information security field

MalwareAnalysis

Page 41: Introduction to information security field

Malware Analyst

Responsibilities

Page 42: Introduction to information security field

Skills?

Page 43: Introduction to information security field

What to Learn?• Operating System Concepts• High Level & Low Level Programming (familiarity is fine, working

knowledge not required at first)• Fundamentals of networking• How to use the internet to perform research.• Malware Analysis Tools.• Learn about Malware itself.

Page 44: Introduction to information security field

Security Auditing

Page 45: Introduction to information security field

Security Auditor

Responsibilities

Page 46: Introduction to information security field

Skills?

Page 47: Introduction to information security field

What to Learn?• Working knowledge of regulatory and industry data security standards

(e.g. FFIEC, HIPAA, PCI, NERC, SOX, NIST, EU/Safe Harbor and GLBA)• ISO 27001/27002, ITIL and COBIT frameworks• Windows, UNIX and Linux operating systems• MSSQL and ORACLE databases• C, C++, C#, Java and/or PHP programming languages• ACL, IDEA and/or similar software programs for data analysis• Fidelis, ArcSight, Niksun, Websense, ProofPoint, BlueCoat and/or

similar auditing and network defense tools• Firewall and intrusion detection/prevention protocols

Page 48: Introduction to information security field

SecurityAwareness

Page 49: Introduction to information security field

Security Awareness

Offficer Responsibilities

Page 50: Introduction to information security field

Skills?

Page 51: Introduction to information security field
Page 52: Introduction to information security field

Thank You