“own or be pwned” – a little goes a long way.. abstract own your destiny. no system can ever...

2
“Own or be Pwned” – A little goes a long way.. ABSTRACT Own your destiny. No system can ever be 100% secure. Security holes in corporate and campus networks are increasingly targeted by thieves and hackers alike for fun and for profit. Security breaches happen every day. Most of them untold, yet the ones that hit the mainstream have touched almost all of us. This presentation includes a demonstration of the tools used and the effort required for a successful hack. The hands-on, live demonstration is followed by the lessons learned and an introduction to some of the types of safeguard strategies that can help minimize the risk to those systems that host not just corporate secrets worth millions, but your personal information as well. Date: Nov 22, 2007 Time: 6:30 to 7:30 PM Location: Room T130, Algonquin College, Woodroffe Campus Please RSVP to [email protected] Speaker Bios Ozan Gonenc has acquired GIAC’s Certified Incident Handling and ISC 2 ’s CISSP certificates. He currently works as a Manager in the Deloitte’s Security and Privacy Practice. His area of focus includes Vulnerability Management. Ryan Thomas is a Certified Ethical Hacker and CISSP with many years of experience in information security. He is currently a Senior Security Consultant with Deloitte’s Security Proudly Organized and Sponsored By: IEEE Alliance of Consultants Network (AICN) IEEE Women in Engineering (WIE) IEEE Reliability Society (RS) IEEE Antennas & Propagation Society / Microwave Theory & Techniques Society (AP/MTT) By: Ozan Gonenc Ryan Thomas

Upload: patience-hensley

Post on 31-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: “Own or be Pwned” – A little goes a long way.. ABSTRACT Own your destiny. No system can ever be 100% secure. Security holes in corporate and campus networks

“Own or be Pwned” – A little goes a long way..

ABSTRACTOwn your destiny.  No system can ever be 100% secure.  Security holes in corporate and campus networks are increasingly targeted by thieves and hackers alike for fun and for profit. Security breaches happen every day.  Most of them untold, yet the ones that hit the mainstream have touched almost all of us.                                     This presentation includes a demonstration of the tools used and the effort required for a successful hack.  The hands-on, live demonstration is followed by the lessons learned and an introduction to some of the types of safeguard strategies that can help minimize the risk to those systems that host not just corporate secrets worth millions, but your personal information as well.

Date: Nov 22, 2007Time: 6:30 to 7:30 PMLocation: Room T130, Algonquin College, Woodroffe CampusPlease RSVP to [email protected]

Speaker Bios

Ozan Gonenc has acquired GIAC’s Certified Incident Handling and ISC2’s CISSP certificates. He currently works as a Manager in the Deloitte’s Security and Privacy Practice. His area of focus includes Vulnerability Management.                                      Ryan Thomas is a Certified Ethical Hacker and CISSP with many years of experience in information security. He is currently a Senior Security Consultant with Deloitte’s Security and Privacy Practice in Ottawa, Canada.

Proudly Organized and Sponsored By:

IEEE Alliance of Consultants Network (AICN)

IEEE Women in Engineering (WIE)

IEEE Reliability Society (RS)

IEEE Antennas & Propagation Society / Microwave Theory & Techniques Society (AP/MTT)

IEEE Algonquin College Student Branch

By:Ozan GonencRyan Thomas

Page 2: “Own or be Pwned” – A little goes a long way.. ABSTRACT Own your destiny. No system can ever be 100% secure. Security holes in corporate and campus networks

“Fools Gold or Pay Dirt - Is Network Scanning Detection a Worthwhile Activity?”

ABSTRACTNetworks are constantly bombarded by backscatter packets, incessant probes from auto rooters, malware infected systems (e.g. worms), and Internet cartographers. It can be argued that given the volume of nonproductive network traffic on the Internet, a network operator would be better served focusing on ensuring the latest patches have been installed rather than wasting their time engaging in quixotic endeavors such as network scan detection.

In this talk, I will briefly discuss my latest progress on the development of dark port scanning detection technique. Specifically, I will discuss how the network-centric knowledge gained by the dark port technique allows for precise, faster, and finer-grained detection of scanning activity that directly threatens publicly available network services. I will argue that network scanning detection should be an essential part of any network operator's "virtual IT security toolbox".

Date: Nov 29, 2007Time: 6:30 to 7:30 PMLocation: Room T130, Algonquin College, Woodroffe CampusPlease RSVP to [email protected]

Speaker Bio

David Whyte is a member of the Digital Security Group at Carleton University (Ottawa, Canada). He is currently a Ph.D. candidate in Computer Science and his research interests include computer worm defenses and network-based intrusion detection.

Proudly Organized and Sponsored By:IEEE Alliance of Consultants Network (AICN)

IEEE Women in Engineering (WIE)

IEEE Reliability Society (RS)

IEEE Antennas & Propagation Society / Microwave Theory & Techniques Society (AP/MTT)

IEEE Algonquin College Student Branch

By:David Whyte