Professional Documents
Culture Documents
Welcome
HELLO!
I am Rocky Amos Panggabean
Call me on +6282164849393
8/26/2016
Introduction
8/26/2016
What is
What is Cyber Security?
Cyber security, also referred to as information technology
security, focuses on protecting computers, networks, programs
and data from unintended or unauthorized access, change or
destruction
8/26/2016
8/26/2016
All users
must
have ateach
unique
usertoIDrecognize
and password
that
conforms
to the them
company
password
breach,
and educate
on how
to staystandard.
safe while using the
Users must not share
their
password
with
anyone
companys network.
regardless of title or position.
Passwords must not be stored in written or any readable
form.
If a compromise is suspected, it must be reported to the
help desk and a new password must be requested.
10
8/26/2016
Risk
Analyst.
Plan, design, build, deploy and manage secure IT
infrastructure
VPN Specialist.
and systems compliant with current
information
Penetrationassurance
Tester. policies and regulations;
Network
Perimeter/Firewall
Specialist.
Assess
technical
vulnerabilities;
Securityattack
Response
IDS/IPS Engineer.
Identify
vectors;
Respond to attacks; and monitor and deploy layered
defense mechanisms in complex IT infrastructure.
11
12
8/26/2016
13
14
8/26/2016
Password Attacks.
Trust Exploitation Indirect Attack.
Data Diddling.
Worm.
Virus.
15
8/26/2016
Vulnerability Assessment
17
8/26/2016
19
20
10
8/26/2016
11
8/26/2016
End Device
Intermediary Device
23
12
8/26/2016
25
26
13
8/26/2016
1. Good Design
Design Network
NetworkTopology
Topology
2. Securing Device
Device Access
Access
3. Assigning
Assigning Administrative
AdministrativeRoles
Roles
28
14
8/26/2016
15
8/26/2016
a. Vulnerability Assessment
b. Penetration Test
c. Security Audit
31
16
8/26/2016
17
8/26/2016
35
THANK YOU!
FOR YOUR ATTENTION
Email : rocky.amos@wx-d.com
18