SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
XECUREIT.COM
“Your Security,
Our Passion”
Consultancy
Assurance
Research
Education
Effective Honeynet in
High Grade Security Strategy
"Feeling secure is dangerous. It makes us complacent."
"Rasa aman berbahaya. Rasa aman membuat kita lengah."
Gildas Deograt Lumy, CISA, CISSP, ISO27001 LA
Chief Technology Officer
gildas@xecureit.com
Effective HoneynetPage 2 XECUREIT.COM
Example
Effective HoneynetPage 3 XECUREIT.COM
Enemy Level
 Very High
● Government grade attacker
● “Unlimited” resources, “lawful”
 High
● High level of expertise, using advance in-house developed tools,
budget <USD 1 Million
● Authorized users both consciously and as victims of social engineering
 Medium
● Have expertise, using public or customized tools, budget <USD100,000
● Known Attacker, such as employees, contractors, partners or customers
both consciously and as victims of social engineering
 Low / Very Low
● Script kiddies, new born attacker, using public tools, budget <USD10,000
● Unknown Attacker (Public)
Effective HoneynetPage 4 XECUREIT.COM
Easy to know your enemy ;)
(Production)
group_server1.organisasi.id
group_server2.organisasi.id
(External Honeynet)
Effective HoneynetPage 5 XECUREIT.COM
How to know the malicious authorized user?
(Production)
group_server1.organisasi.id
group_server2.organisasi.id
(External Honeynet)
Effective HoneynetPage 6 XECUREIT.COM
Easy to know the “potential” malicious authorized users
(Production)
group_server1.organisasi.id
group_server2.organisasi.id
(External Honeynet)
Effective HoneynetPage 7 XECUREIT.COM
Easy to know the malicious authorized users
(Production)
group_server1.organisasi.id
group_server2.organisasi.id
(External Honeynet)
Effective HoneynetPage 8 XECUREIT.COM
Requirements
 High Grade Security Strategy
● Appropriate information security classification.
● Balance prevention and detection mechanism.
● Effective systems “separation of duties”.
● Clear understanding of information security policies and
procedures (Do’s and Dont’s).
 Integrated Tools
● Honeynet, Honeypot & Honeytoken
● Network-based IDS
● SIEM
XECUREIT.COM
“Your Security,
Our Passion”
Consultancy
Assurance
Research
Education
TERIMAKASIH
THANK YOU
"Feeling secure is dangerous. It makes us complacent."
"Rasa aman berbahaya. Rasa aman membuat kita lengah."
Gildas Deograt Lumy, CISA, CISSP, ISO27001 LA
Chief Technology Officer
gildas@xecureit.com

Weitere Àhnliche Inhalte

Ähnlich wie Gildas Deograt - Effective Honeynet in High Grade Security Strategy

Defcamp 2013 - Does it pay to be a blackhat hacker
Defcamp 2013 - Does it pay to be a blackhat hackerDefcamp 2013 - Does it pay to be a blackhat hacker
Defcamp 2013 - Does it pay to be a blackhat hacker
DefCamp
 

Ähnlich wie Gildas Deograt - Effective Honeynet in High Grade Security Strategy (20)

CyberSecurity Study Jam
CyberSecurity Study JamCyberSecurity Study Jam
CyberSecurity Study Jam
 
Cyber_Security_Issues_and_Challenges.pptx
Cyber_Security_Issues_and_Challenges.pptxCyber_Security_Issues_and_Challenges.pptx
Cyber_Security_Issues_and_Challenges.pptx
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 
Security by Design: An Introduction to Drupal Security
Security by Design: An Introduction to Drupal SecuritySecurity by Design: An Introduction to Drupal Security
Security by Design: An Introduction to Drupal Security
 
Security by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal SecuritySecurity by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal Security
 
2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case
 
Cyber intelligence-services
Cyber intelligence-servicesCyber intelligence-services
Cyber intelligence-services
 
Insomnihack 2018 - Securing Internal Resources Through Tiered Access
Insomnihack 2018 - Securing Internal Resources Through Tiered AccessInsomnihack 2018 - Securing Internal Resources Through Tiered Access
Insomnihack 2018 - Securing Internal Resources Through Tiered Access
 
Staying Safe and Secure Online
Staying Safe and Secure OnlineStaying Safe and Secure Online
Staying Safe and Secure Online
 
Insight live om It-sikkerhed- Peter SchjĂžtt
Insight live om It-sikkerhed- Peter SchjĂžttInsight live om It-sikkerhed- Peter SchjĂžtt
Insight live om It-sikkerhed- Peter SchjĂžtt
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted Attacks
 
Data Security for MSME
Data Security for MSMEData Security for MSME
Data Security for MSME
 
apidays LIVE Paris 2021 - How password managers are built for Privacy and Sec...
apidays LIVE Paris 2021 - How password managers are built for Privacy and Sec...apidays LIVE Paris 2021 - How password managers are built for Privacy and Sec...
apidays LIVE Paris 2021 - How password managers are built for Privacy and Sec...
 
Defcamp 2013 - Does it pay to be a blackhat hacker
Defcamp 2013 - Does it pay to be a blackhat hackerDefcamp 2013 - Does it pay to be a blackhat hacker
Defcamp 2013 - Does it pay to be a blackhat hacker
 
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
 
Retail security-services--client-presentation
Retail security-services--client-presentationRetail security-services--client-presentation
Retail security-services--client-presentation
 
Application Security by Ethical Hackers
Application Security by Ethical HackersApplication Security by Ethical Hackers
Application Security by Ethical Hackers
 
Security by default - Building continuous cyber-resilience.
Security by default - Building continuous cyber-resilience.Security by default - Building continuous cyber-resilience.
Security by default - Building continuous cyber-resilience.
 
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew Rosenquist
 

Mehr von Indonesia Honeynet Chapter (8)

Charles Lim - Honeynet Indonesia Chapter
Charles Lim - Honeynet Indonesia Chapter Charles Lim - Honeynet Indonesia Chapter
Charles Lim - Honeynet Indonesia Chapter
 
Lukas - Ancaman E-Health Security
Lukas - Ancaman E-Health SecurityLukas - Ancaman E-Health Security
Lukas - Ancaman E-Health Security
 
Karunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident HandlingKarunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident Handling
 
Iwan Sumantri - Cyber Threat Indonesia 2013
Iwan Sumantri - Cyber Threat Indonesia 2013Iwan Sumantri - Cyber Threat Indonesia 2013
Iwan Sumantri - Cyber Threat Indonesia 2013
 
I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
I.G.N. Mantra - Mobile Security, Mobile Malware,and CountermeasureI.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
 
Hogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing SecutityHogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing Secutity
 
Amien Harisen - APT1 Attack
Amien Harisen - APT1 AttackAmien Harisen - APT1 Attack
Amien Harisen - APT1 Attack
 
Ahmad Alkazimy - Indonesia Malware Incident Updates
Ahmad Alkazimy - Indonesia Malware Incident UpdatesAhmad Alkazimy - Indonesia Malware Incident Updates
Ahmad Alkazimy - Indonesia Malware Incident Updates
 

KĂŒrzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

KĂŒrzlich hochgeladen (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

Gildas Deograt - Effective Honeynet in High Grade Security Strategy

  • 1. XECUREIT.COM “Your Security, Our Passion” Consultancy Assurance Research Education Effective Honeynet in High Grade Security Strategy "Feeling secure is dangerous. It makes us complacent." "Rasa aman berbahaya. Rasa aman membuat kita lengah." Gildas Deograt Lumy, CISA, CISSP, ISO27001 LA Chief Technology Officer gildas@xecureit.com
  • 2. Effective HoneynetPage 2 XECUREIT.COM Example
  • 3. Effective HoneynetPage 3 XECUREIT.COM Enemy Level  Very High ● Government grade attacker ● “Unlimited” resources, “lawful”  High ● High level of expertise, using advance in-house developed tools, budget <USD 1 Million ● Authorized users both consciously and as victims of social engineering  Medium ● Have expertise, using public or customized tools, budget <USD100,000 ● Known Attacker, such as employees, contractors, partners or customers both consciously and as victims of social engineering  Low / Very Low ● Script kiddies, new born attacker, using public tools, budget <USD10,000 ● Unknown Attacker (Public)
  • 4. Effective HoneynetPage 4 XECUREIT.COM Easy to know your enemy ;) (Production) group_server1.organisasi.id group_server2.organisasi.id (External Honeynet)
  • 5. Effective HoneynetPage 5 XECUREIT.COM How to know the malicious authorized user? (Production) group_server1.organisasi.id group_server2.organisasi.id (External Honeynet)
  • 6. Effective HoneynetPage 6 XECUREIT.COM Easy to know the “potential” malicious authorized users (Production) group_server1.organisasi.id group_server2.organisasi.id (External Honeynet)
  • 7. Effective HoneynetPage 7 XECUREIT.COM Easy to know the malicious authorized users (Production) group_server1.organisasi.id group_server2.organisasi.id (External Honeynet)
  • 8. Effective HoneynetPage 8 XECUREIT.COM Requirements  High Grade Security Strategy ● Appropriate information security classification. ● Balance prevention and detection mechanism. ● Effective systems “separation of duties”. ● Clear understanding of information security policies and procedures (Do’s and Dont’s).  Integrated Tools ● Honeynet, Honeypot & Honeytoken ● Network-based IDS ● SIEM
  • 9. XECUREIT.COM “Your Security, Our Passion” Consultancy Assurance Research Education TERIMAKASIH THANK YOU "Feeling secure is dangerous. It makes us complacent." "Rasa aman berbahaya. Rasa aman membuat kita lengah." Gildas Deograt Lumy, CISA, CISSP, ISO27001 LA Chief Technology Officer gildas@xecureit.com