Cyber Security VAPT v1.0 Published - Compressed
Cyber Security VAPT v1.0 Published - Compressed
Cyber Security VAPT v1.0 Published - Compressed
Abdus Saboor
a.saboor@EuropeanITC.com
Agenda
Why VAPT
Best Practices
Assessment Promo
Failure to Protect (examples) more coming soon!
Quantifying with Assessments
The Process
Project Process
Implementation Research
Security Strategy
Even they invested in Firewalls
Whether we like it or not, hackers will get in and they do get in, every day. The
challenge is, yes, to minimize the Risk. But as we get more sophisticated, how do we
operate in an environment if we know theyre in our systems?
Heather Crofford, CFO of Northrop Grumman
Approx Costs associated with the Targetted data breach that occurred in 2013
reached $148 million by the second quarter of 2014.
NASA hacked 21-day shutdown - ot Hacked badly, assumable approx. around 100
Terabytes of data was compromised & stolen.
(2014)
Types of VAPT
- Web-Application (WVAPT)
- Application (AVAPT)
- Network (NVAPT)
Cyber Attack Lifecycle
COMBO
/
Attack Chain
Local Malicious
execution activity
Download malware
Physical access Exploit Escalate privilege Propagation
Phishing email Social engineering Persist on System Bot activity
Malicious URL Configuration error Self-Preservation Identity Theft
Network access Finance Fraud
Tampering
Establish
First Contact
presence
Web Application (W-VAPT)
/
Benefits of VAPT
(cont..)
regular basis
This reveals newly discovered
threats or emerging vulnerabilities
that may potentially be attacked
/
EITCs CMM Cycle
Anti-Malware
Application Protection Malicious
Application Protection
Hardening Against OS Memory Caller
Behavior
Security Bypass Protection
Protection
Techniques which
generically harden Advanced memory Multiple 32 & 64bit Block sandbox escapes Real-time and on-
outdated or un- techniques prevents memory exploit (i.e. Java exploits) and demand
patched applications to exploit shellcode from mitigation techniques malicious payloads from Advanced Heuristics
be less susceptible to executing by detecting prevent exploits from application design abuse and Behavior Based
vulnerability exploit attempts to bypass DEP executing payload code exploits like Word Rules
attacks. and/or using ROP. from malicious memory Macros, PowerPoint Proven ability to
areas (Heap, RW, etc). exploits, etc. remediate
Signatureless
Some more Best Practices
/
MultiLevel Offer
OS, Server, App, ERP OS, Server, App, ERP, Infra OS, Server, App, ERP, Infra,
Network
Thank You