module-1-p
module-1-p
9
Why does Cybercrime Exist?
12
Motivation
• Profit$$$$
• Political
• Fun and fame
• Bragging rights
Opportunity
Ability
• Heavy dependence
on IT • Free tools readily
• Insecure software available
• Trusting people • Google anything
• Irrational people
• Tor markets
• Everything is
interconnected
Motivation Ability Opportunity
Threat Actors Exploits Vulnerabilities
Heartbleed (2014)
2017
Shellshock (2014)
2022
2015
Ghost (2015)
2018
2019 20
Bad guys are winning.
Why?
1. Asymmetric Forces
2. Insecure Software
28
Asymmetric Forces at Play
Good Guys (you) Bad Guys (them)
Laws and Regulations Must abide by laws and Happy to break any laws…
regulations
Success Factor Must prevent every incident all Only need to find one weakness and
the time successfully exploit it.
30
Insecure Software
https://blog.eset.ie/2018/02/05/vulnerabilities-reached-a-historic-peak-in-2017/
31
To Err is Human
Hacker
36
Different Hats
37
VERY Broad knowledge
Operating Systems Programming Languages
Hacker Methods
TCP/IP Networking CPU Architecture
Security Tools
Cryptography Computer Hardware
Security Standards
Information Security Management
Software Development
Risk Management
Security Engineering/Architecture
Auditing
Laws and Regulations
Algorithms
Behavioural Psychology Identity and Access Management
39
Lateral Thinking
http://sandeepspeaksnowhere.blogspot.jp/2013/03/autodidactism-or-unconventional-life.html
42
Communication Skills
Technical
Communication
Love
Motivation
Learning
43
Exit Jobs
C{T,D,I}O
Cybersecurity Jobs
Journalist Senior Software
Security
Security Engineer
CISO Architect Security
Researcher
Security Digital
Engineer Forensics
Risk
Specialist
Manager
Less Technical
Security
More Technical
Infosec Penetration
Consultant Tester
Manager
Security
Analyst
IT Auditor
Feeder Jobs
SOC
Analyst Server Admin
Network Admin
Junior Developer
45
Cybersecurity Jobs
Senior Software
Security
Security Engineer
CISO
Architect Security
Researcher
Security Digital
Engineer Forensics
Risk Specialist
Manager
Less Technical
More Technical
Infosec Security Penetration
Manager Consultant Tester
Incident
Analyst /
Responder
IT Auditor
Feeder Jobs
SOC
Analyst Server Admin
Network Admin
Junior Developer
46
Cybersecurity Jobs
Senior Software
Security
Engineer
Security
Security Researcher
CISO Architect
Security Digital
Engineer Forensics
Specialist
Risk
Less Technical
Manager
More Technical
Infosec Security Penetration
Manager Consultant Tester
Incident
Analyst /
Responder
IT Auditor
Feeder Jobs
SOC
Analyst Server Admin
Network Admin
48
Security Certifications
Architect
Manager Advanced
SABSA OSCE
SABSA Offsec
GSLC CISSP C|CSA CREST CRT
GIAC (ISC)2
EC-Council CREST
CASP OSCP
CompTIA
C|EH Offsec
Less Technical
EC-Council
More Technical
Pentester
ISACA
SSCP GPEN
(ISC)2 GIAC
Analyst
ISACA
CSIA+ GSEC
CompTIA GIAC
Auditor
Beginner 48
https://pauljerimy.com/security-certification-roadmap/
50
Security Certifications
• (ISC)2
• CISSP
• SANS/GIAC
• GSEC, GPEN, + LOTS
• EC-Council
• CEH, ECSS , + LOTS
• Offensive Security
• OSCP, OSCE
• CREST
• CompTIA
• SABSA Foundation
51
Career Advice
1. Define your path early and make a plan.
2. Set milestones to ensure focus on your plan.
3. Assess progress annually and perform gap
assessment.
4. Fill gaps through training and certifications.
5. Find a mentor to catch up on a regular basis.
6. Stay motivated and keep learning!
53
Cyber Security IS getting better
• Better defaults
• Vendors focussed on security
o Bug bounties
o Security teams
o Security part of development process
• Better detection
o Dwell time (400 days → 24 days)
• Better awareness/training
• Better processes and procedures
• Better preventative controls
.. but so are the bad guys
• Hacker organisations
o Organised
o Communicating
o Highly coordinated
• Free/ OS tools
• Wealth of information available
• Crypto-currency
• Exploit kits / Hacking as a service / Specialisations
Important Trend…