Professional Documents
Culture Documents
Julian Cybersecurity Presentation
Julian Cybersecurity Presentation
Cybersecurity Analysis
Julián Darío Miranda-Calle
linkedin.com/in/juliandariomiranda/ 0000-0002-7580-2361
https://www.researchgate.net/profile/Julian_Miranda2
• Cybersecurity challenges DPhi Data Science
01 Introduction •
•
IoT services
Cyberattack practices
Bootcamp
• Key verbs
• DIKW Pyramid
02 Fundamentals •
•
Cyberattacks
CIA Triad
• Key concepts
Data Science
Agenda 03 Applied Data
Science
applications for
cybersecurity
Exploring
04 Use case cybersecurity
attacks
05 Conclusions •
•
Conclusions
Future work
Julián Darío Miranda-Calle
Cybersecurity Analysis
DPhi Data Science Julián Darío Miranda-Calle
Introduction
Bootcamp Cybersecurity Analysis
Cybersecurity challenges
Smart
Smart Blender Smart Shower Smart Bulb Lamppost
DPhi Data Science Julián Darío Miranda-Calle
Introduction
Bootcamp Cybersecurity Analysis
Cybersecurity challenges
Hiring Home
Financial Public
DPhi Data Science
Bootcamp
DPhi Data Science Julián Darío Miranda-Calle
Introduction
Bootcamp Cybersecurity Analysis
Cybersecurity challenges
Cybersecurity/Cybercrime/Cyber…
Quantum Computing
Lifi/Zigbee/MQTT/AMQP/CoAP
Knowledge
+Context Manage
Information
+Analysis Assure
+Interpretation
+Discussion
Data Protect
DPhi Data Science Julián Darío Miranda-Calle
Bootcamp
Fundamentals Cybersecurity Analysis
DIKW Pyramid
Information properties
Information is …
Critical Sensitive
Information = Competitiveness
Information = Advantage
CIA Triad
01 03 05
Reconnaissance Gaining Access Covering Tracks
Steps taken to 02 Gain access to the 04 Conceal the success to
gather evidence on targets through the Keeping Access avoid detection by
Scanning
the targets to be vulnerabilities security professionals.
attacked. Gather more detected. Ensure the way
technical in-depth back to the target
information on the machines for
targets. further procedures.
DPhi Data Science Julián Darío Miranda-Calle
Bootcamp
Fundamentals Cybersecurity Analysis
IPv4 Address
Numerical label assigned to devices connected
to a network that uses the Internet Protocol. IP Address
IPv6 Address
DPhi Data Science Julián Darío Miranda-Calle
Bootcamp
Applied Data Science Cybersecurity Analysis
Event correlation
Data science in Network
cybersecurity: applications monitoring
Relation of multiple
Most of the techniques are build on top of Identification of
events to identify
EDA, Regression, Classification, supervised potential
common patterns
and unsupervised learning tasks cyberattacks
DPhi Data Science
Bootcamp Use case Julián Darío Miranda-Calle
Cybersecurity Analysis
The procedure explained in the use case can be extrapolated for all types of
cybersecurity studies in which cybersecurity attack data records are kept,
which can provide great information on what patterns occur and how to
effectively ensure services and servers
Data science allows to analyze the large volume of data that is generated
daily by IoT devices, industry, servers, home, among other contexts, to
propose new information security policies and countermeasures for
cybersecurity attacks to come.
DPhi Data Science Julián Darío Miranda-Calle
Bootcamp
Future work Cybersecurity Analysis
Current research
Thanks!
juliandariomiranda@gmail.com /juliandariomiranda
Julián Darío Miranda
0000-0002-7580-2361 www.researchgate.net/profile/Julian_Miranda2