Professional Documents
Culture Documents
INFS1701 3617 T1 2023 LecW8
INFS1701 3617 T1 2023 LecW8
INFS1701 3617 T1 2023 LecW8
au)
2
Copyright Notice
3
• There are some file-sharing websites that specialise in buying and selling academic work to
and from university students.
• If you upload your original work to these websites, and if another student downloads
and presents it as their own either wholly or partially, you might be found guilty of collusion —
even years after graduation.
• These file-sharing websites may also accept purchase of course materials, such as copies
of lecture slides and tutorial handouts. By law, the copyright on course materials, developed by
UNSW staff in the course of their employment, belongs to UNSW. It constitutes copyright
infringement, if not academic misconduct, to trade these materials.
4
Acknowledgement of Country
1. Cloud Security
6
7
Cloud Security
(Shared by Aqua Security Software)
8
Break
9
Source: https://www.hbs.edu/faculty/Pages/item.aspx?num=51339
Attackers took Target missed alerts
Attackers took
advantage of weak sent by its anti-
advantage of weak
security controls within intrusion software, did
security at a Target
Target’s network and not enable automatic
vendor to gain foothold
successfully moved to deletion of malware,
in Target’s internal
the network’s most and missed alerts
network
sensitive areas about data extraction
Source: https://www.hbs.edu/faculty/Pages/item.aspx?num=51339
Target’s Pre-breach Information Security Team Structure
Technology Services
• Led by CIO, reports to CEO
• Cyber Security team led by a senior director who reports to the CIO
• Security Operations Center (SOC) – a 24-hour alert management center
• Red team conducts network security test and simulated attack
Source: https://www.hbs.edu/faculty/Pages/item.aspx?num=51339
Target’s Pre-breach Information Security Team Structure
Source: https://www.hbs.edu/faculty/Pages/item.aspx?num=51339
Target’s Incident Response
Source: https://www.hbs.edu/faculty/Pages/item.aspx?num=51339
Target’s Incident Response
Source: https://www.hbs.edu/faculty/Pages/item.aspx?num=51339
Target’s Incident Response