
Internet Service Provider Security Threats and Solutions
Explore the various attack scenarios against Internet Service Providers and learn how to secure their infrastructure from vulnerabilities. Mohammad Reza Mostame, CTO of RNPG, provides insights into safeguarding against threats like BGP hijacking, data leakage, and network abuse.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Internet Service Provider Attack Scenario MENOG 2018 1
About me Mohammad Reza Mostame Expert in information security Email: info@rnpg.ir 2
Internet Service Provider threats Service unavailability Data leakage Abuse of network resources Mohammad Reza Mostame CTO of RNPG 3
Network access through web applications Web application vulnerability SQL Injection OS access 3. Privilege escalation Layer 2 network attack 1. 2. 4. Mohammad Reza Mostame CTO of RNPG 4
Routers access method monitoring software vulnerabilities Routers vulnerabilities Routers misconfigurations Mohammad Reza Mostame CTO of RNPG 5
Attack scenario against Internet Service Provider Getting access to the routers and hijack the network traffic Mohammad Reza Mostame CTO of RNPG 6
Attack scenario against Internet Service Provider BGP hijack Mohammad Reza Mostame CTO of RNPG 7
Attack scenario against Internet Service Provider Remote File Inclusion s vulnerability leads to Firewall bypass Mohammad Reza Mostame CTO of RNPG 8
Attack scenario against Internet Service Provider LDAP Injection attack Pass The Hash vulnerability Escalate privileges to the administrator in Active Directory Mohammad Reza Mostame CTO of RNPG 9
How to secure the Internet Service Provider s infrastructure! Mohammad Reza Mostame CTO of RNPG 10
First: Identify threats Penetration testing can help us to find the threats. ISP s threats divided into 4 sections Web application vulnerability and exploitation Misuse of Network resources Misuse of OS vulnerability Mobile applications threats 1. 2. 3. 4. Mohammad Reza Mostame CTO of RNPG 11
Penetration testing benefits Preventing Information Loss Preventing Financial Loss Protect Your Brand in Market Essential part of compliance standards or certifications for your business Mohammad Reza Mostame CTO of RNPG 12
Second: Secure your business Web application hardening Network hardening OS hardening DLP Mohammad Reza Mostame CTO of RNPG 13
Web application hardening Runtime Application Self-Protection (RASP) Web Application Firewall (WAF) Secure Software Development Life Cycle (SDLC) Database Firewall (DBFW) Mohammad Reza Mostame CTO of RNPG 14
Network hardening Service hardening Device hardening Intrusion Prevention System & Firewall Mohammad Reza Mostame CTO of RNPG 15
OS hardening Application hardening Sandbox Vulnerability management Mandatory Access Control (SE Linux) Mohammad Reza Mostame CTO of RNPG 16
Data Loss Prevention AD RMS (Active Directory Rights Management Services) Host Based DLP Network Based DLP Mohammad Reza Mostame CTO of RNPG 17
Defense In Depth Mohammad Reza Mostame CTO of RNPG 18
Questions and Answer Thanks http://rnpg.ir 19