tir solutions
DESCRIPTION
TIR Solutions. Tim Wostradowski , Ian Brophy, John Ang. Baseline Security. Agenda. Project Conception Developing the Idea Refining the Method Gathering the Data From Data to Information Results Linux Windows Overall The Future of the Project Final Thoughts Q & A. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: TIR Solutions](https://reader035.vdocuments.net/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/1.jpg)
Tim Wostradowski , Ian Brophy, John Ang
![Page 2: TIR Solutions](https://reader035.vdocuments.net/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/2.jpg)
![Page 3: TIR Solutions](https://reader035.vdocuments.net/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/3.jpg)
Project Conception Developing the Idea Refining the Method Gathering the Data From Data to Information Results
Linux Windows Overall
The Future of the Project Final Thoughts Q & A
![Page 4: TIR Solutions](https://reader035.vdocuments.net/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/4.jpg)
Security Based Interested in Security Related Matters
Research Based The Pursuit of Knowledge
Sponsor Seccuris’ Project Idea
![Page 5: TIR Solutions](https://reader035.vdocuments.net/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/5.jpg)
Open Source
Testing Backtrack
Storing Data Database
Viewing Data Web interface
![Page 6: TIR Solutions](https://reader035.vdocuments.net/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/6.jpg)
Operating Systems Stock Installations
What Data is Relevant? Ports, fingerprint, exploits Default security measures?
Analyze Vulnerabilities
![Page 7: TIR Solutions](https://reader035.vdocuments.net/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/7.jpg)
BackTrack NMAP
Port Mapping/Scanning
Metasploit Framework Exploits
![Page 8: TIR Solutions](https://reader035.vdocuments.net/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/8.jpg)
Analysis of Baseline Security Default Security Measures? Open ports? Exploits?
Digging Deeper Comparisons Logical Conclusions
![Page 9: TIR Solutions](https://reader035.vdocuments.net/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/9.jpg)
Fedora
Ubuntu
openBSD
freeBSD
![Page 10: TIR Solutions](https://reader035.vdocuments.net/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/10.jpg)
Pre XP Defenseless
XP SP2: the dawn of Windows firewalls
Post XP Solid baseline security measures
![Page 11: TIR Solutions](https://reader035.vdocuments.net/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/11.jpg)
Windows Firewall
The XP Transition Defender
Linux Closed Ports
Windows vs Linux Equilibrium or landslide?
![Page 12: TIR Solutions](https://reader035.vdocuments.net/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/12.jpg)
Non-default Software Explore the Adverse Affects
Web Interface More Features
ie: Comparison Tool
Implement on Real Hardware Are Virtual Machines Really On Par?
![Page 13: TIR Solutions](https://reader035.vdocuments.net/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/13.jpg)
Windows and Linux Surprising Equality
Upgrade Your Operating System ie: Windows XP to Windows 7
Keep It On Firewall Application Defender
![Page 14: TIR Solutions](https://reader035.vdocuments.net/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/14.jpg)
Some Ideas:
Did you learn anything from this presentation?
What did we learn from this project?
Does something need clarification?
What was our favorite aspect of the project?
![Page 15: TIR Solutions](https://reader035.vdocuments.net/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/15.jpg)