![Page 1: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/1.jpg)
KRATKI PREGLED SIGURNOSTI NA INTERNETU U RH I ADVANCED
CYBER DEFENSE CENTER (ACDC)
Mr.Sc. Darko Perhoč, CISSP,CEH,CCSP,CCNP,CCDP,CCIP
Pomoćnik ravnatelja CARNeta za Nacionalni CERT
![Page 2: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/2.jpg)
Nacionalni CERT – osnovni podaci
•
•
•
•
•
![Page 3: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/3.jpg)
Proaktivne mjere
•
•
•
•
•
•
•
![Page 4: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/4.jpg)
Izdane brošure u novinama
![Page 5: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/5.jpg)
Reaktivne mjere
•
•
![Page 6: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/6.jpg)
Tok informacija
![Page 7: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/7.jpg)
Tok obrade incidenata ako je izvor informacija SRU@HR sustav
![Page 8: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/8.jpg)
Tipovi Incidenata
Incident type Incident subtype
Sucessfully compromised servers
CC (Command & Control) Malware domain Malware URL Phishing URL Spam URL Other compromised computers(drop zone e.t.c)
Phishing Phishing
Spam Spam sending
Illegal network activities Network scans, vulnerability scans,brute force
Denial of service DoS, DDOS
Other incidents Incidents not belonging to any of the above subgroup
![Page 9: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/9.jpg)
Broj incidenata po tipu(1.8.2012 – 1.8.2013)
![Page 10: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/10.jpg)
Distribucija incidenata po tipu
![Page 11: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/11.jpg)
Trend incidenata na poslužiteljima u periodu od 1.8.2012-1.8.2013
![Page 12: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/12.jpg)
Trend broja botova u periodu 1.8.2012-1.8.2013
Conficker 5506
downadup 5488
grum 2141
Nepoznato 1920
Sality 1250
Pushdo 1126
Virut 445
Zeus 418
spambot 144
Torpig 136
Pony 83
![Page 13: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/13.jpg)
Web defacement trend u periodu 1.8.2012 – 1.8.2013
![Page 14: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/14.jpg)
Ostali veći napadi tokom 2012. godine
•
•
•
•
•
•
![Page 15: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/15.jpg)
Sigurnost Internetskog prostora u RH (http://globalsecuritymap.com/)
![Page 16: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/16.jpg)
ACDC – osnovni podaci
•
•
•
•
•
•
![Page 17: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/17.jpg)
Advanced Cyber Defence Centre
![Page 18: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/18.jpg)
Uobičajena arhitektura botneta
![Page 19: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/19.jpg)
Čime se bavi ACDC?
![Page 20: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/20.jpg)
Od čega se sastoji ACDC? •
•
•
•
•
•
•
•
•
![Page 21: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/21.jpg)
Čemu služi CCH?
![Page 22: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/22.jpg)
Uloga CARNeta u projektu
•
•
•
•
•
•
•
•
![Page 23: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/23.jpg)
Potencijalni korisnici ACDC projekta
•
•
•
•
![Page 24: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/24.jpg)
Interakcija CCH s većim korisnikom
![Page 25: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/25.jpg)
Modeli interakcije s korisnicima •
•
•
![Page 26: Kratki pregled sigurnosti na internetu u RH i ACDC projekt.pdf](https://reader034.vdocuments.pub/reader034/viewer/2022042707/5853db8e1a28abfa398f7fa8/html5/thumbnails/26.jpg)
ACDC je otvoren •
•
•
•
•
•