Tenable Network Security

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 15 Experts worldwide ranked by ideXlab platform

Gula Ron - One of the best experts on this subject based on the ideXlab platform.

  • Grand Cyber Questions and How They Impact Cyber Start-ups
    Georgia Institute of Technology, 2019
    Co-Authors: Gula Ron
    Abstract:

    Presented on March 29, 2019 at 12:00 p.m. in the Klaus Advanced Computing Building, Room 1116.Ron Gula started his cyberSecurity career as a Network penetration tester for the NSA. At BBN, he developed Network honeypots to lure hackers and he ran US InterNetworking's team of penetration testers and incident responders. As CTO of Network Security Wizards, Ron pioneered the art of Network Security monitoring and produced the Dragon Intrusion Detection System which was recognized as a market leader by Gartner in 2001. As CEO and co-founder of Tenable Network Security, Ron led the company's rapid growth and product vision from 2002 through 2016. He helped them scale to more than 20,000 customers worldwide, raise $300m in venture capital and achieve revenues in excess of $100m annually which enabled an IPO in 2018. Ron is President at Gula Tech Adventures which focuses on investing and advisement of next-generation cyber-Security start-ups companies.Runtime: 60:12 minutesRon will discuss some of the harder questions in cyber we've not come to terms with such as quantifying cyber risk and the government's responsibility for keeping us "cyber safe" and how these grand cyber issues impact cyber start-ups

Richard Bejtlich - One of the best experts on this subject based on the ideXlab platform.

  • the tao of Network Security monitoring beyond intrusion detection
    2004
    Co-Authors: Richard Bejtlich
    Abstract:

    "The book you are about to read will arm you with the knowledge you need to defend your Network from attackers-both the obvious and the not so obvious.... If you are new to Network Security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking 'What's next?' If so, this book is for you."i¾ i¾ i¾ i¾ i¾ i¾ i¾ i¾ i¾ -Ron Gula, founder and CTO, Tenable Network Security, from the Foreword"Richard Bejtlich has a good perspective on Internet Security-one that is orderly and practical at the same time. He keeps readers grounded and addresses the fundamentals in an accessible way." i¾ i¾ i¾ i¾ i¾ i¾ i¾ i¾ i¾ -Marcus Ranum, TruSecure"This book is not about Security or Network monitoring: It's about both, and in reality these are two aspects of the same problem. You can easily find people who are Security experts or Network monitors, but this book explains how to master both topics." i¾ i¾ i¾ i¾ i¾ i¾ i¾ i¾ i¾ -Luca Deri, ntop.org"This book will enable Security professionals of all skill sets to improve their understanding of what it takes to set up, maintain, and utilize a successful Network intrusion detection strategy." i¾ i¾ i¾ i¾ i¾ i¾ i¾ i¾ i¾ -Kirby Kuehl, Cisco SystemsEvery Network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?Network Security monitoring (NSM) equips Security staff to deal with the inevitable consequences of too few resources and too many responsibilities. NSM collects the data needed to generate better assessment, detection, and response processes-resulting in decreased impact from unauthorized activities.In The Tao of Network Security Monitoring, Richard Bejtlich explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend Networks and how to mitigate damage from Security incidents.Inside, you will find in-depth information on the following areas. The NSM operational framework and deployment considerations. How to use a variety of open-source tools-including Sguil, Argus, and Ethereal-to mine Network traffic for full content, session, statistical, and alert data. Best practices for conducting emergency NSM in an incident response scenario, evaluating monitoring vendors, and deploying an NSM architecture. Developing and applying knowledge of weapons, tactics, telecommunications, system administration, scripting, and programming for NSM. The best tools for generating arbitrary packets, exploiting flaws, manipulating traffic, and conducting reconnaissance.Whether you are new to Network intrusion detection and incident response, or a computer-Security veteran, this book will enable you to quickly develop and apply the skills needed to detect, prevent, and respond to new and emerging threats.

Jack Wiles - One of the best experts on this subject based on the ideXlab platform.

  • techno Security s guide to securing scada a comprehensive handbook on protecting the critical infrastructure
    2008
    Co-Authors: Jack Wiles
    Abstract:

    Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control Networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These Networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other Networks. Because there has been limited attention paid to Security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented Security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA Security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, Security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD. * Internationally known experts provide a detailed discussion of the complexities of SCADA Security and its impact on critical infrastructure * Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures * Bonus chapters on Security awareness training, bomb threat planning, emergency communications, employee safety and much more * Companion Website featuring video interviews with subject matter experts offer a "sit-down" with the leaders in the field

Shabatura M. - One of the best experts on this subject based on the ideXlab platform.

  • ДОСЛІДЖЕННЯ КОМП’ЮТЕРНОЇ МЕРЕЖІ СКАНЕРОМ ВРАЗЛИВОСТІ NESSUS
    'Lviv State University of Life Safety', 2019
    Co-Authors: Shabatura M.
    Abstract:

    For today, computer Networks are an integral part of our daily lives. As the analysis shows, the Network is ex-tremely vulnerable, it can serve as a place of information leakage, changes of configuration of settings and modification of data by the attackers. There are many more threats, and the Security of the Network requires a great deal of attention to ensure the Security of the Network in order to maintain the confidentiality and integrity of the data. Organizations must regularly assess the vulnerability of the entire Network to test the Security level and strengthen the Network. We use vulnerability scanners to find weaknesses, which are useful for detecting Security vulnerabilities on a case-by-case basis and across the Network as a whole. The purpose of the work is to explore the computer Network for vulnerabilities using the Nessus Professional scanner. Research Methods – Network scanning by Nessus Professional vulnerability scanner. The Nessus Professional vulnerability scanner from Tenable Network Security, which is freely available, was used for the research. The Nessus Professional scanner has been found to have better functionality and performance than other available scanners. The only downside to the scanner is its cost per year, as well as scanning a large number of hosts on the Network at a time (over 100 hosts). After the scanner was successfully installed, carried out it was in-spected from the moment it was launched to the generation of host test reports. For the work, the Lviv State University of Life Safety Network was tested. In the post-scan report, which is displayed in HTML format, you can see scan details for each host; the number and nature of vulnerabilities; the error correction dashboard. According to the results of testing, vulnerabilities of low, medium and high levels of hazards were identified, totaling 376. Vulnerabilities were ana-lyzed based on the obtained results, namely: a brief description and a way to solve the problem.На сьогодні комп’ютерні мережі є невід’ємною частиною нашого повсякденного життя. Як свідчить проведений аналіз мережа надзвичайно вразлива, вона може слугувати місцем витоку інформації, зміни конфігурації налаштувань та модифікації даних зловмисниками. Існує набагато більше загроз, тому стан захищеності мережі потребує значної уваги щодо забезпечення рівня захисту мережі з метою підтримування конфіденційності та цілісності даних. Для перевірки рівня безпеки та зміцнення мережі організації необхідно регулярно проводити оцінку вразливості всієї мережі. Для пошуку слабких місць використовують сканери вразливості, які корисні для виявлення вад безпеки у кожній окремій системі, а також у всій мережі загалом. Мета роботи – дослідити комп’ютерну мережу на наявність вразливих місць за допомогою сканера Nessus Professional. Методи дослідження – сканування мережі сканером вразливості Nessus Professional. Для проведення досліджень було використано сканер вразливості Nessus Professional від компанії Tenable Network Security, який є у вільному доступі. З’ясовано, що сканер Nessus Professional має кращий функ-ціонал і технічні характеристики порівнянно з іншими доступними сканерами. Єдиним недоліком сканера є його вартість користування протягом року, а також сканування малої кількості хостів у мережі водночас (близько 100 хостів). Після успішного встановлення сканера, здійснювався його огляд від моменту запуску до формування звітів про результати тестування хостів. У роботі тестувалась мережа Львівського державного університету безпеки життєдіяльності. У звіті після сканування, що відображається у HTML форматі, можна побачити: деталі сканування по кожному хосту; кількість та характер вразливостей; інформаційну панель щодо виправлення помилок. За результатами тестування було виявлено вразливості низького, середнього та високого рівнів небезпеки, загалом – 376. Проводився аналіз вразливостей на підставі отриманих результатів, а саме: короткий опис та спосіб вирішення проблеми

Sasha Romanosky - One of the best experts on this subject based on the ideXlab platform.

  • Common Vulnerability Scoring System
    IEEE Security & Privacy, 2006
    Co-Authors: Peter Mell, Karen Scarfone, Sasha Romanosky
    Abstract:

    Historically, vendors have used their own methods for scoring software vulnerabilities, usually without detailing their criteria or processes. This creates a major problem for users, particularly those who manage disparate IT systems and applications. The Common Vulnerability Scoring System (CVSS) is a public initiative designed to address this issue by presenting a framework for assessing and quantifying the impact of software vulnerabilities. Organizations currently generating CVSS scores include Cisco, US National Institute of Standards and Technology (through the US National Vulnerability Database; NVD), Qualys, Oracle, and Tenable Network Security. CVSS offers the following benefits: 1) standardized vulnerability scores, 2) contextual scoring and 3) open framework. The goal is for CVSS to facilitate the generation of consistent scores that accurately represent the impact of vulnerabilities