chore: rework the structure and strategy
i.e. sometimes less is more
This commit is contained in:
parent
84107953e8
commit
ed30db2d1e
@ -7,7 +7,7 @@
|
||||
\setbeamercovered{transparent}
|
||||
|
||||
\title{Checkpoint \texttt{0x00}}
|
||||
\subtitle{Implementing DoS/DDoS Attack Mitigations}
|
||||
\subtitle{Implementing DoS Attack Mitigations}
|
||||
\author{Adam Mirre}
|
||||
\institute{UTB ve Zlíně}
|
||||
\date{\today}
|
||||
@ -17,59 +17,52 @@
|
||||
|
||||
\frame{\titlepage}
|
||||
|
||||
\begin{frame}{Outline}
|
||||
\begin{frame}{}
|
||||
\tableofcontents[pausesections]
|
||||
\end{frame}
|
||||
|
||||
\section{DoS/DDoS}
|
||||
\subsection{Intro}
|
||||
\begin{frame}{Denial of Service (DoS)}
|
||||
|
||||
\begin{frame}
|
||||
\frametitle{What we're up against}
|
||||
|
||||
\begin{block}{Denial of Service (DoS)}
|
||||
\begin{itemize}
|
||||
\item is a singular effort
|
||||
\item prevents legitimate user from accessing the service
|
||||
\begin{block}{Theoretical part outline}
|
||||
\begin{itemize}[<+>]
|
||||
\item techniques (known and popular)
|
||||
\item impact
|
||||
\item attack tools
|
||||
\item actors and notable occasions
|
||||
\item mitigation/protection techniques
|
||||
\item mitigation/protection tools
|
||||
\end{itemize}
|
||||
\end{block}
|
||||
|
||||
\begin{block}{Distributed Denial of Service (DDoS)}
|
||||
\begin{itemize}
|
||||
\item is a distributed effort
|
||||
\item prevents legitimate user from accessing the service
|
||||
\end{itemize}
|
||||
\end{block}
|
||||
|
||||
\end{frame}
|
||||
|
||||
\begin{frame}{Notable examples}
|
||||
\end{frame}
|
||||
|
||||
\subsection{Mitigations}
|
||||
\begin{frame}{Mitigation techniques}
|
||||
\end{frame}
|
||||
|
||||
\begin{frame}{Tools}
|
||||
\end{frame}
|
||||
|
||||
\section{Testing Infra}
|
||||
\subsection{Infrastructure}
|
||||
\begin{frame}{Topology}
|
||||
\begin{frame}{Setup}
|
||||
|
||||
\begin{block}{Practical part outline}
|
||||
\begin{itemize}
|
||||
\item<1> testing infrastructure setup (and teardown)
|
||||
\begin{itemize}
|
||||
\item<-1-> os
|
||||
\item<-1-> networks
|
||||
\item<-1-> monitoring
|
||||
\end{itemize}
|
||||
\item<2> setup/configuration automation
|
||||
\item<3> staging an attack
|
||||
\frametitle<3,4>{Attack}
|
||||
\item<4> attack automation
|
||||
\frametitle<5,6>{Response}
|
||||
\item<5> attack detection and response
|
||||
\item<6> mitigation tools
|
||||
\item<7> monitoring
|
||||
\end{itemize}
|
||||
\end{block}
|
||||
|
||||
\end{frame}
|
||||
|
||||
\begin{frame}{Systems}
|
||||
\end{frame}
|
||||
\subsection{Testing}
|
||||
\begin{frame}{Tools deployment}
|
||||
\end{frame}
|
||||
|
||||
\begin{frame}{DoS Simulation (in-lab)}
|
||||
\end{frame}
|
||||
|
||||
\section{}
|
||||
\subsection{}
|
||||
\begin{frame}{Conclusion}
|
||||
\section*{Conclusion}
|
||||
\begin{frame}[plain]{Conclusion}
|
||||
Thank you for your attention.
|
||||
\end{frame}
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user