HKIRC x APNIC Network Security Workshop | Hong Kong Internet Registration Corporation Limited
Events

HKIRC x APNIC Network Security Workshop

Event Name HKIRC x APNIC Network Security Workshop
Date 6-7 July 2023 (Thursday & Friday)
Time 09:00-17:30
Venue Inno Space,1/F, HKPC Building,78 Tat Chee Avenue, Kowloon Tong, Kowloon, Hong Kong
Brief Description

With the rapid advancement of science and the adoption of various technologies in markets around the world, there is unease about the rising complexity of securing the digital ecosystem and the expanding scope of cyber-attacks by malicious actors. In this rapidly evolving digital world, it is paramount that technological developments are monitored and that decision makers in industry, academia and government anticipate and respond to cybersecurity challenges and make informed decisions about maintaining organizational resilience to stay ahead of the curve.

HKIRC is pleased to co-host this workshop with the Asia Pacific Network Information Center (“APNIC”). The purpose of this workshop is to examine key concepts, protocols, policies and practices to protect data and assets from potential attacks or misuse, and it is targeted at network managers and operators, engineers and policy makers interested in cybersecurity and gaining an understanding of security operations.

Event Website

https://forms.office.com/pages/responsepage.aspx?id=cotCu30YH0CsJCiWwGVGR-i8fbv5DvBInfz_IWSfiJBUME9JNjM4TEU0UFFHWUExU1lTWEtMSzRUUS4u

Quota: 40 seats, first-come-first-served
Target Audience: “.hk” user only. This course is targeted to network managers and operators, engineers and policy makers who are interested in network security and want to gain an understanding of security operations.
Language: English
HKIRC will send the confirmation by email on or before enrolment deadline if the enrolment is accepted.

 

Day 1
Session 1 – Intro to Security & Cryptography

  • This session introduces important security concepts, attacks and threat pragmatics, security controls, and cryptography. This session also examines different attack surfaces and common defences for different layers of the TCP/IP stack.

Session 2 – Device & Infrastructure Security

  • Infrastructure security is about protecting critical assets (hardware and software), network and systems. This session provides relevant and fundamental device protection and best practices in securing access to the network and protocols.

Session 3 & 4 – Packet Analysis

  • Packet analysis involves capturing live data over the network and analysing them for detecting network issues, monitor potential misuse or intrusion attempts, examine security problems, or simply learn about network protocols. This session introduces tools like Wireshark and Zeek for packet analysis.

Day 2
Session 1 – Intrusion Detection & Suricatay

  • Threat detection is an important component of security. Intrusion Detection Systems provides an alert system, identifying possible attacks and informs the security admin. This session introduces Suricata, an open-source threat detection and network analysis software.

Session 2 – DDoS Attacks & Countermeasures

  • Denial of service attacks are difficult to address. DDoS attacks can happen to anyone and can have adverse impact on the target’s operations and service availability. This session discusses DDoS attacks and worldwide trends, along with different mitigation strategies that can be implemented.

Session 3 – BGP Route Hijack, Leak Detection & Prevention

  • BGP mishaps such as malicious route hijacking, mis-origination (fat fingers), and bad filters (route leaks) are very common and frighteningly very easy. We need better mechanism(s) to ensure false information is not injected into the global routing system. This session discusses how BGP hijacks are easily implemented and show real-world incidents that had major impact to the global internet.

Session 4 – Secure Internet Routing (RPKI)

  • Building up on the previous session, this session will look at current route filtering tools/techniques and the current best practices for securing the internet routing. The focus is on RPKI implementation, ROA creation, and setting up of an RPKI validator.