Threat Monitoring Center

Slides:



Advertisements
Similar presentations
Solutions for businesses. Keep It Secure Contents Protection objectives Network secured Supplementary products Unique.
Advertisements

Warren Toomey North Coast TAFE Port Macquarie campus
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
Towards Extending the Antivirus Capability to Scan Network Traffic Mohammed I. Al-Saleh Jordan University of Science and Technology.
1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.
EICAR 2009, 12 May 2009 Checkvir Realtime Anti-Malware Testing and Certification Dr. Ferenc Leitold, Veszprog Ltd.
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Digital Automata Unit 7-1 Managing the Digital Enterprise By Professor Michael Rappa.
Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
KASPERSKY ENDPOINT SECURITY
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Computer Skills and Applications Computer Security.
What’s new in SEP Presenter’s Name Here Presenter’s Title Here.
Phishing with Worms Twenty Years of Digital Threats—What Have We Learned and Where Are We Now?
Global Mobile Anti-malware Market WEBSITE Single User License: US$ 2500 No of Pages: 55 Corporate User License: US$
Zemana AntiLogger (2012) Zemana AntiLogger (2012) Zemana Antilogger has been specifically developed to protect PC from numerous security.
Avira Home Office Products: In the year of its 30th anniversary, Avira is going from strength to strength! No experiments when it comes to security.
Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber.
Reach us at Call: | Visit:
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Antivirus Customer Service & Technical Support Helpline Number Antivirus Help Number:
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Global (North America, Europe and Asia-Pacific, South America, Middle East and Africa) Antivirus Software Market 2017 Forecast to 2022.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Advanced Persistent Threats.
Best Antivirus Technical Support number Australia
Antivirus Support. Norton Antivirus Support AVG Antivirus Support.
INTERNET SAFETY FOR EVERYONE
Three steps to prevent Malware infection
Detecting Tomorrows Threats Today
ARSTRAT Cyber Threat Center
Detect Malware No One Else Can… Rapidly Identify it’s capabilities, Mitigate the Threat with Actionable Risk Intelligence.
Presented b by COD & Chicago Computers
Accelerate GDPR compliance with Microsoft 365
Enterprise Botnet Detection and Mitigation System
Intelligence Driven Defense, The Next Generation SOC
MALICIOUS URL DETECTION For Machine Learning Coursework
Global Services.
Computer Virus and Antivirus
Protecting your mobile devices away from virus by a cloud-based approach Wei Wu.
By Quentin Lively Notorious Viruses.
Computer Security Std XI– Chapter 8.
Security in the Workplace: Information Assurance
Antivirus Support Phone Number + 1-(844) One Step IT Solutions December 6, 2017
Computer Worms & Viruses
Norton antivirus helpline number Antivirus customer support
Global Ransomware Protection Market Research Report by Forecast to 2023 Industry Survey, Growth, Competitive Landscape and Forecasts to 2023 PREPARED BY.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Endpoint Security Market to grow at 7% CAGR from 2017 to 2024: Global Market.
Call For Norton Customer Service. customerservice.com/norton- customer-service.html.
As we all know that Kaspersky Antivirus Support is one of the best and most trustworthy companies for third-party technical support in the US. We have.
As we all know that Kaspersky Antivirus Support is one of the best and most trustworthy companies for third-party technical support in the US. We have.
Norton.com/Setup | +1(844) | Norton Internet Security
AVG Antivirus Tech Support Number
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
Android Training in Chandigarh The best Android antivirus in 2018.
Internet Safety for Everyone
Healthcare Cloud Security Stack for Microsoft Azure
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Internet Safety for Everyone
Welcome to Fix Antivirus Activation Error Support Service.
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
NORTON CUSTOMER SUPPORT  Antivirus software are the best for computers. It provide complete security from virus, malware and online threats.
Presentation transcript:

Threat Monitoring Center Focus on quick deployment of analysis capability for one full time person First deployment after two development iterations (4 weeks) Phase I analysis capabilities will be largely emergent, back-driving requirements Technology requirements will change rapidly over first 6 months as new use cases are learned TMC will be hand built and replicated, one for HBGary and one for HBGary Federal

Partnership Feed Agreements Intelligence Feed Partnership Feed Agreements Feed Processor ~ $8K machines Meta Data $10K / yr Digital DNA

Additional Feed Sources Intelligence Feed Additional Feed Sources Feed Processor http://www.safer-networking.org/en/threats/ http://www.emergingthreats.net/rules/ http://www.symantec.com/business/security_response/threatexplorer/ http://code.mwcollect.org/ http://nepenthes.carnivore.it/ http://www.offensivecomputing.net/ http://www.threatexpert.com/ http://www.support-intelligence.com http://www.threatstop.com Many more…. Meta Data Digital DNA

AV Updates as Feed Source Intelligence Feed AV Updates as Feed Source Feed Processor avast! Free 5.0 AVG Anti-Virus 9.0 AVIRA AntiVir Premium 9 BitDefender Antivirus 2010 eScan Anti-Virus 10 ESET NOD32 Anti-Virus 4.0 F-Secure Anti-Virus 2010 G DATA AntiVirus 2010 Kaspersky Anti-Virus 2010 Kingsoft Antivirus 2009+ McAfee VirusScan Plus 2010 Microsoft Security Essentials 1.0 Norman Antivirus & Anti-Spyware 7.30 Sophos Anti-Virus 9.0 Symantec Norton Anti-Virus 2010 TrustPort Antivirus 2010 ~ $8K machines Meta Data Digital DNA

From raw data to intelligence Malware Analysis Feed Processor Responder Active Defense Data Integration Meta Data Link Analysis $12K Maltego primary Dev free 4g Digital DNA Palantir i2 Analyst Workstation $4K

Ops path Malware Attack Tracking Digital DNA™ Active Threat Tracking Mr. A Mr. B Mr. C Malware Attack Tracking Digital DNA™ Active Threat Tracking Detect relevant attacks in progress. Determine the scope of the attack. Focus is placed on Botnet / Web / Spam Distribution systems Potentially targeted spear/whalefishing Internal network infections at customer sites Development idioms are fingerprinted. Malware is classified into attribution domains. Special attention is placed on: Specialized attacks Targeted attacks Newly emergent methods Determine the person(s) operating the attack, and their intent: Leasing Botnet / Spam Financial Fraud Identity Theft Pump and Dump Targeted Threat Email & Documents Theft Intellectual Property Theft Deeper penetration

Cyber Command Integration Malware Attack Tracking Digital DNA™ Active Threat Tracking Meta data from HBGary feed HBGary Global Threat Genome HBGary Threat Tracking Data Malware feed from internal sources Customer Genome Customer maintained threat tracking data Palantir Front End Feed: blacklist Alert: newly emergent method Alert: targeted threat Alert: known intent Alert: expected attack