Secure Browsing Because malware usually doesn’t identify itself.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
David Flournoy Bit9 Mid-Atlantic Regional Manager
Firewall Raghunathan Srinivasan October 30, 2007 CSE 466/598 Computer Systems Security.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Norman SecureSurf Protect your users when surfing the Internet.
Intranet, Extranet, Firewall. Intranet and Extranet.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Separate your corporate environment from unknown threats of the WEB. Define trusted WEB policy. Enforce the use of WEB browsers. Automatically distribute.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
BY OLIVIA WILSON AND BRITTANY MCDONALD Up Your Shields with Shields Up!
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Lecture 15 Page 1 Advanced Network Security Perimeter Defense in Networks: Firewalls Configuration and Management Advanced Network Security Peter Reiher.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Proxy Servers.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
1.1 1 Purpose of firewall : –Control access to or from a protected network; –Implements network access policy connections pass through firewall and are.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
SpyProxy SpyProxy Execution-based Detection of MaliciousWeb Content Execution-based Detection of MaliciousWeb Content Hongjin, Lee.
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Despite of spending high on digital information security, organizations still remain exposed to external threats. However, data center providers are helping.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
An Anatomy of a Targeted Cyberattack
Understanding and breaking the cyber kill chain
Proactive Incident Response
Chapter 40 Internet Security.
Understanding Cyber Attacks: Technical Aspects of Cyber Kill Chain
Advanced Endpoint Security Data Connectors-Charlotte January 2016
BUILD SECURE PRODUCTS AND SERVICES
Firmware threat Dhaval Chauhan MIS 534.
Hotspot Shield Protect Your Online Identity
A lustrum of malware network communication: Evolution & insights
Backdoor Attacks.
Secure Software Confidentiality Integrity Data Security Authentication
Lesson Objectives Aims You should be able to:
Introduction to Networking
Complete Exam Dumps - Pass In 24 Hours - Dumps4Download
Jon Peppler, Menlo Security Channels
Call AVG Antivirus Support | Fix Your PC
Risk of the Internet At Home
Shifting from “Incident” to “Continuous” Response
The Next Generation Cyber Security in the 4th Industrial Revolution
Chapter 4: Protecting the Organization
How to Mitigate the Consequences What are the Countermeasures?
Encryption and Hacking
Implementing Client Security on Windows 2000 and Windows XP Level 150
Securing Windows 7 Lesson 10.
AbbottLink™ - IP Address Overview
Test 3 review FTP & Cybersecurity
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Marcial Quinones-Cardona
6. Application Software Security
Per Söderqvist Per Söderqvist Sales Engineer
Cyber Security For Civil Engineering
Presentation transcript:

Secure Browsing Because malware usually doesn’t identify itself

Introduction The threats are known. The vectors are many. It takes many, often overlapping, technologies to protect your company and stay out of the headlines.

Anatomy of a hack If we look at the cyber kill chain/anatomy of a hack, we can see how it happens. Reconnaissance, Weaponization, Delivery, Exploit, Installation, Command & Control, Actions

The Vector One of the more common vectors to “deliver” an attack relies on the internet and the users who browse them. This relies heavily on end user behavior. Whether on purpose or by accident, as in the case of the "drive-by download", when a user is connected to the internet bad things can happen. The sites are very convincing and setup to trap the user.

Current State Many of the current methods to address this vector are based on sigs/defs which need to already 'know' the threat or advanced analytics which tries to understand bad/suspicious behavior. Why is my thermostat talking to Russia? Unfortunately, they are not and truthfully cannot be 100% since the threats are changing as the defenses evolve. Your blacklists\definitions\signatures are pretty much outdated as soon as you deploy them.

What does Secure Browsing actually mean? This brings us to concept of secure browsing. A methodology/technology that leverages the concept of isolation. Since, as we already said, you can never know with 100% certainty if something is safe or harmful, keep it isolated.

Why isolate? Isolation insures that content never reaches your true ‘endpoints’ which is where it needs to run to do what it was designed to do. Compromise an endpoint then compromise your network. Remember, the threat is now coming from inside. Isolation can also be “disposable” and help with any potentially “persistent” threats.

Where to implement it Isolate on the endpoint Isolate off the endpoint

Secure Browsing Basic Flow Remote Browsers Pool Remote Browser File Cleaning Log Configuration Orchestration Management ICAP Server Policy Proxy HTTP/HTTPS Browser (HTML5) Technology Black List White List

In with the new, out with the old? Does this mean you throw out your firewalls, URL filters, antivirus, behavioral analysis tools and security education programs? Not at all. Cybersecurity is best addresses by a layered approach. Belts and suspenders. Defense in depth. Adding Ericom Shield as a layer to your enterprise will go a long way to insuring the malware cannot get in in the first place.

Reach out to us @ Ericom.com and we can show you how Ericom Shield can provide a critical outer layer to your security that can keep threat off your network to begin with.