Current Threats to Corporate Information Security Management

Slides:



Advertisements
Similar presentations
(n)Code Solutions Presentation on the importance of a Secure Technology Infrastructure.
Advertisements

CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor
Chapter 12 Network Security.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
CERN’s Computer Security Challenge
Honeypot and Intrusion Detection System
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Copyright 2001 Marchanyh1 Auditing Networks, Perimeters and Systems The SANS Top Ten Audit Checklists, Part 1.
CPT 123 Internet Skills Class Notes Internet Security Session A.
Recent Internet Viruses & Worms By Doppalapudi Raghu.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Security fundamentals Topic 10 Securing the network perimeter.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
Computer Security By Duncan Hall.
Proposed UW Minimum Computer Security Standards From C&C 28 Jan 2005 Draft.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Computer Security Sample security policy Dr Alexei Vernitski.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Servers in the Wild… …and the threats that lurk about. DePaul University Information Security Team TLT Presentation 08 May 2002.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Network System Security - Task 2. Russell Johnston.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Security fundamentals
Chapter 40 Internet Security.
Securing Information Systems
WannaCry/WannaCrypt Ransomware
Securing Network Servers
What they are and how to protect against them
Ilija Jovičić Sophos Consultant.
Critical Security Controls
Instructor Materials Chapter 7 Network Security
Backdoor Attacks.
Compliance with hardening standards
Wireless Network Security
Viruses and Other Malicious Content
Answer the questions to reveal the blocks and guess the picture.
NET 311 Information Security
Information Security Session November 11, 2004
Risk of the Internet At Home
Information Security Session October 24, 2005
Test 3 review FTP & Cybersecurity
Introduction to Internet Worm
6. Application Software Security
Presentation transcript:

Current Threats to Corporate Information Security Management YOUNG Wo Sang Program Committee, PISA ws.young@pisa.org.hk

Two Recent Attacks SirCAM (July 2001) Code Red II (Aug 2001)

Top 10 Internet Security Threats Consensus Report 2000 - SANS, the NIPC, and the Federal CIO Council “These aren't the only threats…just the most common at the moment. Hopeful we will eliminate these threats and create a new list next year.” SANS, the NIPC, and the Federal CIO Council published a consensus report on the Top Ten Internet Security Threats in 2000 summer (http://www.sans.org/topten.htm). The idea is to publicize a list for all to work on. It was expected that a new list can come up in the next year. However, it seems a lot of outstanding issues still deal with the original 10 threats, like the SirCAM and Code Reds .

Top 10 Internet Security Threats 1. Bind 2. Vulnerable CGI Programs 3. Remote Procedure Calls (RPC) 4. Microsoft IIS weakness 5. Sendmail Buffer Overflow 6. sadmind (Solaris) and mountd 7. Global file sharing 8. User ID's / Passwords 9. IMAP and POP 10. Default SNMP Code Red II 1. Code Red and Code Red II uses the IIS weakness, though different from the one quoted in year 2000 2. SirCAM exploits the NETBIOS file sharing (ports 135-139 in NT; port 445 in W2K). It also take advantage of weak password in Windows. SirCAM

SirCAM Damage Distribution Exploit Release or destroy sensitive information Distribution Mass mailing to email addresses found in address book Malicious computer write to unprotected Windows share in the network Exploit Vulnerability of Global File Sharing & Weak Password

Code Red II Damage Distribution Exploit Install “Backdoors” on the infected web servers that allows any remote attacker to further compromise the system Distribution Scan for vulnerable hosts to infect Exploit Vulnerability of Buffer Overflow in Index service that come with IIS (installed by default) Code Red II is much more harmful than Code Red. It opens the victim machine for greater risk.

The Implications 1 Self-sufficiency and Self-learn They do not rely on the email system to spread, but scan for the next victim on the network Optimized for High Efficiency Code Red II spreads much faster than previous Code Red by using a more intelligent algorithm to select victim IP address More and more adaptive -- just a start of a greater attack 3. Un-patched systems hinder total suppression. If we use a biological analogy to depict the breakthroughs of SirCAM and Code Red, we found that they have been regenerated to a more tough, intelligent and more automatic organisms. More self-motivated virus/worm using newer algorithms from AI will increase the spreading, penetration and difficulty of detection. (Evolution of Organisms) The high speed network removes bottleneck of internet traffic , AS WELL AS worm spreading traffic. 3. Un-patched system = those who have virus to infect others, though the virus has no impact to them. e.g. many infected system by Code Red 1 were not patched because the owner did not think the need to fix an unused service (IIS installed by default). However, their machines were used as zombie to attack others.

The Implications 2 4. Remote Exploit 5. Allow further attack A hacker can run commands on the system without having to access it directly. 5. Allow further attack They broadcast to the Internet the servers that are vulnerable to these flaws, allowing others to further attack the victims by other means 6. Next Victims Hackers will find ways to attack more critical components like routers and network equipment 5. Analogy of Code Red II to grant possibilities to other attacks is similar to “complication” (bing fa diseases) in medicine. 6. More crafted attacks is possible. Code Red and SirCAM seems to test water. IIS being the focus of the year but there are a lot other devices with weak security protection.

Potential Threats 1 When the old tricks can win the new game Variants exploiting same old vulnerability When we breaks our Firewall perimeter Remote VPN, Wireless LAN When the Trust fails Mobile workers, Contractors and Guests Unpatched systems with old vulnerability still open to be attached Traditional perimeter protection could be bypassed by VPN. Few consider VPN as insecure. Yes, the channel is encrypted but it does not mean the remote system is well protected. Wireless LAN makes cable tapping control even more difficult. Mobile workers bring with the infected notebooks to the office. Contractors and Guests are more likely to cause infections. Hong Kong Government intranet and several big companies were infected. They have deployed perimeter defense but …

Potential Threats 2 When one thinks he has done enough “I can just reboot the server when the server is defaced by the Code Red” When Nobody cares about the Others “why patch? The infection does not hurt me …” When it is too late when I know People awareness is very doubtful People do not care about others, just like they do not care about the environment Some do care, but they do not possess the tools to detect and defend

Technical Controls Protection Protect network outside firewall as well as Inside firewall Control Outgoing connections besides Incoming connections Avoid Trojans Avoid spread of worm from infected internal machine Wireless LAN: employ secure channel LAN : Control cable tap (hard job!) Firewall configuration Some old configuration just block incoming traffic. People should think about blocking outgoing traffic as well. This prevents Trojan from initiating connection from inside out This also prevents infected system from attacking out Network tapping control Wireless LAN should allow only encrypted connection Common LAN is more difficult to control. Servers should tighten password and permission control to avoid network attack.

Technical Controls Protection (cont.) Detection Correction Tighten all access control, password control IMMEDIATELY Detection Check Server Integrity Scan internal network for vulnerability Install Intrusion Detection System Correction Backup & Recovery Detection We need to change our way of thinking -- Treat internal network more toward untrusted network Do Penetration test to systems to find flaws Install IDS to alert attacks Correction Make sure we backup systems

Management Controls Server patch management (not easy) Effective Information Asset Management Ongoing Patch & Change Management Scan all incoming notebooks (not easy) Manage and Scan Remote PCs (hard!) Management Problems Too many patches – what to patch, what has been patched and what has not? There is a need to have a list of all information assets, listed in order of risk. Control of patch and change is required Out of office systems (notebook, remote PCs) are high risk area. Control must be tightened.

Detection and Reporting Development of Detection, Analysis, Warning and Response Capabilities in corporate and governmental environment Crisis Management Legislation framework We see immature infrastructure both globally and in corporate level in detecting, analyzing and warning of incidences and response. Crisis Management – there is no strong state command of the crisis. Every country, every corp did their own protection. Communication is weak. CERTs need to work a lot harder. CERTs need to have central coordination and yet have to develop distributed points in corps. Teenage Hacking using kiddy hacking tools – hindrance in prosecution

Lack of Resources and Expertise Outsource Information Security Management Outside help must be seek to manage the situation, if resources is limited. Demand of the information security industry and profession outgrows the supply

Lesson learned Our individual security depends on our mutual security The consequences of failure could drive your company out of business

References Top 10 Internet Security Threats 2000 http://www.sans.org/topten.htm Code Red, Code Red II, and SirCAM Attacks highlight Need for Proactive Measures http://www.gao.gov/new.items/d011073t.pdf Code Red II Worm Analysis Update http://www.incidents.org/react/code_redII.php

Q & A Thank You