Dynamics of (in)security

Slides:



Advertisements
Similar presentations
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Advertisements

Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
HIPAA Security Standards What’s happening in your office?
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Lecture 11 Reliability and Security in IT infrastructure.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Website Hardening HUIT IT Security | Sep
SEC835 Database and Web application security Information Security Architecture.
Storage Security and Management: Security Framework
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Discussing “Risk Analysis in Software Design” 1 FEB Joe Combs.
What does “secure” mean? Protecting Valuables
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Module 14: Configuring Server Security Compliance
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
CPT 123 Internet Skills Class Notes Internet Security Session A.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Computer Security By Duncan Hall.
Role Of Network IDS in Network Perimeter Defense.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
IS3220 Information Technology Infrastructure Security
Critical Infrastructure Protection and the Role of the Next Generation Firewall Blaž Ivanc.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Network security Vlasov Illia
Cybersecurity - What’s Next? June 2017
Critical Security Controls
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Security Standard: “reasonable security”
CONNECTING TO THE INTERNET
Secure Software Confidentiality Integrity Data Security Authentication
Compliance with hardening standards
Cyber Protections: First Step, Risk Assessment
Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009
Firewalls.
Managing Multi-user Databases
Security in Networking
I have many checklists: how do I get started with cyber security?
Unit 1.6 Systems security Lesson 2
Skybox Cyber Security Best Practices
Contact Center Security Strategies
Chapter 4: Protecting the Organization
How to Mitigate the Consequences What are the Countermeasures?
Intrusion Detection system
Topic 5: Communication and the Internet
Anti-Phishing Campaign
PLANNING A SECURE BASELINE INSTALLATION
Test 3 review FTP & Cybersecurity
Chapter 1 Key Security Terms.
6. Application Software Security
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

Dynamics of (in)security Operational Excellence Webinar Series Patch Management Dynamics of (in)security ReBIT in collaboration with Sequretek & Kotak Bank http://webinar.rebit.org.in Webinar support from Cisco

Information Security Governance, Kotak Agenda Anand Naik Co-CEO of Sequretek Patch and Vulnerability Management Best Practice Ninad Chavan Information Security Governance, Kotak Case Study at Kotak Agnelo D’souza CISO Kotak Moderator Vivek Srivastav SVP-R&I, ReBIT Agenda: ReBIT’s Industry Initiatives Stats on Patching Security Vocabulary Patch and Vulnerability Management Best Practices Case Study at Kotak Bank Q/A Sessions

ReBIT’s Industry Initiatives Securing the Financial Sector

ReBIT’s Facilitator Role Business Leader’s - Forum Industry Stakeholders Research Institutions Community Leadership - WG Operational Excellence

ReBIT’s Industry Initiatives Cybersecurity Assessment Tools VAPT Accreditation Body Auditing and Monitoring Tools Regulatory Technologies & Reporting Operational Excellence Webinar (monthly): Industry initiatives to improve cybersecurity postures DMARC Webinar - with PayPal & ICICI Bank – May 11th Patch Management – Dynamics of (in)security – July 4th Upcoming - FIDO DNSSEC & DNS Governance IR Cybersecurity Awareness Campaign Business Leader’s Forum Cybersecurity Assessment Framework WG Auditing and Monitoring Cybersecurity Maturity Model - WG 6-months effort: Kicked off in Feb, ongoing industry initiative to define a uniform yardstick to assess a firm’s cybersecurity maturity, benchmark and help create evolution roadmap

Vulnerability and Patch Management Some statistics

Patching Vulnerability Recent incident of Petya/NotPetya and WannaCry underscores the importance of Patch Management 77% of the total vulnerabilities are because of either poor patching or poor configuration Heartbleed: http://heartbleed.com Shellshock: https://en.wikipedia.org/wiki/Shellshock_%28software_bug%29 LogJam: https://en.wikipedia.org/wiki/Logjam_(computer_security) Edgescan 2016 Stats Report

How fast are we fixing vulnerabilities? The vulnerabilities discovered are a result of providing “Fullstack” continuous vulnerability management to a wide range of client verticals; from Small Businesses to Global Enterprises, From Telecoms & Media companies to Software Development, Gaming, Energy and Medical organisations. The statistics are based on the continuous security assessment & management of over 57,000 systems distributed globally. Edgescan 2016 Stats Report

Median number of days for vulnerability exploit Source: Recorded Future - Week to Weak: The Weaponization of Cyber Vulnerabilities, 2014

Talk about security like a pro Security Vocabulary Talk about security like a pro Source attribution: Cisco

“What do you mean, vulnerable? It works the way I designed it to!” Vulnerability Vulnerability A weakness, design or coding error, or lack of protection in a product that enables an attack. “What do you mean, vulnerable? It works the way I designed it to!” Lack of protection against code injection Mishandling of unexpected conditions Insufficient enforcement of authentication and authorization A product that has safeguards in place to protect against a given threat is considered to be secured, but only against that specific threat. A vulnerability is any weakness or absence of protection that may be exploited to bypass the product’s security. For example, a vulnerability could come from the way the product handles a threat that was never identified, and for which the product has no safeguards. Vulnerabilities might exist for many reasons. In some cases there might be a vulnerability because the threat was never identified, so the product couldn’t be designed with a countermeasure against it. In other cases, a product might not have been thoroughly tested and gone through a secure development and design process, and so that product doesn’t implement robust security against known threats.

Threats Threat A potential danger that could cause harm to information or a system Product Threat Agent Threat Agent An entity that exploits a threat A threat is an event that could cause harm to a system or the information contained in a system. Threats can come from multiple sources including physical events, logical problems in software, and human actions.

“Exploits and attacks go hand in hand…” A practical method to take advantage of a specific vulnerability Attack The use of an exploit against an actual vulnerability Attack Vector A theoretical application of an exploit “Exploits and attacks go hand in hand…” Zero-Day Attack An attack that exploits a previously unknown vulnerability for which there is not yet a defense An attack vector is a path or means by which a hacker (or cracker) can gain access to a computer or network server in order to deliver a payload or malicious code. Attack vectors enable hackers to exploit system vulnerabilities, including the human element. An exploit is a process or program that takes advantage of an potential vulnerability to compromise a system. A physical example of this would be the vulnerability of locks to being picked. Locks are designed in a predictable way, and a set of lockpicking tools along with the knowledge of how to use them is an exploit against a lock. Exploits in the computer world behave in a similar way. If a piece of code predictably provides a way for an unauthorized user to gain access to a system, that access method and information on how to use it would represent a predictable and repeatable danger to the system. Any time such an exploit is used, the incident is known as an attack. A zero-day attack is an attack or threat that exploits a previously unknown vulnerability, meaning that the attack occurs on "day zero" of awareness of the vulnerability. This means that the developers have had zero days to address and patch the vulnerability. Zero-day exploits (actual software that uses a security hole to carry out an attack) are used or shared by attackers before the developer of the target software knows about the vulnerability.

Exposure Close calls still count! The probability and severity of an attack using a specific exploit Time between the announcement of a vulnerability and a suitable patch Any information leak that facilitates an attack Close calls still count! Whether or not an attack is successful, an exposure has still occurred. When an exploit is used to take advantage of a vulnerability and launch an attack against a product, that incident is known as an exposure. The fortunate goose in this picture escaped the alligator’s snapping teeth, but he had an extremely close call. The potential harm harm to the goose if he’d flown a little lower and not managed to escape is known as the exposure factor. In business terms this is the the potential percentage of loss to an asset if a threat is realized. NEED PICTURE: Plumber hanging over, exposed → cartoon form.

Mitigation A few examples… Reduction in attack surface A strategy for reducing or eliminating the severity of a security issue A few examples… Reduction in attack surface Security education and training Defensive coding Secure code review PI (Platform Independent) code Run time defenses Security features (encryption, packet filtering, logging) When designing a product it is important to identify the potential threats to the product’s security and implement protections to reduce or mitigate the risk from threats. These protections are commonly known as countermeasures or safeguards. A countermeasure can be an action, device, or procedure that reduces, eliminates, or prevents harm from an attack, or discovers and reports on an attack after the fact. In short, a countermeasure is the deployment of a set of security services, including but not limited to the ones listed here, designed to protect against a specific threat. Countermeasures can be network, host, or application based. For example, a company might want to implement countermeasures against a network information gathering attack meant to find out what kind of hosts they have on their network. They could configure their routers to restrict their responses to footprinting requests, and configure operating systems that host network software (for example, software firewalls) to prevent footprinting by disabling unused protocols and unnecessary ports. If that same company wanted to implement countermeasures to protect their individual hosts against viruses and inappropriate logons, they would want to make sure their hosts had all the current security patches for the operating system. They might also install antivirus and firewall software. Additionally, they would likely establish and enforce a security policy requiring that all user passwords be changed regularly. Application level countermeasures are commonly implemented during the design phase of a product and will be covered most frequently in the Security Ninja courses. These include things like secure software development, robust vulnerability mapping and testing. We will cover more on application countermeasures later in this presentation.

Vulnerability and Patch Management Mitigation Mitigation A strategy for reducing or eliminating the severity of a security issue And the most important Vulnerability and Patch Management When designing a product it is important to identify the potential threats to the product’s security and implement protections to reduce or mitigate the risk from threats. These protections are commonly known as countermeasures or safeguards. A countermeasure can be an action, device, or procedure that reduces, eliminates, or prevents harm from an attack, or discovers and reports on an attack after the fact. In short, a countermeasure is the deployment of a set of security services, including but not limited to the ones listed here, designed to protect against a specific threat. Countermeasures can be network, host, or application based. For example, a company might want to implement countermeasures against a network information gathering attack meant to find out what kind of hosts they have on their network. They could configure their routers to restrict their responses to footprinting requests, and configure operating systems that host network software (for example, software firewalls) to prevent footprinting by disabling unused protocols and unnecessary ports. If that same company wanted to implement countermeasures to protect their individual hosts against viruses and inappropriate logons, they would want to make sure their hosts had all the current security patches for the operating system. They might also install antivirus and firewall software. Additionally, they would likely establish and enforce a security policy requiring that all user passwords be changed regularly. Application level countermeasures are commonly implemented during the design phase of a product and will be covered most frequently in the Security Ninja courses. These include things like secure software development, robust vulnerability mapping and testing. We will cover more on application countermeasures later in this presentation.

Patch Management Best Practices Deep Dive

http://webinar.rebit.org.in ReBIT Operational Excellence Webinar Series Patch Management - Dynamics of (in)security http://webinar.rebit.org.in Visit for future webinars and events