Security Alert: Latest Trends in Global Attacks, Sources and Impact Vince Steckler Vice President, Asia Pacific.

Slides:



Advertisements
Similar presentations
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
ETrust End to End Security Management Bernd Dultinger Sales Manager South CEE & Turkey.
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Lecture 11 Reliability and Security in IT infrastructure.
Simple and Complex Threats Shape the Future Linda McCarthy Executive Security Advisor November 22, 2003.
(Geneva, Switzerland, September 2014)
Computer Security: Principles and Practice
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
© 2003, Cisco Systems, Inc. All rights reserved _07_2003_Richardson_c11 Security Strategy Update Self Defending Network Initiative Network Admission.
CYBER CRIME AND SECURITY TRENDS
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
APA of Isfahan University of Technology In the name of God.
SEC835 Database and Web application security Information Security Architecture.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Unify and Simplify: Security Management
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
C8- Securing Information Systems
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
Note1 (Admi1) Overview of administering security.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Module 11: Designing Security for Network Perimeters.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
Computer Security Status C5 Meeting, 2 Nov 2001 Denise Heagerty, CERN Computer Security Officer.
Cyber Security : Indian perspective. 22 Internet Infrastructure in INDIA.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
MIS323 – Business Telecommunications Chapter 10 Security.
IS3220 Information Technology Infrastructure Security
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Information Management System Ali Saeed Khan 29 th April, 2016.
Securing Information Systems
Virtualization & Security real solutions
Intrusion Detection system
Microsoft Üzleti Megoldások Konferencia 2005
Presentation transcript:

Security Alert: Latest Trends in Global Attacks, Sources and Impact Vince Steckler Vice President, Asia Pacific

2 © 2003 Symantec Corporation. New Technologies and Targets Broadband 120M subscribers worldwide by 2005 SCADA Used by oil and natural gas, controls electric power and water supplies Instant Messaging/P2P Over 500M users by 2005 Wireless 484M users worldwide by 2005 Grid Computing $4.1B market by 2005 Web Services Security $4.4B market by 2006

3 © 2003 Symantec Corporation. High Low Less Knowledge Required to Attack Intruder Knowledge Automated Tools & Attack Sophistication

4 © 2003 Symantec Corporation.  Flash threats?  Massive worm-driven DDoS?  Critical infrastructure attacks? Regional Scope Individual PCs Individual Orgs. Sector Global Impact  1 st gen. viruses  Individual DoS  Web defacement 1990s General Threat Evolution  worms  DDoS  Credit hacking  Blended threats  Limited Warhol threats  Worm-driven DDoS  National credit hacking  Infrastructure hacking Time

5 © 2003 Symantec Corporation. Hours Time Weeks or months Days Minutes Seconds Class II Human response: difficult/impossible Automated response: possible Early 1990sMid 1990sLate 1990s Class III Human response: impossible Automated response: unlikely Proactive blocking: possible Threat Evolution: Malicious Code Contagion Timeframe File Viruses Macro Viruses Worms Blended Threats “Warhol” Threats “Flash” Threats Class I Human response: possible

6 © 2003 Symantec Corporation. Vulnerabilities on the Rise New vulnerabilities per week Source: Bugtraq

7 © 2003 Symantec Corporation. Vulnerability-Threat Window Vulnerability Identified Threat Released Time Threat Evolution: Day-zero Threats A day-zero threat exploits a previously unknown, and therefore unprotected vulnerability.

8 © 2003 Symantec Corporation. Vulnerability identified Threat released Time Day-zero exploit Threat released Threat Evolution: Day-zero Threats A day-zero threat exploits a previously unknown, and therefore unprotected vulnerability. Months Days Hours “Day 0” Novice Programmer Sophisticated Programmer Organized Crime/ Terrorist Organization Nation/State Threat As attacker demographics shift, we expect a reduction in the vulnerability-threat window. Time Until Exploitation

9 © 2003 Symantec Corporation. Wireless InfrastructureWeb Services Internet Backbone/ Broadband Flash and Day-Zero Threats Warhol and Day-Zero Threats Blended Threats DDoS Targeted Hacking Threats Targets Major disruption of B2B services sector-level impact Major disruption to multiple networks Short-term disruption of individual networks Account theft/ corruption, DoS Global Internet Disruption Short-term/ localized Internet disruption Data theft/ corruption, DoS Threat Impact on Emerging Targets

10 © 2003 Symantec Corporation. Instant Messaging & Peer to Peer Grid Computing Physical Infrastructure/ SCADA Flash and Day-Zero Threats Warhol and Day-Zero Threats Blended Threats DDoS Targeted Hacking Threats Targets Potential disruption of all participating grid nodes. Possible major compromise of hosts. Potential disruption of millions of IM/P2P agents. Possible major compromise of hosts. Content eavesdropping, password theft Impact to:  Power  Comm  Hydro  Chemical  Other infra. Disruption of inter- networked SCADA Disruption of targeted infrastructures Data theft and corruption to grid and host Threat Impact on Emerging Targets Short-term disruption to grid computations. Short-term service disruption

11 © 2003 Symantec Corporation. Threat ClassSensing Strategies Reactive Protection Strategies Proactive Protection Strategies Class III threats (Flash threats, Day-Zero) Class II threats (Blended threats, Warhol, Day-Zero) Class I threats (Blended threats, worms, viruses) Distributed Sensor Networks Protocol Anomaly Detection Rule and Statistical Correlation Malicious Code Protection Strategies Generic Exploit Blocking Network Intrusion Prevention Host Intrusion Prevention Only useful after initial wave Manual Fingerprints Auto Fingerprint Generation Auto Fingerprint Generation (for slower Class II threats) Adaptive Security

Information Security Governance

13 © 2003 Symantec Corporation. IT Governance Part of overall enterprise governance, to ensure that IT is aligned to enable business objectives and deliver value IT resources are responsibly used IT risks are mitigated and managed appropriately Governance IT Governance

14 © 2003 Symantec Corporation. Information Security Governance Governance IT Governance Information Security Governance

15 © 2003 Symantec Corporation. Information Security Governance Specific value drivers for –Integrity of information –Continuity of service –Protection of information assets Outcomes: –Strategic Alignment –Value Delivery –Risk Management –Performance Measurement Source: IT Governance Institute

16 © 2003 Symantec Corporation. Security Performance Metrics Examples Summary and Trends Incidents Awareness Risk and Compliance Financial

17 © 2003 Symantec Corporation. Metrics Are a Challenge with Typical Information Security Solutions Fragmented functionality Little to no integration Lack of a cohesive security management capability Doesn’t provide an overall view of security posture Authen-tication Antivirus Firewall IntrusionDetection VulnAssess VPN Content Updates & SecurityResponse 24x7GlobalCustomerSupport AttackRecoveryServices ThreatManagement & Early Warning Honey Pot & Decoy Technology VulnMgmt PolicyMgmt Event & IncidentMgmt AccessControl & Auth IdentityMgmt Config.Mgmt CommonConsole SecurityServices

18 © 2003 Symantec Corporation. Conclusion – Critical Success Factors Information security reports to senior management / CIOs Information security audit is integral part of audit program Clearly defined roles, responsibilities and accountability Security policy in place and compliance monitored Scorecards to ensure common alignment with overall objectives and to provide transparency IT Audit, Control, Security and Assurance professionals play pivotal role in successful governance