14,698 High & Critical Vulnerabilities since 2005 Source: CVE Details

Slides:



Advertisements
Similar presentations
Security Update Server Registration, Active scanning and Windows patching.
Advertisements

Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection Aaron Beach Spring 2004.
1© Copyright 2011 EMC Corporation. All rights reserved. Advanced Persistent Threat Sachin Deshmanya & Srinivas Matta.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
ForeScout Technologies Ayelet Steinitz, Product Manager April, 2003.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Presented by Justin Bode CS 450 – Computer Security February 17, 2010.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Department Of Computer Engineering
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Security of Communication & IT systems Bucharest, 21 st September 2004 Stephen McGibbon Chief Technology Officer, Eastern Europe, Russia & CIS Senior Director,
PROS & CONS of Proxy Firewall
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
PBA. Observations  Growth, projects, busy-ness –Doing an incredible amount of work  Great Quality of work  Concern about being perfect  Attitudes.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
1 GFI LANguard N.S.S VS NeWT Security Scanner Presented by:Li,Guorui.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Part 2- An IT Auditing Framework
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
Endpoint Control. Module Objectives By the end of this module participants will be able to: Define application detection lists to monitor applications.
Agenda Review route summarization Cisco acquire Sourcefire Review Final Exam.
Virtual techdays INDIA │ august 2010 Threat Management Gateway 2010 – A Deep Dive Anirudh Singh Rautela │ TSP – Security, Microsoft Corporation.
Lecture 15 Page 1 Advanced Network Security Perimeter Defense in Networks: Firewalls Configuration and Management Advanced Network Security Peter Reiher.
Xitao Wen Xin Zhao Taiyo Sogawa. Protocol-level vulnerability and attack Defense: Intrusion Detection/Prevention Our goal o Defeat Cisco IPS by manipulating.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Lecture 11 Page 1 CS 236 Online Customizing and Evolving Intrusion Detection A static, globally useful intrusion detection solution is impossible –Good.
Determina DARPA PI meeting Page 2Confidential © Determina, Inc. Agenda LiveShield –Product and Technology –Current Status Applications to Application.
MIS Week 6 Site:
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Integration Framework: QRadar 7.2 MR1.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
November 19, 2008 CSC 682 Use of Virtualization to Thwart Malware Written by: Ryan Lehan Presented by: Ryan Lehan Directed By: Ryan Lehan Produced By:
Sky Advanced Threat Prevention
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Blue Lane Technologies Best of Breed IPS April 29, 2008 Interop 2008.
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
Janis Buikauskis Joe Kubena Kyle Nelson Chris Schrader.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Final Project: Advanced Security Blade IPS and DLP blades.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Final Project: Advanced security blade
Nessus Vulnerability Scan
Protection Against Rootkits “Defense In Depth”
Secure Software Confidentiality Integrity Data Security Authentication
Threat Management Gateway
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
PBA.
Intro to Ethical Hacking
Intro to Ethical Hacking
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Gregory Morton COSC380 February 16, 2011
ISMS Information Security Management System
Home Internet Vulnerabilities
Networking for Home and Small Businesses – Chapter 8
Information Assurance & Network Security Certificate
Airport & Aviation Security
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Using Software Restriction Policies
Presentation transcript:

14,698 High & Critical Vulnerabilities since 2005 Source: CVE Details

Testability Gap

Testing “Defense in Depth” Windows Clients Data Center Apps Oracle, EMC, Veritas, HP, Microsoft Microsoft (Windows, IE, Office), Adobe, Mozilla, etc. Firewall & Network IPS Gap Analysis Protected & Exposed Vulnerabilities HIPS, AV, etc. NSS Labs - Live Test™ Framework Attacks

Network Intrusion Prevention (IPS) Varies widely IPS products have significant gaps in coverage Default configs not sufficient  Tune Product Block Rate: Default vs. Tuned Policies Source: Q NIPS Test, n=1159

Host Intrusion Prevention (HIPS) varies widely Attackers will try multiple exploits and variants Quality of signatures matters Source: Q EPP HIPS Test, n = 123

Evasion: Every AV product can be circumvented Hundreds of options, thousands of combinations Old attacks can be made new again VendorHTML ObfuscasionPayload EncodingFile CompressionExe Compressors A43%40%80%40% B100%40%80%100% C 40%80% D100%80% E100%60% 80% F43%20%80%40% G43%40%60%40% H57%60%80% I100%40%60% J100% 60%80%

What’s Needed… “Gloves off” Security Testing –If you’re not testing like the bad guys, what’s the point. Real-world malware & phishing tests Vulnerability-focused exploit testing & protection Stopping variants Properly handling evasion techniques Good default, recommended and tuned policies