Dalibor Ratković TeleGroup 03.11.2010. god. Sigurnost IT resursa nove generacije.

Slides:



Advertisements
Similar presentations
© Blue Coat Systems, Inc All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats.
Advertisements

Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
Security Training Lunch ‘n Learn. Agenda  Threat Analysis  Legal Issues  Threat Mitigation  User Security  Mobile Security  Policy Enforcement.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Security for Today’s Threat Landscape Kat Pelak 1.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Network Security and its Impact on Network Continuity.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Barracuda Web Application Firewall
Security Controls – What Works
Threats To A Computer Network
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Web server security Dr Jim Briggs WEBP security1.
LittleOrange Internet Security an Endpoint Security Appliance.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Nate Olson-Daniel Director of Strategic Development & Principal Engineer The Inevitable Attack.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Adding WAN Optimisation to Boost Storage Sales Success Blue Coat in a Virtual World.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Securing Information Systems
Information Security– SNO International Zanzibar, Tanzania Joe Beaulac, Sr. Manager – Cyber Defense Center & Risk/Vulnerability Management 23 September.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Unify and Simplify: Security Management
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Cyber crime & Security Prepared by : Rughani Zarana.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Dell Connected Security Solutions Simplify & unify.
Classification 10/3/2015 Worry-Free Business Security 5.0.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Topic 5: Basic Security.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cyber Security : Indian perspective. 22 Internet Infrastructure in INDIA.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker.
June 30, 2016 Intelligent Security and Compliance Optimization Adrian Cunningham Sr. Sales Engineer.
Predrag Spasic | Sales Manager Serbia and Macedonia
Cyber Security Zafar Sadik
Web Application Protection Against Hackers and Vulnerabilities
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Securing Information Systems
Teaching Computing to GCSE
Risk of the Internet At Home
امنیت اطلاعات و ضرورت آن
Securing the Threats of Tomorrow, Today.
Chapter 9 E-Commerce Security and Fraud Protection
1:53:58 AM.
Contact Center Security Strategies
Implementing Client Security on Windows 2000 and Windows XP Level 150
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
In the attack index…what number is your Company?
Presentation transcript:

Dalibor Ratković TeleGroup god. Sigurnost IT resursa nove generacije

Slide 2 Agenda Današnja situacija na polju IT sigurnosti Mehanizmi zaštite Praktična riješenja Pitanja i odgovori Demonstracija i pilot projekti kod korisnika

Slide 3 Rizici kojima ste izloženi Prekid poslovnih aktivnosti Gubitak produktivnosti Krađa informacija Odgovornost za nastalu situaciju Narušena reputacija i gubitak povjerenja kod korisnika

Slide 4 Upravljanje procesom sigurnosti 99% organizacija je prijavilo incident iako su imali antivirusnu zaštitu i firewall sisteme Potrebno je izvršiti zaštitu od svih mogućih prijetnji

Slide 5 Kreatori čuvenih virusa Profil: –Muškarci –Između 14 i 34 godine –Bez djevojke –BEZ KOMERCIJALNOG INTERESA !!!!

Slide 6 Današnja realnost According to investigators, in 2003, a student of Balakov Institute of Engineering, Technology and Management, Ivan Maksakov, 22, developed a few knowbots and set up a network of hackers. The bots initiated DoS- attacks on the web-sites of bookmakers, which were accepting stakes in the Internet.

Slide 7 Organizovane kriminalne grupe

Slide 8 Phishing Andrew Schwarmkoff Connection to the russian Mafia Phishing of Creditcard-Numbers „The Phisher-King“

Slide 9 Koliko je velika malware industrija? The FBI claims financial loss from spyware and other computer-related crimes have cost U.S. businesses $62 Billion in ,150 unique phishing variations counted in August 2006 by the Anti- Phishing Working Group Costs of goods and services in cybercrime forums: $1000 – $5000: Trojan program, which could steal online account information $ 500: Credit Card Number with PIN $80-$300: Change of billing data, including account number, billing adress, Social Security number, home adress and birth date $150: Driver‘s licence $150: Birth certificate $100: Social Security Card $7 - $25: Credit card number with security code and expiration date. $7: Paypal account log-on and password

Slide 10 Threat Evolution to Crimeware 2001 Complexity Crimeware Spyware Spam Mass Mailers Intelligent Botnets Web Based Malware Attacks Multi-Vector Multi- Component Web Polymorphic Rapid Variants Single Instance Single Target Regional Attacks Silent, Hidden Hard to Clean Botnet Enabled Vulnerabilities Worm/ Outbreaks

Slide 11 More Dangerous & Easier To Use Packet Forging/ Spoofing Password Guessing Self Replicating Code Password Cracking Exploiting Known Vulnerabilities Disabling Audits Back Doors Sweepers Sniffers Stealth Diagnostics High Low 2000 DDOS Internet Worms Technical Knowledge Required

Slide 12 Sadašnja Situacija 22,000 new malware samples per day, a network worm breakout and the sandbox- enabled antivirus Nearly 30,000 Malicious Web Sites Appear Each Day

Slide 13 Međunarodni standardi Financial Services Regulations  Basel II – Global  Gramm-Leach-Bliley Act (GLBA) – US  Payment Card Industry (PCI) Security Standard – Global Industrijski standardi  BS ISO/IEC Compliance - Global  CobiT - Global  Data Protection Act (DPA) - UK

Slide 14 Metodologija zaštite u IP mrežama

Slide 15 Zaštita na klijentu/hostu na više nivoa 1025 ??

Slide 16 Zaštita na Internet gateway na više nivoa

Slide 17 Dva nivoa zaštite two-tier

Slide 18 RIješenja 1 Firewall IPS/IDS sitemi Content Monitoring/Filtering Antivirus na hostovima, mail box i na nivou GW Antispam zaštita Endpoint security WAF SSL VPN

Slide 19 RIješenja 2 Data Leakage Prevention Encryption/PKI/Digital Certificates Identity & Access Management (NAC) Patch Management Penetration Testing/Risk & Vulnerability Assessment Log and Event Management Platform Database Security IT Forensics

Slide 20 Partneri Telegroupa

Slide 21 Partneri

Slide 22 Content Monitoring/Filtering Kontrola Internet pristupa kao značajnog elementa u poslovanju Privatno korištenje Interneta narušava poslovne aplikacije –30-40% saobraćaja ne koristi se u poslovne svrhe –P2P programi, Instat Messanger, Skype, Kaaza... 30% od ukupnog broja zaposlenih šalju povjerljive informacije slučajno ili namjerno

Slide 23 Web Threats are Increasing The Malware Landscape is slowly shifting to Web- based attacks (HTTP) and a collaboration of existing technologies is needed to combat the new wave of malware threats Worms No fundamental change, slow growth WebThreats High Volume and Growing

Slide 24 Blue Coat - kompletno rešenje Public Internet Internal Network Port 80 traffic Reporter Visual Policy Manager Management Tools Director Authenticate IM ProxySG Streaming P2P ProxyAV Web AV Filtering

Slide 25 IPS/IDS riješenja

Slide 26 IPS/IDS riješenja

Slide 27 IPS/IDS riješenja

Slide 28 EndPoint Security Know your environment  Vulnerability assessment and network discovery Manage Known Risk  Through effective patch management Manage Unknown Threats  Through white list based application control Prevent data leakage  White list based peripheral device management  Secure data in transit Secure mobile devices  Disk encryption with boot protection  Protection for mobile devices

Slide 29 Lumension Device Control  Enables only authorized removable (peripheral) devices to connect to network, laptop, thin client, laptop and desktop  Reduces risk of data theft, data leakage and malware introduction via unauthorized removable media  Assures and proves compliance with the landslide of regulations governing privacy and accountability

Slide 30 Blue Coat Visibility PacketShaper –Install onto network (inline or out) –AutoDiscover & measure Classify –Find all applications on network –See hard to find - P2P, Skype, YouTube, iTunes, Flash TV –Break down Enterprise applications SAP, Citrix, Microsoft Measure –Utilization –Response times –120+ stats

Slide 31 Top 10 and Response Times Top 10 : Where Budget is Spent –How much bandwidth is recreational –P2P, YouTube, FlashTV, iTunes, etc –What % goes to mission critical Response Times –Total Delay: per transaction, per app –Network Delay: time on network –Server Delay: Time spent by server SAP Response Times Spiking Cause: Spike in connection hitting server. Most connections ignored Total Delay SAP Order Entry: 1220 ms Network Delay: 340 ms Server Delay: 880 ms

Slide 32 PacketShaper Visibility –All Applications –Real Time Voice MOS Granular QOS –Per App, User, Call –Intelligent MPLS –Real Time Optimization Compression –Diskless –2x-4x Capacity Gain 32

Slide 33 Reference Telekom Srpske Uprava za Indirektno oprezivanje, MUP RS Klinički Centar Univerzitet Apeiron, Slobomir Univerzitet, Statistički zavod RS, HET Vlada Brčko distrikta VolksBanka, Komercijalna Banka Nova Banka Balkan Investment Banka Pavlović Banka Bobar Banka

Slide 34 Implementirano rješenje

Slide 35 Implementirano rješenje br. 2

Slide 36 Implementirano rješenje br. 2

Pitanja i odgovori! TeleGroup Marije Bursać Banja Luka, Republika Srpska, BiH