The Secretive “We protect you from people like us”

Slides:



Advertisements
Similar presentations
Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Advertisements

Nicole Say Kaitlyn Jones Justin Berry Section 1, Group 3.
Introduction and Overview of Digital Crime and Digital Terrorism
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
Information Security EDU IT Security Terms EDU
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Targeted Cyberattacks: A Superset of Advanced Persistent Threats Published in: Security & Privacy, IEEE (Volume:11, Issue: 1 ), Jan.-Feb. 2013,
Unit 7: Store and Retrieve it Database Management Systems (DBMS)
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
HALDEBIQUE Geoffroy ROYER Johan  Crime motivated attacks  Hacktivism  Cyber Warfare.
Computer Security Workshops Security Introduction, Central Principles and Concepts.
Computer Security And Computer Crimes. Problem under consideration A software flaw was found in a national bank's web site that allows anyone who knows.
Software Security Growth Modeling: Examining Vulnerabilities with Reliability Growth Models Andy Ozment Computer Security Group Computer Laboratory University.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Lecture 11 Reliability and Security in IT infrastructure.
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
A sophisticated Malware Arpit Singh CPSC 420
Study Results Advanced Persistent Threat Awareness.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Jonathan Baulch  A worm that spreads via USB drives  Exploits a previously unknown vulnerability in Windows  Trojan backdoor that looks for a specific.
Introduction to Computer Ethics
© RHEINMETALL DEFENCE 2014 Systems Engineering at Rheinmetall Air Defence Dr. Marc Honikel.
Security in Computer System 491 CS-G(172) By Manesh T
Lessons from Stuxnet Matthew McNeill. Quick Overview Discovered in July 2011 Sophisticated worm - many zero-day exploits, Siemens programmable logic controller.
Computer Security By Richa Patel. Viruses A Virus is something that you can get on you on your computer which can damage documents on your computer. What.
© 2010 Verizon. All Rights Reserved. PTE / DBIR.
Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
ETHICS, POLICY & SECURITY ISSUES
ETHICS, POLICY & SECURITY ISSUES
Virus hacking Stuxnet Backups. Computer SecurityComputer Security Catch it, kill it, bin it.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
每时每刻 可信安全 1 Since disks and other magnetic media are only copies of the actual or original evidence, what type of evidence are they are often considered.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Unit 9: Electronic Fraud Professor Thomas Genovese.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Security Vulnerabilities in A Virtual Environment
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Security Mindset Lesson Introduction Why is cyber security important?
NETWORK SECURITY LAB Rehab AlFallaj. Learning Objective ■In this Lecture you will learn: –Ethical Issues related to network security.
Black + White = Grey Ethical Issues Surrounding the Creation and Distribution of Hacker Tools Used in Distributed Denial of Service Attacks Joseph Levine.
Your Cyber Security: The scope of your risk is broad and growing To understand the nature of the risk landscape look at the presentations here today-begin.
NEXT GENERATION ATTACKS & EXPLOIT MITIGATIONS TECHNIQUES ID No: 1071 Name: Karthik GK ID: College: Sathyabama university.
Zero Day Attacks Jason Kephart. Purpose The purpose of this presentation is to describe Zero-Day attacks, stress the danger they pose for computer security.
Vulnerability / Cybersecurity Research Discussion Dwayne Melancon, CISA Chief Technology Officer and VP of Research & Development.
CAN I DO THAT IN THE CLOUD? Jason Testart, BMath, CISSP Director, Information Security Services May 2016.
TruSTAR Sensitive & Proprietary Cloud CISC: Cyber incident exchange and collaboration February, 2016 “We cannot solve problems with the same thinking we.
8 – Protecting Data and Security
3.6 Fundamentals of cyber security
2016 Data Breach Investigations Report
CYBER SECURITY...
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch.
How to build a good reputation online
Forensics Week 11.
Jason Belford September 28, 2017.
Internet Safety for Everyone
A Proposed New Standard: Common Privacy Vulnerability Scoring System (CPVSS) Jonathan Fox, Privacy Office/PDIT Harold A. Toomey, PSG/ISecG Jason M. Fung,
PGE Chris Nolke, Director of Cybersecurity
The Global Challenges of Cybersecurity and Digital Terrorism
Prevention is better than Cure
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Presentation transcript:

The Secretive “We protect you from people like us”

First, what is 0-day? 0-day = Undisclosed or unknown to the public.

Second, what is vulnerability? Vulnerability = susceptibility to risk or harm

0-day + vulnerability As it relates to computer security, a 0-day vulnerability is an undisclosed software flaw that can be used to control the flow of execution in a computer’s memory.

Who is really responsible? Does anyone know who is responsible for the creation of 0-day vulnerabilities? Where does the risk really come from?

Software & Hardware Vendors Hackers do not create 0-day vulnerabilities, technology vendors do. Any time you deploy a new technology you are introducing 0-day vulnerabilities into your environment, even if it’s a “security” product.

Question Do 0-days pose a higher risk than published vulnerabilities?

Fear of the unknown The risks associated with 0-day’s are hugely distorted and amplified by the media and even the security industry.

What is the real risk of 0-day? According to the Verizon Data Breach Investigations Report (DBIR) the risk associated with 0-days is negligible when compared to the risks associated with known vulnerabilities. DBIR reports that 99.9% of exploited vulnerabilities had been compromised more than one year after the associated CVE was published.

and… 97% of compromises observed in 2014 were attributable to just 10 CVEs most of which dated back to the early 2000’s.

and… Half of the CVEs published in 2014 went from publish to pwn in less than one month.

Here’s a pretty graph

So what is the real risk of 0-day? 0-day equates to about 0.01% of all known compromises. Most of the 0.01% aren’t memory corruption.

Common Sense The likelihood of vulnerability exploitation increases as more people learn about the vulnerability and/or its methods of exploitation.

0-day lifespan The biggest secret in the 0-day marketplace is the 0-day. Keeping that secret is challenging. Every time a 0-day is used to compromise a target its chances of discovery increase exponentially. Keeping a 0-day secret means limited & highly-controlled use or non-external research based use.

0-day lifespan 0-day’s are expensive. Anyone who purchases a 0-day exploit wants maximum value which is directly tied to lifespan. It is for this reason that it is rare for 0-day’s to be used for mass- compromise.

Privacy The federal government doesn’t need to use 0- days for mass surveillance. The government collects data directly from service providers.

Privacy If anyone decides to use a zero-day exploit to infringe on your privacy then chances are that you’ve done something to warrant that level of attention. You’ve made yourself a high-value target.

Ethics The ethics of a 0-day are determined by the humans that use them, not by the actual 0-day. In 2013 the FBI allegedly used a FireFox 0-day to to take down a child pornography ring. Ethical or not?

Ethics Stuxnet, a computer worm first reported by security company VirusBlokAda in mid June 2010, was built to sabotage Iran’s nuclear program with a series of what would appear to be accidents. Stuxnet used multiple 0-days. Ethical or not?

Buyers Who buys 0-day exploits?

Buyers Security Companies

Buyers Security Companies Governments

Buyers Security Companies Governments Organized Crime

Buyers Security Companies Governments Organized Crime But, not most software vendors

Vetting buyers Determining who should or should not be able to purchase 0-day exploits is becoming increasingly difficult. A framework needs to be created to support a legitimate 0-day market. The wassenaar arrangement is not the correct framework.

Nessisary Technology Banning 0-day’s == Increased Risk All countries use 0-day vulnerabilities for offensive research (including North Korea).

Questions Contact Information: Adriel T We protect you from people like us