Presentation is loading. Please wait.

Presentation is loading. Please wait.

Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle.

Similar presentations


Presentation on theme: "Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle."— Presentation transcript:

1 Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle

2 ©2014 AKAMAI | FASTER FORWARD TM THREAT LANDSCAPE

3 ©2014 AKAMAI | FASTER FORWARD TM Daily Attack Size 150 Gbps Source: Akamai 2011201220082010201420132009

4 ©2014 AKAMAI | FASTER FORWARD TM 2014e 2013 2012 2011 2010 2009 2008 2007 2006 2005 Attacks Are Growing in Size Modern attacks harness the scale of growing botnets Gbps Mpps 11 2 18 8 22 11 39 15 48 29 68 38 79 45 82 69 160 144 275 270

5 ©2014 AKAMAI | FASTER FORWARD TM Attack Types – Last 30 Days Source: Akamai

6 ©2014 AKAMAI | FASTER FORWARD TM Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Targeting Applications for Data Theft Increasing number of attacks focused on data and financial theft SQL injection is the primary culprit in 30% of data breaches Source: Veracode 3 out of 4 will be targeted by Web application exploits Web applications are responsible for 54% of hacking-based data breaches

7 ©2014 AKAMAI | FASTER FORWARD TM Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Cost of Data Breach Cost per Record Breached ~$188-199 Brand and Loyalty Impact is Significant Breaches Impact Business Operations Remediation Activity is Costly Top Executives have been Replaced Data Breach Risk Can’t be Transferred Ponemon Institute: http://www.ponemon.org/library/2013-cost-of-data-breach-global-analysishttp://www.ponemon.org/library/2013-cost-of-data-breach-global-analysis ABCNews: http://abcnews.go.com/Business/video/big-number-target-ceo-loses-job-security-breach-23588889http://abcnews.go.com/Business/video/big-number-target-ceo-loses-job-security-breach-23588889 Cost per Record * Number of Records = Cost of Breach

8 ©2014 AKAMAI | FASTER FORWARD TM Attackers Using Old and New Techniques Recent Techniques Application Attack, Reconnaissance - Prolific Vulnerability Scanning Application Attack - Skipfish RFI/LFI to Compromise Host Application Attack - Injection Attacks Capacity Attack – Targeting DNS Capacity Attack - DNS Reflection & Amplification Capacity Attack – Request Floods (DirtJumper) Capacity Attack - NTP Amplification (366x amplification factor) Capacity Attack - Resource Intensive Requests (Search, Login, etc.) Extortion – DDoS Pay and Stop, for a while Fraud - Account Checkers and Harvesters Defense MUST Adapt to Evolving Landscape

9 ©2014 AKAMAI | FASTER FORWARD TM MULTI PERIMETER

10 ©2014 AKAMAI | FASTER FORWARD TM Application Defense

11 ©2014 AKAMAI | FASTER FORWARD TM Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Multiple Perimeters for Internet-facing Applications Internet Web Retrieving content and data Origin Supporting infrastructure and other applications User DNS Finding the application

12 ©2014 AKAMAI | FASTER FORWARD TM Layered Defense

13 ©2014 AKAMAI | FASTER FORWARD TM Nine Layers of Cloud Security 1. Cloud security platform with massive scale 2. Reverse proxy automatically drops network-layer attacks 3. Geo-based blocking 4. Validating attackers against known lists 5. Adaptive rate controls provide rapid and automated response 6. Web application firewall with an Evolving Rule Set 7. Natural resiliency through caching 8. Leverage visibility of evolving attack vectors 9. Require cloud service providers to meet FedRAMP requirements

14 ©2014 AKAMAI | FASTER FORWARD TM There are no rules of architecture for castles in the clouds. -Gilbert K. Chesterton-Gilbert K. Chesterton

15


Download ppt "Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle."

Similar presentations


Ads by Google