1 / 21

Presentation on the importance of a Secure Technology Infrastructure

Presentation on the importance of a Secure Technology Infrastructure. (n)Code Solutions. What are Threats ?. Internal Threats Human Error Dishonest / disgruntled employees Technical Sabotage External Threats Virus Trojans / Worms / Malicious Code Hackers / Intruders. Protection from.

linore
Download Presentation

Presentation on the importance of a Secure Technology Infrastructure

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Presentation on the importance of a Secure Technology Infrastructure (n)Code Solutions

  2. What are Threats ? • Internal Threats • Human Error • Dishonest / disgruntled employees • Technical Sabotage • External Threats • Virus • Trojans / Worms / Malicious Code • Hackers / Intruders

  3. Protection from • Internal protection for • Confidentiality • Integrity • Availability • External protection from • Virus • Hackers / Intruders • Malicious Code

  4. Countermeasures • Patch Management System • Intrusion Prevention Systems • Intrusion Detection Systems • Anti-Virus • Content Management • Firewalls • VPN • PKI

  5. World Statistics on attacks and misuse

  6. Business and Financial Losses

  7. The need for Security ? • InternetWeek: 50% of Corporations have had 30 or more penetrations, 60% lost up to $200K/intrusion • Federal Computing World: Over 50% of Federal agencies report unauthorized access (some are massive numbers) • FBI/Computer Security Institute: 48% of all attacks originated from within the organization • WarRoom Research Survey: 90% of Fortune 500 companies surveyed admitted to inside security breaches

  8. Common IT Security Shortcomings • Enterprise wide patch management system • Intrusion Detection systems on both inside and outside of the perimeter • No firewalls / weak firewalls in place • All / few servers directly open to the internet • Outgoing email server doesn’t require authentication • Partial Content management / prevention solution • Outdated / un-patched mail servers

  9. Patch Management :Why reaction time matters… • Reaction time is critical in preventing viruses and worms, which can cost organizations billions. • Forrester says that organizations typically require more than 300 days to fully deploy patches for most of these issues after the fix is available. • The race begins when the technical details of an issue (such as a security bulletin or release of exploit code) are made public.

  10. The SQL Slammer Worm:What Happened?? • MS SQL Vulnerability and patch released July, 2002 • Worm Released at5:30 GMT,January 25, 2003 • Saturation point reached within 2 hours of start of infection • 250,000 – 300,000 hosts infected • Internet Connectivity affected worldwide • Not easily detected by anti-virus since it did not write itself to disk

  11. The SQL Slammer Worm:30 Minutes After “Release” - Infections doubled every 8.5 seconds - Spread 100X faster than code red - At peak, scanned 55 million hosts per second.

  12. The RPC Blaster Worm:What Happened?? • RPC Vulnerability and patch published by Microsoft on July 16th, 2003. • Vulnerability affects NT 4.0, WinXP, Win2000, and Win2003 Server. • Blaster worm released Monday August 11, 2003 – Main target is only WinXP, Win2000. • +330,000 hosts infected in less than a week • Microsoft had to make network changes to avoid DDOS attack • Worm Variants Appearing Lovsan.B, Lovsan.C

  13. Lessons Learned • Applying patches must be done quickly and thoroughly • If vulnerability applies to clients these must be patched • One infected machine can scan and infect 1000s of victims • The network must be configured with QOS and have the intelligence to filter and control traffic when needed • Complements to patches such as Host-Based Security Agents must be considered

  14. Windows: Critical Security Updates, Security Rollups, Service Packs WindowsUpdate Internet Sync Updates Intranet Configured via web based admin tool. Admin Approves Updates Central Client Config Download and installApprovedUpdates RunningSUS SUS 1.0: How it Works Corporate Servers, Desktops and Laptops with the Automatic Updates Client

  15. Choosing a Patch Management SolutionFunctionality versusIT Resources Based Selection Choose the solution that provides the best balance of functionality versus IT resource constraints for your specific needs High SMS Breadth of Functionality SUS WindowsUpdate Low High IT Resources & Administration Skill Level

  16. Additional Measures Good and effective Anti-Virus Server and Anti-Spam Server on the gateway Install Intrusion Detection Software on the internal as well as external networks Implement firewalls Good Content Management as well as traffic management system Network Monitoring and management software.

  17. Network Security Problems are Growing • Internet connections have increased as a frequent point of attack (from 59% in 2000 to 79% in 2003.) • Of those reporting attacks, we learn: • 27% say they don't know if there had been unauthorized access or misuse – no network information! • 21% reported from two to five incidents • 58% reported ten or more incidents – something isn’t working! • Computer Security Institute & FBI Report • March, 2003

  18. Why Integrated Network Security? • Attackers take advantage of new, complex networks and sophisticated services • In this environment, Everything is a target: • Routers, Switches, Hosts, Networks (local and remote), Applications, Operating Systems, Security Devices, Remote Users, Business Partners, Extranets, etc. • New breed of network attacks have multiple vectors that cannot be blocked by one device • Network security requires an integrated system • Layers of security are required • Embedded security throughout the network • Integrated security in network devices • Network management and reporting must be secure

  19. Security is a business process requiring continuous improvement and automation... 2) Secure 5) Manage and Improve 3) Monitor and Respond 1) Security Policy 4) Test/Assess

  20. The 7 Top Management Errors that Lead to Computer Security Vulnerabilities • Assign untrained people to maintain security and provide neither the training nor the time to make it possible to do the job. • Fail to understand the relationship of information security to the business problem -- they understand physical security but do not see the consequences of poor information security. • Fail to deal with the operational aspects of security: make a few fixes and then not allow the follow through necessary to ensure the problems stay fixed . • Reply primarily on a firewall. • Fail to realize how much money their information and organizational reputations are worth. • Authorize reactive, short-term fixes so problems re-emerge rapidly. • Pretend the problem will go away if they ignore it. http://www.sans.org/resources/errors.php

  21. Thank you

More Related