450 likes | 624 Views
Escalating Cyber Security Threat. Jack Sebbag Canadian VP & General Manager January 31st, 2005. The Escalating Threat. Security threats in global business have become a board room issue The consequences of network downtime caused by security issues have become financially significant.
E N D
Escalating Cyber Security Threat Jack Sebbag Canadian VP & General Manager January 31st, 2005
The Escalating Threat • Security threats in global business have become a board room issue • The consequences of networkdowntime caused by security issues have become financially significant
Todays Malware Count – 112195 (Jan 05) Source: McAfee’s VirusScan statistics
Virus Outbreak Count – Medium and above Source: A.V.E.R.T
The Good old days • New Virus infects a company • Sample sent to lab • New Driver written • Customer gets fix • All customer updated • Maybe virus spreads over next weeks/months
Today • Virus infects globally within hours • Sample sent to lab (30min) • New Driver written (1hr) • Customer deploys update (hours/days) • Too late…
The Speed Of Attacks Accelerates SQL Slammer: • Blended threat exploits known vulnerability • Global in 3 minutes • Enterprises scramble to restore business availability • Discovered 1/25/03
Propagation Explosion Population Increase 7/17/01 9/18/01 12/04/01 1/25/03 8/11/03 Source: IDC 2002
18 15 12 9 6 3 0 Melissa Loveletter Kournikova Time needed to infect 10,000 devices (in Hrs) Code Red Nimda Goner Klez What’s Next Slammer LovSan 1998 1999 2000 2001 2002 2003 2004 2005 2006 2008 Market Drivers = Vulnerability Window Time needed to deploy counter measures (in hrs)
Serious Business Impact • Bank of America • 14,000+ ATMs down for over a day • Ford Motor Company • Many manufacturing facilities off-line, workers sent home • Continental Airlines • Reservation system taken off-line • BMW • Assembly plants impacted • Air Canada • Call center and check-in systems infected, required manual check-in • Cisco • Major internal infection, partners blocking email from Cisco.com
Intend to IncreaseSecurity Spending Expect Spending to Stay Flat 35.4% 59.6% 4.8% Intend to Decrease SecuritySpending The Response: Increased Security Spending Source: CIO Magazine
Shorter Time WindowFrom Patch to First Attack Apr. 13, 2004 Patch MS00-078 April 30 2004 Sasser 17 Days Oct. 16, 2003 Patch MS03-026 Aug. 11 2003 MSBlaster 26 Days Jul. 24, 2002 Patch MS02-039 Jan. 25 2003 Slammer 185 Days Oct. 17, 2000 Patch MS00-078 Sept. 18 2001 Nimda 336 Days
Wireless Enter The New Platform For Attack:
Wireless Networks: The Unsecured Frontier • 930 million current users, 140 million in United States (IDC)estimates 1.2 billion smartphones by 2004 • Wireless devices in business use to grow from 12 million in 2004 to 39 million in 2006 • 70 percent of wireless networks are not secure - New York Times, 3/4/04
Get Ready For 1.2 Billion Holes in the Global Business Network • Handheld devices • 15 million to ship in 2002 (ABN AMRO) • Total by 2004: 92 million (ABN AMRO) • Just becoming powerful enough to do damage • Smart Phones • Combination of mobile phone and PDA • Will hit North America, EMEA and APAC en masse • By 2004, 1.2B Smart Phones worldwide (IDC) • Proof of Concept • Japanese ISP infected, shuts down emergency phone systems
SPAM – threat or nuisance? • Dramatic rise in spam growth rates • Aberdeen group survey results • 40% to 50% of all incoming emails today is spam
Why is SPAM growing • Cost • Efficiency • Access to large population via Internet
The 5 Costs of Spam • Users time to read the email – productivity issues • Gartner: Spam messages cost US organizations $1 billion a year in lost productivity. • Bandwidth use • Data storage space • Standard Email continues to grow in size. • Legal and moral related issues • Already cases in US courts where employees suing their employers to keep them in clean safe working environment. • New delivery mechanism for trojans and viruses – we have already seen Backdoors distributed via spam
Threats Ahead in 2005 and beyond • Phishing • Spyware • Distributed Denial of Service (DDOS) • Router worms • Spit storms
Is it Fishing or Phishing?? • Phishing attacks use 'spoofed' e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc. By hijacking the trusted brands of well-known banks, online retailers and credit card companies, phishers are able to convince up to 5% of recipients to respond to them. • Before submitting financial information through a Web site, look for the "lock" icon on the browser's status bar. It means your information is secure during transmission.
Spyware • Spyware: Covertly gathers user information and activity without the user's knowledge. Spy software can record your keystrokes as you type them, passwords, credit card numbers, sensitive information, where you surf, chat logs, and can even take random screenshots of your activity. Basically whatever you do on the computer is completely viewable by the spy. You do not have to be connected to the Internet to be spied upon. • McAfee provides Spyware, Adware, Dialers, Jokes, Keyloggers, Password Stealers and other PUP detection capabilities in VirusScan 8.0i • McAfee is providing AntiSpyware Enterprise in March 2005 that will enhance this technology to provide removal and realtime on access scanning to prevent Spyware from targeting a system
DDoS attacks – Money, Money Money Hi tech criminals now using Network for extortion. Online gambling company targeted by extortionists, threatening widescale DDoS attacks.
Future Attack Technologies • Router worms • Spit storms
Where to start with Security protection? Data Theft Viruses Spyware Worms PeerToPeer attacks Bad Stuff Adware External Hacker Internal Hacker Spam Exploits DoS User Phishing Identity Theft Mailers DDoS Vulnerabilities
The Window Of Vulnerability • A combination of: • The SPEED of attack • The BLENDED attack mechanism • The EVOLVING network environment • Reducing the window of vulnerability • Proactively reduce the speed of attack • Proactively reduce the chance of attack success • Proactively reduce the exposure to attack
Detecting the method - The attack life cycle Proof of concept code posted Attack written & starts Security issue discovered Security Fix Posted Signature Posted VENDOR CUSTOMER CUSTOMER Attack Vulnerability Security Vulnerability Time Pro-Active Re-Active 0 Security & virus issues Discovered
The attack life cycle Security Behaviour Attack Behaviour Traditional AV update Proof of concept code posted Attack written & starts Security issue discovered Security Fix Posted Signature Posted VENDOR CUSTOMER CUSTOMER Attack Vulnerability Security Vulnerability Time Pro-Active Re-Active 0 Security & virus issues Discovered
Comprehensive AV Strategy But… AV is no longer enough
Management – McAfee ePO • One Console For Your Security Needs • A single, powerful easy to use interface for both the • AV products AND security products • Policy & Enforcement = Control • Like AV, you need to be sure you are secure • Powerful admin template feature for fast adoption • Effective Maintenance And Visibility • ePO’s reporting capabilities allow you to see, at a glance, who is at risk, and who is secure.
Rogue Rogue Rogue Sensor Sensor Sensor Discovery - Rogue System Detection • Deploy one sensor per subnet • Sensors passively listen to network broadcasts (Layer2: ARP, RARP, DHCP) • Sensor notifies ePO server of new system operating on network • ePO server determines if this is a known or unknown system by comparing ePO’s database of managed systems. • ePO alerts or automatically deploys protection 3 New Rogue System Detected !! ePolicy Orchestrator
McAfee® Anti-Spyware Enterprise Edition Module True corporate/business-grade Anti-Spyware technology for Windows-based PCs, that detect and remove potentially unwanted program software (PUPS) in real-time and tightly integrated with the next-generation anti-virus product for complete and transparent management of both products as a single agent. Announcement: November 15th, 2004 and General Availability: Q1 - 2005 Proactive Enhanced Coverage Lowers TCO • Real-time scanning • detects “Spyware” as it is being installed. • Memory Process Scanning • Traditional On-Demand scanning and removal. • Extensive database of Potentially Unwanted Programs (PUPS) • Registry scanning • Memory process scanning • Enterprise and SMB Management support • Automated update capability • Single Agent integrated with AV • Complete cleaning
Vulnerability & Risk Management (Foundstone) • Security posture no longer an emotion but can now be a science • Identifies policies, assets, threats and risk • By understanding risk and vulnerabilities, begin to identify resources to secure infrastructure.
Desktop Firewall • Traditionally used for remote users to protect against hackers • Required today on all devices as part of your anti-virus defence • Stop malicious code and attacks How? • Only allow your specified traffic on the network • Firewall prevents undefined applications from connecting • Bi-directional IDS stops malicious code spreading to other PCs
Fighting Spam - SpamKiller • Rules Based - 750 processed rules that produce a weighted score based on view of header, body, structure, routing • Customizable threshold • Default 5 points • Heuristic Analysis • Engine is looking for email it doesn’t know is SPAM • Probability scoring based on view of view of header, body, checksum, etc. • Black List / White List • Personal • Global • Content filtering • Runs e1000 appliance
Introducing Intrusion Prevention • Proactive security • Accurately detect and block attacks in real-time • Block attacks before they reach intended targets • Safety-net offering adequate time to patch end systems while managing exposure • Protection against both known & unknown attacks • Stay a step ahead of the attackers • Put management back into patch management • Complements today’s reactive security solutions • Firewall, anti-virus, IDS
IntruShield: Next Generation IDS+IPS IDS researchers/developers have always envisioned the RESPONSE capability as an integral part of intrusion countermeasures Including packet logging & firewall configuration • Accurate detection and real-time prevention in one platform • Unprecedented Intrusion Intelligence • Comprehensive integrated protection • Advanced signature, anomaly, DoS detection • Scalability and deployment flexibility • Industry’s richest set of deployment modes: • In-line, Tap, SPAN, Port clustering, HA • Delivers Security Return on Investment (ROI)
McAfee Entercept - Host Intrusion Prevention • Safeguards the entire server including operating system, critical resources and applications • Blocks damage from known and unknown (Day-Zero ) malicious attacks • Protects against both the external and internal intruder • Protects against worms and buffer overflow exploits • Eliminates exposure between deployment of patches • Uses signature and behavior analysis to identify and block attacks. • Minimizes false positives
Network Based Intrusion Prevention Intruvert Host BasedIntrusion Prevention Entercept Desktop Server Core Edge End-Goal - Protection-in-Depth™ Best of Breed Intrusion Prevention to Reliably STOP Known & Unknown attacks on your Information Technology infrastructure
Best Practices • Know your critical assets • Understand your threats • Know your protection needs • Address the cyber threat challenges systematically • Detection coverage – vulnerabilities & environment • Detection accuracy – false positives & false negatives • Layered defense with multiple methods • Complete protection with integrated responses, especially inline blocking • Well-defined policy • Real enforcement
Best practices • Security can’t be treated as a phase. • Investment as % of overall IT spending is warranted competitive advantage. • It’s everybody’s problem… treat issue of security as an issue of insurance. • Practice “safe computing”.