60 likes | 92 Views
Explore the changing threats in today's world, from legacy crimes to evolving solutions and security strategies. Dive into vulnerability timelines and the gap between patches and exploits. Understand the complex interplay between security researchers, software companies, and hackers. Gain insights into the types of attackers, from hobbyists to specialists, and their motives. Anticipate future challenges and strengthen your security posture. Stay ahead in the cybersecurity game with this comprehensive session.
E N D
Security: The Changing Threat Environment David Aucsmith Architect and CTOSecurity Business & Technology Unit awk @ microsoft.com Microsoft Corporation
Session Outline • The World Today • Threats • Bad Guys • How We Got There • Legacy • Crime • Evolving the Solution • Security Strategy • A Look Ahead
Vulnerability Timeline Why does this gap exist? Attacks occur here Rarely discovered The World Today
Vulnerability Timeline Days between patch & exploit 331 180 151 25 Nimda SQL Slammer Welchia/ Nachi Blaster • Days From Patch To Exploit • Have decreased so that patching is not a defense in large organizations • Average 6 days for patch to be reverse engineered to identify vulnerability Source: Microsoft The World Today
The Forensics of a Virus July 1 July 16 July 25 Aug 11 Vulnerability reported to us / Patch in progress Bulletin & patch available No exploit Exploit code in public Worm in the world Report • Vulnerability in RPC/DDOM reported • MS activated highest level emergency response process Bulletin • MS03-026 delivered to customers (7/16/03) • Continued outreach to analysts, press, community, partners, government agencies Exploit • X-focus (Chinese group) published exploit tool • MS heightened efforts to get information to customers Worm • Blaster worm discovered –; variants and other viruses hit simultaneously (i.e. “SoBig”) Blaster shows the complex interplay between security researchers, software companies, and hackers Source: Microsoft The World Today
Understanding the Landscape National Interest Personal Gain Personal Fame Curiosity Spy Fastest growing segment Thief Tools created by experts now used by less-skilled attackers and criminals Trespasser Vandal Author HobbyistHacker Script-Kiddy Expert Specialist The World Today