290 likes | 409 Views
Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies. Presented By: Tina LaCroix & Jason Witty. Presentation Overview. Introduction and Benefits of InfoSec Trends and Statistics Hacking Tools Discussion / Demonstration
E N D
Trends in Information Security:Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty
Presentation Overview • Introduction and Benefits of InfoSec • Trends and Statistics • Hacking Tools Discussion / Demonstration • Proactive Threat and Vulnerability Management • Security Lifecycle • Recommendations • Wrap-up / Questions
Q: In Today’s Down Market, What Can: • Give your company a competitive advantage? • Improve your reputation in the eyes of your customer? • Demonstrate compliance to international and federal privacy laws? • Improve system uptime and employee productivity? • Ensure viable eCommerce? • Answer: Information Security.
What’s the Problem? • Your security people have to protect against • thousands of security problems. • Hackers only need one thing to be missed. • But with appropriate attention given to • security, companies can be • reasonably well protected.
Some InfoSec Statistics • General Internet attack trends are showing a 64% annual rate of growth – Riptech • The average [security conscious] company experienced 32 attacks per week over the past 6 months – Riptech • The average cost of a serious security incident in Q1/Q2 2002 was approximately $50,000 - UK Dept of Trade & Industry • Several companies experienced single incident losses in excess of $825,000 - UK Dept of Trade & Industry
Computer Incident Statistics • In 1988 there were only 6 computer incidents reported to CERT/CC. • There were 52,658 reported and handled last year.
Information Security Threats: Attackers • Bored IT guys…… • “Hacktivists” • Competitors • Ex-employees • Terrorists • Disgruntled employees • Real system crackers (Hackers) • The infamous “script kiddie”
Need More Tools? http://www.packetstormsecurity.org has tens of thousands of free hacker tools available for download
Full Disclosure: What’s That? • When a vulnerability is discovered, all details of that vulnerability are reported to the vendor • Vendor then works on a patch for a “reasonable” amount of time • Discoverer of the vulnerability then releases full details of the problem found, and typically, a tool to prove it can be exploited • Hopefully the vendor has a patch available
Hacker Techniques: The Scary Reality • Growing trend by some hackers NOT to report vulnerabilities to vendors – KEEP EXPLOITS UNPUBLISHED AND KNOWN ONLY TO THE HACKER COMMUNITY • Exploit services that HAVE to be allowed for business purposes (HTTP, E-Mail, etc.) • Initiate attacks from *inside* the network • It’s much easier to destroy than protect!
Start by Acknowledging the Problem… (No More of This)
Security Risk Management Principles • Information Security is a business problem, not just an IT problem • Information Security risks need to be properly managed just like any other business risk • Lifecycle management is essential – there are always new threats and new vulnerabilities to manage (and new systems, technologies, etc., etc.)
Proactive Threat and Vulnerability Management • Internal Security Risk Management Program • User Education • Selective Outsourcing / Partnerships
Security Risk Management Program • Should include (not an exhaustive list): • Governance and sponsorship by senior management • Staff and leadership education • Implementation of appropriate technical controls • Written enterprise security policies & standards • Formal risk assessment processes • Incident response capabilities • Reporting and measuring processes • Compliance processes • Ties to legal, HR, audit, and privacy teams
Security Risk Management: Education • One of the largest security risks in your enterprise is untrained employees – this especially includes upper management • Who cares what technology you have if an employee will give their password over the phone to someone claiming to be from the help desk? • Are users aware of their roles and responsibilities as they relate to information security? • Are users aware of security policies and procedures? • Do users know who to call when there are security problems?
Security Risk Management: IT Controls • The average enterprise needs Firewalls, Intrusion Detection, Authentication Systems, Proxies, URL Screening, Anti-Virus, and a slew of other things. • A major reason we need all of this technology is because systems continue to be shipped / built insecurely!!! • Every one of us needs to push vendors to ship secure software, and to include security testing in their QA processes
Security Risk Management: Selective Outsourcing • Things you might consider outsourcing: • The cyber risk itself (Insurance, Re-insurance) • Email filtering and sanitization • 24 x 7 security monitoring • 1st level incident response (viruses, etc.) • Password resets • Others?
Wrap Up: What Can You Do Going Forward? • Urge (contractually obligate if possible) vendors to build, QA test, and ship secure products!!!!!!! • Remember that security is not a “thing” or a one time event, it is a continual process…….. • Manage security risks like other business risks • Conduct periodic security risk assessments that recommend appropriate security controls • Ensure security is inserted early in project lifecycles • Support your internal InfoSec team – they have a tough job managing threats and vulnerabilities
Credits • CERT/CC – http://www.cert.org/present/cert-overview-trends/ • Internet Security Alliance – http://www.isalliance.org • Riptech – http://www.riptech.com • UK Department of Trade and Industry – • https://www.security-survey.gov.uk/View2002SurveyResults.htm