290 likes | 682 Views
Cyber Security Key Challenges & Way Forward. Presented By: Yogesh Hinduja Associate Practice Partner Wipro Consulting Services www. Wipro.com . Global Risk Trends. Cyber Attack is considered as one of the top five in the most likely Risk in 2012 as per Global Risks Report .
E N D
Cyber Security Key Challenges & Way Forward Presented By: Yogesh Hinduja Associate Practice Partner Wipro Consulting Services www. Wipro.com
Global Risk Trends • Cyber Attack is considered as one of the top five in the most likely Risk in 2012 as per Global Risks Report.
Number of Web Sites Defaced Aug 12 Jun 12 Sep 12 Jan 12 Feb 12 Mar 12 Apr 12 May 12 Jul 12 Sources: Indian Computer Emergency Response Team
Exposure to Cyber Security Social Media Security Computer Forensics Physical Access Logical Access Organization Data Cyber Security Incident Response Mobile Security
Cyber Security Cell Security Operation Center Cyber Security Components Evolving Threat Research Threat Intelligence Feed Contextualized Intelligence Anomaly Detection Security Analytics Malware Detection Well Defined Structure Roles & Responsibility Skilled Resources R&D Lab & Testing Lab Standards & Best Practices Cyber Security Command Centre Interface & Interlock Law Enforcement Agency Risk Intelligence Service Providers CERT-SA Other Countries CERT & Intelligence Agencies
Cyber Security Service Portfolio Cyber Security Services Strategic Advisory Service Operational / Post-Event Services BCP / DR Preparedness against Cyber attacks Cyber Security Training and Awareness Computer Forensics DDOS Test Enterprise Security Architecture Threat Modeling Social Media Security Mobile Security Simulation Exercises Regulatory Readiness(FISMA, TRA, Indian Act etc.) Cloud Security Incident Response (Virus/Malware/Botnets) Penetration Testing Vulnerability Assessment Effectiveness Measurement of Policies/Procedures/Infra Design of Security Intelligence Centre Interface & Interlock Risk Intelligence Service Provider Law Enforcement Agency CERT Enterprise Risk Management
Computer Forensic Services • Computer Forensic provides a post-intrusion / incident analysis in order to identify, preserve, analyse meaningful evidence and provide a detailed forensic report and recommendation on the security incident. Computer Forensics Services Coverage
Initial Study • Situation awareness, identify the potential source of data 4. Analysis Data Interpretation, Event Correlation, Chain of Custody, Pattern Matching 3. 3. Investigation Examination, Decryption, Intelligent search on information on interest 2. Data Collection Data duplication, Cloning, Extractions using specialized S/W and H/W 5. Reporting Logical Conclusion, Management and Technical Presentation • Approach for Computer Forensics The following are the broad steps involved in this assessment Media Evidence Data Information
Rise in the use of Social Networking sites such as Twitter, LinkedIn, Facebook by corporate to communicate and build their brand names as well as by individual to share information increase the risk of data security • Social Media Security Social Media Security Services
Approach for Social Media Security A comprehensive and structured approach for Social Media Security Assessment, Sensitive Customer Information from different sources like social engineering sites, forums, community sites, blogs and hacking sites will be gathered along with the automated tools and search engines like Google, AltaVista, Baidu etc. The following are the broad steps involved in this assessment
DDOS Attack simulation on designated Server in client premises to: • Measure the performance of devices responsible for detecting and denying DDoS • traffic network access • Determine the resilience of data center, network and application • Improve the IT infrastructure security posture by recommending measures to mitigate • the risk due to the identified vulnerabilities. • DDOS Attack Simulation Objective
DDOS Attack Simulation Approach 3 1 2 4 5
Incident Response Service • Incident Response Service provides on field or remote analysis by experts to identify, contaminate, recover and eradicate different variety of cyber attacks to the organisation.
Incident Response Service Approach • A structured and proven approach for handling and responding to any kind of Cyber Security Attacks. In line with the industry best practices and experts armored with specialized tools help customer to react effectively and immediately. • Live Data Acquisition • Log/Network Data Acquisition • OS and Database Acquisition • Analyze acquired evidences • Identify the level of impact • Identify the source of intrusion & vulnerability • Reassess the fix • Develop learning and Lessons • Training and Awareness • Secure Guidelines • Situation Awareness • Sources of information • Chain of custody • Suspected behavior • Management report on extent of Damage • Report on nature of the incident and compromise • Eradication and recovery measures • Mobilize Resources • Tools & Kits • Authorization and Approvals • Legal considerations
Approach for Mobile Security At a macro level Mobile Security Assessment involves four stages viz. Information collection, Threat Profiling, Technical Security Assessment and finally documenting the observation and recommendations.
Thank You Yogesh Hinduja, Yogesh.Hinduja@Wipro.com Associate Practice Partner Wipro Consulting Services