340 likes | 448 Views
Viewing Malware Management as a Business Practice. The Prophecy. Computer viruses are the first and only form of artificial life to have had a measurable impact on society. Jeffrey Kephart, 1994. Evolution of Malware. Species of Malware. Boot sector File Macro Hybrids Worm Script worm
E N D
The Prophecy Computer viruses are the first and only form of artificial life to have had a measurable impact on society. Jeffrey Kephart, 1994
Species of Malware • Boot sector • File • Macro • Hybrids • Worm • Script worm • Internet worm • Trojans
Overview of Attack Trends • Speed of attack tools • Sophistication of attack tools • Faster discovery of vulnerabilities • Asymmetric threat
Common Infection Pattern • Scans for vulnerable IIS Servers • Infects web browsers • Searches for network shares • Emails copies to other users (ISS)
Managing Infection Points • Home computers • Laptops used in travel • PDAs • Cell phones • Internet appliances • Printers
The Problem with Malware • Virus writer • Manager-business side • Security Administrator • User
Virus Perpetrator Characteristics • Challenge and curiosity • Fame and power • Protest and anarchy • Proof of concept • Political motives
Infecting Machines by Hacking Humans • Email • IM • Software downloads • Remote access • AV patches • Loss of hardware
Why Attack a PC? • E-mail client and address book • Potential zombie host • Container for stolen information • Staging ground for attack
Virus Risk Assessment • Does the company provide Internet and email access for all employees? • Does the company scan email attachments for viruses? • Is there an in-house specialist or department responsible for virus protection? • Is there a way to automatically propagate updates throughout the network? • Is virus protection centrally managed? • Do you know the number of viruses detected on the network each year?
Risk Analysis = Vulnerability Management Threat ? Risk Value to the business in terms of the confidentiality, integrity, availability $ Asset Value x Vulnerability Potential points of attack x Entity or event that could exploit a vulnerability - Controls Safeguards to reduce the risk = Residual risk - level of risk remaining after controls are implemented (ISS)
Integrated Management Approach • Each organization has a unique set of risks • Threats should be tied to an organization’s mission and business objectives • Tradeoffs will be required between business and security issues when creating policy
Payload Damage is the Business Risk • Attacks on availability • Deletion • Renaming • Encryption • Unauthorized calls to system software • Attacks on integrity • Corruption of system files and areas • Data diddling • Corruption of application files • Attacks on confidentiality • Capturing and forwarding passwords • Forwarding personal and confidential files
Analysis Per Incident Year Code Name Worldwide Economic Impact ($ U.S.) Cyber Attack Index 2001 Nimda $635 Million 0.73 2001 Code Red(s) $2.62 Billion 2.99 2001 SirCam $1.15 Billion 1.31 2000 Love Bug $8.75 Billion 10.00 1999 Melissa $1.10 Billion 1.26 1999 Explorer $1.02 Billion 1.17 Computer Economics Survey 2000
Malware Management Solution Categories • Technological • Educational • Political
Managing Malware with Technology • Current AV model is reactive • Attack-response cycle places a business at risk • Virus released vendors get samples vendors analyze generate detection and disinfection distribute fix • Helpless against fast-burners • Desktop is defacto defense • Multiple network solutions have a high cost
How Anti-Virus Programs Work GENERIC ANTIVIRAL PROGRAM flags activities--such as the alteration of critical sites in RAM or particular files on disk--that are likely to arise from a virus in action. SIGNATURE SCANNER searches a user's disks looking for fragments of program code that appear in known viruses. BEHAVIOR BLOCKING Monitors real-time execution of program code and blocks actions if a delete, modification, format, initiate network connections.
The ability of an organization to achieve its mission and meet its business objectives is directly and strategically linked to the state of the computing infrastructure and to the manner in which people interact with that infrastructure. Christopher Alberts, Viewing Security Management as a Business Practice
Managing Malware with Education • Social engineering • Spam techniques • User cooperation
From: sdekih@iteoka.i> Social Engineering To: Patricia LOGAN Date: Tuesday - May 28, 2002 10:44 PM Subject: Worm Klez.E immunity Mime.822 (1639 bytes) [View][Save As] <HTML><HEAD></HEAD><BODY><FONT>KLEZ.E files.<br>Because of its very smart stealth and anti-anti-virus technic,most common AV software can't detect or clean it.<br>We developed this free immunity tool to defeat the malicious virus.<br>You only need to run this tool once,and then Klez will never come into your PC.<br>NOTE: Because this tool acts as a fake Klez to fool the real worm,some AV monitor maybe cry when you run it.<br>If so,Ignore the warning,and select 'continue'.<br>If you have any question,please <a href=3Dmailto:sdekih@iteoka.i>mail to me</a>.</FONT></BODY></HTML>bat attachment detected and blocked YOU JUST DODGED A BULLETYour computer has just been saved from a possible virus infection. This message contained attachments that have been blocked. Please contact Computing Support at 626-7777 if you have questions WSU Systems / Network Management
Political Issues and Malware • Legislation • Prosecution • Multiple jurisdictions • Downstream liability
Goals of Malware Management • Detection of incident • Initial response • Response strategy formulation • Investigation • Isolate and contain • Recovery • Report • Lessons learned
Costs of Malware Management • Procurement • Initial implementation • Maintenance • Impact (negative) to systems performance • Ongoing postural reassessment cycle
Infection Response Lessons Recovery Actions Elimination Preparation Containment Procedures Communication Policy Analysis T0 T1 T n+1