620 likes | 719 Views
Security Update 2009. Presented by: David M. Cieslak, CPA.CITP, GSEC. Agenda. Goals of IT Security Trends Portals of Opportunity Other Issues & Remediation. Goals of IT Security. Confidentiality Data is only available to authorized individuals Integrity
E N D
Security Update 2009 Presented by: David M. Cieslak, CPA.CITP, GSEC
Agenda Goals of IT Security Trends Portals of Opportunity Other Issues & Remediation
Goals of IT Security • Confidentiality • Data is only available to authorized individuals • Integrity • Data can only be changed by authorized individuals • Availability • Data and systems are available when needed • Accountability • Changes are traceable/attributable to author
Threats & Vulnerabilities • Threats • Active agent that seeks to violate or circumvent policy • Part of the environment – beyond user’s control • Vulnerability • A flaw or bug • Part of the system – within user’s control • Risk • Likelihood of harm resulting of exploitation of vulnerability by threat
IT Security Response No single product, vendor or strategy Defense in Depth, i.e. Layers of Security
** IT Security – “Short List” ** • Anti- • Virus • Botnets • Spam • Spyware • Passwords / Passphrases • Patches • Wireless Security • Unprotected Shares • Firewall • Perimeter • Personal/Application • Web-based e-mail/file sharing • Router/IP Addressing • Physical Access • Backups 6
Security Trends • On May 29, 2009, President Obama said… • “the U.S. has reached a "transformational moment" when computer networks are probed and attacked millions of times a day. It's now clear this cyber threat is one of the most serious economic and national security challenges we face as a nation," Obama said, adding, "We're not as prepared as we should be, as a government or as a country." • Ready to name a “Cyber Czar”
Security Trends • Vulnerabilities • Overall < 20% • > 90% affect applications vs. OS trend moving from OS to apps is increasing • Exploits • ~ 10% of available exploits work reliably
Security Trends • OS • Windows XP OS attacks – 42% of total • Windows Vista OS attacks – 6% of total • 64-bit versions of all products less than 32-bit counterparts • Browsers • Victims of browser exploits • > 47% - Chinese • > 23% - US English • Many legitimate websites now compromised and hosting malware (drive-by downloads)
Security Trends • E-Mail • Two extensions (*.html & *.zip) accounted for > 97% of blocked attachments • Roughly 50% of spam messages are for pharmaceutical products • Image spam is making a comeback – now > 20%
Security Trends • Data loss • > 37% due to stolen equipment • < 23% due to “hacking” • TrojanDownloader and TrojanDropper malware up significantly
Security Trends • Goal of compromise is still – steal confidential information, i.e. banking, credit card, etc. • New approaches: • Application and information-centric security • Ubiquitous encryption
Vista SP1 • Security Features (vs. XP SP3) • BitLocker drive encryption • Granular audit • UAC (User Account Control) • Smart Card support • Biometric support - 3rd party
User Account Control (UAC) Introduced in Vista Limits application software to “standard user” privilege without additional authorization
Windows 7 • Security Features (vs. XP SP3 & Vista SP1): • Improved BitLocker drive encryption • BitLocker To Go • AppLocker • Multiple active firewall profiles • Improved UAC • Biometric support – native • *DEMO* - Control Panel\System and Security\Action Center
Browser Security • Internet Explorer 8 • Compatible with XP SP3 and newer • Safety menu • InPrivate Browsing - helps prevent IE from storing data about browsing sessions, including cookies, temporary Internet files, history, and other data • Security/trust by zones • Blocks sites known to host malware • By default, runs in protected mode – can’t make system-wide changes • *DEMO*
Browser Security • Mozilla Firefox 3 • Sandbox security model • “Bug bounty” for severe security hole discovery • Fewer documented security holes • Google Chrome 1.01 • Periodically downloads 2 blacklists – phishing & malware • Each tab is it’s own process • Icognito browsing
Content filtering • Windows Live Family Safety • Create filters for each person • Administer/authorize from anywhere • Monitor web & chat activity • https://fss.live.com
DNS options • Feb 2009 – Time Warner DNS servers in So. Cal subject to DDoS attack • Consider modifying router configuration to hard code alternate Public DNS server, rather that using broadband provider to resolve DNS • Example: • OpenDNS – 208.67.222.222 • 4.2.2.2 - Level 3 Communications (Broomfield, CO, US)
E-Mail / Spam / Phishing • Issues: • > 90% of all e-mail is spam • Desktop solutions are inadequate • In-house (perimeter) solutions often require significant care & feeding • Image spam • Making a resurgence • Now accounts for >25% of all Spam • Difficult to detect/filter due to “lack of context”
E-Mail / Spam / Phishing • Solutions: • In-House • Current version of Exchange (2007) • E-mail filtering appliance • Barracuda • DoubleCheck
E-Mail / Spam / Phishing • Solutions: • Hosted • Microsoft Online Services • Electricm@il • Blended • In-house post office / Managed Service for filtering • Google Postini • Message Labs / Symantec • McAfee
Chat Users install without company knowledge/consent Users opening messages and clicking graphics and links that expose their machines to almost immediate compromise
Trillian™ Astra (beta) Single IM interface for – Windows Live, AIM, Yahoo, Google, ICQ, Skype, Facebook, Jabber, MySpace & Twitter 400+ new features!
Chat • Other multi-protocol client options • Digsby • Pidgin • Miranda
Chat Chat protocols /conversations may not be confidential?
Chat Meebo – https://www.meebo.com
Chat Simp by Secway
Social Networking • Facebook • Facebook currently has over 200+ million users • Compromised Facebook accounts send malicious links to friends • Users are prompted to enter login names & passwords • Attackers use harvested info. to attempt to login to other sites & services (are you using the same login name and password for confidential data?)
Social Networking • TwitterCut (5/27/09) • Message appears to be from friend with link to TwitterCut web site • TwitterCut site looks like Twitter page • Person is prompted to enter login details (phishing attack) • Entire contact list then recvs. similar message
Social Networking • Flock Social Web Browser • Modified version of Mozilla browser • Automatically connects to 20 online services
Antivirus • Re-set: • Issues - • Performance problems – users turning AV off • Not filtering all sources – web e-mail, chat, etc. • AV updates not done on all machines • AV products not catching all malware • Suites are bloated • Result – compromise!
Antivirus • Beware of rogue PC security applications (antivirus/anti-spam/anti-spyware). Look official, but likely promoting purchase of their products, or worse – install trojans! • Recent examples: • Personal Antivirus • Antivirus 360 • System Guard 2009
Antivirus • Future of AV products will most likely be… • Better distribution and redundancy of AV function between cloud, perimeter devices, servers & clients, • More application centric • Protection at document level (digital rights)
Conficker – post mortem aka – Conflicker, Downadup, DownAndUp, Kido Superworm surfaced 11/21/2008 Targets Windows OS machines with known vulnerability (MS08-067) – patch was available 10/08 At height, may have infected > 15 million PCs Variants still infecting 50,000 new PCs per day Purpose – create a botnet of infected computers To determine if machine is infected, visit – http://www.confickerworkinggroup.org/infection_test/cfeyechart.html
Patch Management • Windows OS *Demo* - Control Panel\System and Security\Windows Update
Patch Management • Other MS apps - • Non-MS Applications – case by case…