E N D
5. Effort Needed to Disrupt Systems is Decreasing
6. Vulnerabilities of Computerized Assets
7. Vulnerabilities of Computerized Assets
8. Vulnerabilities of Computerized Assets
14. Web Page Defacements
16. 2000 YTDDefacements
20. Top Ten Known Defacers
21. Current IDS Statistics
Average number of IDS events per day (per engine)
Denial of Service 5
Unauthorized Access Attempts 3
Pre-Attack Probes 28
Suspicious Activity 9
Benign Triggers 163
22. Current IDS Statistics
23. Personal IDS
24. Personal IDS Probe Events
25. Personal IDS Identification and Enforcement
26. Are Companies Ready For An Attack?
27. Information Overload ---> PDD 63
28. ISAC Participants share information about security incidents, vulnerabilities, threats, solutions
Each participating firm is alerted immediately, 24 hours/day, anywhere in the world
Results of analysis are reported in three categories: Normal, Urgent, or Crisis
29. FS/ISAC Data Sources Strategic Partners
64 Distinct search engines
270 list servers
AOL, ICQ and IRC Chartrooms
WAP specific sites
20 “Hacker sites”
Various message boards, Usenet, etc
Advisories from 46 + sources
Plus worldwide government support (input), but no reporting (no look up membership/seats)
DoD JTF, NCC, Scotland Yard, Interpol, etc
31. Incident Targets Breakdown August 2000
32. Vulnerabilities Breakdown
33. Incident Severity Breakdown
38. What Do We Think Will Happen? Cyber Forensics - Proactive monitoring, scanning, detection, litigation support
Increasing interest in Integrated Architecture Solutions (Network Modernization)
Increased focus on embedding security technology in the Application Layers (e-Biz)
Increased focus on international interoperability and enforcement
Growth in web site trust programs (ASP and ISP)
Increased Legislation (CyberLaw /Privacy and Confidentiality)
Increased emphasis on IT security certification of technology (BiTS)
Greater reliance on the business imperative to drive IT solutions (e-biz)
Major Emphasis on Information Sharing on Incident Management (ISAC)
Changes in the US Tax Code related to Tax Credits for Security Initiatives
Unprecedented growth in IS managed services
Unprecedented Growth of Wireless Applications --- and RISK
Increased awareness on the issues of Personal Privacy and Confidentiality