Emerging Threats in theEmerging Threats in the Battle Against...
Transcript of Emerging Threats in theEmerging Threats in the Battle Against...
![Page 1: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/1.jpg)
Emerging Threats in theEmerging Threats in theEmerging Threats in the Emerging Threats in the Battle Against CybercrimeBattle Against CybercrimeBattle Against CybercrimeBattle Against Cybercrime
Erez Liebermann, Assistant United States AttorneyErez Liebermann, Assistant United States AttorneyDeputy Chief, Economic Crimes UnitDeputy Chief, Economic Crimes Unit
Chief, Computer Hacking and IP SectionChief, Computer Hacking and IP SectionDistrict of New JerseyDistrict of New JerseyDistrict of New JerseyDistrict of New Jersey
![Page 2: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/2.jpg)
Laws and Penalties• Computer Fraud and Abuse Act
• Identity Theft
• Access Device Fraud• Access Device Fraud
• Intellectual Property Laws
![Page 3: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/3.jpg)
Where Are We Now?Where Are We Now?
Case Studies
![Page 4: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/4.jpg)
U.S. v. Albert Gonzalez
• Where we meet Albert G l ?Gonzalez?• Arrested for ATM Fraud• 2003
• ShadowcrewS ado c e• Landmark Carding Case• Indictment October 2004Indictment October 2004• 21 Arrested in U.S.; Others Overseas
![Page 5: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/5.jpg)
![Page 6: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/6.jpg)
GonzalezGonzalez
![Page 7: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/7.jpg)
TJX Hacking Investigation
• 2003 to 2008: • TJX• BJ’s Wholesale Club• OfficeMax• Boston Market• Barnes & Noble
Sports Authority• Sports Authority• Forever 21• DSW DSW
• USSS & D. Massachusetts
![Page 8: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/8.jpg)
Heartland and Others
• Continuing investigation… • More Victims:• More Victims:
H tl d P t S t• Heartland Payment Systems• 7-Eleven / Citi• Hannaford / Food Lion• JCPenney• Wetseal
![Page 9: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/9.jpg)
![Page 10: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/10.jpg)
IndictmentsG l I di t d• Gonzalez Indicted• 3 Districs
• Longest Sentence for a Hacker:• 20 years.20 years.
![Page 11: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/11.jpg)
PBX HackingPBX Hacking
![Page 12: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/12.jpg)
Role of PBX
Public Network
e.g., AT&T, Sprint, Etc.
Caller
Ext. 1124
p ,
Ext 1125Ext. 1125
Ext. 4057
Ext. 2563
PBX SystemExtensions
![Page 13: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/13.jpg)
The Hacking Method• Vulnerability = lack of security on
The Hacking Method
phone systemsx2241 pwd unknown
Public Network
unknownx2242 pwd unknown2243 d
PBX System
x2243 pwd defaultHacker
![Page 14: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/14.jpg)
The Loopback MethodThe Loopback MethodHacker
Public NetworkHacker Line 1
PBX SystemPublic Network
PBX SystemHacker Line 2
Call Recipient
![Page 15: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/15.jpg)
The Pass-code MethodThe Pass code Method
Public Network
Call
PBX Hacker
Call Recipient
System
![Page 16: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/16.jpg)
Why Hack?• Two reasons:
• Income• Anonymity
Victim PBX System
![Page 17: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/17.jpg)
Hacker Phone #
![Page 18: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/18.jpg)
FINAANCIIERS
![Page 19: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/19.jpg)
Operation March 9-10th, 2007
![Page 20: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/20.jpg)
Suspect Michael Kwan
![Page 21: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/21.jpg)
Nancy M Gomez - Malolos Avenue Metro Manila
![Page 22: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/22.jpg)
Philippine National Police CSI Squad
![Page 23: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/23.jpg)
Maria Lopez Residence -Burgus St. Cubao
![Page 24: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/24.jpg)
Suspect - Maria Isabel Lopez
![Page 25: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/25.jpg)
Evidence
Lair of the hacker Maria Isabel Lopezp
![Page 26: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/26.jpg)
Juffer Virgo residence Benitez , Quezon City
![Page 27: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/27.jpg)
Suspect Juffer Virgo from Benitez Street Location
![Page 28: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/28.jpg)
![Page 29: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/29.jpg)
Examples of documents seized from hacker’s home
NameNumber dialed Time of call
Cost
Duration of call
10-10 Dialing
![Page 30: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/30.jpg)
MR Luna Street, Paranaque
![Page 31: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/31.jpg)
Mastermind Mahmoud Nusier
![Page 32: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/32.jpg)
Suspects at Police Headquarters
![Page 33: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/33.jpg)
PBX Phase II: ItalyPBX Phase II: Italy
![Page 34: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/34.jpg)
Italy Search and Arrests – June 12, 2009
![Page 35: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/35.jpg)
In tal modo il sistema violato ed il numero delle intrusioni ai PBX si amplia con proporzioni geometriche.
Il manager fornisce le informazioni sul
li centralino compromesso ai Phone Center.
![Page 36: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/36.jpg)
Polizia di Stato F.B.I.
Mohammad ZamirMohammad Zamirnato in Pakistan il 30.01.1969
Kanwal Shabinanata in Pakistan il 11.12.1971
SHAH Zahirnato in Pakistan il 01.01.1970
WASEEM Ahmednato in Pakistan il 01.03.1969
IQBAL Khurram
nato in Pakistan il 04.04.1980
![Page 37: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/37.jpg)
Outsider Attack
• Voice Over Internet Protocol (VOIP)(VOIP)• Edwin Pena and co-conspirators hack
into VOIP companies and unsuspecting intermediaries.B t F Att k• Brute Force Attacks.
• Millions made.
![Page 38: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/38.jpg)
![Page 39: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/39.jpg)
![Page 40: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/40.jpg)
Insider Attack
• Medco Health Solutions, Inc.Andy Lin Feared he would be fired when • Andy Lin Feared he would be fired when rumors of layoffs spread.
• Planted logic bomb in Medco’s systemPlanted logic bomb in Medco s system.• Had it been triggered:
•Financial DamageFinancial Damage•Health implications
![Page 41: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/41.jpg)
Updating script Pre-existing system file
The Operation of Lin’s Logic Bomb
Updating-script g yruns every day on every Unix server.
Legit 1 and Legit 2 are innocuous scripts.
Legit_1 Legit_2
Legit_1 and Legit_2 are innocuous scripts. Lin wrote Legit_1. He did not write Legit_2, but he did add a line in it which calls perfnck.
perfnck perfdatPerfnsck compares the current date with the date in perfdat. If they match, perfnck sets the following scripts in motion
Check date
following scripts in motion.
omb
dirsncksysmsgck
setvarsHolds information e l
ogic
bo
Sets up environment
WIPES OUT SYSTEM
on which part of the server to wipe outThe
![Page 42: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/42.jpg)
• Medco Health Solutions, Inc. –edco ea t So ut o s, cCont’d
• Pleaded Guilty
• Employee
![Page 43: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/43.jpg)
Cyber ExtortionCyber Extortion
• Actual breach into computer systemsy
Th t d b h i t • Threatened breach into computer system
![Page 44: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/44.jpg)
Military Hacky
• United States v. Gary McKinnony• Weapons Station Earle• NASANASA• Pentagon
• Searching for info on UFO’s?• Searching for info on UFO s?
![Page 45: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/45.jpg)
“US foreign policy is akin to US foreign policy is akin to government sponsored terrorism th d It t i t k these days... It was not a mistake that there was a huge security stand-down on September 11 last year... I am SOLO. I will continue yto disrupt at the highest levels.”
![Page 46: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/46.jpg)
![Page 47: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/47.jpg)
Data Breaches: To Report N t t R t?or Not to Report?
• Data breach notification laws
• Cooperate with authorities
• Avoid aggravating factors in a Avoid aggravating factors in a lawsuit
![Page 48: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/48.jpg)
What if it Happens?
• Call Law Enforcement.
• But• But…
![Page 49: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/49.jpg)
Myth:y“If I call law enforcement, they won’t enforcement, they won t care.”
![Page 50: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/50.jpg)
Myth:y“Law enforcement won’t be able to catch won t be able to catch the bad guys.”
![Page 51: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/51.jpg)
M thMyth:“I can handle the situation myself.”y
![Page 52: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/52.jpg)
M thMyth:“If I just patch the security hole, restore y ,my data, and fire the dirty insider, then I dirty insider, then I don’t need to tell anyone ”anyone.
![Page 53: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/53.jpg)
M thMyth:“If I call law enforcement, they’ll enforcement, they ll come and take my servers away ”servers away.
![Page 54: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/54.jpg)
Myth:“If I report to law enforcement I’ll lose enforcement, I ll lose control of my proprietary data ”proprietary data.
![Page 55: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/55.jpg)
Best Practices
• Protect the rights of the victim.• Consult with senior management• Consult with senior management.• Consult with IT staff.• Minimize disruption to the company• Minimize disruption to the company.• Coordinate media releases.• Keep the company informed• Keep the company informed.• Build relationships before an
intrusion.intrusion.
![Page 56: Emerging Threats in theEmerging Threats in the Battle Against ...media.techtarget.com/searchSecurity/downloads/EmergingThreatsB… · Emerging Threats in theEmerging Threats in the](https://reader035.fdocuments.in/reader035/viewer/2022063000/5f102e467e708231d447d7f5/html5/thumbnails/56.jpg)
Steps to ProtectSteps to Protect
•Logs, Logs and more Logs.•Separation of Powers•Separation of Powers.•Click-Through Banners.•Extra vigilance.•Immediate cut-off•Immediate cut-off.