Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By:...

29

Transcript of Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By:...

Page 1: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.
Page 2: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Trends in Information Security:

Threats, Vulnerabilities and Mitigation Strategies

Presented By:

Tina LaCroix & Jason Witty

Page 3: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Presentation Overview

• Introduction and Benefits of InfoSec• Trends and Statistics• Hacking Tools Discussion / Demonstration• Proactive Threat and Vulnerability Management• Security Lifecycle• Recommendations• Wrap-up / Questions

Page 4: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Q: In Today’s Down Market, What Can:• Give your company a competitive advantage?• Improve your reputation in the eyes of your

customer?• Demonstrate compliance to international and

federal privacy laws?• Improve system uptime and employee

productivity?• Ensure viable eCommerce?

Answer: Information Security.

Page 5: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

What’s the Problem?

Your security people have to protect against

thousands of security problems.

Hackers only need one thing to be missed.

But with appropriate attention given to

security, companies can be

reasonably well protected.

Page 6: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Some InfoSec Statistics• General Internet attack trends are showing a 64%

annual rate of growth – Riptech

• The average [security conscious] company experienced 32 attacks per week over the past 6 months – Riptech

• The average cost of a serious security incident in Q1/Q2 2002 was approximately $50,000 - UK Dept of Trade & Industry

• Several companies experienced single incident losses in excess of $825,000 - UK Dept of Trade & Industry

Page 7: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Computer Incident Statistics

Number of Incidents Handled by CERT/CC

0

10000

20000

30000

40000

50000

60000

• In 1988 there were only 6 computer incidents reported to CERT/CC.

• There were 52,658 reported and handled last year.

Page 8: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

General Trends in Attack Sophistication

Over Time, Attacks have Gotten More Complex, While Knowledge Required to Attack has Gone WAY Down

0

2

4

6

8

10

Level of DamageCapable

Level of Knowledgerequired

Page 9: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Information Security Threats: Attackers• Bored IT guys……

• “Hacktivists”

• Competitors

• Ex-employees

• Terrorists

• Disgruntled employees

• Real system crackers (Hackers)

• The infamous “script kiddie”

Page 10: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Hacker Tools: Web Hacking

Page 11: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

More Web Hacking Tools

Page 12: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Password Cracking Tools

Page 13: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Password Cracking: Windows

Page 14: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Need More Tools?http://www.packetstormsecurity.org has tens of thousands of free hacker tools available for download

Page 15: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Full Disclosure: What’s That?

• When a vulnerability is discovered, all details of that vulnerability are reported to the vendor

• Vendor then works on a patch for a “reasonable” amount of time

• Discoverer of the vulnerability then releases full details of the problem found, and typically, a tool to prove it can be exploited

• Hopefully the vendor has a patch available

Page 16: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Hacker Techniques: The Scary Reality

• Growing trend by some hackers NOT to report vulnerabilities to vendors – KEEP EXPLOITS UNPUBLISHED AND KNOWN ONLY TO THE HACKER COMMUNITY

• Exploit services that HAVE to be allowed for business purposes (HTTP, E-Mail, etc.)

• Initiate attacks from *inside* the network• It’s much easier to destroy than protect!

Page 17: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

So How Do We Protect Against

All of This?

Page 18: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

(No More of This)

Start by Acknowledging the Problem…

Page 19: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Security Risk Management Principles• Information Security is a business problem, not

just an IT problem• Information Security risks need to be properly

managed just like any other business risk• Lifecycle management is essential – there are

always new threats and new vulnerabilities to manage (and new systems, technologies, etc., etc.)

Page 20: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Proactive Threat and Vulnerability Management

• Internal Security Risk Management Program

• User Education

• Selective Outsourcing / Partnerships

Page 21: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Security Risk Management: IT Control EvolutionYear “Secure Enough” Control Security Goal

1995 Statefull Firewalls and desktop anti-virus (AV)

Keep external intruders and viruses out

1997 Above plus Network Intrusion Detection Systems (N-IDS) and application proxy servers

Keep external intruders out, but let admins know when they do get in

2000 Above plus Network AV, URL Screening, Host Based IDS, and VPNs

Control and monitor all network access but allow flexibility

2002 Above plus strong authentication, application firewalls

Protect against blended threats

Future Gateway IDS (GIDS), application aware proxies, integrated exposure management, standard metrics and measurements

True enterprise security risk management

Page 22: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

InfoSec Risk ExamplesThreat Damage Mitigation Strategies

Web Site Defacement

Loss in Customer confidence, loss in revenue

IT Controls, User Education, 24 x 7 monitoring

Data theft Loss of competitive advantage

IT Controls, User Education, employee screening

Wide-spread Virus infection

System downtime, loss in productivity, loss or corruption of data

IT Controls, User Education, email sanitization

Unauthorized network access

Any of the above IT Controls, User Education, network entry point consolidation

Page 23: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Security Risk Management ProgramShould include (not an exhaustive list):• Governance and sponsorship by senior management• Staff and leadership education• Implementation of appropriate technical controls• Written enterprise security policies & standards• Formal risk assessment processes• Incident response capabilities• Reporting and measuring processes• Compliance processes• Ties to legal, HR, audit, and privacy teams

Page 24: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Security Risk Management: Education

• One of the largest security risks in your enterprise is untrained employees – this especially includes upper management

• Who cares what technology you have if an employee will give their password over the phone to someone claiming to be from the help desk?

• Are users aware of their roles and responsibilities as they relate to information security?

• Are users aware of security policies and procedures?

• Do users know who to call when there are security problems?

Page 25: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Security Risk Management: IT Controls

• The average enterprise needs Firewalls, Intrusion Detection, Authentication Systems, Proxies, URL Screening, Anti-Virus, and a slew of other things.

• A major reason we need all of this technology is because systems continue to be shipped / built insecurely!!!

• Every one of us needs to push vendors to ship secure software, and to include security testing in their QA processes

Page 26: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Security Risk Management: Selective OutsourcingThings you might consider outsourcing:• The cyber risk itself (Insurance, Re-insurance)• Email filtering and sanitization• 24 x 7 security monitoring• 1st level incident response (viruses, etc.)• Password resets• Others?

Page 27: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Wrap Up: What Can You Do Going Forward?1. Urge (contractually obligate if possible) vendors to

build, QA test, and ship secure products!!!!!!! 2. Remember that security is not a “thing” or a one time

event, it is a continual process……..3. Manage security risks like other business risks4. Conduct periodic security risk assessments that

recommend appropriate security controls5. Ensure security is inserted early in project

lifecycles6. Support your internal InfoSec team – they

have a tough job managing threats and vulnerabilities

Page 28: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Credits• CERT/CC – http://www.cert.org/present/cert-overview-trends/

• Internet Security Alliance – http://www.isalliance.org

• Riptech – http://www.riptech.com

• UK Department of Trade and Industry –

https://www.security-survey.gov.uk/View2002SurveyResults.htm

Page 29: Trends in Information Security: Threats, Vulnerabilities and Mitigation Strategies Presented By: Tina LaCroix & Jason Witty.

Questions?