20
Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor [email protected]

Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor [email protected]

  • View
    217

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

Blended Threats and Layered DefensesSecurity Protection in Today’s Environment

Marshall [email protected]

Page 2: Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

2 – © 2001 Symantec Corporation.

Business Trends Increasing importance of e-

business Disappearing enterprise perimeter Focus on business continuity Increasing concern over

information attack• Frequency• Complexity/Virulence• Cost

Polymorphic Viruses(Tequila)

Blended Threats (Code Red, Nimda)

Denial-of-Service(Yahoo!, eBay)

Mass Mailer Viruses(Love Letter/Melissa)

Zombies

Viruses

NetworkIntrusions

70,000

60,000

50,000

40,000

30,000

20,000

10,000

Nu

mb

er

of

Kn

ow

n T

hre

ats

Page 3: Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

3 – © 2001 Symantec Corporation.

54

56

58

60

62

64

66

1999 2000 2001

Insider vs. Outsider Attacks(based on % experienced)

CSI/FBI Study, 2001

Outsider

Insider

Page 4: Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

4 – © 2001 Symantec Corporation.

Policy is Key to Security

Mandate to implement security

Standard to measure security Basis for all security

technology and procedures

Policy

Standards

Procedures, Guidelines & Practices

Page 5: Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

5 – © 2001 Symantec Corporation.

Operational Security Standards ISO 17799 best practice areas SysTrust requirements established by the AICPA FISCAM requirements from GAO for U.S. fed. govt. COBIT requirements established by Information Systems Audit

and Control Association (ISACA) IETF Site and User Security Handbooks Top 20 Internet Security Threats from SANS VISA's ten requirements for on-line merchants Minimum standards of due care from The Center for Internet

Security (www.cisecurity.org)

http://enterprisesecurity.symantec.com/PDF/security_hyperlinks.pdf

Page 6: Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

6 – © 2001 Symantec Corporation.

ISO 17799 best practice areas

Security Policy

Communications & Operations

Compliance

Environmental &Physical Security

Business ContinuityPlanning

SecurityOrganization

PersonnelSecurity

Classification &Control of Assets

System Development& Maintenance

System AccessControls

Page 7: Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

7 – © 2001 Symantec Corporation.

Visa’s “Ten Commandments”

www.visabrc.com

1. Install and maintain a working network firewall to protect data accessible via the Internet

2. Keep security patches up-to-date 3. Encrypt stored data accessible from the Internet 4. Encrypt data sent across networks 5. Use and regularly update anti-virus software 6. Restrict access to data by business "need to know" 7. Assign unique IDs to each person with computer access to data 8. Track access to data by unique ID 9. Don't use vendor-supplied defaults for system passwords and

other security parameters10. Regularly test security systems and processes

Page 8: Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

8 – © 2001 Symantec Corporation.

Best Practices that Block Most Attacks Employ an application layer full inspection firewall Use automatically updated anti-virus at gateway,

server, and client Ensure security patches are up to date Ensure passwords are strong Turn off unnecessary network services

Page 9: Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

9 – © 2001 Symantec Corporation.

Managed Defense In Depth

PredictPreventDetectRespondRecover

Page 10: Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

10 – © 2001 Symantec Corporation.

Blended Threats: A Deadly Combination Blended threats combine

hacking, DoS, and worm-like propagation

Can rapidly compromise millions of machines

Often spread without human interaction

Klez

sadmind

BugBear

CodeRed

Nimda

Page 11: Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

11 – © 2001 Symantec Corporation.

Nimda: 2.2M Systems Infected in 3 Days!1. Infection of web server via “Code Red”-type attack

Page 12: Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

12 – © 2001 Symantec Corporation.

NIMDA

Nimda: 2.2M Systems Infected in 3 Days!2. Infection via email

Page 13: Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

13 – © 2001 Symantec Corporation.

Nimda: 2.2M Systems Infected in 3 Days!3. Infection via web browsing

Page 14: Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

14 – © 2001 Symantec Corporation.

Nimda: 2.2M Systems Infected in 3 Days!4. Infection via shared drives

Page 15: Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

15 – © 2001 Symantec Corporation.

NIMDA

NIMDA

NIMDA

NIMDA

NIMDA

Nimda: 2.2M Systems Infected in 3 Days!5. And infection to other files on each infected computer

through traditional viral methods

Page 16: Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

16 – © 2001 Symantec Corporation.

Blended Threats Change the Game Multiple propagation techniques required solutions

that are:• Multi-function• Multi-tier• Multi-platform

Blended threats demand superior response capabilities

Page 17: Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

17 – © 2001 Symantec Corporation.

Protecting Against Blended Threats

Page 18: Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

18 – © 2001 Symantec Corporation.

In House

Managed Services

Best Case Enterprise Security

Integrated Solutions•Client Security•Gateway Security Appliance

Point Technologies•IDS (host & network)•FW/VPN (SW & appliance)•AV/CF

Vulnerabilities•Penetration Testing

Decoy•Honeypots

Early Warning•Global Alerts

Environment• Policy Tools

Information•Incident Manager•Event Managers

(AV, FW, IDS)

Internal•Ghosting Tools

External•Security Response

(LiveUpdate)•7x24 Customer

Support•Consulting Services

Alert

Manage Respond

Protect

Proactive Control

Page 19: Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

19 – © 2001 Symantec Corporation.

Conclusion Security in the e-Business Age is challenging

• Perimeter is disappearing, threats are 360 degrees• Exploits and hacking tools are readily available• Skills required to exploit threats are low and dropping• Blended threats will become more sophisticated

Need defense in depth across gateway, server, client• Vulnerability management• Firewalls and VPNs• Anti-virus• Content filtering• Intrusion detection

Follow best practices to achieve due care Implement process to manage policy and incidents Top management support and awareness training are key

Page 20: Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

20 – © 2001 Symantec Corporation.

Marshall Taylor(781)[email protected]