Current Security Threats WMO CBS ET-CTS Toulouse, France 26-30 May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Slide Heading Seminar Series: Managing IT Risk In 2010 Understanding End User Attack Vectors Brian Judd, CISSP SynerComm January 20, 2009.
Network Security Attack Analysis. cs490ns - cotter2 Outline Types of Attacks Vulnerabilities Exploited Network Attack Phases Attack Detection Tools.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Vulnerability Identification & Patch Management Nate Howe Vice President of Risk Management.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor
System and Network Security Practices COEN 351 E-Commerce Security.
Chapter 12 Network Security.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Information Security in Real Business
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Payment Card Industry (PCI) Data Security Standard
INFORMATION SECURITY UPDATE Al Arboleda Chief Information Security Officer.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY Are You Exposed? Network Security.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Incident Response Updated 03/20/2015
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Intranet, Extranet, Firewall. Intranet and Extranet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Security at NCAR David Mitchell February 20th, 2007.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Note1 (Admi1) Overview of administering security.
Module 6: Designing Security for Network Hosts
Wireless Intrusion Prevention System
Chapter 2 Securing Network Server and User Workstations.
Module 11: Designing Security for Network Perimeters.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Security fundamentals Topic 10 Securing the network perimeter.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Securing the Linux Operating System Erik P. Friebolin.
Computer Security By Duncan Hall.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
CPT 123 Internet Skills Class Notes Internet Security Session B.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Computer Security Sample security policy Dr Alexei Vernitski.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Cybersecurity - What’s Next? June 2017
Critical Security Controls
David J. Carter, CISO Commonwealth Office of Technology
IS4680 Security Auditing for Compliance
6. Application Software Security
Presentation transcript:

Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service

26-30 May 2008WMO CBS - ET-CTS Toulouse, FR2 Top Current Security Threats (as identified by SANS, Nov 2007) 1. Critical vulnerabilities in Web applications enabling the Web site to be poisoned, the data behind the Web site to be stolen and other computers connected to the Web site to be compromised. Best defenses: Web application firewall, Web application security scanner, application source code testing tools, application penetration testing services, and most importantly a formal policy that all important Web applications will be developed using a valid secure development life cycle and only by developers who have proven (through testing) that they have the skills and knowledge to write secure applications. 1. Critical vulnerabilities in Web applications enabling the Web site to be poisoned, the data behind the Web site to be stolen and other computers connected to the Web site to be compromised. Best defenses: Web application firewall, Web application security scanner, application source code testing tools, application penetration testing services, and most importantly a formal policy that all important Web applications will be developed using a valid secure development life cycle and only by developers who have proven (through testing) that they have the skills and knowledge to write secure applications.

26-30 May 2008WMO CBS - ET-CTS Toulouse, FR3 Top Current Security Threats (as identified by SANS, Nov 2007) 2. Gullible, busy, accommodating computer users, including executives, IT staff, and others with privileged access, who follow false instructions provided in spear phishing s, leading to empty bank accounts, compromise of systems around the world, compromise of contractors, industrial espionage and much more. Best defenses: This is the most challenging risk. Security awareness training is important but is definitely not sufficient to solve this problem. Two defenses seem promising: (a) inoculation in which all users are sent periodic spear phishing s that are benign. Those who err are educated or cut off, (b) Admit that this problem cannot be solved in all cases and establish new monitoring and forensics systems that constantly search network traffic and systems for evidence of deep penetration and persistent presence. 2. Gullible, busy, accommodating computer users, including executives, IT staff, and others with privileged access, who follow false instructions provided in spear phishing s, leading to empty bank accounts, compromise of systems around the world, compromise of contractors, industrial espionage and much more. Best defenses: This is the most challenging risk. Security awareness training is important but is definitely not sufficient to solve this problem. Two defenses seem promising: (a) inoculation in which all users are sent periodic spear phishing s that are benign. Those who err are educated or cut off, (b) Admit that this problem cannot be solved in all cases and establish new monitoring and forensics systems that constantly search network traffic and systems for evidence of deep penetration and persistent presence.

26-30 May 2008WMO CBS - ET-CTS Toulouse, FR4 Top Current Security Threats (as identified by SANS, Nov 2007) 3. Critical vulnerabilities in software on personal computers inside and outside enterprises (client-side vulnerabilities) allowing these systems to be turned into zombies and recruited into botnets and also allowing them to be used as back doors for stealing information from and taking over servers inside large organizations. Web Browsers Office Software Clients Media Players Best defenses: firmly enforced secure configurations (at installation time) for all applications, constantly verified patching and upgrading of both applications and system software, constant vulnerability scanning and rapid resolution of problems found, tightly configured firewalls and intrusion prevention systems, up-to-date anti-virus and anti-spyware at gateways as well as on desktops. 3. Critical vulnerabilities in software on personal computers inside and outside enterprises (client-side vulnerabilities) allowing these systems to be turned into zombies and recruited into botnets and also allowing them to be used as back doors for stealing information from and taking over servers inside large organizations. Web Browsers Office Software Clients Media Players Best defenses: firmly enforced secure configurations (at installation time) for all applications, constantly verified patching and upgrading of both applications and system software, constant vulnerability scanning and rapid resolution of problems found, tightly configured firewalls and intrusion prevention systems, up-to-date anti-virus and anti-spyware at gateways as well as on desktops.

26-30 May 2008WMO CBS - ET-CTS Toulouse, FR5 Top Current Security Threats (as identified by SANS, Nov 2007) 4. Critical vulnerabilities in the software and systems that provides the operating environment and primary services to computer users (server side software) Windows Services Unix and Mac OS Services Backup Software Anti-virus Software Management Servers Database Software VOIP servers Best defenses: (mostly the same as group 3) firmly enforced secure configurations (at installation time) for all applications, constantly verified patching and upgrading of applications and system software, tightly configured firewalls and intrusion prevention systems. 4. Critical vulnerabilities in the software and systems that provides the operating environment and primary services to computer users (server side software) Windows Services Unix and Mac OS Services Backup Software Anti-virus Software Management Servers Database Software VOIP servers Best defenses: (mostly the same as group 3) firmly enforced secure configurations (at installation time) for all applications, constantly verified patching and upgrading of applications and system software, tightly configured firewalls and intrusion prevention systems.

26-30 May 2008WMO CBS - ET-CTS Toulouse, FR6 Top Current Security Threats (as identified by SANS, Nov 2007) 5. Policy and Enforcement Problems that allow malware to do extra harm and that lead to loss of large amounts of data Excessive User Rights and Unauthorized Devices Unencrypted Laptops and Removable Media Best defenses: no-exception policies, constant monitoring, substantial penalties for failure to comply. 5. Policy and Enforcement Problems that allow malware to do extra harm and that lead to loss of large amounts of data Excessive User Rights and Unauthorized Devices Unencrypted Laptops and Removable Media Best defenses: no-exception policies, constant monitoring, substantial penalties for failure to comply.

26-30 May 2008WMO CBS - ET-CTS Toulouse, FR7 Top Current Security Threats (as identified by SANS, Nov 2007) 6. Application abuse of tools that are user favorites leading to client and server compromise, loss of sensitive information, and use of enterprise systems for illegal activity Instant Messaging Peer-to-Peer Programs Best defenses: use only tightly secured versions of these tools, or prohibits them entirely. 7. Zero-day attacks –launched the same day that a vulnerability is announced, before patches exist Best defenses: Build much more restrictive perimeters with deny-all, allow some firewall rules and redesign networks to protect internal systems from Internet- facing systems 6. Application abuse of tools that are user favorites leading to client and server compromise, loss of sensitive information, and use of enterprise systems for illegal activity Instant Messaging Peer-to-Peer Programs Best defenses: use only tightly secured versions of these tools, or prohibits them entirely. 7. Zero-day attacks –launched the same day that a vulnerability is announced, before patches exist Best defenses: Build much more restrictive perimeters with deny-all, allow some firewall rules and redesign networks to protect internal systems from Internet- facing systems

26-30 May 2008WMO CBS - ET-CTS Toulouse, FR8 Best Prevention Practices (as identified by SANS, Nov 2007) Configure systems, from the first day, with the most secure configuration that your business functionality will allow, and use automation to keep users from installing/uninstalling software

26-30 May 2008WMO CBS - ET-CTS Toulouse, FR9 Best Prevention Practices (as identified by SANS, Nov 2007) Use automation to make sure systems maintain their secure configuration, remain fully patched with the latest version of the software (including keeping anti-virus software up to date) Use proxies on your border network, configuring all client services (HTTP, HTTPS, FTP, DNS, etc.) so that they have to pass through the proxies to get to the Internet Use automation to make sure systems maintain their secure configuration, remain fully patched with the latest version of the software (including keeping anti-virus software up to date) Use proxies on your border network, configuring all client services (HTTP, HTTPS, FTP, DNS, etc.) so that they have to pass through the proxies to get to the Internet

26-30 May 2008WMO CBS - ET-CTS Toulouse, FR10 Best Prevention Practices (as identified by SANS, Nov 2007) Protect sensitive data through encryption, data classification mapped against access control, and through automated data leakage protection Use automated inoculation for awareness and provide penalties for those who do not follow acceptable use policy. Perform proper DMZ segmentation with firewalls. Remove the security flaws in Web applications by testing programmer’s security knowledge and testing the software for flaws. Protect sensitive data through encryption, data classification mapped against access control, and through automated data leakage protection Use automated inoculation for awareness and provide penalties for those who do not follow acceptable use policy. Perform proper DMZ segmentation with firewalls. Remove the security flaws in Web applications by testing programmer’s security knowledge and testing the software for flaws.