Cedes.ba The art of security What is not security (what years of pen testing have shown us)

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Social Engineering And You Steve Otto. Social Engineering n Social Engineering - Getting people to do things they ordinarily wouldn’t do for a stranger.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Chapter 7 HARDENING SERVERS.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Web server security Dr Jim Briggs WEBP security1.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Introduction to Network Defense
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
That’s Really not the Point… haroon meer | charl van der walt SensePost.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
 Jonathan Trull, Deputy State Auditor, Colorado Office of the State Auditor  Travis Schack, Colorado’s Information Security Officer  Chris Ingram,
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
Chapter 4.  Can technology alone provide the best security for your organization?
Joseph Ferracin Director IT Security Solutions Managing Security.
BUSINESS B1 Information Security.
Staying Safe Online Keep your Information Secure.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
Security at NCAR David Mitchell February 20th, 2007.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
CPT 123 Internet Skills Class Notes Internet Security Session A.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Small Business Security Keith Slagle April 24, 2007.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Module 11: Designing Security for Network Perimeters.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Computer Security By Duncan Hall.
Role Of Network IDS in Network Perimeter Defense.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
Engineering Secure Software. Does Security Even Matter?  Find two other people near you Introduce yourself What is your favorite software development.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Defense In Depth: Minimizing the Risk of SQL Injection
Design for Security Pepper.
Secure Software Confidentiality Integrity Data Security Authentication
Robert Leonard Information Security Manager Hamilton
Lessons From The Defensive Security Podcast
David J. Carter, CISO Commonwealth Office of Technology
12 STEPS TO A GDPR AWARE NETWORK
AppExchange Security Certification
Topic 5: Communication and the Internet
Mohammad Alauthman Computer Security Mohammad Alauthman
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
6. Application Software Security
Presentation transcript:

cedes.ba The art of security What is not security (what years of pen testing have shown us)

Sadržaj Security in the region – what’s right and what’s terribly wrong 100% penetration rate – how we always hit the jackpot in 2 hours or less Viruses and windmills – what they have in common Structured and unstructured threats – why we fear poodles much more than lions Did someone just steal our confidential data? – why we may never know Running a secure installation – it will take management involvement weather you like it or not

Preduslovi None! Feel free to ask questions at any point

Where this informatino came from Penetration testing –Systematic simulation of an attack by a capable and motivated attacker –Serves to validate and verify security measures –(mostly used to scare management into action) –Exposes real threats, real vulnerabilities and real problems This presentation contains experiences gathered through years of pen testing and security consulting in the region

State of security Security is well funded Most large systems have impressive arsenals of: –Firewalls –IDS –IPS –Antivirus –Antitrojan –Monitoring systems Increased security awareness made funding available Projects are approved, budgets allocated

Approach to security Commonly handed off to IT IT does what IT knows how to do –Need firewalls –Need IDS –Need IPS –Need antivirus –Need cool gadgets… Bought, deployed, configured == security? No, not really. –100% penetration rate –Usually within hours

Why our approach doesn’t work Security product arsenals don’t automagicaly fix everything Vulnerabilities persist –Social Engineering –Custom vulnerabilities in internal software –Password reuse These three are plenty to compromise security

Security breach scenario Short, elegant, efficient, and very effective –Social engineering to gain access to internal network –Custom vulnerabilities to obtain access credentials and expand influence within internal network –Password reuse allows hijacking the rest of resources Days of instant remote root access are gone Vulnerability chaining defeats technical security measures

Why we stay vulnerable Commercial products are security controls Security controls are meant to mitigate specific risks They are pieces of the puzzle, tools of the trade They are NOT solutions – they are NOT security

Moat and castle Security products do nothing at all against –A clueless user –Custom written trojans (or slightly modified public ones) –Vulnerabilities you make yourself (sql injection, XSS, password reuse, code injection, weak authentication) Security either is, or isn’t – never something in between

What we protect against Two types of threats out there Unstructured –Attacks of opportunity –Low motivation –Low skill level –Generic attack, generic tools, generic vulnerabilities It’s very easy to defend against this type of attack Security arsenals are very good at protecting against the unmotivated, uninterested attacker with low skill level (a 486 will provide equivalent protection as the most expensive of security appliances)

What we don’t protect against Structured attacks –High skill level –High motivation –Specific goals These attacks don’t stop just because all your ports are filtered, or because there’s an up to date antivirus on every machine Path of least resistance never leads through multiple firewalls

Non-threats We spend all the resources protecting against non-threats Non threat examples –Viruses – Michelangelo anyone? –VPN – I’m scared someone will take over the internet to spy on me… –IPS – automatic defense, we’d have little to talk about if it worked I’ve never heard –IPS stopped me mid attack –I attacked the link but the data was encrypted –Firewall wouldn’t let me through

Why do we believe we’re safe I have no idea –System has never been tested by an expert –No one understands how it works –We don’t know if it works

What security IS Satisfactory guarantee of confidentiality, integrity, and availability of key resources Properly implemented security: –Is an investment, not an expense –Can prove it’s ROI –Reduces expenses of unnecessary and ineffective “security” spending –Is measurable

How to implement security I know what to protect (RA) I know what to protect it from (RA) I know how to protect it (Identification of controls) I’ve documented how to protect it and implemented controls to do so (Security policy, standards, procedures) I’ve exposed the organization to this information and trained them on the use of controls (user awareness training, specialized security education) I’ve tested the system (pen test + audit) I’ve corrected the system (Audit results) I’ve tested the system (pen test + audit)

Hvala! Pitanja?

Cedes.ba usluge Edukacija Penetracioni testovi Forenzička analiza sistema ISMS implementacije Implementacija sigurnosnih kontrola