Presentation is loading. Please wait.

Presentation is loading. Please wait.

Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor

Similar presentations


Presentation on theme: "Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor"— Presentation transcript:

1 Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor mtaylor@symantec.com

2 2 – © 2001 Symantec Corporation. Business Trends  Increasing importance of e- business  Disappearing enterprise perimeter  Focus on business continuity  Increasing concern over information attack Frequency Complexity/Virulence Cost Polymorphic Viruses (Tequila) Blended Threats (Code Red, Nimda) Denial-of-Service (Yahoo!, eBay) Mass Mailer Viruses (Love Letter/Melissa) Zombies Viruses Network Intrusions 70,000 60,000 50,000 40,000 30,000 20,000 10,000 Number of Known Threats

3 3 – © 2001 Symantec Corporation. 54 56 58 60 62 64 66 199920002001 Insider vs. Outsider Attacks (based on % experienced) CSI/FBI Study, 2001 Outsider Insider

4 4 – © 2001 Symantec Corporation. Policy is Key to Security  Mandate to implement security  Standard to measure security  Basis for all security technology and procedures Policy Standards Procedures, Guidelines & Practices

5 5 – © 2001 Symantec Corporation. Operational Security Standards  ISO 17799 best practice areas  SysTrust requirements established by the AICPA  FISCAM requirements from GAO for U.S. fed. govt.  COBIT requirements established by Information Systems Audit and Control Association (ISACA)  IETF Site and User Security Handbooks  Top 20 Internet Security Threats from SANS  VISA's ten requirements for on-line merchants  Minimum standards of due care from The Center for Internet Security (www.cisecurity.org) http://enterprisesecurity.symantec.com/PDF/security_hyperlinks.pdf

6 6 – © 2001 Symantec Corporation. ISO 17799 best practice areas Security Policy Communications & Operations Compliance Environmental & Physical Security Business Continuity Planning Security Organization Personnel Security Classification & Control of Assets System Development & Maintenance System Access Controls

7 7 – © 2001 Symantec Corporation. Visa’s “Ten Commandments” www.visabrc.com 1.Install and maintain a working network firewall to protect data accessible via the Internet 2.Keep security patches up-to-date 3.Encrypt stored data accessible from the Internet 4.Encrypt data sent across networks 5.Use and regularly update anti-virus software 6.Restrict access to data by business "need to know" 7.Assign unique IDs to each person with computer access to data 8.Track access to data by unique ID 9.Don't use vendor-supplied defaults for system passwords and other security parameters 10.Regularly test security systems and processes

8 8 – © 2001 Symantec Corporation. Best Practices that Block Most Attacks  Employ an application layer full inspection firewall  Use automatically updated anti-virus at gateway, server, and client  Ensure security patches are up to date  Ensure passwords are strong  Turn off unnecessary network services

9 9 – © 2001 Symantec Corporation. Managed Defense In Depth PredictPreventDetectRespondRecover

10 10 – © 2001 Symantec Corporation. Blended Threats: A Deadly Combination  Blended threats combine hacking, DoS, and worm-like propagation  Can rapidly compromise millions of machines  Often spread without human interaction Klez sadmind BugBear CodeRed Nimda

11 11 – © 2001 Symantec Corporation. Nimda: 2.2M Systems Infected in 3 Days! 1. Infection of web server via “Code Red”-type attack

12 12 – © 2001 Symantec Corporation. NIMD A Nimda: 2.2M Systems Infected in 3 Days! 2. Infection via email

13 13 – © 2001 Symantec Corporation. Nimda: 2.2M Systems Infected in 3 Days! 3. Infection via web browsing

14 14 – © 2001 Symantec Corporation. Nimda: 2.2M Systems Infected in 3 Days! 4. Infection via shared drives

15 15 – © 2001 Symantec Corporation. NIMDA Nimda: 2.2M Systems Infected in 3 Days! 5. And infection to other files on each infected computer through traditional viral methods

16 16 – © 2001 Symantec Corporation. Blended Threats Change the Game  Multiple propagation techniques required solutions that are: Multi-function Multi-tier Multi-platform  Blended threats demand superior response capabilities

17 17 – © 2001 Symantec Corporation. Protecting Against Blended Threats

18 18 – © 2001 Symantec Corporation. In House Managed Services Best Case Enterprise Security Integrated Solutions Client Security Gateway Security Appliance Point Technologies IDS (host & network) FW/VPN (SW & appliance) AV/CF Vulnerabilities Penetration Testing Decoy Honeypots Early Warning Global Alerts Environment Policy Tools Information Incident Manager Event Managers (AV, FW, IDS) Internal Ghosting Tools External Security Response (LiveUpdate  ) 7x24 Customer Support Consulting Services A lert M anage R espond P rotect Proactive Control

19 19 – © 2001 Symantec Corporation. Conclusion  Security in the e-Business Age is challenging Perimeter is disappearing, threats are 360 degrees Exploits and hacking tools are readily available Skills required to exploit threats are low and dropping Blended threats will become more sophisticated  Need defense in depth across gateway, server, client Vulnerability management Firewalls and VPNs Anti-virus Content filtering Intrusion detection  Follow best practices to achieve due care  Implement process to manage policy and incidents  Top management support and awareness training are key

20 20 – © 2001 Symantec Corporation. Marshall Taylor (781)530-2310 mtaylor@symantec.com


Download ppt "Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor"

Similar presentations


Ads by Google