The Threat Landscape and Security Trends. Jeremy Ward
|
|
- Ruth McDonald
- 5 years ago
- Views:
Transcription
1 The Threat Landscape and Security Trends Jeremy Ward
2 DTI Survey Incidence of breaches What proportion of UK businesses had a security incident last year?
3 Trends since 2002 What proportion of UK businesses had a malicious security incident nt in the last year?
4 General Threat Evolution Global Impact Sector Flash threats Massive worm driven DDoS Web Services Scope Regional Individual Orgs. Individual PCs 1 st gen. viruses Individual DoS Web defacement worms DDoS Credit hacking Blended threats Limited Warhol threats Worm driven DDoS National credit hacking Infrastructure hacking 1990s Time
5 Flash to Bang Software lnerability nnounced
6 Flash to Bang Firewall/IDS Alert Software lnerability nnounced Tell-tale Activity time
7 Media Circus Flash to Bang Firewall/IDS Alert Software lnerability nnounced Tell-tale Activity time
8 Sasser Development Drop Page Fields Here 1400 Sum of Sources Sasser Worm Released Cisco & Dragon Signatures Pushed Type IDS Firew MS LSASS Vulnerability Released 0 4/22/04 0:00 4/23/04 4/24/04 4/25/04 4/26/04 4/27/04 4/28/04 4/29/04 4/30/04 5/1/04 5/2/04 5/3/04 5/4/04 5/5/04 5/6/04 Date
9 Less time to react Vulnerability Release Date v Time to Active Exploitation 350 Days Code Blue Nimda Lion Masana Blaster Welchia Code Red Modap Sasser 0 Scalper 1-Oct Apr-01 5-Nov May Dec Jun Jan-04 1-Aug-0 Date Source: Symantec
10 Vulnerability Summary 2,636 distinct vulnerabilities documented by Symantec in serious potential vulnerabilities per month = 60 easy & prevalent = patches a month
11
12 Vulnerability Trends 6% rise in vulnerabilities requiring no exploit code, 5% increase in vulnerabilities with published exploit code No Exploit Required Exploit Available No Exploit Available Number of vulnerabilities Jan02 Mar02 May02 Jul02 Sep02 Nov02 Jan03 Mar03 May03 Jul03 Sep03 Nov03 Month Source: Symantec
13 Today s Threat Landscape Significant increase in mass-mailers Significant increase in criminal activity 54% of all attacks are blended Speed of building is at an all time record Highly automated 24% increase in targeting 2003 Top 10 Malicious Code Threats 1 W32.Bugbear.B@mm 2 W32.Klez.H@mm 3 HTML.Redlof.A 4 W95.Hybris.worm 5 W32.Sobig.F@mm 6 W32.Blaster.Worm 7 W32.Swen.A@mm 8 W32.Nimda.E@mm 9 W32.Bugbear.B.Dam 10 W32.Sobig.A@mm Source: Computer Economics
14 Growth of Remote Access Threat in All Malware Backdors Jul-Dec 2002 Jan-Jun 2003 Jul-Dec 2003 Jan-Jun 2004 Network Threats: Min. Risk = 3. Min. Severity = 5 Data from Symantec DeepSight Ale
15 Why? It s easy just cut & paste
16 Data from Symantec DeepSight Ale Proof that it s easy - re-engineered malware 158 Gaobot variants (25/10/02) 43 Backdoor.Sdbot variants (09/07/02) 30 Netsky variants (16/02/04) 26 Beagle variants (20/01/04)
17 nd it s worth oney
18 In the marketplace
19 The Botnet Threat Botnets can be so large (250,000 PCs) they could take whole countries offline (Met Police CCU) Botnet herders pay hackers for their botnets Sell to spammers mostly in eastern Europe DoS attacks and blackmail Businesses report being targets of demands for $50k from a Russian crime Syndicate
20
21 What helps them succeed? Bypass firewalls to chat with our friends and download files. orks with Kazaa, imesh, essenger, ICQ and any other pplication that supports the OCKS protocol. o configuration hassles, no echie-talk or geek-speak. ot only does hopster configure tself, it even knows how to onfigure Kazaa, MSN Messenger nd many others - so you don't eed to. nce installed, hopster operates ilently in the background, you on't even notice it's there.
22 Blaster reuse & peer-to-peer filesharing Rank Port Description Percentage of Attackers 1 TCP/135 Microsoft / DCE-Remote Procedure Call (Blaster & Variants) 32.9% 2 TCP/80 HTTP / Web 19.7% 3 TCP/4662 E-donkey / Peer-to-peer file sharing 9.8% 4 TCP/6346 Gnutella / Peer-to-peer file sharing 8.9% 5 TCP/445 Microsoft CIFS Filesharing 6.9% 6 UDP/53 DNS 5.9% 7 UDP/137 Microsoft CIFS Filesharing 4.7% 8 UDP/41170 Blubster / Peer-to-peer Filesharing 3.2% 9 TCP/7122 Unknown 2.5% 10 UDP/1434 Microsoft SQL Server (Slammer) 2.4% Source: Symantec
23 The window of opportunity Pace of Change ? Internet mature High predictability 2001 Dotcom bubble bursts Internet developing fast Low predictability? Next development Time
24 To detect reconnaissance & attack activity Pre-attack Reconnaissance 40% Exploit Attempts 17% 43% Worms & Blended Threats Source: Symantec
25 Community Defence To prioritise patch activities on the basis of likelihood & damage To plan defence based on likely attack mechanisms To prepare resources for appropriate responses To understand and detect attacks
26 Community Alerting for Sasser 1400 Sum of Sources Specific Alerts Tele conf Type IDS Firewall Initial Alert Community Alerts 0 4/14/04 4/22/04 0:00 4/23/04 4/24/04 4/25/04 4/26/04 4/27/04 4/28/04 4/29/04 4/30/04 5/1/04 5/2/04 5/3/04 5/4/04 5/5/04 5/6/04 Date
27 Community Summary for June 2004 The overall number of varied threats continues to increase Web and Application attacks continue to rise steadily DoS attacks continue to increase sharply After a significant drop over the last few months, O/S attacks rose dramatically Malicious code attacks overall have doubled over 6 months.
28 June 2004 Top 10 Attacks 1. Generic UTF8 Encoding in URL Attack 2. Microsoft Indexing Server/Indexing Services ISAPI Buffer Overflow Attack 3. SQLExp Worm Activity 4. Mal HTTP Commands Generic TCP Syn Flood Denial of Service Attack 7. Generic X86 Buffer Overflow Attack 8. Suspicious SSH Traffic 9. Dot-Dot Exploit 10.Generic WebDAV/Source Disclosure "Translate: f" HTTP Header Request Attack *excludes probes and scans
29 Analysis of variety of attacks on Community in 2004 Total Attack Signatures for Community Jan Feb Mar Apr May Jun 2004
30 Community Benchmarking Security Events 250 Average Security Event Count (Jan-Jun 2004) P J Q D M C F S Z X G L V O Y H N T K W AA E R B I A U Community Organisations
31 Summary Vulnerabilities increase patch times decrease Internet parasites come of age now they make money The tools make it easier both for the hacker and the careless But we have an opportunity we can use the tools for defence Community defence could give us the break we need!
32 End Questions? Thank you
SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet
SYMANTEC ENTERPRISE SECURITY Symantec Internet Security Threat Report September 00 Power and Energy Industry Data Sheet An important note about these statistics The statistics discussed in this document
More informationSYMANTEC SECURITY UPDATE JUNE 2005
SYMANTEC SECURITY UPDATE JUNE 005 Symantec Security Update - June 005 Worldwide and APAC Monthly report examining recent high severity vulnerabilities, cyber attacks, malicious code and spam activity.
More informationIntelligent and Secure Network
Intelligent and Secure Network BIG-IP IP Global Delivery Intelligence v11.2 IP Intelligence Service Brian Boyan - b.boyan@f5.com Tony Ganzer t.ganzer@f5.com 2 Agenda Welcome & Intro Introduce F5 IP Intelligence
More informationWeb Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates
Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates A test commissioned by McAfee, Inc. and performed by AV-Test GmbH Date of the report: December 7 th, 2010 (last
More informationInternet Threats Today and Tomorrow
Internet Threats Today and Tomorrow Page 2 Agenda Intro about AVERT Threat count and growth rate Threats using the known system vulnerabilities Noteworthy viruses overview Threats during 2004 and beyond
More informationTOP 10 Vulnerability Trends for By Nevis Labs
TOP Vulnerability Trends for 28 By Nevis Labs Date: December 11, 27 Page 1 It s the last month of 27 and the time is right to look back at the year and predict the vulnerability trends for 28. A quick
More informationIBM Security Systems IBM X-Force 2012 Annual Trend and Risk Report
IBM Security Systems IBM X-Force 2012 Annual Trend and Risk Report Leslie Horacek X-Force Threat Response Manager horacek@be.ibm.com April 2013 1 X-Force is the foundation for advanced security and threat
More informationIoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense
IoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense DDoS Attacks Increasing in Size, Frequency & Complexity Arbor Networks WISR XII Largest attack
More informationSecurity Threats & Trends Arvind Sahay, Enterprise Manager India, McAfee
7/26/2005 Security Threats & Trends Arvind Sahay, Enterprise Manager India, McAfee 7/26/2005 Page 2 Outline Some Threats Current Trends Corporate Dilemma Challenges Security solutions available Q&A 7/26/2005
More information10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
More informationLegal and notice information
Legal and notice information Copyright 2017 Trend Micro Incorporated. All rights reserved. TippingPoint, the TippingPoint logo, and Digital Vaccine are trademarks or registered trademarks of Trend Micro
More informationBe certain. MessageLabs Intelligence: May 2006
Be certain MessageLabs Intelligence: May 2006 Introduction Welcome to the May edition of the MessageLabs Intelligence monthly report. This report provides the latest threat trends for May 2006 to keep
More informationThe Scenes of Cyber Crime
Organizer: BRIDGING BARRIERS: LEGAL AND TECHNICAL OF CYBERCRIME CASES The Scenes of Cyber Crime 5 July 2011 Toralv Dirro EMEA Security Strategist, McAfee Labs Low Risk + High Profit -> Crime 500,000 Cyber
More informationCurrent procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH
Current procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH International Workshop on Criminal Justice Statistics on Cybercrime and Electronic Evidence
More informationERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016
Abstract The Mirai botnet struck the security industry in three massive attacks that shook traditional DDoS protection paradigms, proving that the Internet of Things (IoT) threat is real and the grounds
More informationCompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management
CompTIA Security+ Lecture Six Threats and Vulnerabilities Vulnerability Management Copyright 2011 - VTC Malware Malicious code refers to software threats to network and systems, including viruses, Trojan
More informationStandard Categories for Incident Response (definitions) V2.1. Standard Categories for Incident Response Teams. Definitions V2.1.
Standard Categories for Incident Response Teams Definitions V2.1 February 2018 Standard Categories for Incident Response (definitions) V2.1 1 Introduction This document outlines categories that Incident
More informationArbor White Paper. DDoS: THE STAKES HAVE CHANGED. HAVE YOU? REVEALED: 3 dangerous myths about DDoS attacks
Arbor White Paper DDoS: THE STAKES HAVE CHANGED. HAVE YOU? REVEALED: 3 dangerous myths about DDoS attacks The findings of the latest annual Worldwide Infrastructure Security Report (WISR) by Arbor Networks
More informationSYMANTEC SECURITY UPDATE JUNE 2005
SYMANTEC SECURITY UPDATE JUNE 2005 Symantec Security Update - June 2005 Worldwide and Japan Monthly report examining recent high severity vulnerabilities, cyber attacks, malicious code and spam activity.
More informationSINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker
NH9000 Certified Ethical Hacker 104 Total Hours COURSE TITLE: Certified Ethical Hacker COURSE OVERVIEW: This class will immerse the student into an interactive environment where they will be shown how
More information2015 DDoS Attack Trends and 2016 Outlook
CDNetworks 2015 DDoS Attack Trends and 2016 Outlook 2016, January CDNetworks Security Service Team Table of Contents 1. Introduction... 3 2. Outline... 3 3. DDoS attack trends... 4 4. DDoS attack outlook
More informationCybersecurity. Anna Chan, Marketing Director, Akamai Technologies
Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile Business devices and Continuity data collection. & Cybersecurity Anna Chan, Marketing Director,
More informationSophos Central for partners and customers: overview and new features. Jonathan Shaw Senior Product Manager, Sophos Central
Sophos Central for partners and customers: overview and new features Jonathan Shaw Senior Product Manager, Sophos Central What is Sophos Central? Partner Dashboard Admin Self Service Allows Partners to
More informationCertified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH) COURSE OVERVIEW: The most effective cybersecurity professionals are able to predict attacks before they happen. Training in Ethical Hacking provides professionals with the
More informationWin32/Msblast: A Case Study from Microsoft s Perspective. Matthew Braverman Program Manager Microsoft Corporation
Win32/Msblast: A Case Study from Microsoft s Perspective Matthew Braverman Program Manager Microsoft Corporation mattbrav@microsoft.com Win32/Msblast & Win32/Sasser: Overview Msblast Sasser Advantage Vulnerability
More informationSecurity Trend of New Computing Era
Security Trend of New Computing Era Presented by Roland Cheung HKCERT Agenda Security Threat Overview Introduction of Botnet Impact of Botnet Fight Back Botnet Security Protection Scheme Security Threat
More informationSecurity Standardization and Regulation An Industry Perspective
Security Standardization and Regulation An Industry Perspective Dr. Ralf Rammig Siemens AG Megatrends Challenges that are transforming our world Digitalization In the future, we ll be living in a world
More informationIntrusion prevention systems are an important part of protecting any organisation from constantly developing threats.
Network IPS Overview Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. By using protocol recognition, identification, and traffic analysis
More informationDemystifying Service Discovery: Implementing an Internet-Wide Scanner
Demystifying Service Discovery: Implementing an Internet-Wide Scanner Derek Leonard Joint work with Dmitri Loguinov Internet Research Lab Department of Computer Science and Engineering Texas A&M University,
More informationvol.15 August 1, 2017 JSOC Analysis Team
vol.15 August 1, 2017 JSOC Analysis Team JSOC INSIGHT vol.15 1 Preface...2 2 Executive Summary...3 3 Trends in Severe Incidents at the JSOC...4 3.1 Trends in severe incidents... 4 3.2 Analysis of severe
More informationComparison of Firewall, Intrusion Prevention and Antivirus Technologies
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies (How each protects the network) Dr. Gaurav Kumar Jain Email: gaurav.rinkujain.jain@gmail.com Mr. Pradeep Sharma Mukul Verma Abstract
More informationWhy Should You Care About Control System Cybersecurity. Tim Conway ICS.SANS.ORG
Why Should You Care About Control System Cybersecurity Tim Conway ICS.SANS.ORG Events Example #1 Dec 23, 2015 Cyber attacks impacting Ukrainian Power Grid Targeted, synchronized, & multi faceted Three
More informationSECURE YOUR APPLICATIONS, SIMPLIFY AUTHENTICATION AND CONSOLIDATE YOUR INFRASTRUCTURE
SECURE YOUR APPLICATIONS, SIMPLIFY AUTHENTICATION AND CONSOLIDATE YOUR INFRASTRUCTURE San Diego March 21, 2013 John Lee Field Systems Engineer Conjecture of relative breach impact is based on publicly
More informationMalware Research at SMU. Tom Chen SMU
Malware Research at SMU Tom Chen SMU tchen@engr.smu.edu www.engr.smu.edu/~tchen Outline About SMU and Me Virus Research Lab Early Worm Detection Epidemic Modeling New Research Interests TC/BT/11-5-04 SMU
More informationInternet Threat Detection System Using Bayesian Estimation
Internet Threat Detection System Using Bayesian Estimation Masaki Ishiguro 1 Hironobu Suzuki 2 Ichiro Murase 1 Hiroyuki Ohno 3 Abstract. We present an Internet security threat detection system 4 using
More informationCIH
mitigating at host level, 23 25 at network level, 25 26 Morris worm, characteristics of, 18 Nimda worm, characteristics of, 20 22 replacement login, example of, 17 signatures. See signatures SQL Slammer
More informationComputer Network Vulnerabilities
Computer Network Vulnerabilities Objectives Explain how routers are used to protect networks Describe firewall technology Describe intrusion detection systems Describe honeypots Routers Routers are like
More informationOpportunities for Exploiting Social Awareness in Overlay Networks. Bruce Maggs Duke University Akamai Technologies
Opportunities for Exploiting Social Awareness in Overlay Networks Bruce Maggs Duke University Akamai Technologies The Akamai Intelligent Platform A Global Platform: 127,000+ Servers 1,100+ Networks 2,500+
More informationFighting the. Botnet Ecosystem. Renaud BIDOU. Page 1
Fighting the Botnet Ecosystem Renaud BIDOU Page 1 Bots, bots, bots Page 2 Botnet classification Internal Structure Command model Propagation mechanism 1. Monolithic Coherent, all features in one binary
More informationService Provider View of Cyber Security. July 2017
Service Provider View of Cyber Security July 2017 Quick Stats Caribbean and LatAm: 3 rd largest population of Internet Users You Are Here Visualization from the Opte Project of the various routes through
More informationJPCERT/CC Incident Handling Report [October 1, 2015 December 31, 2015]
JPCERT-IR-2015-05 Issued: 2016-01-14 JPCERT/CC Incident Handling Report [October 1, 2015 December 31, 2015] 1. About the Incident Handling Report JPCERT Coordination Center (herein, JPCERT/CC) receives
More informationEndpoint Protection : Last line of defense?
Endpoint Protection : Last line of defense? First TC Noumea, New Caledonia 10 Sept 2018 Independent Information Security Advisor OVERVIEW UNDERSTANDING ENDPOINT SECURITY AND THE BIG PICTURE Rapid development
More informationCisco Firepower with Radware DDoS Mitigation
Cisco Firepower with Radware DDoS Mitigation Business Decision Maker Presentation Eric Grubel VP Business development, Radware February 2017 DDoS in the news French hosting firm flooded with 1 Tbps traffic
More informationService Provider Security Architecture
Service Provider Security Architecture Andrew Turner Technical Marketing, Security Business Group April 12 th 2017 Digitization is disrupting the SP business The world has gone mobile Traffic growth, driven
More informationQuantitative Vulnerability Assessment of Systems Software
Quantitative Vulnerability Assessment of Systems Software Omar H. Alhazmi Yashwant K. Malaiya Colorado State University Motivation Vulnerabilities: defect which enables an attacker to bypass security measures
More informationNetwork Intrusion Goals and Methods
Network Intrusion Goals and Methods Mgr. Rudolf B. Blažek, Ph.D. Department of Computer Systems Faculty of Information Technologies Czech Technical University in Prague Rudolf Blažek 2010-2011 Network
More informationNigerian Telecommunications (Services) Sector Report Q2 2016
Nigerian Telecommunications (Services) Sector Report Q2 2016 01 SEPTEMBER 2016 Telecommunications Data The telecommunications data used in this report were obtained from the National Bureau of Statistics
More informationSecurity: A year of Red Hat Enterprise Linux 4. Mark J Cox
Security: A year of Red Hat Enterprise Linux 4 Mark J Cox How many updates? For Red Hat Enterprise Linux 4 from release, 15 Feb 2005 until 14 Feb 2006 183 Security Advisories released on 75 separate dates
More informationThe emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe
The emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe Copyright 2017 Protocol 46, Inc. All Rights Reserved Copyright 2017 Protocol 46, Inc.
More informationMitigating Outgoing Spam, DoS/DDoS Attacks and Other Security Threats
Solution Brief Mitigating Outgoing Spam, DoS/DDoS Attacks and Other Security Threats 2006 Allot Communications Ltd. Allot Communications, NetEnforcer and the Allot logo are registered trademarks of Allot
More informationDAS LRS Monthly Service Report
DAS LRS Monthly Service Report Customer Service Manager : Diploma Aggregation Service : Daniel Ward Project/document reference : DAS LRS 2010-12 Issue : 1.0 Issue date : 17 th January 2011 Reporting Period
More informationCertified Ethical Hacker
Certified Ethical Hacker Certified Ethical Hacker Course Objective Describe how perimeter defenses function by ethically scanning and attacking networks Conduct information systems security audits by understanding
More informationInternet of Things (IoT) Attacks. The Internet of Things (IoT) is based off a larger concept; the Internet of Things came
Victoria Ellsworth Dr. Ping Li ICTN 4040 04/11/17 Internet of Things (IoT) Attacks The Internet of Things (IoT) is based off a larger concept; the Internet of Things came from idea of the Internet of Everything.
More informationProtecting Virtual Environments
Turvaliselt on hea! Protecting Virtual Environments Trend Micro Deep Security Märt Erik, security engineer, Stallion Simon Wikberg, senior pre- sales engineer, Trend Micro Urmas Püss, sales consultant,
More informationNETWORK THREATS DEMAN
SELF-DEFENDING NETWORK NETWORK THREATS DEMAN NEW SECURITY: STRATEGIES TECHNOLOGIES Self-Propagating Threats A combination of: self propagating threats Collaborative applications Interconnected environments
More informationIntrusion Detection and Prevention System (IPS) Technology, Applications, and Trend
Intrusion Detection and Prevention System (IPS) Technology, Applications, and Trend Dr. Nen-Fu (Fred) Huang Professor, Department of Computer Science, National Tsing Hua University, Taiwan President, Broadweb
More informationPerimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN
T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN Perimeter Defenses Enterprises need to take their security strategy beyond stacking up layers of perimeter defenses to building up predictive
More informationDéfense In-Depth Security. Samson Oduor - Internet Solutions Kenya Watson Kamanga - Seacom
Défense In-Depth Security Samson Oduor - Internet Solutions Kenya Watson Kamanga - Seacom Siku Njema! Good Day! 2 Defense In-depth Security Approach SECTION 1 Introductions SECTION 4 Case - Study SECTION
More informationInvincea Endpoint Protection Test
Invincea Endpoint Protection Test A test commissioned by Invincea and performed by AV-TEST GmbH. Date of the report: May 2 nd, 2016 Executive Summary In April 2016, AV-TEST performed a review of the Invincea
More informationAURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo
ETHICAL HACKING (CEH) CURRICULUM Introduction to Ethical Hacking What is Hacking? Who is a Hacker? Skills of a Hacker? Types of Hackers? What are the Ethics and Legality?? Who are at the risk of Hacking
More informationIBM Security Network Protection Solutions
Systems IBM Security IBM Security Network Protection Solutions Pre-emptive protection to keep you Ahead of the Threat Tanmay Shah Product Lead Network Protection Appliances IBM Security Systems 1 IBM Security
More informationThaiCERT Incident Response & Phishing cases in Thailand. By Kitisak Jirawannakool Thai Computer Emergency Response team (ThaiCERT)
ThaiCERT Incident Response & Phishing cases in Thailand By Kitisak Jirawannakool Thai Computer Emergency Response team (ThaiCERT) Agenda About ThaiCERT ThaiCERT IR Phishing in Thailand About ThaiCERT Ministry
More informationSecurity: Worms. Presenter: AJ Fink Nov. 4, 2004
Security: Worms Presenter: AJ Fink Nov. 4, 2004 1 It s a War Out There 2 Analogy between Biological and Computational Mechanisms The spread of self-replicating program within computer systems is just like
More informationDDoS Protector. Simon Yu Senior Security Consultant. Block Denial of Service attacks within seconds CISSP-ISSAP, MBCS, CEH
DDoS Protector Block Denial of Service attacks within seconds Simon Yu Senior Security Consultant CISSP-ISSAP, MBCS, CEH 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012
More informationINSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security
Symantec Enterprise Security WHITE PAPER Integrated Security: Creating the Secure Enterprise INSIDE Evolving IT and business environments The impact of network attacks on business The logical solution
More informationsoftware.sci.utah.edu (Select Visitors)
software.sci.utah.edu (Select Visitors) Web Log Analysis Yearly Report 2002 Report Range: 02/01/2002 00:00:0-12/31/2002 23:59:59 www.webtrends.com Table of Contents Top Visitors...3 Top Visitors Over Time...5
More informationARAKIS An Early Warning and Attack Identification System
ARAKIS An Early Warning and Attack Identification System Piotr Kijewski Piotr.Kijewski@cert.pl 16th Annual FIRST Conference June 13-18, Budapest, Hungary Presentation outline Trends in large scale malicious
More informationINTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
INTRODUCTION: DDOS ATTACKS 1 DDOS ATTACKS Though Denial of Service (DoS) and Distributed Denial of Service (DDoS) have been common attack techniques used by malicious actors for some time now, organizations
More informationA strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems
A strategy for Inexpensive Automated Containment of Infected or Vulnerable Systems Steven Sim Kok Leong Assistant Manager Infocomm Security Group, NUSCERT Computer Centre National University of Singapore
More informationSecuring Your Microsoft Azure Virtual Networks
Securing Your Microsoft Azure Virtual Networks IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up
More informationEthical Hacking and Prevention
Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive
More informationEthical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities
Ethical Hacking and Countermeasures: Web Chapter 3 Web Application Vulnerabilities Objectives After completing this chapter, you should be able to: Understand the architecture of Web applications Understand
More informationHOSTED SECURITY SERVICES
HOSTED SECURITY SERVICES A PROVEN STRATEGY FOR PROTECTING CRITICAL IT INFRASTRUCTURE AND DEVICES Being always-on, always-connected might be good for business, but it creates an ideal climate for cybercriminal
More informationHerding Cats. Carl Brothers, F5 Field Systems Engineer
Herding Cats Carl Brothers, F5 Field Systems Engineer Agenda Introductions Security is easy, right Trivia Protecting your apps, one layer at a time How to survive an Attack Time permitting F5 Networks,
More informationAPWG Global Phishing Survey 2H2010
APWG Global Phishing Survey 2H2010 Rod Rasmussen Greg Aaron June 21, 2011 Goals Study domain names and URLs to: Provide a consistent benchmark for scope of phishing problems worldwide Understand what phishers
More informationETHICAL HACKING & COMPUTER FORENSIC SECURITY
ETHICAL HACKING & COMPUTER FORENSIC SECURITY Course Description From forensic computing to network security, the course covers a wide range of subjects. You will learn about web hacking, password cracking,
More informationIDS: Signature Detection
IDS: Signature Detection Idea: What is bad, is known What is not bad, is good Determines whether a sequence of instructions being executed is known to violate the site security policy Signatures: Descriptions
More informationIxLoad-Attack TM : Network Security Testing
IxLoad-Attack TM : Network Security Testing IxLoad-Attack tests network security appliances to validate that they effectively and accurately block attacks while delivering high end-user quality of experience
More informationCISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline
CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment
More informationThink Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe
Think Oslo 2018 Where Technology Meets Humanity Oslo Felicity March Cyber Resilience - Europe Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity
More informationValidating the Security of the Borderless Infrastructure
SESSION ID: CDS-R01 Validating the Security of the Borderless Infrastructure David DeSanto Director, Product Management Spirent Communications, Inc. @david_desanto Agenda 2 The Adversary The Adversary
More informationAssessing Global Security Threat Levels Bryan Lu, Project Manager / Researcher
I AM NOT A NUMERO! Assessing Global Security Threat Levels Bryan Lu, Project Manager / Researcher 21-23 September 2009 Geneva, Switzerland Numero English: numero or number or No No. or # Spanish: número
More informationSymantec Intelligence Quarterly: Best Practices and Methodologies October - December, 2009
Symantec Intelligence Quarterly: Best Practices and Methodologies White Paper: Symantec Intelligence Quarterly Symantec Intelligence Quarterly: Best Practices and Methodologies Contents Symantec best
More informationHOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL
HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL CONTENTS EXECUTIVE SUMMARY 1 WEB APPLICATION SECURITY CHALLENGES 2 INSIST ON BEST-IN-CLASS CORE CAPABILITIES 3 HARNESSING ARTIFICIAL INTELLIGENCE
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationCourse 831 Certified Ethical Hacker v9
Course 831 Certified Ethical Hacker v9 Duration: 5 days What You Get: CEH v9 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class hours dedicated to
More informationGet BitDefender Client Security 2 Years 30 PCs software suite ]
Get BitDefender Client Security 2 Years 30 PCs software suite ] Description: The foundation of business security The security requirements for any new or existing company no matter how large or small -
More informationCyber Security. Our part of the journey
Cyber Security Our part of the journey The Journey Evolved Built on the past Will be continued Not always perfect Small Steps moving forward The Privileged How to make enemies quickly Ask before acting
More informationDefending Against Known & Unknown Threats
Defending Against Known & Unknown Threats Jack Walsh, New Initiatives & Mobility Programs Manager Copyright 2016 ICSA Labs Introducing ICSA Labs About ICSA Labs We re known for Providing independent 3
More informationActivating Intrusion Prevention Service
Activating Intrusion Prevention Service Intrusion Prevention Service Overview Configuring Intrusion Prevention Service Intrusion Prevention Service Overview Intrusion Prevention Service (IPS) delivers
More informationIBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation
IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:
More informationDesign your network to aid forensics investigation
18th Annual FIRST Conference Design your network to aid forensics investigation Robert B. Sisk, PhD, CISSP Senior Technical Staff Member IBM Baltimore, Maryland USA Master Outline Introduction Incident
More informationIndustry 4.0 = Security 4.0?
Competence Series Industry 4.0 = Security 4.0? 1 IT Security made in Europe Industry 4.0 = Security 4.0? Industry 4.0 is the term used to describe the fourth industrial revolution, the future of industrial
More informationNetwork Security Fundamentals
Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 5 Viruses & Worms, Botnets, Today s Threats Viruses
More informationEliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat
WHITE PAPER Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat Executive Summary Unfortunately, it s a foregone conclusion that no organisation is 100 percent safe
More informationAccess Control and Physical Security Management. Contents are subject to change. For the latest updates visit
Access Control and Physical Security Management Page 1 of 6 Why Attend Today s security landscape requires individuals and businesses to take the threat to safety and security seriously. Safe and secure
More informationProtect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com
Protect Your Endpoint, Keep Your Business Safe. White Paper Exosphere, Inc. getexosphere.com White Paper Today s Threat Landscape Cyber attacks today are increasingly sophisticated and widespread, rendering
More informationIBM Managed Security Services for security intelligence
IBM Global Services April 2005 IBM Managed Security Services for security intelligence By: David Mackey, security intelligence Jeff Lahann, security intelligence Page 2 Contents 2 Foreword 3 Introduction
More informationIC B01: Internet Security Threat Report: How to Stay Protected
IC B01: Internet Security Threat Report: How to Stay Protected Piero DePaoli Director, Product Marketing IC B01: Internet Security Threat Report: How to Stay Protected 1 Topics 1 Targeted Attacks 2 Spam
More informationExploring Protocols and Services on Internet Connected Embedded Devices. The Context of CCTV s as Embedded Devices on an IP Network
Exploring Protocols and Services on Internet Connected Embedded Devices The Context of CCTV s as Embedded Devices on an IP Network Security Rules for the Masses Security products are Secure Existing Technologies
More information