Exploring the Future Potential of AI-Enabled Smartphone Processors
MID_Complex_Network_Security_Alex_de_Graaf_EN
1. Complex Network Security Concepts
Alex de Graaf
Director, Pre-Sales
McAfee, Emerging Markets EMEA
2. Infiltration/Exfiltration – Our Latest
Challenge
"Targeted malware can often bypass
existing protection technologies, and the
resulting data breaches are not detected
until a long time has passed and significant
data exfiltration has occurred.”
Gartner, December 2012
3. Advanced Threat Architecture
Infiltration
Back Door
Phishing or
web driveby. Email
has
attached
malware or
link to
malware
Malware
install
remote
access
toolkits
Recon
Malware
obtains
credentials
to key
systems
and
identifies
valuable
data
Data
Gathering
Data is
acquired
and
staged for
exfiltration
Exfiltration
Data is
exfiltrated
as
encrypted
files via
http/s,
FTP., DNS