SlideShare ist ein Scribd-Unternehmen logo
1 von 45
Credit Union - DDoS
(Distributed Denial of Service) Attacks?
Virtual Education Session
May 2nd | 4 – 4:45pm
Moderator:KristineWilson
Presenters:BillMurphyandJamesCrifasi
Live Tweet from the event!
@TheRedZoneCIO
Schedule of Events
Learn5PracticalThingsACreditUnionCanDoToPreventAnAttack
4:00p – 4:30p Presentation (If Lucky)
4:30p – 4:45p Q&A
Live Tweet from the event!
@TheRedZoneCIO
President and Founder
• RedZone Technologies
• ThunderDG
• MA DR Solutions
• Beyond Limits Magazine
Keep In Touch With Bill:
@TheRedZoneCIO
CIO Executive Series Group
billm@redzonetech.net
About Bill Murphy
Live Tweet from the event!
@TheRedZoneCIO
About James Crifasi
Live Tweet from the event!
@TheRedZoneCIO
• CTO of RedZone Technologies
• Co-Founder ThunderDG
• Co-Founder MA DR
• University of Maryland Graduate | B.A. Criminology &
Criminal Justice | B.S. Computer Science – Algorithmic
Theory & AI | M.S. Interdisciplinary Management
• Keep In Touch With James: jcrifasi@redzonetech.net
Assessment: IT Architecture and Design
Integration: Security| Disaster Recovery|
Infrastructure
Managed Service Programs
Cloud Brokerage
Live Tweet from the event!
@TheRedZoneCIO
Agenda – Types of attacks To Be Reviewed
1. Pure network attack against the credit union
2. Pure network attack against the ISP router
3. Content DDoS
4. DNS DDoS
5. Random Botnet attack
Live Tweet from the event!
@TheRedZoneCIO
Agenda – Questions To Be Answered
• What does it mean?
• What are your zero-day protection options?
• What to check on your security products?
• How to enable global IP protection?
• How do I address potential fraud communication in
advance?
• What are some vendor solutions?
Live Tweet from the event!
@TheRedZoneCIO
Set The Stage
Live Tweet from the event!
@TheRedZoneCIO
Insidious Plots
.
Live Tweet from the event!
@TheRedZoneCIO
.
Live Tweet from the event!
@TheRedZoneCIO
Insidious Plots
Source: InformationWeek.com
.
Live Tweet from the event!
@TheRedZoneCIO
Insidious Plots
Source: DarkReading.com
Insidious Plots
.
Live Tweet from the event!
@TheRedZoneCIO
Source: RSA
What Do They Want?
Live Tweet from the event!
@TheRedZoneCIO
“Their tactics have been succeeding. They will be back for
more because they are getting what they want.”
- Avivah Litan, a Gartner analyst who tracks DDoS.
CU Times
1. Primary objective appears to be to create uncertainties
about the reliability and dependability of the United
States’ financial system and knock many big banks off line
– mission accomplished.
2. Headlines
What Do They Want?
.
Live Tweet from the event!
@TheRedZoneCIO
Source: RSA
What Does It Mean?
• Being down
• Unable to update members on situation
• Greater risk of attacks on members (Phishing)
Live Tweet from the event!
@TheRedZoneCIO
Source: Tosh.ComedyCentral.com
Our Philosophy – Be Proactive
.
Live Tweet from the event!
@TheRedZoneCIOSource: Google Images
Whack-A-Mole? Reactive!
Live Tweet from the event!
@TheRedZoneCIO
Source: Google Images
Security When Under The Gun
.
Live Tweet from the event!
@TheRedZoneCIOSource: Google Images
Our Approach When Time Is Of the Essence
.
Live Tweet from the event!
@TheRedZoneCIO
• Review critical network components
• Communication with members
• Let board know there are no guarantees
How Can a Credit Union prepare and respond
during an attack?
An attack can be from hours to days…
Three Phases Are Needed
1. Pre-Attack Phase –
• Readying for an attack
• Securing mitigation solutions, deploying appropriate security
systems, etc.
2. During the Attack Phase
• Assemble the required manpower and expertise
• Considering that you may only experience a few attacks per year
3. Post-Attack Phase
• Conducting forensics, drawing conclusions and improving for the next
attack
• Search for additional competencies externally - from security experts,
vertical alliances, or government services.
• On-demand service Live Tweet from the event!
@TheRedZoneCIO
Our Approach When Not Under Gun
Logic | Assessment | Portfolio Investment
Live Tweet from the event!
@TheRedZoneCIO
• Review Security Portfolio
• Develop 24 month investment roadmap
• Identify Gaps
• Remediate Gaps
• Let Board know there are no guarantees
**Don’t make it easy for them (attackers)
Security Scoreboard
Live Tweet from the event!
@TheRedZoneCIO
Source: RedZone Technologies
Client Integrity
Intelligent Perimeters
Identity Access
Control
Enterprise Single
Sign On
Provisioning/
Deprovisioning
Authentication
Authorization & Roles
Directory - Foundation
Multi-year Security, Identity and Privacy Strategy
(SIP)
Compliance
Requirements
PC firewalls
USB Mgmt
Laptop Mgmt
Email Encryption
Firewalls
UTM devices
IDP/IDS
SPAM Filters
VPNs
SSL/VPN
Web Mail
Two factor
Authentication
Biometrics
Key fob (two factor)
Secure Password
Management and
Building access Mgmt
through anAppliance or
Application rewriting
Single Directory with
process and system ‘tie-
ins’
Federation
Strategic Creation of
Roles based on job
function, not
individualized on a per
user basis.
Microsoft AD, Novell,
Open LDAP, etc
M
O
N
I
T
O
R
L
O
G
G
N
G
R
E
P
O
R
T
I
N
G
Live Tweet from the event!
@TheRedZoneCIOSource: RedZone Technologies
PURE POWER IS BIG ENABLER
Live Tweet from the event!
@TheRedZoneCIO
• Attacks reach 40+ gigabits/second
• Attacker only needs 2,000+ servers
• Targets have to invest substantial resources to defend
• Reflective DNS attacks still major “weapon”
• Tactics have adapted to counter measures
• Attacks are more intelligent and deadly
Source: RSA
Pure Network Attack Against the Credit Union
Live Tweet from the event!
@TheRedZoneCIO
THE CU
Server (Any)
Source: RSA
Pure Network Attack Against the ISP Router
Live Tweet from the event!
@TheRedZoneCIO
The droidguy.com
ISP Router
CU Security Gear
Source: RSA
Content DDoS
Live Tweet from the event!
@TheRedZoneCIO
Normal: ask for one file and wait for answer
DDoS: ask for hundreds of files and ignore answer
EXAMPLE 1
EXAMPLE 2
Source: RSA
Content DDoS
Live Tweet from the event!
@TheRedZoneCIO
One example of content DDoS is using the servers SSL certificate against it.
Source: Radware
DNS DDoS (Amplification)
Live Tweet from the event!
@TheRedZoneCIO
CU Members
Source: RSA
Live Tweet from the event!
@TheRedZoneCIO
Random Botnet
Credit Union
Source: RSA
What To Check
• Firewall – Basic DDoS Network Protection
• Load Balancers – Network DDoS Protection
• ISP Router – does it answer to the internet? (do you let
people ping?)
• Where is your DNS hosted? i.e. On a single server, with
the ISP, self hosted behind security (best), secure
cloud hosted (best)
• IDS/IPS and Security Services at the edge of your
network
Live Tweet from the event!
@TheRedZoneCIO
What To Check
Live Tweet from the event!
@TheRedZoneCIOUlrich RSA
Defense
• Block DNS responses from
servers that don’t need to
see them
• Only answer queries for
which server is authoritative
• Limit access to recursive
name servers to internal
users
Offense
• Attacker uses queries for
which server is authoritative
• Attacker compromises
servers with substantial
bandwidth
• Use of “ANY” queries
• Use of EDN0
Vendor Options
Live Tweet from the event!
@TheRedZoneCIO
Live Tweet from the event!
@TheRedZoneCIO
Source: Blue Coat
Live Tweet from the event!
@TheRedZoneCIO
Source: RSA
Live Tweet from the event!
@TheRedZoneCIO
The Dell SonicWALL Threats Research Team
discovered a new Trojan spreading through
drive-by downloads from malicious links.
The Neglemir Trojan was found reporting to a
Botnet infrastructure and performing DDOS
(Distributed Denial of Service) attacks on
selected targets in China.
During our analysis, we found it targeting
various servers belonging to China Telecom as
well as websites selling tools for The Legend of
Mir, an online multiplayer roleplaying game.
• Web Application Firewalling – Content DDoS
• NSA UTM protection – Network DDoS
• Spam Filtering – Phishing Relevance
Source: Dell
Live Tweet from the event!
@TheRedZoneCIO
A new malware threat for the Mac, called “Pintsized,” attempts to set up a
secure connection for a remote hacker to connect through and grab private
information.
This backdoor Trojan can be used to conduct distributed denial of service
(DDoS) attacks, or it can be used to install additional Trojans or other forms of
malicious software. The Trojan stays hidden by disguising itself as a file that is
used for networked printers in Mac OS X.
This tactic conceals the Trojan and makes a monitor think that a printer is
seeking access to the network, thus evading traditional signature-based
detection systems. http://alrt.co/15ekmXW
Takeaway: Distributed denial-of-service attacks (DDOS) can be minimized or
even completely mitigated by a properly planned Web security infrastructure
consisting of global DNS as well as Web application firewalls.
• Web Security Monitor
• Threat Manager
Source: AlertLogic
In Summary - Plan
Live Tweet from the event!
@TheRedZoneCIO
Source: Google Images
Upcoming Events
Live Tweet from the event!
@TheRedZoneCIO
BYOD | MDM | Mobile Policy Management | Compliance | Advanced Threats
(APTs) | Security Portfolio Investment Risk
In this symposium learning event, Credit Union IT Chiefs will learn to Go
Hunting for Malware & Crimeware. We will cover 15 major areas of an IT
Security and Infrastructure Best Practices program. Some highlights of the
learning and education will be:
• Centralized deployment of applications and data
• BYOD, MDM and Mobility
• Perform Compliance functions with ease.
• Increase Security effectiveness, management, and auditing on a tight
budget
• Advanced Threat Education on APTs
Wednesday, June 12th from 11:30am to 5:00pm
Eggspectations in Columbia
Security Scoreboard
Live Tweet from the event!
@TheRedZoneCIO
Source: RedZone Technologies
Live Tweet from the event!
@TheRedZoneCIO
Pyramid of Networking Success –
Assessment Foundation
BONES
IPAddressing, Routers, and Switches
MUSCLES
NOS Services (DHCP, WINS, and DNS)
BRAIN
The Windows Domain
Active Directory
Security Edge to Core
NOS
Networking
And
Name Resolution
Foundation Network
Services
Desktop and Server
Management
Compliance, Risk Mgmt,
Monitoring, WAN QoS,
Reporting
Data Protection,
Backup and Recovery
Source: RedZone Technologies
RZ Assessment
• RedZone will assess your risk
• Examine a number of factors
• Score you based on those factors (RZ Scoreboard)
• Better to be proactive and assess now to find potential
weaknesses than to be reactive after you’ve already
been hacked
Live Tweet from the event!
@TheRedZoneCIO
Security Scoreboard
Live Tweet from the event!
@TheRedZoneCIO
Source: RedZone Technologies
Summary
• Review zero-day protection options? Check your
current vendors or vendors on following page
• What are your BotNet IP options? Check your current
vendors or vendors on following page
• How to enable Global IP Filter protection? Check your
current vendors or vendors on following page
• How do I alert fraud communication in advance?
• What are some vendor product options for advanced
content security?
Live Tweet from the event!
@TheRedZoneCIO
Q&A
Live Tweet from the event!
@TheRedZoneCIO

Weitere ähnliche Inhalte

Was ist angesagt?

Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attackschris zlatis
 
DDoS Attack and Mitigation
DDoS Attack and MitigationDDoS Attack and Mitigation
DDoS Attack and MitigationDevang Badrakiya
 
Ddos- distributed denial of service
Ddos- distributed denial of service Ddos- distributed denial of service
Ddos- distributed denial of service laxmi chandolia
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddoskalyan kumar
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionAPNIC
 
Ddos and mitigation methods.pptx
Ddos and mitigation methods.pptxDdos and mitigation methods.pptx
Ddos and mitigation methods.pptxOzkan E
 
DoS Attack - Incident Handling
DoS Attack - Incident HandlingDoS Attack - Incident Handling
DoS Attack - Incident HandlingMarcelo Silva
 
10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques10 DDoS Mitigation Techniques
10 DDoS Mitigation TechniquesIntruGuard
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksSecurity Session
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Gaurav Sharma
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackKaustubh Padwad
 
Honeypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat CommunityHoneypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat Communityamiable_indian
 

Was ist angesagt? (20)

DDoS Attack
DDoS AttackDDoS Attack
DDoS Attack
 
DDoS-bdNOG
DDoS-bdNOGDDoS-bdNOG
DDoS-bdNOG
 
Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attacks
 
DDoS Attack and Mitigation
DDoS Attack and MitigationDDoS Attack and Mitigation
DDoS Attack and Mitigation
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
Ddos- distributed denial of service
Ddos- distributed denial of service Ddos- distributed denial of service
Ddos- distributed denial of service
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
 
Ddos
DdosDdos
Ddos
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
DDos
DDosDDos
DDos
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
 
Ddos and mitigation methods.pptx
Ddos and mitigation methods.pptxDdos and mitigation methods.pptx
Ddos and mitigation methods.pptx
 
Dos n d dos
Dos n d dosDos n d dos
Dos n d dos
 
DoS Attack - Incident Handling
DoS Attack - Incident HandlingDoS Attack - Incident Handling
DoS Attack - Incident Handling
 
10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacks
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
 
Denail of Service
Denail of ServiceDenail of Service
Denail of Service
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Honeypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat CommunityHoneypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat Community
 

Andere mochten auch

Denial Of Service Attacks (1)
Denial Of Service Attacks (1)Denial Of Service Attacks (1)
Denial Of Service Attacks (1)Waheb Samaraie
 
Are Distributed Denial-of-Service attacks a form of Civil Disobedience Online?
Are Distributed Denial-of-Service attacks a form of Civil Disobedience Online?Are Distributed Denial-of-Service attacks a form of Civil Disobedience Online?
Are Distributed Denial-of-Service attacks a form of Civil Disobedience Online?Jan-Peter Kleinhans
 
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)Manoj Kumar
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Kuniyasu Suzaki
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed Great Bay Software
 
The security of SAAS and private cloud
The security of SAAS and private cloudThe security of SAAS and private cloud
The security of SAAS and private cloudAzure Group
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)ClubHack
 
Trying to bottle the cloud forensic challenges with cloud computing
Trying to bottle the cloud   forensic challenges with cloud computingTrying to bottle the cloud   forensic challenges with cloud computing
Trying to bottle the cloud forensic challenges with cloud computingBrent Muir
 
Cloud Forensics
Cloud ForensicsCloud Forensics
Cloud Forensicssdavis532
 
2017 03-01-forensics 1488330715
2017 03-01-forensics 14883307152017 03-01-forensics 1488330715
2017 03-01-forensics 1488330715APNIC
 
(130928) #fitalk cloud storage forensics - dropbox
(130928) #fitalk   cloud storage forensics - dropbox(130928) #fitalk   cloud storage forensics - dropbox
(130928) #fitalk cloud storage forensics - dropboxINSIGHT FORENSIC
 
12Nov13 Webinar: Big Data Analysis with Teradata and Revolution Analytics
12Nov13 Webinar: Big Data Analysis with Teradata and Revolution Analytics12Nov13 Webinar: Big Data Analysis with Teradata and Revolution Analytics
12Nov13 Webinar: Big Data Analysis with Teradata and Revolution AnalyticsRevolution Analytics
 
How IoT Is Breaking The Internet
How IoT Is Breaking The InternetHow IoT Is Breaking The Internet
How IoT Is Breaking The InternetCarl J. Levine
 
Assessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsAssessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsDigital Bond
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Positive Hack Days
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeAPNIC
 

Andere mochten auch (20)

Denial Of Service Attacks (1)
Denial Of Service Attacks (1)Denial Of Service Attacks (1)
Denial Of Service Attacks (1)
 
Are Distributed Denial-of-Service attacks a form of Civil Disobedience Online?
Are Distributed Denial-of-Service attacks a form of Civil Disobedience Online?Are Distributed Denial-of-Service attacks a form of Civil Disobedience Online?
Are Distributed Denial-of-Service attacks a form of Civil Disobedience Online?
 
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
 
The Cloud: Privacy and Forensics
The Cloud: Privacy and ForensicsThe Cloud: Privacy and Forensics
The Cloud: Privacy and Forensics
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
The security of SAAS and private cloud
The security of SAAS and private cloudThe security of SAAS and private cloud
The security of SAAS and private cloud
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
 
Trying to bottle the cloud forensic challenges with cloud computing
Trying to bottle the cloud   forensic challenges with cloud computingTrying to bottle the cloud   forensic challenges with cloud computing
Trying to bottle the cloud forensic challenges with cloud computing
 
Cloud Forensics
Cloud ForensicsCloud Forensics
Cloud Forensics
 
2017 03-01-forensics 1488330715
2017 03-01-forensics 14883307152017 03-01-forensics 1488330715
2017 03-01-forensics 1488330715
 
(130928) #fitalk cloud storage forensics - dropbox
(130928) #fitalk   cloud storage forensics - dropbox(130928) #fitalk   cloud storage forensics - dropbox
(130928) #fitalk cloud storage forensics - dropbox
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
12Nov13 Webinar: Big Data Analysis with Teradata and Revolution Analytics
12Nov13 Webinar: Big Data Analysis with Teradata and Revolution Analytics12Nov13 Webinar: Big Data Analysis with Teradata and Revolution Analytics
12Nov13 Webinar: Big Data Analysis with Teradata and Revolution Analytics
 
How IoT Is Breaking The Internet
How IoT Is Breaking The InternetHow IoT Is Breaking The Internet
How IoT Is Breaking The Internet
 
Assessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsAssessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS Solutions
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
 
IBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaSIBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaS
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
 

Ähnlich wie 5 Ways To Fight A DDoS Attack

5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)RedZone Technologies
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to InfrastructureJorge Orchilles
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]Radware
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterpriseJason Bloomberg
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threatsZscaler
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsChristopher Frenz
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementBeyondTrust
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats Jim Kaplan CIA CFE
 
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016TierPoint
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldSafeNet
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRIZivaro Inc
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bankshreemala1
 
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk ManagementProtect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk ManagementDevOps.com
 

Ähnlich wie 5 Ways To Fight A DDoS Attack (20)

5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to Infrastructure
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats
 
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
Novinky F5
Novinky F5Novinky F5
Novinky F5
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative World
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
 
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk ManagementProtect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
 
Web Attack Survival Guide
Web Attack Survival GuideWeb Attack Survival Guide
Web Attack Survival Guide
 
NetWitness
NetWitnessNetWitness
NetWitness
 

Mehr von RedZone Technologies

RedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and TransformationRedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and TransformationRedZone Technologies
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementRedZone Technologies
 
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...RedZone Technologies
 
Modern Threat Architecture Landscape: How to Build an Actionable SIEM
Modern Threat Architecture Landscape: How to Build an Actionable SIEMModern Threat Architecture Landscape: How to Build an Actionable SIEM
Modern Threat Architecture Landscape: How to Build an Actionable SIEMRedZone Technologies
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipRedZone Technologies
 
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...RedZone Technologies
 
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...RedZone Technologies
 
RedZoneCIO Security Scoreboard Profile Presentation
RedZoneCIO Security Scoreboard Profile PresentationRedZoneCIO Security Scoreboard Profile Presentation
RedZoneCIO Security Scoreboard Profile PresentationRedZone Technologies
 
Mobile Device Management Policy Workshop Part 2 | CIO Executive Series
Mobile Device Management Policy Workshop Part 2 | CIO Executive SeriesMobile Device Management Policy Workshop Part 2 | CIO Executive Series
Mobile Device Management Policy Workshop Part 2 | CIO Executive SeriesRedZone Technologies
 
Move your Data Center to the Cloud
Move your Data Center to the CloudMove your Data Center to the Cloud
Move your Data Center to the CloudRedZone Technologies
 

Mehr von RedZone Technologies (12)

RedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and TransformationRedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and Transformation
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
 
Modern Threat Architecture Landscape: How to Build an Actionable SIEM
Modern Threat Architecture Landscape: How to Build an Actionable SIEMModern Threat Architecture Landscape: How to Build an Actionable SIEM
Modern Threat Architecture Landscape: How to Build an Actionable SIEM
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and Leadership
 
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
 
CIO Scoreboard Overview
CIO Scoreboard OverviewCIO Scoreboard Overview
CIO Scoreboard Overview
 
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
 
RedZoneCIO Security Scoreboard Profile Presentation
RedZoneCIO Security Scoreboard Profile PresentationRedZoneCIO Security Scoreboard Profile Presentation
RedZoneCIO Security Scoreboard Profile Presentation
 
RedZone Testimonials
RedZone TestimonialsRedZone Testimonials
RedZone Testimonials
 
Mobile Device Management Policy Workshop Part 2 | CIO Executive Series
Mobile Device Management Policy Workshop Part 2 | CIO Executive SeriesMobile Device Management Policy Workshop Part 2 | CIO Executive Series
Mobile Device Management Policy Workshop Part 2 | CIO Executive Series
 
Move your Data Center to the Cloud
Move your Data Center to the CloudMove your Data Center to the Cloud
Move your Data Center to the Cloud
 

Kürzlich hochgeladen

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Kürzlich hochgeladen (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

5 Ways To Fight A DDoS Attack

  • 1. Credit Union - DDoS (Distributed Denial of Service) Attacks? Virtual Education Session May 2nd | 4 – 4:45pm Moderator:KristineWilson Presenters:BillMurphyandJamesCrifasi Live Tweet from the event! @TheRedZoneCIO
  • 2. Schedule of Events Learn5PracticalThingsACreditUnionCanDoToPreventAnAttack 4:00p – 4:30p Presentation (If Lucky) 4:30p – 4:45p Q&A Live Tweet from the event! @TheRedZoneCIO
  • 3. President and Founder • RedZone Technologies • ThunderDG • MA DR Solutions • Beyond Limits Magazine Keep In Touch With Bill: @TheRedZoneCIO CIO Executive Series Group billm@redzonetech.net About Bill Murphy Live Tweet from the event! @TheRedZoneCIO
  • 4. About James Crifasi Live Tweet from the event! @TheRedZoneCIO • CTO of RedZone Technologies • Co-Founder ThunderDG • Co-Founder MA DR • University of Maryland Graduate | B.A. Criminology & Criminal Justice | B.S. Computer Science – Algorithmic Theory & AI | M.S. Interdisciplinary Management • Keep In Touch With James: jcrifasi@redzonetech.net
  • 5. Assessment: IT Architecture and Design Integration: Security| Disaster Recovery| Infrastructure Managed Service Programs Cloud Brokerage Live Tweet from the event! @TheRedZoneCIO
  • 6. Agenda – Types of attacks To Be Reviewed 1. Pure network attack against the credit union 2. Pure network attack against the ISP router 3. Content DDoS 4. DNS DDoS 5. Random Botnet attack Live Tweet from the event! @TheRedZoneCIO
  • 7. Agenda – Questions To Be Answered • What does it mean? • What are your zero-day protection options? • What to check on your security products? • How to enable global IP protection? • How do I address potential fraud communication in advance? • What are some vendor solutions? Live Tweet from the event! @TheRedZoneCIO
  • 8. Set The Stage Live Tweet from the event! @TheRedZoneCIO
  • 9. Insidious Plots . Live Tweet from the event! @TheRedZoneCIO
  • 10. . Live Tweet from the event! @TheRedZoneCIO Insidious Plots Source: InformationWeek.com
  • 11. . Live Tweet from the event! @TheRedZoneCIO Insidious Plots Source: DarkReading.com
  • 12. Insidious Plots . Live Tweet from the event! @TheRedZoneCIO Source: RSA
  • 13. What Do They Want? Live Tweet from the event! @TheRedZoneCIO “Their tactics have been succeeding. They will be back for more because they are getting what they want.” - Avivah Litan, a Gartner analyst who tracks DDoS. CU Times 1. Primary objective appears to be to create uncertainties about the reliability and dependability of the United States’ financial system and knock many big banks off line – mission accomplished. 2. Headlines
  • 14. What Do They Want? . Live Tweet from the event! @TheRedZoneCIO Source: RSA
  • 15. What Does It Mean? • Being down • Unable to update members on situation • Greater risk of attacks on members (Phishing) Live Tweet from the event! @TheRedZoneCIO Source: Tosh.ComedyCentral.com
  • 16. Our Philosophy – Be Proactive . Live Tweet from the event! @TheRedZoneCIOSource: Google Images
  • 17. Whack-A-Mole? Reactive! Live Tweet from the event! @TheRedZoneCIO Source: Google Images
  • 18. Security When Under The Gun . Live Tweet from the event! @TheRedZoneCIOSource: Google Images
  • 19. Our Approach When Time Is Of the Essence . Live Tweet from the event! @TheRedZoneCIO • Review critical network components • Communication with members • Let board know there are no guarantees
  • 20. How Can a Credit Union prepare and respond during an attack? An attack can be from hours to days… Three Phases Are Needed 1. Pre-Attack Phase – • Readying for an attack • Securing mitigation solutions, deploying appropriate security systems, etc. 2. During the Attack Phase • Assemble the required manpower and expertise • Considering that you may only experience a few attacks per year 3. Post-Attack Phase • Conducting forensics, drawing conclusions and improving for the next attack • Search for additional competencies externally - from security experts, vertical alliances, or government services. • On-demand service Live Tweet from the event! @TheRedZoneCIO
  • 21. Our Approach When Not Under Gun Logic | Assessment | Portfolio Investment Live Tweet from the event! @TheRedZoneCIO • Review Security Portfolio • Develop 24 month investment roadmap • Identify Gaps • Remediate Gaps • Let Board know there are no guarantees **Don’t make it easy for them (attackers)
  • 22. Security Scoreboard Live Tweet from the event! @TheRedZoneCIO Source: RedZone Technologies
  • 23. Client Integrity Intelligent Perimeters Identity Access Control Enterprise Single Sign On Provisioning/ Deprovisioning Authentication Authorization & Roles Directory - Foundation Multi-year Security, Identity and Privacy Strategy (SIP) Compliance Requirements PC firewalls USB Mgmt Laptop Mgmt Email Encryption Firewalls UTM devices IDP/IDS SPAM Filters VPNs SSL/VPN Web Mail Two factor Authentication Biometrics Key fob (two factor) Secure Password Management and Building access Mgmt through anAppliance or Application rewriting Single Directory with process and system ‘tie- ins’ Federation Strategic Creation of Roles based on job function, not individualized on a per user basis. Microsoft AD, Novell, Open LDAP, etc M O N I T O R L O G G N G R E P O R T I N G Live Tweet from the event! @TheRedZoneCIOSource: RedZone Technologies
  • 24. PURE POWER IS BIG ENABLER Live Tweet from the event! @TheRedZoneCIO • Attacks reach 40+ gigabits/second • Attacker only needs 2,000+ servers • Targets have to invest substantial resources to defend • Reflective DNS attacks still major “weapon” • Tactics have adapted to counter measures • Attacks are more intelligent and deadly Source: RSA
  • 25. Pure Network Attack Against the Credit Union Live Tweet from the event! @TheRedZoneCIO THE CU Server (Any) Source: RSA
  • 26. Pure Network Attack Against the ISP Router Live Tweet from the event! @TheRedZoneCIO The droidguy.com ISP Router CU Security Gear Source: RSA
  • 27. Content DDoS Live Tweet from the event! @TheRedZoneCIO Normal: ask for one file and wait for answer DDoS: ask for hundreds of files and ignore answer EXAMPLE 1 EXAMPLE 2 Source: RSA
  • 28. Content DDoS Live Tweet from the event! @TheRedZoneCIO One example of content DDoS is using the servers SSL certificate against it. Source: Radware
  • 29. DNS DDoS (Amplification) Live Tweet from the event! @TheRedZoneCIO CU Members Source: RSA
  • 30. Live Tweet from the event! @TheRedZoneCIO Random Botnet Credit Union Source: RSA
  • 31. What To Check • Firewall – Basic DDoS Network Protection • Load Balancers – Network DDoS Protection • ISP Router – does it answer to the internet? (do you let people ping?) • Where is your DNS hosted? i.e. On a single server, with the ISP, self hosted behind security (best), secure cloud hosted (best) • IDS/IPS and Security Services at the edge of your network Live Tweet from the event! @TheRedZoneCIO
  • 32. What To Check Live Tweet from the event! @TheRedZoneCIOUlrich RSA Defense • Block DNS responses from servers that don’t need to see them • Only answer queries for which server is authoritative • Limit access to recursive name servers to internal users Offense • Attacker uses queries for which server is authoritative • Attacker compromises servers with substantial bandwidth • Use of “ANY” queries • Use of EDN0
  • 33. Vendor Options Live Tweet from the event! @TheRedZoneCIO
  • 34. Live Tweet from the event! @TheRedZoneCIO Source: Blue Coat
  • 35. Live Tweet from the event! @TheRedZoneCIO Source: RSA
  • 36. Live Tweet from the event! @TheRedZoneCIO The Dell SonicWALL Threats Research Team discovered a new Trojan spreading through drive-by downloads from malicious links. The Neglemir Trojan was found reporting to a Botnet infrastructure and performing DDOS (Distributed Denial of Service) attacks on selected targets in China. During our analysis, we found it targeting various servers belonging to China Telecom as well as websites selling tools for The Legend of Mir, an online multiplayer roleplaying game. • Web Application Firewalling – Content DDoS • NSA UTM protection – Network DDoS • Spam Filtering – Phishing Relevance Source: Dell
  • 37. Live Tweet from the event! @TheRedZoneCIO A new malware threat for the Mac, called “Pintsized,” attempts to set up a secure connection for a remote hacker to connect through and grab private information. This backdoor Trojan can be used to conduct distributed denial of service (DDoS) attacks, or it can be used to install additional Trojans or other forms of malicious software. The Trojan stays hidden by disguising itself as a file that is used for networked printers in Mac OS X. This tactic conceals the Trojan and makes a monitor think that a printer is seeking access to the network, thus evading traditional signature-based detection systems. http://alrt.co/15ekmXW Takeaway: Distributed denial-of-service attacks (DDOS) can be minimized or even completely mitigated by a properly planned Web security infrastructure consisting of global DNS as well as Web application firewalls. • Web Security Monitor • Threat Manager Source: AlertLogic
  • 38. In Summary - Plan Live Tweet from the event! @TheRedZoneCIO Source: Google Images
  • 39. Upcoming Events Live Tweet from the event! @TheRedZoneCIO BYOD | MDM | Mobile Policy Management | Compliance | Advanced Threats (APTs) | Security Portfolio Investment Risk In this symposium learning event, Credit Union IT Chiefs will learn to Go Hunting for Malware & Crimeware. We will cover 15 major areas of an IT Security and Infrastructure Best Practices program. Some highlights of the learning and education will be: • Centralized deployment of applications and data • BYOD, MDM and Mobility • Perform Compliance functions with ease. • Increase Security effectiveness, management, and auditing on a tight budget • Advanced Threat Education on APTs Wednesday, June 12th from 11:30am to 5:00pm Eggspectations in Columbia
  • 40. Security Scoreboard Live Tweet from the event! @TheRedZoneCIO Source: RedZone Technologies
  • 41. Live Tweet from the event! @TheRedZoneCIO Pyramid of Networking Success – Assessment Foundation BONES IPAddressing, Routers, and Switches MUSCLES NOS Services (DHCP, WINS, and DNS) BRAIN The Windows Domain Active Directory Security Edge to Core NOS Networking And Name Resolution Foundation Network Services Desktop and Server Management Compliance, Risk Mgmt, Monitoring, WAN QoS, Reporting Data Protection, Backup and Recovery Source: RedZone Technologies
  • 42. RZ Assessment • RedZone will assess your risk • Examine a number of factors • Score you based on those factors (RZ Scoreboard) • Better to be proactive and assess now to find potential weaknesses than to be reactive after you’ve already been hacked Live Tweet from the event! @TheRedZoneCIO
  • 43. Security Scoreboard Live Tweet from the event! @TheRedZoneCIO Source: RedZone Technologies
  • 44. Summary • Review zero-day protection options? Check your current vendors or vendors on following page • What are your BotNet IP options? Check your current vendors or vendors on following page • How to enable Global IP Filter protection? Check your current vendors or vendors on following page • How do I alert fraud communication in advance? • What are some vendor product options for advanced content security? Live Tweet from the event! @TheRedZoneCIO
  • 45. Q&A Live Tweet from the event! @TheRedZoneCIO