SlideShare ist ein Scribd-Unternehmen logo
1 von 58
Computer Network Security For Small to Medium Sized Organizations Speaker: James Dempsey Contact: Sales@itscurrie.com Phone: 209-578-9739
Why are we here?
Getting started Please turn off cell phones Bathrooms
Myth: “I don’t have anything a hacker would be interested in.”
“Money is driving the growth of targeted attacks against financial institutions, enterprises, and governmental agencies” - ComputerWeekly.com
Revenues from cybercrime, at $1 trillion annually, are now exceeding those of drug crime. This was the testimony from AT&T’s Chief Security Officer Edward Amoroso, which he gave to a US Senate Commerce Committee - ComputerWeekly.com
Myth: “Hackers are usually just geeky kids screwing around.”
C2C – Criminal-to-Criminal Criminal #1 creates a crimeware toolkit with easy, step by step instructions… and sells it Criminal #2 buys the toolkit, and uses it to collect private data… and sells it Criminal #3 buys the private data, and exploits it for profit
What is at risk Your money Hackers steal from companies all the time Your data Your identity Once your system has been compromised, you have lost control of your personal information. Your hard earned reputation
MalWare / SpyWare Malware, short for malicious software, is software designed to infiltrate or damage a computer system without the owner's informed consent.  - Wikipedia
It’s all in our heads? Have you been hacked? How does that make your feel…
Dealing With Specifics… How, exactly, can this affect my organization?
The setup… Sign Designs is a well established, responsible local company They work with the Bank of Stockton, a well know and responsible institution They contract with an independent, local computer consultant All employee’s have internet and email access They did not embrace a proactive security/stability maintenance program They have never had any form of network security audit or review
On July 23, 2009, Sign Designs lost nearly $100,000 when cyber-crooks initiated a series of transfers to 17 accomplices at 7 banks around the country. - http://voices.washingtonpost.com/securityfix/2009/09/more_business_banking_victims.html
The Repercussions Employee moral issues – was it an inside job? The FBI is interviewing all employees The FBI confiscates key equipment, causing further business disruption The banks seldom return money stolen from businesses in this fashion If confidential data is stolen as well, the business must report the theft to all affected clients, vendors, and employees
SB-1386 Senate Bill 1386, operative since July 1, 2003, require all businesses to report any loss of confidential data. “a person or business that conducts business in California, that owns or licenses computerized data that includes personal information, as defined, to disclose in specified ways, any breach of the security of the data, as defined, to any resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person.”  Fines of up to $250,000  and/or 5 year prison sentence
Attack Profile #1 Malware specializing in on-line banking hacking
Zeus –Crimeware for sale Zeus is a Trojan “kit” Average black market price:  $700 Very mature with > 70,000 variants
[object Object]
May not disassemble / study the binary code of the bot builder.
Has no right to use the control panel as a means to control other bot nets or use it for any other purpose.
Does not have the right to deliberately send any portion of the product to anti-virus companies and other such institutions.
Commits to give the seller a fee for any update to the product that is not connected with errors in the work, as well as for adding additional functionality.“In cases of violations of the agreement and being detected, the client loses any technical support.  Moreover, the binary code of your bot will be immediately sent to anti-virus companies.”
Zeus – Helps a hacker to: Detect when banking information is being entered View screen shots real-time and remotely control what is shown on the monitor  Steal passwords and other log-in information using advanced key loggers  Encrypt stolen information, then transmit it to the attacker’s servers
Zeus according to Symantec:  http://www.youtube.com/watch?v=CzdBCDPETxk&feature=related
URLZone –More Complex… Checks with a central server for updated instructions, regularly  Watch for HTTPS web traffic  If the Web site matches the banking portal targeted, the malware will capture screenshots from the victim’s computer and send them to a command and control server  http://www.finjan.com/MCRCblog.aspx?EntryId=2345 http://blogs.techrepublic.com.com/security/?p=2464&tag=nl.e036
URLZone –Very specific… When the user confirms the financial transaction, URLZone changes the account number and amount The banking portal receives the transaction information and completes the transfer  URLZone presents transaction information the user expects to avoid suspicion.  As far as the victim knows, the transaction was a success, which it was.  It’s just that the amount of money is most likely different and the money was transferred to a money mule account, not where the victim intended
Attack Profile Crimeware toolkit for “drive-by” download #1 #2 Malware specializing in on-line banking hacking
LuckySploit A webpage is “armed” with LuckySploit It checks to see if visiting computers are missing security patches in: Internet Explorer, FireFox, Opera Adobe Flash, Acrobat Reader Numerous Microsoft vulnerabilities Exploits identified vulnerabilities to deliver the “payload” http://www.finjan.com/MCRCblog.aspx?EntryId=2213
Attack Profile Crimeware toolkit for “drive-by” download #1 #2 #3 A way to trick you into getting to my hacked webpage
Spam + Social Engineering
Spam + Social Engineering
Attack Profile #3 Website armed with  LuckySploit #2 #1 URLZone Trojan Social Engineering
How can you protect yourself Be proactive about software patch management Use business-class anti-virus / anti-malware software Filter your email Deploy a business-class firewall Restrict internet access Use Group Policies to control workstation security A password policy is a must! Understand and secure all remote access points Wireless Access Points (watch for rogues!)
There is a big difference between being Proactive and Reactive
Patch Management Know where you are vulnerable! All Microsoft software – workstations and servers All Mac’s Key 3rd party applications Adobe Acrobat Adobe Flash Player Java iTunes QuickTime
Microsoft Patch Management Manual deployment Very time consuming Difficult to do consistently Automatic deployment – independent workstations Success must be tested monthly using special tools No granular control May impact internet bandwidth of multiple PC’s download simultaneously WSUS Free from Microsoft! All workstations report success failure to a central console You can choose what patches to deploy You can choose to have only the server download the patches Server pushes patches to workstations May take 20-60GB of hard disk space – Use an inexpensive USB drive
3rd Party Applications The secret to success:  You need a plan! Updates can be pushed out through Group Policy Create an update checklist spreadsheet
Antivirus Software The reality… It is intrusive It slows down your computers and network It must be monitored and maintained It occasionally creates compatibility issues There are annual renewal fees … and you can’t live without it.  Period.
Business Class Antivirus Workstation status and licensing can be managed from a central software “console” You don’t need to touch 20 workstations to check status’ Central policies can be “pushed” down from the server IE:  All workstation are to do a full scan once per week, and users aren’t able to cancel the scan You can “Exclude” critical files and directories from virus scans This can help performance significantly, and prevents instability and corruption issues
Business Class Antivirus Scan Policies Real Time Scanning Protecting your system 24/7 Typically scans only the most dangerous file types and locations Scheduled Scanning Typically scans everything, beginning to end Has a performance impact on the workstation Users can be broken into groups with scans occurring at convenient times
Email -A Primary Portal Minimize your exposure by breaking your users into groups Group A – Internal email access only Group B – Can receive email from “outside” the company
Spam Filtering Spam has become a primary delivery point for malicious code Several things to watch for: Hyperlinks that direct you to unknown places on the web Attachments that carry a malicious payload Social Engineering – The art of tricking a human into performing an action or providing information they typically wouldn’t IE:  Critical Microsoft Patch!
Spam Filtering Methods of protection Install spam filter software on each workstation Install spam filter software on your e-mail server Route all company email through a spam filter “appliance” Barracuda Route all email through a spam filter service (a 3rd party) Spam-a-Side Only cleaned emails will be received by the company Lock your firewall down to only receive email from the host
Business Class Firewall
Why simple a home-class firewall isn’t always sufficient First door to your right! Gee, thanks! That was easy… An email server Well then surely you must be a safe secure message from a legitimate source! Where to? Umm… Trusted Network Resources The Cruel, Hard World ( a/k/a: The Internet ) E-Mail  (?) Web Request E-Mail FTP Locked! Locked! A basic firewall “pin holed” to allow public email
A Business Class Firewall Looks Inside the Data Packet Gee, ok… Don’t you trust me? An email server Is that an attachment?  That type isn’t allowed.  It stays at the door. Soon.  Please step behind the privacy screen and hand me those latex gloves… Where to? Umm… *Squeak!* Ok.  I’ll need your name, ID#, shoe size, and a DNA sample. Trusted Network Resources The Cruel, Hard World ( a/k/a: The Internet ) E-Mail  (?) Web Request E-Mail FTP Locked! Locked! A Business-Class firewall “pin holed” to allow public email
Firewalls Oversimplified Three major firewall classes: #1 - Simple home/small bus ($80-$200) Helps to hide you on the internet “Locks the doors” from the public side #2 – Business Class ($450-$900) “Layer 7 protection” – It looks inside the data packets to be sure they aren’t “mal-formed” Strips out inappropriate content (IE:  Dangerous attachments) Includes extra layers of protection Web Blocking Antivirus Boarder Protection #3 – Corporate Class ($1200-$???) Much greater bandwidth The ability to support many branch offices and VPN connections Advanced security, routing, and configuration features
Firewalls – What do you need? Simple firewalls work if you: Have no “in-bound” data traffic Have another way to control internet usage Web blockers don’t just prevent internet abuse… Business Class firewall is appropriate if you: Host Email, public Web Server, or FTP Server Need to control outbound access as well as inbound Have a server and need to control web access based upon Active Directory Group membership
Myth: “Only people who go to ‘bad’ websites get spyware.”
Restricting Web Access Only give access to people who really need it Restrict people to explicitly approved sites Use a Web Blocker Break your users into groups.  IE: Management – Full Access Day Crew – Partial Access Night Crew – Restrict to only approved sites Consider a web usage monitor - Cymphonix
Choosing a Firewall
Password Policies Passwords are the keys to your network Policies are centrally controlled through Group Policy: Password changes – How often? Account Lockout If you strike out 10 times, you’re locked out for 10 minutes Password Complexity
Security is an active part of your company culture… or it isn’t …
There are two ways to learn about network security vulnerabilities: A Trained Professional A Trained Professional - or -
Engaging a Professional Begin with a network audit Clearly define responsibilities Choose an engagement method
Methods of Engagement Reactive “I’ll call for help if I think I’ve been hacked” Scheduled, proactive maintenance Allocates time and resources to address core issues Be sure there is a plan that addresses all issues Work with the consultant!  Ask questions! Managed services A true partnering and aligning of business models

Weitere ähnliche Inhalte

Was ist angesagt?

Null mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul TulaskarNull mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul Tulaskarnullowaspmumbai
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing AttacksRapid7
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsLondon School of Cyber Security
 
e-Commerce: Chapter 6
e-Commerce: Chapter 6e-Commerce: Chapter 6
e-Commerce: Chapter 6annwhyjay
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 
Social engineering
Social engineeringSocial engineering
Social engineeringBola Oduyale
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Newsletter connect - June 2016
Newsletter connect - June 2016Newsletter connect - June 2016
Newsletter connect - June 2016Arish Roy
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...MZERMA Amine
 

Was ist angesagt? (19)

Null mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul TulaskarNull mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul Tulaskar
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
 
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot AttacksHow To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
 
e-Commerce: Chapter 6
e-Commerce: Chapter 6e-Commerce: Chapter 6
e-Commerce: Chapter 6
 
report-final
report-finalreport-final
report-final
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Puna 2015
Puna 2015Puna 2015
Puna 2015
 
7 steps you can take now to protect your data
7 steps you can take now to protect your data7 steps you can take now to protect your data
7 steps you can take now to protect your data
 
Newsletter connect - June 2016
Newsletter connect - June 2016Newsletter connect - June 2016
Newsletter connect - June 2016
 
8. cyber51-case-studies
8. cyber51-case-studies8. cyber51-case-studies
8. cyber51-case-studies
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ransomware 101
Ransomware 101Ransomware 101
Ransomware 101
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
 

Andere mochten auch

Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network securityargh61
 

Andere mochten auch (7)

Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Network security
Network securityNetwork security
Network security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network security
 

Ähnlich wie ITSolutions|Currie Network Security Seminar

Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfarri2009av
 
How to Keep Hackers Out of Your Organisation
How to Keep Hackers Out of Your OrganisationHow to Keep Hackers Out of Your Organisation
How to Keep Hackers Out of Your OrganisationIBM Danmark
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?Tyler Shields
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business NetworkAnindita Ghatak
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxdawitTerefe5
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information SecurityWorldTrade3
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptDiveshK4
 

Ähnlich wie ITSolutions|Currie Network Security Seminar (20)

Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Information security
Information securityInformation security
Information security
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdf
 
How to Keep Hackers Out of Your Organisation
How to Keep Hackers Out of Your OrganisationHow to Keep Hackers Out of Your Organisation
How to Keep Hackers Out of Your Organisation
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
ProjectReport_Finalversion
ProjectReport_FinalversionProjectReport_Finalversion
ProjectReport_Finalversion
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information Security
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
 
Web Security
Web SecurityWeb Security
Web Security
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 

Kürzlich hochgeladen

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Kürzlich hochgeladen (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

ITSolutions|Currie Network Security Seminar

  • 1. Computer Network Security For Small to Medium Sized Organizations Speaker: James Dempsey Contact: Sales@itscurrie.com Phone: 209-578-9739
  • 2. Why are we here?
  • 3. Getting started Please turn off cell phones Bathrooms
  • 4. Myth: “I don’t have anything a hacker would be interested in.”
  • 5. “Money is driving the growth of targeted attacks against financial institutions, enterprises, and governmental agencies” - ComputerWeekly.com
  • 6. Revenues from cybercrime, at $1 trillion annually, are now exceeding those of drug crime. This was the testimony from AT&T’s Chief Security Officer Edward Amoroso, which he gave to a US Senate Commerce Committee - ComputerWeekly.com
  • 7. Myth: “Hackers are usually just geeky kids screwing around.”
  • 8. C2C – Criminal-to-Criminal Criminal #1 creates a crimeware toolkit with easy, step by step instructions… and sells it Criminal #2 buys the toolkit, and uses it to collect private data… and sells it Criminal #3 buys the private data, and exploits it for profit
  • 9. What is at risk Your money Hackers steal from companies all the time Your data Your identity Once your system has been compromised, you have lost control of your personal information. Your hard earned reputation
  • 10. MalWare / SpyWare Malware, short for malicious software, is software designed to infiltrate or damage a computer system without the owner's informed consent. - Wikipedia
  • 11. It’s all in our heads? Have you been hacked? How does that make your feel…
  • 12. Dealing With Specifics… How, exactly, can this affect my organization?
  • 13.
  • 14. The setup… Sign Designs is a well established, responsible local company They work with the Bank of Stockton, a well know and responsible institution They contract with an independent, local computer consultant All employee’s have internet and email access They did not embrace a proactive security/stability maintenance program They have never had any form of network security audit or review
  • 15. On July 23, 2009, Sign Designs lost nearly $100,000 when cyber-crooks initiated a series of transfers to 17 accomplices at 7 banks around the country. - http://voices.washingtonpost.com/securityfix/2009/09/more_business_banking_victims.html
  • 16. The Repercussions Employee moral issues – was it an inside job? The FBI is interviewing all employees The FBI confiscates key equipment, causing further business disruption The banks seldom return money stolen from businesses in this fashion If confidential data is stolen as well, the business must report the theft to all affected clients, vendors, and employees
  • 17. SB-1386 Senate Bill 1386, operative since July 1, 2003, require all businesses to report any loss of confidential data. “a person or business that conducts business in California, that owns or licenses computerized data that includes personal information, as defined, to disclose in specified ways, any breach of the security of the data, as defined, to any resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person.” Fines of up to $250,000 and/or 5 year prison sentence
  • 18. Attack Profile #1 Malware specializing in on-line banking hacking
  • 19. Zeus –Crimeware for sale Zeus is a Trojan “kit” Average black market price: $700 Very mature with > 70,000 variants
  • 20.
  • 21. May not disassemble / study the binary code of the bot builder.
  • 22. Has no right to use the control panel as a means to control other bot nets or use it for any other purpose.
  • 23. Does not have the right to deliberately send any portion of the product to anti-virus companies and other such institutions.
  • 24. Commits to give the seller a fee for any update to the product that is not connected with errors in the work, as well as for adding additional functionality.“In cases of violations of the agreement and being detected, the client loses any technical support. Moreover, the binary code of your bot will be immediately sent to anti-virus companies.”
  • 25. Zeus – Helps a hacker to: Detect when banking information is being entered View screen shots real-time and remotely control what is shown on the monitor Steal passwords and other log-in information using advanced key loggers Encrypt stolen information, then transmit it to the attacker’s servers
  • 26. Zeus according to Symantec: http://www.youtube.com/watch?v=CzdBCDPETxk&feature=related
  • 27. URLZone –More Complex… Checks with a central server for updated instructions, regularly Watch for HTTPS web traffic If the Web site matches the banking portal targeted, the malware will capture screenshots from the victim’s computer and send them to a command and control server http://www.finjan.com/MCRCblog.aspx?EntryId=2345 http://blogs.techrepublic.com.com/security/?p=2464&tag=nl.e036
  • 28. URLZone –Very specific… When the user confirms the financial transaction, URLZone changes the account number and amount The banking portal receives the transaction information and completes the transfer URLZone presents transaction information the user expects to avoid suspicion. As far as the victim knows, the transaction was a success, which it was. It’s just that the amount of money is most likely different and the money was transferred to a money mule account, not where the victim intended
  • 29. Attack Profile Crimeware toolkit for “drive-by” download #1 #2 Malware specializing in on-line banking hacking
  • 30. LuckySploit A webpage is “armed” with LuckySploit It checks to see if visiting computers are missing security patches in: Internet Explorer, FireFox, Opera Adobe Flash, Acrobat Reader Numerous Microsoft vulnerabilities Exploits identified vulnerabilities to deliver the “payload” http://www.finjan.com/MCRCblog.aspx?EntryId=2213
  • 31. Attack Profile Crimeware toolkit for “drive-by” download #1 #2 #3 A way to trick you into getting to my hacked webpage
  • 32. Spam + Social Engineering
  • 33. Spam + Social Engineering
  • 34. Attack Profile #3 Website armed with LuckySploit #2 #1 URLZone Trojan Social Engineering
  • 35. How can you protect yourself Be proactive about software patch management Use business-class anti-virus / anti-malware software Filter your email Deploy a business-class firewall Restrict internet access Use Group Policies to control workstation security A password policy is a must! Understand and secure all remote access points Wireless Access Points (watch for rogues!)
  • 36. There is a big difference between being Proactive and Reactive
  • 37. Patch Management Know where you are vulnerable! All Microsoft software – workstations and servers All Mac’s Key 3rd party applications Adobe Acrobat Adobe Flash Player Java iTunes QuickTime
  • 38. Microsoft Patch Management Manual deployment Very time consuming Difficult to do consistently Automatic deployment – independent workstations Success must be tested monthly using special tools No granular control May impact internet bandwidth of multiple PC’s download simultaneously WSUS Free from Microsoft! All workstations report success failure to a central console You can choose what patches to deploy You can choose to have only the server download the patches Server pushes patches to workstations May take 20-60GB of hard disk space – Use an inexpensive USB drive
  • 39. 3rd Party Applications The secret to success: You need a plan! Updates can be pushed out through Group Policy Create an update checklist spreadsheet
  • 40. Antivirus Software The reality… It is intrusive It slows down your computers and network It must be monitored and maintained It occasionally creates compatibility issues There are annual renewal fees … and you can’t live without it. Period.
  • 41. Business Class Antivirus Workstation status and licensing can be managed from a central software “console” You don’t need to touch 20 workstations to check status’ Central policies can be “pushed” down from the server IE: All workstation are to do a full scan once per week, and users aren’t able to cancel the scan You can “Exclude” critical files and directories from virus scans This can help performance significantly, and prevents instability and corruption issues
  • 42. Business Class Antivirus Scan Policies Real Time Scanning Protecting your system 24/7 Typically scans only the most dangerous file types and locations Scheduled Scanning Typically scans everything, beginning to end Has a performance impact on the workstation Users can be broken into groups with scans occurring at convenient times
  • 43. Email -A Primary Portal Minimize your exposure by breaking your users into groups Group A – Internal email access only Group B – Can receive email from “outside” the company
  • 44. Spam Filtering Spam has become a primary delivery point for malicious code Several things to watch for: Hyperlinks that direct you to unknown places on the web Attachments that carry a malicious payload Social Engineering – The art of tricking a human into performing an action or providing information they typically wouldn’t IE: Critical Microsoft Patch!
  • 45. Spam Filtering Methods of protection Install spam filter software on each workstation Install spam filter software on your e-mail server Route all company email through a spam filter “appliance” Barracuda Route all email through a spam filter service (a 3rd party) Spam-a-Side Only cleaned emails will be received by the company Lock your firewall down to only receive email from the host
  • 47. Why simple a home-class firewall isn’t always sufficient First door to your right! Gee, thanks! That was easy… An email server Well then surely you must be a safe secure message from a legitimate source! Where to? Umm… Trusted Network Resources The Cruel, Hard World ( a/k/a: The Internet ) E-Mail (?) Web Request E-Mail FTP Locked! Locked! A basic firewall “pin holed” to allow public email
  • 48. A Business Class Firewall Looks Inside the Data Packet Gee, ok… Don’t you trust me? An email server Is that an attachment? That type isn’t allowed. It stays at the door. Soon. Please step behind the privacy screen and hand me those latex gloves… Where to? Umm… *Squeak!* Ok. I’ll need your name, ID#, shoe size, and a DNA sample. Trusted Network Resources The Cruel, Hard World ( a/k/a: The Internet ) E-Mail (?) Web Request E-Mail FTP Locked! Locked! A Business-Class firewall “pin holed” to allow public email
  • 49. Firewalls Oversimplified Three major firewall classes: #1 - Simple home/small bus ($80-$200) Helps to hide you on the internet “Locks the doors” from the public side #2 – Business Class ($450-$900) “Layer 7 protection” – It looks inside the data packets to be sure they aren’t “mal-formed” Strips out inappropriate content (IE: Dangerous attachments) Includes extra layers of protection Web Blocking Antivirus Boarder Protection #3 – Corporate Class ($1200-$???) Much greater bandwidth The ability to support many branch offices and VPN connections Advanced security, routing, and configuration features
  • 50. Firewalls – What do you need? Simple firewalls work if you: Have no “in-bound” data traffic Have another way to control internet usage Web blockers don’t just prevent internet abuse… Business Class firewall is appropriate if you: Host Email, public Web Server, or FTP Server Need to control outbound access as well as inbound Have a server and need to control web access based upon Active Directory Group membership
  • 51. Myth: “Only people who go to ‘bad’ websites get spyware.”
  • 52. Restricting Web Access Only give access to people who really need it Restrict people to explicitly approved sites Use a Web Blocker Break your users into groups. IE: Management – Full Access Day Crew – Partial Access Night Crew – Restrict to only approved sites Consider a web usage monitor - Cymphonix
  • 54. Password Policies Passwords are the keys to your network Policies are centrally controlled through Group Policy: Password changes – How often? Account Lockout If you strike out 10 times, you’re locked out for 10 minutes Password Complexity
  • 55. Security is an active part of your company culture… or it isn’t …
  • 56. There are two ways to learn about network security vulnerabilities: A Trained Professional A Trained Professional - or -
  • 57. Engaging a Professional Begin with a network audit Clearly define responsibilities Choose an engagement method
  • 58. Methods of Engagement Reactive “I’ll call for help if I think I’ve been hacked” Scheduled, proactive maintenance Allocates time and resources to address core issues Be sure there is a plan that addresses all issues Work with the consultant! Ask questions! Managed services A true partnering and aligning of business models
  • 59. Several More Security Myths I have a firewall so I’m protected I have virus protection software so I’m OK I can protect myself once and be OK forever My Mac doesn’t have all of these security issues
  • 60. Serious Suggestions Audit your internal network Audit external access Restrict access as much as possible Update everything, proactively, regularly Use strong passwords Implement a proactive maintenance plan Engage a professional
  • 62. Please!!! Please fill out the evaluation form! On the bottom of the evaluation, there is an opportunity to request more info about network security Survey Next seminar topic

Hinweis der Redaktion

  1. Recently, ITSolutions did a poll to understand those issues that most concerned and affected our clients and B-2-B partners. The return rate for our questionnaires was fantastic. I’d like to give a BIG thank you, now, to those who participated. We have a good 50,000’ view of those issues that are impacting our clients, but you are in the trenches, and your perspective is invaluable.The survey included many issue catagories, which respondents rated on a scale from 1 to 5, 5 being the most important. We simply added up the scores. As you can see, Security continues to top the list, followed by spam filtering, an issue that continues to concern responsible organizations both because it wastes the time of businesses most valuable resource, their employees, and because it is an ever increasing vector for network attacks. Proactive network monitoring was next, a very hot topic that will get quite a bit of coverage by the industry and by ITSolutions as a Proactive Maintenance provider. And next came Disaster Recovery, the topic of today’s discussion.