SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Preparing
for future
attacks
www.emea.symantec.com/cyber-resilience
More Focus, Less Risk.
Solution Brief:
Implementing
the right security
strategy now
Solution brief: implementing the right security strategy now
Introduction
Recent malware incidents have
shown how costly and damaging
cyber attacks can be.
The Stuxnet worm is believed to have significantly affected Iranian nuclear
processing, and was widely considered to be the first operational cyber
weapon1. Shamoon was able to compromise and incapacitate 30,000 work
stations within an oil producing organisation2. Another targeted malware
attack against a public corporation resulted in the company declaring a $66
million loss relating to the attack3.
Such attacks may not necessarily be successful, but when attackers do find
their way inside an organisation’s systems, a swift, well-prepared response
can quickly minimise damage and restore systems before significant harm
can be caused.
In order to prepare such a response, organisations must understand how
attacks can progress, develop a counteractive strategy, decide who will carry
out which actions and then practise and refine the plan.
www.emea.symantec.com/cyber-resilience
Understanding attacks
An attack starts with a point of ingress to the organisation. This may be an
unsecured system that hackers are able to access, a vulnerable machine on
which malware is executed, or a user who has been duped into installing
malware. This point of ingress may then be exploited to spread attacks through
the network, either by hacking other systems or by using malware to exploit
unpatched system vulnerabilities and install itself on other systems.
Once a system is compromised, attackers may install further malware, or
take control of the system and send commands for execution. Attackers may
seek to exfiltrate information such as confidential files or usernames and
passwords held on the system.
Protecting against attacks
Most attacks can be defended against with the implementation of basic
information security practices. The Australian Department of Defence found
that implementing four mitigation strategies was sufficient to prevent 85%
of targeted attacks4. The British Government has advised that focusing on
ten key areas is sufficient to counteract most cyber threats5.
As a minimum, an organisation should ensure that network traffic and systems
are scanned for malware and that logs of system and network activity are kept,
to be used for forensic analysis if necessary. Additionally, regular backups are
vital to ensure that damaged systems can be restored to a normal working state.
Adequate information security defences reduce the likelihood of attacks
succeeding. However, behind every cyber attack headline is an organisation
that believed its defences were sufficient. Major incidents do occur and need
to be planned for, in order to reduce disruption to the business, minimise
harm and reduce the time required for recovery.
Solution brief: implementing the right security strategy now
Ingress Expand attack Exfiltrate attack
Attacker
User
Attacker
Issue commands
www.emea.symantec.com/cyber-resilience
These actions may impact on users and services throughout the
organisation. Notably, they may effect how users, and indeed the response
team, usually communicate. Therefore, consideration needs to be given to
how communication will be maintained and how users and executives will
be kept up-to-date with the progress of incident resolution.
Forensic analysis should be used, not only to help identify if data has been
compromised, but also to assess how attackers initially penetrated the
systems. The vulnerability that was exploited to gain access needs to be
addressed as a priority to prevent the attack being repeated as soon as it has
been resolved. The collection and preservation of forensic information may
also help in identifying and prosecuting those responsible for the attack.
Solution brief: implementing the right security strategy now
Preparing for incidents
Organisations should expect sophisticated attacks to be launched against
their systems and prepare for this eventuality accordingly. In practice, such
attacks are rare. However, by keeping abreast of the latest attacks and
attacker techniques, organisations can verify that their systems are capable of
detecting and repelling such threats.
Attention to the preparation process ensures that when an attack occurs,
it is rapidly detected. Many identified incidents may be, on closer analysis,
false positives, and many will be minor and will not require a major response.
Nevertheless, organisations should be sure that they are capturing and recording
all incidents so that the attacks that do require attention are quickly identified
and escalated. To do this, it is important to determine the escalation criterion and
mechanism by which a detected incident will activate an incident plan.
The first step of the incident plan should be an assessment of the situation. This
should be followed by actions to prevent the attack from spreading to affect more
systems and to prevent further harm from being incurred. Systems that have been
infected will need isolating to contain the attack. Systems as yet uninfected may
need to be temporarily disabled to prevent the attack from spreading internally,
and network access may need to be curtailed.
Prepare for attacks Implement response plan Refine response plan
Figure 2: Incidence response phases
Preparation Response RecoveryDetection Review
Time
Attacker
Ingress
Attacker
Detected
System
s
Secured
Norm
al
Operation
Resum
ed
www.emea.symantec.com/cyber-resilience
The recovery phase involves restoring systems to their pre-infection state.
Access to recent backups of the affected systems can greatly facilitate
this process, providing they are free from malware. Care must be taken to
ensure that systems are restored to an infection-free state.
Each incident should be subsequently reviewed to identify which procedures
worked well, and where existing practices were lacking. The opportunity
should be taken to learn from the incident and improve procedures in order
to increase the security posture of the organisation.
Creating a response team
Every organisation needs not only a response plan, but also a team who
will implement it. So, a key factor for success will be the support of senior
management. Indeed, when an incident is evolving fast, the involvement
of a senior manager with the authority to approve whatever measures are
necessary to contain and resolve the incident may be vital for gaining a
speed advantage over the attackers.
Relevant stakeholders from departments that may be affected by an
incident will need to be included as part of the response team. However,
the greatest input to the team will be from the technical staff, who will
implement the plan and possess the skills to remediate damage.
Organisations shouldn’t feel that every position in the response team needs
to be filled by in-house staff. External expertise should be considered for the
specialist skills, and experience with similar incidents, that can be brought
to the team.
The composition of the team also needs to be regularly reviewed. Members
may be required to be on-call for extended periods of time and might
benefit from being rotated out of the incident team in order to rest. Equally,
exercises and testing could identify additional skills that need to be brought
into the team.
Solution brief: implementing the right security strategy now
www.emea.symantec.com/cyber-resilience
Testing the plan
Major attacks are rare events. The ideal outcome is that the incident plan
and the skills of the response team will never need to be put into action.
However, this brings risks of its own. Regularly testing the incident plan will
reveal areas of weakness and prevent skills from being forgotten through
lack of use.
Testing exercises may be paper-based, where the response to an evolving
attack and resolution of the incident is played out on a theoretical basis.
Or, such testing may be scheduled as a live exercise involving a team of
penetration testers that simulate how attackers may compromise systems.
Regular exercises ensure that team members are comfortable with their roles
and responsibilities. Testing a variety of different attack scenarios ensures
that procedures are both comprehensive and flexible enough to respond to
future attacks. Teams should adopt the model of: plan, do, check and act.
Plan	 Establish objectives, policies and procedures to meet the
	 requirements of the business.
Do	 Implement these policies and procedures.
Check	 Verify if these are effective at meeting objectives in practice.
Act	 Take action to modify plans according to experience gained to
	 refine and improve.
Solution brief: implementing the right security strategy now
More focus, less risk.
	
	
P
lan
	
	
D
o	
	
Ac
t 	
	 Che
ck
www.emea.symantec.com/cyber-resilience
Conclusion
Understanding how attacks can occur,
implementing the right procedures
and developing a clear response
strategy can help organisations to
counteract future threats and recover
from incidents more quickly.
References
1	 N. Falliere, L. O. Murchu, E. Chien, “W32. Stuxnet Dossier”, Symantec
Security Response Whitepaper, February 2007
S. Davies, “Out of Control”, Engineering & Technology v.6 (6) p.60-62,
July 2011
2	 D. Walker “Saudi Oil Company Back Online After Cyber Sabotage
Attempt”, SC Magazine, 27 Aug 2012
3	 H. Tsukayama, “Cyber Attack on RSA Cost EMC $66 Million”, The
Washington Post, 26 Jul 2011
4	 “Top Four Mitigation Strategies to Protect Your ICT System”, Australian
Government Department of Defence Intelligence and Security, p. 1,
September 2011
5	 “Executive Companion: 10 Steps to Cyber Security”, Dept. for Business
Innovation & Skills, Centre for the Protection of National Infrastructure,
Office of Cyber Security & Information Assurance, p. 1, September 2012
Solution brief: implementing the right security strategy now
www.emea.symantec.com/cyber-resilience
Further reading
“Computer Security Incident Handling Guide. Recommendations of the
National Institute of Standards and Technology”, NIST SP 800-61 rev. 2.
“Guide to Malware Incident Prevention and Handling. Recommendations of
the National Institute of Standards and Technology”, NIST SP 800-83.
BS ISO/IEC 27002:2005 Information technology – Security techniques
– Code of practice for information security management.
BS ISO/IEC 27035:2011 Information technology – Security techniques
– Information security incident management.
PD ISO/IEC TR 18044:2004 Information technology – Security techniques
– Information security incident management.
BS ISO/IEC 27031:2011 Information technology – Security techniques
– Guidelines for information and communication technology readiness
for business continuity.
“Best Practices for Troubleshooting Viruses on a Network”,
Symantec Knowledge Base
B. Nahorney & E. Maengkom, “Containing an Outbreak.
How to clean your network after an incident.”, Symantec Security
Response Whitepaper.
Symantec Security Response, “Security Best Practices”
Symantec Training, “Security Awareness Program”
Solution Brief: Symantec Managed Security Services, “Symantec Security
Monitoring Services: Security log management, monitoring, and analysis by
certified experts”
Solution Brief: Symantec Managed Security Services, “Symantec Managed
Protection Services: Optimize enterprise security protection while
maintaining control”
Symantec EMEA
Headquarters
350 Brook Drive
Green Park
Reading
RG2 6UH
Tel: +44 (0)870 243 1080
Fax: +44 (0)870 243 1081
Symantec is a global leader in providing
security, storage and systems management
solutions to help customers secure and
manage their information and identities.
Copyright © 2013 Symantec Corporation.
All rights reserved. Symantec, the
Symantec Logo, and the Checkmark Logo
are trademarks or registered trademarks
of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names
may be trademarks of their respective
owners. 12/12
For these and any additional resources,
visit: www.symantec.com/en/uk/security_response
www.emea.symantec.com/cyber-resilience
More Focus, Less Risk.

Weitere ähnliche Inhalte

Was ist angesagt?

Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
Argyle Executive Forum
 
Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk
judythornell
 
Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016
Samuel Loomis
 

Was ist angesagt? (19)

A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
 
Vulnerability Management Program
Vulnerability Management ProgramVulnerability Management Program
Vulnerability Management Program
 
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadRethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
 
Фишинг — проклятие или возможность для ИБ?
Фишинг — проклятие или возможность для ИБ? Фишинг — проклятие или возможность для ИБ?
Фишинг — проклятие или возможность для ИБ?
 
Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk
 
React Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident ResponseReact Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident Response
 
VIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksVIPRE --Responding to Cyberattacks
VIPRE --Responding to Cyberattacks
 
Penetration Testing Guide
Penetration Testing GuidePenetration Testing Guide
Penetration Testing Guide
 
securitymaxims
securitymaximssecuritymaxims
securitymaxims
 
Security Maxim
Security MaximSecurity Maxim
Security Maxim
 
when minutes counts
when minutes countswhen minutes counts
when minutes counts
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
Cisco - See Everything, Secure Everything
Cisco - See Everything, Secure EverythingCisco - See Everything, Secure Everything
Cisco - See Everything, Secure Everything
 
To situation awareness theory
To situation awareness theoryTo situation awareness theory
To situation awareness theory
 
Risk assessment Presentation by Affygility Solutions
Risk assessment Presentation by Affygility SolutionsRisk assessment Presentation by Affygility Solutions
Risk assessment Presentation by Affygility Solutions
 
Sample Incident Response Plan
Sample Incident Response PlanSample Incident Response Plan
Sample Incident Response Plan
 
The Critical Incident Response Maturity Journey
The Critical Incident Response Maturity JourneyThe Critical Incident Response Maturity Journey
The Critical Incident Response Maturity Journey
 
Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016
 

Andere mochten auch

Surviving Today's Targeted Attacks
Surviving Today's Targeted AttacksSurviving Today's Targeted Attacks
Surviving Today's Targeted Attacks
Stefan Tanase
 
Identifying Risk Factors for Subjects of Targeted Attack
Identifying Risk Factors for Subjects of Targeted AttackIdentifying Risk Factors for Subjects of Targeted Attack
Identifying Risk Factors for Subjects of Targeted Attack
martin_lee1969
 
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsUnderstand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day Threats
Rahul Mohandas
 

Andere mochten auch (11)

Why Depending On Malware Prevention Alone Is No Longer An Option
Why Depending On Malware Prevention Alone Is No Longer An Option Why Depending On Malware Prevention Alone Is No Longer An Option
Why Depending On Malware Prevention Alone Is No Longer An Option
 
Surviving Today's Targeted Attacks
Surviving Today's Targeted AttacksSurviving Today's Targeted Attacks
Surviving Today's Targeted Attacks
 
Exp r35
Exp r35Exp r35
Exp r35
 
Targeted Defense for Malware & Targeted Attacks
Targeted Defense for Malware & Targeted AttacksTargeted Defense for Malware & Targeted Attacks
Targeted Defense for Malware & Targeted Attacks
 
Understanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value AttacksUnderstanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value Attacks
 
Identifying Risk Factors for Subjects of Targeted Attack
Identifying Risk Factors for Subjects of Targeted AttackIdentifying Risk Factors for Subjects of Targeted Attack
Identifying Risk Factors for Subjects of Targeted Attack
 
Infosecurity Europe 2014 Case Study: Shamoon, a two stage targeted attack
Infosecurity Europe 2014 Case Study:  Shamoon, a two stage targeted attackInfosecurity Europe 2014 Case Study:  Shamoon, a two stage targeted attack
Infosecurity Europe 2014 Case Study: Shamoon, a two stage targeted attack
 
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxDetecting Evasive Malware in Sandbox
Detecting Evasive Malware in Sandbox
 
Evolving Security in Process Control
Evolving Security in Process ControlEvolving Security in Process Control
Evolving Security in Process Control
 
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsUnderstand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day Threats
 
امنیت سیستم های کنترل صنعتی
امنیت سیستم های کنترل صنعتیامنیت سیستم های کنترل صنعتی
امنیت سیستم های کنترل صنعتی
 

Ähnlich wie Preparing for future attacks. Solution Brief: Implementing the right security strategy now

An incident response plan (IRP) is a set of written instructions for.pdf
An incident response plan (IRP) is a set of written instructions for.pdfAn incident response plan (IRP) is a set of written instructions for.pdf
An incident response plan (IRP) is a set of written instructions for.pdf
aradhana9856
 
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docx
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docxChapter 33Incident Response and Forensic AnalysisCopyright ©.docx
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docx
christinemaritza
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Michael Bunn
 
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docxChapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
walterl4
 

Ähnlich wie Preparing for future attacks. Solution Brief: Implementing the right security strategy now (20)

Future Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - SymantecFuture Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - Symantec
 
Importance Of Structured Incident Response Process
Importance Of Structured Incident Response ProcessImportance Of Structured Incident Response Process
Importance Of Structured Incident Response Process
 
Automated Incident Handling Using SIM
Automated Incident Handling Using SIMAutomated Incident Handling Using SIM
Automated Incident Handling Using SIM
 
An incident response plan (IRP) is a set of written instructions for.pdf
An incident response plan (IRP) is a set of written instructions for.pdfAn incident response plan (IRP) is a set of written instructions for.pdf
An incident response plan (IRP) is a set of written instructions for.pdf
 
6 Strategies to Prevent a Ransomware Attack.ppt
6 Strategies to Prevent a Ransomware Attack.ppt6 Strategies to Prevent a Ransomware Attack.ppt
6 Strategies to Prevent a Ransomware Attack.ppt
 
Cybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdf
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Practical Guide to Managing Incidents Using LLM's and NLP.pdf
Practical Guide to Managing Incidents Using LLM's and NLP.pdfPractical Guide to Managing Incidents Using LLM's and NLP.pdf
Practical Guide to Managing Incidents Using LLM's and NLP.pdf
 
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docx
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docxChapter 33Incident Response and Forensic AnalysisCopyright ©.docx
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docx
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Best Open Threat Management Platform in USA
Best Open Threat Management Platform in USABest Open Threat Management Platform in USA
Best Open Threat Management Platform in USA
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
 
Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?
 
A Guide for Businesses.pdf
A Guide for Businesses.pdfA Guide for Businesses.pdf
A Guide for Businesses.pdf
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
 
Cybersecurity.pdf
Cybersecurity.pdfCybersecurity.pdf
Cybersecurity.pdf
 
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docxChapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
A Comprehensive Guide on How to Recover from a Ransomware Attack
A Comprehensive Guide on How to Recover from a Ransomware AttackA Comprehensive Guide on How to Recover from a Ransomware Attack
A Comprehensive Guide on How to Recover from a Ransomware Attack
 

Mehr von Symantec

Mehr von Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Kürzlich hochgeladen

Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 

Kürzlich hochgeladen (20)

WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 

Preparing for future attacks. Solution Brief: Implementing the right security strategy now

  • 1. Preparing for future attacks www.emea.symantec.com/cyber-resilience More Focus, Less Risk. Solution Brief: Implementing the right security strategy now
  • 2. Solution brief: implementing the right security strategy now Introduction Recent malware incidents have shown how costly and damaging cyber attacks can be. The Stuxnet worm is believed to have significantly affected Iranian nuclear processing, and was widely considered to be the first operational cyber weapon1. Shamoon was able to compromise and incapacitate 30,000 work stations within an oil producing organisation2. Another targeted malware attack against a public corporation resulted in the company declaring a $66 million loss relating to the attack3. Such attacks may not necessarily be successful, but when attackers do find their way inside an organisation’s systems, a swift, well-prepared response can quickly minimise damage and restore systems before significant harm can be caused. In order to prepare such a response, organisations must understand how attacks can progress, develop a counteractive strategy, decide who will carry out which actions and then practise and refine the plan. www.emea.symantec.com/cyber-resilience
  • 3. Understanding attacks An attack starts with a point of ingress to the organisation. This may be an unsecured system that hackers are able to access, a vulnerable machine on which malware is executed, or a user who has been duped into installing malware. This point of ingress may then be exploited to spread attacks through the network, either by hacking other systems or by using malware to exploit unpatched system vulnerabilities and install itself on other systems. Once a system is compromised, attackers may install further malware, or take control of the system and send commands for execution. Attackers may seek to exfiltrate information such as confidential files or usernames and passwords held on the system. Protecting against attacks Most attacks can be defended against with the implementation of basic information security practices. The Australian Department of Defence found that implementing four mitigation strategies was sufficient to prevent 85% of targeted attacks4. The British Government has advised that focusing on ten key areas is sufficient to counteract most cyber threats5. As a minimum, an organisation should ensure that network traffic and systems are scanned for malware and that logs of system and network activity are kept, to be used for forensic analysis if necessary. Additionally, regular backups are vital to ensure that damaged systems can be restored to a normal working state. Adequate information security defences reduce the likelihood of attacks succeeding. However, behind every cyber attack headline is an organisation that believed its defences were sufficient. Major incidents do occur and need to be planned for, in order to reduce disruption to the business, minimise harm and reduce the time required for recovery. Solution brief: implementing the right security strategy now Ingress Expand attack Exfiltrate attack Attacker User Attacker Issue commands www.emea.symantec.com/cyber-resilience
  • 4. These actions may impact on users and services throughout the organisation. Notably, they may effect how users, and indeed the response team, usually communicate. Therefore, consideration needs to be given to how communication will be maintained and how users and executives will be kept up-to-date with the progress of incident resolution. Forensic analysis should be used, not only to help identify if data has been compromised, but also to assess how attackers initially penetrated the systems. The vulnerability that was exploited to gain access needs to be addressed as a priority to prevent the attack being repeated as soon as it has been resolved. The collection and preservation of forensic information may also help in identifying and prosecuting those responsible for the attack. Solution brief: implementing the right security strategy now Preparing for incidents Organisations should expect sophisticated attacks to be launched against their systems and prepare for this eventuality accordingly. In practice, such attacks are rare. However, by keeping abreast of the latest attacks and attacker techniques, organisations can verify that their systems are capable of detecting and repelling such threats. Attention to the preparation process ensures that when an attack occurs, it is rapidly detected. Many identified incidents may be, on closer analysis, false positives, and many will be minor and will not require a major response. Nevertheless, organisations should be sure that they are capturing and recording all incidents so that the attacks that do require attention are quickly identified and escalated. To do this, it is important to determine the escalation criterion and mechanism by which a detected incident will activate an incident plan. The first step of the incident plan should be an assessment of the situation. This should be followed by actions to prevent the attack from spreading to affect more systems and to prevent further harm from being incurred. Systems that have been infected will need isolating to contain the attack. Systems as yet uninfected may need to be temporarily disabled to prevent the attack from spreading internally, and network access may need to be curtailed. Prepare for attacks Implement response plan Refine response plan Figure 2: Incidence response phases Preparation Response RecoveryDetection Review Time Attacker Ingress Attacker Detected System s Secured Norm al Operation Resum ed www.emea.symantec.com/cyber-resilience
  • 5. The recovery phase involves restoring systems to their pre-infection state. Access to recent backups of the affected systems can greatly facilitate this process, providing they are free from malware. Care must be taken to ensure that systems are restored to an infection-free state. Each incident should be subsequently reviewed to identify which procedures worked well, and where existing practices were lacking. The opportunity should be taken to learn from the incident and improve procedures in order to increase the security posture of the organisation. Creating a response team Every organisation needs not only a response plan, but also a team who will implement it. So, a key factor for success will be the support of senior management. Indeed, when an incident is evolving fast, the involvement of a senior manager with the authority to approve whatever measures are necessary to contain and resolve the incident may be vital for gaining a speed advantage over the attackers. Relevant stakeholders from departments that may be affected by an incident will need to be included as part of the response team. However, the greatest input to the team will be from the technical staff, who will implement the plan and possess the skills to remediate damage. Organisations shouldn’t feel that every position in the response team needs to be filled by in-house staff. External expertise should be considered for the specialist skills, and experience with similar incidents, that can be brought to the team. The composition of the team also needs to be regularly reviewed. Members may be required to be on-call for extended periods of time and might benefit from being rotated out of the incident team in order to rest. Equally, exercises and testing could identify additional skills that need to be brought into the team. Solution brief: implementing the right security strategy now www.emea.symantec.com/cyber-resilience
  • 6. Testing the plan Major attacks are rare events. The ideal outcome is that the incident plan and the skills of the response team will never need to be put into action. However, this brings risks of its own. Regularly testing the incident plan will reveal areas of weakness and prevent skills from being forgotten through lack of use. Testing exercises may be paper-based, where the response to an evolving attack and resolution of the incident is played out on a theoretical basis. Or, such testing may be scheduled as a live exercise involving a team of penetration testers that simulate how attackers may compromise systems. Regular exercises ensure that team members are comfortable with their roles and responsibilities. Testing a variety of different attack scenarios ensures that procedures are both comprehensive and flexible enough to respond to future attacks. Teams should adopt the model of: plan, do, check and act. Plan Establish objectives, policies and procedures to meet the requirements of the business. Do Implement these policies and procedures. Check Verify if these are effective at meeting objectives in practice. Act Take action to modify plans according to experience gained to refine and improve. Solution brief: implementing the right security strategy now More focus, less risk. P lan D o Ac t Che ck www.emea.symantec.com/cyber-resilience
  • 7. Conclusion Understanding how attacks can occur, implementing the right procedures and developing a clear response strategy can help organisations to counteract future threats and recover from incidents more quickly. References 1 N. Falliere, L. O. Murchu, E. Chien, “W32. Stuxnet Dossier”, Symantec Security Response Whitepaper, February 2007 S. Davies, “Out of Control”, Engineering & Technology v.6 (6) p.60-62, July 2011 2 D. Walker “Saudi Oil Company Back Online After Cyber Sabotage Attempt”, SC Magazine, 27 Aug 2012 3 H. Tsukayama, “Cyber Attack on RSA Cost EMC $66 Million”, The Washington Post, 26 Jul 2011 4 “Top Four Mitigation Strategies to Protect Your ICT System”, Australian Government Department of Defence Intelligence and Security, p. 1, September 2011 5 “Executive Companion: 10 Steps to Cyber Security”, Dept. for Business Innovation & Skills, Centre for the Protection of National Infrastructure, Office of Cyber Security & Information Assurance, p. 1, September 2012 Solution brief: implementing the right security strategy now www.emea.symantec.com/cyber-resilience
  • 8. Further reading “Computer Security Incident Handling Guide. Recommendations of the National Institute of Standards and Technology”, NIST SP 800-61 rev. 2. “Guide to Malware Incident Prevention and Handling. Recommendations of the National Institute of Standards and Technology”, NIST SP 800-83. BS ISO/IEC 27002:2005 Information technology – Security techniques – Code of practice for information security management. BS ISO/IEC 27035:2011 Information technology – Security techniques – Information security incident management. PD ISO/IEC TR 18044:2004 Information technology – Security techniques – Information security incident management. BS ISO/IEC 27031:2011 Information technology – Security techniques – Guidelines for information and communication technology readiness for business continuity. “Best Practices for Troubleshooting Viruses on a Network”, Symantec Knowledge Base B. Nahorney & E. Maengkom, “Containing an Outbreak. How to clean your network after an incident.”, Symantec Security Response Whitepaper. Symantec Security Response, “Security Best Practices” Symantec Training, “Security Awareness Program” Solution Brief: Symantec Managed Security Services, “Symantec Security Monitoring Services: Security log management, monitoring, and analysis by certified experts” Solution Brief: Symantec Managed Security Services, “Symantec Managed Protection Services: Optimize enterprise security protection while maintaining control” Symantec EMEA Headquarters 350 Brook Drive Green Park Reading RG2 6UH Tel: +44 (0)870 243 1080 Fax: +44 (0)870 243 1081 Symantec is a global leader in providing security, storage and systems management solutions to help customers secure and manage their information and identities. Copyright © 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 12/12 For these and any additional resources, visit: www.symantec.com/en/uk/security_response www.emea.symantec.com/cyber-resilience More Focus, Less Risk.