Top Banner
Carnegie Mellon , #2 next level solutions Mar 25, 2022 Federal Cyber Security Official: Prepare For The Worst The nation must prepare for the worst- case scenario when it comes to securing the Internet, warned Richard Clarke, President Bush's special advisor on cyberspace security, on Wednesday. "We haven't patched the holes literally or figuratively. We have a system that's vulnerable to sophisticated attackers, not just the 14-year-olds," Clarke said. Homeland Security
10

Carnegie Mellon, #1 next level solutions 6-Aug-15 Operating System Security John Doyle Director, Sales & Business Development Harris Corporation,STAT Operations.

Dec 22, 2015

Download

Documents

Ira Fitzgerald
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Carnegie Mellon, #1 next level solutions 6-Aug-15 Operating System Security John Doyle Director, Sales & Business Development Harris Corporation,STAT Operations.

Carnegie Mellon , #2 next level solutions Apr 19, 2023

                                  

Federal Cyber Security Official: Prepare For The Worst

The nation must prepare for the worst-case scenario when it comes to securing the Internet, warned Richard Clarke, President Bush's special advisor on cyberspace security, on Wednesday.

"We haven't patched the holes literally or figuratively. We have a system that's vulnerable to sophisticated attackers, not just the 14-year-olds," Clarke said.

Homeland Security

Page 2: Carnegie Mellon, #1 next level solutions 6-Aug-15 Operating System Security John Doyle Director, Sales & Business Development Harris Corporation,STAT Operations.

Carnegie Mellon , #3 next level solutions

CERT Reported Attacks

0

5000

10000

15000

20000

25000

30000

35000

40000

45000

50000

1999 2000 2001

Page 3: Carnegie Mellon, #1 next level solutions 6-Aug-15 Operating System Security John Doyle Director, Sales & Business Development Harris Corporation,STAT Operations.

Carnegie Mellon , #4 next level solutions Apr 19, 2023

100% secure

Performance

Functionality

Enterprise Security Strategy

• Find the balanced solution between price, function,and performance

• How much security can a user stand?• How much insecurity can the organization afford?

Page 4: Carnegie Mellon, #1 next level solutions 6-Aug-15 Operating System Security John Doyle Director, Sales & Business Development Harris Corporation,STAT Operations.

Carnegie Mellon , #5 next level solutions Apr 19, 2023

Security - The Big Picture

Local Users

Anti-Virus SW

Anti-Virus SW

Anti-Virus SW

Intranet

Internet

Teammate /Telecommuter viaCommercial ISP

VPN

Network Manager Network Management System Vulnerability Scan Intrusion Detection Risk AssessmentMail Server

E-Mail Scan Anti-Virus

Firewall/URL Filtering

Firewall

Web Server Extranet SSL Encryption PKI Authentication (Non-repudiation

of transactions)

Remote Users

PSTN

Remote Connection Server Authentication VPN?

E-Commerce Customer PKI

Network security requires an enterprise-wide perspective and “defense-in-depth” with layers of protection that work together.Network security requires an enterprise-wide perspective and

“defense-in-depth” with layers of protection that work together.

Page 5: Carnegie Mellon, #1 next level solutions 6-Aug-15 Operating System Security John Doyle Director, Sales & Business Development Harris Corporation,STAT Operations.

Carnegie Mellon , #7 next level solutions Apr 19, 2023

The Band-Aid Security Strategy

Dial-upmodems

Routers

IDS

Centralized MonitoringTNOCs & RCERTs

DNS/Web

ServersFirewalls

BACKDOORCONNECTIONS

INTERNET

TRADINGPARTNERS

CORPORATENETWORK

LAN

Security Router

Local Node

ID & Authentication

Servers

Page 6: Carnegie Mellon, #1 next level solutions 6-Aug-15 Operating System Security John Doyle Director, Sales & Business Development Harris Corporation,STAT Operations.

Carnegie Mellon , #8 next level solutions Apr 19, 2023

What’s Missing?

• Protection for the OS– An OS “firewall”

• Kernel-level protection to provide your existing security infrastructure with a last layer of defense – Intercepts

– Identifies

– Prevents potentially damaging ‘behavior’ within any executing code on a system (i.e., applications, device drivers, and services)

• Proactive 360º enterprise protection intercepts, identifies and prevents damage from known and unknown malicious code, human error, and other attacks whether internal or external

• Intrusion Prevention = STAT™ Neutralizer

Page 7: Carnegie Mellon, #1 next level solutions 6-Aug-15 Operating System Security John Doyle Director, Sales & Business Development Harris Corporation,STAT Operations.

Carnegie Mellon , #9 next level solutions Apr 19, 2023

STAT Neutralizer

• Result of extensive research in code containment, software testing techniques, and intrusion detection– Provides ultimate intrusion prevention by stopping known and

unknown security threats, providing immediate intrusion diagnosis, and ensuring strict end user policy compliance

• Pattern independent in implementation– Protects against both the known and unknown– Simply denies undesirable behaviors

• Malicious code protection regardless of source – Works on rules that define allowable behavior. Prevents execution

of code not allowed on the network. Prevents network assets from being used as hosts for distributed denial of service (DDoS) attacks.

• Centralized Management– Leverages Windows NT/2000 administrative features. Console

allows for single point of management. Remote management via Web access from any PC.

Page 8: Carnegie Mellon, #1 next level solutions 6-Aug-15 Operating System Security John Doyle Director, Sales & Business Development Harris Corporation,STAT Operations.

Carnegie Mellon , #10 next level solutions Apr 19, 2023

STAT Neutralizer

• Strict security policy enforcement– Automatically holds users accountable to security policy. Prohibit

applications or users access to certain files or directories. Prevent the download & install of programs

• Real-time, 360 protection– Does not require updates, enabling it to always be on. Protects

against internal and external threats

• Significantly reduced false positives– Looks at executing code not network traffic. Logs only attacks or

events that would have resulted in harm. Supplied policies protect against many false positives. Administrator can create rules to allow (and not log) behaviors that they deem as “false positives.”

Page 9: Carnegie Mellon, #1 next level solutions 6-Aug-15 Operating System Security John Doyle Director, Sales & Business Development Harris Corporation,STAT Operations.

Carnegie Mellon , #11 next level solutions Apr 19, 2023

STAT Product Family

• STAT® Scanner– Vulnerability scanner– Keep assets up-to-date with current security

recommendations and updates

• STAT® Analyzer– Security assessment automation– Audit or assess how well your security settings are

relative to your policy

• STAT® Neutralizer– Malicious code defense– Intercept and stop destructive behavior

Our software helps take a proactive approach to addressingsecurity vulnerabilities and threats before they can cause problems

Page 10: Carnegie Mellon, #1 next level solutions 6-Aug-15 Operating System Security John Doyle Director, Sales & Business Development Harris Corporation,STAT Operations.

Carnegie Mellon , #12 next level solutions Apr 19, 2023

Demonstration