Top Banner
Securing Your Applications & Data Survival In An Evolving Threat Landscape Alexander Krakhofer
27

Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Apr 19, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Securing Your Applications & Data

Survival In An Evolving Threat Landscape

Alexander Krakhofer

Page 2: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Cyberwar: The Web App Aspect

The Evolving Threat Landscape

Securing Tomorrow’s Perimeter

Agenda

Page 3: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

The Security Trinity

Integrity

Availability

Confidentiality

Security Confidentiality “Need to know” principle of the

military ethic, restricts the access of information

Security Integrity In its broadest meaning refers to

the trustworthiness of information over its entire life cycle.

Security Availability Distinguishes information objects

that have self-sustaining processes from those that do not

Page 4: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Cyberwar Toolbox

Web Vandalism

Slide 4

Cyber Espionage

Disruption of Service

Gathering & Manipulating

Data

Trojan, Viruses & Worms

Attack Critical Infrastructure

The Cyber Attack Vectors

Page 5: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Slide 5

Large volume network flood attacks

XSS, Brute force

OS Commanding

Application vulnerability, malware

SQL Injection, LDAP Injections

Port scan, SYN flood attack

“Low & Slow” DoS attacks (e.g.Sockstress)

Network scan

Intrusion

High and slow Application DoS attacks

XML manipulations, Web Services Abuse

Leakage of Sensitive Data

Targeting Different Layers

Page 6: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

McAfee, 2007, The Internet security report

Slide 6

Approximately 120 countries have been developing ways to use

the Internet as a weapon and target

financial markets, government computer systems and utilities.

Page 7: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Slide 7

July 6, 2012

Pentagon Digs In on Cyberwar Front Elite School Run by Air Force Trains Officers to Hunt Down Hackers and Launch Electronic Attacks

Page 8: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Cyberwar – The Web App Aspect

Slide 8

Page 9: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Cyberwar: The Web App Aspect

The Evolving Threat Landscape

Securing Tomorrow’s Perimeter

Page 10: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Web Apps are Easy to Exploit

Whole system open to attack

Can target different layers

Thousands of Web security

vulnerabilities

Minimal attention to security

during development

Traditional defences

inadequate

All they need is a

browser Slide 10

Page 11: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Thousands of Vulnerabilities Every Year

Slide 11

0

1000

2000

3000

4000

5000

6000

7000

2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012

# of Vulnerabilities

• Source: National Vulnerabilities Database

Page 12: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Minutes to Compromise, Months to Discover

Slide 12

Page 13: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Top Web Attack Impacts

Slide 13

Source: webappsec.org

Page 14: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Records of sensitive information (CCN, SSN, etc.) were breached by hacking attempts only in the United States.

The population of the United States, projected to Sep 2012 is 314,324,529

Millions of Records Breached

Page 15: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Source of Breach

Slide 15

• Source: 7safe.com

80%

18%

2%

External

Partner

Internal

Page 16: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Slide 16

• Duration: 20 Days

• More than 7 Attack vectors

• “Inner cycle” involvement

Attack target: Vatican

Sophistication measure

• Duration: 3 Days

• 5 Attack vectors

• Only “inner cycle” involvement

• Attack target: HKEX

• Duration: 3 Days

• 4 Attack vectors

• Attack target: Visa, MasterCard

• Duration: 6 Days

• 5 Attack vectors

• “Inner cycle” involvement

Attack target: Israeli sites

Hacktivism - Becomes More Campaign Blend-APT Oriented

Page 17: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

The Impact

Confidentiality

Integrity

Availability

Target / Operation

2007 2008 2009 2010 2011 2012

Habbo Hal Turner Project

Chanology

Epilepsy

Foundation

AllHipHop

Defacement

No Cussing

Club

2009 Iranian

Election

Protests

Operation

Didgeridie

Operation

Titstorm

Oregon Tea

Party Raid

Operation

Leakspin Zimbabwe Operation Payback

Avenge

Assange

Operation

Bradical

HBGary

Federal Westboro

Baptist Church

Bank of

America

Operation

Sony

Operation

Orlando Operation Iran

Operation

Anti-Security

Operation

BART

Operation

Invade Wall

Street

Toronto Stock

Exchange Operation

Stratfor Arab Spring

Activities

LinkedIn

Password

Hack

AT&T DNS

Outage

L-3 ISP

Service Saudi Aramco

Outage

Philipines

Water

Company

Page 18: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Cyberwar: The Web App Aspect

The Evolving Threat Landscape

Securing Tomorrow’s Perimeter

Page 19: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Perimeter Defense Planning

Page 20: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Perimeter Defense Planning

Any gap in coverage represents a vulnerability.

That will be exploited.

Page 21: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Perimeter Defense Planning

Page 22: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Emergency Response Teams & Cyber War Rooms

Required expertise during attack campaign Complex risk assessment

Tracking and modifying protections against dynamically evolved attacks

Real time intelligence

Real time collaboration with other parties

Counter attack methods and plans

Preparation with cyber “war games”

Slide 22

Attack Time

• Emergency Response

Team that “fights”

Get ready

• Audits

• Policies

• Technologies

Forensics

• Analyze what happened

• Adjust policies

• Adapt new technologies

Existing Level of

skills

Strategy

Lack of Expertise

Page 23: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

The Best Defense Is A…

Key Notes: - Counter Attack’s Comeuppance is Upon Us - Key IR Assumptions are wrong – e.g. Law enforcement - Attack Mitigation Talent is Low. Knowledge must increase. - Corporate Policies are IR not ERT focused

Page 24: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Slide 24

DoS Protection

Behavioral Analysis

IP Rep.

IPS

WAF

Large volume network flood attacks

XSS, Brute force

OS Commanding

Application vulnerability, malware

SQL Injection, LDAP Injections

Port scan, SYN flood attack

“Low & Slow” DoS attacks (e.g.Sockstress)

Network scan

Intrusion

High and slow Application DoS attacks

XML manipulations, Web Services Abuse

Leakage of Sensitive Data

Mapping Security Protection Tools

Page 25: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Conclusion

Attackers deploy multi-vulnerability attack campaigns

Organizations deploy point security solutions

Attackers target for blind spots

Companies need a solution that:

Can defend against emerging cyber attack campaigns

Has no blind spots in network & application security

Customer success: best security solution for

Online business protection

Data center protection

Slide 26

http://edition.cnn.com/video/#/video/bestoftv/2013/01/09/exp-tsr-todd-us-banks-hacked-iran.cnn?iref=allsearch

Page 26: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

Security report 2012

What Changed in Security in 2012?

In 2012, we saw a new cyber security trend a consistent and steady

increase in advanced and persistent DoS and DDoS attack campaigns.

These campaigns have multiple attack vectors, are longer in duration

and are more complex. Nowadays it’s common to see attacks with four,

five, or even ten attack vectors, lasting last three days, a week or even

a month. This new trend of advanced and persistent threats creates big

challenges and organizations are not prepared.

Organizations Are Bringing a Knife to a Gunfight!

Download Security report 2012 from

http://www.radware.com/Resources/rclp.aspx?campaign=1630844 !

Slide 27

Page 27: Securing Your Applications & Data Survival In An Evolving ... · Emergency Response Teams & Cyber War Rooms Required expertise during attack campaign Complex risk assessment Tracking

16. února 2011

Alexander Krakhofer

[email protected]

Děkujeme za pozornost.

? PROSTOR PRO OTÁZKY