Top Banner
Security @ Large Scale http://www.flickr.com/photos/8164746@N05/2329405200/
16
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security @ large scale

Security @

Large Scale

http://www.flickr.com/photos/8164746@N05/2329405200/

Page 2: Security @ large scale

What is security?

… protecting your servers, code, data, network, users from the bad guys

Page 3: Security @ large scale

What is large scale?

Big infra (apps, servers, routers, firewalls), lots of stored data, lots of streaming data, partners

… so much that’s humanly impossible to manage or make sense out of .. and where traditional technologies fail to be of help

Page 4: Security @ large scale

What is security @ large scale?When traditional security techniques fail. Too

many devices to manage. Too much logs. Many ways of getting attacked. Lots of applications.

Multiple programming stacks. Lots of code pushed out daily. Acquisitions. Mergers.

Outsourced Service Providers. 3rd party software.

Page 5: Security @ large scale

DoS – a novice as well as a sophisticated attacker’s attack

Monitor, Learn, Adapt

Page 6: Security @ large scale

The mystery of DDoS

Is it the holiday traffic or a botnet? Sometimes just being a difficult or

expensive target is a win… also called raising the bar

Page 7: Security @ large scale

0 days attacks @ layer 7

Telnet, FTP, SMTP, DNS, HTTP, RPC, SIP, SSHTighten up access. Let the enemy come

between the mountains.

Page 8: Security @ large scale

For 90%, Internet is HTTP or World Wild Web

Amazon, Flickr, Tumblr, Gmail, Y! News, FB, Y! Finance, Twitter, Y!

Weather, G Maps

Page 9: Security @ large scale

And now you have the mobile first

Page 10: Security @ large scale

worms: large scale client side attacks

https://superevr.com/blog/2011/xss-in-skype-for-ios/

Page 11: Security @ large scale

worms: large scale server side attacks

Step 1: Attacker shuts DBStep 2: Victim can’t do anything on the website. DB is down

Page 12: Security @ large scale

Bad-man in the middle. Everywhere.

Page 13: Security @ large scale

Internal is not always Internal

Page 14: Security @ large scale

Advanced Persistent Threat (APT)

1 + 1 + 1 = ?

Aurora, Stuxnet

Page 15: Security @ large scale

Use technology for it

Hadoop, MapReduce, Data Mining, CommonCrawler, Nutch, Splunk,

NodeJS, PhantomJS………

Page 16: Security @ large scale

To win some battles, you need Avengers

Restrictive ACLs, Continuous Inventory Discovery, Proactive Vulnerability Detection, Patch

Management beyond at Web layer, Secure programming stack, Abuse Detection, Static

Analysis, Dynamic Analysis, Red Team, Trainings, Bug Recognition / Bounty program