Top Banner
The Bad Guys are Winning
14

Verizon 2014 data breach investigations report dbir - my view ext

Jan 15, 2015

Download

Technology

Ulf Mattsson

I agree when Verizon's Baker says "the bad news from this year's report is that the cybercriminals and other attackers are getting better at what they do, while the security community is not improving its game quickly enough to keep pace."
The bad news, as Wade Baker, principal author of the Data Breach Investigations Report (DBIR) series, says is that: "After analyzing 10 years of data, we realize most organizations cannot keep up with cybercrime – and the bad guys are winning."
My view is that that we are now more concerned about attackers that are targeting our data flow, including data in memory since the DBIR reported that "RAM scrapers" went from a low #17 in 2012 and shoot up the charts to a very concerning #4 spot in 2013.
My view is that that we are now less concerned about attackers that are targeting our stored data since the DBIR reported that "Capture stored data" went from a #4 in 2012 and to a less concerning #9 spot in 2013 and "Privilege abuse" went from a #14 in 2012 and to a less concerning #17 spot in 2013.
I think that file encryption will not stop the bad guys. The bad guys are no longer attacking stored data. The bad guys are now attacking the data flow, including data in memory.
My view is that we now need to secure the data flow, including data in memory. The bad guys are no longer attacking stored data.
I'm increasingly concerned about Big Data and Cloud platforms, great targets for attackers.
An important development was the addition of coarse-grained volume or file encryption will only solve one problem, protecting data at rest, but considering one of the primary goals is using the data, one might suggest that it provided little in the grand scheme of Data security. Sensitive data in use for analytics, traveling between nodes, sent to other systems, or even just being viewed is subject to full exposure.
What they're seeking is advanced functionality equal to the task of balancing security and regulatory compliance with data insights and data utility. This balance is critical for Big Data and Cloud platforms.
Emerging Big Data and Cloud platforms are presenting new use cases that are requiring data insight for analytics, high performance and scalability for Big Data platforms cannot be achieved by old security approaches. New security approaches are required since Big Data is based on a new and different architecture.
Big Data is introducing a new approach to collecting data by allowing unstructured data to be blindly collected. In many cases we do not even know about all sensitive and regulated data fields that are contained in these large data feeds. Analysis of the content is often deferred to a later point in the process, to a stage when we are starting to use the data for analytics. Then it is too late to go back and try to apply data security and compliance to regulations.
My view is that we now need to secure the data flow. The bad guys are no longer attacking stored data in files.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Verizon 2014 data breach investigations report   dbir - my view ext

The Bad Guys

are Winning

Page 2: Verizon 2014 data breach investigations report   dbir - my view ext

Wade Baker, principal author of the Data Breach Investigations Report (DBIR) series, says is that:

“After analyzing 10 years of data, we realize most organizations cannot keep up with cybercrime – and

the bad guys are winning.” "Attackers are getting quicker at compromising

systems over the past 10 years,"

"Less than 25 percent of good guys discovered these incidents in days or less. This is not a good situation ...

The bad guys are winning at a faster rate than the good guys are winning."

Page 3: Verizon 2014 data breach investigations report   dbir - my view ext

The Bad Guys

are Attacking Your Data

Page 4: Verizon 2014 data breach investigations report   dbir - my view ext

Ram scraper [mal] 223

"RAM scrapers" went from a low #17 in 2012 and shoot up the charts to a very concerning #4 spot in 2013.

Verizon’s 2014 Data Breach Investigations Report

Page 5: Verizon 2014 data breach investigations report   dbir - my view ext

Export data [mal] 327

“Export data" went from a low #7 in 2012 and shoot up the charts to a very concerning #2 spot in 2013.

Verizon’s 2014 Data Breach Investigations Report

Page 6: Verizon 2014 data breach investigations report   dbir - my view ext

Capture stored data [mal] 133

“Stored data" went from a #4 in 2012 and to a less concerning #9 spot in 2013

Verizon’s 2014 Data Breach Investigations Report

Page 7: Verizon 2014 data breach investigations report   dbir - my view ext

Privillege abuse [mis] 65

"Privilege abuse" went from a #14 in 2012 and to a less concerning #17 spot in 2013

Verizon’s 2014 Data Breach Investigations Report

Page 8: Verizon 2014 data breach investigations report   dbir - my view ext

Capture stored data [mal] 133

My Conclusion: File Encryption is Not Helping

Verizon’s 2014 Data Breach Investigations Report

File encryption

Page 9: Verizon 2014 data breach investigations report   dbir - my view ext

Privillege abuse [mis] 65

My Conclusion: Database Monitoring will Not Help

Verizon’s 2014 Data Breach Investigations Report

Database Activity Monitoring

Page 10: Verizon 2014 data breach investigations report   dbir - my view ext

Ram scraper [mal] 223

Export data [mal] 327

My Conclusion: Secure The Sensitive Data Flow

Verizon’s 2014 Data Breach Investigations Report

Data Tokenization

Data Tokenization

Page 11: Verizon 2014 data breach investigations report   dbir - my view ext

Attacking Emerging Platforms

Page 12: Verizon 2014 data breach investigations report   dbir - my view ext

Cloud and Big DataEmerging Big Data and Cloud platforms are presenting new use cases that are requiring data

insight for analytics, high performance and scalability for Big Data platforms cannot be achieved by old security approaches.

An important development was the addition of coarse-grained volume or file encryption will only solve one problem, protecting data at rest, but considering one of the primary goals is using

the data, one might suggest that it provided little in the grand scheme of Data security.

Sensitive data in use for analytics, traveling between nodes, sent to other systems, or even just being viewed is subject to full exposure.

What they’re seeking is advanced functionality equal to the task of balancing security and regulatory compliance with data insights and data utility.

This balance is critical for Big Data and Cloud platforms.

Page 13: Verizon 2014 data breach investigations report   dbir - my view ext

Big DataBig Data is introducing a new approach to collecting data by allowing unstructured data to be blindly collected. In many cases we do not even know about all sensitive and regulated data

fields that are contained in these large data feeds.

Analysis of the content is often deferred to a later point in the process, to a stage when we are starting to use the data for analytics.

New security approaches are required since Big Data is based on a new and different architecture.

Then it is too late to go back and try to apply data security and compliance to regulations.

Page 14: Verizon 2014 data breach investigations report   dbir - my view ext

ConclusionMy view is that that we are now more concerned about attackers that are targeting

our data flow.

My view is that that we are now less concerned about attackers that are targeting our stored data.

I think that file encryption will not stop the bad guys.

I found some good news in an interesting report from the Aberdeen Group that revealed that "Over 12 months, data tokenization users had 50% fewer security-

related incidents (e.g., unauthorized access, data loss or data exposure than tokenization non-users".

Nearly half of the respondents (47%) are currently using tokenization for something other than cardholder data.

The name of the study is "Tokenization Gets Traction".