Cyber Security Update Denise Heagerty CERN Computer Security Officer
|
|
|
- Alberta Higgins
- 10 years ago
- Views:
Transcription
1 Cyber Security Update Denise Heagerty CERN Computer Security Officer HEPiX Meeting, CERN, 5-9 May 2008
2 Acknowledgements Thanks to the following people for their contributions and suggestions for this presentation: ti Lionel Cons, CERN Bob Cowles, SLAC Sebastien Dellabella Jan Iven, CERN David Jackson, STFC Stefan Lueders, CERN Djilali Mamouzi David Myers, CERN Romain Wartel, CERN Cyber Security Update, HEPiX Meeting, 5-9 May
3 Overview These slides cover a selection of security highlights during the past few months for: Web Security Windows Security Linux Security Mac security Controls Security Miscellaneous This presentation complements information in Operational security for a Grid environment by Romain Wartel Cyber Security Update, HEPiX Meeting, 5-9 May
4 Web Security Update
5 Web (in)security update IFRAME injection attacks continue Inserts IFRAME HTML tags into web pages Loads malware from another site into this IFRAME Relies on finding vulnerable web servers Unfortunately they are not difficult to find! Targets vulnerabilities in Web browsers and plug-ins E.g. vulnerabilities in media players are common Insufficient file protections are targets Including AFS file space check if your ACLs are too open! Used for hosting inappropriate content (malware, SPAM, ) Automated tools post to open forums, blogs, wikis, guestbooks, etc... Cyber Security Update, HEPiX Meeting, 5-9 May
6 Any insecure web site is likely to be attacked Cyber Security Update, HEPiX Meeting, 5-9 May
7 Web developers need to check their code! Javascript with Ajax is an easy target for attack: Cyber Security Update, HEPiX Meeting, 5-9 May
8 Malware Distribution Networks Report by Google on drive-by-download attacks: avoiding the dark corners of the Internet does not limit exposure to malware state-of-the-art anti-virus engines are lacking in their ability to protect against drive-by downloads users may be lured into the malware distribution networks by content served through online Ads eg e.g. theregister serves rogue ads/ 1.3% of the incoming search queries to Google's search engine return at least one link to a malicious site Cyber Security Update, HEPiX Meeting, 5-9 May
9 Web security advice Require secure coding practices Especially (but not only) for custom built web applications Educate users that web surfing has risks Advertising, photos and videos can and do regularly contain malware Be cautious of links in IM, Blogs and Online forums (e.g. social networking). Attackers have matured beyond using SPAM Rich content and plug-ins increase chances of attacks Even reputable sites can serve 3 rd party content, e.g. advertising Consider blockers for JavaScript and advertising e.g. NoScript and AdBlock for Firefox Disadvantages are that frequent updates are required and users need to understand what is being blocked and why Cyber Security Update, HEPiX Meeting, 5-9 May
10 Windows Security Update
11 Windows Security Update Windows computers remain a key target for attackers Trojan Web links in SPAM , Instant Messaging and Online Forums Trojans targeting vulnerable applications: e.g. Adobe PDF, Word, Quicktime, VLC, Mplayer, Winamp Applications are often an easier target than the OS keep them secure Users are the weakest link and vulnerabilities are a fact of life Srizbi Trojan: SPAM relay using rootkit technology A more advanced form of the Storm botnet Difficult to detect until it becomes a SPAMbot Cyber Security Update, HEPiX Meeting, 5-9 May
12 Advice on securing Windows computers Centrally managing computers can help: Ensure patching for applications as well as the operating system Ensure anti-virus runs correctly and pattern files kept updated Configure secure defaults, especially for web browsers Only use privileges for actions that require them 90% of compromised Windows computers at CERN in 2007 were privately managed e.g. laptops owned privately or by outside institutes => Centrally managed computers were more secure Cyber Security Update, HEPiX Meeting, 5-9 May
13 Linux Security Update Slides contributed by Jan Iven, CERN
14 Linux Security (1) Linux x86_64 insta-root (CVE ) (at least) 1 machine compromised at CERN via a compromised user account Delay between (public) announce and public exploit: 2 days (and 2 more for updates to appear) Vendor assessments: SECUNIA: less critical Red Hat: important Cyber Security Update, HEPiX Meeting, 5-9 May
15 Linux Security (2) Vendor assessments (ex: RHEL4) Marc Cox, Red Hat did some analysis: CERN analysis since Oct 2007 (ad-hoc): 93 security errata for RHEL4+extras 25 critical : 12 Mozilla&friends, 4 Java, 2 flash-plugin, acroread, 27 Important : kernel, PDF, But nobody (seems?) to be exploiting Firefox et.al. on Linux? Lessons: User-assisted (browser mail) things get overrated by industry Who would use a browser as root? Oh, wait Traditional local root exploits get underrated by industry Cyber Security Update, HEPiX Meeting, 5-9 May
16 Linux Security (3) Linux security tools stagnation? Red Hat has added lots of nifty things in 2005/6 1 minor addition in 2007 Are they used/useful? (SELinux off is standing recommendation by Google 90k hits) Red Hat: could downgrade 1 advisory in 2004 (double-free caught by glibc) only chkrootkit/rkhunter no update = no new Linux rootkits? StJude/Zeppoo: RIP. Cyber Security Update, HEPiX Meeting, 5-9 May
17 Mac Security Update
18 Safari zero-day exploit nets $10,000 prize Apple fell first in CanSecWest pwn-2-own contest Vista fell next with a few hours of tweaking exploit will also work okonosxandon Linux according to the contest winner Cyber Security Update, HEPiX Meeting, 5-9 May
19 First Rogue Cleaning Tool for Mac Macsweeper: always finds something to fix (a trick to make you buy it) similar to Cleanator for Windows Cyber Security Update, HEPiX Meeting, 5-9 May
20 QuickTime Security Update Technical Cyber Security Alert TA08-094A Original i release date: April 3, Source: US-CERT Apple Mac OS X running versions of QuickTime prior to Microsoft Windows running versions of QuickTime prior to Overview Apple QuickTime contains multiple vulnerabilities as described in the Apple Knowledgebase article HT1241. Exploitation ti of these vulnerabilities could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition Special alert for Windows: non-us language versions SWITCH-CERT have reported that auto-updates of Quicktime fail on non-us language versions of Windows - s/w re-installation required Cyber Security Update, HEPiX Meeting, 5-9 May
21 Controls Security Update Slides contributed by Stefan Lueders, CERN
22 Heart Device is vulnerable to attack Cyber Security Update, HEPiX Meeting, 5-9 May
23 Boeing s new 787: vulnerable? Boeing s new 787: The network providing Internet access for passengers is connected to the plane s control, navigation and communication systems Cyber Security Update, HEPiX Meeting, 5-9 May
24 Stronger regulations to secure the Electric Grid The U.S. DHS and the U.S. FERC are now regulating g the cyber-security for control systems in the electricity sector. The standards CIP-002 to CIP-009 are mandatory. The Federal Energy Regulatory Commission (FERC) today approved eight new mandatory critical infrastructure protection (CIP) reliability standards to protect the US s bulk power system against potential disruptions from cyber security breaches (2008/02/01) Cyber Security Update, HEPiX Meeting, 5-9 May
25 Security Standards for Automation Industrial Control Systems The ISA has started the ISA Security Compliance Institute - to be a driving force to enhance control system cybersecurity - to establish a set of well engineered specifications and processes for the testing and certification of critical control system products Cyber Security Update, HEPiX Meeting, 5-9 May
26 EuroSCSIE EuroSCSIE European Information Exchange on SCADA and Control System Security of members from European based government, industry and research institutions depending upon and/or whose responsibility it is to improve the security of SCADA and Control Systems Users and governments from 10 European countries Chaired in 2007 by CERN (S. Lueders) 4 meetings were held Cyber Security Update, HEPiX Meeting, 5-9 May
27 Control System Cyber Security in HEP First workshop held during ICALEPCS2007 Located in Knoxville, Tennessee, on 15 Ot2007 Oct Participants from several sites KEK, FNAL, SLAC, STFC,... Useful discussioni and information exchange Defence in depth is a common approach Summary paper p and talk linked from Cyber Security Update, HEPiX Meeting, 5-9 May
28 Miscellaneous
29 Miscellaneous Updates Top security risks and trends compiled by SANS: ecsirt incident classification scheme: clearinghouse-policy-v12.html#head6html#head6 Federated Model for Cyber Security (Argonne) Cyber Security Update, HEPiX Meeting, 5-9 May
30 ISSeG Project Web Site Final Release ISSeG: Integrated Site Security for Grids Site Security tools and advice targeted t for Grid sites Final version of web site includes: Risk Analysis Tool Security Recommendations Security Training Material For full information, i visit: i Cyber Security Update, HEPiX Meeting, 5-9 May
31 Some conclusions The Internet world is not becoming a safer place Attacks are becoming more targeted t Driven by money and criminal activity e.g. compromised computers, accounts and data can be sold Phishing targets passwords, personal data, credit card details, Secure coding practices are essential Custom built software, especially web apps, are a growing target Privately managed computers/applications can increase risks Applications, plug-ins etc need to be patched (not just the OS) Centralised management makes it easier to keep computers secure Users need to be alert for malware Via links in IM, Blogs, Online forums (e.g. social networking), In photos, videos, advertising, documents, Relying solely on anti-virus software is not sufficient Cyber Security Update, HEPiX Meeting, 5-9 May
32 Discussion
Complete Patch Management
Complete Patch Management Complete - Flexible Unique In- Depth Secunia CSI 7 Corporate Software Inspector Take control of the vulnerability threat and optimize your IT security investments. The Secunia
Secure Email and Web Browsing. Sébastien Dellabella Computer Security Team
Secure Email and Web Browsing Sébastien Dellabella Computer Security Team Overview Main attack types Consequences of a successful attack Survival guide on the wild Internet Understanding the details Examples
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
October Is National Cyber Security Awareness Month!
(0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security
Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security The IT Security Office (ITSO) What We Do? Risk Assessment Network and System Security Monitoring Vulnerability Scanning
EXTENSIVE FEATURE DESCRIPTION SECUNIA CORPORATE SOFTWARE INSPECTOR. Non-intrusive, authenticated scanning for OT & IT environments. secunia.
Non-intrusive, authenticated scanning for OT & IT environments The situation: convenience vs. security Interconnectivity between organizations and corporate networks, the internet and the cloud and thus
UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)
Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC) Cyber in the News 1 Tactics, Techniques and Procedures These observed tactics, techniques
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Kaspersky Endpoint Security 10 for Windows. Deployment guide
Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses
Patch Management Solutions Test
Patch Management Solutions Test A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: 5 th June, 2013, last update: 19 th July, 2013 Executive Summary From May to July
Computer Security Literacy
Computer Security Literacy Staying Safe in a Digital World Douglas Jacobson and Joseph Idziorek CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis
Why The Security You Bought Yesterday, Won t Save You Today
9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About
This manual provides information and recommendations for Mac SharePoint Users at Fermilab. Using SharePoint from a Mac: Overview
Using SharePoint from a Mac: Overview This manual provides information and recommendations for Mac SharePoint Users at Fermilab. Page 0 Contents Introduction...2 Getting Started...2 SharePoint Username
The Importance of Patching Non-Microsoft Applications
The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As
Seven for 7: Best practices for implementing Windows 7
Seven for 7: Best practices for implementing Windows 7 The early reports are in, and it s clear that Microsoft s Windows 7 is off to a fast start thanks in part to Microsoft s liberal Windows 7 beta program
Five Tips to Reduce Risk From Modern Web Threats
Five Tips to Reduce Risk From Modern Web Threats By Chris McCormack, Senior Product Marketing Manager and Chester Wisniewski, Senior Security Advisor Modern web threats can infect your network, subvert
TASKSTREAM FAQs. 2. I have downloaded a lesson attachment, but I cannot open it. What is wrong?
TASKSTREAM FAQs Why do I not receive emails from TaskStream? It could be that your email program is interpreting incoming TaskStream mail as spam, which is a term for junk mail Spam is not typically stored
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security
2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware.
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
Microsoft Security Intelligence Report volume 7 (January through June 2009)
Microsoft Security Intelligence Report volume 7 (January through June 2009) Key Findings Summary Volume 7 of the Microsoft Security Intelligence Report provides an in-depth perspective on malicious and
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
GlobalSign Malware Monitoring
GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...
Malicious Websites uncover vulnerabilities (browser, plugins, webapp, server), initiate attack steal sensitive information, install malware, compromise victim s machine Malicious Websites uncover vulnerabilities
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document
ESET CYBER SECURITY PRO for Mac Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against
Northwestern University Dell Kace Patch Management
Northwestern University Dell Kace Patch Management Desktop Patch Management Best Practices Table of Contents: 1. Audience 2. Definition 3. Patch Approaches 4. Guidelines for Review, Test, and Deploy 5.
High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director [email protected]
The Fundamental Failures of End-Point Security Stefan Frei Research Analyst Director [email protected] Agenda The Changing Threat Environment Malware Tools & Services Why Cybercriminals Need No 0-Days
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)
Indian Computer Emergency Response Team (CERT-In) Annual Report (2010) Indian Computer Emergency Response Team (CERT-In) Department of Information Technology Ministry of Communications & Information Technology
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Closing the Vulnerability Gap of Third- Party Patching
SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage
ZNetLive Malware Monitoring
Introduction The criminal ways of distributing malware or malicious software online have gone through a change in past years. In place of using USB drives, attachments or disks to distribute viruses, hackers
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
mystanwell.com Installing Citrix Client Software Information and Business Systems
mystanwell.com Installing Citrix Client Software Information and Business Systems Doc No: 020/12 Revision No: Revision Date: Page: 1 of 16 Contents Overview... 3 1. Microsoft Internet Explorer... 3 2.
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
IBM Security Strategy
IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
How to prevent computer viruses in 10 steps
How to prevent computer viruses in 10 steps Following on from our advice on how to keep your online data secure, we ve created a follow-up outlining how you can keep your computer itself safe. Not only
What you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent
WHY PATCH MANAGEMENT MATTERS
WHY PATCH MANAGEMENT MATTERS Understanding the return on investment of managed patching for both MSPs and their customers COMMUNICATING THE VALUE OF MANAGED PATCHING As long as there are hackers willing
System Security Policy Management: Advanced Audit Tasks
System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Intro to Patching. Thomas Cameron, Chief Architect, Western US, Red Hat [email protected] twitter: thomasdcameron IRC: choirboy on Freenode
Intro to Patching Thomas Cameron, Chief Architect, Western US, Red Hat [email protected] twitter: thomasdcameron IRC: choirboy on Freenode RHCA, RHCSS, RHCDS, RHCVA, RHCX Agenda 2 Who am I? Who are you?
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Deep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric Challenges What challenges are there for Cyber Security in Industrial
ISSeG Integrated Site Security for Grids
Project No: 06745 ISSeG Integrated Site Security for Grids Specific Support Action Information Society and Media METHODOLOGY FOR SECURITY AUDITING OF NEW SITES EU DELIVERABLE: D3. Document identifier:
It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions
It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect
A Best Practice Approach to Third Party Patching
A Best Practice Approach to Third Party Patching Mike Grueber Senior Product Manager 1 Effective patch management is essential 90% of successful attacks occurred against previously known vulnerabilities
Vulnerability Intelligence & 3 rd party patch management
Vulnerability Intelligence & 3 rd party patch management Presented By: William Hamilton Melby Company Overview Brief Secunia facts Established: 2002 HQ: Copenhagen, Denmark Regional office: Minneapolis,
Information Security Threat Trends
Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: [email protected] 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2
FAQ WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2 WHAT IS UPTIME AND SPEED MONITORING 2 WHEN I TRY TO SELECT A SERVICE FROM
Reducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
Current counter-measures and responses by CERTs
Current counter-measures and responses by CERTs Jeong, Hyun Cheol [email protected] April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure
FAQS. You can schedule a WebEx session ahead or start it instantly in your choice of ways:
FAQS What is WebEx? WebEx is an easy way to exchange ideas and information with anyone, anywhere. It combines real-time desktop sharing with phone conferencing, so everyone sees the same thing as you talk.
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security
WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security A World of Constant Threat We live in a world on constant threat. Every hour of every day in every country around the globe hackers
Network Security and the Small Business
Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises,
Cyber Security. Securing Your Mobile and Online Banking Transactions
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES
PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES Ira Winkler Codenomicon Session ID: MBS-W05 Session Classification: Intermediate Zero Day Attacks Zero day attacks are rising in prominence They tend to be
