Remediating Violated Customers
|
|
|
- Crystal Todd
- 10 years ago
- Views:
Transcription
1 Remediating Violated Customers 1 1
2 Time for Remediation Action The cyber-civic society will be expecting all parties to do their part to protect against cyberthreats. This includes Service Providers. This module is based on the work in the IETF RFC 6561 Recommendations for the Remediation of Bots in ISP Networks ( tools.ietf.org/html/rfc6561) 2
3 Your Customers are Not the Problem! There was a time where users and customers were blamed for doing dumb things to get their systems infected. When users who have up to date hardware, operating systems, software, anti-virus, antimalware, and is mindfully doing the right think still getting infected, then we have to consider that the real problem is beyond the user! 3
4 This is your Network! See 4
5 Victimization Cost See 5
6 Normal Malware Cycle Creation Remediation Activation Discovery Replication Victimization 6
7 Remediation Shortens the Cycle Creation Remediation Activation Victimization Quarantine Contains infection Discovery Proactive Detection Discovers Infection In Early stage Replication Minimizing Replication and Assimilation Is the key to damage control 7
8 Principles of Remediation No one party can remediate a violated customer. It takes a team that involves the entire eco-system of operating system vendors, application providers, on-line content, anti-virus vendors, service providers, professional computer repair organizations, and the user of the device. 8
9 Expectations of Remedation No way guarantee the remediation of all bots. Bot removal is potentially a task requiring specialized knowledge, skills and tools, and may be beyond the ability of average users. Attempts at bot removal may frequently be unsuccessful, or only partially successful, leaving the user's system in an unstable and unsatisfactory state or even in a state where it is still infected. Attempts at bot removal can result in side effects ranging from a loss of data to partial or complete loss of system usability. When a when a customer s computer gets infected, we ask them to go buy a new PC. We re in Hong Kong. New PCs are cheaper than trying to clean up our customer s computer. (anonymous CTO in an SP) 9
10 Detecting BOTNET & Malware Service Providers have a range that gives them insight into which of their customers are infected. Reports (free and subscription) from external parties. Service Provider Telemetry. Partnership with Anti-Virus Vendors Helpdesk calls 10
11 Where to Start We currently have a multitude of organizations who will provide detailed and traceable (i.e. through account logs and NATs) reports. Arbor - Atlas, see Internet Systems Consortium - Secure Information Exchange (SIE), see Microsoft - Smart Network Data Services (SNDS), see SANS Institute / Internet Storm Center - DShield Distributed Intrusion Detection System, see ShadowServer Foundation, see Spamhaus - Policy Block List (PBL), see Spamhaus - Exploits Block List (XBL), see Team Cymru - Community Services, see 11
12 Alerting Violated Customers Communicating with customers is core to modern customer experience. Customer persistence and stickiness is core to reducing churn. Any rational SP strategy to reduce churn will have customer communications tools that include: Phone Walled Garden IM Web Alert Home Page Alert SMS TV Screen Alerts 12
13 Alerting Violated Customers If you know that a customer has been violated, then there are civic society expectations to let them know they are being victimized. SPs doing this today find that it is a tool to increase customer loyalty and decrease churn. Tracking violated customers means that the Service Provider must update their customer tracking & support system to know which are identified as victimized and which have been notified. 13
14 Alerting Violated Customers Notification with customers sometimes work but with all the SPAM, how do they know it is from you? notification with another approach to validate the source works best. Telephone Call Notification A simple phone call does wonders. But also needs a secondary source to validate (fake support phone calls do happen). Postal Mail Notification People do look at mail from their service provider. The notification letter can have all the information needed to help the violated customers start their remediation work. 14
15 Alerting Violated Customers Walled Garden Notification Violated customers who are not paying attention or may be other devices in the residence/business may need to be put into a walled garden to notify. Careful attention is needed to insure collateral impact to other devices in the residence/business are not impacted (i.e. medial monitoring or emergency services). Instant Message Notification Many people live on chat. A chat pop-up can be a way to get the attention of a violated customer. Short Message Service (SMS) Notification Mobile phone operators can send free SMS asking the violated customer to go to a site and run a security check. Web Browser Notification - In Social Media - 15
16 Alerting Violated Customers Web Browser Notification If the browser is where the customer lives, then explore tools that help interact at the browser level (i.e. plugins or toolbars). Social Media A large majority of customers live in social media. The same tools can be used to get the word out to violated customers. 16
17 Notification Factor Notification to Public Access Points. Alerting violated customers that are tracked from a public WIFI point may or may not be the best time to notify. A coffee shop would not be a good place to try to recover your system from a malware infection. Shared IP addresses. Many residence and businesses are behind NAT with no logging (or they will have not clue about NAT logging ). Tools to help them figure out which computer, device, or appliance is infected will be needed. Q. How do you remediate a violated Internet connected refrigerator? Q. How do you remediate a violated diabetic monitoring device? Law Enforcement Lessons on how to help a Victim of Crime are useful. The SP s support team can draw on lesson used in the LE community to help people productively cope. 17
18 I ve checked everything! Customer: I ve checked all my computers, my kids computers, my phones, my tables, my X-box, my Tivo, my printers, my furnace, my light controls, my home security system, my health monitoring system, my electric vehicle charging station, my soar panel monitoring system. Everything is patched and fixed why are you still saying I m infected with malware!? Support Team Have you checked to see if your neighbors are using your wireless? Customer: How do I do that? 18
19 Walled Garden Systems do Work Several major providers now have ½ a decade of experience with production walled garden/quarantine systems. These systems work, they have not turn off customers, and have been updated to work with E.911 and medical devices. Computer CPE Variable Access Types: Ethernet, Leased Line, ATM, Frame-Relay PPPoX Quarantine Vulnerabilty Checker POP RAS IP Tunnel Service Netw ork DC SBCIS IP Netw ork Normal traffic Tunnel Router Anomaly detection Controlled access to patch sites Peering Internet Internet Isolated network with limited / controlled access to the outside. Patch server Web Portal Scan / test SW server 19
20 Walled Gardens are Everyday Encounters We, as an industry, know how to set up our AAA to trigger a interactive user response. This is now an every day activity. There no longer a surprise factor with endusers. 20
21 Remediation Guidelines Three approaches: Self Help Point customers to a self-help site or create your own security landing page. Professional Help Ask for the user to use a professional service to clean up the malware. The professional service might offer help with the other consequence of the violation (i.e. identity theft or some other crime). Get a new computer or device Unfortunately, we could see malware evolving to the point where the hardware is violated and the only remediation is to get a new device (ask the industry for consumer capable reimaging). 21
22 Consequences of In-Action We as an industry are at a stage where Service Providers need to play their part in the remediation eco-system. Cyber-Civic society will drive for action through: Government Guidelines, Regulation, and Laws Through market forces (customer churn) Through civic legal action Through insurance underwriters demanding actions that reduce the over all risk to a system. 22
23 Homework Read through the IETF draft IETF RFC 6561 Recommendations for the Remediation of Bots in ISP Networks ( Talk to your peers at operations meeting like NANOG, RIPE, APRICOT, etc to find out what they are doing. Join the SP Security effort that will document, build, and teach remediation techniques that work. [email protected] for more information or go to and select SP Security. 23
24 US FCC s Anti-Botnet Code of Conduct 24
25 What is CSRIC? The Communications Security, Reliability and Interoperability Council's (CSRIC) mission is to provide recommendations to the FCC to ensure, among other things, optimal security and reliability of communications systems, including telecommunications, media, and public safety. We re currently in the middle of CSRIC III (see 25
26 CSRIC III CSRIC III is covering these areas: WG 1: NG WG 2: Next Generation Alerting WG 3: E9-1-1 Location Accuracy WG 4: Network Security Best Practices WG 5: DNSSEC Implementation Practices for ISPs WG 6: Secure BGP Deployment WG 7: Botnet Remediation WG 8: E9-1-1 Best Practices WG 9: Alerting Issues Associated With CAP Migration WG 10: Prioritization 26
27 CSRIC III BOTNET Remediation This Working Group will review the efforts undertaken within the international community, such as the Australian Internet Industry Code of Practice, and among domestic stakeholder groups, such as IETF and the Messaging Anti-Abuse Working Group, for applicability to U.S. ISPs. Building on the work of CSRIC II Working Group 8 ISP Network Protection Practices, the Botnet Remediation Working Group shall propose a set of agreed-upon voluntary practices that would constitute the framework for an opt-in implementation model for ISPs. The Working Group will propose a method for ISPs to express their intent to op-into the framework proposed by the Working Group. The Working Group will also identify potential ISP implementation obstacles to the newly drafted Botnet Remediation business practices and identify steps the FCC can take that may help overcome these obstacles. Finally, the Working Group shall identify performance metrics to evaluate the effectiveness of the ISP Botnet Remediation Business Practices at curbing the spread of botnet infections. 27
28 Anti-Botnet Code of Practice A voluntary code of practice was adopted to insure no unrealistic cost are imposed on the industry. Each SP is now asked to public state if they will comply with the code of practice. 28
29 What is the ABC? Encourage ISPs to Educate end-users of the threat posed by bots and of actions end-users can take to help prevent bot infections; Detect bot activities or obtain information, including from credible third parties, on bot infections among their end-user base; Notify end-users of suspected bot infections or help enable end-users to determine if they are potentially infected by bots; and Provide information and resources, directly or by reference to other sources, to end-users to assist them in remediating bot infections. 29
30 ABC s Implementation Implementation of the Code will be guided by the following principles: 1. Voluntary participation is voluntary and encourages types of actions to be taken by ISPs, however this Code does not require any particular activity. 2. Technology neutral this Code does not prescribe any particular means or methods. 3. Approach neutrality this Code does not prescribe any particular approach to implement any part of this Code. 4. Respect for privacy ISPs must address privacy issues in an appropriate manner consistent with applicable laws. 30
31 ABC s Implementation (cont) 5. Legal compliance activities must comply with applicable law. 6. Shared responsibility ISPs, acting alone, cannot fully address the threat posed by bots. Other Internet ecosystem participants must also do their part. 7. Sustainability ISPs should seek activities that are cost-effective and sustainable within the context of their business models. 8. Information sharing ISPs should indicate how they are participating in the Code and share lessons-learned from their activities with other appropriate stakeholders. All information sharing between ISPs and other involved parties must be performed in accordance with applicable laws including, but not limited to, antitrust and privacy laws. 31
32 ABC Implementation (cont) 9. Effectiveness ISPs should be encouraged to engage in activities that have been demonstrated to be appropriate and effective. 10.Effective Communication Communication with customers should take into account various issues such as language and make sure that information is provided in a manner that is reasonably expected to be understood and accessible by the recipients. 32
33 Participation Requirements To participate in this Code, an ISP will engage in at least one activity (i.e., take meaningful action) in each of the following general areas: ü Education - an activity intended to help increase end-user education and awareness of botnet issues and how to help prevent bot infections; ü Detection - an activity intended to identify botnet activity in the ISP s network, obtain information on botnet activity in the ISP s network, or enable end-users to self-determine potential bot infections on their end-user devices; ü Notification - an activity intended to notify customers of suspected bot infections or enable customers to determine if they may be infected by a bot; ü Remediation - an activity intended to provide information to endusers about how they can remediate bot infections, or to assist end-users in remediating bot infections. ü Collaboration - an activity to share with other ISPs feedback and experience learned from the participating ISP s Code activities. 33
34 Education End-users are ultimately responsible for protection of their devices and for remediating an infected device. ISPs, like many other Internet participants and government actors, can assist in helping to educate end-users about the threats presented by bots and the steps end-users can take to protect their devices and remediate infections. Education about bot prevention Support of end-user bot remediation efforts 34
35 Education Guidelines: In addressing the above requirements, ISPs should consider these guidelines: Offer educational information and resources directly or through referral to third party services. Keep educational content concise and focused on the most important things users need to know. Ensure that instructions can be followed by an audience of non-technical users. Use multiple media, e.g., images, videos, text, captions, etc., and, where helpful, multiple languages to maximize customer understanding and accessibility. Help end-users determine if they have a bot infection by providing information or pointing to resources that describe anomalous behaviors of bot infected devices and the availability and use of bot detection software tools or services. 35
36 Detection ISPs can find out about malicious activity and bot compromised end-user devices in a variety of ways: Receiving notifications from external entities, particularly those designed to aid with the overall understanding and real-time dissemination of bot related data. A list of resources is listed in Appendix 2. Deploying capabilities within their networks that aid in identifying potential bot infections. Directing customers to tools, a web portal, or other resources that enable customers to self-identify a potential bot infection. 36
37 Notification Recommended Action: Provide communication of a suspected bot infection to the customer or help enable customers to determine if they are potentially infected by bots. Many notification methods are outlined in references in Appendix 2; however, other methods may be used. The problem: Appendix 2 did not reference other methods. 37
38 Remediation Recommended Action: 1. Bots are designed to be stealthy and difficult to remove. As part of the notification, ISPs should offer guidance, as described above. This may include links to a variety of publically available online and third party sources of information, software, and tools. It might also include links to professional services. These need not be offered by the ISP itself but may be offered by third parties. 38
39 Remediation (cont) 2. An ISP may provide remediation tools to the enduser, either during or after the notification process. However, the ISP should not mandate that the end-user run remediation tools. If the ISP provides tools to the end-user, the end-user should be allowed to exit the process without running any suggested tools or procedures. 3. As part of the notification process, ISPs may wish to include guidance (depending on the nature of the bot in question) that settings on customer owned network equipment such as home gateways and routers may have been altered and should be restored to a secure state, depending on the nature of the bot infection. 39
40 Collaboration Recommended Action: Code participation requires collaboration within ISP, industry, or broader fora through collaborative activities, of which the following are examples: Sharing detection, notification, or mitigation methods planned for or deployed in ISP networks, and where practical an evaluation of their effectiveness. Sharing of intelligence or operational attack data that may be useful in bot prevention, defense, or remediation. Identification of key data or technical resources that are needed from systems or actors beyond the ISP network. Participation in definition, development, or operation of integrated defense strategies or systems which extend beyond the boundaries of the ISP network. Other collaboration activities involving the sharing of information with parties outside the ISP or data with systems outside of the ISP network. 40
41 Impact to the Business (No ABC) CAPEX Capital expense on equipment OPSEC The over all Operational cost of certi=ication, deployment, testing, integration, and maintenance. CPGA Cost per gross subscriber add (primarily subsidies & provisioning) ARPU Average revenue per user month CCPU Cash cost per user per month, ex- marketing (backhaul, customer support, maintenance, & overhead) Churn - % number of subscribers disconnecting each month Violated customer require more resources from over the top cyber-criminals. Help desk calls, excess bandwidth consumption, and abuse process all increase OPSEC No impact. Basic services no extra security services BOTNET violated customer take on more resources on the overall system. Perception of slow internet services churn the customer. 41
42 Impact to the Business (w/ ABC) CAPEX Capital expense on equipment OPSEC The over all Operational cost of certi=ication, deployment, testing, integration, and maintenance. CPGA Cost per gross subscriber add (primarily subsidies & provisioning) ARPU Average revenue per user month Additional CAPEX to deploy the ABCs Automated notification systems facilitate call deflection. Security add on features have new cost with new revenue. Security features increase ARPU. CCPU Cash cost per user per month, ex- marketing (backhaul, customer support, maintenance, & overhead) Churn - % number of subscribers disconnecting each month Clean customs with new security capabilities have over all savings on the system. Big SPs who deploy something like the ABCs report lower churn. 42
43 Shoestring ABC Compliance Education Create a /security page team up with a non-profit industry organization to provide education. Detection Subscribe to the free feeds from Shadowserver, Team CYMRU, and Microsoft. Notification Deploy a notification system and a billing notification system. Remediation Same as education. Collaboration - Deploy Passive DNS on your DNS Resolvers. Deploy a Dragon Research, Arbor Atlas, and Shadowserver.org box in your Sink Hole (dark IP monitoring). Join groups like MAAWG, OPSEC Trust, NSP-SEC and others. 43
44 Home Work Sitting around waiting for your customers violated by malware to adversely impact your business is not a wise business decision. Recommend action given that there are cost effective means to take action now. 44
Create Extraordinary Online Consumer Experiences. Your Journey Begins with Nominum
Create Extraordinary Online Consumer Experiences Your Journey Begins with Nominum What does it mean to do business with the world s DNS innovation leader? Your Internet services are built on bedrock. Nominum.
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]
Cisco Cloud Web Security Cisco IT Methods Introduction Malicious scripts, or malware, are executable code added to webpages that execute when the user visits the site. Many of these seemingly harmless
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team The Internet is in the midst of a global network pandemic. Millions of computers
Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013
the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered
Endpoint Security: Moving Beyond AV
Endpoint Security: Moving Beyond AV An Ogren Group Special Report July 2009 Introduction Application whitelisting is emerging as the security technology that gives IT a true defense-in-depth capability,
Security Intelligence Services. www.kaspersky.com
Kaspersky Security Intelligence Services. Threat Intelligence Services www.kaspersky.com THREAT INTELLIGENCE SERVICES Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
Next Generation IPS and Reputation Services
Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
Cyber Security: Cyber Incident Response Guide. A Non-Technical Guide. Essential for Business Managers Office Managers Operations Managers.
The Cyber Security: Cyber Incident Response Guide appendix has been developed and distributed for educational and non-commercial purposes only. Copies and reproductions of this content, in whole or in
Top 10 Reasons Enterprises are Moving Security to the Cloud
ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
Cisco Advanced Malware Protection
Solution Overview Cisco Advanced Malware Protection Breach Prevention, Detection, Response, and Remediation for the Real World BENEFITS Gain unmatched global threat intelligence to strengthen front-line
Virtual Patching: a Proven Cost Savings Strategy
Virtual Patching: a Proven Cost Savings Strategy An Ogren Group Special Report December 2011 Executive Summary Security executives, pushing the limits of traditional labor-intensive IT patch processes
Putting the Tools to Work DDOS Attack
Putting the Tools to Work DDOS Attack 1 DDOS = SLA Violation! Hacker ISP CPE Target What do you tell the Boss? SP s Operations Teams have found that they can express DDOS issues as SLA violations, which
WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware
WHITEPAPER How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware How a DNS Firewall Helps in the Battle against Advanced As more and more information becomes available
Information Security Incident Management Guidelines
Information Security Incident Management Guidelines INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu Version #1.0, June 21, 2006 Copyright 2006 by The Regents of The University of
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS
1 2013 Infoblox Inc. All Rights Reserved. Securing the critical service - DNS Dominic Stahl Systems Engineer Central Europe 11.3.2014 Agenda Preface Advanced DNS Protection DDOS DNS Firewall dynamic Blacklisting
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
IT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Local Government Cyber Security:
The Local Government Cyber Security: Cyber Incident Response Guide appendix has been developed and distributed for educational and non-commercial purposes only. Copies and reproductions of this content,
Security Controls Implementation Plan
GIAC Enterprises Security Controls Implementation Plan Group Discussion and Written Project John Hally, Erik Couture 08/07/2011 Table of Contents Executive Summary 3 Introduction 3 Security Controls Implementation
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT OVERVIEW The National Institute of Standards of Technology Framework for Improving Critical Infrastructure Cybersecurity (The NIST Framework) is a
Deep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK
HANDBOOK VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK CONSIDERATIONS FOR SERVICE ADOPTION Version 1.0 July 2014 VerisignInc.com CONTENTS 1. WHAT IS A DDOS PROTECTION SERVICE? 3 2. HOW CAN VERISIGN
O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y
Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response workflow guide. This guide has been created especially for you for use in within your security
Arbor s Solution for ISP
Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard
Cisco Security IntelliShield Alert Manager Service
Data Sheet Cisco Security IntelliShield Alert Manager Service The Cisco Security IntelliShield Alert Manager Service provides a comprehensive, cost-effective solution for delivering the security intelligence
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Advantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
IBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
Network Security Policy: Best Practices White Paper
Security Policy: Best Practices White Paper Document ID: 13601 Introduction Preparation Create Usage Policy Statements Conduct a Risk Analysis Establish a Security Team Structure Prevention Approving Security
Modular Network Security. Tyler Carter, McAfee Network Security
Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution
I D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
APPLICATION PROGRAMMING INTERFACE
DATA SHEET Advanced Threat Protection INTRODUCTION Customers can use Seculert s Application Programming Interface (API) to integrate their existing security devices and applications with Seculert. With
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
NAC at the endpoint: control your network through device compliance
NAC at the endpoint: control your network through device compliance Protecting IT networks used to be a straightforward case of encircling computers and servers with a firewall and ensuring that all traffic
Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy
Overview An Evolution Improving Trust, Confidence & Safety working together to fight the e-mail beast Holistic strategy Prescriptive guidance and user education, collaboration & technology Evolution of
Your security is our priority
Your security is our priority Welcome to our Cash Management newsletter for businesses. You will find valuable information about how to limit your company s risk for fraud. We offer a wide variety of products
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
Managed Services. Business Intelligence Solutions
Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
How Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness
The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness Abstract Area: ROADMAP FOR THE FURTHER EVOLUTION OF THE INTERNET GOVERNANCE ECOSYSTEM Entitled by: Cristine Hoepers, Klaus Steding-Jessen,
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Information and Communication Technology. Patch Management Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
Security MWC 2014. 2013 Nokia Solutions and Networks. All rights reserved.
Security MWC 2014 2013 Nokia Solutions and Networks. All rights reserved. Security Ecosystem overview Partners Network security demo + End-user security demo + + + + NSN end-to-end security solutions for
DDoS Attacks Can Take Down Your Online Services
DDoS Attacks Can Take Down Your Online Services Dr. Bill Highleyman Managing Editor, Availability Digest Continuity Insights New York 2014 October 8, 2014 [email protected] Who Am I? Dr. Bill
THE BEST WAY TO CATCH A THIEF. Patrick Bedwell, Vice President, Product Marketing
THE BEST WAY TO CATCH A THIEF Patrick Bedwell, Vice President, Product Marketing AlienVault Vision Accelerating and simplifying threat detection and incident response for IT teams with limited resources,
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
State of Vermont. Intrusion Detection and Prevention Policy. Date: 11-02-10 Approved by: Tom Pelham Policy Number:
State of Vermont Intrusion Detection and Prevention Policy Date: 11-02-10 Approved by: Tom Pelham Policy Number: 1 Table of Contents 1.0 Introduction... 3 1.1 Authority... 3 1.2 Purpose... 3 1.3 Scope...
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Your Security Challenges Defending the Dynamic Network! Dynamic threats 䕬 䕬 䕬 䕬 Many threats
Cyber Incident Response
State Capitol P.O. Box 2062 Albany, NY 12220-0062 www.its.ny.gov New York State Information Technology Standard IT Standard: Cyber Incident Response No: NYS-S13-005 Updated: 03/20/2015 Issued By: NYS ITS
Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013
Security workshop Belnet Aris Adamantiadis Brussels 18 th April 2013 Agenda What is a botnet? Symptoms How does it work? Life cycle How to fight against botnets? Proactive and reactive NIDS 2 What is a
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com
Kaseya White Paper Endpoint Security Fighting Cyber Crime with Automated, Centralized Management www.kaseya.com To win the ongoing war against hackers and cyber criminals, IT professionals must do two
KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks
KASPERSKY DDOS PROTECTION Discover how Kaspersky Lab defends businesses against DDoS attacks CYBERCRIMINALS ARE TARGETING BUSINESSES If your business has ever suffered a Distributed Denial of Service (DDoS)
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
Seven Strategies to Defend ICSs
INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
