The Microsoft JPEG Vulnerability and the Six New Content Security Requirements

Size: px
Start display at page:

Download "The Microsoft JPEG Vulnerability and the Six New Content Security Requirements"

Transcription

1 The Microsoft JPEG Vulnerability and the Six New Content Security Requirements

2 Table of Contents OVERVIEW THE VULNERABILITY DESCRIPTION NEEDED: A NEW PARADIGM IN CONTENT SECURITY PRACTICAL EXPLOIT SCENARIOS...5 SCENARIO 1: ATTACHMENT...5 SCENARIO 2: IMAGE ON A WEB PAGE...5 SCENARIO 3: WITH A LINKED IMAGE THE THEORETICAL MEGA VIRUS SITE OWNERS PROBLEMS THE SHORTCOMINGS OF EXISTING SOLUTIONS A NEW APPROACH TO BLENDED SMTP-HTTP ATTACKS THE SIX NEW CONTENT SECURITY REQUIREMENTS...10 CONTACT INFORMATION Aladdin Knowledge Systems. All rights reserved 2-11

3 Overview In November 2004, a critical Microsoft security vulnerability (MS04-028) was discovered which could allow attackers to embed malicious code inside JPEG image files, the most ubiquitous image files used. Until that time, JPEG image files were considered immune to attack. The fact that JPEG files can contain malicious code creates a much more serious vulnerability than initially realized. Conventional desktop and anti-virus solutions have created a false sense of security, particularly with the fact that Microsoft has released a patch for only Windows XP, Windows 2003 Server and MS Office. There is no patch available or planned for Windows 9x, Windows NT, and Windows 2000 platforms, although they are still in use. To effectively deal with this vulnerability, security and IT professionals will need to incorporate six new and critical content security requirements (described in Section Number 8) into their networks. First, however, we need to look at the nature of this new threat. 1. The Vulnerability description The JPEG GDI+ files processing vulnerability affects most Microsoft platforms and applications (see Microsoft security bulletin MS at It allows an attacker to execute malicious code when a vulnerable application is used for viewing an infected JPEG image. The list of vulnerable applications is very long and includes numerous popular Microsoft applications as well as many applications developed using Microsoft GDI+ libraries. The malicious code itself could be used to elevate rights, allow remote access, initiate worms, steal information and download and execute other malicious code from the Internet. Several hacker toolkits exploiting this vulnerability are readily available. These toolkits can be used to create custom-infected JPEG images containing the hackers' choice of malicious code. At the time of writing, infected images have already spread via chat and newsgroups: In a recently discovered attack, the JPEG itself contained a small footprint code which -- once executed -- connected by FTP to the hacker s servers, downloaded other hacking tools totaling nearly 2MB, and installed a backdoor Trojan as a service. It also installed RadMin, a commercial remote administration application which allows a complete take-over of "owned" machines -- as hackers like to call them. "Once this JPEG overflowed GDI+, it phoned home, connected to an FTP site and downloaded almost 2MB of stuff. It installs a Trojan that installs itself as a service. The Trojan also installs Radmin, a package that allows users to remotely administer a machine across the Internet, running under the name of r_server." Several factors contribute to make this vulnerability especially dangerous: 1. JPEG is probably the most common image file format and can be found in web pages, attachments, FTP sites, zip files and more. 2. Most Microsoft applications are vulnerable Aladdin Knowledge Systems. All rights reserved 3-11

4 3. A new blended-threat attack vector, mixing HTTP and SMTP protocols, can easily penetrate conventional anti-virus solutions. 4. Microsoft has released a patch only for Windows XP, Windows 2003 Server and MS Office. There is no patch available or planned for Windows 9x, Windows NT, Windows 2000 platforms although they are still in use. 2. Needed: A New Paradigm in Content Security Up until now, all graphic files, including JPEG, were considered safe and were not inspected. This now incorrect assumption is exacerbated by the fact that many organizations only have two levels of anti-virus defense -- desktop anti-virus and antivirus. Both of these defenses are completely inadequate to protect against this vulnerability and can allow hackers to easily implant viruses through exploited JPEG files. Desktop anti-virus limitation Desktop anti-virus can only see and inspect files written or downloaded to the hard drive. However, JPEG files are rendered by the browser in memory and as soon as the first chunk of data arrives from the web server, the browser will start processing it; this increases the possible buffer overflow and execution of the embedded virus. anti-virus limitation In case of anti-virus, the infected image will in most cases reside on a web server with the having just a link to it (see scenario 3 below). Conventional anti-virus products, which reside on an Exchange server or on an SMTP relay, will see nothing suspicious or malicious in the -- just a regular link -- and will allow it in. Outlook or Outlook Express clients will then download the requested image from the web server via the HTTP protocol. As the user is viewing the the exploit initiates. Circumventing file inspection Most anti-virus products can now be configured to inspect JPEG images. The problem, however, is that they rely on the file extension to identify a file as a JPEG. There are many JPEG extensions, such as the common.jpg and JPEG extensions, as well as lesser known ones such as SJP and HSI. File extensions could also be changed by hackers to BMP, GIF or others. But probably the most problematic extension issue is that Internet Explorer, Outlook and other applications would process a JPEG image even if the extension is as random as ABC. Relying on patches is not enough The availability of Microsoft security patch is also not the answer. Organizations cannot fully rely on this "You can set your antivirus scanner to look for JPEG, but the trouble is that you can change the file extension on a JPEG to so many things." "Internet Explorer processes JPEGs before it caches them. That could also mean that desktops may become infected before antivirus software has a chance to work." patch because they might still use Windows 2000 servers or other legacy systems that cannot be patched. The most serious risk is the lack of total control of what is connected to the network. A non-patched desktop or laptop, or a newly installed operating system that is not yet patched, could always be connected to the local area network. It just takes one vulnerable computer to contaminate the entire network or create a backdoor into the organization Aladdin Knowledge Systems. All rights reserved 4-11

5 From now on, it is not enough to rely only on a desktop and anti-virus solutions. Organizations MUST implement gateway solutions that inspect for vulnerabilities in JPEG files coming from the web via HTTP and FTP protocols, and also make sure that the solution is secured against spoofing. 3. Practical Exploit Scenarios Below are a few typical scenarios in which the JPEG vulnerability can be exploited, along with descriptions of the associated problems. Scenario 1: Attachment Method: An attacker sends an with an attached JPEG file containing malicious code. The code is executed the moment the image is viewed or previewed in Outlook / Outlook Express, or opened in a vulnerable associated application. Solution: Inspect all attachments. Most anti-virus solutions were updated to inspect JPEG attachments. Problems: Some anti-virus products do not know how to handle file spoofing and rely on file extension and MIME type for identification as images. Scenario 2: Image on a Web Page Method: An attacker places an infected image on a web server, possibly as part of web page content. An image on an FTP server could be linked in a web page or accessed directly. The code is executed the moment the image is viewed in an infected application such as Internet Explorer Aladdin Knowledge Systems. All rights reserved 5-11

6 Solution: Inspect all JPEG files in web pages (HTTP and FTP traffic.) Problems: Most gateway solutions do not inspect JPEG files in HTTP and FTP. Mainstream solutions that do inspect HTTP/FTP traffic are proxy-based and must cache the images before inspection. Some proxy solutions also have to copy the file from the caching proxy to the content security server, resulting in serious performance impact. In addition, proxy servers will now be forced to inspect 80% more files that were not inspected in the past. This fact alone could mean over 5 times slower HTTP inspection. Scenario 3: with a linked image Method: An attacker or spammer sends an containing an HTML image link to a JPEG containing malicious code. The JPEG itself resides on a web server and is automatically downloaded via HTTP when the is viewed or previewed. The code is executed the moment the image is viewed or previewed in Outlook / Outlook Express. As seen in the example above, the HTML content will be inspected by anti-virus products, but the image will be transparently downloaded via HTTP and will not be inspected by the anti-virus solution. To the right of the image we can see the HTML coded image link to a web server Aladdin Knowledge Systems. All rights reserved 6-11

7 Solution: Inspect all and all HTTP traffic for JPEG exploits. Problems: Conventional solutions either only inspect JPEG files in SMTP or suffer from the HTTP limitations discussed in Scenario The Theoretical Mega Virus Taking the scenarios above and expanding on them, it is clear that some highly threatening new mega viruses based on the JPEG exploit could emerge in the near future. Imagine a JPEG worm that, upon infection of a vulnerable PC, connects to a specific destination on the Internet, downloads more malicious code, hacker tools and back doors, and then creates a local mini web server. Below is a theoretical evolution of such a JPEG mega-worm: 1. Attack starts with the arrival of infected content. This might be via , instant message or other means. 2. As the image is viewed, the exploit executes and contacts another computer of the hacker or an infected system. 3. Malicious payload is downloaded directly from the remote computer. This can include a variety of hacking tools, backdoors, remote control Trojans, spamspreading tools, etc. 4. The now infected computer starts spreading via multiple methods: - with image links - links to infected web sites - instant messenger links - instant messengers image file transfers - P2P image collections - chat room file transfer and links 5. With most of the infection methods, the image itself will be downloaded via HTTP from the original computer which now acts as a web server hosting the image files Aladdin Knowledge Systems. All rights reserved 7-11

8 5. Site Owners Problems Site owners, especially community sites as well as hosting farms, could face a serious situation where their sites are the source of malicious code. Beyond the obvious problems raised by such a scenario is the increased risk of legal liability. Some potential examples include: Newsgroup sites: many newsgroups are allowing web access to image files. Because of the relative anonymity, newsgroups are one of the first "test sites" for such attacks -- as we have already seen in the JPEG vulnerability. Forum sites: many of these sites allow users to upload images or even worse, use images as signatures in all their postings -- greatly increasing the exposure potential. Community sites: MSN and Yahoo communities, among others, allow the creation of photo albums. ecommerce sites: many ecommerce sites such as ebay, and many community portals, allow sellers to upload images of the goods they sell. Creating infected "too good to be true" ads will guarantee many viewers. Photo sites: Many photo-serving sites exist which allow users to upload images. The images can be linked in other sites or sent by . Googling: Google and other web image search services could provide easy access to infected images. 6. The Shortcomings of Existing Solutions As mentioned before, desktop solutions inspect only files written to disk -- but not code that runs in memory, as can happen with the JPEG exploit. Mail server anti-virus solutions are limited by the fact that they do not inspect images that are downloaded or linked in HTTP. While most gateway-level security solutions inspect JPEG attachments, most do not inspect JPEG files in HTTP and FTP (see exploit scenarios 2 and 3 in Section 3). Conventional solutions that do inspect HTTP/FTP traffic are proxy-based, and cache the images before inspection. Some proxy solutions also require that the file be moved from the caching proxy to the content security server, significantly impacting performance. The problem with caching and proxybased solutions is that they have to download the entire file before it is sent to the client, because existing anti-virus solutions are unable to inspect files packet by packet. It is also not permissible to release small parts of the file before inspection is completed -- as is done today by some solutions in order to overcome Chart 1: Proxy-based AV scanner workflow 2004 Aladdin Knowledge Systems. All rights reserved 8-11

9 the time-out problem -- because the browser starts processing JPEG files even if partially downloaded and this can trigger the vulnerability. To overcome the spoofing problem of sending infected JPEG files with different extension or content type, proxy solutions now must send 100% of the passing files to the external antivirus product and can no longer rely on filtering the content beforehand (e.g., send only ZIP and EXE files). Some proxy solutions claim very fast performance, but this is only true in the case of files that were already cached. In reality, a proxy cache approach delivers only about 30% to 40% of browsing content, with the rest being new files which will have to be inspected prior to being cached. 7. A New Approach to Blended SMTP-HTTP attacks The only practical gateway content security technology on the market today that can deal with JPEG exploits is Aladdin s patented NitroInspection technology. esafe Gateway with NitroInspection is able to correctly identify (prevent file spoofing) and inspect JPEG files with a minimal impact on browsing performance. The JPEG files are identified using a binary identifier in the file header (a magic string) regardless of the file extension or the content type sent by the web server, thus preventing a common spoofing technique used by hackers. Once the JPEG file is identified, its session is handled by the NitroInspection real-time inspection engine, which inspects data in each packet as they arrive and does not wait until the entire file is downloaded before inspection. This leads to a lower latency and no visible impact on the users' browsing experience. Chart 2: esafe with NitroInspection technology All "good" JPEG files will continue to gradually build-up on screen as they are being downloaded, and "bad" files will instantly be blocked before they have a chance to arrive at the browser. esafe solution Benefits: JPEG inspection is performed while files are in transit -- no time-consuming file caching like all other solutions which are proxy-based. JPEG inspection is completely transparent and has minimal impact on web content security performance Aladdin Knowledge Systems. All rights reserved 9-11

10 JPEG exploits are now blocked in HTTP and FTP traffic as well as SMTP. This is extremely important as can be seen in exploit scenario 2 in Section 3, above. JPEG inspection is integrated into esafe's NitroInspection engine. JPEGs are positively identified by binary signature in the file header to prevent spoofing. 8. The Six New Content Security Requirements IT professionals today are charged with the security of their organization s data, compliance with all applicable privacy and confidentiality regulations, and the effective performance of mission-critical applications in support of business requirements. The JPEG vulnerability presents a serious threat to all of these, and dictates a new way of implementing content security: 1. Don t rely on SMTP or internal mail server content inspection. A complete solution must be a gateway solution and must inspect HTTP and FTP in addition to SMTP. 2. Identification of JPEG files should not rely on extensions, or content type, to prevent spoofing. 3. JPEG files should be inspected packet-by-packet in real time to eliminate latency. Users should not have to wait until the entire file is downloaded and inspected by the proxy. 4. All parts of the JPEG file must be fully inspected before being released to the client. Solutions cannot rely on partially releasing non-inspected content. 5. The gateway solution must not pose any delays and timeouts or create any visible impact on users' browsing experience -- either when cached JPEG files are delivered or when new images are downloaded. 6. For hosted web sites that allow file uploads, inspect all uploaded JPEG files Aladdin Knowledge Systems. All rights reserved 10-11

11 Contact Information For more info: ealaddin.com/esafe International North America UK Germany Benelux France Israel Japan Spain T: , T: , T: , T: , T: , T: , T: , T: , T: , About Aladdin Knowledge Systems Aladdin (NASDAQ: ALDN) is a leader in digital security, providing solutions for software digital rights management and Internet security since 1985, serving more than 30,000 customers worldwide. Aladdin products include: the USBbased etoken device for strong user authentication and e-commerce security; the esafe line of integrated content security solutions that protect networks against malicious, inappropriate and nonproductive Internet-borne content; and the HASP family of hardware- and software-based products that flexibly protect, license and distribute software and intellectual property. Visit the Aladdin Web site at For free trial software, success stories and additional white-papers, visit esafe.com. If you would like to obtain pricing or suggestions on esafe for your organization s architecture, please contact one of the Aladdin offices listed above Aladdin Knowledge Systems. All rights reserved 11-11

Content Inspection Director

Content Inspection Director Content Inspection Director High Speed Content Inspection North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware Ltd. 22 Raoul Wallenberg St. Tel

More information

Attack Intelligence Research Center Monthly Threat Report MalWeb Evolution and Predictions

Attack Intelligence Research Center Monthly Threat Report MalWeb Evolution and Predictions Attack Intelligence Research Center Monthly Threat Report MalWeb Evolution and Predictions A l a d d i n. c o m / e S a f e Overview Web security has been struggling for a long time with its own definition.

More information

Top five strategies for combating modern threats Is anti-virus dead?

Top five strategies for combating modern threats Is anti-virus dead? Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.

More information

Attack Intelligence Research Center Monthly Threat Report MalWeb Continues to Make Waves on Legitimate Sites

Attack Intelligence Research Center Monthly Threat Report MalWeb Continues to Make Waves on Legitimate Sites Attack Intelligence Research Center Monthly Threat Report MalWeb Continues to Make Waves on Legitimate Sites A l a d d i n. c o m / e S a f e Following up on some recent attacks, the AIRC team wanted to

More information

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..

More information

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda

More information

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security White Paper September 2003 Abstract The network security landscape has changed dramatically over the past several years. Until

More information

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network. Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

INSTANT MESSAGING SECURITY

INSTANT MESSAGING SECURITY INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part

More information

WHITE PAPER. Understanding How File Size Affects Malware Detection

WHITE PAPER. Understanding How File Size Affects Malware Detection WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Top Four Considerations for Securing Microsoft SharePoint

Top Four Considerations for Securing Microsoft SharePoint Top Four Considerations for Securing by Chris McCormack, Product Marketing Manager, Sophos is now the standard for internal and external collaboration and content management in much the same way Microsoft

More information

INSIDE. Malicious Threats of Peer-to-Peer Networking

INSIDE. Malicious Threats of Peer-to-Peer Networking Symantec Security Response WHITE PAPER Malicious Threats of Peer-to-Peer Networking by Eric Chien, Symantec Security Response INSIDE Background Protocols New Vector of Delivery Malicious Uses of Peer-to-Peer

More information

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link) NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

Practical tips for a. Safe Christmas

Practical tips for a. Safe Christmas Practical tips for a Safe Christmas CONTENTS 1. Online shopping 2 2. Online games 4 3. Instant messaging and mail 5 4. Practical tips for a safe digital Christmas 6 The Christmas holidays normally see

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

Attacks from the Inside

Attacks from the Inside Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The

More information

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0. Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0 Page 1 of 9 Table of Contents Table of Contents... 2 Executive Summary...

More information

The Benefits of SSL Content Inspection ABSTRACT

The Benefits of SSL Content Inspection ABSTRACT The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic

More information

Thexyz Premium Webmail

Thexyz Premium Webmail Webmail Access all the benefits of a desktop program without being tied to the desktop. Log into Thexyz Email from your desktop, laptop, or mobile phone, and get instant access to email, calendars, contacts,

More information

How to detect hackers on your web server

How to detect hackers on your web server How to detect hackers on your web server Catch hackers red handed through real-time security event log monitoring A discussion of the methods used by hackers to attack IIS web servers, and how you can

More information

Test Case - Privatefirewall 5.0, Intrusion and Malware Defense

Test Case - Privatefirewall 5.0, Intrusion and Malware Defense Test Case - Privatefirewall 5.0, Intrusion and Malware Defense Objective and Methodology: Privatefirewall is a desktop defense application comprised of several distinct technology layers designed to block

More information

Evolutionism of Intrusion Detection

Evolutionism of Intrusion Detection Evolutionism of Intrusion Detection Jackie Lai The network technology changes with each passing day; and the attack technique of hacker also weeds through the old to bring forth the new. Worms such as

More information

ANTIVIRUS BEST PRACTICES

ANTIVIRUS BEST PRACTICES ANTIVIRUS BEST PRACTICES Antivirus Best Practices 1. Introduction This guideline covers the basics on Antivirus Software and its best practices. It will help to have an overall understanding of the subject

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features

More information

Stopping secure Web traffic from bypassing your content filter. BLACK BOX

Stopping secure Web traffic from bypassing your content filter. BLACK BOX Stopping secure Web traffic from bypassing your content filter. BLACK BOX 724-746-5500 blackbox.com Table of Contents Introduction... 3 Implications... 4 Approaches... 4 SSL CGI Proxy... 5 SSL Full Proxy...

More information

Uncover security risks on your enterprise network

Uncover security risks on your enterprise network Uncover security risks on your enterprise network Sign up for Check Point s on-site Security Checkup. About this presentation: The key message of this presentation is that organizations should sign up

More information

ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS

ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS OCIO-6006-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. Purpose II. Authority III. Scope IV. Definitions V. Policy VI. Roles and Responsibilities VII. Exceptions

More information

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure

More information

Statistical Analysis of Internet Security Threats. Daniel G. James

Statistical Analysis of Internet Security Threats. Daniel G. James Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There

More information

THE ROLE OF IDS & ADS IN NETWORK SECURITY

THE ROLE OF IDS & ADS IN NETWORK SECURITY THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

AntiVirus and AntiSpam email scanning The Axigen-Kaspersky solution

AntiVirus and AntiSpam email scanning The Axigen-Kaspersky solution AntiVirus and AntiSpam email scanning The Axigen-Kaspersky solution The present document offers a comprehensive analysis of the ways to secure corporate email systems. It provides an expert opinion on

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ

More information

Firewall and UTM Solutions Guide

Firewall and UTM Solutions Guide Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: info@lsasystems.com Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers

More information

Firewalls Overview and Best Practices. White Paper

Firewalls Overview and Best Practices. White Paper Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not

More information

Web Gateway Security for Large Enterprises and Service Providers

Web Gateway Security for Large Enterprises and Service Providers Web Gateway Security for Large Enterprises and Service Providers A l a d d i n. c o m / e S a f e The New Web Threat Worry About the Message, not Just the Messenger Today, the main method of dealing with

More information

Check Point FireWall-1 HTTP Security Server performance tuning

Check Point FireWall-1 HTTP Security Server performance tuning PROFESSIONAL SECURITY SYSTEMS Check Point FireWall-1 HTTP Security Server performance tuning by Mariusz Stawowski CCSA/CCSE (4.1x, NG) Check Point FireWall-1 security system has been designed as a means

More information

Countermeasures against Bots

Countermeasures against Bots Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer

More information

Intro to Firewalls. Summary

Intro to Firewalls. Summary Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer

More information

Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses

Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses 1. Why do I need a Web security or gateway anti-spyware solution? Malware attack vector is rapidly shifting from

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

Firewalls for small business

Firewalls for small business By James Thomas DTEC 6823 Summer 2004 What is a firewall? Firewalls for small business A firewall is either hardware, software or a combination of both that is used to prevent, block or should I say try

More information

Our Mission. Provide traveling, remote and mobile laptop users with corporate-level security

Our Mission. Provide traveling, remote and mobile laptop users with corporate-level security Our Mission Provide traveling, remote and mobile laptop users with corporate-level security The Challenge When connecting to the Internet from within the corporate network, laptop users are protected by

More information

Email Security - A Holistic Approach to SMBs

Email Security - A Holistic Approach to SMBs Implementing the latest anti-virus software and security protection systems can prevent many internal and external threats. But these security solutions have to be updated regularly to keep up with new

More information

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Guideline for Prevention of Spyware and other Potentially Unwanted Software Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,

More information

Choose Your Own - Fighting the Battle Against Zero Day Virus Threats

Choose Your Own - Fighting the Battle Against Zero Day Virus Threats Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats 1 of 2 November, 2004 Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats Choose Your Weapon: Fighting the Battle

More information

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach 100% Malware-Free E-mail: A Guaranteed Approach 2 100% Malware-Free E-mail: A Guaranteed Approach Panda Security's Mail Filtering Managed Service Guarantees Clean E-mail Table of Contents Table of Contents...

More information

The Critical Importance of Three Dimensional Protection (3DP) in an Intrusion Prevention System

The Critical Importance of Three Dimensional Protection (3DP) in an Intrusion Prevention System The Critical Importance of Three Dimensional Protection (3DP) in an Intrusion Prevention System Top Layer Networks, Inc. Enterprises without a sound intrusion prevention strategy across the three threat

More information

4 Steps to Effective Mobile Application Security

4 Steps to Effective Mobile Application Security Mobile Application Security Whitepaper 4 Steps to Effective Mobile Application Security Table of Contents Executive Summary 3 Mobile Security Risks in Enterprise Environments 4 The Shortcomings of Traditional

More information

The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions

The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions The evolution of virtual endpoint security Comparing vsentry with traditional endpoint virtualization security solutions Executive Summary First generation endpoint virtualization based security solutions

More information

Proxy Server, Network Address Translator, Firewall. Proxy Server

Proxy Server, Network Address Translator, Firewall. Proxy Server Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as

More information

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013 Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR 場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR Minimum Requirements of Security Management and Compliance

More information

ViRobot Desktop 5.5. User s Guide

ViRobot Desktop 5.5. User s Guide ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even

More information

Web Tap: Detecting Covert Web Traffic. Presented By: Adam Anthony

Web Tap: Detecting Covert Web Traffic. Presented By: Adam Anthony Web Tap: Detecting Covert Web Traffic Presented By: Adam Anthony Outline Problem Description Web Tap's Goals Web Tap's Significance Threat Model Implementation Evaluation Future Work Conclusion Typical

More information

ANDRA ZAHARIA MARCOM MANAGER

ANDRA ZAHARIA MARCOM MANAGER 10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal

More information

Antivirus Best Practices

Antivirus Best Practices Antivirus Best Practices A Net Sense White Paper By Greg Reynolds Consultant (919) 870-8889 (800) 642-8360 Net Sense 1 www.netsense.info Antivirus Best Practices by Greg Reynolds A virus outbreak on your

More information

Securing Corporate Email on Personal Mobile Devices

Securing Corporate Email on Personal Mobile Devices Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...

More information

Practical guide for secure Christmas shopping. Navid

Practical guide for secure Christmas shopping. Navid Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security

More information

Websense Web Security Solutions

Websense Web Security Solutions Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Web 2.0 Challenge The Internet is rapidly evolving. Web 2.0 technologies are dramatically changing the way people

More information

FIREWALL POLICY November 2006 TNS POL - 008

FIREWALL POLICY November 2006 TNS POL - 008 FIREWALL POLICY November 2006 TNS POL - 008 Introduction Network Security Services (NSS), a department of Technology and Network Services, operates a firewall to enhance security between the Internet and

More information

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

What is Firewall? A system designed to prevent unauthorized access to or from a private network. What is Firewall? A system designed to prevent unauthorized access to or from a private network. What is Firewall? (cont d) Firewall is a set of related programs, located at a network gateway server. Firewalls

More information

Enterprise K12 Network Security Policy

Enterprise K12 Network Security Policy Enterprise K12 Network Security Policy I. Introduction The K12 State Wide Network was established by MDE and ITS to provide a private network infrastructure for the public K12 educational community. Therefore,

More information

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint?

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Why? Focused on Managed Intrusion Security Superior-Architected Hardened Technology Security

More information

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering (WCF) for superior

More information

Endpoint Security: Moving Beyond AV

Endpoint Security: Moving Beyond AV Endpoint Security: Moving Beyond AV An Ogren Group Special Report July 2009 Introduction Application whitelisting is emerging as the security technology that gives IT a true defense-in-depth capability,

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

Endpoint Based Policy Management: The Road Ahead

Endpoint Based Policy Management: The Road Ahead Endpoint Based Policy Management: The Road Ahead Introduction In a rapidly growing and crowded security solutions market, organizations need to deploy the most effective technologies taking into consideration

More information

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services Product Highlights Intrusion Prevention System Dectects and prevents known and unknown attacks/ exploits/vulnerabilities, preventing outbreaks and keeping your network safe. Gateway Anti Virus Protection

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

Seamless ICT Infrastructure Security.

Seamless ICT Infrastructure Security. Seamless ICT Infrastructure Security. Integrated solutions from a single source. Effective protection requires comprehensive measures. Global networking has practically removed all borders in the exchange

More information

Improving Network Protection and Performance with Network-Based Antivirus Technology

Improving Network Protection and Performance with Network-Based Antivirus Technology Improving Network Protection and Performance with Network-Based Antivirus Technology White Paper October, 2002 Abstract The predominant approach used by networked organizations to provide protection against

More information

Symantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics.

Symantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics. Symantec enterprise security Symantec Internet Security Threat Report April 00 Regional Data Sheet Latin America An important note about these statistics The statistics discussed in this document are based

More information

Basic computer security

Basic computer security Mag. iur. Dr. techn. Michael Sonntag Basic computer security E-Mail: sonntag@fim.uni-linz.ac.at http://www.fim.uni-linz.ac.at/staff/sonntag.htm Institute for Information Processing and Microprocessor Technology

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software CEN 448 Security and Internet Protocols Chapter 19 Malicious Software Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University mdahshan@ccis.ksu.edu.sa

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

Targeted attacks: Tools and techniques

Targeted attacks: Tools and techniques Targeted attacks: Tools and techniques Performing «red-team» penetration tests Lessons learned Presented on 17/03/2014 For JSSI OSSIR 2014 By Renaud Feil Agenda Objective: Present tools techniques that

More information

INFORMATION SECURITY TRAINING CATALOG (2015)

INFORMATION SECURITY TRAINING CATALOG (2015) INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,

More information

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane SE 4C03 Winter 2005 Firewall Design Principles By: Kirk Crane Firewall Design Principles By: Kirk Crane 9810533 Introduction Every network has a security policy that will specify what traffic is allowed

More information

Network and Host-based Vulnerability Assessment

Network and Host-based Vulnerability Assessment Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

Protection for Mac and Linux computers: genuine need or nice to have?

Protection for Mac and Linux computers: genuine need or nice to have? Protection for Mac and Linux computers: genuine need or nice to have? The current risk to computers running non-windows platforms is small but growing. As Mac and Linux computers become more prevalent

More information

Unified Threat Management: The Best Defense Against Blended Threats

Unified Threat Management: The Best Defense Against Blended Threats Unified Threat Management: The Best Defense Against Blended Threats The SonicWALL Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated

More information

Anti-SPAM Solutions as a Component of Digital Communications Management

Anti-SPAM Solutions as a Component of Digital Communications Management Anti-SPAM Solutions as a Component of Digital Communications Management Ron Shuck CISSP, GCIA, CCSE Agenda What is Spam & what can you do? What is the cost of Spam E-mail E to organizations? How do we

More information

Penetration Testing Service. By Comsec Information Security Consulting

Penetration Testing Service. By Comsec Information Security Consulting Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your

More information

Thin Client Virus Vulnerability Analysis HP Compaq t5000 Thin Clients

Thin Client Virus Vulnerability Analysis HP Compaq t5000 Thin Clients Hp Compaq t5000 Thin Clients June 2004 Instructions. Thin Client Virus Vulnerability Analysis HP Compaq t5000 Thin Clients Table Of Contents Table Of Contents... 1 Executive Summary... 2 Virus Vulnerabilities,

More information

How To Get The Most Out Of Your Email From Your Mail Server (For A Small Business)

How To Get The Most Out Of Your Email From Your Mail Server (For A Small Business) Hosted Exchange +SharePoint: Communication and Collaboration This is the next generation of affordable, reliable messaging and portal solutions with Microsoft Exchange 2010 and Microsoft SharePoint 2010.

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information