Top 10 Security Trends
|
|
|
- Leon Lucas
- 9 years ago
- Views:
Transcription
1 Top 10 Security Trends Keynote at e-irt Open Workshop on e-infrastructure Audimax HG F30, ETH Zurich April 24th, 2008 Dr. Thomas Dübendorfer, CISSP President ISSS / Software Engineer Tech Lead Google [email protected] Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 1
2 Economic Value of Information Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 2
3 E-Underground Economy Prices (Symantec) Source: Symantec Corporation, Threat Report 2007, published April Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 3
4 E-Underground Economy Prices (GData) Game Accounts: EUR 6.- per World of Warcraft (WoW) Account Renting out a bot network for DDoS Attack: US$ 20.- / h US$ / day Addresses: EUR for 10 million addresses EUR for do-it-yourself spam starter package: 5 million addresses with tool for sending spam included EUR for 20 million addresses EUR per new exploit Source: GData Newsletter, Oct 22, 2007, Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 4
5 Critical Infrastructure Outages Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 5
6 Power Blackout Incidents 2003 US/Canada Northeast Blackout (Aug 14) - 50 million people affected; $6 billion USD losses - Cause: FirstEnergy Corporation's failure to trim trees in part of its Ohio service area, then cascading failures 2003 Italy Blackout (Sept 28) - 56 million people affected during 9 hours - Cause: Power line which supplied electricity to Italy from Switzerland damaged by storm, then cascading failures 2005 SBB Switzerland Blackout (June 22) passengers captured in trains - Full SBB train network comes to a halt - Cause: Too little power in Tessin with cascading effects 2008 Florida Blackout (Feb 26) million people affected - Cause: Overheated voltage switch caught fire in a power substation near Turkey Point Nuclear Generating Station Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 6
7 Data Link Outages 2006 (Dec 26) Taiwan/Hong Kong: Six out of seven submarine cables snapped by earthquake off Taiwan Internet connectivity back to normal after 50 days (May 3-11): 12 DDoS attacks at 70+ Mbps on Estonian websites; 7 attacks lasting for 10+ hours 2008 (Jan/Feb): 9 cuts of three submarine Internet cables in the Mediterranean, Suez Canal, Persian Gulf, near Bandar Abbas in Iran and near Penang, Malaysia 91 million people affected Sources: Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 7
8 Bot Networks Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 8
9 Kraken Bot Network April 13, 2008: 495,000 computers in the Kraken botnet botnet has infiltrated 50 Fortune 500 companies largest known active bot network Infection path: Manipulated web image that installs a trojan downloader binary (and possibly other infection paths) Source: Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 9
10 Active Bot Networks (ATLAS/Arbor) Source: Apr 22nd 2008 Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 10
11 Third Parties Controlling Information Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 11
12 Who controls your information? Webmail 2003 (July 21): Swiss Fre Provider Sunrise has lost account data of customers (Freesurf, Freesurf plus und Weboffice) Credit Card Records Medical Records Voice Carriers Paris Hilton / T-Mobile phone data hack Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 12
13 Complexity Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 13
14 Linux: Serving A Single Web Page (Apache) Linux (1994): 0.18 mill. LOC Linux (1999): 1.8 mil. Linux (2001): 3.4 mill. Linux (2003): 5 mill. Source: Sana Security, 2004; Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 14
15 Windows: Serving A Single Web Page (IIS) Source: Sana Security, 2004 Windows 3.1: 2.5 mill. LOC Windows 95: 15 mill. Windows XP: 40 mill. Windows Vista:>50 mill. Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 15
16 Criminals Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 16
17 Criminals Run E-Underground business Biggest threat currently Professional! No longer hobbyist hacker that looks for bragging rights Lack of worldwide regulations and uniform law enforcement Crimes: Identity theft (steal credentials) Industry espionage Spam (>70% of all s in 2007 acc. to Symantec) Nigerian Money Scams DDoS extortion: sport bet sites etc. and many more Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 17
18 Drive-By Downloads (Web Browser Exploits) Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 18
19 Malicious Web Sites >3 million web sites are known to be malicious Popular exploits are linked from >10,000 web sites Domains with malicious URLs marked may harm your computer on Google s search result page. Source: Google 2008, provos-2008a.pdf Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 19
20 Ratio of Google Search Queries Containing At Least One Malicious URL in Search Results 1.3% Source: Google 2008, Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 20
21 Ratio of Malicious URLs by Content Category Source: Google 2008, Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 21
22 Slower Patching and Faster Exploits Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 22
23 Apple versus Microsoft Apple: Number of unpatched critical vulnerabilities Source: 0-Day Patch - Exposing Vendors (In)security Performance, BlackHat 2008, Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 23
24 Apple versus Microsoft Microsoft: Number of unpatched critical vulnerabilities Source: 0-Day Patch - Exposing Vendors (In)security Performance, BlackHat 2008, Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 24
25 Zotob Worm (2005) August 2005: Zotob worm (Rbot worm variant) appeared 5 (!) days after Microsoft released a patch for a Windows plug n play component. Rbot can force an infected computer to continuously restart Its outbreak on Aug 16th, 2005 was covered "live" on CNN television, as the network's own computers got infected. Clean-up per company affected: Average cost of US$ 97, hours of cleanup Source: Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 25
26 Exploit Generator (2008) Given: Buggy program with an unknown vulnerability Corresponding Security Patch An exploit generator developed at Carnegie Mellon University can automatically create an exploit for unpatched systems within a few minutes. Shown for several Windows vulnerabilities and patches. Source: To appear in May 2008 at IEEE Security and Privacy Symposium Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 26
27 Vulnerable Internet End Points Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 27
28 Internet Clients are Most Vulnerable but also servers Image Source: Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 28
29 Lack of Security Aware Software Developers Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 29
30 Buffer Overflow Buffer: memory used to store user input Buffer overflow: a condition that occurs when more user input is provided than can fit in the buffer; this can lead to code injection and execution 10 char buf[10] 0 Known since 1972; first exploit 1988 (Morris worm) 50% of CERT advisories in 1998! Jan 2008: Two Buffer Overflows in Apple Quicktime Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 30
31 Summary Top 10 Security Trends Economic Value of Information Critical Infrastructure Outages Bot Networks Third Parties Controlling Information Complexity Criminals Drive-By Downloads Slower Patching and Faster Exploits Vulnerable Internet End Points Lack of Security Aware Software Developers Thanks for your attention! Information Security Society Switzerland e-irt Top 10 Security Trends ISSS2008X623 T. Dübendorfer 31
Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected]
Cyber Security & Role of CERT-In Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected] Web Evolution Web Sites (WWW) 1993 Web Invented and implemented 130 Nos. web sites 1994 2738 Nos.
Current counter-measures and responses by CERTs
Current counter-measures and responses by CERTs Jeong, Hyun Cheol [email protected] April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure
When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Using big data analytics to identify malicious content: a case study on spam emails
Using big data analytics to identify malicious content: a case study on spam emails Mamoun Alazab & Roderic Broadhurst [email protected] http://cybercrime.anu.edu.au 2 Outline Background Cybercrime
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
Promoting Network Security (A Service Provider Perspective)
Promoting Network Security (A Service Provider Perspective) Prevention is the Foundation H S Gupta DGM (Technical) Data Networks, BSNL [email protected] DNW, BSNL 1 Agenda Importance of Network Security
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms
Overview Common Internet Threats Tom Chothia Computer Security, Lecture 19 Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy.
Current Threat Scenario and Recent Attack Trends
Current Threat Scenario and Recent Attack Trends Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In) Objectives Current Cyber space Nature of cyberspace and associated risks
BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL
BOTNETS Douwe Leguit, Manager Knowledge Center GOVCERT.NL Agenda Bots: what is it What is its habitat How does it spread What are its habits Dutch cases Ongoing developments Visibility of malware vs malicious
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can
BBM 461: SECURE PROGRAMMING INTRODUCTION 1 Ahmet Burak Can COURSE MATERIAL Counter Hack Reloaded:A Step-by- Step Guide to Computer Attacks and Effective Defenses, Edward Skoudis, Tom Liston, Prentice Hall
Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison
Deep Security Intrusion Detection & Prevention (IDS/IPS) Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security. The document also outlines a comparison
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
Information Security Threat Trends
Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: [email protected] 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing
Countermeasures against Bots
Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer
Protect Yourself in the Cloud Age
Protect Yourself in the Cloud Age Matthew Wu Consultant Hong Kong Computer Emergency Response Team Coordination Centre About HKCERT HKCERT ( 香 港 電 腦 保 安 事 故 協 調 中 心 ) Established in 2001 Funding & Operation
Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat www.etda.or.th
Cybersecurity: Thailand s and ASEAN s priorities Soranun Jiwasurat www.etda.or.th Cyber Threat Landscape Overview 2 Cyber threat a hostile act using computers, electronic information and/or digital networks
What is Cyber Liability
What is Cyber Liability Ubiquitous Warfare Espionage Media Operational Data Security and Privacy Tech 1 Data Security and Privacy Data Breach Response Costs Privacy Regulatory Action Civil Litigation INSURABLE
Spyware: Securing gateway and endpoint against data theft
Spyware: Securing gateway and endpoint against data theft The explosion in spyware has presented businesses with increasing concerns about security issues, from data theft and network damage to reputation
Open an attachment and bring down your network?
Open an attachment and bring down your network? Many people think this will never happen to them, but virus attacks can come from unlikely sources and can strike when you least expect it. They can wreak
Deep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison
Deep Security/Intrusion Defense Firewall - IDS/IPS Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security and Intrusion Defense Firewall. The document
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
Stopping zombies, botnets and other email- and web-borne threats
Stopping zombies, botnets and other email- and web-borne threats Hijacked computers, or zombies, hide inside networks where they send spam, steal company secrets, and enable other serious crimes. This
Using Windows Update for Windows XP
Using Windows Update for Windows XP Introduction This document provides instructions on updating Windows XP with the necessary patches. It is very important to update your operating system software in
RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses
RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123 Cybersecurity: A Growing Concern for Small Businesses Copyright Materials This presentation is protected by US and International Copyright
The Mobile Malware Problem
The Mobile Malware Problem Eddy Willems Security Evangelist G Data Security Labs Director Security Industry Relationships - EICAR [email protected] Introduction Security Evangelist at G Data: Privately
Emerging Security Technological Threats
Emerging Security Technological Threats Jamie Gillespie Training and Education Team Leader, AusCERT About AusCERT Australia s national CERT Collect, monitor, advise on threats and vulnerabilities Incident
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent
6. ecommerce Security and Payment Systems. Alexander Nikov. Teaching Objectives. Video: Online Banking, Is It Secure?
INFO 3435 ecommerce 6. ecommerce Security and Payment Systems Alexander Nikov Teaching Objectives Explain the scope of ecommerce crime and security problems. Describe the key dimensions of e-commerce security.
Managing Security Risks in Modern IT Networks
Managing Security Risks in Modern IT Networks White Paper Table of Contents Executive summary... 3 Introduction: networks under siege... 3 How great is the problem?... 3 Spyware: a growing issue... 3 Feeling
BCS IT User Syllabus IT Security for Users Level 2. Version 1.0
BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
End to End Security do Endpoint ao Datacenter
do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Cyber crime. lingua house. 1 Internet crime. Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + Match the following words to their correct definitions:
A A GENERAL ENGLISH Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + 1 Internet crime Match the following words to their correct definitions: 1. hacker a. a computer program which can make copies of itself
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Top 5 Security Trends and Strategies for 2011/2012 Peter Sandkuijl Europe SE manager network security [email protected]
Top 5 Security Trends and Strategies for 2011/2012 Peter Sandkuijl Europe SE manager network security [email protected] 2011 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved.
SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES
REQUIREMENT 6.1 TO 6.2 SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES 6.1 TO 6.2 OVERVIEW In accordance with Payment Card Industry Data Security Standards (PCI DSS) requirements, [company
Vulnerability Assessment & Compliance
www.pwc.com Vulnerability Assessment & Compliance August 3 rd, 2011 Building trust through Information security* Citizen-Centric egovernment state Consultantion workshop Agenda VAPT What and Why Threats
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015
Cybersecurity: A Growing Concern for All Businesses RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015 RLI Design Professionals is a Registered Provider with The American
Vulnerabilità e Attacchi alle Infrastrutture IT Simone Riccetti. Sr. IT Security Architect
Vulnerabilità e Attacchi alle Infrastrutture IT Simone Riccetti Sr. IT Security Architect Agenda Team di Ricerca X-Force Vulnerabilità e Minacce Tecnologie di Protezione Attack Lifecycle Live Demo 2 The
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
The Onslaught of Cyber Security Threats and What that Means to You
The Onslaught of Cyber Security Threats and What that Means to You No End in Sight for Cyber Crime Growth Number of mobile devices affected IBM Number of accounts hacked CNN Money Number of malware samples
Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA
Emerging Network Security Threats and what they mean for internal auditors December 11, 2013 John Gagne, CISSP, CISA 0 Objectives Emerging Risks Distributed Denial of Service (DDoS) Attacks Social Engineering
Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led
Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Course Description This class will immerse the student into an interactive environment where they will
Data Center security trends
Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:
Using Windows Update for Windows Me
Using Windows Update for Windows Me Contents Introduction... 1 Before You Begin... 2 Downloading and Installing the Windows Update Components... 2 Maintaining a Secure Computing Environment... 6 Introduction
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
7 Cs of WEB design - Customer Interface
7 Cs of WEB design - Customer Interface Exhibit 6-1: The 7Cs of the Customer Interface Context Site s layout and design Content Text, pictures, sound and video that web pages contain Commerce Site s capabilities
The FBI and the Internet
The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The
Detecting P2P-Controlled Bots on the Host
Detecting P2P-Controlled Bots on the Host Antti Nummipuro Helsinki University of Technology anummipu # cc.hut.fi Abstract Storm Worm is a trojan that uses a Peer-to-Peer (P2P) protocol as a command and
CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.
CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans
Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com
Kaseya White Paper Endpoint Security Fighting Cyber Crime with Automated, Centralized Management www.kaseya.com To win the ongoing war against hackers and cyber criminals, IT professionals must do two
What are the common online dangers?
ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of
Cyber Security and Critical Information Infrastructure
Cyber Security and Critical Information Infrastructure Dr. Gulshan Rai Director General Indian Computer Emergency Response Team (CERT- In) grai [at] cert-in.org.in The Complexity of Today s Network Changes
Microsoft Security Intelligence Report volume 7 (January through June 2009)
Microsoft Security Intelligence Report volume 7 (January through June 2009) Key Findings Summary Volume 7 of the Microsoft Security Intelligence Report provides an in-depth perspective on malicious and
Topic 1 Lesson 1: Importance of network security
Topic 1 Lesson 1: Importance of network security 1 Initial list of questions Why is network security so important? Why are today s networks so vulnerable? How does Melissa virus work? How does I love you
Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
Firewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
Cyber-Security Risk in the Global Organization:
Cyber-Security Risk in the Global Organization: Trends, Challenges and Strategies for Effective Management David Childers, CCEP, CIPP CEO, Compli Todd Carroll Assistant Special Agent in Charge, FBI Three
Nuclear Security Requires Cyber Security
Nuclear Security Requires Cyber Security A. DAVID MCKINNON, PH.D., MARY SUE HOXIE Cyber Physical Security Team, National Security Directorate Project on Nuclear Issues (PONI) Fall 2015 Conference PNNL-SA-113027
Botnets: The Advanced Malware Threat in Kenya's Cyberspace
Botnets: The Advanced Malware Threat in Kenya's Cyberspace AfricaHackon 28 th February 2014 Who we Are! Paula Musuva-Kigen Research Associate Director, Centre for Informatics Research and Innovation (CIRI)
WEB APPLICATION SECURITY
WEB APPLICATION SECURITY Governance and Risk Management YOUR LAST LINE OF DEFENSE Aug 06 2009 ANSES RAH RAH Anthony Lim MBA CISSP CSSLP FCITIL Director, Security, Asia Pacific Rational Software Prolog
Innovations in Network Security
Innovations in Network Security Michael Singer April 18, 2012 AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies.
Network attack and defense
Network attack and defense CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration 2007, 2008 Robert H. Sloan 1 Outline 1. Overview
Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd [email protected] Riga. Baltic IT&T. 21.04.
Data Centers Protection from DoS attacks. Trends and solutions Michael Soukonnik, Radware Ltd [email protected] Riga. Baltic IT&T. 21.04.2010 Cybercrime Trends Page 2 Types of DoS attacks and classical
Security Business Review
Security Business Review Security Business Review Q4: 2014 2 By Bitdefender Labs Security Business Review Botnet Anonymization Raises New Security Concerns Executive Overview While botnets, which are large
