Cyber Security Research Developments Global and Indian Context
|
|
|
- Melissa Bradford
- 10 years ago
- Views:
Transcription
1 Cyber Security Research Developments Global and Indian Context Authors: Atul Kumar, Sr. Analyst Chiranshu Ahuja, Sr. Analyst
2 1. Problem Definition Today, given the increasing dependence on information and communication technologies (ICT), especially the Internet, for delivery of services and operations, one of the biggest challenges the world faces is that of cyber security. Cyber security is a complex issue, affecting many application domains and straddling many disciplines and fields. Securing the critical infrastructures requires protecting not only the physical systems but, just as important, the cyber portions of the systems on which they rely. The most significant cyber threats are fundamentally different from those posed by the script kiddies or virus writers who traditionally have plagued users of the Internet. Given the kind of activities being carried out in the cyberspace, cyberspace merges seamlessly with the physical world. But so do cybercrimes. Backbone of cyber criminals the underground black market supported by exploit kits, packaged malware and hacks is expected to continue and evolve citing tried-and-true crime ware like Black Hole, ransomware, APTs which have been improved and refined in ways that shows the extent of professionalism and methodology for developing malwares. Cyber attackers can disrupt critical infrastructures such as financial and air traffic control systems, producing effects that are similar to terrorist attacks in the physical space. They can also carry out identity theft and financial fraud; steal corporate information such as intellectual property; conduct espionage to steal state and military secrets; and recruit criminals and others to carry out physical terrorist activities. What makes cyberspace even more attractive to criminals including non-state actors is that attribution in cyberspace is difficult, especially given that cyberspace is borderless and cuts across jurisdictions. It allows criminals to launch attacks remotely from anywhere in the world. With this growing threat landscape, cyber-readiness of the security systems has been constantly put to test. 2. Cyber Security Research Cyber Security Research is one context where the solution to deal with cyber criminals is germinating. Investment of time and resources requires fostering strategies for research and developing transformative solution to meet critical cyber security challenges involving a certain technology (e.g. cloud computing), or a particular application domain (e.g. finance), or a combination of two. To begin with the focus of cyber security research is nowadays to deal with new emerging threats and detecting the threats before they effect or cause good amount of damages. With growing number of phishing, APTs and botnet attacks, there is lot to be worked in terms of technological advancements and detection technology to meet the cyber threats of the future.
3 3. Cyber Security Research Global Perspective Following are the cyber security related areas where the nations, companies and academia are focusing their research efforts. All the efforts were made to cover the areas of research still the paper should not be considered as a viable source to encrust full ambit of all the ongoing cyber security research globally. 3.1 Research in Industry Next Generation Detection Technology Deploying perimeter security in networks helps to detect and prevent the attacks as early as possible, but the sheer volume of information in the age of Big Data often makes it difficult to detect anomalies that might indicate security issues. Technological research challenges include binary hardening, network monitoring, IDS and IPS systems, and attack analysis. For instance, to detect and prevent attacks, we need techniques and tools to spot and remove vulnerabilities from software, and monitoring systems to raise an alarm when a system behaves in an anomalous manner. In order to effectively detect such advanced malware regardless of the attack methods being used, technology solutions are being developed which use a combination of sophisticated techniques to evaluate advance threats including checking real-time emerging campaigns and known new malicious websites that are being detected across organizations and static code analysis looking for suspicious behavior, obfuscated scripts, malicious code snippets, and redirects to other malicious sites. Further to add, solutions based on dynamic analysis by sandboxing the destination URL or attachments, to simulate a real user on a machine with a goal of observing any changes made to the system, are being worked on Command-and-Control Protection Any enterprise connected to the Internet can become a target of bot driven attack. Unlike widespread attacks, targeted botnet attacks are very stealthy in nature and are difficult to detect using traditional security solutions. However, despite their quiet nature, they can cause very expensive, sometimes irreparable damage to an organization. Research and product development hints at unique fingerprint detection of cloaked C&C traffic which can identify attackers use of legitimate applications and websites as well as other advanced techniques, such as the use of internal C&C servers. Deep discovery custom sandbox analysis can also discover new C&C destinations of zero-day malware attacks and update the intelligent network and all customer security protection points.
4 3.1.3 Malware and Malicious Infrastructure The threat of malware will remain critical for the foreseeable future. There is already a noticeable trend of increasing malware on social networks, in cloud computing and on mobile devices. In terms of research, it poses an interdisciplinary challenge. We need advances in technology, for instance in reverse engineering, de-obfuscation, botnet tracking, analysis of criminal infrastructures, and classification and clustering of malware. Likewise, we need reliable methods to estimate the number of infected machines and the effectiveness of countermeasures. Latest funded development of the Inline Botnet Extraction and Response System, a botnet detection and mitigation tool which also integrates the inline botnet extraction capability, analysis engine, and the signature distributor is the technology direction being witnessed Moving Target Defense (MTD) Cyber attacks are getting more sophisticated and numerous by the day. To combat this threat, future is in deploying automated systems that can react and adapt to reduce the attack surface of IT systems. Developing game changing solutions that increase the cost and risk to the adversary is one key to winning the cyber battle. Current solutions that harden and defend the Network and System components alone do not properly support the mission due to application layer interdependencies. Application processes often rely on processes running on other servers across a distributed network and are particularly vulnerable to disruptions at the Network and Systems layer. Research is moving towards delivering MTD technology to address application layer resiliency issues caused by disruptions to the application layer itself and to any of the preceding layers in the IT stack. MTD deployed at the application layer can mask and evade threats to OS/Network and HW/System layer components that can comprise a mission Self-Defense Service IT systems today are static and allow the adversary time to plan and launch attacks. As proposed by in latest research, layered and changing self-defense service prevents attackers from exploiting a target system by removing the static network & system attributes that simplify reconnaissance. Continuously refreshing the target system to a new virtual instance with a known trusted state and random service attributes, this limited-time-use virtual instance is comprised of a single application and OS combination and reduces system complexity. Further development would proceed on a DNSSEC-aware application that will build on a successful the self-defense service prototype will focus on protecting web services, including web content delivery. Application will allow multi-layer protections by deploying public
5 interface obfuscation and live service migration technique. It conceals the public interface from adversaries and enables web services to self-defend and self-recover. It is a game-changing cyber defense system, by concealing and by cleaning in contrast to traditional solutions. 3.2 Government Spending on Cyber Security Research Cyber security research is found to be one of the focus areas in the cyber security strategies of different countries. This focus tends to indicate the willingness of the governments to work with academia and industry and make investments to develop cyber security solutions. The below sample compilation gives an idea of the investments being made by different governments for R&D in cyber security. US: The Cyber Security Enhancement Act in the US (which has been passed by the US House of Representatives) provisions allocation of $396 million for cyber security research and $94 million for providing scholarships to students pursuing cyber security studies, over a period of four years. The Act also focuses on increasing public awareness through various campaigns 1. Also, the National Science Foundation invests $20 million in large projects to keep the nation's cyberspace secure and trustworthy. With researchers from more than a dozen universities, three large "Frontier" collaborative projects highlight efforts to tackle fundamental challenges in cyber security. The three Frontier projects are part of more than 110 new cyber security research projects being funded in 33 states 2. United Kingdom: GCHQ, The Department for Business, Innovation and Skills, Cabinet Office, the Centre for the Protection of National Infrastructure and the Engineering and Physical Sciences Research Council are working together with academia to increase the UK s academic capability in all fields of cyber security as part of the UK Cyber Security Strategy. Eleven universities have been recognized as conducting world class research in the field of cyber security. As a part of a cross-government commitment towards increasing the nation s academic capability in the field Cyber Security and Research funds amounting to 3.8 million have been granted 3. Germany: Having a foresight to identify societal developments and challenges and develop and apply sustainable strategies on research and develop the solutions of tomorrow to deal effectively with future threats from cyberspace. The Federal Ministry of Education and Research, Germany (BMBF) has provided funding of around 66 million for projects in IT security and supports innovative procedures and technologies to protect IT systems where data protection plays an important role from attack and unauthorized access
6 Current developments will provide a stimulus to enhance the depth and breadth of cyber security research and also help make nations more resilient in cyberspace by extending knowledge and enhancing skills in cyber security. 3.3 Focus Cyber Security Research Areas for Governments The governments around the world are eyeing continuous research in the field of cyber security to safeguard against the emerging and future threats. Some of the cyber security research areas that are in focus by various countries like Australia, Japan, Canada and USA are briefly mentioned below. The Cyber Security Research Roadmap released by the Department of Homeland Security (DHS) in the US, identifies the following eleven hard problems that require R&D efforts: a. Scalable trustworthy systems (including system architectures and requisite b. development methodology) c. Enterprise-level metrics (including measures of overall system trustworthiness) d. System evaluation life cycle (including approaches for sufficient assurance) e. Combating insider threats f. Combating malware and botnets g. Global-scale identity management h. Survivability of time-critical systems i. Situational understanding and attack attribution j. Provenance (relating to information, systems, and hardware) k. Privacy-aware security l. Usable security The Science & Technology (S&T) Directorate of the DHS runs a Cyber Security Division Program through which the DHS leads the government s charge in funding cyber security R&D that results in deployable security solutions and implementation of an aggressive cyber security research agenda encompassing the full lifecycle of technology research, development, test, evaluation, and transition to practice to produce unclassified solutions that can be implemented in both the public and private sectors. To accomplish its mission and serve its customers, CSD has organized its work into five major program areas 5 : Trustworthy Cyber Infrastructure (TCI) focuses on ensuring that the nation's critical infrastructure such as the oil and gas pipelines, information infrastructure, and the Internet become more secure and less vulnerable to malicious and natural events. - Internet Measurement and Attack Modeling - Process Control Systems (PCS) Security - Secure Protocols 5
7 - Cyber Infrastructure & Emerging Threats (DECIDE) Foundational Elements of Cyber Systems (FECS) focuses R&D activities on the characteristics that are essential to the desired end-states of trustworthy cyber systems and accelerates the transition of new cyber security technologies into commercial products and services. - Cyber Economic Incentives - Enterprise Level Security Metrics and Usability - Homeland Open Security Technology (HOST) - Leap Ahead Technologies - Moving Target Defense - Software Quality Assurance - Tailored Trustworthy Spaces Cyber Security User Protection & Education (CUPE) focuses R&D activities on developing ways to help all types of users from improving the security and protection of user online activity, to attracting the next generation of cyber security warriors, to providing the tools needed for investigating cyber criminal and terrorist activity. - Cyber Security Competitions - Cyber Security Forensics - Identity Management & Data Privacy Technologies - Insider Threat Research Infrastructure to Support Cyber Security (RISC) provides a national and international-level research infrastructure to enable the cyber security research community to discover, test, and analyze state of-the-art tools, technologies, and software in a scientifically rigorous and ethical manner. - Experimental Research Testbed (DETER) - Research Data Repository (PREDICT) - Software Assurance Marketplace (SWAMP) Cyber Technology Evaluation and Transition (CTET) provides a coordinated process of assessments, evaluations, and operational experiments and pilots to transition the fruits of research into practice. - Cyber Security Assessment and Evaluation - Cyber Security Experiments and Pilots - Transition to Practice The National Strategy for Trusted Identities in Cyberspace (NSTIC) in the US intends to create an Identity Ecosystem wherein individuals and organizations will be able to trust each other as they follow agreed upon standards to obtain, authenticate and maintain their digital identities, and also of devices. The aim is to pull together software, services and hardware components, to address the entire identity lifecycle of establishment, management and usage. This research is driven by the fact that trusted identities
8 provide a variety of benefits including enhanced security and improved privacy, which in turn boost the trust in the online businesses. Individual users will be able to choose from a mixed bag of secure, privacy-enhancing and interoperable identity solutions in a manner that promotes confidence, privacy, choice, and innovation 6. The U.S. Army Research Laboratory (ARL) established a Collaborative Research Alliance led by Pennsylvania State University for research program to develop and advance the state of the art of Cyber Security. The areas focuses on development theories and models that relate properties and capabilities of cyber threat detection and recognition processes/mechanisms to properties of a malicious activity and support planning and control of cyber maneuver that would describe how control and end-state of the maneuver are influenced by fundamental properties of threats, such as might be rapidly inferred from limited observations of a new, recently observed threat 7. A focused research theme by Australian Government s Cooperative Research Centre for Cyber Security emphasizes cyber security solutions and research including ultra-high speed defense, Wireless cloud, BYOD, IPV6 and Internet of Things 8. Network Security Research Institute of National Institute of Information and Communications Technology, Japan is concentrating on three major research and development topics: cyber-security technology, which establishes a technical basis for leading-edge cyber-attack monitoring, tracking, analysis, response, and prevention to help solve social problems; security architecture technology, which provides secure networks by establishing techniques for optimized configuration, design, and evaluation of secure networks, including mobile, cloud, and new-generation NW; and security fundamentals technology, which establishes practical next-generation cryptographic technologies ranging from modern cryptography to quantum security 9. Cyber security research and experimental development program of Communications Security Establishment, Canada focuses its research on technical measures for blocking cyber-attacks, promising scientific approaches which comprehensively and rigorously underpin required security policy and engage research labs to investigate cyber security related research gaps and to de-risk scientific approaches and emerging technological solutions
9 4. Cyber Security Research Indian Perspective Over the past few years, India has witnessed massive adoption of cyber technologies in all the facets of life. This adoption on one hand is enabling nation to attain high economic growth, welfare, empowerment and active participation of people in policy matters, but on the other it is raising concerns and challenges from cyber security and privacy view point. These challenges become more severe when affecting the national security and economic prospects of the country. Moreover, India being a preferred outsourcing destination for IT and BPM services requires a focused and continued attention on security and privacy. This attention is essential to maintain confidence of the global clients, as security and privacy considerations are key parameters in the outsourcing decisions. Therefore, a demand for adequate efforts and investment in cyber security capability building and R&D activities has also been emerged in the cyber ecosystem. Cyber security capability building is a rising phenomena globally and India is no exception in this and in the recent past country has witnessed significant improvement in this domain. R&D activities in cyber domain are gaining traction in private sector and academia in India, with the support of and encouragement by the government. In recent past country has witnessed numerous successful research outcomes and many of them have been translated into businesses, through the emergence of indigenous cyber security companies. Academia is playing a crucial role in India to build a healthy ecosystem for the cyber security research, which is evident from rising of indigenous cyber security companies emerging out from the incubation centers of these academic institutions. The global acceptance for the wide range of indigenous products & services offered by these companies has also been seen in recent past, validating indigenous competence. Traditional IT services providers are also giving due prominence to cyber security domain and some of the players have expanded their research activities in cyber security. In this paper, some of the ongoing research activities in the country have been discussed and this paper should not be considered as a credible source for all the ongoing research activities in the country. Some of the research areas are highlighted below. Quantum Cryptography & Secure Multiparty Computation R&D activities in India are focused both on the contemporary requirements and high-tech and futuristic need of security in cyberspace. Research in futuristic area such as Quantum Cryptography which allows conducting various cryptographic tasks that are proven to be impossible with classical processing is being undertaken by the researchers. This results in a highly secured communications (such as sharing of keys or sharing of information which is accessible to the receiver only at a specific location) among the parties, and allows detection and elimination of eavesdropping during the transit. Secure Multiparty Computation and Privacy Preserving Data Mining are few research areas which enable data-mining algorithms to be executed on congenital data without revealing the same, and allow parties to jointly compute a function over their inputs, and keep these inputs private. In view of enormous opportunities that exist in the data-mining and analysis field and
10 inherent concerns around privacy and security in such analysis (as in case of medical records processing), this research area is gaining significant traction and already being undertaken by researchers in the country. Threat Intelligence Cyber threat landscape is expanding enormously in the cyberspace. Research related to mitigating cyber threats is already being undertaken by the researchers as a priority item. Response mechanism to cyber threats has changed from being reactive to proactive. This change in the response mechanism requires robust threat intelligence system to defend any of the evolving threats. R&D activities are already underway at various research organizations in India in areas such as threat research & response, specifically for Malware research analysis, Worm Propagation and Detection, Targeted remote malware clean-up, Advanced Persistent Threat Countermeasure, anomaly detection for zero-day attack, Intrusion Detection Systems, SPAM Detection & Filtering, exploitation and Reverse engineering, among others. Research is also being carried out on advancement of automated tool to simulate human hackers, one of the ways to create the threat intelligence. Moreover, some of the organizations are also working in the domain of antivirus and anti-malware research & development. As research outcomes, well accepted solutions catering to enterprises and end users, are already available in the Indian as well as global market. Next Generation Firewall Research organizations are also working in future-ready security solutions and Multi identitybased technology such as Next Generation Firewall, that offer security intelligence to enterprises and enable them to apply required and best suited security controls at the network perimeter. Integration of aforesaid technology with other security solutions such as threat intelligence and management systems, Web Application Firewall, Web filtering, Anti-Virus, Anti- Spam, etc, will help in creating more efficient and secure ecosystem. Secured Protocol and Algorithms Research in protocols and algorithms is an important aspect for strengthening the cyber security posture at a technical level. Protocols and algorithms define the rules for information sharing and processing over cyberspace. In India, research has also been undertaken at protocol & algorithm level such as Secure Routing Protocols, Efficient Authentication Protocols, reliability Enhanced Routing Protocol for Wireless Networks, Secure Transmission Control Protocol and Attack Simulation Algorithm, etc. These research activities are of great interest to the defense, critical sectors and other sensitive communications in the nation. Authentication Techniques It is important to establish trust and credibility in critical business processes that can be achieved through advance authentication techniques. In the country, research is moving towards authentication techniques such as Key Management, Two Factor Authentication,
11 Automated key management which provides the ability to encrypt and decrypt without a centralized key management system, File protection both on rest as well as in transit, access controls solutions on cloud, among others. Content protection especially in case of multimedia content distribution on web is a challenge for organizations which experience revenue loss because of unauthorized distribution and access. Some solutions have already been developed indigenously to address this problem. Moreover, research is underway for more advance products and solutions in this area. BYOD, Cloud and Mobile Security Increased adoption of varied types of mobile devices has raised the demand for initiating research that addresses the security and privacy related challenges. Application, Network and Mobile security testing technologies, BYOD risk mitigation, Cloud security assessment and protection are some of the areas where advancement of technologies is taking place through R&D activities. Cyber Forensics With the proliferation of the Internet, cyber-crime incidents have also increased, and elevated the demand of advance forensic technologies to expedite investigation and attribution process. In India, the research is being carried out to build indigenous capabilities for cyber forensics. Some of the specific areas in which research is taking place in the country are: Disk Forensics, Network Forensics, Mobile Device Forensics, Memory Forensics, Multimedia Forensics and Internet Forensics. Other areas in which researches are being undertaken are Internet Monitoring Systems, Extensive web security, Wireless Network Security Enhancement, VOIP security, encryption & cryptography, and encryption as a service among others. These indigenous research activities are moving towards enhancing the capabilities of existing technologies and also evolving advanced solutions with new and innovative ideas. 5. The Way Forward for India For strengthening the cyber ecosystem, a focused attention and adequate investment of efforts & resources would be required for cyber security. Investment in the R&D activities in cyber security domain could result in high returns such as opportunities for entrepreneurs leading to expansion of businesses which in turn could result in more jobs in the market, increased trust & credibility and self-reliance of the nation. Though R&D activities pertaining to cyber security being undertaken in India have risen lately, a lot more needs to be done, specially to match the level of technological advancements happening globally. By virtue of its dynamic nature, cyber security requires continuous tracking of evolving technologies globally and its alignment with a country s R&D objectives and agenda. Increasing role of cyberspace puts in place a high demand of extensive R&D activities to be carried out in the nation, with a set agenda. This
12 demand is re-enforced in the light of huge opportunities that exists in the global and domestic market. Contribution would be required from all the stakeholders - government, Industry and academia - requiring that they come together and define a cyber security R&D roadmap for the country. Public Private Partnership (PPP) is the way forward, as it would help in combining best of both worlds and complement capabilities to develop a securer cyber ecosystem. Arrangements also need to be put in place for retaining the talent in the country and providing appropriate protection to the IPRs developed by the indigenous cyber security research organizations. The government should fund research in academia and also in the industry, and provide incentives to the businesses for investing in R&D activities. The research should be market driven, and deliver solutions for the real world. The emergence of cyberspace as fifth domain requires attention, and enhancement of R&D capabilities stands as an important component. There is growing focus on developing R&D capabilities in India. Enormous opportunities exist and sustained efforts need to be undertaken to take forward the momentum built in our country.
13 DATA SECURITY COUNCIL OF INDIA Statement of confidentiality This document contains information that is proprietary and confidential to DATA SECURITY COUNCIL OF INDIA (DSCI), and shall not be disclosed outside transmitted, or duplicated, used in whole or in part for any purpose other than its intended purpose. Any use or disclosure in whole or in part of this information without explicit written permission of Data Security Council of India is prohibited DSCI. All rights reserved.
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
POLICIES TO MITIGATE CYBER RISK
POLICIES TO MITIGATE CYBER RISK http://www.tutorialspoint.com/information_security_cyber_law/policies_to_mitigate_cyber_risk.htm Copyright tutorialspoint.com This chapter takes you through the various
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
Capabilities for Cybersecurity Resilience
Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense By: Daniel Harkness, Chris Strasburg, and Scott Pinkerton The Challenge The Internet is an integral part of daily
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Types of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015
Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Stop advanced targeted attacks, identify high risk users and control Insider Threats
TRITON AP-EMAIL Stop advanced targeted attacks, identify high risk users and control Insider Threats From socially engineered lures to targeted phishing, most large cyberattacks begin with email. As these
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy
2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,
Content Security: Protect Your Network with Five Must-Haves
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. May 2012 Agenda Intel + McAfee: What it means Computing trends
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
WildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
Perspectives on Cybersecurity in Healthcare June 2015
SPONSORED BY Perspectives on Cybersecurity in Healthcare June 2015 Workgroup for Electronic Data Interchange 1984 Isaac Newton Square, Suite 304, Reston, VA. 20190 T: 202-618-8792/F: 202-684-7794 Copyright
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation
Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting
TRITON APX. Websense TRITON APX
TRITON APX Unified protection and intelligence against Advanced Threats and data theft Your organization is faced with an increasing number of Advanced Threats that lead to data theft, denial of service
The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen 14th Annual Risk Management Convention New York, New York March 13, 2013 Today s Presentation 1)
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
Research Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products
Threat Intelligence: The More You Know the Less Damage They Can Do Charles Kolodgy Research VP, Security Products IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 Agenda Evolving Threat Environment
Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings
Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013
Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational
Anti-exploit tools: The next wave of enterprise security
Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
The Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
Cyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
Practical Steps To Securing Process Control Networks
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) Domain.Local DC Client DomainAdmin Attack Operator Advise Protect Detect Respond
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation
White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox
Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...
Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model
White Paper Addressing the Full Attack Continuum: Before, During, and After an Attack It s Time for a New Security Model Today s threat landscape is nothing like that of just 10 years ago. Simple attacks
The Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)
Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly
Advanced & Persistent Threat Analysis - I
Advanced & Persistent Threat Analysis - I Burak Ekici [email protected] Department of Computer Engineering, Yaşar University, Turkey. April 21, 2012 Burak Ekici (Dept. of Comp. Eng.) Advanced & Persistent
Conquering PCI DSS Compliance
Any organization that stores, processes or transmits information related to credit and debit card payments has a responsibility to protect each cardholder s personal data. To help accomplish this goal,
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
Design Your Security
Design Your Security We build tailored, converged security for you. converged Technology. Strategy. People. The synergetic collaboration. agile Hackers sleep - we don t. We re ready whenever, wherever.
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Guiding principles for security in a networked society
ericsson White paper Uen 307 23-3230 February 2014 Guiding principles for security in a networked society The technological evolution that makes the Networked Society possible brings positive change in
McAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
www.pwc.com Cybersecurity and Privacy Hot Topics 2015
www.pwc.com Cybersecurity and Privacy Hot Topics 2015 Table of Contents Cybersecurity and Privacy Incidents are on the rise Executives and Boards are focused on Emerging Risks Banking & Capital Markets
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks
White Paper Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks White Paper Executive Summary Around the world, organizations are investing massive amounts of their budgets
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
COMBATING CYBER THREATS: A HOW TO FOR THE CISO.
www.wipro.com COMBATING CYBER THREATS: A HOW TO FOR THE CISO. Gopinathan. K, Practice Head - Managed Security and Network Services, Global Infrastructure Services (GIS), Wipro Infotech Contents 02 -------------------------------------
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?
A Cloud Security Primer : WHAT ARE YOU OVERLOOKING? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
The UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
Cyber Situational Awareness for Enterprise Security
Cyber Situational Awareness for Enterprise Security Tzvi Kasten AVP, Business Development Biju Varghese Director, Engineering Sudhir Garg Technical Architect The security world is changing as the nature
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
