Tutorial: Cloud Computing Security
|
|
|
- Cora Greene
- 10 years ago
- Views:
Transcription
1 Tutorial: Cloud Computing Security William R. Claycomb, PhD. Lead Research Scientist CERT Enterprise Threat and Vulnerability Management Team Carnegie Mellon University
2 Agenda Background: Cloud Computing Threats to Cloud Security Insider Threats in the Cloud Present, Past, and Future Attacks Threats to Cloud Security 2.0 Future Research 2
3 What is Cloud Computing? It s internet computing Computations are done through the Internet No worry about any maintenance or management of actual resources Shared computing resources 3
4 So, Cloud Computing is: Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction (from NIST) 4
5 5
6 Five Characteristics On-demand self-service Ubiquitous network access Location independent resource pooling Rapid elasticity Measured service 6
7 Four Cloud Deployment Models Private cloud Enterprise owned or leased Community cloud Shared infrastructure for specific community Public cloud Sold to the public, mega-scale infrastructure Hybrid cloud Composition of two or more clouds 7
8 Agenda Background: Cloud Computing Threats to Cloud Security Insider Threats in the Cloud Present, Past, and Future Attacks Threats to Cloud Security 2.0 Future Research 8
9 Threats to Cloud Computing 1. Abuse and Nefarious Use of Cloud Computing 2. Insecure Application Programming Interfaces 3. Malicious Insiders 4. Shared Technology Vulnerabilities 5. Data Loss/Leakage 6. Account, Service, and Traffic Hijacking 7. Unknown Risk Profile From Cloud Security Alliance,
10 Abuse and Nefarious Use Password and key cracking DDOS Launching dynamic attack points Hosting malicious data Botnet command and control Building rainbow tables CAPTCHA solving Exploits exist already 10
11 Insecure Interfaces and APIs Could expose more functionality than intended Policy could be circumvented Credentials may need to be passed is the interface secure? 11
12 Malicious Insiders Particularly poignant for cloud computing Little risk of detection System administrator qualifications and vetting process for cloud services provider may be different that that of the data owner 12
13 Shared Technology Issues Underlying architecture (CPU cache, GPU, etc.) not intended to offer strong isolation properties Virtualization hypervisor used to mediate access between guest OS and physical resources Exploits exist (Blue Pill, Red Pill) 13
14 Data Loss or Leakage Data is outside the owner s control Data can be deleted or decoupled (lost) Encryption keys can be lost Unauthorized parties may gain access Caused by Insufficient authentication, authorization, and access controls Persistence and remanance Poor disposal procedures Poor data center reliability 14
15 Account or Service Hijacking Exploits phishing attacks, fraud, or software vulnerabilities Credential reuse 15
16 Unknown Risk Profile How well is the cloud being maintained? Many companies are unwilling to release details Is the infrastructure up to date Patches Firmware Does the combination of different service providers create previously unseen vulnerabilities? 16
17 Agenda Background: Cloud Computing Threats to Cloud Security Insider Threats in the Cloud Present, Past, and Future Attacks Threats to Cloud Security 2.0 Future Research 17
18 Scope Cloud Computing Cloud Computing Security Cloud Computing Security Insider Threats 18
19 What is CERT? Center of Internet security expertise Established in 1988 by the US Department of Defense on the heels of the Morris worm that created havoc on the ARPANET, the precursor to what is the Internet today Part of the Software Engineering Institute (SEI) Federally Funded Research & Development Center (FFRDC) Operated by Carnegie Mellon University (Pittsburgh, Pennsylvania) 19
20 What is the CERT Insider Threat Center? Center of insider threat expertise Began working in this area in 2001 with the U.S. Secret Service Our mission: The CERT Insider Threat Center conducts empirical research and analysis to develop & transition socio-technical solutions to combat insider cyber threats. 20
21 Who is a Malicious Insider? Current or former employee, contractor, or other business partner who has or had authorized access to an organization s network, system or data and intentionally exceeded or misused that access in a manner that negatively affected the confidentiality, integrity, or availability of the organization s information or information systems. 21
22 CERT s Insider Threat Case Database 300 U.S. Crimes by Category Sabotage Fraud Theft of IP Misc 22
23 Critical Infrastructure Sectors U.S. Cases by Critical Industry Sector Postal and Shipping <1% Manufacturing 2% N/A 4% Transportation 1% Public Health 7% Water 1% Government-State/Local 9% Information and Telecommunications 22% Banking and Finance 29% Food 2% Government-Federal 7% Education 4% Energy 1% ** This does not include espionage cases involving classified information Chemical Industry & Hazardous Materials 2% Commercial Facilities 6% Defense Industrial Base 2% Emergency Services 1% 23
24 How bad is the Insider Threat problem? 24
25 Insider Threat Issue -1 Insiders pose a substantial threat by virtue of their knowledge of, and access to, their employers systems and/or databases. Insiders can bypass existing physical and electronic security measures through legitimate measures. 25
26 Insider Threat Issue -2 Has your organization been the victim of an insider attack? Can you confidently say you have not been the victim of an insider attack? 26
27 2011 CyberSecurity Watch Survey - 1 CSO Magazine, USSS, CERT & Deloitte 607 respondents 100 Percentage of Participants Who Experienced an Insider Incident 38% of organizations have more than employees 60 37% of organizations have less than employees Source: 2011 CyberSecuirty Watch Survey, CSO Magazine, U.S. Secret Service, Software Engineering Institute CERT Program at Carnegie Mellon University and Deloitte, January
28 2011 CyberSecurity Watch Survey % of respondents Damage caused by insider attacks more damaging than outsider attacks Most common insider e-crime Unauthorized access to / use of corporate information (63%) Unintentional exposure of private or sensitive data (57%) Virus, worms, or other malicious code (37%) Theft of intellectual property (32%) Source: 2011 CyberSecuirty Watch Survey, CSO Magazine, U.S. Secret Service, Software Engineering Institute CERT Program at Carnegie Mellon University and 28
29 2011 CyberSecurity Watch Survey - 3 How Insider Intrusions Are Handled 12% 8% 3% 76% Internally (without legal action or law enforcement) Internally (with legal action) Externally (notifying law enforcement) Externally (filing a civil action) Reason(s) CyberCrimes were not referred for legal action Damage level insufficient to warrant prosecution Could not identify the individual/ individuals responsible for committing the ecrime Lack of evidence/not enough information to prosecute % 37% 40% 29% 39% 35% Concerns about negative publicity 12% 15% Concerns about liability 8% 7% Concerns that competitors would use incident to their advantage Prior negative response from law enforcement 6% 5% 5% 7% Unaware that we could report these crimes 4% 5% Other 11% 5% Don't know 20% 14% Not applicable N/A 24% Source: 2011 CyberSecuirty Watch Survey, CSO Magazine, U.S. Secret Service, Software Engineering Institute CERT Program at Carnegie Mellon University and 29
30 IT Sabotage 30
31 911 services disrupted for 4 major cities Disgruntled former employee arrested and convicted for this deliberate act of sabotage. 31
32 Insider IT Sabotage: True Story A disgruntled system administrator is able to deploy a logic bomb and modify the system logs to frame his supervisor even though he had been demoted and his privileges should have been restricted. Insider had difficulties prior to hiring High school dropout Fired from prior job History of drug use Expressed feelings of dissatisfaction and frustration with work conditions Complained that he did all the work Frequently late for work Drug use on the job Demoted Subject frames his supervisor for sabotage Discovered plans to fire him Installed logic bomb to delete all files on all servers Set to execute from supervisor s.profile Included ha ha message Also planted in script to run when system log file reached certain size Tried to hide actions technically, but admitted to coworker Took great pains to conceal act by deleting system logs Forgot to modify one system log, which was used to identify him as perpetrator Told co-worker the day before attack that he would see some serious stuff happen 32
33 Other Cases of IT Sabotage Financial Institution customers lose all access to their money from Friday night through Monday Fired system administrator sabotages systems on his way out A logic bomb sits undetected for 6 months before finally wreaking havoc on a telecommunications firm A security guard at a U.S. hospital, after submitting resignation notice, obtained physical access to computer rooms Installed malicious code on hospital computers, accessed patient medical records SCADA systems for an oil-exploration company is temporarily disabled A contractor, who s request for permanent employment was rejected, planted malicious code following termination System administrator at a manufacturing plant, passed over for promotion, deployed logic bomb prior to resigning, deleting critical software required to run operation Financial damage $10M; Forced to lay off 80 employees 33
34 Summary of Findings % of crimes in case database** Current or former employee? Type of position Gender IT Sabotage 35% Former Technical (e.g. sys admins or DBAs) Male ** Does not include national security espionage 34
35 Summary of Findings IT Sabotage Target Access used When Where Recruited by outsiders Collusion Network, systems, or data Unauthorized Outside normal working hours Remote access None None 35
36 Theft of Intellectual Property 36
37 TRUE STORY: Research scientist downloads 38,000 documents containing his company s trade secrets before going to work for a competitor Information was valued at $400 Million 37
38 Other Cases of Theft of IP A technical operations associate at a pharmaceutical company downloads 65 GB of information, including 1300 confidential and proprietary documents, intending to start a competing company, in a foreign country Organization spent over $500M in development costs Simulation software for the reactor control room in a nuclear power plant was being run from a different country A former software engineer born in that country took it with him when he left the company. 38
39 Summary of Findings % of crimes in case database** Current or former employee? Type of position IT Sabotage Theft of Intellectual Property 35% 18% Former Technical (e.g. sys admins or DBAs) Current Technical (71%) - scientists, programmers, engineers Sales (29%) Gender Male Male ** Does not include national security espionage 39
40 Summary of Findings IT Sabotage Theft of Intellectual Property IP (trade secrets) Target Network, systems, or 71% data Customer Info 33% Access used Unauthorized Authorized When Outside normal During normal working hours working hours Where Remote access At work Recruited by outsiders None Less than 1/4 Collusion None Almost ½ colluded with at least one insider; ½ acted alone 40
41 Fraud 41
42 An Incident of Insider Fraud 42
43 Fake drivers license sold to undercover agent claiming to be on the No Fly list 43
44 Other Cases of Fraud An accounts payable clerk, over a period of 3 years, issues 127 unauthorized checks to herself an others... Checks totaled over $875,000 A front desk office coordinator stole PII from hospital... Over 1100 victims and over $2.8 M in fraudulent claims A database administrator at major US Insurance Co. downloaded 60,000 employee records onto removable and solicited bids for sale over the Internet An office manager for a trucking firm fraudulently puts her husband on the payroll for weekly payouts, and erases records of payments Over almost a year loss of over $100K 44
45 Summary of Findings % of crimes in case database** Current or former employee? Type of position IT Sabotage Theft of Intellectual Property Fraud 35% 18% 40% Former Current Current Technical (e.g. sys admins or DBAs) Technical (71%) - scientists, programmers, engineers Sales (29%) Gender Male Male ** Does not include national security espionage Non-technical, lowlevel positions with access to confidential or sensitive information (e.g. data entry, customer service) Fairly equally split between male and female 45
46 Insider Threats in the Cloud Identified by Cloud Security Alliance (CSA) Top Threats to Cloud Computing, v 1.0 Malicious insider working for cloud provider But there are other insider threats related to cloud computing 46
47 Provider / Organization Relationship Resources Employee Data Cloud Provider Resources/Availability Employee Data Victim Organization 47
48 Cloud-Related Malicious Insider Threats Malicious Cloud Provider Employee Rogue Administrator We ve seen cases of insider threats from trusted business partners True examples of cloud service providers are rare, but do exist Important to weigh the risks carefully; the provider has much to lose as well 48
49 Rogue Administrators 49
50 Cloud-Related Malicious Insider Threats Malicious Local Employee Exploiting weaknesses of the Cloud Example weakness the organization may not have direct control of the resources providing data/services Most likely Fraud or Theft of IP Don t count out sabotage, though Attacking organization data in the cloud Access control models may be different Effecting change quickly may be difficult Example case: provider Example exploit: Replication Lag Similar to Byzantine Generals Problem 50
51 Cloud-Related Malicious Insider Threats Malicious Local Employee Using the cloud to attack the organization Example weakness the Cloud is a very powerful tool; and a very powerful weapon, what if it is turned back on the org itself? A financially troubled insider exploits the processing power of cloud services to crack password files, allowing unrestricted access to company bank accounts. A disgruntled insider uses several relatively cheap, easily configured cloud systems to launch a distributed denial of service attack on his organization, hindering incident investigation and limiting forensic analysis. A insider planning to leave the company leverages cloud storage to consolidate and exfiltrate sensitive information to take to a new job with a competitor. 51
52 Protecting Against Malicious Insiders Rogue Administrators From CSA Supply chain management HR requirements as part of legal contracts Require information security and management practices transparency Determine security breach notification processes Enforcement of SLAs Encryption Where do you keep the keys? What is the cost to the host provider? 52
53 Protecting Against Malicious Insiders Those that exploit weaknesses in the Cloud Diligence in planning during implementation, transition, migration, and maintenance of cloud services Current research continues in authorization and access control Directory Virtualization RBAC Clear plans for handling incidents Including authentication and authorization between org and host provider 53
54 Protecting Against Malicious Insiders Those that use the Cloud against you Data Loss Prevention (DLP) Limit access to potential exfiltration resources Create separate environments for external communication 54
55 Future Research Cloud Insider Threats Socio-technical approach Predictive models Identifying cloud-based indicators Virtualization and hypervisors Awareness and reporting Normal user behavior analysis Policy integration 55
56 Predictive Models Centre for the Protection of National Infrastructure (CPNI) Ongoing insider threat risk management program, beginning before hire Greitzer, et al. Identifies and weighs indicators of insider risk Develops a reasoning system to integrate multiple data sources 56
57 Identifying Cloud-based Indicators Many indicators from other domains also apply here Unusual search activity Acquiring unknown access paths What about Cloud-specific indicators? SLA violation Improper virtual machine management Using suspicious software Performing similar activities across different platforms and/or customer systems Lack of concern for company policy or protection of others data Four types of indicators (Ilgun, et al.) Threshold, anomaly, rule-based, model-based 57
58 Virtualization and Hypervisors Attacks practically require authorized access to carry out Hard to accidentally leak information across the hypervisor New technologies to separate virtualization at the hardware level 58
59 Awareness and Reporting May 2012 FBI news story, Economic Espionage: How to Spot a Possible Insider Threat. Many insiders in CERT s database were detected through co-worker reporting Or should have been detected 59
60 Normal User Behavior Analysis Necessary to detect the clever insider Very little research in the literature on insider threat research that compares indicators to normal data Also useful for benchmarking, etc. 60
61 Policy Integration Necessary to merge policies from the org and the cloud Takabi et al. propose a trust management framework for policy integration and an ontology to address semantic heterogeneity among policies. Researchers should be careful to note implementation and/or enforcement constraints real-world organizations face. 61
62 Agenda Background: Cloud Computing Threats to Cloud Security Insider Threats in the Cloud Present, Past, and Future Attacks Threats to Cloud Security 2.0 Future Research 62
63 Past Threats Blue Pill, Red Pill Joanna Rutkowska, Black Hat 2006 Blue Pill Infect machine Red Pill Detect infection Cloudburst 63
64 Present Threats US-CERT VU# (CloudBurst) SYSRET 64-bit operating system privilege escalation vulnerability on Intel CPU hardware 64
65 Future Threats Encryption Supply chain Targeted attacks corporate espionage Provider collusion 65
66 Future Research Measurement/metrics Forensics Incident Response SLA enforcement Isolation Attack vectors CSA Reference Architecture??? 66
67 Threats to Cloud Security 2.0 Web site Opportunity to contribute 67
68 Thank You! Contact Info: William R. Claycomb Lead Research Scientist CERT Insider Threat Research Center Carnegie Mellon University 68
Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks
Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks Dawn M. Cappelli Andrew P. Moore CERT Program Software Engineering Institute Carnegie Mellon University 04/09/08 Session Code:DEF-203
Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks
Risk Mitigation trategies: Lessons Learned from Actual Insider Attacks Randy Trzeciak eptember 24, 2012 http://www.cert.org/insider_threat/ 2012 Carnegie Mellon University Notices 2012 Carnegie Mellon
The Key to Successful Monitoring for Detection of Insider Attacks
The Key to Successful Monitoring for Detection of Insider Attacks Dawn M. Cappelli Randall F. Trzeciak Robert Floodeen Software Engineering Institute CERT Program Session ID: GRC-302 Session Classification:
2012 CyberSecurity Watch Survey
2012 CyberSecurity Watch Survey Unknown How 24 % Bad is the Insider Threat? 51% 2007-2013 Carnegie Mellon University 2012 Carnegie Mellon University NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY
D. L. Corbet & Assoc., LLC
Demystifying the Cloud OR Cloudy with a Chance of Data D. L. Corbet & Assoc., LLC [email protected] Why 'The Cloud' Common Clouds Considerations and Risk Why 'The Cloud' Distributed Very Large / Very
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto
Cloud Computing: What needs to Be Validated and Qualified Ivan Soto Learning Objectives At the end of this session we will have covered: Technical Overview of the Cloud Risk Factors Cloud Security & Data
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
I N T E L L I G E N C E A S S E S S M E N T
I N T E L L I G E N C E A S S E S S M E N T (U//FOUO) Malicious Cyber Actors Target US Universities and Colleges 16 January 2015 Office of Intelligence and Analysis IA-0090-15 (U) Warning: This document
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)
Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald
Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald About DN-Systems Global Consulting and Technology Services Planning Evaluation Auditing Operates own Security Lab Project Management Integral
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Insider Threat Control: Using a SIEM signature to detect potential precursors to IT Sabotage. CERT Insider Threat Center
Insider Threat Control: Using a SIEM signature to detect potential precursors to IT Sabotage CERT Insider Threat Center April 2011 NOTICE: THIS TECHNICAL DATA IS PROVIDED PURSUANT TO GOVERNMENT CONTRACT
Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples The
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
Common Sense Guide to Prevention and Detection of Insider Threats
Common Sense Guide to Prevention and Detection of Insider Threats 2 nd Edition July 2006 Version 2.1 Carnegie Mellon University CyLab Authors Dawn Cappelli Andrew Moore Timothy J. Shimeall Randall Trzeciak
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
I ve been breached! Now what?
I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have
Protecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security [email protected] Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
Practical Steps To Securing Process Control Networks
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
How a Company s IT Systems Can Be Breached Despite Strict Security Protocols
How a Company s IT Systems Can Be Breached Despite Strict Security Protocols Brian D. Huntley, CISSP, PMP, CBCP, CISA Senior Information Security Advisor Information Security Officer, IDT911 Overview Good
Protecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes!
We protect your most sensitive information from insider threats. Protecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes! VARONIS SYSTEMS About Me Dietrich
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection September 2011 10 Potential Risks Facing Your IT Department: Multi-layered Security & Network Protection 2 It s
Anatomy of a Cloud Computing Data Breach
Anatomy of a Cloud Computing Data Breach Sheryl Falk Mike Olive ACC Houston Chapter ITPEC Practice Group September 18, 2014 1 Agenda Ø Cloud 101 Welcome to Cloud Computing Ø Cloud Agreement Considerations
Evaluation Report. Office of Inspector General
Evaluation Report OIG-08-035 INFORMATION TECHNOLOGY: Network Security at the Office of the Comptroller of the Currency Needs Improvement June 03, 2008 Office of Inspector General Department of the Treasury
Public Cloud Security: Surviving in a Hostile Multitenant Environment
Public Cloud Security: Surviving in a Hostile Multitenant Environment SESSION ID: EXP-R01 Mark Russinovich Technical Fellow Windows Azure, Microsoft @markrussinovich The Third Computing Era Security Could
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
The CERT Top 10 List for Winning the Battle Against Insider Threats
The CERT Top 10 List for Winning the Battle Against Insider Threats Dawn Cappelli CERT Insider Threat Center Software Engineering Institute Carnegie Mellon University Session ID: STAR-203 Session Classification:
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Top Ten Cyber Threats
Top Ten Cyber Threats Margaret M. McMahon, Ph.D. ICCRTS 2014 Introduction 2 Motivation Outline How malware affects a system Top Ten (Simple to complex) Brief description Explain impacts Main takeaways
Who s Doing the Hacking?
Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs EXECUTIVE SUMMARY Supervisory Control and Data Acquisition (SCADA) systems are used for remote
RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief
RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:[email protected] Outline of Information Security Introduction Impact of information Need
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
How To Protect Your Network From Attack From Outside From Inside And Outside
IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking
Hacking Book 1: Attack Phases Chapter 1: Introduction to Ethical Hacking Objectives Understand the importance of information security in today s world Understand the elements of security Identify the phases
Topic 1 Lesson 1: Importance of network security
Topic 1 Lesson 1: Importance of network security 1 Initial list of questions Why is network security so important? Why are today s networks so vulnerable? How does Melissa virus work? How does I love you
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
Incident Response Plan for PCI-DSS Compliance
Incident Response Plan for PCI-DSS Compliance City of Monroe, Georgia Information Technology Division Finance Department I. Policy The City of Monroe Information Technology Administrator is responsible
Stay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz [email protected] IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
Bryan Hadzik Network Consulting Services, inc. Endpoint Security Data At Rest
Bryan Hadzik Network Consulting Services, inc. Endpoint Security Data At Rest Look back on 2010 Agenda Incident types Inside Job? Source of Risk Role of Encryption Some Conclusions 2010 A Year In Review
10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected]. Agenda. Security Cases What is Cloud? Road Map Security Concerns
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected] Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
Managed Security Services
Managed Security Services 1 Table of Contents Possible Security Threats 3 ZSL s Security Services Model 4 Managed Security 4 Monitored Security 5 Self- Service Security 5 Professional Services 5 ZSL s
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery
Overview Password Manager Pro offers a complete solution to control, manage, monitor and audit the entire life-cycle of privileged access. In a single package it offers three solutions - privileged account
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 CHIEF INFORMATION OFFICER October 1, 2015 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF
Protecting Organizations from Cyber Attack
Protecting Organizations from Cyber Attack Cliff Glantz and Guy Landine Pacific Northwest National Laboratory (PNNL) PO Box 999 Richland, WA 99352 [email protected] [email protected] 1 Key Topics
Nuclear Security Requires Cyber Security
Nuclear Security Requires Cyber Security A. DAVID MCKINNON, PH.D., MARY SUE HOXIE Cyber Physical Security Team, National Security Directorate Project on Nuclear Issues (PONI) Fall 2015 Conference PNNL-SA-113027
Keynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
FACING SECURITY CHALLENGES
24 July 2013 TimeTec Cloud Security FACING SECURITY CHALLENGES HEAD-ON - by Mr. Daryl Choo, Chief Information Officer, FingerTec HQ Cloud usage and trend Cloud Computing is getting more common nowadays
Is it Time to Trust the Cloud? Unpacking the Notorious Nine
Is it Time to Trust the Cloud? Unpacking the Notorious Nine Jonathan C. Trull, CISO, Qualys Cloud Security Alliance Agenda Cloud Security Model Background on the Notorious Nine Unpacking the Notorious
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
The Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
Cybersecurity for the C-Level
Cybersecurity for the C-Level Director Glossary of Defined Cybersecurity Terms A Active Attack An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources,
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
NATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
GEARS Cyber-Security Services
Florida Department of Management Services Division of State Purchasing Table of Contents Introduction... 1 About GEARS... 2 1. Pre-Incident Services... 3 1.1 Incident Response Agreements... 3 1.2 Assessments
