CERT Polska. Przemyslaw Jaroszewski, Miroslaw Maj CERT POLSKA. info@cert.pl. TF-CSIRT Meeting, Copenhagen, 23 May 2002. http://www.cert.



Similar documents
Open Source Incident Management Tool for CSIRTs

Experiences of an academic CSIRT

Alexandr Golubev ( RENAM Association

10. Exercise: Automation in Incident Handling

Development of an IPv6 Honeypot

Use of Honeypots for Network Monitoring and Situational Awareness

honeytarg Chapter Activities

Quick Heal Exchange Protection 4.0

Implementing an Incident Response Team (IRT)

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA

POLISH TELECOM SECURITY INCIDENT RESPONSE TEAM

CSIRT Description for CERT OPL

Designing and Developing an Application for Incident Response Teams

Romanian National Computer Security Incident Response Team CERT-RO.

RTIR incident handling work-flow

Designing and developing an Application for Incident Response Teams

Paperless Office process and document management system

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

Building a Cyber Security Emergency Response Team (CERT) for the NREN Community The case of KENET CERT

How To Protect Gante From Attack On A Network With A Network Security System

TECHNICAL REPORT. An Analysis of Domain Silver, Inc..pl Domains

Report on Cyber Security Alerts Processed by CERT-RO in 2014

Challenges and Best Practices in Fighting Financial Fraud in Brazil

Security Officer: An NREN Secondee Perspective

Privacy Policy for culinarydreamsinc.com

Implementation of Universal Global Trusted Service Provider Identity (Trusted SPID)

Vulnerability handling DK-CERT

FLASH DELIVERY SERVICE

Network Security in Vietnam and VNCERT. Network Security in Vietnam and VNCERT

IP Address Management and DNS Management

Information Sharing Use Cases

Paladin Computers Privacy Policy Last Updated on April 26, 2006

Identity Theft Prevention Program

SysPatrol - Server Security Monitor

Spampots Project Mapping the Abuse of Internet Infrastructure by Spammers

University System of New Hampshire. Identity Theft Prevention Program

Chapter 2 Introduction

FlowMon. Complete solution for network monitoring and security. INVEA-TECH

Ouachita Baptist University. Identity Theft Policy and Program

How To Run A Realtime Blackhole List (Rbl) In Hkong Kong Ken Kong

Pacific Islands Telecommunications Association

Kaseya Server Instal ation User Guide June 6, 2008

Intelligent Security Design, Development and Acquisition

How To Perform A Large Scale Attack On A Large Network

ProCert X PROFESSIONAL CERTIFICATE EXCHANGE

Magento Extension REVIEW BOOSTER User Guide

How To Perform A Large Scale Attack On A Large Computer System

CERT Polska operates within the framework of the Research and Academic Computer Network CERT POLSKA REPORT

Information Security Awareness Videos

PRODUCT DESCRIPTION OF SERVICES PROVIDED BY IPEER

CERT.br Incident Handling and Network Monitoring Activities

Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009

CERT.AZ description as per RfC 2350

Deliverability Demystified:

Koch Communications Privacy Policy

RT and RT for Incident Response

University Policy: Identity Theft Prevention Policy

How To Protect A Network From Attack From A Hacker (Hbss)

District Grants Scholarships

Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transactions

SMS 112 in Sweden. Table of contents

PROJECT Domeny.tv Domeny.tv

SAC 049 SSAC Report on DNS Zone Risk Assessment and Management

Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements

Rules for fixing WIBOR and WIBID reference rates

Anti-SPAM Policy v

INFORMATION SECURITY REVIEW

Report of Independent Auditors

Green University. Identity Theft Prevention Program. Effective beginning October 31, 2008

Phone Fax

University of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response)

602LAN SUITE 5.0 Groupware

RT and RT for Incident Response

BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS)

Cloud Services. Anti-Spam. Admin Guide

Mail Hosting Services Terms and Conditions

Final. Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN)

How Much Do I Need To Do to Comply? Vice president SystemExperts Corporation

Privacy Policy

Subpoena Compliance and Special Investigations. Law Enforcement Assistance Guide for Internet Investigations

Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention

N a t i o n a l F u n e r a l D i r e c t o r s A s s o c i a t i o n

HIPAA Compliance Evaluation Report

Central Oregon Community College. Identity Theft Prevention Program

Identity Theft Prevention Program

Identity Theft Prevention Program

Infrastructure Support Engineer Job Profile

Security Incidents And Trends In Croatia. Domagoj Klasić

ReadySpace Limited Unit J, 16/F Reason Group Tower, Castle PeakRoad, Kwai Chung, N.T.

Quick Start Policy Patrol Mail Security 10

Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

CERT.br: Mission and Services

Ticketing Systems with RT

Network Management & Monitoring Ticketing Systems with RT

An Overview of Emergency Management in Fairfax County. Presented by: Ellen Kamilakis Fairfax County Office of Emergency Management

MAKE YOUR WEBSITE SAFE & SECURE

Evolution of attacks and Intrusion Detection

Help-desk and registry - v2

Transcription:

CERT Polska Przemyslaw Jaroszewski, Miroslaw Maj CERT POLSKA info@cert.pl http://www.cert.pl/ TF-CSIRT Meeting, Copenhagen, 23 May 2002

Agenda A bit of history Who are we? What do we do and for whom? Who do we work with? How do we do it? CERT Polska Report 2001

A bit of history CERT Polska founded in 1996 as CERT NASK NASK (Research and Academic Network in Poland) administers top-level domain.pl CERT was to handle security incidents for this domain Joined FIRST in 1997 as a full member Known as CERT Polska since 2001 TERENA TI Level 2 since November 2001

Who are we? A virtual CERT until 2000 Now a team within NASK structures separated from the internal security team Three people directly assigned to CERT backed with support of NASK engineers when needed

Our goals providing a single, trusted point of contact in Poland for the NASK customers community and other networks in Poland to deal with network security incidents and their prevention responding to security incidents in networks connected to NASK and networks connected to other Polish providers providing security information and warnings of possible attacks cooperation with other incident response teams all over the world

What do we do? Handling internal incidents NASK is one of major Polish ISPs, connecting plenty of academic and governmental institutions CERT registers internal incidents reported by IDS systems, third-party or in any other way and coordinates their handling Close cooperation with NASK s security team and other teams Lack of shared ticketing system

What do we do? So far, CERT Polska is the only Polish CSIRT active on international arena. we act as a contact point to other providers and their security teams or CSIRTs we are widely recognized and respected in Poland by providers and other institutions as trusted point of exchange of information we register all incidents involving Polish networks reported to us however, most incidents are handled by other providers own CSIRTs

What do we do? Education: http://www.cert.pl/ popular source of information on IT security in Polish place to publish own advisories and links to other sources mailing list for alerts and periodical news updates guides for reporting the incident

What do we do? Education: conferences and seminars: SECURE major annual two-day event organized by CERT Polska and NASK with great support from leading technology and methodology providers. guests from both Poland and abroad are invited to give speeches on various aspects of IT security (Tenn Nijsen, Damir Rajnovic, David Crochemore, Rob Thomas, Ian Cook to be mentioned) traditionally, two parallel blocks (for managers and technicians) are held great place to learn and establish contacts for many popularity of the event grows every year, attracting more than 100 people

What do we do? Close cooperation with governmental institutions leads to plans for CERT Polska to play an important role in securing critical country infrastructure. CERT Polska would act as an information exchange point and knowledge base. March 2002: Conference on Protection of National Critical Infrastructure - David Parker sharing his experience from UNIRAS

Who do we work with? Colleagues from NASK Law enforcement: actively supporting each other on conferences and seminars, both organized by CERT Polska and the Police knowledge base and expertises Inspector General for the Protection of Personal Data

Who do we work with? Other Polish CSIRTs Polish Telecom (TP S.A. Abuse Team) AsterCity.net POL34-CERT and others... Quality of these contacts varies

How do we do it? Automated processing, as far as possible CodeRed, Nimda Klez SpamCop notifications spam Manual processing with Windows application Web interfaces for fast lookup in all databases

How do we do it? ^Subject: \[SpamCop First occurence of this IP? NO YES NO Was last occurence more than a month ago? YES store new information in existing record look up WHOIS databases STOP create a template for automated registration send a note on new report from SpamCop manual data verification, half-automated registration Regular manual incident handling procedures

How do we do it? Manual processing: self-developed Windows application. Features: built-in contacts database management basic reports and statistics reminders SQL lookup front-end Under permanent development

CERT Polska Statistics 21/05/2002 1000 900 800 Number of icidents 700 600 500 400 300 200 100 0 1996 1997 1998 1999 2000 2001 2002 Year

CERT Polska Report 2001 How many computers are attacked during a single incident? 34% Amount classes 3% 9% ' 54% 0% 10% 20% 30% 40% 50% 60% 1 2-254 255 + 1+ Per cent

CERT Polska Report 2001 What is attacked? 25,1% 2,4% 1,1% 0% 5% 10% 15% 20% 25% 30% Design Implementation Configuration

CERT Polska Report 2001 Most frequent attacks 3,6% 3,1% 4,2% 4,6% 2,3% 0,9% 1,8% 2,0% 13,9% 17,1% 46,4% 0% 10% 20% 30% 40% 50% Backdoor Break-In Virus (other) DoS SirCam Probe WWW defacement Code Red / Nimda Spam Scan Undetermined

CERT Polska Report 2001 Who reports to us? 3,9% 3,1% 9,6% 12,0% 9,4% 12,0% 11,2% 38,7% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Domestic Individual Foreign Individual Domestic CERT Foreign CERT Domestic Security Related Inst Foreign Security Related Inst Domestic Company, Inst Foreign Company, Inst

CERT Polska Report 2001 Who attacks? 11,3% 10,0% 14,0% 56,5% 8,1% 0% 10% 20% 30% 40% 50% 60% Education ISP Commercial Known IP, Unknown Branch Undetermined

Questions? Comments? info@cert.pl phone: +48 22 523 1274 fax: +48 22 523 1399

Thank you!