Security Challenges and Solutions for Higher Education May 2011
Discussion Topics Security Threats and Challenges Education Risks and Trends ACH and Wire Fraud Malware and Phishing Techniques Prevention Education The Dell Solution
Security Threats and Challenges Changing Threat Landscape Shift in hacking for fun to hacking for profit Dynamic User Base Student and faculty provided equipment Mobile devices (phone and tablet) Security Education Different cultural expectations (digital natives vs. tradition users) IT Complexity In source, out source, cloud, hybrid, geographic diversity
Risk Trends for Higher Education Eastern European & Asian banking trojans Privacy laws and regulations Social media User (unintentionally) initiated malware
ACH & Wire Fraud Hundreds of millions of dollars stolen Targets small and medium sized public entities Targets small banks and credit unions but large banks such as Bank of America and Comerica have been hit
What is ACH/Wire Fraud? The practice of using targeted malware to Steal banking credentials or Transfer funds out of the US via ACH and money mules Or wire transfers to foreign payers Estimated losses range from $200 to $500 million
Cybercrime Who are the targets? Small and medium businesses Experimental Metal Patco Public institutions School districts Daunesburg Central School District Public services Novato Sanitation Department
Malware How does it work? Botnets such as the ZeuS, backdoor.bot and SpyEye enter the victims computer through a variety of means Spear phishing Fake antimalware drive-by-downloads via compromised web sites
Phishing Impressions 2010
Phishing via Social Media LinkedIn users targeted by ZeuS-based fake connection requests Hard on the heels of the spate of Twitter attacks comes news that LinkedIn members are being targeted by carefully crafted fake connection requests that route users to the ZeuS datadownloading malware.
Fake Antimalware 4,391,982 found in 6 months Police in the United States and seven other countries seized computers and servers used to run a "scareware" scheme that has netted more than $72 million from victims tricked into buying fake anti-virus software
Bots are Easy to Use
Countermeasures
Protecting the Porous Perimeter Firewall Filter both ways Add Intrusion Detection Outsource 24x7 Monitoring Educate users about the dangers of phishing If compromised engage incident response immediately
Dell SecureWorks Value we provide customers
SecureWorks Three Pillars 1. Managed Security Services 24x7x365 monitoring, management, of customer s security devices 2. Security and Risk Consulting Security consulting services Counter Threat Unit Intelligence Services Managed Security Services 3. CTU Intelligence Subscription based security intelligence service Security and Risk Consulting Confidential
Managed Security Services Security Monitoring Managed IDS/IPS Firewall Management Web App Firewall Management Log Management SIM On-Demand Vulnerability Management Counter Threat Unit Intelligence Services Security and Risk Consulting Managed Security Services 18 Dell Confidential
Counter Threat Unit Intelligence Services Threat & Vulnerability Feeds Attacker Database Feed Live Intelligence Briefings MS Update Analysis Malware Analysis Emerging Threat Bulletins Counter Threat Unit Intelligence Services Security and Risk Consulting Managed Security Services 19 Dell Confidential
Security and Risk Consulting Testing & Assessments Compliance & Certification Incident Response & Forensics Program Development & Governance Architecture Design & Implementation Allows customers to focus Identity & Access Management Expert Residency Counter Threat Unit Intelligence Services Security and Risk Consulting Managed Security Services 20 Dell Confidential
KACE End-Point Security Detect Assess Remediate Protect Device Discovery OVAL /SCAP Results Patch Deployment Secure Browsers Software Block Inventory OVAL /SACP Scanning Patch Detect Configuration Correction Configuration Enforcement KACE Virtual Disk
Thank You