Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite



Similar documents
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Network Security Forensics

Franchise Data Compromise Trends and Cardholder. December, 2010

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Attacks from the Inside

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

IT Security Risks & Trends

Basics of Internet Security

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

FIREWALL POLICY November 2006 TNS POL - 008

Microsoft Technologies

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

PCI Compliance. Top 10 Questions & Answers

Network and Host-based Vulnerability Assessment

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Need for Database Security. Whitepaper

Impact of Data Breaches

A Decision Maker s Guide to Securing an IT Infrastructure

Compliance Guide: PCI DSS

McAfee Database Security. Dan Sarel, VP Database Security Products

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Information Security & Privacy Solutions Enabling Information Governance

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

PCI Compliance Top 10 Questions and Answers

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

IBM QRadar Security Intelligence April 2013

Managing IT Security with Penetration Testing

September 20, 2013 Senior IT Examiner Gene Lilienthal

The Smart Choice: IPLocks Information Risk Management Platform with Oracle Database

Guardium Change Auditing System (CAS)

Smarter Security for Smarter Local Government. Craig Sargent, Solutions Specialist

Assuring Application Security: Deploying Code that Keeps Data Safe

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

How To Manage Security On A Networked Computer System

End-user Security Analytics Strengthens Protection with ArcSight

z/os Security - FTP Logon Failures

Before the DEPARTMENT OF COMMERCE Internet Policy Task Force

Leveraging Privileged Identity Governance to Improve Security Posture

How To Secure An Enterprise From Hackers

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Digital War in e-business

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Intrusion Detection from Simple to Cloud

Software that provides secure access to technology, everywhere.

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Security Advisory. Some IPS systems can be easily fingerprinted using simple techniques.

Teradata and Protegrity High-Value Protection for High-Value Data

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

June 2006 Tiger Teams! The new face of Penetration Testing

A practical guide to IT security

PCI Compliance in Multi-Site Retail Environments

Defending Against Data Beaches: Internal Controls for Cybersecurity

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

IBM Managed Security Services Vulnerability Scanning:

Network- vs. Host-based Intrusion Detection

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions

The Impact of Cybercrime on Business

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

The Networthy iseries

Securing ephi with Effective Database Activity Monitoring. HIMSS Webcast 4/26/2011. p. 1

Network Instruments white paper

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

DMZ Gateways: Secret Weapons for Data Security

Securing and protecting the organization s most sensitive data

INDUSTRY OVERVIEW: HEALTHCARE

Global Partner Management Notice

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

Into the cybersecurity breach

Addressing the United States CIO Office s Cybersecurity Sprint Directives

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group

Average annual cost of security incidents

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Comprehensive Approach to Database Security

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Someone may be manipulating information in your organization. - and you may never know about it!

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Managing Security Risks in Modern IT Networks

PCI Wireless Compliance with AirTight WIPS

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

GFI White Paper PCI-DSS compliance and GFI Software products

Critical Security Controls

PCI v2.0 Compliance for Wireless LAN

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Tivoli Security Information and Event Manager V1.0

How to complete the Secure Internet Site Declaration (SISD) form

Cyber Security An Exercise in Predicting the Future

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

The Impact of Wireless LAN Technology on Compliance to the PCI Data Security Standard

Securing Endpoints without a Security Expert

This policy shall be reviewed at least annually and updated as needed to reflect changes to business objectives or the risk environment.

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Transcription:

Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi XXVIII Convegno Annuale del CMG-Italia Milano - 28 Maggio 2014 Roma 29 Maggio 2014

Agenda About SAC The Problem How Attackers Operate Popular Hacking Tools FTP Issues What the Products do and how Conceptual Overview Why are our products important?

About SAC Founded in 1990 Developed a number of very successful products Until now purely development company Products were private labeled by other companies, for ex: AF/Operator: Candle Corporation (now IBM) TapeSaver: Mobius Management Systems (now Unicom) These products have been sold or moved to subsidiaries Focus on the FTP/Security Suite Establishing Worldwide Partner Network

The Problem Complex problem, lack of understanding in market place Big vendors focus security discussion on their products Most attacks never make it to the press do not educate the market Customers often: Do not know how hackers operate Spend a lot of money on some solutions Lack tools in other (important) areas Result: Companies don t even know they were attacked or notice it many months later and don t know what was taken

How attackers operate Attackers can be Hobbyists, Amateurs or Professionals Use automated tools Attack weaknesses in common Tools and Protocols Prefer those that are not typically monitored Prime Target: FTP The world s most common data interchange protocol, including corporate IT Customers forget they use it, no one responsible No Management / Monitoring Tools By default attacks are typically not logged Attack tools available on internet, instructions on YouTube

Popular FTP Hacking Tools THC-Hydra (http://www.thc.org/thc-hydra) Medusa (http://foofus.net/goons/jmk/medusa/medusa.html) Ncrack (http://nmap.org/ncrack) Brutus (http://www.hoobie.net/brutus)

Search Hack FTP on YouTube

Where is FTP used? With External Partners Often hosting sensitive data On Web Servers Providing access to the corporate web site and other resources As departmental data interchange tool Often deployed without IT s knowledge & involvement Typically extremely vulnerable due to lack of security In the Data Center Server <-> Server and Server <-> Mainframe data transfer

FTP Issues Don t know where they use FTP and how much No Tools to monitor and audit FTP usage Lack of compliance Not able to detect attacks Not able to determine what was taken Not sufficiently protected against FTP attacks Firewalls and IDS (Intrusion Detection Systems) cannot do it

Intrusion Detection Systems Designed primarily to detect intrusions from outside Malicious employees and contractors are a common threat Looks for anomalies in network traffic Does not understand the network protocols it looks at Recognizes brute force attacks by frequency, not content Can be circumvented easily

The FTP/Security Suite FTP/Auditor: FTP Server discovery Where is FTP running, how is it secured? FTP/Sentry: Real-Time monitoring and alerting What is happening? What problems are occurring? Sentry Desktop: Auditing and historical analysis Who accessed which files - when and from where? Exceptions and Alerts FTP/Armor: Securing FTP Servers Detects attacks, alerts IT staff and blocks intruders Complements Intrusion Detection Systems FTP/Guardian: Integrates Mainframe FTP with Mainframe Security

Conceptual Overview Real Time Monitor Sentry Desktop Remote Agents FTP Activity DB (SQL Server)

Typical FTP Attack User: Administrator Password: AAAAA Password: AAAAB Password: AAABA Password: AAABB IP n.n.n.n

FTP Attack with FTP/Sentry User: Administrator Password: AAAAA Password: AAAAB Password: AAABA Password: AAABB Real Time Monitor IP n.n.n.n FTP Activity DB (SQL Server)

FTP Attack with FTP/Sentry User: Administrator Password: AAAAA Password: AAAAB Password: AAABA Password: AAABB Real Time Monitor Alert Console IP n.n.n.n Email Sentry Desktop

FTP Attack with FTP/Sentry User: Administrator Password: AAAAA Password: AAAAB Password: AAABA Password: AAABB BLOCK IP n.n.n.n BLOCK IP n.n.n.n Real Time Monitor IP n.n.n.n BLOCK IP n.n.n.n Remote Agents

FTP Attack with FTP/Sentry User: Administrator Password: AAAAA Password: AAAAB Password: AAABA Password: AAABB IP n.n.n.n Connection refused Remote Agents

Why are our products so important? Without them our Customers would not: Know which servers are vulnerable through running FTP Be protected against FTP attacks Be able to notice an attack what ID was compromised and what was taken Be able to audit WHEN WHO accessed WHAT from WHERE Have operational visibility and control of their FTP infrastructure

Interesting Studies & Reports Carnegie Mellon Software Engineering Institute: Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector Key Findings: An average of 32 months elapsed between the beginning of the fraud and its detection by the victim organization The insiders means were not especially sophisticated the fraud was possible due to lack of controls/security, not the skills of the perpetrators

Interesting Studies & Reports Forrester: Understand The State Of Data Security And Privacy: 2012 To 2013 Key Findings: Intentional Data Theft accounts for 45% of all Data Breaches 33% of Intentional Data Theft is committed by Malicious Insiders 66 % of Intentional Data Theft is committed by External Attacks

Interesting Studies & Reports Ponemon Institute: 2012 Cost of Cyber Crime Study: United States Key Findings: Average cost of a data breach in the US is $8,933,510 Certain industries, such as Financial Services, experience higher cost The companies in the study experienced an average of 1.8 successful attacks per week

Questions?