Digital War in e-business



Similar documents
IT Security. Securing Your Business Investments

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Critical Controls for Cyber Security.

Vendor Risk Assessment Questionnaire

The Information Security Problem

Patch and Vulnerability Management Program

Microsoft Technologies

Bellevue University Cybersecurity Programs & Courses

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Basics of Internet Security

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Information Security Policy

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

Introduction to Cyber Security / Information Security

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Hackers are here. Where are you?

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

Chapter 9 Firewalls and Intrusion Prevention Systems

NETWORK PENETRATION TESTING

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Computer Crime & Security Survey

ABB s approach concerning IS Security for Automation Systems

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Securing the Service Desk in the Cloud

Best Practices for DanPac Express Cyber Security

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Certified Information Systems Auditor (CISA)

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

Security aspects of e-tailing. Chapter 7

Goals. Understanding security testing

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

INCIDENT RESPONSE CHECKLIST

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

ADM:49 DPS POLICY MANUAL Page 1 of 5

Franchise Data Compromise Trends and Cardholder. December, 2010

CRYPTUS DIPLOMA IN IT SECURITY

WHITE PAPER. An Introduction to Network- Vulnerability Testing

Qualification Specification. Level 4 Certificate in Cyber Security and Intrusion For Business

CSI/FBI 2000 COMPUTER CRIME AND SECURITY SURVEY

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

SCADA SYSTEMS AND SECURITY WHITEPAPER

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Reducing the cost and complexity of endpoint management

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Patch Management Policy

Network Security Policy: Best Practices White Paper

Network/Cyber Security

Information Security Basic Concepts

Name. Description. Rationale

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

New IBM Security Scanning Software Protects Businesses From Hackers

information security and its Describe what drives the need for information security.

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Guide to Vulnerability Management for Small Companies

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

SecureAge SecureDs Data Breach Prevention Solution

Office of Inspector General

A Decision Maker s Guide to Securing an IT Infrastructure

Best Practices For Department Server and Enterprise System Checklist

Comodo Endpoint Security Manager SME Software Version 2.1

Hackers are here. Where are you?

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

The Protection Mission a constant endeavor

IT Security Risks & Trends

Four Top Emagined Security Services

External Penetration Assessment and Database Access Review

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

An Introduction to Network Vulnerability Testing

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

FortiClient dialup-client configurations

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Introduction. PCI DSS Overview

Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring. A White Paper from the Experts in Business-Critical Continuity TM

Network Segmentation

DigitalPersona, Inc. Creating the authentication infrastructure for a digital world.

IT OUTSOURCING SECURITY

Security and Access Control Lists (ACLs)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Protecting critical infrastructure from Cyber-attack

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Managing Security Risks in Modern IT Networks

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Transcription:

Digital War in e-business Ricci Ieong, Secretary of ISFS, Senior Security Consultant, PrivyLink (HK) Ltd.

Trend in Internet Commerce Market More Internet Commerce Market G Increase in Business to Commerce Services G Increase in Business to Business Services G Increase in e-crm, e-scm, ERP G Increase in e-banking More Financial transactions on Internet

Growth in Security Investment No of companies spending more than US$1 million a year has doubled from 1999 to 2000; Increment in Security Budget; Increase revenue for Security vendors; More jobs in computer security market.

Most popular security products Prevention Tools G Firewall G VPN G Intrusion Detection Systems G Virus Scanner G Biometrics tools Infrastructure G PKI G Smart card Services G Security Consultancy

Results: More Hacking More than half of the Small and Mediumsized enterprises (SMEs) will be hacked from now to 2003 More than 80% of companies in Asian region will be attacked from now to 2003. According to Gartner Group report

Hacking Events Around 10-20 web sites have been defaced daily Computer Fraud reported in HK increased from 38 (1999) - 207 (2000) More online banks were hacked G UK bank Barclays G Powergen G Bank One Online HSBC (UK) web site have been defaced G (http://www.attrition.org/mirror/attrition/2000/09/19/www.bank ing.hsbc.co.uk/mirror.html) Microsoft was being hacked (not once but twice)

Hacking Events

Why more hacking? More targets More hackers especially teenage hackers More hacking news reported Increase in Internet Market No enough investment in security Improper implementations of security products. Spending more for computer security alone won t protect the network from hackers and cybersaboteurs.

Why more hacking?

What s the trend of computer security? Forensics Investigations Physical Control Network Design Physical Security Insurance Access Control IBM AS/400 Monitor Network Standalone Machine Terminal Firewall System Assessment Laptop computer Desktop System IDS VPN

Future picture in security? Protection Authentication Virus Scanner Firewall VPN PKI IDS Legislation Assurance BCP, BRP System Checkup Penetration Test HackProof Insurance Trace hacking source Trap hacker evidence Forensics Investigation Insurance Investigation

Solution to security problems Firewall Configurations Boundary Services Consolidate and centralized remote access Installation of Intrusion Detection Systems Assurance Test Installation of evidence preserving tools

Risk Assessment Strategies Systems inventory and definition Vulnerability and threat assessment Evaluation controls Decision Communication and monitoring

Assurance Test System Checkup G Firewall configuration check G OS System Check G Network Configuration Check Penetration Test G Internal Pen Test G External Pen Test

White-Box Approach Preparation 1. 1. Design Review Track Track and and Report 2. 2. Verification 3. 3. Discovery 4. 4. Realisation Passive Testing Active Testing 5. 5. Sniff-&-Hide

System Checkup Evaluate the each machine on: G System Configurations G Password file protections G Firewall, Router Setting G Ethernet Switch Setting G Database Setting

Penetration Test Penetration Test G Internal Attack from internal network Attack at machine console G External Determine OS type Confirm Patches Version Determine possible vulnerabilities Perform system attack

CyberCop Scanner

ISS Scanner

Internet Security System

Insurance Services Computer Security Insurance Hack proof Insurance Market players include G ICSA Security Services

Prepare to be hacked? No hack proof system Setup Honey pot Setup Intrusion Detection System Setup proper audit logging system

Investigation Search for evidence from hacked system Preserve as much evidence as possible Identify hacking source location Collect audit logs and trail from all relevant machines

In Hong Kong Legislation G No Computer Crime Ordinance G Based on Crimes Ordinance, Cap 200 Theft Ordinance, Cap 210 Electronic Transactions Ordinance, Cap 553 Criminal Jurisdiction Ordinance, Cap 461 No cross boundary law Legal entities have to learn more on security technology trend

What individual can do? Learn to preserve evidence according to industry best practices Protect the systems based on security standards Conduct Security Awareness Training Establish connections with Security Organization Entity Perform regular checkup

What participants should do? No Security at all Any machines can be hacked any time Can Minimize hacking damage Track hacking evidence and identify hacking Corporate with Law enforcement entity and HK CERT

Tel: (852) 2523 3908 Fax: (852) 2501 5503 ricci@privylink.com.hk PrivyLink (HK) Ltd Portion B, 38/F Bank of China Tower 1 Garden Road Hong Kong