Hacking Oracle myths and facts. Michał Jerzy Kostrzewa EECIS Director Database Technologies Michal.Kostrzewa@Oracle.com



Similar documents
<Insert Picture Here> Oracle Database Vault

McAfee Database Security. Dan Sarel, VP Database Security Products

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Complete Database Security. Thomas Kyte

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Protecting Sensitive Data Reducing Risk with Oracle Database Security

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

SecurityMetrics Vision whitepaper

Next Generation Datacenters & the Realities of Virtualisation Security

FERPA: Data & Transport Security Best Practices

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Defending the Database Techniques and best practices

Making Database Security an IT Security Priority

Oracle Database Security Solutions

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Information Security in Universities

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

Security Basics: A Whitepaper

Comprehensive Approach to Database Security

Cloud Security and Managing Use Risks

Securing Data in Oracle Database 12c

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

DMZ Gateways: Secret Weapons for Data Security

Boston University Security Awareness. What you need to know to keep information safe and secure

Intelligent Security Design, Development and Acquisition

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

Data Security for the Hospitality

Information Security Threat Trends

Student Tech Security Training. ITS Security Office

Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

<Insert Picture Here> Oracle Database Security Overview

Internet threats: steps to security for your small business

Securing Oracle E-Business Suite in the Cloud

10 Smart Ideas for. Keeping Data Safe. From Hackers

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Brainloop Cloud Security

Database Security and Auditing: Leading Practices. Rob Barnes Director, Enterprise Auditing Solutions Application Security, Inc.

Security for a Smarter Planet IBM Corporation All Rights Reserved.

I ve been breached! Now what?

AUTOMATED PENETRATION TESTING PRODUCTS

Database Security & Auditing

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

Information Security for the Rest of Us

How SUSE Manager Can Help You Achieve Regulatory Compliance

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

External Penetration Assessment and Database Access Review

Oracle Database 11g: Security. What you will learn:

A Decision Maker s Guide to Securing an IT Infrastructure

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

31 Ways To Make Your Computer System More Secure

Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Web App Security Audit Services

Anatomy of a Data Breach Why Breaches Happen and What to Do About It

Enterprise Computing Solutions

Top 10 Database. Misconfigurations.

SQuAD: Application Security Testing

Oracle Database Security

THE FIRST UNIFIED DATABASE SECURITY SOLUTION. Product Overview Security. Auditing. Caching. Masking.

Cyber Security Incident Response Program. Dr. Michael C. Redmond, PhD MBCP,FBCI,CEM,PMP,MBA

Secure Remote Control Security Features for Enterprise Remote Access and Control

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Auditing Data Access Without Bringing Your Database To Its Knees

Defending Against Data Beaches: Internal Controls for Cybersecurity

FORBIDDEN - Ethical Hacking Workshop Duration

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

Cybercrime: risks, penalties and prevention

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

How to complete the Secure Internet Site Declaration (SISD) form

Worldwide Trends in Database Threats and Database Security

Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

Penetration Testing //Vulnerability Assessment //Remedy

Cyber Risks and Insurance Solutions Malaysia, November 2013

Security and Privacy

Transcription:

Hacking Oracle myths and facts Michał Jerzy Kostrzewa EECIS Director Database Technologies Michal.Kostrzewa@Oracle.com

Agenda Todays security challenges Who is dangerous for our business? How do we get attacked? How can we protect ourself? 2

More data than ever Growth Doubles Yearly 1,800 Exabytes 2006 2011 Source: IDC, 2008 2

More breaches then ever Data Breach Once exposed, the data is out there the bell can t be un-rung PUBLICLY REPORTED DATA BREACHES 630% Increase Total Personally Identifying Information Records Exposed (Millions) Source: DataLossDB, 2009 3

More threats than ever 4

More Regulations Than Ever UK/PRO PIPEDA Sarbanes-Oxley PCI Breach Disclosure HIPAA GLBA FISMA EU Data Directives Basel II K SOX Euro SOX ISO 17799 J SOX SAS 70 COBIT AUS/PRO 90% Companies behind in compliance Source: IT Policy Compliance Group, 2009. 5

Market Overview: IT Security In 2009/2010 There has been a clear and significant shift from what was the widely recognized state of security just a few years ago. Protecting the organization's information assets is the top issue facing security programs: data security (90%) is most often cited as an important or very important issue for IT security organizations, followed by application security (86%). 6

#1 Source of Breached Data: 92% of Records from Compromised Database Servers 2010 Data Breach Investigations Report 8

Organizations Don t Protect Databases The 2010 IOUG Data Security Report Only 24% can prevent DBAs from reading or tampering with sensitive data 68% can not detect if database users are abusing privileges Less than 30% monitoring sensitive data reads/writes 48% not aware of all databases with sensitive data 44% say database users could access data directly 70% use native auditing, only 25% automate monitoring Only 28% uniformly encrypting PII in all databases 66% not sure if web applications subject to SQL injection 63% don t apply security patches within 3 months of release 9

Agenda Todays security challenges Who is dangerous for our business? How do we get attacked? How can we protect ourself? 10

Where does the attacks come from? Source: Verizon Data Breach Report 2009

Who is the target? Source: Verizon Data Breach Report 2009

Who is attacking us? Hack3rs Insiders

Information Security Has Changed 1990 Hobby Hackers Web Site Defacement Viruses Infrequent Attacks 2010 Rentable professional Hackers Criminals Denial of Service Identity Theft Constant Threat

Mythos Hacker sneakers

Underground organisation Organized Computer Crime Spam Espionage Sabotage Flexible business models Marketender Logistican Programer Group Orgnisations (fast exchange)

Hacking Steps Preparation Phase Planing Phase HACK Targeting Information collection Social engineering Social networking Underground scene consolidation Detailed planning Risk analysis Staffing Alternative plans Methods Techniques Choose precautions Attack Backdoor installation Track cleaning legal ilegal observation take down

Official statistics Secret Service Germany Dramatical increas of the computer crime since the last 12 years (professionalism) Bigest damage by insiders (sabotage, spying, Information selling) Typical Hacker is male and over 21; BUT starts with 14!!! Source: BND Sicherheitsreport 2008

Criminal Energie Profiling Hack3rs Classic Criminal Prof. Hackers Industry Spy Secret Service Script Kiddies Insider discovered Hacks by police and secret service Interested computer users Classic Hacker Know How

Computer Crime Development Quality Computer Criminality Hacking Tools Know How 1980 Source: BND Sicherheitsreport 2008 1990 2000 2010 Enlightenment success Time

Short Facts 87 % of all Databases are compromised over the Operating System 80 % of the damage is caused by insiders 1 % of all professional hacks are only recognized 10 % of all standard hacks are made public

Highscore List 30sec Windows Vista Source: Black Hat / Defcon (unofficial) 40sec Windows XP SP2 55sec Windows Vista 63sec Windows NT4.0 WKST, SP4 70sec Windows 2003 Server 140sec Linux (latest kernel) 190sec Sun Solaris with rootkit... List includes also AIX, HPUX, OS2, OSX, IRIX,

Shopping List 2007/2008 Source: heise security 50.000 $ Windows Vista Exploit (4000$ for WMF Exploit in Dec2005) 7 $ per ebay-account 20.000 $ medium size BOT network 30.000 $ unknown security holes in well known applications 25-60 $ per 1000 BOT clients / week

Crisis Shopping List 2009 Source: heise security 100.000 $ Destruction of competitor image 250.000 $ Full internal competitor database 25 $ per credit card account (+sec code + valid date) 20.000 $ medium size BOT network (buy or rent) 2000 $ stolen VPN connection 5000 $ contact to turned around insider

Target List 2010 Targets: - Financial information (to sell to governments) - Complete digital identities (personal details, financial informations, employer data, social network details, insurance and health system informations...) - Espionage & Sabotage (foreign industries) - Information warfare - Cloud based Bot-Networks Source: Black Hat / Defcon (unofficial)

Who is attacking us? Hack3rs Insiders

Insider examples!!! European headlines 2008-2010: - lost top secret document about Al Quaida (public train) - stolen data of thousand prisoners and prison guards - personal information of 70Mio people unencrypted on DVD s lost - bank employee gambled with 5.4Bio US$ - 88% of admins would steal sensitive corporate informations - Industry espionage by insiders increased dramatically - biggest criminal network (RBN) still operating - Tousends of stolen hardware equipement @ US Army - US Army lost 50.000 personal data of former soliers - Chinas Red Dragon organization cracked german gov network - Lichtenstein Affaire Insider vs. Secret Service - Swiss Tax DVD sold to government -...

Insider Threat Companies: min. requirements = max. security Outsourcing and off-shoring trend Large percentage of threats go undetected - huge internal know how - powerful privileges - track cleaning - clearance problem - foreign contact persons / turnovers

Agenda Todays security challenges Who is dangerous for our business? How do we get attacked? How can we protect ourself? 32

How we get attacked Active Hack Passive Hack Over 80% of all hacks are done from internal Internal Hack Technical Hack External Hack Non-technical Hack At the moment one of the most dangerous and effectives methode in the scene

How we get attacked -- REALITY >90% - Standard configuration - Misconfiguration - Misunderstanding of security - Human errors - Process/Workflow errors - old versions / no patches - Known/published wholes/bugs/workarounds - Downloadable cracking software (script kiddies) - High quality/knowledge hack

Agenda Todays security challenges Who is dangerous for our business? How do we get attacked? How can we protect ourself? 35

Protection > 90% of our security problems could be solved!!!

Think Security is a race, if you stop running you ll lose Security IS NOT a product; it s an ongoing living process Train your employees Security IS an intelligent combination of more areas -> Big picture Focus on your data, not only on the technic Start with the basics

Think about Solutions Problem External Attackers Internal Threats Image Damage Internal Security Regulations Regulatory Compliances... Oracle Solution Separation of duties Insider threat protection Strong access authentication Strong encryption (DB/OS/Net) Fine grained real time external auditing Data consolidation control High availability + Security combination Firest line of defence Oracle Security Product Oracle Firewall Advanced Security Options (ASO) Network encryption Transparent data encryption Strong authentication Database Vault Audit Vault Secure Backup Virtual Privat Database (VPD) Oracle Label Security (OLS) Data Masking Total Recall

Oracle Database Security Solutions Inside. Outside. Complete. Encryption & Masking Advanced Security Secure Backup Data Masking Access Control Database Vault Label Security Identity Management Monitoring Configuration Management Audit Vault Total Recall Database Firewall Identity Management 39

2010 Oracle Corporation Proprietary and Confidential 40