29
Cyber Criminal Methods & Prevention Techniques By [email protected] [email protected]

Cyber Criminal Methods & Prevention Techniques By [email protected] [email protected]

Embed Size (px)

Citation preview

Page 1: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Cyber Criminal Methods & Prevention Techniques

[email protected]@Berbee.com

Page 2: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Meeting Agenda

Trends Attacker Motives and Methods Areas of Concern Typical Assessment Findings ISO-17799 & NIST Typical Remediation Costs

Page 3: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

FBI / CSI Statistics

Every Year Dollars are Lost due to Cyber Criminal Activity

Greatest Loss = Proprietary Information

Second Greatest Loss = Denial of Service

Page 4: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Availability

Integrity Availability

Confidentiality

Security

Elements to Protect

Page 5: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Everything is a Target

PublicPrivate

Internal Network

Server

Application

Vulnerability AssessmentsFirewalls & ProxiesIntrusion DetectionVPN Remote Access

Vulnerability AssessmentsIntrusion DetectionWireless Design ConsultingIntrusion PreventionAuthentication & Authorization

Perimeter

Vulnerability AssessmentsIntrusion PreventionPatch ManagementAnti-Virus & Anti-SPAMMobile Client SecurityServer HardeningAuthentication & Authorization

Data

Authentication ManagementIdentity ManagementData Privacy

Vulnerability AssessmentsCode ReviewsApplication Hardening

Polices, Procedures & Awareness

Policy AssessmentsOperational Framework ConsultingTraining & Consulting

Security Management

Centralized Tool IntegrationCentralized Monitoring

Page 6: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Cyber Criminals Motives

Financial Rewards Politics Show Off Personal Gratification They know they can

Page 7: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Intruder Methods

Web Site Research User Groups Email Staff Call Modems Read Trash Impersonated Someone You Trust Scan Your Systems War Drive Your Wireless

Page 8: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Intruder Methods Cont.

Use Known and Unknown Exploits Viruses, Trojans & Worms Phishing Attack Partner Networks to Gain Access to Yours Sniff Your Traffic Brute Force Passwords Spam You Denial of Service

Page 9: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Most Common Items to Protect

Intellectual Property Customer’s And Staff’s Privacy Confidential Data System Availability Reputation Regulatory Challenges

Page 10: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Assessment Benefits

Roadmap Establishes Baseline Strengthens Security Provides Due Diligence Efficient Formal Audits Finds the Weak Areas

Page 11: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

How To Identify and Prioritize Risk Holistic Approach

Comprehensive reviews (infrastructure, server, application, etc.)Based on Organizational Security Policy, and taking full life cycle into accountConsider people and processes, as well as technology

Sensible, accessible documentationHelpful to executive decision-makers: explanation of risk in business termsHelpful to managers: project plans, prioritization of tasksHelpful to technical staff: clear standards, specific recommendations

Threat Modeling Identifying assets Identifying threats Making qualitative (or quantitative) assessments of risk

Page 12: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Top Ten Security Risks

1. Policies & Procedures2. Security Awareness3. Access and Authorization4. Patch Management5. Mis-Configured Systems & Applications6. Encryption & Digital Signatures7. Incident Handling Processes8. Disaster Recovery & Business Continuity9. Physical Safeguards10.Intentional Bypassing of Security Controls

Page 13: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Security Policies

Communicate Your Organizations Commitment to Security

Provide a Baseline and Roadmap for Security Controls

Demonstrate Due Diligence

All Pertinent Security Control Information Communicated

Realistic – Manageable

Enforceable

Page 14: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Security Awareness

A well trained user will assist your security efforts

Time needs to be invested in user training

A well trained user usually requires less help desk support

Page 15: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Access & Authorization Weak Passwords

Sharing Accounts

Not Enforced

Easy to Exploit

Prevention• Strong Security Policies• Utilize OS Complex Password Configuration• Implement Technical Authorization, Authentication

and Accounting Mechanisms (AAA)• Implement Two-Factor Authentication

Page 16: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Patch Management

Hard to Manage

Less Window of Opportunity

Exploits are coming too fast

Can Break System

Require Resources

Prevention• Strong Patch Management Mechanisms – Automate• Add Intrusion Prevention Mechanisms

Page 17: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Mis-Configured Systems

Assure only needed or updated Services

Strengthen SNMP Strings

Secure Wireless Networks

Remove Default Settings

Filter Outgoing Access at Firewall

Page 18: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Encryption / Digital Signatures

Protects Against:

• Forging

• Impersonation/Spoofing

• Eavesdropping

• Intercepting

• Denial of Receipt or Send (Non-Repudiation)

Page 19: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Incident Handling Process

Intrusion Prevention/Detection

Anti-virus Mechanisms

Logging/Auditing

Strong Policies and Documentation

Page 20: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Disaster Recovery & Business Continuity

Formal Plan

Prioritized Systems

Standard Backup Process

Tested Backups

Redundant Systems

Page 21: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Physical Safeguards

Visitor Badges

Building & Data Center Access/Monitoring

Fire Prevention/Suppression & Detection

UPS Testing and Load

Page 22: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Installing • Modems• Wireless Networks• Gotomypc or other remote access items• Unauthorized Software – Games, Screensavers,

etc

Prevention• Strong Security Policies• Centralized and Managed Intrusion Prevention

Mechanisms• Implement Network Admission Control

Intentional By-Passing of Security Controls

Page 23: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Importance of NIST & ISO-17799

National Institute of Standards & Technology Referenced Throughout Most Regulations

Policies and Procedures Are Critical to NIST Best Practices

ISO-17799 is Industry Recognized Standard for Security

ISO-17799 Covers 10 Areas of Security Each ISO-17799 Area Has Individual Security Items If You Follow NIST and ISO-17799 You Would Have

a Strong Security Posture and Should Pass Almost Every Audit

Combine NIST 800-26 Levels and ISO-17799

Page 24: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

ISO-17799 Covered Areas

Security Policies Organizational Security Asset Classification & Control Personnel Security Physical and Environmental Security Communications & Operations Management Access Control System Development & Maintenance Business Continuity Management Compliance

Page 25: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

NIST Legend

Level 1 – control objective documented in a security policy

Level 2 – security controls documented as procedures

Level 3 – procedures have been implemented

Level 4 – procedures and security controls are tested and reviewed

Level 5 – procedures and security controls are fully integrated into a comprehensive program.

Page 26: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

ISO-17799 Graph Sample

Business Continuity

0

1

2

3

4

5

6

Business ContinuityManagement Process

Business Continuity &Impact Analysis

Writing & ImplementingContinuity Plan

Business ContinuityPlanning Framework

Testing Maintaining &Reassessing BC Plan

Actual Practice

Peer Comparison

NIST Level

Page 27: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Remediation Costs

It is important to budget for remediation

A security assessment without remediation efforts is a waste of time and money

Remediation usually involves resource time and product cost

It is important to budget for one time and reoccurring costs

Page 28: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Remediation – First Steps

Prioritize Risks and Remediation Steps

Align Business and IT Strategies

Establish Resources – Internal, External, Products

Establish Internal SLAs between IT and Business Units

Page 29: Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Matt.Jach@Berbee.com

Internet Links & Question/Answers

Thank You

www.berbee.com www.cisco.com www.ibm.com www.microsoft.com www.rsa.com www.gocsi.com www.sans.org www.nist.gov