Successfully reported this slideshow.
Advanced Security Testing In The                               Age of Cyber War                               Oct 11, 2012...
Cyber Security Market Trends                                   Growth of Targeted Attacks                                 ...
Rapid Increase In Targeted Attacks      Between 2005 to 2011 the number of targeted       attacks rose by a factor of:   ...
Social Engineering Is The Main Attack Vector      Report indicates that a large % of people reused       passwords or the...
The Growth Of The Zero Day Market      The price for one exploit is as high as $250K        • iOS        • Chrome        ...
Requirements for Advanced Security Testing          Accurate            • Test with the latest attacks and vulnerabilitie...
Spirent TestCloud – Apps & Security Test Store         1,000s of ready-to-run tests         Continuous stream of the lat...
DEMO 1 – Let’s Discover A Zero Day in Jabber10   PROPRIETARY AND CONFIDENTIAL
DEMO 2 – Now Let’s Unleash Attacks At Scale11   PROPRIETARY AND CONFIDENTIAL
Thank youPROPRIETARY AND CONFIDENTIAL
Upcoming SlideShare
Loading in …5
×

Advanced Security Testing in the Age of Cyber War

495 views

Published on

Aswath Mohan & Ankur Chadda discuss why an advanced security testing strategy is an essential component in preparing for the onslaught of cyber-attacks. Learn more about security testing: http://bit.ly/P5cTXz

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Advanced Security Testing in the Age of Cyber War

  1. 1. Advanced Security Testing In The Age of Cyber War Oct 11, 2012PROPRIETARY AND CONFIDENTIAL
  2. 2. Cyber Security Market Trends Growth of Targeted Attacks Rise of Social Engineering CaaS – Crime as a Service2 PROPRIETARY AND CONFIDENTIAL
  3. 3. Rapid Increase In Targeted Attacks Between 2005 to 2011 the number of targeted attacks rose by a factor of: • 10 • 50 • 500 • 1000 In 2005 the number of targeted attacks detected by Symantec.cloud was 1 per week. In Nov 2011 it was 95 per day3 PROPRIETARY AND CONFIDENTIAL
  4. 4. Social Engineering Is The Main Attack Vector Report indicates that a large % of people reused passwords or the passwords were very similar: • 55 % • 75 % • 95 % University of Cambridge study found that 75% of users shared passwords between two separate accounts4 PROPRIETARY AND CONFIDENTIAL
  5. 5. The Growth Of The Zero Day Market The price for one exploit is as high as $250K • iOS • Chrome • Windows • Microsoft Word A Bangkok based security researcher with a handle called ‘The Grugq’ sold an iOS exploit for $250K. He is on track to make over $1M this year.5 PROPRIETARY AND CONFIDENTIAL
  6. 6. Requirements for Advanced Security Testing  Accurate • Test with the latest attacks and vulnerabilities • Discover unknown weaknesses in software  Agile • Recreate new apps and attacks immediately • Leverage new threat profiles  Simple • Intuitive workflow for ease-of-use and adoption • Auto-generate test cases using Studio7 PROPRIETARY AND CONFIDENTIAL
  7. 7. Spirent TestCloud – Apps & Security Test Store  1,000s of ready-to-run tests  Continuous stream of the latest attacks and apps  Multiple end–points (iPhone, PC, Android) & versions (Skype v5.3.0.8)8 8 PROPRIETARY AND CONFIDENTIAL
  8. 8. DEMO 1 – Let’s Discover A Zero Day in Jabber10 PROPRIETARY AND CONFIDENTIAL
  9. 9. DEMO 2 – Now Let’s Unleash Attacks At Scale11 PROPRIETARY AND CONFIDENTIAL
  10. 10. Thank youPROPRIETARY AND CONFIDENTIAL

×