Nano-Stealth overview

669 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
669
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
16
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Example: in 2004 Oracle HR accidentally published all salaries and social security numbers of top executives on an internal server. This human error was made because the HR rep did not realize the entire company could see the server . . . She thought it was only restricted to her and her employees.
  • Nano-Stealth overview

    1. 1. Nano-Stealth Technology Overview A Network Intercept Presentation
    2. 2. <ul><li>Vulnerability overview </li></ul><ul><li>Security breach threats </li></ul><ul><li>Product introduction </li></ul><ul><li>Putting it to the test </li></ul>
    3. 3. Why System Threats Exist <ul><li>It is impossible to plan for the unknown and therefore system vulnerabilities are inevitable. </li></ul><ul><li>The rate of patching vulnerabilities can never exceed the rate at which new ones occur. </li></ul><ul><li>Additional undetected vulnerabilities wait to be discovered </li></ul>
    4. 4. Current attacks on vulnerabilities The List goes on www.en.Wikipedia.org/wiki/vulnerability for more information HTTP Request Smuggling HTTP Response Splitting Man in the middle attack Overflow Binary Resource File Phishing SQL Injection Server Side Includes SSI Injection Traffic Flood Unicode Encoding Web Parameter Tampering Alternate XSS Syntax Argument Injection or Modification Blind SQL Injection Brute force attack Buffer overflow attack CSRF Code Injection Command injection Cross site tracing Cross site scripting Direct Status Code Injection Forced browsing
    5. 5. Additional security threats <ul><li>Threats are not limited to external sources </li></ul><ul><ul><li>Disgruntled employees </li></ul></ul><ul><ul><li>Curious employees trying to by-pass authorization to access confidential documents </li></ul></ul><ul><ul><li>Accidental change to security makes confidential data public on an internal server </li></ul></ul>
    6. 6. What are they after? <ul><li>Personal identification information </li></ul><ul><ul><li>Passwords </li></ul></ul><ul><ul><li>Bank accounts/credit card numbers </li></ul></ul><ul><ul><li>Social security </li></ul></ul><ul><li>Financial gain from taking down a corporate network </li></ul><ul><li>Monetary gain from creating viruses and worms </li></ul>
    7. 7. Top Industry Targets <ul><li>Financial institutions </li></ul><ul><li>Healthcare </li></ul><ul><li>Internet merchants </li></ul><ul><li>Government </li></ul><ul><li>Education </li></ul><ul><li>Others . . . </li></ul>
    8. 8. Nano-Stealth protection <ul><li>Nano-Stealth technology cloaks servers so that only people with appropriate access will see their existence </li></ul><ul><ul><li>Servers are virtually undetectable by those without designated access and a key </li></ul></ul>
    9. 9. Nano-Stealth technology <ul><ul><li>Patent pending triple layer authentication protects servers and their sensitive data from un-authorized access. </li></ul></ul>Authorized users will need a password and key to access the server
    10. 10. Web Server Unauthorized employee, hacker, or virus on the network Access Without Nano-Stealth Typical network access scenario: If a hacker or virus gets on the network, they can wreak havoc on all live systems. Unauthorized employees can also see the server and try to breach its security
    11. 11. Web Server Unauthorized employee, hacker, or virus on the network Hacker Access with Nano-Stealth Hackers and viruses can not attack what they do not see! Systems protected by Nano-Stealth cannot be detected by hackers, viruses, or un-authorized employees on the network. Only authorized users and machines will be able to locate these systems.
    12. 12. Web Server Under the Nano-Stealth Veil Servers and client machines can both be protected by Nano-Stealth. Authorized users will only be able to see the Nano-Stealth veiled systems they have been granted access to
    13. 13. Independent third party test System scanned by Qualys before turning Nano-Stealth technology on returns 5 pages of vulnerabilities.
    14. 14. Independent third party results Same system tested again running with Nano-Stealth technology is undetectable by Qualys. Hackers, viruses, and unauthorized users will not be able to detect the machine.
    15. 15. Putting it to the test <ul><li>In addition to rigorous QA testing, Network Intercept has held several public contests with large cash prizes for anyone who can uncover the Nano-Stealth Veil. </li></ul><ul><li>Over 400 attempts by professional hackers have been made with zero successes </li></ul>
    16. 16. <ul><li>Please contact us to set up an appointment or answer any additional questions </li></ul><ul><li>877-339-4438 </li></ul><ul><li>Or </li></ul><ul><li>[email_address] </li></ul>Contact Copyright © 2005 Network Intercept. All rights reserved

    ×