Advertisement

1 - HKT Reporting.pdf

eLearning Consortium 電子學習聯盟
Mar. 31, 2022
Advertisement

More Related Content

Similar to 1 - HKT Reporting.pdf(20)

Advertisement

More from eLearning Consortium 電子學習聯盟(20)

Advertisement

1 - HKT Reporting.pdf

  1. 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢
  2. Cyber Security and the Trend for Security Management in School Sector Agenda 1. Introduction 2. Assessment Result Sharing and Insight 3. Challenges in Security Management 4. Trends in Security Management 5. Q &A
  3. Introduction School IT Security Risk Assessment
  4. HKT Web Vulnerability Assessment Service Assessment lifecycle Vulnerability Analysis Manual Review Report and Recommendations Information Gathering Scheduled Scanning Week 1 Automated Scanning Week 2-3 Manual Review Week 4 Report & Debriefing Estimated Lead Time
  5. HKT Web Vulnerability Assessment Service Vulnerability Assessment Service is performed by a group of security certified engineers
  6. Web Services Scanning Host Discovery: 59 ; Web Services: 15 (Around 25% has Web Page Services) Average Risk Score is 54 4 schools Risk Score over average value (around 66% School’s Risk Score is above average Domain Vulnerability Result: 31% risk is in High Risk or above. Application Vulnerability Result: 33% risk is in High Risk Level. There are 283 high risk find in total 849 vulnerability records. 25% 66% 32% HKT’s Web Vulnerability Assessment Summary Duration: Mar,2020 to Dec,2020 Participates: 6 Schools Application Vulnerability Scanning result
  7. Ongoing Support Result Highlights 33% of Vulnerabilities are in Critical / High Categories Low 11% Medium 58% High 27% Critical 5% Low Medium High Critical Domain Host Vulnerability Scanning Distribution 0 20 40 60 80 School 1 School 2 School 3 School 4 School 5 School 6 60 45 78 65 55 20 Risk Score Risk Score Average Score Highest Score Lowest Score 54 78 20
  8. Ongoing Support Top Security Impact Vulnerabilities Code (SQL) Injection Cross-site Scripting (XSS) Using Outdated Components with Known Vulnerabilities The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization. Allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. - SSL/TLS version - OS version - PHP version - Apache version …etc 26% 40% 86% Among the ~15 systems scanned, we find Percentage get the below Vulnerability…… 6.9% of total attacks belongs to this category. 32% of total attacks belongs to this category. 4.7% of total attacks belongs to this category.
  9. Ongoing Support Security Risk Impact Code (SQL) Injection Cross-site Scripting (XSS) Using Outdated Components with Known Vulnerabilities - Data Leakage / Loss - Content Defacement - Malicious code injection - Malware / Ransomware Infection - Black Listing ➔ Affect SCHOOL OPERATON / REPUTATION The vulnerability may impact your system, result in
  10. 10+ years ago Challenges in Security Management IT Support
  11. Nowadays IT Support More User Touch Point More System More Data (More Security Risk) Challenges in Security Management
  12. Ongoing Support Challenges in Security Management Investment spending in Cyber Security Success factors that can strengthen your organization’s cybersecurity posture in the next three years 0% 10% 20% 30% 40% 50% Improvement in technologies Improvement in staffing Increase in funding Cyber intelligence improvements Improvement in threat sharing Reduction in the compliance burden Ability to minimize employee-related risk Reduction in complexity Increase in C-level support Cybersecurity leadership Other Complexity Recruitment $$ Ponemon Institute Research Report, 2018
  13. Trends in Security Management How to Survive in the challenging Security Management? You CANNOT do it all by yourself, find a TRUSTED PARTNER for Security Management
  14. Ongoing Support “Security-Centric”- Security Management Everywhere ISP Internet Service Provider Perimeter Core Networking End Point Devices/BYOD School Devices School Wi-Fi service School core network School Firewall BYOD Devices Service Gateways User Remote Access VIRUS / MALWARE INTRUSION RANSOMWARE / Email SPAM / Email Spoofing DoS / Intrusion DDoS / Malicious Website Potential Security Threat is everywhere!!
  15. Ongoing Support “Security-Centric”- Security Management Everywhere ISP Internet Service Provider Perimeter Core Networking End Point Devices/BYOD School Devices School Wi-Fi service School core network School Firewall BYOD Devices Service Gateways User Remote Access -- Separate Network -- -- Separate Network -- -- Separate Network -- Cloud-Based Firewall / Web Filtering UTM Firewall Email Security / Application Server EDR NGAV Multi-Dimension Security Protection
  16. Ongoing Support “Security-Centric”- Security Management Everywhere ISP Internet Service Provider Perimeter Core Networking End Point Devices/BYOD School Devices School Wi-Fi service School core network School Firewall BYOD Devices Service Gateways User Remote Access DDoS / Malicious Website 1. Centralized Security Log collection and monitoring 2. Automation of security alert and incident recording 3. Remote support for incident recording and assist Security Management Comprehensive Managed Security Service
  17. Ongoing Support Key components on Security Management People Technology Process Secure Connectivity DDoS Protection HKT Internet Platform HKT Private Network Network Security System Security Endpoint Protection Application Control Secure On-Premises Solution HKT School HelpDesk / Security Operation Center
  18. Security Operation Center Tier 1 Tier 2 Tier 3 SOC Manager - Security Expert - Security Intelligence - Security Management Tools and Practice
  19. • Occurred on 12-May-2017 (Friday night) • Take action to disable related firewall TCP ports (139 & 445) in ALL school wifi circuits • Completed all school wifi circuits (400+) on 15-May-2017 (Monday) • Informed schools that HKT already take action to block the TCP ports via Phone & Email • Prepare user guide / preventive actions and sent to schools for them to take action on school’s ITED network School Helpdesk
  20. - Security Risk will keep EVOLVING Key Takeaways - PERIODIC Security Risk Assessment is important - You CANNOT do it all by yourself - Find a TRUTSED PARTNER for security management
  21. Any Questions?
  22. Thank You
Advertisement