Microsoft's latest Security Intelligence Report focuses on the expanding threat posed by bots and botnets. The report details that botnets are growing larger in size and becoming more sophisticated, with some networks now containing over one million infected machines. Microsoft also discusses new trends seen over the past year, such as the emergence of mobile botnets targeting smartphones. Additionally, the report provides statistics on cyberattacks by country and information on new botnet command and control techniques used by cybercriminals.
8. Sony Finds More Cases
of Hacking of Its
Servers
By NICK BILTON , May 2, 2011
Sony said Monday that it had
discovered that more credit card
information and customer
profiles had been compromised
during an attack on its servers
last week.
Microsoft Exposes Scope
of Botnet Threat
By Tony Bradley, October 15, 2010
Microsoft's latest Security
Intelligence Report focuses on the
expanding threat posed by bots and
botnets.
Microsoft this week unveiled the
ninth volume of its Security
9.
10. Destroy Create
Retain Store
End to End
Information
Lifecycle
Maintain Discover
Secure Classify
11. De-provision Provision
Report
End to End Authenticate
Why Identity
What Lifecycle
Attest Authorize
Who
Keep Current Secure Federate
12. Japan JSOX
France NFZ 42-013
Germany GDPdu & GoBS
India SOX SEBI Clause 49
US HIPAA
Product designs
US HIPAA Marketing plans
www.plainenglish.co.uk
14. Company or
• ----------
• ----------
Partner
Identity • ----------
Directory
Source
15.
16. Private Cloud Public Cloud
On-Premises Online
INFORMATION ACCESS ANTI- POLICY RESEARCH SECURE
PROTECTION CONTROL MALWARE MANAGEMENT & RESPONSE DEVELOPMENT
DEVICES
17. Global Phishing
Botnet Takedowns Enforcement Initiative
Digital PhishNet Cybersecurity Agenda
Microsoft Security
Response Alliance
18.
19. Expression-based access policy
AD DS
File Server
User claims Device claims Resource properties
User.Department = Finance Device.Department = Finance Resource.Department = Finance
User.Clearance = High Device.Managed = True Resource.Impact = High
ACCESS POLICY
For access to highly confidential financial information, a user must be in the finance
department, have a high security clearance, and be using a managed device registered with
the finance department.
19
20. Dynamic Access Control
Classification Access Control Auditing RMS Protection
• File inherits • Central access policies • Central audit policies • Automatic Rights
classification tags from based on classification can be applied across Management Services
parent folder multiple file servers (RMS) protection for
• Expression-based
Microsoft Office
• Manual tagging by access conditions for • Expression-based
documents
owner user claims, device audits for user
claims, and file tags claims, device • Near real-time
• Automatic tagging
claims, and file tags protection when a file is
• Access denied
• Tagging by applications tagged
remediation • Staging audits to
simulate policy • Extensibility for non-
changes in a real Office RMS protectors
environment
20
21. Directory
File
Server
Employee Identity
Management
Application
Manager/s
2