SlideShare a Scribd company logo
1 of 36
Security @Work
Mathan Kasilingam, CISSP
Principal Solution Architect
2
Four Key Trends
Internet Security Threat
Report, Vol. 17
Malware
Attacks
81% ↑
Targeted
Attacks
Expand
Mobile
Threats
Expose All
Data
Breaches
on Rise
3
Security never sleeps
Threat & Risk
Visibility
Information
Protection
Identity
Protection
Systems
Management
Infrastructure
Protection
Security
Intelligence
Reconn
Incursion
Discovery
Capture
Exfiltrate
4
Portrait of a Cyber-Crime
Smith Inc Small company – BIG ideas
5
Attack #1: Port Scan
6
Attack methodology: Company target identifiedThe Hacker – individual, organisation or Government
7
Port Scan – probe for vulnerabilities
Look for an entry
Weak points
Defence alignments
System vulnerabilities
Open doors
8
No entry
Security Incident & Event Management
Threat & Risk
Visibility
Information
Protection
Identity
Protection
Systems
Management
Infrastructure
Protection
Security
Intelligence
Reconn
Incursion
Discovery
Capture
Exfiltrate
9
Attack #2: Social Engineering
10
Company employee target identified
11
Social Engineering
Working
hours
12
Tracking the target
13
Capturing the device
14
No entry
Device Encryption Technology
Threat & Risk
Visibility
Information
Protection
Identity
Protection
Systems
Management
Infrastructure
Protection
Security
Intelligence
Reconn
Incursion
Discovery
Capture
Exfiltrate
15
Attack #3: Spear Phishing
16
Desktop targeted via Malicious email
17
Even if Desktop Protection fails
18
DLP (Data Loss Prevention) can prevent the data from leaving
the network
19
No entry
Data Loss Prevention
Threat & Risk
Visibility
Information
Protection
Identity
Protection
Systems
Management
Infrastructure
Protection
Security
Intelligence
Reconn
Incursion
Discovery
Capture
Exfiltrate
20
Attack #4:
Buffer Overflow Attack
21
Buffer Overflow Attack
22
Detecting system vulnerabilities and apply patches
Identify areas of concern
23
No entry
Automated Compliance Management Solution
Critical System Protection (Host FW / IPS / Sys
Baseline)
Threat & Risk
Visibility
Information
Protection
Identity
Protection
Systems
Management
Infrastructure
Protection
Security
Intelligence
Reconn
Incursion
Discovery
Capture
Exfiltrate
24
Attack #5:
Password Hacking Attack
25
Advanced Persistent Threat
Simon’s mum
Mrs LeeL E E
26
No entry
Identity & Access Management Solution
Threat & Risk
Visibility
Information
Protection
Identity
Protection
Systems
Management
Infrastructure
Protection
Security
Intelligence
Reconn
Incursion
Discovery
Capture
Exfiltrate
27
Attack #6: Attacking mobile devices
28
Anti theft – Mobility solutions (Device Management Solution)
29
No entry
Mobile Device Security
Threat & Risk
Visibility
Information
Protection
Identity
Protection
Systems
Management
Infrastructure
Protection
Security
Intelligence
Reconn
Incursion
Discovery
Capture
Exfiltrate
30
Defence against threats
Multiple layers of Security
31
Complete Protection
Security Incident & Event Management
Encryption Technology
Data Loss Prevention
Automated Compliance Management
Critical System Protection
Identity & Access Management
Mobile Device Security
32
Where should you go from here
33
Symantec’s Information-Centric Approach
INFORMATION
Intelligence
Governance
InfrastructureStore
Manage
Dedupe
Protect
Recover
Discover
Classify
Ownership
Assess
Remediate
Compliance
Identify
Authenticate
Policy RISK
COST VALUE
MobileVirtualisation
Cloud
Physical
34
Stay Informed - Internet Security Threat Report
www.symantec.com/threatreport
Security Response Website
Twitter.com/threatintel
Stay Informed
Internet Security Threat Report, Vol. 17
www.symantec.com/threatreport
Security Response Website
Twitter.com/threatintel
35
Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
36
Thank You

More Related Content

What's hot

Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014Symantec
 
Threat Modelling And Threat Response
Threat Modelling And Threat ResponseThreat Modelling And Threat Response
Threat Modelling And Threat ResponseVivek Jindaniya
 
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Dalia Reda
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutionsmaryrowling
 
Information Security
Information SecurityInformation Security
Information Securityvadapav123
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
 
Cyber security
Cyber securityCyber security
Cyber securityRahul Dey
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Knowledge Group
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber securitySandip Juthani
 
Petya Ransomware
Petya RansomwarePetya Ransomware
Petya RansomwareSiemplify
 
Application Security
Application SecurityApplication Security
Application SecurityJohn Rauser
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - GuidelinesPedro Espinosa
 
Aon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesCSNP
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine LearningSiemplify
 
It risk assessment in uae
It risk assessment in uaeIt risk assessment in uae
It risk assessment in uaeRishalHalid1
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber SecurityGTreasury
 
ET4045-1-Introduction-2014
ET4045-1-Introduction-2014ET4045-1-Introduction-2014
ET4045-1-Introduction-2014Tutun Juhana
 
The Top Three 2021 Cyber Threats
The Top Three 2021 Cyber ThreatsThe Top Three 2021 Cyber Threats
The Top Three 2021 Cyber ThreatsSai Huda
 

What's hot (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014
 
Threat Modelling And Threat Response
Threat Modelling And Threat ResponseThreat Modelling And Threat Response
Threat Modelling And Threat Response
 
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
Information Security
Information SecurityInformation Security
Information Security
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Petya Ransomware
Petya RansomwarePetya Ransomware
Petya Ransomware
 
Application Security
Application SecurityApplication Security
Application Security
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - Guidelines
 
Aon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation Strategies
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
It risk assessment in uae
It risk assessment in uaeIt risk assessment in uae
It risk assessment in uae
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber Security
 
ET4045-1-Introduction-2014
ET4045-1-Introduction-2014ET4045-1-Introduction-2014
ET4045-1-Introduction-2014
 
The Top Three 2021 Cyber Threats
The Top Three 2021 Cyber ThreatsThe Top Three 2021 Cyber Threats
The Top Three 2021 Cyber Threats
 

Similar to Security threats and countermeasures in daily life - Symantec

New Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: HowlandNew Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: Howlandnado-web
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer SecurityKamal Acharya
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and securitySomesh Kumar
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.pptRamaNingaiah
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIan Dave Balatbat
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.pptssuser6c59cb
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh WebinarArrow ECS UK
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber securityPranto26
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Securityxsy
 
Threat Intelligen.pptx
Threat Intelligen.pptxThreat Intelligen.pptx
Threat Intelligen.pptxCompanySeceon
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptxSharmilaMore5
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Secninjaz Technologies LLP
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONChristopherTHyatt
 

Similar to Security threats and countermeasures in daily life - Symantec (20)

New Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: HowlandNew Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: Howland
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and security
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
Threat Intelligen.pptx
Threat Intelligen.pptxThreat Intelligen.pptx
Threat Intelligen.pptx
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
Lecture 1-2.pdf
Lecture 1-2.pdfLecture 1-2.pdf
Lecture 1-2.pdf
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Security threats and countermeasures in daily life - Symantec

Editor's Notes

  1. Cyber Warfare: Symantec Security SolutionsHow to Win the Cyber-warHolistic Security for today’s tough and targeted threats
  2. Security never sleeps. Security is an integral part of any IT infrastructure. OUR job is to bring our leading technologies to every endpoint, every device, every enterprise. Every stage requires capabilities and compliance. Our mission is to protect and defend against any threat in any environment. We mean business.First lets look at how attack methodology works. What are the phases, what are the important points of protection?  Attackers are systematic, usually following… Initial reconnaissance: seeing what’s out there, what’s on which port, how it’s configured Incursion: What’s the actual incursion or break in point? Discovery: Where they start looking at information – confidential, sensitive information. Capture: The stage where they capture the information and assemble it. Exfiltrate:Where information gets pushed out of the organisation, into the hands of the hackers or criminals.
  3. Security never sleeps. Security is an integral part of any IT infrastructure. OUR job is to bring our leading technologies to every endpoint, every device, every enterprise. Every stage requires capabilities and compliance. Our mission is to protect and defend against any threat in any environment. We mean business.First lets look at how attack methodology works. What are the phases, what are the important points of protection?  Attackers are systematic, usually following… Initial reconnaissance: seeing what’s out there, what’s on which port, how it’s configured Incursion: What’s the actual incursion or break in point? Discovery: Where they start looking at information – confidential, sensitive information. Capture: The stage where they capture the information and assemble it. Exfiltrate:Where information gets pushed out of the organisation, into the hands of the hackers or criminals.
  4. Here’s the situation: A company – Smith Inc – is about to be subjected to an Advanced Persistent ThreatWhy? This little company just went global. Smith Inc became multi-national overnight because of their design and production of state-of-the-art drilling equipment. Drilling equipment used for natural resources exploration and extraction. That’s right: Oil. Mining. Fossil Fuels. The hot topics in the global economy. Now they’re a hot company who recently soared to the top of the Fortune 500 based on their success rate with contracts from a number of countries. They have a lot of intellectual property – including patented designs for their drilling equipment, exceptional planning tools for project management and correspondence from places we’ve never even heard of who are rich in natural resources. So no wonder Smith Inc has hit the radar of this group of cybercriminals. Information is currency. Whether they trade it with competitors or influence investors on the Dow Jones or Hang Seng. Their information is worth a lot. And Hackers will stop at nothing to get it.
  5. Lets now take a detailed look at the lengths a hacker, individual, organisation or government will go to achieve their goals and gather valuable information.
  6. The Hacker, (whether it’s an individual, organisation or government) is out to get Smith Inc. They’ve pressed the Cyber war button and they have decided to use every single imaginative resource they can to access the Smith Inc network – whether to find documentation or correspondence. The won’t stop until they get it.
  7. The Port Scan is not the Point-of-Entry, just a reconnaissance mission. It means getting a lay of the land, looking for potential entry points. It’s basically ‘casing the joint’ much as bank robbers would look at a bank, figure out routines, understand where guards are, look where the alarm buttons are, and get an overall feeling for security.
  8. Fortunately, Smith Inc uses a solution known as Symantec security information manager. This Symantec Security Information Manager (SSIM) activates as soon as the port scan starts. In real time, it logs all that activities that are happening on the network. Once these port scans start, SSIM recognises that some are coming from bad IPs thanks to our Global Intelligence Network (GIN), directly connected to SSIM in real time.  As a result, these attackers are being tracked by SSIM, showing us a timeline and making sure that we keep an eye on these movements.Note: Sales / Partners to talk about the key benefits of SSIM
  9. Attack Stage #2: with the widespread use of social networks, let’s look at how attackers use wily ways to infiltrate the most public of public domains…
  10. …starting with one unsuspecting employee: Let’s call him Simon.
  11. Simon, like the rest of us, has all his information online, accessible in one way or another.He uses Facebook; online banking; emails from home, work and iPhone, and generally uses e-comms as a way of life. He’s also a senior director at Smith Inc, and has been working on a particular drill design project for almost two years. No wonder the hackers have targeted Simon.
  12. From his online activity, hackers have figured out Simon’s schedule: like where he eats lunch, how late he works, even what train he takes going home. So it’s no great surprise when one late night when Simon dozes off on the train home, he wakes up to find his laptop gone.
  13. Hackers have his laptop, but when they try to open it, they didn’t expect protection by Symantec’s Encryption Technology, acquired through PGP. Symantec’ Encryption technology ensures no one can break into a laptop and access privileged information.
  14. So again, Symantec comes to the rescue with Symantec’s Encryption solution. Personal and business remains secure, useless to the thieves who stole the laptop. Note: Sales / Partners to talk about the key benefits of Symantec Encryption solutions
  15. Do they stop there? No, from their Face Book crawling, they found out Simon has a relative in the US he regularly talks to and sends gifts. So they go Spear Phishing…
  16. Spear Phishing makes Simon “the bait” with an email from Western Union (they’ve seen cash gifts made via Western Union) which he will trust and be likely to open.
  17. Unfortunately Simon used his office PC to open the email with an attachment – and his desktop is connected to the gateway protected by Third Party protection software. This third party protection software, however, does NOT catch the worm and the worm gets through.  What does this worm do? It opens a back door, giving access to whatever is on Simon’s desktop, including those drill designs and patents the hackers are after.
  18. Thankfully, Symantec Data Loss Prevent (DLP) wakes up. DLP is designed to precisely understand what is confidential information. DLP knows where confidential information resides and makes sure it does not leave the network without proper authorization.  The moment Symantec DLP sees complex blueprints, diagrams or documentation marked Sensitive and Confidential going out of the network, it raises an alarm and stops the transfer right there. No data is lost. Not data is accessed.Note: Sales / Partners to talk about the key benefits of Symantec Encryption solutions
  19. Again because of Symantec. If Smith Inc had used,Symantec Endpoint Protection (SEP) would have stopped such phishing expeditions. Note: Sales / Partners to talk about the key benefits of Data Loss Prevention and Symantec Endpoint Protection
  20. Do the hackers give up? They don’t. They now decide to attack the data centre with a very old technique known as the buffer overflow attack.
  21. A Buffer Overflow Attack is when the hacker looks for any residual memory in a program or application and alters it, making it behave in strange new ways. The hacker decides to use this technique not knowing that Smith Inc is not only protected by Symantec security technologies but also use Symantec systems management – Altris. Smith Inc has been using patch management regularly and has ensured that they fix the vulnerabilities that exist in their operating system and their applications. In addition to all Symantec’s systems management, it looks at what patches needs to be applied and efficiently applies those patches across the organisation.Note: Sales/Partner to explain what Buffer Overflow is if audience doesn’t understand
  22. Attackers will always look for the weakest link in the chain. This could be one small vulnerability in one database or one application. Fortunately Smith Inc is using Symantec Control Compliance Suite (CCS), where one module allows you to go and do an analysis of system vulnerabilities. It exposes these ‘weak links’ and allows you to use applications to patch them.
  23. This risk-based approach means Smith Inc was prepared. They deployed CCS solutions to prevent a targeted attack.Notes: Sales/Partners to talk about the key benefits of CCS
  24. By now it would seem that Smith Inc security is truly solid. But there’s another common means of attack with surprisingly simple methods. An Advance Persistent Threat (APT) works on a grass roots level – often with something as simple as a user password or login.  An APT works across multiple vectors with simple techniques. It doesn’t look like a automated bot, it looks like a human. Because human thought is behind it.
  25. Let’s see what Simon says. He figures he has the perfect password, his mother’s maiden name or simply 1 2 3 4 5 6, Fields. But what he thinks is clever is actually very uncomplicated. With a series of hit & miss guesswork trials (likely with clues gathered from other sources), a ‘brute force’ attack will likely get the job done eventually.
  26. Fortunately Smith Inc uses Identity Management Solutions from Symantec, or VeriSign Identity Protection (VIP). VIP looks from the inside out to make sure the right person has access to applications or data. VIP is able to prevent an unauthorized person from accessing the network. User Authentication technology from Symantec saves the day.Note: Sales/Partners to talk about the key benefits of VIP
  27. Time for the hackers to pack it in? Not quite. They target another employee, Steve. He recently joined Smith Inc from another company.
  28. Steve’s job is to look at personal devices such as iPads and iPhones to see how they can increase productivity and efficiency in the workforce.  Steve is doing a lot of testing to see how specific company applications can be deployed onto mobile devices. He’s excited about his new role and shares the latest & greatest about his project on Facebook. Next thing you know, Steve’s stash of personal devices go missing. Only thing is, it’s his loss, not Smith Inc’s as all their apps are secure.
  29. Symantec recently launched Mobile Device Security thanks to recent acquisitions with Odyssey and Nukona. They provide application level security for mobile devices with custom policies to minimize risk and protect confidential information on them. This technology is advanced enough to ‘wipe the slate clean’ of any stored information should the device become lost or stolen.Notes: Sales/Partners to talk about the key benefits of Nukona and Odyssey
  30. Multiple Layers of SecurityWhat have we seen from Simon and the Smith Inc story? That defense is an in-depth strategy. It’s about putting multiple layers of technology together and making them work. It’s about security without compromise. How to better manage security risks knowing how to prioritise threats and ensure multi-layer integrity while being vigilant of the global landscape of security threats.  It’s about understanding how threats work and putting in place an overlapping defense strategy, making it more and more difficult for the attacker to succeed at the various stages of a data breach. It’s about changing workplace environments, virtualisation, and accelerated productivity.
  31. Recap Slide – identify solutions Recap on Symantec Products and capablities
  32. Clearly Symantec has a solution to help you meet every information challenge. Our goal is 360-degree data protection regardless of where it is, what it is, or how it is being used. This information-centric approach lets you address the unstoppable forces that every IT organization faces and move forward with confidence.
  33. Symantec helps you protect what matters most – information, personal privacy and digital assets, regardless of location or device – three ways:Understanding the context and relevance of data through intelligence and ultimately developing better efficiencies Making information available, accessible and secure – no matter whatDriving governance to show how solutions work effectively in line with regulatory requirements or internal best practicesAnd we make it available to customers however they want to consume it – on premise, virtually, in the cloud or via mobile Let’s look in more details at the kinds of solutions we offer to help protect and manage your information.
  34. Symantec helps you protect what matters most – information, personal privacy and digital assets, regardless of location or device – three ways:Understanding the context and relevance of data through intelligence and ultimately developing better efficiencies Making information available, accessible and secure – no matter whatDriving governance to show how solutions work effectively in line with regulatory requirements or internal best practicesAnd we make it available to customers however they want to consume it – on premise, virtually, in the cloud or via mobile Let’s look in more details at the kinds of solutions we offer to help protect and manage your information.
  35. Symantec has many resources for you to stay on top of the security threat landscape and here are a few of the best tools we have:Build Your Own ISTR: (go.symantec.com/istr)This year, Symantec is offering its annual report on the Internet threat landscape in a whole new way. With the online “Build Your Report” tool, you can create your own custom version of the Internet Security Threat Report by selecting only those topic areas in which you are most interested. You can then print your custom report or share it on social networking sites like Twitter and Facebook. This online tool contains data from the 4 appendices that we used to include in the full ISTR in past years. It also contains regional data for EMEA and LAM as well as best practices.Norton Cybercrime Index:This is a tool produced by the Norton consumer team. It’s a daily measure of cybercrime risks globally and is available online at nortoncybercrimeindex.comThreat Intel Twitter Feed:These are updates from our Security Response analysts around the globe – subscribing to this feed will keep you informed about the latest threats and trends that Symantec is seeing across it Global Intelligence Network.
  36. Symantec END