SlideShare a Scribd company logo
Intel® Cyber-Security Briefing:
Trends, Solutions, and Opportunities
John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc.
May 2012
Agenda

• Intel + McAfee: What it means

• Computing trends and security implications

• A new approach to improve cyber-security:

    –Hardware-enhanced Security

• Examples of Hardware-assisted Security

• Opportunity for the IT Community to
       Change The Game

2
Innovation Opportunities by working with
  Intel and McAfee
• Change the way we all think about security problems and
  solutions
• Innovate and Deliver new levels of protection not available with
  software-only solutions, employing hardware-enhanced security
• Deliver intelligence-in-depth: Security that is integral to your
  hardware, network, systems, applications, and databases—and
  works together to protect your business

  Key Innovation Areas




    Next-Gen     Secure        Secure        Cloud       Hardware
    Endpoint     Mobile       Embedded      Security     Enhanced
    Security     Devices       Devices      Platform      Security
Computing Trends and Security Implications



                                                              Escalating
                                                                Threat
                                                 Complexity   Landscape
                                                  of the IT
                                                   Model
                                   Consumerization
                          Growth of     of IT
                Cloud      Mobile
              Computing    Devices
 Virtualization




  As a consequence: The size of the “Attack Surface”
    and the opportunities for Malicious Entry have
                     expanded.

  4
People: The New Network Perimeter
Human Vulnerabilities and Risks
  Mobile                                             Phishing
 Device                                              Attacks
 Loss or                                             and Spear
   Theft                                             Phishing




    Corporate or                        Social Networking
      Personal                                 Data
 Stolen Credentials
                      Online Collaboration
                             Tools

Humans make mistakes: Lost Devices, “Found”
            USB drives, etc.
 5
Traditional IT Security Strategy:
Multiple Security Perimeters
                                                       Response
                      Monitoring, intrusion detection,
                                                       Capability
                      proactive and reactive response

               File and data encryption, File and Data
          enterprise rights management

     Secure coding, security Application
              specifications

                  Platform
                                    Antivirus software, patching,
                                  minimum security specifications for
                                  systems
     Network
                     Firewalls, demilitarized zone,
                   data loss prevention


                             a.k.a. “Defense in Depth”
 6
A closer look at Hacking:
The Motivations Have Expanded....




SLAMMER         ZEUS        AURORA            STUXNET

     Hacking    Organized   State-Sponsored    Physical
     for Fun      Crime     Cyber Espionage     Harm



         Hacking Software Tools for Sale:
        $11B/year industry with 56% CAGR

 7
“The Malware Tsunami”

   There were more malware attacks in 2010-2011
      than in the previous 10 years combined!


                                                  ?
60,000+ 6,000,000          2,000,000          Stealth
per day per month          per month          Attacks
new unique   new botnet    new malicious    Non-detectable
 malware      infections     web sites       malware and
  pieces                                       advanced
                                           persistent threats
Tools of the Modern Hacker

Candy Drop:
Placing infected USB drives where humans will take them, and
later plug them into their PC or other network-connected device.

Social Engineering:
Manipulating people to divulge data or “click here”

Advanced Persistent Threat (APT):
A long term, human-directed “campaign” to take control of a
specific system or network – all while remaining undetected.

Kernel-mode Rootkit:
It lives and operates below the operating system, to control the
OS and evade detection by OS-level security measures. Can
cloak other malware, APT’s.
Attacks Are Moving “Down the Stack”, to
  Gain Greater Stealth and System Control

                                  Traditional attacks:
                                  Focused primarily on
Attacks disable
                                  the application layer
       security
      products                    OS infected with APTs:
                                  Threats are hidden from
                                  security products
   Compromise
virtual machine



                                  New stealth attacks:
     Ultimate APTs:               Embed themselves
Compromise platform               below the OS and
and devices below the             Virtual Machine, so
 OS, using rootkits as            they can evade current
               cloaks             solutions
APT: Advanced Persistent Threat
    10
A New Approach Is Required:
     “Hardware-enhanced Security”
     • Move critical security processes down into the hardware
      – Encryption, Authentication, Manageability, and Platform Cleansing
      – Hardware is inherently less vulnerable to modification or corruption
     • Establish a security perimeter from the hardware layer up
     • Isolate the security services from the host OS (often the target)
     • Build in capability to monitor, maintain, repair, and recover


                                       Added Protection against:
                                       • Viruses and worms
                                       • Malware
                                       • Disabled software
                                       • Rootkits

11
Example of Hardware-enhanced Security:
The DeepSAFE* Security Platform
                                                         DeepSAFE is the first hardware-
                                                         assisted security platform from
                                                         Intel and McAfee. Platform
                                                         capabilities include:
                                                         • McAfee Deep Defender* product
                                                              • Utilizes the isolation capabilities of Intel
                                                                Virtualization Technology
                                                              • Works “beyond” the OS, so it can’t be
                                                                corrupted by OS or malware
                                                              • Detects, blocks, and removes stealthy
                                                                advanced persistent threats and
                                                                malware
                                                         • Foundation for future solutions from
                                                           McAfee and Intel

    Next-generation “beyond the OS” security
    enabled by Intel® processor technology
       * Other names and brands may be claimed as the property of others.
Example of Hardware-enhanced Security:
The DeepSAFE* Security Platform
                                                         DeepSAFE is the first hardware-
                                                         assisted security platform from
                                                         Intel and McAfee. Platform
                                                         capabilities include:
                                                         • McAfee Deep Defender* product
                                                              • Utilizes the isolation capabilities of Intel
                                                                Virtualization Technology
                                                              • Works “beyond” the OS, so it can’t be
                                                                corrupted by OS or malware
                                                              • Detects, blocks, and removes stealthy
                                                                advanced persistent threats and
                                                                malware
                                                         • Foundation for future solutions from
                                                           McAfee and Intel

    Next-generation “beyond the OS” security
    enabled by Intel® processor technology
       * Other names and brands may be claimed as the property of others.
Hardware-enhanced Security:
Faster Encryption on PCs and Servers
                                                                                                       “There's a definite benefit to…
                                                                                                       Intel® AES-NI instructions… this is huge
                                                                                                       for corporate desktops/notebooks.”
                                                                                                                                                                               —Anandtech1




Intel® Core™ i5, Core™ i7, and                                                              Whole-disk                        Internet                              File Storage
select Intel® Xeon® processors, with
Intel® Advanced Encryption Standard
                                                                                            Encryption                        Security                              Encryption
New Instructions (Intel® AES-NI)


     Intel® AES-NI increases encryption operations
     up to 4x by using hardware and software together.2
 1   The Clarkdale Review: Intel® Core™ i5 processor 661, Core™ i3 processor 540, and Core i3 processor 530, Anand Lal Shimpi, Anandtech, January 2010. http://www.anandtech.com/show/2901/5 .
 2   Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI) requires a computer system with an Intel AES-NI enabled processor, as well as non-Intel software to execute the instructions in the
     correct sequence.

Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. See full disclaimer at http://www.intel.com/performance
       14                            * Other names and brands may be claimed as the property of others.
Example of Hardware-enhanced Security:
    Intel® Identity Protection Technology
                Now built into
                your PC with Intel® IPT

                                                                                                      1        Utilize PCs with
                                                                                                               Intel® IPT support
     Traditional
     hardware
     token


                                                                                                      2        Choose a security
                                                                                                               software vendor1
                                                                                                               Used for remote authorized
                                                                                                               users (VPN) and/or for the
                                         PC with Intel® IPT                                                    public web
                                         embedded tokens




End Users                                               Web Sites                                               Organizations
Add security that is                                    Protect user accounts                                   Secure method for authorized
easy to use                                             and limit losses                                        users to remotely log in

1   Embedded tokens work with all Symantec VIP protected web sites as well as enabled VASCO protected sites.
          15
Example of Hardware-enhanced Security
for Virtualized Servers and Clouds

              Intel® AES-NI                                Apps1                 Apps2
              Built-in Encryption                                                                                   Apps2                       Intel® TXT
                                                                                                                                                Enables VM
                                                           OS1                   OS2                                OS2                         migration based
              Intel® VT
                                                                                                                    VM2                         on security policy
              Protects VM Isolation                        VM1                   VM2

              Intel® TXT                              Hypervisor                                                                            Hypervisor
              Works with the
              VMM to create                           Server Hardware 1                                                                     Server Hardware 2
              “trusted” status                        with Intel® TXT                                                                       with Intel® TXT




   Encrypt                                                           Isolate                                                           Comply
   Intel® AES-NI                                                     Intel® VT and Intel® TXT                                          Intel® TXT
   delivers built-in encryption                                      protects VM isolation and                                         establishes “trusted” status
   acceleration for better data                                      provides a more secure                                            to enable migration based
   protection                                                        platform                                                          on security policy


      Establishing the foundation for more secure data centers
Intel® AES-NI – Intel® Advanced Encryption Standard New Instructions; Intel® TXT – Intel® Trusted Execution Technology; Intel® VT – Intel® Virtualization Technology
       16
Hardware-enhanced Security:
 Other Applications
 Remote Client Management and Remediation,         Response
 Client Anti-Theft and Recovery

 Hardware-accelerated                      File and Data
 Whole-Disk Encryption

 Hardware-accelerated                Application
 Data Encryption

 Embedded System, Virtualized   Platform
 Server, and Cloud Security

 Identity Protection and   Network
 Access Management



Intel and its partners are applying Hardware-enhanced
   Security to “harden” each perimeter of defense.

  17
Defense-in-Depth enhanced by
Hardware-assisted Security
                                                 Response

                   McAfee EEPC               File and Data

                   McAfee EEPC         Application
       Intel® VT

                                  Platform

                             Network



Intel and its partners are applying Hardware-enhanced
   Security to “harden” each perimeter of defense.

  18
Enhancing End to End Cloud Security
Build Foundation of Integrity:
From Client to Network to Cloud
  Public/Private Clouds
                                                                 User & Intelligent
 (Servers, Network, Storage)
                                                                      Devices
   Private
   Cloud                              Secure the
                                     Connections
                Public          Apps, data in flight, traffic
                Cloud
                                              2



 Secure Cloud Datacenters                                         Secure the Devices
  Infrastructure & VM integrity,
       seamless federation,                                     3 Identity & access mgmt,
                                                                  platform integrity, data
      audit/compliance, data     1
                                                                         protection
            protection
                                             4
                         Common Security Standards
Example of How Hardware-enhanced PC
Security can enhance Cloud Security


                          Private Cloud   Public Cloud


      Identity           Strengthen        Protect against    Protect against
     Federation         and Simplify         Man in the      Zero-Day Attacks
                       Authentication      Middle Attacks
Salesforce.com
                                                                 Operating System
          Google.com

                                                                       CPU




           Authentication                            Data Protection
                                Client Devices




20
Enhancing End to End Cloud Security
Intel + McAfee: Toward Worry-Free
Cloud Computing
Deliver hardware-enhanced
security to better protect data, users,        Cloud Data
                                                Centers
& traffic from client to cloud

Tools to aggregate security information
across clouds to automate & simplify policy
setting & improve audit/compliance reporting


New capabilities to automate client to
cloud security and service levels, such
as identity as a service


Industry collaboration to accelerate
broad adoption of security standards
so IT can easily adopt cloud

 21
Summary and Opportunity

The info security challenge is escalating.
Hardware-assisted Security is solving a
 variety of problems, many unsolvable by
 software-only.
We all have opportunity to Change The Game:
  Intel/McAfee + Partners + Customers
Thank You!
Legal Notices and Disclaimers
INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY
ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN
INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS
ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL ® PRODUCTS INCLUDING LIABILITY OR WARRANTIES
RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER
INTELLECTUAL PROPERTY RIGHT. INTEL PRODUCTS ARE NOT INTENDED FOR USE IN MEDICAL, LIFE SAVING, OR LIFE SUSTAINING
APPLICATIONS.
Intel may make changes to specifications and product descriptions at any time, without notice.
All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.
Intel, processors, chipsets, and desktop boards may contain design defects or errors known as errata, which may cause the product to deviate from
published specifications. Current characterized errata are available on request.
Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such
as SYSmark* and MobileMark*, are measured using specific computer systems, components, software, operations and functions. Any change to any
of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your
contemplated purchases, including the performance of that product when combined with other products. For more information go to
http://www.intel.com/performance
Intel, Intel Inside, the Intel logo, Intel Core, and Xeon are trademarks of Intel Corporation in the United States and other countries.
Security features enabled by Intel® AMT require an enabled chipset, network hardware and software and a corporate network connection. Intel AMT
may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping,
hibernating or powered off. Setup requires configuration and may require scripting with the management console or further integration into existing
security frameworks, and modifications or implementation of new business processes. For more information, see
http://www.intel.com/technology/manage/iamt.
No system can provide absolute security under all conditions. Requires an enabled chipset, BIOS, firmware and software and a subscription with a
capable Service Provider. Consult your system manufacturer and Service Provider for availability and functionality. Intel assumes no liability for lost or
stolen data and/or systems or any other damages resulting thereof. For more information, visit http://www.intel.com/go/anti-theft
Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and
configuration of your hardware, software and IT environment. To learn more visit: http://www.intel.com/technology/vpro
The original equipment manufacturer must provide TPM functionality, which requires a TPM-supported BIOS. TPM functionality must be initialized and
may not be available in all countries.
Intel® AES-NI requires a computer system with an AES-NI enabled processor, as well as non-Intel software to execute the instructions in the correct
sequence. AES-NI is available on select Intel® processors. For availability, consult your reseller or system manufacturer. For more information,
see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/
*Other names and brands may be claimed as the property of others.
Copyright © 2012 Intel Corporation, All Rights Reserved

More Related Content

What's hot

Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
Nikunj Thakkar
 
CYBER CRIME ppt
CYBER CRIME pptCYBER CRIME ppt
CYBER CRIME ppt
Suyash Sinha
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
kishore golla
 
Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns
CrowdStrike
 
Ransomware
RansomwareRansomware
Ransomware
Chaitali Sharma
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
Ramiro Cid
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
WAJAHAT IQBAL
 
Cybercrime
CybercrimeCybercrime
Cybercrime
promit
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
shindept123
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
Ritik Kumar
 
Data breach
Data breachData breach
Data breach
Burhan Ahmed
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
NetLockSmith
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
sommerville-videos
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
shindept123
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 

What's hot (20)

Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
CYBER CRIME ppt
CYBER CRIME pptCYBER CRIME ppt
CYBER CRIME ppt
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns
 
Ransomware
RansomwareRansomware
Ransomware
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Data breach
Data breachData breach
Data breach
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Similar to Cyber security-briefing-presentation

Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
Intel IT Center
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtity
Ahmed Sallam
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
MiltonBiswas8
 
Stealthy Threats Driving a New Approach to IT Security
Stealthy Threats Driving a New Approach to IT SecurityStealthy Threats Driving a New Approach to IT Security
Stealthy Threats Driving a New Approach to IT Security
Intel IT Center
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
Işınsu Akçetin
 
Data security
Data securityData security
Data security
Soumen Mondal
 
Offensive malware usage and defense
Offensive malware usage and defenseOffensive malware usage and defense
Offensive malware usage and defense
Christiaan Beek
 
SDK Whitepaper
SDK WhitepaperSDK Whitepaper
SDK Whitepaper
hanniw79
 
Euro mGov Securing Mobile Services
Euro mGov Securing Mobile ServicesEuro mGov Securing Mobile Services
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
 
NetWitness
NetWitnessNetWitness
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Andris Soroka
 
Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal Devices
Javier González
 
Code protection
Code protectionCode protection
Code protection
whitecryption
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
Szymon Dowgwillowicz-Nowicki
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
Sophos
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
Splunk
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
Andy Shutka
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General Presentation
Ksenia Kondratieva
 
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation ThreatsWeaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Lumension
 

Similar to Cyber security-briefing-presentation (20)

Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtity
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Stealthy Threats Driving a New Approach to IT Security
Stealthy Threats Driving a New Approach to IT SecurityStealthy Threats Driving a New Approach to IT Security
Stealthy Threats Driving a New Approach to IT Security
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Data security
Data securityData security
Data security
 
Offensive malware usage and defense
Offensive malware usage and defenseOffensive malware usage and defense
Offensive malware usage and defense
 
SDK Whitepaper
SDK WhitepaperSDK Whitepaper
SDK Whitepaper
 
Euro mGov Securing Mobile Services
Euro mGov Securing Mobile ServicesEuro mGov Securing Mobile Services
Euro mGov Securing Mobile Services
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
NetWitness
NetWitnessNetWitness
NetWitness
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal Devices
 
Code protection
Code protectionCode protection
Code protection
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
 
Eset India General Presentation
Eset India General PresentationEset India General Presentation
Eset India General Presentation
 
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation ThreatsWeaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
 

Recently uploaded

clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 

Recently uploaded (20)

clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 

Cyber security-briefing-presentation

  • 1. Intel® Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. May 2012
  • 2. Agenda • Intel + McAfee: What it means • Computing trends and security implications • A new approach to improve cyber-security: –Hardware-enhanced Security • Examples of Hardware-assisted Security • Opportunity for the IT Community to Change The Game 2
  • 3. Innovation Opportunities by working with Intel and McAfee • Change the way we all think about security problems and solutions • Innovate and Deliver new levels of protection not available with software-only solutions, employing hardware-enhanced security • Deliver intelligence-in-depth: Security that is integral to your hardware, network, systems, applications, and databases—and works together to protect your business Key Innovation Areas Next-Gen Secure Secure Cloud Hardware Endpoint Mobile Embedded Security Enhanced Security Devices Devices Platform Security
  • 4. Computing Trends and Security Implications Escalating Threat Complexity Landscape of the IT Model Consumerization Growth of of IT Cloud Mobile Computing Devices Virtualization As a consequence: The size of the “Attack Surface” and the opportunities for Malicious Entry have expanded. 4
  • 5. People: The New Network Perimeter Human Vulnerabilities and Risks Mobile Phishing Device Attacks Loss or and Spear Theft Phishing Corporate or Social Networking Personal Data Stolen Credentials Online Collaboration Tools Humans make mistakes: Lost Devices, “Found” USB drives, etc. 5
  • 6. Traditional IT Security Strategy: Multiple Security Perimeters Response Monitoring, intrusion detection, Capability proactive and reactive response File and data encryption, File and Data enterprise rights management Secure coding, security Application specifications Platform Antivirus software, patching, minimum security specifications for systems Network Firewalls, demilitarized zone, data loss prevention a.k.a. “Defense in Depth” 6
  • 7. A closer look at Hacking: The Motivations Have Expanded.... SLAMMER ZEUS AURORA STUXNET Hacking Organized State-Sponsored Physical for Fun Crime Cyber Espionage Harm Hacking Software Tools for Sale: $11B/year industry with 56% CAGR 7
  • 8. “The Malware Tsunami” There were more malware attacks in 2010-2011 than in the previous 10 years combined! ? 60,000+ 6,000,000 2,000,000 Stealth per day per month per month Attacks new unique new botnet new malicious Non-detectable malware infections web sites malware and pieces advanced persistent threats
  • 9. Tools of the Modern Hacker Candy Drop: Placing infected USB drives where humans will take them, and later plug them into their PC or other network-connected device. Social Engineering: Manipulating people to divulge data or “click here” Advanced Persistent Threat (APT): A long term, human-directed “campaign” to take control of a specific system or network – all while remaining undetected. Kernel-mode Rootkit: It lives and operates below the operating system, to control the OS and evade detection by OS-level security measures. Can cloak other malware, APT’s.
  • 10. Attacks Are Moving “Down the Stack”, to Gain Greater Stealth and System Control Traditional attacks: Focused primarily on Attacks disable the application layer security products OS infected with APTs: Threats are hidden from security products Compromise virtual machine New stealth attacks: Ultimate APTs: Embed themselves Compromise platform below the OS and and devices below the Virtual Machine, so OS, using rootkits as they can evade current cloaks solutions APT: Advanced Persistent Threat 10
  • 11. A New Approach Is Required: “Hardware-enhanced Security” • Move critical security processes down into the hardware – Encryption, Authentication, Manageability, and Platform Cleansing – Hardware is inherently less vulnerable to modification or corruption • Establish a security perimeter from the hardware layer up • Isolate the security services from the host OS (often the target) • Build in capability to monitor, maintain, repair, and recover Added Protection against: • Viruses and worms • Malware • Disabled software • Rootkits 11
  • 12. Example of Hardware-enhanced Security: The DeepSAFE* Security Platform DeepSAFE is the first hardware- assisted security platform from Intel and McAfee. Platform capabilities include: • McAfee Deep Defender* product • Utilizes the isolation capabilities of Intel Virtualization Technology • Works “beyond” the OS, so it can’t be corrupted by OS or malware • Detects, blocks, and removes stealthy advanced persistent threats and malware • Foundation for future solutions from McAfee and Intel Next-generation “beyond the OS” security enabled by Intel® processor technology * Other names and brands may be claimed as the property of others.
  • 13. Example of Hardware-enhanced Security: The DeepSAFE* Security Platform DeepSAFE is the first hardware- assisted security platform from Intel and McAfee. Platform capabilities include: • McAfee Deep Defender* product • Utilizes the isolation capabilities of Intel Virtualization Technology • Works “beyond” the OS, so it can’t be corrupted by OS or malware • Detects, blocks, and removes stealthy advanced persistent threats and malware • Foundation for future solutions from McAfee and Intel Next-generation “beyond the OS” security enabled by Intel® processor technology * Other names and brands may be claimed as the property of others.
  • 14. Hardware-enhanced Security: Faster Encryption on PCs and Servers “There's a definite benefit to… Intel® AES-NI instructions… this is huge for corporate desktops/notebooks.” —Anandtech1 Intel® Core™ i5, Core™ i7, and Whole-disk Internet File Storage select Intel® Xeon® processors, with Intel® Advanced Encryption Standard Encryption Security Encryption New Instructions (Intel® AES-NI) Intel® AES-NI increases encryption operations up to 4x by using hardware and software together.2 1 The Clarkdale Review: Intel® Core™ i5 processor 661, Core™ i3 processor 540, and Core i3 processor 530, Anand Lal Shimpi, Anandtech, January 2010. http://www.anandtech.com/show/2901/5 . 2 Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI) requires a computer system with an Intel AES-NI enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. See full disclaimer at http://www.intel.com/performance 14 * Other names and brands may be claimed as the property of others.
  • 15. Example of Hardware-enhanced Security: Intel® Identity Protection Technology Now built into your PC with Intel® IPT 1 Utilize PCs with Intel® IPT support Traditional hardware token 2 Choose a security software vendor1 Used for remote authorized users (VPN) and/or for the PC with Intel® IPT public web embedded tokens End Users Web Sites Organizations Add security that is Protect user accounts Secure method for authorized easy to use and limit losses users to remotely log in 1 Embedded tokens work with all Symantec VIP protected web sites as well as enabled VASCO protected sites. 15
  • 16. Example of Hardware-enhanced Security for Virtualized Servers and Clouds Intel® AES-NI Apps1 Apps2 Built-in Encryption Apps2 Intel® TXT Enables VM OS1 OS2 OS2 migration based Intel® VT VM2 on security policy Protects VM Isolation VM1 VM2 Intel® TXT Hypervisor Hypervisor Works with the VMM to create Server Hardware 1 Server Hardware 2 “trusted” status with Intel® TXT with Intel® TXT Encrypt Isolate Comply Intel® AES-NI Intel® VT and Intel® TXT Intel® TXT delivers built-in encryption protects VM isolation and establishes “trusted” status acceleration for better data provides a more secure to enable migration based protection platform on security policy Establishing the foundation for more secure data centers Intel® AES-NI – Intel® Advanced Encryption Standard New Instructions; Intel® TXT – Intel® Trusted Execution Technology; Intel® VT – Intel® Virtualization Technology 16
  • 17. Hardware-enhanced Security: Other Applications Remote Client Management and Remediation, Response Client Anti-Theft and Recovery Hardware-accelerated File and Data Whole-Disk Encryption Hardware-accelerated Application Data Encryption Embedded System, Virtualized Platform Server, and Cloud Security Identity Protection and Network Access Management Intel and its partners are applying Hardware-enhanced Security to “harden” each perimeter of defense. 17
  • 18. Defense-in-Depth enhanced by Hardware-assisted Security Response McAfee EEPC File and Data McAfee EEPC Application Intel® VT Platform Network Intel and its partners are applying Hardware-enhanced Security to “harden” each perimeter of defense. 18
  • 19. Enhancing End to End Cloud Security Build Foundation of Integrity: From Client to Network to Cloud Public/Private Clouds User & Intelligent (Servers, Network, Storage) Devices Private Cloud Secure the Connections Public Apps, data in flight, traffic Cloud 2 Secure Cloud Datacenters Secure the Devices Infrastructure & VM integrity, seamless federation, 3 Identity & access mgmt, platform integrity, data audit/compliance, data 1 protection protection 4 Common Security Standards
  • 20. Example of How Hardware-enhanced PC Security can enhance Cloud Security Private Cloud Public Cloud Identity Strengthen Protect against Protect against Federation and Simplify Man in the Zero-Day Attacks Authentication Middle Attacks Salesforce.com Operating System Google.com CPU Authentication Data Protection Client Devices 20
  • 21. Enhancing End to End Cloud Security Intel + McAfee: Toward Worry-Free Cloud Computing Deliver hardware-enhanced security to better protect data, users, Cloud Data Centers & traffic from client to cloud Tools to aggregate security information across clouds to automate & simplify policy setting & improve audit/compliance reporting New capabilities to automate client to cloud security and service levels, such as identity as a service Industry collaboration to accelerate broad adoption of security standards so IT can easily adopt cloud 21
  • 22. Summary and Opportunity The info security challenge is escalating. Hardware-assisted Security is solving a variety of problems, many unsolvable by software-only. We all have opportunity to Change The Game: Intel/McAfee + Partners + Customers
  • 24. Legal Notices and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL ® PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. INTEL PRODUCTS ARE NOT INTENDED FOR USE IN MEDICAL, LIFE SAVING, OR LIFE SUSTAINING APPLICATIONS. Intel may make changes to specifications and product descriptions at any time, without notice. All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. Intel, processors, chipsets, and desktop boards may contain design defects or errors known as errata, which may cause the product to deviate from published specifications. Current characterized errata are available on request. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark* and MobileMark*, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information go to http://www.intel.com/performance Intel, Intel Inside, the Intel logo, Intel Core, and Xeon are trademarks of Intel Corporation in the United States and other countries. Security features enabled by Intel® AMT require an enabled chipset, network hardware and software and a corporate network connection. Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating or powered off. Setup requires configuration and may require scripting with the management console or further integration into existing security frameworks, and modifications or implementation of new business processes. For more information, see http://www.intel.com/technology/manage/iamt. No system can provide absolute security under all conditions. Requires an enabled chipset, BIOS, firmware and software and a subscription with a capable Service Provider. Consult your system manufacturer and Service Provider for availability and functionality. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For more information, visit http://www.intel.com/go/anti-theft Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software and IT environment. To learn more visit: http://www.intel.com/technology/vpro The original equipment manufacturer must provide TPM functionality, which requires a TPM-supported BIOS. TPM functionality must be initialized and may not be available in all countries. Intel® AES-NI requires a computer system with an AES-NI enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available on select Intel® processors. For availability, consult your reseller or system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/ *Other names and brands may be claimed as the property of others. Copyright © 2012 Intel Corporation, All Rights Reserved