SlideShare a Scribd company logo
1 of 155
Symantec Enterprise Security :  Securing your business along network intrusions Somyos Udomnilobon Sales Engineer - Thailand
Symantec Corporation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Technology Services Response
 
Symantec Enterprise Security Solution Vulnerability Management Firewall/VPN Intrusion Detection Virus Protection Client  Security Managed Security Services Education Services Response and Support Gateway Security Security Infrastructure Management
Agenda ,[object Object],[object Object],[object Object]
Why security is concern?
Security Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Business Reasons ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security is a Business Issue ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Aim Point Effect Points
Why the Security Problem is hard to fix Where’s the  sweet spot?
The Lifecycle Security Model Key To Success Identify systems and assets on the network and identify critical vulnerability points Define and document an organizational security policy Identify changes to  network infrastructure  and compliance with policies
Strategic Business Risks Regulatory Action Corporate Liability Indirect Costs Loss of Customer Confidence
Cyber-Security Is Now a Boardroom and  a Legislative Concern ,[object Object],[object Object],Source: Internetweek 2002
Security Critical to e-Business Success   Importance   of Security in eBusiness Solution Decision Criteria   Source: IDC
Source: survey of 538 computer security professionals conducted by the Computer Security Institute (CSI) and the US Federal Bureau of Investigation (FBI) . Soaring Costs and Security Breaches
Evolving Security Threats Will Your Perimeter Security Stop Them?
Threat Evolution Polymorphic Viruses (Tequila) Blended Threats  (Code Red, Nimda) Denial-of-Service (Yahoo!, eBay) Mass Mailer Viruses (Love Letter/Melissa) Zombies Source: Symantec Viruses Network Intrusions 70,000 60,000 50,000 40,000 30,000 20,000 10,000 Number of Known Threats
Source: CERT, Carnegie Mellon University http://www.cert.org/stats/ > 99%
Average Reported Losses Unauthorized Insider Access Theft of Proprietary Information Outside System Penetration Financial Fraud Sabotage  and Denial of Services 2000 CSI/FBI Computer  Crime and Security Survey $1.1 M + $1.0 M + $617,000 $536,000 $172,000
 
Democratization of Hacking ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Hacking Methodology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Footprinting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scanning and Landscape Discovery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Half Time. ,[object Object],[object Object],[object Object]
Host Enumeration ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Penetrate (take ownership) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Escalating your rights ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pillage ,[object Object],[object Object],[object Object],[object Object],[object Object]
Get Interactive ,[object Object],[object Object],[object Object]
Expanding Influence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Exploiting Buffer Overflow ,[object Object],[object Object],[object Object],k Input Buffer Program Area User Input Excess Data Input overflow into program area
Denial of Service (DoS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],r
Denial of Service Example:  LAND Attack Spoofed IP Packet Packet is sent back to itself Again, again, .. Land Unix-Server CRASH
Distributed DoS  The Internet Meltdown ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Distributed DoS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
The New “Integrated Threats” Internet Nimda Worm Example Workstation A security threat or attack that uses multiple methods to propagate Nimda $500M + Code Red $2.5B Workstation Via Email File Server Workstation Mail Server Firewall Web Server Via Web Page Web Server Mail Gateway
Rapid, Multiple Ways to Spread Internet Nimda Worm Example 1. Worm arrives by email – uses Mime exploit to execute by just reading or previewing file. Infected systems use  worm’s own SMTP server to send emails to others.  2. Users visiting compromised Web servers prompted to download infected file containing worm as attachment. Workstation Via Email File Server Workstation Mail Server Firewall Web Server Via Web Page Workstation Web Server Mail Gateway
Just “Any” Firewall Won’t Be Effective Internet Nimda Worm Example Workstation 3. Infected systems scan for unpatched IIS servers,  then use Unicode Web Traversal exploit to gain  control of the target server. Commands/messages  embedded creating non-RFC compliant HTTP protocol packets. Create DOS with outbound traffic. 4. Nimda scans for and attacks hard disks with file  sharing enabled, creates an open network share and guest account with admin privileges. File Server Mail Server Firewall Web Server Mail Gateway Workstation Via Email Web Server Via Web Page Workstation
Nimda: 2.2M Systems Infected in 3 Days! ,[object Object],Web Server Remote User Enterprise File Server Workstation Web Server  Mail Server  Laptop Firewall
Nimda: 2.2M Systems Infected in 3 Days! ,[object Object],NIMD A Remote User Enterprise File Server Workstation Web Server  Mail Server  Laptop Firewall
Nimda: 2.2M Systems Infected in 3 Days! ,[object Object],Remote User Enterprise File Server Workstation Web Server  Mail Server  Laptop Firewall
Nimda: 2.2M Systems Infected in 3 Days! ,[object Object],Remote User Enterprise File Server Workstation Web Server  Mail Server  Laptop Firewall
Nimda: 2.2M Systems Infected in 3 Days! ,[object Object],Remote User Enterprise File Server Workstation Web Server  Mail Server  Laptop Firewall Remote User
Example Blended Threat Incident Blended Threats use worms, email and application vulnerabilities, and network shares to gain control of systems BT BT BT BT BT BT BT BT BT BT BT
A Blended Threat Example –  Code Red   ,[object Object],Code Red Epidemiology
 
 
 
 
 
 *
Web Site Defacements Source:  attrition.org
Security requires defense in depth Groupware Servers Database Servers File Servers Telecommuters Modems Hacker Customers Partners Branch Office Wireless   Device Web Server Firewall
Let’s take a break
Securing your business… How to prevent your network against  intrusion?
Vulnerability Management - Scan Groupware Servers Database Servers File Servers Customers Partners Branch Office Wireless   Device Web Server Telecommuters Modems Firewall Probe for Vulnerabilities Probe for Vulnerabilities
Vulnerability Management If you know where you are vulnerable and the risk these vulnerabilities pose to your organization, efficient steps can be taken to pro-actively close the vulnerabilities and mitigate the risk to an acceptable level.
Vulnerability Management How secure are we?
Host vs. Network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],In/out pix t
ESM - Inside In NetRecon – Outside In ESM
ESM assess and comply  Actual Environment ESM COMPLIANCE Policy Standards Procedures, Guidelines  & Practices
Firewall - Multi-tier approach Firewall Groupware Servers Database Servers File Servers Customers Partners Branch Office Wireless   Device Web Server Telecommuters Modems
Firewall Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Firewall Types:  Packet Filtering ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Packet Filtering Rules ,[object Object],[object Object]
Simple Packet Filter ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Firewall Types – Circuit-level Gateway ,[object Object],[object Object],[object Object]
Firewall Types – Stateful Inspection ,[object Object],[object Object],[object Object],Present in multilayer  stateful inspection
Stateful Packet Filter ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Firewall types – Application Gateway ,[object Object],[object Object],[object Object],Can also be added
Full Application Inspection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Client Server Proxy Client Server Logical connection
Hybrid Firewall ,[object Object],[object Object],[object Object],[object Object]
Number of  vulnerabilities Level of security
Firewall Types – Pro and Con ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Deployment Example Desktops Public Web Servers Telecommuters Customers & Partners Servers VelociRaptor Router Corporate Network Partner Web Servers Branch Office Central Administrator Internet
VPN - Office-to-office and Client Firewall Groupware Servers Database Servers File Servers Customers Partners Branch Office Wireless   Device Web Server Telecommuters Modems
Virtual Private Network (VPN) ,[object Object],[object Object],[object Object],Partners/ Contractors Remote offices Telecommuters Internet VPN Device VPN Device Private VPN Device
VPN (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VPN (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VPN (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VPN Deployment Scenarios Public Servers Symantec  Enterprise Firewall Router Symantec  Enterprise VPN Public Servers Symantec  Enterprise Firewall With VPN Router Internal Network Public Servers Symantec  Enterprise Firewall Router Internal Network Symantec  Enterprise VPN Internal Network Internet Internet Internet
Personal Firewall with Client VPN Web FTP Telnet SQLNet Other Attacker Internal network VPN User without firewall Internet Personal Firewall Web FTP Telnet SQLNet Other VPN User with firewall
Anti-virus - Multi-tier Approach Firewall Groupware Servers Database Servers File Servers Customers Partners Branch Office Wireless   Device Web Server Telecommuters Modems AV AV AV AV AV AV AV AV AV AV AV
Virus Evolution Mass Mailer Viruses (LoveLetter/Melissa) Remote Control Trojan (NetBus) Polymorphic Viruses (Tequila) PDA Virus (Palm Liberty) Macro Viruses Source: Symantec Number of Known Viruses
Virus Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],r
Symantec Multi-tier Virus Protection Gateway/ Firewall Gateways: Solaris Win NT/2000 Firewalls: Solaris Win NT/2000 Server Win NT/2000 NetWare MS Exchange Lotus Notes AIX OS/390 OS/400 OS/2 Desktop Win9x/NT/2000/WinME DOS/Win16 OS/2 Macintosh
Digital Immune System – Automated Response Bloodhound Heuristics ,[object Object],[object Object],[object Object],Central Quarantine ,[object Object],[object Object],[object Object],[object Object],[object Object],Immune System Gateways ,[object Object],[object Object],[object Object],Symantec AntiVirus  Response Automation ,[object Object],[object Object],[object Object],Symantec Security Response ,[object Object],[object Object],[object Object],[object Object]
Symantec AntiVirus Scan Engine 3.0 ,[object Object]
Symantec AntiVirus Scan Engine 3.0 ,[object Object]
Symantec AntiVirus Scan Engine 3.0 ,[object Object]
Symantec AntiVirus Scan Engine 3.0 ,[object Object]
Symantec AntiVirus Scan Engine 3.0 ,[object Object]
Symantec AntiVirus Scan Engine 3.0 ,[object Object]
Symantec AntiVirus Scan Engine 3.0 ,[object Object]
Symantec AntiVirus Scan Engine 3.0 ,[object Object]
Symantec AntiVirus Scan Engine 3.0 ,[object Object]
Symantec AntiVirus Scan Engine 3.0 ,[object Object]
Symantec AntiVirus Scan Engine 3.0 ,[object Object]
Symantec AntiVirus Scan Engine 3.0 ,[object Object]
Content Filtering - Block unwanted content Firewall CF E-mail servers Groupware Servers Database Servers File Servers Customers Partners Branch Office Wireless   Device Web Server Telecommuters Modems
Detect Intruders Firewall Groupware Servers Database Servers File Servers Customers Partners Branch Office Wireless   Device Web Server Telecommuters Modems Hacker IDS
Definitions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Inspecting the Locks Alarm System
Definitions ,[object Object],[object Object],[object Object],[object Object],[object Object],Alarm System
Why Intrusion Detection? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Consider These Questions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Intrusion Detection offers
Network IDS Complements Firewalls ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object], 
Layered Security - Reduces Network Risk
Login screen or Trojan Horse? G. Mark Hardy
Surprise! G. Mark Hardy
Intruder Alert - Warning!!! NT Logon Replaced
Host vs. Network IDS  You Need Both!
Network and Host IDS Partnership Network IDS Host IDS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Internet
IDS Strengths ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IDS Limitations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why Traditional Network IDS Products Fall Short ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Backplane options including 4 GigE or 10 10/100Mbps interfaces Behaviour based-IDS Deployment (Symantec ManHunt)
ManHunt Data Flow
Deception based-IDS Deployment (Symantec ManTrap)
Deep Deception Deployment
Web Access Management Firewall E-mail servers Groupware Servers Database Servers File Servers Customers Partners Branch Office Wireless   Device Web Server Telecommuters Modems
Traditional Web Access Management Auth. DB DB Auth. DB DB Secure (Trusted) Network Service Network (DMZ) Web Users & Internet Firewall Web Servers & Content Application Servers Application Servers Hacker
Secure Web Access Management Proxy Server NT Auth  Agent Authentication Mechanism(s) Secure (Trusted) Network Service Network (DMZ) Web Users & Internet Firewall LDAPAuth  Agent Other Auth  Agents Central Management Server Web Servers & Content PKI Auth  Agent
Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Public Key Infrastructure (PKI) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PKI Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PKI Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Security Management Anti-Virus Firewall Content Filtering Vulnerability Management Web Access Management Intrusion Detection Web Gateways Mail Gateways Mail Servers File Servers Remote Users Desktops Policy Management Security Management Console Incident Management Logging Reporting Alerting Updates
How to implement in our system?
Client Server Gateway Current State of the Security Market: Multi-Tier;  Multi-Vendor
New Category – Integrated Security Client Server Gateway ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Gaining the edge
Step 1: Building a Security Policy Mandate to implement security Standard to measure security Basis for all security technology and procedures Policy Standards Procedures, Guidelines  & Practices Corporate Security Policy
Build your own security policy ? FFIEC – 12 CFR 364 COPPA FDA C6 HIPAA GLBA EUDPD Government Regulations HIPAA Security & Privacy Rule OCC OTS FFIEC FDIC FRB NCUA SEC – 17 CFR 248 FTC – 16 CFR 313 HIPAA still in progress CC BITS TSSIT Policy Standards Procedures, Guidelines  & Practices
Step 2: Implement Security Policy Corporate Security Policy Physical Security Logical Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implementing Logical Security Corporate Security Policy Logical Security Guidelines/ Standards Compliance Checking Bring Systems into Compliance 1 2 3 4 5 6
Certification and/or Attestation BS7799 SAS70 Safe Harbor SysTrust WebTrust ISO17799 Compliance Checking Bring Systems into Compliance HIPAA Security
ESM assess and comply  Actual Environment ESM COMPLIANCE Policy Standards Procedures, Guidelines  & Practices
How to Stop an Integrated Threat Internet Nimda Worm Example Workstation Anti Virus Blocks known viruses & worms Scan and inspect all SMTP, HTTP and FTP Detects worm infection Repairs infected files Firewalls Full inspection FW to block all non-RFC compliant traffic Full inspection FW to block outbound server initiated traffic Full isnpection FW to block specific exploits  & logs activity Intrusion Detection Detects directory traversal exploit traffic Detects probing ,  specific intrusions  & DOS attacks Logs can identify systems compromised Take action – block traffic Vulnerability Management Server software to: Identify patches not installed Identify weak security settings Identify unneeded services running Workstation Via Email File Server Workstation Mail Server Web Server Via Web Page Web Server Mail Gateway
Multiple Defenses Work The Best Internet Nimda Worm Example Workstation Anti Virus Firewalls Intrusion Detection Vulnerability Management Workstation Via Email File Server Workstation Mail Server Web Server Via Web Page Web Server Mail Gateway
Typical Perimeter Threats Internet Probing Back-door attacks DOS attacks IP spoofing attacks Theft, Sabotage Web defacement Macro Virus (WM32) Mobile Code (Melissa) Block specific exploits Direct & inspect traffic AV on gw, servers, ws Block known exploits via SMTP protocol Detect & clean files Network IDS Detect attacks Alert / Log Workstation Via Email File Server Workstation Mail Server Firewall Hacker Cracker Web Server Mail Gateway
Changing the Game: Next –  Vertical Integration  of Network Tiers Security  Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Common  Management Incident Management  Policy Management Security  Management
Symantec Security Management System Client ,[object Object],[object Object],[object Object],[object Object],[object Object],Gateway ,[object Object],[object Object],[object Object],[object Object],[object Object],Server ,[object Object],[object Object],[object Object],[object Object],[object Object],Security  Applications Security  Management Event Management Configuration Management Incident Management Third Party Collectors Third Party Relays
Symantec Security Management System ,[object Object],[object Object]
Customer case studies
 
Symantec is winning at the Gateway!
User SMTP server 1. User sends file to  HTML-based  e-mail system CarrierScan Servers 3. CSS scans file  and finds and cleans virus. Successful Story: CarrierScan Server in Yahoo Environment 5. CGI forwards e-mail to SMTP server Web Server CGI script sends to CSS 2. Passed to  CGI script 4. File returned to web server Note: 1M to 1.2M e-mail send/receive per day
Customer Success Stories
Wrap Up
Wrap-up
Thank you Somyos Udomnilobon [email_address] (662)627-9051
 

More Related Content

What's hot

Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasureEdie II
 
Network defenses
Network defensesNetwork defenses
Network defensesG Prachi
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Defense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningDefense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningeSAT Publishing House
 
Denial of Service Attacks: The Complete Guide
Denial of Service Attacks: The Complete GuideDenial of Service Attacks: The Complete Guide
Denial of Service Attacks: The Complete GuideImperva
 
Attack on computer
Attack on computerAttack on computer
Attack on computerRabail khan
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin BishtNitin Bisht
 
Module 18 (linux hacking)
Module 18 (linux hacking)Module 18 (linux hacking)
Module 18 (linux hacking)Wail Hassan
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9Geoff Pesimo
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
Module 20 (buffer overflows)
Module 20 (buffer overflows)Module 20 (buffer overflows)
Module 20 (buffer overflows)Wail Hassan
 
Chapter 09
Chapter 09Chapter 09
Chapter 09 Google
 
Detection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service AttacksDetection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service Attacksijdmtaiir
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service AttackDhrumil Panchal
 

What's hot (20)

Network security
Network securityNetwork security
Network security
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Network security
Network securityNetwork security
Network security
 
Denail of Service
Denail of ServiceDenail of Service
Denail of Service
 
Defense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningDefense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learning
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
 
Denial of Service Attacks: The Complete Guide
Denial of Service Attacks: The Complete GuideDenial of Service Attacks: The Complete Guide
Denial of Service Attacks: The Complete Guide
 
Security presentation
Security presentationSecurity presentation
Security presentation
 
Attack on computer
Attack on computerAttack on computer
Attack on computer
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
 
Module 18 (linux hacking)
Module 18 (linux hacking)Module 18 (linux hacking)
Module 18 (linux hacking)
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Module 20 (buffer overflows)
Module 20 (buffer overflows)Module 20 (buffer overflows)
Module 20 (buffer overflows)
 
Information security
Information securityInformation security
Information security
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 
Detection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service AttacksDetection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service Attacks
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service Attack
 

Viewers also liked

Microsoft Hyper-V explained
Microsoft Hyper-V explainedMicrosoft Hyper-V explained
Microsoft Hyper-V explainedTTEC
 
Microsoft Hyper V Server 2008
Microsoft Hyper V Server 2008Microsoft Hyper V Server 2008
Microsoft Hyper V Server 2008vncson
 
Para mi papito
Para mi papitoPara mi papito
Para mi papitoDulsmvv
 
Owasp Backend Security Project 1.0beta
Owasp Backend Security Project 1.0betaOwasp Backend Security Project 1.0beta
Owasp Backend Security Project 1.0betaSecurity Date
 
Europa s. XVI [modo de compatibilidad]
Europa s. XVI [modo de compatibilidad]Europa s. XVI [modo de compatibilidad]
Europa s. XVI [modo de compatibilidad]josefermin
 
Power point Laura y Mara
Power point Laura y MaraPower point Laura y Mara
Power point Laura y MaraPresen Pérez
 
Anuario 2013 Reporte Energia
Anuario 2013 Reporte EnergiaAnuario 2013 Reporte Energia
Anuario 2013 Reporte EnergiaReporte Energía
 
E-Portafolio: Nelly Margot Gomez Gallego Grupo 77
E-Portafolio: Nelly Margot Gomez Gallego Grupo 77E-Portafolio: Nelly Margot Gomez Gallego Grupo 77
E-Portafolio: Nelly Margot Gomez Gallego Grupo 77conemago
 
Guia contempopranea 2011
Guia contempopranea 2011Guia contempopranea 2011
Guia contempopranea 2011El Gallo Verde
 
easyGTD - product Info
easyGTD - product InfoeasyGTD - product Info
easyGTD - product InfoOpenSistemas
 
Unidad dos redes joscortes 1
Unidad dos redes joscortes 1Unidad dos redes joscortes 1
Unidad dos redes joscortes 1Josemanuel Cortes
 
استراتيجية شاملة لتطوير وصيانة المدن التاريخية
استراتيجية شاملة لتطوير وصيانة المدن التاريخيةاستراتيجية شاملة لتطوير وصيانة المدن التاريخية
استراتيجية شاملة لتطوير وصيانة المدن التاريخيةfreemadoo
 

Viewers also liked (20)

Kaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand LaunchKaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand Launch
 
Microsoft Hyper-V
Microsoft Hyper-VMicrosoft Hyper-V
Microsoft Hyper-V
 
Microsoft Hyper-V explained
Microsoft Hyper-V explainedMicrosoft Hyper-V explained
Microsoft Hyper-V explained
 
Microsoft Hyper V Server 2008
Microsoft Hyper V Server 2008Microsoft Hyper V Server 2008
Microsoft Hyper V Server 2008
 
Windows server2016 presentation
Windows server2016 presentation Windows server2016 presentation
Windows server2016 presentation
 
Para mi papito
Para mi papitoPara mi papito
Para mi papito
 
Owasp Backend Security Project 1.0beta
Owasp Backend Security Project 1.0betaOwasp Backend Security Project 1.0beta
Owasp Backend Security Project 1.0beta
 
Debate Automóvel e Consumo - Max Gruenig parte 1
Debate Automóvel e Consumo - Max Gruenig parte 1Debate Automóvel e Consumo - Max Gruenig parte 1
Debate Automóvel e Consumo - Max Gruenig parte 1
 
Europa s. XVI [modo de compatibilidad]
Europa s. XVI [modo de compatibilidad]Europa s. XVI [modo de compatibilidad]
Europa s. XVI [modo de compatibilidad]
 
Power point Laura y Mara
Power point Laura y MaraPower point Laura y Mara
Power point Laura y Mara
 
Anuario 2013 Reporte Energia
Anuario 2013 Reporte EnergiaAnuario 2013 Reporte Energia
Anuario 2013 Reporte Energia
 
E-Portafolio: Nelly Margot Gomez Gallego Grupo 77
E-Portafolio: Nelly Margot Gomez Gallego Grupo 77E-Portafolio: Nelly Margot Gomez Gallego Grupo 77
E-Portafolio: Nelly Margot Gomez Gallego Grupo 77
 
Guia contempopranea 2011
Guia contempopranea 2011Guia contempopranea 2011
Guia contempopranea 2011
 
CoSECiVi'15 - Towards real-time procedural scene generation from a truncated ...
CoSECiVi'15 - Towards real-time procedural scene generation from a truncated ...CoSECiVi'15 - Towards real-time procedural scene generation from a truncated ...
CoSECiVi'15 - Towards real-time procedural scene generation from a truncated ...
 
Online Atlas Of Cancer Mortality
Online Atlas Of Cancer MortalityOnline Atlas Of Cancer Mortality
Online Atlas Of Cancer Mortality
 
easyGTD - product Info
easyGTD - product InfoeasyGTD - product Info
easyGTD - product Info
 
Unidad dos redes joscortes 1
Unidad dos redes joscortes 1Unidad dos redes joscortes 1
Unidad dos redes joscortes 1
 
Simulacion de negocios 2016
Simulacion de negocios 2016Simulacion de negocios 2016
Simulacion de negocios 2016
 
Software: ISO 9000
Software: ISO 9000Software: ISO 9000
Software: ISO 9000
 
استراتيجية شاملة لتطوير وصيانة المدن التاريخية
استراتيجية شاملة لتطوير وصيانة المدن التاريخيةاستراتيجية شاملة لتطوير وصيانة المدن التاريخية
استراتيجية شاملة لتطوير وصيانة المدن التاريخية
 

Similar to Securing Business Along Network Intrusions</TITLE

Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64Chema Alonso
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hackingCmano Kar
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008ClubHack
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008ClubHack
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CDamiable_indian
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack MethodologiesGeeks Anonymes
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application SecurityAbdul Wahid
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksInformation Technology
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 

Similar to Securing Business Along Network Intrusions</TITLE (20)

Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
basic knowhow hacking
basic knowhow hackingbasic knowhow hacking
basic knowhow hacking
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
IBPS SO
IBPS SOIBPS SO
IBPS SO
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Basics of IT security
Basics of IT securityBasics of IT security
Basics of IT security
 
Hack the hack
Hack the hackHack the hack
Hack the hack
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
NetWitness
NetWitnessNetWitness
NetWitness
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Securing Business Along Network Intrusions</TITLE

  • 1. Symantec Enterprise Security : Securing your business along network intrusions Somyos Udomnilobon Sales Engineer - Thailand
  • 2.
  • 3.  
  • 4. Symantec Enterprise Security Solution Vulnerability Management Firewall/VPN Intrusion Detection Virus Protection Client Security Managed Security Services Education Services Response and Support Gateway Security Security Infrastructure Management
  • 5.
  • 6. Why security is concern?
  • 7.
  • 8.
  • 9.
  • 10. Why the Security Problem is hard to fix Where’s the sweet spot?
  • 11. The Lifecycle Security Model Key To Success Identify systems and assets on the network and identify critical vulnerability points Define and document an organizational security policy Identify changes to network infrastructure and compliance with policies
  • 12. Strategic Business Risks Regulatory Action Corporate Liability Indirect Costs Loss of Customer Confidence
  • 13.
  • 14. Security Critical to e-Business Success Importance of Security in eBusiness Solution Decision Criteria Source: IDC
  • 15. Source: survey of 538 computer security professionals conducted by the Computer Security Institute (CSI) and the US Federal Bureau of Investigation (FBI) . Soaring Costs and Security Breaches
  • 16. Evolving Security Threats Will Your Perimeter Security Stop Them?
  • 17. Threat Evolution Polymorphic Viruses (Tequila) Blended Threats (Code Red, Nimda) Denial-of-Service (Yahoo!, eBay) Mass Mailer Viruses (Love Letter/Melissa) Zombies Source: Symantec Viruses Network Intrusions 70,000 60,000 50,000 40,000 30,000 20,000 10,000 Number of Known Threats
  • 18. Source: CERT, Carnegie Mellon University http://www.cert.org/stats/ > 99%
  • 19. Average Reported Losses Unauthorized Insider Access Theft of Proprietary Information Outside System Penetration Financial Fraud Sabotage and Denial of Services 2000 CSI/FBI Computer Crime and Security Survey $1.1 M + $1.0 M + $617,000 $536,000 $172,000
  • 20.  
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. Denial of Service Example: LAND Attack Spoofed IP Packet Packet is sent back to itself Again, again, .. Land Unix-Server CRASH
  • 35.
  • 36.
  • 37.  
  • 38. The New “Integrated Threats” Internet Nimda Worm Example Workstation A security threat or attack that uses multiple methods to propagate Nimda $500M + Code Red $2.5B Workstation Via Email File Server Workstation Mail Server Firewall Web Server Via Web Page Web Server Mail Gateway
  • 39. Rapid, Multiple Ways to Spread Internet Nimda Worm Example 1. Worm arrives by email – uses Mime exploit to execute by just reading or previewing file. Infected systems use worm’s own SMTP server to send emails to others. 2. Users visiting compromised Web servers prompted to download infected file containing worm as attachment. Workstation Via Email File Server Workstation Mail Server Firewall Web Server Via Web Page Workstation Web Server Mail Gateway
  • 40. Just “Any” Firewall Won’t Be Effective Internet Nimda Worm Example Workstation 3. Infected systems scan for unpatched IIS servers, then use Unicode Web Traversal exploit to gain control of the target server. Commands/messages embedded creating non-RFC compliant HTTP protocol packets. Create DOS with outbound traffic. 4. Nimda scans for and attacks hard disks with file sharing enabled, creates an open network share and guest account with admin privileges. File Server Mail Server Firewall Web Server Mail Gateway Workstation Via Email Web Server Via Web Page Workstation
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46. Example Blended Threat Incident Blended Threats use worms, email and application vulnerabilities, and network shares to gain control of systems BT BT BT BT BT BT BT BT BT BT BT
  • 47.
  • 48.  
  • 49.  
  • 50.  
  • 51.  
  • 52.  
  • 53.  *
  • 54. Web Site Defacements Source: attrition.org
  • 55. Security requires defense in depth Groupware Servers Database Servers File Servers Telecommuters Modems Hacker Customers Partners Branch Office Wireless Device Web Server Firewall
  • 56. Let’s take a break
  • 57. Securing your business… How to prevent your network against intrusion?
  • 58. Vulnerability Management - Scan Groupware Servers Database Servers File Servers Customers Partners Branch Office Wireless Device Web Server Telecommuters Modems Firewall Probe for Vulnerabilities Probe for Vulnerabilities
  • 59. Vulnerability Management If you know where you are vulnerable and the risk these vulnerabilities pose to your organization, efficient steps can be taken to pro-actively close the vulnerabilities and mitigate the risk to an acceptable level.
  • 61.
  • 62. ESM - Inside In NetRecon – Outside In ESM
  • 63. ESM assess and comply Actual Environment ESM COMPLIANCE Policy Standards Procedures, Guidelines & Practices
  • 64. Firewall - Multi-tier approach Firewall Groupware Servers Database Servers File Servers Customers Partners Branch Office Wireless Device Web Server Telecommuters Modems
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75. Number of vulnerabilities Level of security
  • 76.
  • 77. Deployment Example Desktops Public Web Servers Telecommuters Customers & Partners Servers VelociRaptor Router Corporate Network Partner Web Servers Branch Office Central Administrator Internet
  • 78. VPN - Office-to-office and Client Firewall Groupware Servers Database Servers File Servers Customers Partners Branch Office Wireless Device Web Server Telecommuters Modems
  • 79.
  • 80.
  • 81.
  • 82.
  • 83. VPN Deployment Scenarios Public Servers Symantec Enterprise Firewall Router Symantec Enterprise VPN Public Servers Symantec Enterprise Firewall With VPN Router Internal Network Public Servers Symantec Enterprise Firewall Router Internal Network Symantec Enterprise VPN Internal Network Internet Internet Internet
  • 84. Personal Firewall with Client VPN Web FTP Telnet SQLNet Other Attacker Internal network VPN User without firewall Internet Personal Firewall Web FTP Telnet SQLNet Other VPN User with firewall
  • 85. Anti-virus - Multi-tier Approach Firewall Groupware Servers Database Servers File Servers Customers Partners Branch Office Wireless Device Web Server Telecommuters Modems AV AV AV AV AV AV AV AV AV AV AV
  • 86. Virus Evolution Mass Mailer Viruses (LoveLetter/Melissa) Remote Control Trojan (NetBus) Polymorphic Viruses (Tequila) PDA Virus (Palm Liberty) Macro Viruses Source: Symantec Number of Known Viruses
  • 87.
  • 88. Symantec Multi-tier Virus Protection Gateway/ Firewall Gateways: Solaris Win NT/2000 Firewalls: Solaris Win NT/2000 Server Win NT/2000 NetWare MS Exchange Lotus Notes AIX OS/390 OS/400 OS/2 Desktop Win9x/NT/2000/WinME DOS/Win16 OS/2 Macintosh
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102. Content Filtering - Block unwanted content Firewall CF E-mail servers Groupware Servers Database Servers File Servers Customers Partners Branch Office Wireless Device Web Server Telecommuters Modems
  • 103. Detect Intruders Firewall Groupware Servers Database Servers File Servers Customers Partners Branch Office Wireless Device Web Server Telecommuters Modems Hacker IDS
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110. Layered Security - Reduces Network Risk
  • 111. Login screen or Trojan Horse? G. Mark Hardy
  • 113. Intruder Alert - Warning!!! NT Logon Replaced
  • 114. Host vs. Network IDS You Need Both!
  • 115.
  • 116.
  • 117.
  • 118.
  • 119. Backplane options including 4 GigE or 10 10/100Mbps interfaces Behaviour based-IDS Deployment (Symantec ManHunt)
  • 121. Deception based-IDS Deployment (Symantec ManTrap)
  • 123. Web Access Management Firewall E-mail servers Groupware Servers Database Servers File Servers Customers Partners Branch Office Wireless Device Web Server Telecommuters Modems
  • 124. Traditional Web Access Management Auth. DB DB Auth. DB DB Secure (Trusted) Network Service Network (DMZ) Web Users & Internet Firewall Web Servers & Content Application Servers Application Servers Hacker
  • 125. Secure Web Access Management Proxy Server NT Auth Agent Authentication Mechanism(s) Secure (Trusted) Network Service Network (DMZ) Web Users & Internet Firewall LDAPAuth Agent Other Auth Agents Central Management Server Web Servers & Content PKI Auth Agent
  • 126.
  • 127.
  • 128.
  • 129.
  • 130. Enterprise Security Management Anti-Virus Firewall Content Filtering Vulnerability Management Web Access Management Intrusion Detection Web Gateways Mail Gateways Mail Servers File Servers Remote Users Desktops Policy Management Security Management Console Incident Management Logging Reporting Alerting Updates
  • 131. How to implement in our system?
  • 132. Client Server Gateway Current State of the Security Market: Multi-Tier; Multi-Vendor
  • 133.
  • 134.
  • 135. Step 1: Building a Security Policy Mandate to implement security Standard to measure security Basis for all security technology and procedures Policy Standards Procedures, Guidelines & Practices Corporate Security Policy
  • 136. Build your own security policy ? FFIEC – 12 CFR 364 COPPA FDA C6 HIPAA GLBA EUDPD Government Regulations HIPAA Security & Privacy Rule OCC OTS FFIEC FDIC FRB NCUA SEC – 17 CFR 248 FTC – 16 CFR 313 HIPAA still in progress CC BITS TSSIT Policy Standards Procedures, Guidelines & Practices
  • 137.
  • 138. Implementing Logical Security Corporate Security Policy Logical Security Guidelines/ Standards Compliance Checking Bring Systems into Compliance 1 2 3 4 5 6
  • 139. Certification and/or Attestation BS7799 SAS70 Safe Harbor SysTrust WebTrust ISO17799 Compliance Checking Bring Systems into Compliance HIPAA Security
  • 140. ESM assess and comply Actual Environment ESM COMPLIANCE Policy Standards Procedures, Guidelines & Practices
  • 141. How to Stop an Integrated Threat Internet Nimda Worm Example Workstation Anti Virus Blocks known viruses & worms Scan and inspect all SMTP, HTTP and FTP Detects worm infection Repairs infected files Firewalls Full inspection FW to block all non-RFC compliant traffic Full inspection FW to block outbound server initiated traffic Full isnpection FW to block specific exploits & logs activity Intrusion Detection Detects directory traversal exploit traffic Detects probing , specific intrusions & DOS attacks Logs can identify systems compromised Take action – block traffic Vulnerability Management Server software to: Identify patches not installed Identify weak security settings Identify unneeded services running Workstation Via Email File Server Workstation Mail Server Web Server Via Web Page Web Server Mail Gateway
  • 142. Multiple Defenses Work The Best Internet Nimda Worm Example Workstation Anti Virus Firewalls Intrusion Detection Vulnerability Management Workstation Via Email File Server Workstation Mail Server Web Server Via Web Page Web Server Mail Gateway
  • 143. Typical Perimeter Threats Internet Probing Back-door attacks DOS attacks IP spoofing attacks Theft, Sabotage Web defacement Macro Virus (WM32) Mobile Code (Melissa) Block specific exploits Direct & inspect traffic AV on gw, servers, ws Block known exploits via SMTP protocol Detect & clean files Network IDS Detect attacks Alert / Log Workstation Via Email File Server Workstation Mail Server Firewall Hacker Cracker Web Server Mail Gateway
  • 144.
  • 145.
  • 146.
  • 148.  
  • 149. Symantec is winning at the Gateway!
  • 150. User SMTP server 1. User sends file to HTML-based e-mail system CarrierScan Servers 3. CSS scans file and finds and cleans virus. Successful Story: CarrierScan Server in Yahoo Environment 5. CGI forwards e-mail to SMTP server Web Server CGI script sends to CSS 2. Passed to CGI script 4. File returned to web server Note: 1M to 1.2M e-mail send/receive per day
  • 154. Thank you Somyos Udomnilobon [email_address] (662)627-9051
  • 155.