SlideShare a Scribd company logo
1 of 33
Considerations and Evaluations for IT
Security Policies
Possession is 9/10ths of the Law
Brian Bissett
Senior Member
Institute of Electrical and Electronics Engineers (IEEE)
Bio-IT World 2016
1 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Overview
Data Requirements (Secure and Useful)
Limitations of DiD (Defense in Depth)
Multi-Factor Authentication (MFA)
Entropy
Types of Attacks
Risk
IT Operational Analytics (ITOA)
Summary
2 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Requirements for Useful Data
Available – Data must be available to authorized
users without interference or obstruction
Accurate – Data is free from Errors.
Authentic – Genuine or Original and free from
reproduction, fabrication, or alteration.
Confidential – Protected from Unauthorized Entities
Utility – The Data has Value
3 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Confidentiality
Integrity
Availability
The CIA Triangle
4 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
The Fundamental Problem
Information that is not accessible by a network is of
limited usefulness.
– Metcalfe’s Law: the value of a communications network is
proportional to the square of the number of its users
– Sarnoff's Law: the value of a broadcast network is
proportional to the number of viewers
Information that is accessible by means of a
network can never be guaranteed to be secure.
To have Information that can be utilized effectively
we are forced to operate in a paradigm where trade
offs must be made in usefulness and security.
5 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
OSI Vulnerabilities Up & Down Stack
6 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Common Attacks by Layer
1. Physical – Cutting, Keystroke Logging
2. Data Link – Packet Sniffing, MAC Spoofing, MITM
3. Network – Ping Flood, Port Knocking, IPSec Attack
4. Transport – TCP and UDP Flooding
5. Session – Session Hijacking, L2TP, DNS Poisoning
6. Presentation – SSL MITM, SSL DoS
7. Application – Viruses, Trojans, Ransomware, Data
Theft, Cross Site Scripting, SQL injection, Buffer
Overflow, HTTP DoS, Brute Force (Most Vulnerable)
7 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Defense in Depth (DiD)
Defense in Depth is still necessary but requires
supplementation for effective network security.
Defense in Depth relies on Barriers, and Barriers
do not scale with the enterprise.
SQL injection attacks can compromise an entire
enterprise database without any triggering any
alerts.
Defense in Depth must be supplemented by
Dynamic Protection of Users, Data, and Workloads.
8 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
NetSPA - NETwork Security and
Planning Architecture
Supplements Defense in Depth for Large Enterprises.
1. Vulnerability Scans: list network vulnerabilities and
provide information on individual hosts and open
ports.
2. Vulnerability Databases: describe prerequisites for
and the effects of exploiting vulnerabilities.
3. Firewall Rules: describe how traffic may or may
not flow through a filtering device.
4. Topology Information: how firewalls and hosts
from vulnerability scans are connected together.
9 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Tracers and Tethers (TnT)
Utilizes the strength of user authentication,
encrypted connections, and continuous monitoring
to secure resources. (Especially Cloud Based)
Tracers – trace through gateways and trust zones.
– track contextual information
Tethers
– tethers to provide root of trust guarantees.
– leverage cryptography.
Behavioral Analysis of “Trusted” Insiders.
10 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Example: Tracers and Tethers
11 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Access Attacks
Backdoors – using a known or newly discovered
mechanism to access a system.
Brute Force – Trying every possible combination
of options for a password. (Time Consuming)
Dictionary – Automated guessing of passwords
using individual or groups of known words.
Spoofing – contacting the system as a trusted
host by modifying IP Packets Source Address.
Social Engineering – You trick an idiot who has
access to allow you into the system.
12 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Data Pilfering and Corruption
Sniffer – Program and/or device that can monitor
data over a network. Can be used for legitimate
purposes (network management and troubleshooting)
or nefarious purposes (theft).
– Aircrack-ng
– Kismet
– Wireshark
– Etc.
Man in the Middle (TCP Hijacking) – grab packets
from the network, modify and reinsert them back into
the network.
13 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Multi-Factor Authentication (MFA)
The Most Secure Networks require a three tier
system of Authentication for User Access:
1. Something you know (e.g. a password).
2. Something you have (e.g. a smart card).
3. Something you are (e.g. a fingerprint).
 Very few Enterprises incorporate all 3
Authentication Factors, most utilize 2.
 Refer to NIST Special Publication 800-63-2.
14 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Password Entropy
Entropy is a measure of the uncertainty
associated with a random variable.
WolframAlpha will calculate the Entropy of a
password: http://www.wolframalpha.com/
Entropy of “password” = 36.19 bits (very weak)
Entropy of “P@s$w0Rd” = 51 bits (fair)
Entropy of “H@rd2Gue$sP@s$w0Rd” = 114.8 bits
(very strong)
15 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Increasing Entropy
Within User Control
Length
Randomness
Enterprise Controlled
Character set
Salt - a random number that is associated with a
user and is added to that user's password.
Pepper - single value unique for a site.
16 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Risk Drivers
Add Users
Low Entropy Passwords and Tokens
Open TCP/IP Ports
Add Applications, Services, or Systems.
Add Administrators
Lower levels of Multi-Factor Authentication
Vulnerabilities are Disclosed
New Architectures Increase Attack Surfaces
17 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
User Experience vs. Security
18 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Why Traditional Security is Failing
The BYOD culture and the rise of the Internet of
Things (IoT) means Enterprise IT Departments will
no longer own the devices connected to their
Infrastructure.
In the case of Cloud Services, Administrators may
no longer have control over the Network itself, the
Servers, OS, or Applications being employed by the
end-users.
Enterprise IT systems will constantly be open to
compromise, unable to adequately prevent
advanced target attacks from finding their way into
the infrastructure.
19 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
IDS Intrusion Detection System
Device or Software Application that monitors
Network or System activities for malicious activities
or policy violations.
Network Intrusion Detection Systems (NIDS)
Host Intrusion Detection Systems (HIDS)
Statistical anomaly-based IDS - monitor network
traffic and compare it against an established
baseline.
Signature-based IDS - compare against database of
signatures or attributes from known malicious
threats.
20 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
The Ultimate Nightmare:
Ransomware
21 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Ransomware Overview
Malware that encrypts all your files and then
extorts money to unlock them.
Infection via Social Engineering using Email
attachments or Webpage Executables.
Not Self-Replicating, cannot spread across
network on its own.
– But it WILL encrypt every file it can access on your
network. Every accessible network file and even Cloud
storage is vulnerable.
Common Variants: CryptoLocker, CryptoWall.
Encryption is too strong to break.
22 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Ransomware Infection
The Ransomware Infection can be removed from
the machine easily enough but . . . .
The files will remain encrypted until unencrypted
with a key.
Once infected only two options:
1. Pay the Ransom and hope you get sent a key.
2. Wipe the Drive and Recover from a Backup.
Most Users Opt for Option Number 2.
Usually when the Ransom is paid, a key is sent.
23 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Protecting from Ransomware
Best Protection: The Virtual Sandbox, products
like Sandboxie.
Sandboxes are virtual environments running a
duplicate of your OS and files.
If Ransomware executes on a Sandbox, it is
deleted with the Sandbox.
HitmanPro will catch and neutralize Ransomware
before it can encrypt your files.
Firewall blocking has shown limited success.
24 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Firewall Blocks to Stop Ransomware
Ransomware must contact a live command and
control server (C&C) to generate keys for encryption.
Only allow outbound traffic on ports used.
Do not allow direct links to IP addresses lacking a
DNS.
Block known-malicious Tor IP addresses.
Employ a Malicious Traffic Detection (MTD)
Mechanism.
25 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Ransomware the $$$ Cost
CryptoWall in 2015: 406,887 infections, $325M.
– Includes Indirect Costs. Lost Revenue, Down Time,
Recovery Time.
CryptoLocker attacks Doubled in 2015.
– More than 50,000 Corporate Machine Infections.
Kyrus Technologies reverse engineered
CryptoLocker. Infected Users can Obtain Keys
here: decryptcryptolocker.com
Many Variants Remain Unbroken.
29 Federal Agencies reported 321 Ransomware
Infections to DHS in just 9 months.
26 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
ITOA - IT Operations Analytics
A form of real-time advanced analytics that harness
and process vast volumes of highly diverse data
from applications and endpoints across an
organization’s IT infrastructure.
Advanced targeted attacks are set to render such
prevention-centric security strategies obsolete over
the next five to six years. – Gartner
ITOA can detect sophisticated threats by
recognizing anomalies in the behavior of users and
devices, and identifying deviations from normal
behavior as being potentially malicious activity.
27 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Internet of Things (IoT)
Problem: IoT solutions are being deployed and
retrofitted with security after the fact.
IoT opens up the number of networks one could
access quite dramatically.
Derbycon Security Conference found "thousands" of
medical devices that were vulnerable to remote
attacks via the public internet.
Def Con 23 Hacking Conference: researchers at
Protiviti discussed over 20 vulnerabilities uncovered
in medical devices and support systems.
28 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
IoT: Some of Today’s Threats
Hospira Drug pumps contain security flaws that
could allow hackers to give patients a deadly
overdose.
Doctors disabled the wireless features on Vice
President Dick Cheney's heart pump.
U.S. (GAO): Boeing 787 Dreamliner, Airbus A350,
and Airbus A380 are all at risk of hacking, because
cockpits use the same Wi-Fi network as passengers.
Samsung revealed that the mics built into its smart
TVs were continuously recording and transmitting
data to the company.
29 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Cloud Computing
Cloud computing changes the equation of
responsibility for information security.
Any business that holds information about its
customers is the “controller” of that data under the
Data Protection Directive (DPD).
If personal data is stored in a cloud, it remains the
responsibility of the controller.
The controller cannot offload its data protection
responsibilities just by putting data into the cloud.
30 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Cloud Computing Security Models
Software as a Service (SaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
Colocation
– Colocation is your hardware in someone else’s Data Center.
– Only Real Estate and Utilities are Outsourced.
– Colocation was the first “Cloud” service.
31 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Summary
Usefulness vs. Security Paradigm is here to stay.
DiD offers limited protection.
Risk increases with Utility.
The rise in advanced persistent threats (APTs)
requires ITOA to detect nefarious activity.
The diversity of appliances being connected to the
Internet is opening more security holes than
conventional strategies are capable of dealing with.
32 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
Selected Publications
Automated Data Analysis with Excel
– Softcover: 442 Pages
– Chapman & Hall (June 2007)
– Second Edition Coming in 2016/2017
– ISBN: 1-58488-885-7
Practical Pharmaceutical Laboratory
Automation
– Hardcover: 464 pages
– Publisher: CRC Press (May 2003)
– ISBN: 0849318149
33 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org

More Related Content

What's hot

ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
 
Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorFarook Al-Jibouri
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...IJCSIS Research Publications
 
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...CODE BLUE
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEWSylvain Martinez
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeAPNIC
 
Top 10 Security Challenges
Top 10 Security ChallengesTop 10 Security Challenges
Top 10 Security ChallengesJorge Sebastiao
 
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsGerry Elman
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsIBM Security
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromiseCMR WORLD TECH
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistMatthew Rosenquist
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsCognizant
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security LandscapeArrow ECS UK
 
Data Sheet_What Darktrace Finds
Data Sheet_What Darktrace FindsData Sheet_What Darktrace Finds
Data Sheet_What Darktrace FindsMelissa Lim
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...Internetwork Engineering (IE)
 

What's hot (20)

ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial Sector
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
 
Top 10 Security Challenges
Top 10 Security ChallengesTop 10 Security Challenges
Top 10 Security Challenges
 
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of Things
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
U S Embassy Event - Today’S Cyber Threats
U S  Embassy  Event - Today’S  Cyber  ThreatsU S  Embassy  Event - Today’S  Cyber  Threats
U S Embassy Event - Today’S Cyber Threats
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security Landscape
 
Data Sheet_What Darktrace Finds
Data Sheet_What Darktrace FindsData Sheet_What Darktrace Finds
Data Sheet_What Darktrace Finds
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
 

Viewers also liked

Viewers also liked (14)

Precious Chipote. CV. -1
Precious Chipote. CV. -1Precious Chipote. CV. -1
Precious Chipote. CV. -1
 
USDAO Rome photo montage
USDAO Rome photo montageUSDAO Rome photo montage
USDAO Rome photo montage
 
200 google signals for seo
200 google signals for seo200 google signals for seo
200 google signals for seo
 
Все об обучении за рубежом, №2. Май, 2010
Все об обучении за рубежом, №2. Май, 2010Все об обучении за рубежом, №2. Май, 2010
Все об обучении за рубежом, №2. Май, 2010
 
Uncountable nouns
Uncountable nounsUncountable nouns
Uncountable nouns
 
Business Presentation_TX.20150505041844
Business Presentation_TX.20150505041844Business Presentation_TX.20150505041844
Business Presentation_TX.20150505041844
 
Unleashing Innovation at the Naval Postgraduate School
Unleashing Innovation at the Naval Postgraduate SchoolUnleashing Innovation at the Naval Postgraduate School
Unleashing Innovation at the Naval Postgraduate School
 
terrorismo en el peru
terrorismo en el peruterrorismo en el peru
terrorismo en el peru
 
アイデアのつくり方
アイデアのつくり方アイデアのつくり方
アイデアのつくり方
 
Porty i terminale
Porty i terminalePorty i terminale
Porty i terminale
 
Adverbs
AdverbsAdverbs
Adverbs
 
Dook Travels profile
Dook Travels profileDook Travels profile
Dook Travels profile
 
Manajemen produksi dan pemasaran fix
Manajemen produksi dan pemasaran   fixManajemen produksi dan pemasaran   fix
Manajemen produksi dan pemasaran fix
 
Manual clonezilla
Manual clonezillaManual clonezilla
Manual clonezilla
 

Similar to IT Security Strategies for the BYOD Era

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDebra Baker, CISSP CSSP
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
Big data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursBig data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursDilum Bandara
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdfonline Marketing
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdfBelayet Hossain
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustrySeqrite
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docxalinainglis
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cloudflare
 

Similar to IT Security Strategies for the BYOD Era (20)

ENSA_Module_3.pptx
ENSA_Module_3.pptxENSA_Module_3.pptx
ENSA_Module_3.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Big data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursBig data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is Yours
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
 
INT 1010 06-6.pdf
INT 1010 06-6.pdfINT 1010 06-6.pdf
INT 1010 06-6.pdf
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 

More from Brian Bissett

Automating Data Analysis with Excel Bio-IT World 2018
Automating Data Analysis with Excel Bio-IT World 2018Automating Data Analysis with Excel Bio-IT World 2018
Automating Data Analysis with Excel Bio-IT World 2018Brian Bissett
 
Deaths by Shooting in Baltimore before and after the Firearms Safety Act of 2...
Deaths by Shooting in Baltimore before and after the Firearms Safety Act of 2...Deaths by Shooting in Baltimore before and after the Firearms Safety Act of 2...
Deaths by Shooting in Baltimore before and after the Firearms Safety Act of 2...Brian Bissett
 
Bio-IT 2017 Automation
Bio-IT 2017 AutomationBio-IT 2017 Automation
Bio-IT 2017 AutomationBrian Bissett
 
Lies, Damn Lies, and Big Data
Lies, Damn Lies, and Big DataLies, Damn Lies, and Big Data
Lies, Damn Lies, and Big DataBrian Bissett
 
Program Management of SSA's Data Center OMB 300 Program
Program Management of SSA's Data Center OMB 300 ProgramProgram Management of SSA's Data Center OMB 300 Program
Program Management of SSA's Data Center OMB 300 ProgramBrian Bissett
 
Data Analytics of Strategic Information Technology Asset Reviews
Data Analytics of Strategic Information Technology Asset ReviewsData Analytics of Strategic Information Technology Asset Reviews
Data Analytics of Strategic Information Technology Asset ReviewsBrian Bissett
 
ElogDoct: A Tool for Lipophilicity Determination in Drug Discovery. 2. Basic ...
ElogDoct: A Tool for Lipophilicity Determination in Drug Discovery. 2. Basic ...ElogDoct: A Tool for Lipophilicity Determination in Drug Discovery. 2. Basic ...
ElogDoct: A Tool for Lipophilicity Determination in Drug Discovery. 2. Basic ...Brian Bissett
 
ElogPoct: A Tool for Lipophilicity Determination in Drug Discovery
ElogPoct: A Tool for Lipophilicity Determination in Drug DiscoveryElogPoct: A Tool for Lipophilicity Determination in Drug Discovery
ElogPoct: A Tool for Lipophilicity Determination in Drug DiscoveryBrian Bissett
 
Automating pKa Curve Fitting Using Origin
Automating pKa Curve Fitting Using OriginAutomating pKa Curve Fitting Using Origin
Automating pKa Curve Fitting Using OriginBrian Bissett
 
Physicochemical Profiling In Drug Research
Physicochemical Profiling In Drug ResearchPhysicochemical Profiling In Drug Research
Physicochemical Profiling In Drug ResearchBrian Bissett
 
Addressable Location Indicator Apparatus and Method
Addressable Location Indicator Apparatus and MethodAddressable Location Indicator Apparatus and Method
Addressable Location Indicator Apparatus and MethodBrian Bissett
 
Automated Kinetic Solubility Assay Apparatus and Method
Automated Kinetic Solubility Assay Apparatus and MethodAutomated Kinetic Solubility Assay Apparatus and Method
Automated Kinetic Solubility Assay Apparatus and MethodBrian Bissett
 
Multivariate Analysis Of Energy Policy Options Using Lindo
Multivariate Analysis Of Energy Policy Options Using LindoMultivariate Analysis Of Energy Policy Options Using Lindo
Multivariate Analysis Of Energy Policy Options Using LindoBrian Bissett
 
Bio-IT World 2009: Adjusting Information Flow from In-house HTS to Global Out...
Bio-IT World 2009: Adjusting Information Flow from In-house HTS to Global Out...Bio-IT World 2009: Adjusting Information Flow from In-house HTS to Global Out...
Bio-IT World 2009: Adjusting Information Flow from In-house HTS to Global Out...Brian Bissett
 
Advanced Excel Technologies In Early Development Applications
Advanced Excel Technologies In Early Development ApplicationsAdvanced Excel Technologies In Early Development Applications
Advanced Excel Technologies In Early Development ApplicationsBrian Bissett
 
Development of Pfizer's Third Generation Turbidimetric Solubility Assay - An ...
Development of Pfizer's Third Generation Turbidimetric Solubility Assay - An ...Development of Pfizer's Third Generation Turbidimetric Solubility Assay - An ...
Development of Pfizer's Third Generation Turbidimetric Solubility Assay - An ...Brian Bissett
 
Bridging Pharma And IT 2008
Bridging Pharma And IT 2008Bridging Pharma And IT 2008
Bridging Pharma And IT 2008Brian Bissett
 

More from Brian Bissett (18)

IT Security Metrics
IT Security MetricsIT Security Metrics
IT Security Metrics
 
Automating Data Analysis with Excel Bio-IT World 2018
Automating Data Analysis with Excel Bio-IT World 2018Automating Data Analysis with Excel Bio-IT World 2018
Automating Data Analysis with Excel Bio-IT World 2018
 
Deaths by Shooting in Baltimore before and after the Firearms Safety Act of 2...
Deaths by Shooting in Baltimore before and after the Firearms Safety Act of 2...Deaths by Shooting in Baltimore before and after the Firearms Safety Act of 2...
Deaths by Shooting in Baltimore before and after the Firearms Safety Act of 2...
 
Bio-IT 2017 Automation
Bio-IT 2017 AutomationBio-IT 2017 Automation
Bio-IT 2017 Automation
 
Lies, Damn Lies, and Big Data
Lies, Damn Lies, and Big DataLies, Damn Lies, and Big Data
Lies, Damn Lies, and Big Data
 
Program Management of SSA's Data Center OMB 300 Program
Program Management of SSA's Data Center OMB 300 ProgramProgram Management of SSA's Data Center OMB 300 Program
Program Management of SSA's Data Center OMB 300 Program
 
Data Analytics of Strategic Information Technology Asset Reviews
Data Analytics of Strategic Information Technology Asset ReviewsData Analytics of Strategic Information Technology Asset Reviews
Data Analytics of Strategic Information Technology Asset Reviews
 
ElogDoct: A Tool for Lipophilicity Determination in Drug Discovery. 2. Basic ...
ElogDoct: A Tool for Lipophilicity Determination in Drug Discovery. 2. Basic ...ElogDoct: A Tool for Lipophilicity Determination in Drug Discovery. 2. Basic ...
ElogDoct: A Tool for Lipophilicity Determination in Drug Discovery. 2. Basic ...
 
ElogPoct: A Tool for Lipophilicity Determination in Drug Discovery
ElogPoct: A Tool for Lipophilicity Determination in Drug DiscoveryElogPoct: A Tool for Lipophilicity Determination in Drug Discovery
ElogPoct: A Tool for Lipophilicity Determination in Drug Discovery
 
Automating pKa Curve Fitting Using Origin
Automating pKa Curve Fitting Using OriginAutomating pKa Curve Fitting Using Origin
Automating pKa Curve Fitting Using Origin
 
Physicochemical Profiling In Drug Research
Physicochemical Profiling In Drug ResearchPhysicochemical Profiling In Drug Research
Physicochemical Profiling In Drug Research
 
Addressable Location Indicator Apparatus and Method
Addressable Location Indicator Apparatus and MethodAddressable Location Indicator Apparatus and Method
Addressable Location Indicator Apparatus and Method
 
Automated Kinetic Solubility Assay Apparatus and Method
Automated Kinetic Solubility Assay Apparatus and MethodAutomated Kinetic Solubility Assay Apparatus and Method
Automated Kinetic Solubility Assay Apparatus and Method
 
Multivariate Analysis Of Energy Policy Options Using Lindo
Multivariate Analysis Of Energy Policy Options Using LindoMultivariate Analysis Of Energy Policy Options Using Lindo
Multivariate Analysis Of Energy Policy Options Using Lindo
 
Bio-IT World 2009: Adjusting Information Flow from In-house HTS to Global Out...
Bio-IT World 2009: Adjusting Information Flow from In-house HTS to Global Out...Bio-IT World 2009: Adjusting Information Flow from In-house HTS to Global Out...
Bio-IT World 2009: Adjusting Information Flow from In-house HTS to Global Out...
 
Advanced Excel Technologies In Early Development Applications
Advanced Excel Technologies In Early Development ApplicationsAdvanced Excel Technologies In Early Development Applications
Advanced Excel Technologies In Early Development Applications
 
Development of Pfizer's Third Generation Turbidimetric Solubility Assay - An ...
Development of Pfizer's Third Generation Turbidimetric Solubility Assay - An ...Development of Pfizer's Third Generation Turbidimetric Solubility Assay - An ...
Development of Pfizer's Third Generation Turbidimetric Solubility Assay - An ...
 
Bridging Pharma And IT 2008
Bridging Pharma And IT 2008Bridging Pharma And IT 2008
Bridging Pharma And IT 2008
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

IT Security Strategies for the BYOD Era

  • 1. Considerations and Evaluations for IT Security Policies Possession is 9/10ths of the Law Brian Bissett Senior Member Institute of Electrical and Electronics Engineers (IEEE) Bio-IT World 2016 1 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 2. Overview Data Requirements (Secure and Useful) Limitations of DiD (Defense in Depth) Multi-Factor Authentication (MFA) Entropy Types of Attacks Risk IT Operational Analytics (ITOA) Summary 2 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 3. Requirements for Useful Data Available – Data must be available to authorized users without interference or obstruction Accurate – Data is free from Errors. Authentic – Genuine or Original and free from reproduction, fabrication, or alteration. Confidential – Protected from Unauthorized Entities Utility – The Data has Value 3 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 4. Confidentiality Integrity Availability The CIA Triangle 4 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 5. The Fundamental Problem Information that is not accessible by a network is of limited usefulness. – Metcalfe’s Law: the value of a communications network is proportional to the square of the number of its users – Sarnoff's Law: the value of a broadcast network is proportional to the number of viewers Information that is accessible by means of a network can never be guaranteed to be secure. To have Information that can be utilized effectively we are forced to operate in a paradigm where trade offs must be made in usefulness and security. 5 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 6. OSI Vulnerabilities Up & Down Stack 6 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 7. Common Attacks by Layer 1. Physical – Cutting, Keystroke Logging 2. Data Link – Packet Sniffing, MAC Spoofing, MITM 3. Network – Ping Flood, Port Knocking, IPSec Attack 4. Transport – TCP and UDP Flooding 5. Session – Session Hijacking, L2TP, DNS Poisoning 6. Presentation – SSL MITM, SSL DoS 7. Application – Viruses, Trojans, Ransomware, Data Theft, Cross Site Scripting, SQL injection, Buffer Overflow, HTTP DoS, Brute Force (Most Vulnerable) 7 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 8. Defense in Depth (DiD) Defense in Depth is still necessary but requires supplementation for effective network security. Defense in Depth relies on Barriers, and Barriers do not scale with the enterprise. SQL injection attacks can compromise an entire enterprise database without any triggering any alerts. Defense in Depth must be supplemented by Dynamic Protection of Users, Data, and Workloads. 8 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 9. NetSPA - NETwork Security and Planning Architecture Supplements Defense in Depth for Large Enterprises. 1. Vulnerability Scans: list network vulnerabilities and provide information on individual hosts and open ports. 2. Vulnerability Databases: describe prerequisites for and the effects of exploiting vulnerabilities. 3. Firewall Rules: describe how traffic may or may not flow through a filtering device. 4. Topology Information: how firewalls and hosts from vulnerability scans are connected together. 9 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 10. Tracers and Tethers (TnT) Utilizes the strength of user authentication, encrypted connections, and continuous monitoring to secure resources. (Especially Cloud Based) Tracers – trace through gateways and trust zones. – track contextual information Tethers – tethers to provide root of trust guarantees. – leverage cryptography. Behavioral Analysis of “Trusted” Insiders. 10 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 11. Example: Tracers and Tethers 11 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 12. Access Attacks Backdoors – using a known or newly discovered mechanism to access a system. Brute Force – Trying every possible combination of options for a password. (Time Consuming) Dictionary – Automated guessing of passwords using individual or groups of known words. Spoofing – contacting the system as a trusted host by modifying IP Packets Source Address. Social Engineering – You trick an idiot who has access to allow you into the system. 12 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 13. Data Pilfering and Corruption Sniffer – Program and/or device that can monitor data over a network. Can be used for legitimate purposes (network management and troubleshooting) or nefarious purposes (theft). – Aircrack-ng – Kismet – Wireshark – Etc. Man in the Middle (TCP Hijacking) – grab packets from the network, modify and reinsert them back into the network. 13 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 14. Multi-Factor Authentication (MFA) The Most Secure Networks require a three tier system of Authentication for User Access: 1. Something you know (e.g. a password). 2. Something you have (e.g. a smart card). 3. Something you are (e.g. a fingerprint).  Very few Enterprises incorporate all 3 Authentication Factors, most utilize 2.  Refer to NIST Special Publication 800-63-2. 14 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 15. Password Entropy Entropy is a measure of the uncertainty associated with a random variable. WolframAlpha will calculate the Entropy of a password: http://www.wolframalpha.com/ Entropy of “password” = 36.19 bits (very weak) Entropy of “P@s$w0Rd” = 51 bits (fair) Entropy of “H@rd2Gue$sP@s$w0Rd” = 114.8 bits (very strong) 15 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 16. Increasing Entropy Within User Control Length Randomness Enterprise Controlled Character set Salt - a random number that is associated with a user and is added to that user's password. Pepper - single value unique for a site. 16 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 17. Risk Drivers Add Users Low Entropy Passwords and Tokens Open TCP/IP Ports Add Applications, Services, or Systems. Add Administrators Lower levels of Multi-Factor Authentication Vulnerabilities are Disclosed New Architectures Increase Attack Surfaces 17 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 18. User Experience vs. Security 18 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 19. Why Traditional Security is Failing The BYOD culture and the rise of the Internet of Things (IoT) means Enterprise IT Departments will no longer own the devices connected to their Infrastructure. In the case of Cloud Services, Administrators may no longer have control over the Network itself, the Servers, OS, or Applications being employed by the end-users. Enterprise IT systems will constantly be open to compromise, unable to adequately prevent advanced target attacks from finding their way into the infrastructure. 19 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 20. IDS Intrusion Detection System Device or Software Application that monitors Network or System activities for malicious activities or policy violations. Network Intrusion Detection Systems (NIDS) Host Intrusion Detection Systems (HIDS) Statistical anomaly-based IDS - monitor network traffic and compare it against an established baseline. Signature-based IDS - compare against database of signatures or attributes from known malicious threats. 20 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 21. The Ultimate Nightmare: Ransomware 21 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 22. Ransomware Overview Malware that encrypts all your files and then extorts money to unlock them. Infection via Social Engineering using Email attachments or Webpage Executables. Not Self-Replicating, cannot spread across network on its own. – But it WILL encrypt every file it can access on your network. Every accessible network file and even Cloud storage is vulnerable. Common Variants: CryptoLocker, CryptoWall. Encryption is too strong to break. 22 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 23. Ransomware Infection The Ransomware Infection can be removed from the machine easily enough but . . . . The files will remain encrypted until unencrypted with a key. Once infected only two options: 1. Pay the Ransom and hope you get sent a key. 2. Wipe the Drive and Recover from a Backup. Most Users Opt for Option Number 2. Usually when the Ransom is paid, a key is sent. 23 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 24. Protecting from Ransomware Best Protection: The Virtual Sandbox, products like Sandboxie. Sandboxes are virtual environments running a duplicate of your OS and files. If Ransomware executes on a Sandbox, it is deleted with the Sandbox. HitmanPro will catch and neutralize Ransomware before it can encrypt your files. Firewall blocking has shown limited success. 24 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 25. Firewall Blocks to Stop Ransomware Ransomware must contact a live command and control server (C&C) to generate keys for encryption. Only allow outbound traffic on ports used. Do not allow direct links to IP addresses lacking a DNS. Block known-malicious Tor IP addresses. Employ a Malicious Traffic Detection (MTD) Mechanism. 25 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 26. Ransomware the $$$ Cost CryptoWall in 2015: 406,887 infections, $325M. – Includes Indirect Costs. Lost Revenue, Down Time, Recovery Time. CryptoLocker attacks Doubled in 2015. – More than 50,000 Corporate Machine Infections. Kyrus Technologies reverse engineered CryptoLocker. Infected Users can Obtain Keys here: decryptcryptolocker.com Many Variants Remain Unbroken. 29 Federal Agencies reported 321 Ransomware Infections to DHS in just 9 months. 26 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 27. ITOA - IT Operations Analytics A form of real-time advanced analytics that harness and process vast volumes of highly diverse data from applications and endpoints across an organization’s IT infrastructure. Advanced targeted attacks are set to render such prevention-centric security strategies obsolete over the next five to six years. – Gartner ITOA can detect sophisticated threats by recognizing anomalies in the behavior of users and devices, and identifying deviations from normal behavior as being potentially malicious activity. 27 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 28. Internet of Things (IoT) Problem: IoT solutions are being deployed and retrofitted with security after the fact. IoT opens up the number of networks one could access quite dramatically. Derbycon Security Conference found "thousands" of medical devices that were vulnerable to remote attacks via the public internet. Def Con 23 Hacking Conference: researchers at Protiviti discussed over 20 vulnerabilities uncovered in medical devices and support systems. 28 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 29. IoT: Some of Today’s Threats Hospira Drug pumps contain security flaws that could allow hackers to give patients a deadly overdose. Doctors disabled the wireless features on Vice President Dick Cheney's heart pump. U.S. (GAO): Boeing 787 Dreamliner, Airbus A350, and Airbus A380 are all at risk of hacking, because cockpits use the same Wi-Fi network as passengers. Samsung revealed that the mics built into its smart TVs were continuously recording and transmitting data to the company. 29 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 30. Cloud Computing Cloud computing changes the equation of responsibility for information security. Any business that holds information about its customers is the “controller” of that data under the Data Protection Directive (DPD). If personal data is stored in a cloud, it remains the responsibility of the controller. The controller cannot offload its data protection responsibilities just by putting data into the cloud. 30 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 31. Cloud Computing Security Models Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Colocation – Colocation is your hardware in someone else’s Data Center. – Only Real Estate and Utilities are Outsourced. – Colocation was the first “Cloud” service. 31 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 32. Summary Usefulness vs. Security Paradigm is here to stay. DiD offers limited protection. Risk increases with Utility. The rise in advanced persistent threats (APTs) requires ITOA to detect nefarious activity. The diversity of appliances being connected to the Internet is opening more security holes than conventional strategies are capable of dealing with. 32 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org
  • 33. Selected Publications Automated Data Analysis with Excel – Softcover: 442 Pages – Chapman & Hall (June 2007) – Second Edition Coming in 2016/2017 – ISBN: 1-58488-885-7 Practical Pharmaceutical Laboratory Automation – Hardcover: 464 pages – Publisher: CRC Press (May 2003) – ISBN: 0849318149 33 BioIT World 2016 © Brian Bissett brian.bissett@ieee.org

Editor's Notes

  1. OSI = Open Source Interconnection (7 Layer Model)
  2. MITM = Man in the Middle, (L2TP) Layer Two Tunneling Protocol
  3. You CAN remove the Ransomware. You WILL NOT be able to unencrypt the files without the key.
  4. Ransoms are paid about 40% of the time.
  5. Medstar Hospital in Baltimore.
  6. (APTs) Advanced Persistent Threat
  7. A prominent hacker (Chris Roberts) was arrested by the FBI after he made a United Airlines Flight “climb” and move “sideways” after infiltrating its in-flight entertainment system.