SlideShare a Scribd company logo
1 of 31
Download to read offline
The Threat Landscape
and
Network Security Measures
Carl B. Forkner
February 1, 2016
2
Table of Contents
• Key Terms
• The Threat Landscape
• Network Security Overview
• Evolving and Future Threats
The Threat Landscape
4
Key Terms – Threat Landscape
• APT. An advanced persistent threat (APT) is a network attack in which an
unauthorized person gains access to a network and stays there undetected
for a long period of time.
• Bot. An Internet bot, also known as web robot, WWW robot or simply bot, is
a software application that runs automated tasks over the Internet.
• Botnet. A botnet is a number of Internet computers that, although their
owners are unaware of it, have been set up to forward transmissions
(including spam or viruses) to other computers on the Internet.
• Drive-by. A drive-by download refers to the unintentional download of a virus
or malicious software (malware) onto your computer or mobile device.
5
Key Terms – Threat Landscape
• Exploit. A piece of software, a segment of data, or command sequences that takes
advantage of a vulnerability.
• IP/PII.
– IP stands for Internet Protocol, or the address commonly used to identify the origin
of an Internet transmission—i.e. your device.
– PII stand for Personally Identifiable Information, sometimes referred to as
“Personal Information,” and is often equated in the U.S. with “Privacy Act
Information.”
• Malvertising. This is the use of online advertising to spread malware.
• Phishing. Phishing is an e-mail fraud method in which the perpetrator sends out
legitimate-looking email in an attempt to gather personal and financial information from
recipients.
6
Key Terms – Threat Landscape
 Malware. Malware is a category of malicious code that includes viruses, worms, and
Trojan horses.
– Virus. A computer virus is a program or piece of code that is loaded onto your
computer without your knowledge and runs against your wishes. Viruses can also
replicate themselves. All computer viruses are man-made.
– Worm. Computer worms are similar to viruses in that they replicate functional
copies of themselves and can cause the same type of damage.
– Trojan. A Trojan [horse] is a program in which malicious or harmful code is
contained inside apparently harmless programming or data in such a way that it
can get control and do its chosen form of damage.
 Vulnerability. In cybersecurity, vulnerability refers to a flaw in a system that can leave
it open to attack.
 Watering Hole. The watering hole attack vector targets specific groups by infecting
frequently visited websites with malware.
7
The Threat Landscape
• The crime:
– Motive, means, & opportunity
• The technology explosion and a dynamic
environment
– The changing face of threat
vectors
8
The Network Security Battle of Minds
Hacker Economy
and Threats
Network Security
Measures
9
Who are the Adversaries?
• Previously
– Attention seekers
– Many independent operators
• New breed of attackers
– Hacktivists
– Profit-driven organizations
– Rival corporations
– Rival political nations
10
Ranking Adversaries
Threat Level
User Error
Users making
Mistakes with
Configurations which
May bring down
Critical resources.
Opportunistic
Hacker
These attackers are
usually script kiddies
driven by notoriety.
Insider Threat
Attackers are typically
disgruntled
employees or
ex-employees.
Hacktivists
Attackers that have a
political agenda to
get awareness to it.
Organized
Crime
Mass attacks driven
by profits.
Government
Sponsored
Targeted attacks and
well funded.
11
What are they after?
• IP
• Credit Cards & Bank info
• PII – Identity Theft
• Shutting down competition
• Being the next Wikileaks
• Pure profit
• Sabotage
12
The Threat Landscape
• Some Major Victims of Network Attacks:
13
The Threat Landscape
• Threat Timeline Fall 2013 – Summer 2014
14
Organizational Hacking is Rewarding
• Education, training, tech support
• Storefront for hacking tools and zero-day exploits/vulnerability information
• Sophisticated organization
• Backed by governments
• Supported by currencies like Bitcoin
• Obscured through anonymous networks like TOR
15
Anatomy of an Attack ‒ The Hacker’s Point of
View
Keep safe  Evade Law Enforcement and defensive measures
Define
target
Sub – Zero
Research
target
Build or
acquire tools
Test tools +
detection
Planning
Obtain
credentials
Strengthen footprint
Initial intrusion
getting in
Outbound
communication
initiated
Exfiltration
data
Initial intrusion
getting out
Survive
16
Hacker Tools
• 2 main categories:
– Social Engineering – The Techniques
– Malware – The Tools
17
The Tactics of Social Engineering
• Spoofing
• Phishing
• Spearphishing
• Watering-hole attacks
• Phone calls/impersonation
• Malvertising
• Social Media links
18
Known Viruses still a threat
• Why are the old threats still working?
– Unpatched systems
– Old OS versions
– AV/AM signatures not up to date
– SMB, small agencies, partnerships lack security spending but still have
network access
19
Kill Chain of an Advanced Attack
Spam
Malicious
Email
Malicious
Web SiteExploit
Malware Command &
Control Center
Bots leverage legitimate IPs to pass
filters. Social engineering fools recipient.
Malicious
Link
Bot Commands
& Stolen Data
Fast flux stays ahead
of web ratings
Zero-days pass IPS
Compression passes
static inspection
Encrypted communication
passes controls
20
What are Advanced Persistent Threats?
• Advanced Persistent Threats (APT):
– Advanced – Using organized methods, advanced malware, buying new
tools constantly developed
– Persistant – Patient. Using more social engineering combined with
malware and codes. Can be very hard to detect, with expectation of
higher payout.
– Threats – Designed to attack deliberate choices of target. Credit Card
info is cheap on the open market. Now it’s about business disruption,
massive identity theft, IP theft, spying.
21
The Advanced Threat Lifecycle -
The Threat
Manufacturing/Recon
- Scan for vulnerabilities
- Design phishing emails
- Customize malware, etc.
Command
& Control
1
4
Threat
Vector
Extraction
- Package
- Encrypt
- Stage
2
3
Communication
- Hide, Disarm
- Spread, Move, Morph
- Dial Home, Update
- Recruit
- Gather targeted data
Infection
….and more
Network Security Measures
23
What is Security Intelligence?
• Security intelligence represents knowledge of the identity,
capabilities, and intentions of adversaries engaged in espionage,
sabotage, or theft online.
– Operational (indicators of compromise)
– Tactical (understanding tools, techniques)
– Strategic (understanding who, their intentions, and capabilities)
24
Key Terms – Security Measures
• Application Control. Protects managed desktops and servers by allowing or denying
network application usage based on policies established by the network administrator.
• ATP. Advanced Threat Protection (ATP) relies on multiple types of security
technologies, products, and research -- each performing a different role, but still
working seamlessly together -- to combat these attacks from network core through the
end user device.
• AV/AM. Anti-virus/Anti-malware (AV/AM) provides protection against virus, spyware,
and other types of malware attacks in web, email, and file transfer traffic.
• IPS. Intrusion Prevention System (IPS) protects networks from threats by blocking
attacks that might otherwise take advantage of network vulnerabilities and unpatched
systems.
25
Key Terms – Security Measures
• NGFW. Next Generation Firewall (NGFW) provides multi-layered capabilities in a
single firewall appliance instead of a basic firewall and numerous add-on appliances.
• Sandboxing. Sandboxing refers to the process of analyzing files in a contained
environment to identify previously unknown threats and uncovering the full attack
lifecycle.
• UTM. Unified Threat Management (UTM) provides administrators the ability to monitor
and manage multiple, complex security-related applications and infrastructure
components through a single management console.
• Web Filtering. Web Filtering technology gives you the option to explicitly allow web
sites, or to pass web traffic uninspected both to and from known-good web sites in
order to accelerate traffic flows.
26
Infrastructure Evolution
• From closed networks to a global information grid
• From governments & corporations to housewives & children
1985 1991 1995 2000 200219991967 200719761970 2004 2013-14
27
The Importance of Network Security
• What is Modern Network Security?
– User-friendly, but threat-unfriendly
– Unique…just like everyone else
– Maintaining balance, relevance, and Unified Threat Management (UTM)
Servers
Users
VPN
IPS
Firewall
AV/AM
Anti-Spam
URL Filters
Legacy Systems UTM
Servers
28
The Advanced Threat Lifecycle –
Breaking the Chain Pt 1
Manufacturing/Recon
- Scan for vulnerabilities
- Design phishing emails
- Customize malware, etc.
Command
& Control
1
4
Threat
Vector
Extraction
- Package
- Encrypt
- Stage
2
3
Communication
- Hide, Disarm
- Spread, Move, Morph
- Dial Home, Update
- Recruit
- Gather targeted data
Infection
29
The Advanced Threat Lifecycle –
Breaking the Chain Pt 2
Manufacturing/Recon
- Scan for vulnerabilities
- Design phishing emails
- Customize malware, etc.
Command
& Control
1
4
Threat
Vector
Extraction
- Package
- Encrypt
- Stage
2
3
Communication
- Hide, Disarm
- Spread, Move, Morph
- Dial Home, Update
- Recruit
- Gather targeted data
Infection
30
Advanced Threats
• Hackers:
– Experience + Resources = Increased Threats
• Advanced Threat Protection
• Advanced Threats & Network Security: Continuing Evolution…
The Threat Landscape
and
Network Security Measures
Carl B. Forkner
February 1, 2016

More Related Content

What's hot

Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMAlienVault
 
Demo how to detect ransomware with alien vault usm_gg
Demo  how to detect ransomware with alien vault usm_ggDemo  how to detect ransomware with alien vault usm_gg
Demo how to detect ransomware with alien vault usm_ggAlienVault
 
The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14Aventis Systems, Inc.
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...Risk Analysis Consultants, s.r.o.
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
How Malware Works
How Malware WorksHow Malware Works
How Malware WorksAlienVault
 
Stop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlStop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlSymantec
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWPICPE
 
Creating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVaultCreating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVaultAlienVault
 
Next Generation Firewalls
Next Generation FirewallsNext Generation Firewalls
Next Generation FirewallsThe eCore Group
 
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USMInsider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USMAlienVault
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsAlienVault
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultAlienVault
 
Malware evolution and Endpoint Detection and Response
Malware evolution and Endpoint Detection and Response Malware evolution and Endpoint Detection and Response
Malware evolution and Endpoint Detection and Response Adrian Guthrie
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...James Anderson
 
Incident response live demo slides final
Incident response live demo slides finalIncident response live demo slides final
Incident response live demo slides finalAlienVault
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentMarcelo Silva
 

What's hot (20)

Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Demo how to detect ransomware with alien vault usm_gg
Demo  how to detect ransomware with alien vault usm_ggDemo  how to detect ransomware with alien vault usm_gg
Demo how to detect ransomware with alien vault usm_gg
 
The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14
 
FireEye
FireEyeFireEye
FireEye
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
How Malware Works
How Malware WorksHow Malware Works
How Malware Works
 
Stop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlStop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device Control
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
Creating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVaultCreating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVault
 
Next Generation Firewalls
Next Generation FirewallsNext Generation Firewalls
Next Generation Firewalls
 
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USMInsider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
 
Malware evolution and Endpoint Detection and Response
Malware evolution and Endpoint Detection and Response Malware evolution and Endpoint Detection and Response
Malware evolution and Endpoint Detection and Response
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
 
Incident response live demo slides final
Incident response live demo slides finalIncident response live demo slides final
Incident response live demo slides final
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability Assessment
 

Similar to The Threat Landscape & Network Security Measures

Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdfZeeshanMajeed15
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxBernad Bear
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9Amanda Case
 
Orientation 28 sep education purpose only.pptx
Orientation 28 sep education purpose only.pptxOrientation 28 sep education purpose only.pptx
Orientation 28 sep education purpose only.pptx230405
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0Q Fadlan
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeAaron White
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for businessDaniel Thomas
 
Lecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfLecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfAsmaaLafi1
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTSimone Onofri
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfssuser4237d4
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfssuser4237d4
 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfANUSREEASHOK5
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 

Similar to The Threat Landscape & Network Security Measures (20)

M1_Introduction_IPS.pptx
M1_Introduction_IPS.pptxM1_Introduction_IPS.pptx
M1_Introduction_IPS.pptx
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdf
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9
 
Orientation 28 sep education purpose only.pptx
Orientation 28 sep education purpose only.pptxOrientation 28 sep education purpose only.pptx
Orientation 28 sep education purpose only.pptx
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Cyber security
Cyber securityCyber security
Cyber security
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Lecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfLecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdf
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdf
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 

More from Carl B. Forkner, Ph.D.

Dynamic Worldwide Training Consultants (DWWTC) Company Profile
Dynamic Worldwide Training Consultants (DWWTC) Company ProfileDynamic Worldwide Training Consultants (DWWTC) Company Profile
Dynamic Worldwide Training Consultants (DWWTC) Company ProfileCarl B. Forkner, Ph.D.
 
Dynamic Worldwide Training Consultants - Fall 2017
Dynamic Worldwide Training Consultants - Fall 2017Dynamic Worldwide Training Consultants - Fall 2017
Dynamic Worldwide Training Consultants - Fall 2017Carl B. Forkner, Ph.D.
 
What's New in Social Media...and What it Means to Your Career
What's New in Social Media...and What it Means to Your CareerWhat's New in Social Media...and What it Means to Your Career
What's New in Social Media...and What it Means to Your CareerCarl B. Forkner, Ph.D.
 
What's New in Social Sedia and What it Means to Your Career
What's New in Social Sedia and What it Means to Your CareerWhat's New in Social Sedia and What it Means to Your Career
What's New in Social Sedia and What it Means to Your CareerCarl B. Forkner, Ph.D.
 
Social Media: Your Job Search Secret Weapon
Social Media:  Your Job Search Secret WeaponSocial Media:  Your Job Search Secret Weapon
Social Media: Your Job Search Secret WeaponCarl B. Forkner, Ph.D.
 
Social Media Security: What to Watch out for...
Social Media Security: What to Watch out for...Social Media Security: What to Watch out for...
Social Media Security: What to Watch out for...Carl B. Forkner, Ph.D.
 
Linked in seminar for asu hh humphrey fellows (sep 8 2014)
Linked in seminar for asu hh humphrey fellows (sep 8 2014)Linked in seminar for asu hh humphrey fellows (sep 8 2014)
Linked in seminar for asu hh humphrey fellows (sep 8 2014)Carl B. Forkner, Ph.D.
 
Creating & Optimizing your LinkedIn Presence
Creating & Optimizing your LinkedIn PresenceCreating & Optimizing your LinkedIn Presence
Creating & Optimizing your LinkedIn PresenceCarl B. Forkner, Ph.D.
 
National Defense, International Security, & Globalization in the Post-Cold Wa...
National Defense, International Security, & Globalization in the Post-Cold Wa...National Defense, International Security, & Globalization in the Post-Cold Wa...
National Defense, International Security, & Globalization in the Post-Cold Wa...Carl B. Forkner, Ph.D.
 
LInkedIn & More for Networking & Job Searches
LInkedIn & More for Networking & Job SearchesLInkedIn & More for Networking & Job Searches
LInkedIn & More for Networking & Job SearchesCarl B. Forkner, Ph.D.
 
Social Media Security: What to Watch out for...
Social Media Security: What to Watch out for...Social Media Security: What to Watch out for...
Social Media Security: What to Watch out for...Carl B. Forkner, Ph.D.
 
Linked in Seminar for ASU H.H.Humphrey Fellows (Sep 14 2015)
Linked in Seminar for ASU H.H.Humphrey Fellows (Sep 14 2015)Linked in Seminar for ASU H.H.Humphrey Fellows (Sep 14 2015)
Linked in Seminar for ASU H.H.Humphrey Fellows (Sep 14 2015)Carl B. Forkner, Ph.D.
 

More from Carl B. Forkner, Ph.D. (20)

Dynamic Worldwide Training Consultants (DWWTC) Company Profile
Dynamic Worldwide Training Consultants (DWWTC) Company ProfileDynamic Worldwide Training Consultants (DWWTC) Company Profile
Dynamic Worldwide Training Consultants (DWWTC) Company Profile
 
Dynamic Worldwide Training Consultants - Fall 2017
Dynamic Worldwide Training Consultants - Fall 2017Dynamic Worldwide Training Consultants - Fall 2017
Dynamic Worldwide Training Consultants - Fall 2017
 
What's New in Social Media...and What it Means to Your Career
What's New in Social Media...and What it Means to Your CareerWhat's New in Social Media...and What it Means to Your Career
What's New in Social Media...and What it Means to Your Career
 
What's New in Social Sedia and What it Means to Your Career
What's New in Social Sedia and What it Means to Your CareerWhat's New in Social Sedia and What it Means to Your Career
What's New in Social Sedia and What it Means to Your Career
 
Social Media Job Search
Social Media Job SearchSocial Media Job Search
Social Media Job Search
 
Operation Enduring Freedom
Operation Enduring FreedomOperation Enduring Freedom
Operation Enduring Freedom
 
Social Media: Your Job Search Secret Weapon
Social Media:  Your Job Search Secret WeaponSocial Media:  Your Job Search Secret Weapon
Social Media: Your Job Search Secret Weapon
 
LinkedIn for Business
LinkedIn for BusinessLinkedIn for Business
LinkedIn for Business
 
Social Media Security: What to Watch out for...
Social Media Security: What to Watch out for...Social Media Security: What to Watch out for...
Social Media Security: What to Watch out for...
 
The Social Media Job Search
The Social Media Job SearchThe Social Media Job Search
The Social Media Job Search
 
Linked in seminar for asu hh humphrey fellows (sep 8 2014)
Linked in seminar for asu hh humphrey fellows (sep 8 2014)Linked in seminar for asu hh humphrey fellows (sep 8 2014)
Linked in seminar for asu hh humphrey fellows (sep 8 2014)
 
Creating & Optimizing your LinkedIn Presence
Creating & Optimizing your LinkedIn PresenceCreating & Optimizing your LinkedIn Presence
Creating & Optimizing your LinkedIn Presence
 
Organizing for Dissertation Success
Organizing for Dissertation SuccessOrganizing for Dissertation Success
Organizing for Dissertation Success
 
National Defense, International Security, & Globalization in the Post-Cold Wa...
National Defense, International Security, & Globalization in the Post-Cold Wa...National Defense, International Security, & Globalization in the Post-Cold Wa...
National Defense, International Security, & Globalization in the Post-Cold Wa...
 
LInkedIn & More for Networking & Job Searches
LInkedIn & More for Networking & Job SearchesLInkedIn & More for Networking & Job Searches
LInkedIn & More for Networking & Job Searches
 
Social Media Security: What to Watch out for...
Social Media Security: What to Watch out for...Social Media Security: What to Watch out for...
Social Media Security: What to Watch out for...
 
Promoting Your Future with LinkedIn
Promoting Your Future with LinkedInPromoting Your Future with LinkedIn
Promoting Your Future with LinkedIn
 
Social Media Job Search
Social Media Job SearchSocial Media Job Search
Social Media Job Search
 
Linked in Seminar for ASU H.H.Humphrey Fellows (Sep 14 2015)
Linked in Seminar for ASU H.H.Humphrey Fellows (Sep 14 2015)Linked in Seminar for ASU H.H.Humphrey Fellows (Sep 14 2015)
Linked in Seminar for ASU H.H.Humphrey Fellows (Sep 14 2015)
 
Success through Networking
Success through NetworkingSuccess through Networking
Success through Networking
 

Recently uploaded

Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrsaastr
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfakankshagupta7348026
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 

Recently uploaded (20)

Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdf
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 

The Threat Landscape & Network Security Measures

  • 1. The Threat Landscape and Network Security Measures Carl B. Forkner February 1, 2016
  • 2. 2 Table of Contents • Key Terms • The Threat Landscape • Network Security Overview • Evolving and Future Threats
  • 4. 4 Key Terms – Threat Landscape • APT. An advanced persistent threat (APT) is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. • Bot. An Internet bot, also known as web robot, WWW robot or simply bot, is a software application that runs automated tasks over the Internet. • Botnet. A botnet is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet. • Drive-by. A drive-by download refers to the unintentional download of a virus or malicious software (malware) onto your computer or mobile device.
  • 5. 5 Key Terms – Threat Landscape • Exploit. A piece of software, a segment of data, or command sequences that takes advantage of a vulnerability. • IP/PII. – IP stands for Internet Protocol, or the address commonly used to identify the origin of an Internet transmission—i.e. your device. – PII stand for Personally Identifiable Information, sometimes referred to as “Personal Information,” and is often equated in the U.S. with “Privacy Act Information.” • Malvertising. This is the use of online advertising to spread malware. • Phishing. Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients.
  • 6. 6 Key Terms – Threat Landscape  Malware. Malware is a category of malicious code that includes viruses, worms, and Trojan horses. – Virus. A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man-made. – Worm. Computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. – Trojan. A Trojan [horse] is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage.  Vulnerability. In cybersecurity, vulnerability refers to a flaw in a system that can leave it open to attack.  Watering Hole. The watering hole attack vector targets specific groups by infecting frequently visited websites with malware.
  • 7. 7 The Threat Landscape • The crime: – Motive, means, & opportunity • The technology explosion and a dynamic environment – The changing face of threat vectors
  • 8. 8 The Network Security Battle of Minds Hacker Economy and Threats Network Security Measures
  • 9. 9 Who are the Adversaries? • Previously – Attention seekers – Many independent operators • New breed of attackers – Hacktivists – Profit-driven organizations – Rival corporations – Rival political nations
  • 10. 10 Ranking Adversaries Threat Level User Error Users making Mistakes with Configurations which May bring down Critical resources. Opportunistic Hacker These attackers are usually script kiddies driven by notoriety. Insider Threat Attackers are typically disgruntled employees or ex-employees. Hacktivists Attackers that have a political agenda to get awareness to it. Organized Crime Mass attacks driven by profits. Government Sponsored Targeted attacks and well funded.
  • 11. 11 What are they after? • IP • Credit Cards & Bank info • PII – Identity Theft • Shutting down competition • Being the next Wikileaks • Pure profit • Sabotage
  • 12. 12 The Threat Landscape • Some Major Victims of Network Attacks:
  • 13. 13 The Threat Landscape • Threat Timeline Fall 2013 – Summer 2014
  • 14. 14 Organizational Hacking is Rewarding • Education, training, tech support • Storefront for hacking tools and zero-day exploits/vulnerability information • Sophisticated organization • Backed by governments • Supported by currencies like Bitcoin • Obscured through anonymous networks like TOR
  • 15. 15 Anatomy of an Attack ‒ The Hacker’s Point of View Keep safe  Evade Law Enforcement and defensive measures Define target Sub – Zero Research target Build or acquire tools Test tools + detection Planning Obtain credentials Strengthen footprint Initial intrusion getting in Outbound communication initiated Exfiltration data Initial intrusion getting out Survive
  • 16. 16 Hacker Tools • 2 main categories: – Social Engineering – The Techniques – Malware – The Tools
  • 17. 17 The Tactics of Social Engineering • Spoofing • Phishing • Spearphishing • Watering-hole attacks • Phone calls/impersonation • Malvertising • Social Media links
  • 18. 18 Known Viruses still a threat • Why are the old threats still working? – Unpatched systems – Old OS versions – AV/AM signatures not up to date – SMB, small agencies, partnerships lack security spending but still have network access
  • 19. 19 Kill Chain of an Advanced Attack Spam Malicious Email Malicious Web SiteExploit Malware Command & Control Center Bots leverage legitimate IPs to pass filters. Social engineering fools recipient. Malicious Link Bot Commands & Stolen Data Fast flux stays ahead of web ratings Zero-days pass IPS Compression passes static inspection Encrypted communication passes controls
  • 20. 20 What are Advanced Persistent Threats? • Advanced Persistent Threats (APT): – Advanced – Using organized methods, advanced malware, buying new tools constantly developed – Persistant – Patient. Using more social engineering combined with malware and codes. Can be very hard to detect, with expectation of higher payout. – Threats – Designed to attack deliberate choices of target. Credit Card info is cheap on the open market. Now it’s about business disruption, massive identity theft, IP theft, spying.
  • 21. 21 The Advanced Threat Lifecycle - The Threat Manufacturing/Recon - Scan for vulnerabilities - Design phishing emails - Customize malware, etc. Command & Control 1 4 Threat Vector Extraction - Package - Encrypt - Stage 2 3 Communication - Hide, Disarm - Spread, Move, Morph - Dial Home, Update - Recruit - Gather targeted data Infection ….and more
  • 23. 23 What is Security Intelligence? • Security intelligence represents knowledge of the identity, capabilities, and intentions of adversaries engaged in espionage, sabotage, or theft online. – Operational (indicators of compromise) – Tactical (understanding tools, techniques) – Strategic (understanding who, their intentions, and capabilities)
  • 24. 24 Key Terms – Security Measures • Application Control. Protects managed desktops and servers by allowing or denying network application usage based on policies established by the network administrator. • ATP. Advanced Threat Protection (ATP) relies on multiple types of security technologies, products, and research -- each performing a different role, but still working seamlessly together -- to combat these attacks from network core through the end user device. • AV/AM. Anti-virus/Anti-malware (AV/AM) provides protection against virus, spyware, and other types of malware attacks in web, email, and file transfer traffic. • IPS. Intrusion Prevention System (IPS) protects networks from threats by blocking attacks that might otherwise take advantage of network vulnerabilities and unpatched systems.
  • 25. 25 Key Terms – Security Measures • NGFW. Next Generation Firewall (NGFW) provides multi-layered capabilities in a single firewall appliance instead of a basic firewall and numerous add-on appliances. • Sandboxing. Sandboxing refers to the process of analyzing files in a contained environment to identify previously unknown threats and uncovering the full attack lifecycle. • UTM. Unified Threat Management (UTM) provides administrators the ability to monitor and manage multiple, complex security-related applications and infrastructure components through a single management console. • Web Filtering. Web Filtering technology gives you the option to explicitly allow web sites, or to pass web traffic uninspected both to and from known-good web sites in order to accelerate traffic flows.
  • 26. 26 Infrastructure Evolution • From closed networks to a global information grid • From governments & corporations to housewives & children 1985 1991 1995 2000 200219991967 200719761970 2004 2013-14
  • 27. 27 The Importance of Network Security • What is Modern Network Security? – User-friendly, but threat-unfriendly – Unique…just like everyone else – Maintaining balance, relevance, and Unified Threat Management (UTM) Servers Users VPN IPS Firewall AV/AM Anti-Spam URL Filters Legacy Systems UTM Servers
  • 28. 28 The Advanced Threat Lifecycle – Breaking the Chain Pt 1 Manufacturing/Recon - Scan for vulnerabilities - Design phishing emails - Customize malware, etc. Command & Control 1 4 Threat Vector Extraction - Package - Encrypt - Stage 2 3 Communication - Hide, Disarm - Spread, Move, Morph - Dial Home, Update - Recruit - Gather targeted data Infection
  • 29. 29 The Advanced Threat Lifecycle – Breaking the Chain Pt 2 Manufacturing/Recon - Scan for vulnerabilities - Design phishing emails - Customize malware, etc. Command & Control 1 4 Threat Vector Extraction - Package - Encrypt - Stage 2 3 Communication - Hide, Disarm - Spread, Move, Morph - Dial Home, Update - Recruit - Gather targeted data Infection
  • 30. 30 Advanced Threats • Hackers: – Experience + Resources = Increased Threats • Advanced Threat Protection • Advanced Threats & Network Security: Continuing Evolution…
  • 31. The Threat Landscape and Network Security Measures Carl B. Forkner February 1, 2016