![Page 1: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/1.jpg)
ENISA’s Study on the EvolvingThreat Landscape
European Network and Information Security Agency
![Page 2: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/2.jpg)
Agenda
• Introduction to ENISA
• Preliminary remarks
• The ENISA report
• Major findings
• Conclusions
2
![Page 3: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/3.jpg)
ENISA
• The European Network & Information Security Agency (ENISA) was formed in 2004.
• The Agency is a Centre of Expertise that supports the Commission and the EU Member States in the area of information security.
• We facilitate the exchange of information between EU institutions, the public sector and the private sector.
![Page 4: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/4.jpg)
Agenda
• Introduction to ENISA
• Preliminary remarks
• The ENISA report
• Major findings
• Conclusions
4
![Page 5: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/5.jpg)
Evolution of Threats• The way in which threats related to information
security evolve is extremely complex.• There are many variables affecting the evolution of
such threats, which make prediction extremely difficult – even if we have data on current trends.
• It’s a bit like the weather forecast – we have a reasonable idea of the near future, but it gets more hazy as the timeframe increases.
• In cyberspace, our ability to predict major events is probably in the range of hours.
• Our predictive powers are poor in this area.
5
![Page 6: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/6.jpg)
Economic Constraints• Attackers have learnt how to exploit the weaknesses
created by the new business model and are themselves becoming more efficient.– The window between the publication of a vulnerability and
the appearance of exploit code is continually decreasing.
• The real issue - As businesses strive for greater speed and efficiency, it becomes more difficult to maintain an effective system of internal controls.
• The solution to this problem lies in successfully combining people, process and technology.
![Page 7: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/7.jpg)
Agenda
• Introduction to ENISA
• Preliminary remarks
• The ENISA report
• Major findings
• Conclusions
7
![Page 8: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/8.jpg)
The Report
• The ENISA Threat Landscape provides an overview of threats and current and emerging trends.
• It is based on publicly available data and provides an independent view on observed threats, threat agents and threat trends.
• Over 120 recent reports from a variety of resources have been analysed.
![Page 9: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/9.jpg)
Target Group• The target group of this report includes: – decision makers– security professionals– risk managers– Other interested individuals who would like to obtain
information about threats and find references to current available material on this topic.
“Know yourself, know the enemy. A thousand battles, a thousand victories”.
Sun Tzu.
9
![Page 10: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/10.jpg)
Method• The approach was to collect and aggregate existing,
publicly available information and compile it into single report on the threat landscape.
• Over 120 individual reports have been taken into account for this work, most of those issued in 2012.
• Elements of the ENISA threat landscape included in this deliverable are: – A Current Threat Landscape consisting of development of
threats as they have been reported by international stakeholders such as CERTs, industry, professional associations and academia and
– An Emerging Threat Landscape consisting of threat trends identified.
10
![Page 11: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/11.jpg)
The ENISA Threat Landscape
Networks of ExcellenceStandardisation bodies
Vari
ous
Thre
at R
epor
tsVarious Threat
Libraries/Reports
Information collection/collat
ion
Top ThreatsCurrent Threat
Landscape
Threat Agents
Threat TrendsEmerging Threat
Landscape
ENISA Threat Landscape
![Page 12: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/12.jpg)
Agenda
• Introduction to ENISA
• Preliminary remarks
• The ENISA report
• Major findings
• Conclusions
12
![Page 13: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/13.jpg)
Content• The current top cyber threats have been identified.
• Trends have been derived from the comparison of current threat information with that of the last years.
• Finally, a number of threat trends for emerging areas of Information Technology have been formulated. – Identified for the following areas:
• mobile computing
• social technology,
• critical infrastructures
• trust infrastructures
• cloud computing
• big data. 13
![Page 14: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/14.jpg)
Top Threats by Frequency
• Drive-by exploits: Malicious code exploiting browser vulnerabilities.
• Worms/Trojans: Widely used by criminals for making money.
• Code injection: Open doors in web DBs and Services
• Exploit kits: Automated tools to deliver malware
• Botnets: Compromised computers under the control of an attacker.
• Denial of Service: Typically used to take down a server (high rates)
• Phishing: Social engineering techniques for gathering personal details.
• Compromising confidential Information: Data breaches.
• Rogueware/Scareware: Fake software, fake alerts
• Spam: e-mail abuse (decreasing!!)
![Page 15: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/15.jpg)
Developed overview
![Page 16: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/16.jpg)
Threat Agents
![Page 17: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/17.jpg)
Threat Trends Per Area
![Page 18: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/18.jpg)
Agenda
• Introduction to ENISA
• Preliminary remarks
• The ENISA report
• Major findings
• Conclusions
18
![Page 19: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/19.jpg)
Some overall conclusions..
• Attackers use “simple and cheap” weapons
• Weaknesses of systems stay too long undetected (ca. 1 year)
• We know little about attackers and their tactic attack vectors
• We are not united enough…
![Page 20: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/20.jpg)
Recommendations• Collect and develop better evidence about attack
vectors: It is important to develop a better understanding about the “workflow” of an attack, from its entry point down to the final asset targeted. This information is very rare in existing threat reports.
• Collect and develop better evidence about impact achieved by adversaries: This information would be very interesting in order to understand the final targets of attackers and prioritise protection measures.
• Collect and maintain more qualitative information about threat agents: Despite the fact that literature on threat agents does exist, we were not able to find evidence of a co-relation between incidents and threat agents.
![Page 21: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/21.jpg)
Recommendations• Use common terminology: It is important to develop a
common vocabulary in threat management, e.g. to be used by standardisation bodies, international organisations, governments and NGOs.
• Include the user perspective: The perspective of end-user is still absent from available information. Eventually, the end-user perspective could contain the impact of threats to end-users, but also provide guidance for development of threat awareness.
• Develop use cases for threat landscapes: Use cases of threat landscapes should be used to generate good practices for inclusion in information security management activities/lifecycle.
![Page 22: ENISA’s Study on the Evolving Threat Landscape · 2013-02-22 · Method • The approach was to collect and aggregate existing, publicly available information and compile it into](https://reader031.vdocument.in/reader031/viewer/2022042003/5e6e7bacbe077254923aad88/html5/thumbnails/22.jpg)
Recommendations• Collect security intelligence: With growing threat
activity and increasing sophistication of attacks it seems inevitable to generate better conditions for the collection of intelligence on threats, risks and mitigation techniques by means of knowledge bases that can be commonly developed and shared among organisations.
• Perform a shift in security controls: It is important that a shift is performed from perimeter based, fragmented security controls towards data centered, holistic and coherent end-to-end security policies and protection mechanisms.