security awareness termphong tanakulpaisal technical manager – it distribution co.,ltd

57
Security Awareness Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Upload: juniper-osborne

Post on 29-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Security AwarenessSecurity Awareness

Termphong Tanakulpaisal

Technical Manager – IT Distribution Co.,LTD

Page 2: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Agenda

• Introduction to network security– How many type of assets in IT system?– Which’s the most important asset?– Why protect information? (most important one)– So we need information security– How to achieve the information security >> CIA concept– Key success factor summary

• Network threats– What’s threat and example?– How to overcome threat? (with security protection concept)– How to overcome threat? (with tools)

• Network based protection system• Host based protection system

• Case Study

Page 3: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Company Assets

• Hardware (Physical Assets)• Software• System interfaces (e.g., internal and external conne

ctivity)• Data and information• Persons who support and use the IT system• System mission (e.g., the processes performed by t

he IT system)• System and data criticality (e.g., the system’s value

or importance to an organization)• System and data sensitivity

NIST SP 800-30

Page 4: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Information Assets

• Information is an asset which, like other important business assets, has value to an organization and consequently needs to be suitably protected

» ISO/IEC17799: 2000

Page 5: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Why Information Assets are the most important?

• Business Requirements– Client / customer / stakeholder– Marketing– Trustworthy– Internal management tool

• Legal Requirements– Revenue Department– Stock Exchange of Thailand– Copyright, patents, ….

Business Continuity Management

Compliance with Legal Requirement

Page 6: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

• Contractual Security Obligations– Intranet connections to other BU– Extranets to business partners– Remote connections to staff– VPN– Customer networks– Supplier chains– SLA, contracts, outsourcing arrangement– Third party access

Information Security Infrastructure

Why Information Assets are the most important?(2)

Page 7: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

• Information security protects information from wide range of threats in order to– Ensure Business Continuity– Minimize Business Damage– Maximize ROI and Business Opportunities

• Business : Stable service to customer• Education : Availability of resources and integrity of

information e.g. grade, profile, etc. » ISO/IEC17799: 2000 page iii, Introduction

Why we need information Security?

Page 8: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Q: How much for that each company should spend or plan for their Information Security?

A: …………… Baht / year

Q: How much for that each company should spend or plan for their Information System?

A: …………… Baht / year

How much should we spend on IT security?

Page 9: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Why we need information Security?(2) Business impact Analysis

How much does it cost per hour if people in your organization cannot access their information?

(Business Impact Analysis)

One big Organization -> approx 10 mil / day

-> working hours 8 hrs

-> 1.25 mil / hr

-> 10% margin = 125k / hr

if we’ve got 10 sale persons it means that we’ve lose 12,500 baht / hr if 1 salesperson can’t access their information

Page 10: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

…. some more calculations…

• 100 people start their day clearing junk mails, each receives 20 junk mails per day, each mail needs 10 seconds to open/read/delete

• Each of these staffs gets average THB18,000 income/month from the company– Company pays THB 102.27/staff/hr

– 100 people x 10 sec/mail x 20 mails/day x 220 days/yr = 1,222.2 hrs/year

– Company pays for this “clearing junk mail” 125,000 Baht/year

• Do you believe that– There are only 20 junk mails per day?

– Average time spent is only 10 seconds/junk mail?

– You pay only 18,000 Baht/month?

Page 11: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

…. some more calculations…

• What is a typical cost when the system is attack by virus / worm?– Amount of data destroyed and its cost– Man-hour of support staff to clean the virus– Idle time of other staff waiting for the system to come back– Your customers’ satisfaction– Your company’s reputation

So, a company spends …….. Baht each time the virus attacks

Page 12: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Security Concept

• Security is preservation of confidentiality, integrity and availability of information

• Confidentiality– Ensuring that information is accessible only to those

authorized to have access• Integrity

– Safeguarding the accuracy and completeness of information and processing methods

• Availability– Ensuring that authorized users have access to information

and associated assets when required» BS7799-2: 2002 page3, 3.1, 3.2, 3.3

Page 13: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Key success to obtain CIA

• Policy/Process/Pocedure– Clear– Coverage– Compliance – Legal, Standard, guideline etc.

• People– Awareness (e.g. Password on screen) – Discipline

• Technology– Enablers– Management Tools

Page 14: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

What is Threat?

• Could be anything that harm your system e.g.– User– Hacker/ cracker– Virus– Spam– Etc.

Page 15: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Key Factors Driving Threat over network

• Internet connection speeds are increasing for SMB as prices and technology improves:

– DSL, cable modem, T1 (business class connection services)• Increase in real-time Internet applications

– Web apps, VoIP, downloads, etc. require real-time security processing• Everything become online

Page 16: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Nowadays threat to you IT system

• Non-Computerized system– Masquerade– Social Engineering– Theft– System malfunction (disaster, power interruption)

• IT Network Threat– Network Level– Application Level

Page 17: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Threat – Network Level

• Denial of Services– Services has been disable by excessive

workload.

• Information sniffing– Information has been tapped and viewed by

unauthorized person

• Unauthorized access– Low level worker can access to critical

information.

Page 18: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Sample of Threats

Snooping

- - - - - - - - -m y p a s s w o r d

Telnet 203.152.145.121username:daengpassword:

203.152.145.121

202.104.10.5

Page 19: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Sample of Threats (cont.)

3-way handshake

SYN REQ

SYN ACK

ACK

DATA TRANSFER

WWW

- 3 way handshake

Page 20: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Sample of Threats (cont.)

SYN attack

WWWInternet

203.152.145.121

Attacker

SYN REQ D=203.152.145.121 S=202.104.10.5

202.104.10.5SYN ACK D=202.104.10.5 S=203.152.145.121

WAIT

1

2

Page 21: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Sample of Threats (cont.)

Smurf Attack

192.168.1.0

1921681255 2031521492ICMP REQ D= . . . S= . . .

2031521491 19216811ICMP REPLY D= . . . S= . . .

2031521491 19216812ICMP REPLY D= . . . S= . . .

2031521491 19216813ICMP REPLY D= . . . S= . . .

2031521491 19216815ICMP REPLY D= . . . S= . . .

2031521491 19216814ICMP REPLY D= . . . S= . . .

2031521491 19216816ICMP REPLY D= . . . S= . . .

2031521491 19216817

2031521491 19216818ICMP REPLY D= . . . S= . . .

203.152.149.1

Internet

Page 22: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Threat – Application Level - Virus

• Virus vs Worms..?– Virus

• Viruses are computer programs that are designed to spread themselves from one file to another on a single computer.

• A virus might rapidly infect every application file on an individual computer, or slowly infect the documents on that computer,

• but it does not intentionally try to spread itself from that computer to other computers.

– Worms• Worms, on the other hand, are insidious• because they rely less (or not at all) upon human behavior in

order to spread themselves from one computer to others.• The computer worm is a program that is designed to copy

itself from one computer to another over a network (e.g. by using e-mail).

Page 23: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Threat – Application Level – Spam Mail

• E-mail spoofing– Pretend to be someone e.g.

[email protected],

• Spam Mail– Unsolicited or unwanted e-mail or Phising

Page 24: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Threat – Application Level - Desktop

Desktop Threat Viruses, worms, Trojan, Backdoor Cookies Java Script and Java Applet Zombies network Key logger (Game-Online)

Page 25: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

How to overcome Threat?

• We need “control” which are – Policy & Process security control to provide

guideline and framework – People to control user behavior– Technology will be a tool in order to enforced

Policy throughout the organization effectively.

Page 26: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Policy & Process Control

• Policy Compliance – ISO 17799

• Compliance Checking– CobiT Audit Tools

• NIST security standard guideline– NIST – 800 series

• Organization Control– Business Continuity Plan

Page 27: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

People Control

• Security Awareness Training• Security Learning Continuum

– Awareness, Training, Education

• Responsibility Control– Need to know basis

Page 28: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

People Control - Example (2)

• Don't install free utilities on your computer• Run the current version of supported antivirus

software and set it for regular, automatic updates• Assign a complex, hard-to-guess password to your

computer (on-screen, pool)• Be alert for "phishing" scams that can result in

identity theft• Promptly apply security "patches" for your operating

system.• Activate your system’s firewall (Windows XP & Maci

ntosh OS X)

Page 29: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Technology Control

• Computer Security is the process of preventing and detecting unauthorized use of your computer

• Prevention measures help you to stop unauthorized users (intruders) from accessing any part of you computer network

• Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done.

• Network and Host Based Security– Security Devices (Hardware) or Security Software

Page 30: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Network Security Protection

• Firewall (Access control)• IDS/IPS• VPN & SSL VPN (Data Encryption)• Anti-Spam (preventing un-wanted email)• QoS (Quality of Services - Bandwidth

Management)• Web Content Filtering• IM & P2P

Page 31: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Firewall (Access Control)

Web Traffic— customers, partners, employees

Email Traffic

Applications/Web Services Traffic partners, customers, internal

VPN Trafficremote and mobile users

Internal security threatContractors/disgruntled employees

Remote user

Page 32: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Type of firewall

• Type of firewall– Packet filtering– Application Firewall– Stateful Inspection

• Type of implementation– Packet Filter– Screened host – Dual home Host– Screen Subnet (DMZ)

References: CISSP Certification

Packet Filter

Screened Host

Dual home Host

Screened Subnet

Page 33: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Basic Firewall Implementation

Page 34: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Known

Attacks DOS/DDOS

Zero-day

Attacks

Intrusion Detection & Intrusion Prevention Solution

Laptop Desktop Server Core Edge Branch Office

Host IPS Network IPS

Page 35: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

IDS/IPS

• Detection & Prevention System• Signature & Behavior & Anomaly based

Page 36: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Virtual Private Network (VPN)

• Encryption & Decryption• Public Key & Private Key• Encryption Technology

– DES– 3DES– AES

Page 37: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Anti-Spam

Source: Symantec/ Brightmail

Page 38: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

How serious spam is?

• Why do they spam?– 0.0005$ vs 1.21$ -> 0.02B vs 48.4B– 1/100,000 count as success

• How much does spam is? <spamcorp.net>– ~6 e-mail/sec 360 e-mail/min 21,600 e-mail/hr

• How do they get my e-mail?– Webboard, forum, etc.

• Does spam legal?• How to Protect yourself from getting spam?

Page 39: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

1) Lost Employee Productivity

• Employees deleting spam

• Employees complaining about spam

• Employees are spending 50 or more hours per year dealing with spam

• With AntiSpam solutions costing $10-15 per year – significant positive ROI

Problems Symptoms Business Impacts

2) Unnecessary IT Costs

• IT administrator salary

• Mail server CPU

• Storage

• Bandwidth

• IT administrators responding to help desk tickets to fight spam with no tools

• Spam requiring constant upgrading of mail infrastructure capacity

Why Spam Matters for Business

• Before: a nuisance -> Today: a serious business problem

3) Phishing and email fraud

• Employees and customers falling victim to fraud and identify theft

• Damage to brand

• Support cost

Page 40: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Phising Example

Page 41: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Phising Example

Page 42: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Phishing Example (2)

Page 43: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Spam control

Page 44: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Web-Content Filtering

• Cracks and Hacks Tools Website– Spyware, Trojan, Virus, etc.

• Banner & Advertising– Adware, Toolbar, Spam – Subscribe, Credit card

no., etc.

• Drugs, Gambling, Weapon, etc.• Pornography, Nude, Adult Materials• Shopping Online (Credit card issues)

Page 45: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

FortiGuard Web Filtering Enhancements

• Block Override – Authoritative user logs in to enable

site block override– Bypasses filter block on a user’s

session and lasts until timer expires• Rate Image

– URL rating capabilities are extended to include image URLs contained in web page – rates gif, jpeg, png, bmp, and tiff images

• Web Filter Consolidation– Web filter menu items of URL

Exempt, URL Block, and Web Pattern have been consolidated to a single menu item to speed configuration

• Active Directory Integration– Single sign-on– Policy based on AD User/Group– Requires FSAE agent software

Page 46: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Web Filtering: Banned Word

Page 47: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Desktop Security

• Anti – Virus• VPN - Client• Personal Firewall• IDS• Web-Filtering

– Small group, Home used, Computer Laboratory, etc.

Page 48: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

URL Filtering

Page 49: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Instant Messaging(IM)/Peer-to-Peer(P2P)

• IM– Virus– Exploit– Voice Chat

• P2P– Bandwidth Usage– Spyware– BackDoor

Page 50: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Traffic bottlenecks

Worms programmed to chat

Enterprise IM, P2P Challenges

Virus via malicious URL

Rootkit via file install

InternetInternet

Confidentiality breech

Viruses, worms

Lack of visibility / management tools

• Lack of usage & user controls• Protecting against new threats• Gaining control of bandwidth usage• Management & reporting insight

Page 51: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

IM & P2P Access Control

Page 52: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Gartner’s Analysis

Page 53: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Regulations Don’t Matter, but Auditors Do

Page 54: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Convergence Brings Evolutionary Efficiencies

Page 55: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Cyberthreat Hype Cycle

Page 56: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD

Conclusion

• PPT• Security system without performance degradation• "You don't put brakes on a car to go slower, you put

brakes on a car to go faster, more safely. Along the same lines, IT security is not meant to slow down a company, but rather to enhance and facilitate the growth of a company... safer growth."--Quoted from Gartner Group's Information Security Show, June 2001

Page 57: Security Awareness Termphong Tanakulpaisal Technical Manager – IT Distribution Co.,LTD