Cyber Security

Download Report

Transcript Cyber Security

Cyber Security
You Expect It
You Need It
Terry Pobst-Martin
Chief Information Security Officer
State of Idaho, Office of the Chief Information Officer
“Washington-- Computer
spies have broken into the
Pentagon's $300 billion Joint
Strike Fighter project”. . .
“suspected to be Chinese
Hackers.”
Apr 22, 2009 – Wall Street Journal
• “Report: Chinese hack
into White House
network”
Nov 4, 2008 - ZDNet
Posted by Andrew Nusca
Huge new effort to protect
Department of Defense
Also plan to help protect citizens in
the future
Can no longer rely on industry efforts
to counter cyber threats
Pentagon spent < $100 M
in 6 months responding to:
cyber attacks
related problems
Means of Attack into Federal Networks
1272
2274
7528
Under
Investigation
Improper
Usage
Unauthorized
Access
3214
3762
Malicious
Code
Scans, Probes,
Attempted
Access
Federal
Government
reported
18,050 cyber
security
breaches in
2008
U.S. Cyber Command Operational since October 1
“Cyberspies penetrate electrical grid”
8 April 2009, Reuters
Electrical grid network has
“Backdoors” to let bad guys in
whenever they choose
Cyber threats are now
considered
"Cybersecurity is
the soft underbelly
of this country."
Weapons of Mass
Destruction!
INL test
Electrical generators are at risk
Former National Intelligence Director
Mike McConnell
Secretary of State
Hilary Clinton
Cyber Security Act of 2009
“…the president may order a Cybersecurity emergency and order the
limitation or shutdown of Internet traffic"
• Give Federal Government access to detailed network data
• Create a new Cybersecurity “Czar”
• Is supposed to coordinate military, NSA, Commerce & DHS efforts
A Hacker’s View of the State of Idaho:
• Target
• Government networks are a valid target
• Corporations are valid targets
• Individuals are a target
• Identity and privacy information = big target
Overarching Security Issues:
Electrical grid Cyber attacks
• Won’t stop the wind blowing
• Can’t stop the water flowing
• Can stop the power to
• You
• Your house
• Your workplace
• Stoplights...
Growing security trends:
•
Huge increase in spam (Phishing, e-cards, etc.)
•
New Threats: Vishing, Pod-Slurping, Thumb-sucking, more
•
Development of wireless hacking & mobile device viruses
•
Increase in video sharing exploits (PC or mobile)
•
Significant Increase in “Drive-by” malicious-ware websites
•
Increase in “Bots” & rootkits; hard to find or stop
U of I Website
State Website Hacks
•
Replacing content with other content or photos
•
Placing pornography on agency sites
•
Reflects problems throughout the world
Blocked Network Attacks
In one week
Spam
Legitimate
Virus
The Federal Trade Commission
• Estimates nearly $50 billion is lost annually
• Result of identity theft & credit-card fraud
BBB
• 70% of Identity theft takes place from
business data loss
• Identity theft is the fastest growing crime of
all time
IDTHEFT.COM
• At least 48,606,000 identifying records have
been stolen or lost since last year
• “…laptop stolen from unlocked
truck…”
• “…former office manager indicted for
theft of records…”
• “…hard drives missing…”
• “…donated computer contained
information.”
• “A hacker breaks in…”
• “…a data breach occurred…”
• “…records dumped in garbage…”
• “…employee loses a CD with data…”
• “…a customer just walked in and left
with a stack of papers…”
High
Cross site scripting
Intruder
Knowledge
“stealth” / advanced
scanning techniques
packet spoofing denial of service
iFrame
& SQL
Injects
Auto
Coordinated
Tools
DNS
Redirects
Malware
Distribution
Staged
Sites
distributed
attack tools
www attacks
automated probes/scans
GUI
sniffers
sweepers
Botnets for
Rent
back doors
network mgmt. diagnostics
disabling audits
hijacking
burglaries sessions
exploiting known vulnerabilities
Attack
Sophistication
password cracking
self-replicating code
password guessing
Low
1980
1985
1990
1995
2005
2009
Average people… make
mistakes
• Visit a site with poor security
• Obvious (e.g., pornography)
• Not obvious (e.g., MySpace,
Facebook)
• Even trusted sites – thousands
every day
• Download from the Internet
Average people… make mistakes
• Install potentially dangerous
software
• Freeware / Shareware
• Unchecked software
• Games
• Toolbars (e.g., Google Toolbar)
• Rights & access must be
minimized
Cisco Study: Laptop users bring threats into networks
• 56% believe Internet
is now “safer”
• Less “destructive”
viruses
• More security
products
• Limited awareness
“Script Kiddies” or Hacker intraining
• Use tools developed by real
Hackers
• Find excitement in breaking-in
• “Bragging Rights”
• Often purposely leave evidence
• Build a rep
• Rarely want long term
exploitation
Anyone could be an insider
• Studies show insiders bring huge
losses
• Victims at HUGE risk
• 12 times more likely hit by fraud
• 73% External sources
• 39% Business partners
• 18% Malicious Insiders
• 30% Multiple parties
External
Business
partners
Insiders
Multiple
FTC says that in the U.S., as many as
10 Million people fall victim to ID Theft every year!
Number has grown every year…
375,000
400,000
300,000
187,500
External
73%
Partner
39%
200,000
30,000
100,000
0
Median of Records Compromised
Internal
18%
If there’s a profit or edge to
gain
• Foreign governments
• Active attacks
• Network “backdoors”
• Use daily or hold for hostilities
If there’s a profit or edge to
gain
• Corporations
• Information is power
• Corporate intelligence activities
growing
• Is it ethical in the market place?
Developing new viruses all the time
• Created mostly by criminals
• A recent popular one is:
• JSRedir-R Trojan or “Gumblar”
• Infecting a new webpage every
4.5 seconds – legitimate sites
• Loads without knowledge
Refining Social Engineering
• “Twitterpornnames”
• Facebook and many other examples
Global cybercrime is the biggest
profit maker for criminals
• Surpassed drug trafficking
• Is not as dangerous as dealing
drugs or robbing banks, etc.
• True hackers selling services to
non-technical criminals
• Expertise is growing rapidly
• Money gets bigger every
month
• Software has vulnerabilities
• We need software
• To do our jobs
• To entertain ourselves
• To make life easier
• Over 90% of attacks are on
known vulnerabilities
• Patches are already out
• “Zero Day” exploits always a
possibility
• Password security is critical!
• Ensures only you can access your computer
• And the network behind it
• Use strong passwords always
• You will be attacked at the point of the weakest link
• NEVER give your network password to anyone else!
• Don’t write it down!
• Use as long a password as you can and ensure it has
–
–
–
–
Upper and Lower case Letters
Special Characters and Numbers
At least 8 characters
Passphrases are very secure
Do you remember any Song Lyrics?
I’m @ little 2x10 Country than thaT
0:04 to Save the W0rld
thE Dog days are ^^^ (done)
Te11 everYBody I'm on my w@
U R the Wind b\ mY Wings
Hey! Mr. TamB0urine Man
Do you remember Quotes, Poems, Biblical Phrases?
Ask what U can do 4 Ur country!
ToErrishuman,2_4givedivine
Early2bed&Early2risE
How do I love thee? Let me 1234 the ways!
Once upon a 12:00AM dreary
4 God so loved The world!
I will fear O evil, 4 thou art with me!
•
•
•
•
Physically secure your critical systems
Screen-lock your system when away from your computer
Ensure work areas are secure
Be aware of people who don’t belong in the work area
• Despite public
awareness
• Scammers are Social
Engineers
• E-mails look more real
• Reeling in the victims
• Large amounts of
money from small
percentage of people
• Is your Bank
account out
there?
Vishing
You can trust me
• Using Voice over IP (VoIP)
• Gain access data
• Private, personal and
financial information
• Likely to trust real person
• Caller ID spoofing builds
trust
You can trust me
• Spyware infects >80% desktops
• P2P software can come with Spyware
• Now too prevalent and insidious
• Your Anti-virus will not find it all
• Precursor to Trojans and/or Botnet
• Malware, all types, increased
32K variants in 2004 to >30 Mil in 2009
Now, almost too many to track (1/8 sec)
30,000,000
30,000,000
18,000,000
20,000,000
10,000,000
5,500,000
32,000
54,000
2004
2005
500,000
0
2006
2007
2008
2009
Overloading Anti-virus manufacturers; some last only 24 hours
Note: These numbers come from different sources
Rogue anti-virus/spyware programs
• Often generate more "alerts" than reputable software
• May bombard you with pop-ups, even when not online
• Use high-pressure sales to convince you to buy RIGHT NOW!
• Other signs of infection include:
• new desktop icons
• new wallpaper
• default homepage redirected to another site
Surfing the web is becoming a more
treacherous adventure
Safe website?
Infected Websites grew 300% in 2008
Percentage, by groups of websites “hosting” malicious software
77
80
70
Internet Criminal
Sites
70
60
51 48
48
50
50
Infected
Legitimate Sites
40
28
30
21
Unknown
20
10
0
1
1
2
2
• Attacker communicates to all his
Botnet drones / zombies
• Hackers “rent” Botnets for hours or
days
Hacker or
Bot-herder
Zombies or Bots
Command &
Control Bot
• Send out Spam
• Collect privacy
data
• Store data
• Host Pharming
websites
• Launch Denial of
Service attacks
• Other attacks
“Autorun” should be disabled to stop
this…
Free malicious software with the
purchase of any digital frame????
Or other USB powered devices
What do these
advertisements
hold?
Step 1: Understand that computer user involvement is key to
successful network / cyber security
Step 1a:
Don’t
Be
Scared
Step 2 – Manage Risk
• Rapidly changing landscape for IT solutions
• Constantly changing IT security environment
• Security tools are growing – capability, complexity, cost
• IT budgets won’t increase as quickly as demand
Analyze the security environment – focus on the risk
• What information / resources are you protecting
• What are the threats to your information / assets
• What is the risk to the organization if information /
asset is
• Lost
• Stolen
• Changed
• Develop a security plan to manage your risk
• Develop a security budget based on the security plan
• Assign the right people manage and run with the plan
Step 3: Take security seriously at work
•
•
•
•
•
•
•
•
•
•
Use strong passwords
Lock your workstations
Use care with e-mails
Do not download from the Internet
Do not install unchecked programs – rely on IT
Be aware of your Anti-Virus – is it running?
Laptop Firewalls should be on if away from the office
Make backups of important files and folders
Use a file encryption process
Ensure Security is part of all Business and IT Plans
Step 4: Take security seriously at home
• Install / Use Anti-Virus & Spyware programs
• Install / Use a Firewall program
• Keep system patched – all your programs
• Use care when reading e-mail
• Make backups of important files and folders
• Use strong passwords (different ones for different sites)
• Use care when downloading and installing
• Consider using a file encryption program
Step 5: Assess success of security procedures:
• Are risks mitigated?.. reduced?
• Modify plan when necessary
• Overcome disappointment; security can’t stop all attacks
• Experts are no longer saying “if” but “when”
Good Security can make you happy
Terry Pobst-Martin
[email protected]
332-1851