42
Cybersecurity – Know The Threats & How To Mitigate Them Sam Chawkat COO Dynamic Network Solutions

DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Cybersecurity – Know The Threats &

How To Mitigate Them

Sam ChawkatCOODynamic Network Solutions

Page 2: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Background

� Providing IT consulting to organizations of various sizes across several states and regions since 1996

� Our focus is in our slogan, We Take I.T. Personally

� We don’t focus on just the tech, we focus on the customer experience and customer satisfaction

� Dynamic Network Solutions is your “one stop shop” helping organizations with IT, cabling, AV, security, cameras, and phone systems. If it plugs in or turns on we can take care of it

Page 3: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Cybersecurity is Safety

Security: We must protect our computers and data in the same way that we secure the doors to our homes.

Safety: We must behave in ways that protect us against risks and threats that come with technology.

Page 4: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Lets Discuss The Type Of Threats That Exist

Page 5: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Importance of Cybersecurity� The internet allows an attacker to work from anywhere on the planet.

� Risks caused by poor security knowledge and practice:

� Identity Theft

� Monetary Theft

� Legal Ramifications (for yourself and your organization)

� Sanctions or termination if policies are not followed

� According to the SANS Institute, the top vectors for vulnerabilities available to a cyber criminal are:

� Web Browser

� IM Clients

� Web Applications

� Excessive User Rights

Page 6: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

User Awareness

6

Cracker:Computer-savvy programmer creates

attack software

Script Kiddies:Unsophisticated computer users who know how toexecute programs

Hacker Bulletin BoardSQL Injection

Buffer overflowPassword Crackers

Password Dictionaries

Successful attacks!Crazyman broke into …CoolCat penetrated…

Criminals: Create & sell bots -> generate spamSell credit card numbers, etc…

System AdministratorsSome scripts appear usefulto manage networks…

Malware package earns $1K-2K1 M Email addresses earn $810,000 PCs earn $1000

Posts to

Page 7: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Leading Threats

� Viruses

� Worms

� Trojan Horses / Logic Bombs

� Social Engineering

� Rootkits

� Botnets / Zombies

� Randsomware

Page 8: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Viruses

� A virus attaches itself to a program, file, or disk.

� When the program is executed, the virus activates and replicates itself.

� The virus may be benign or malignant but executes its payload at some point (often upon contact).

� Viruses can cause computer crashes and loss of data.

� In order to recover or prevent virus attacks:

� Avoid potentially unreliable websites/emails.

� System Restore.

� Re-install operating system.

� Use and maintain anti-virus software.

ProgramA

Extra Code

ProgramB

infects

Page 9: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Worms

� Independent program that replicates itself and sends copies from computer to computer across network connections.

� Upon arrival, the worm may be activated to replicate.

To JoeTo AnnTo Bob

Email List:[email protected]@yahoo.com

[email protected]

Page 10: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Logic Bombs and Trojan Horses

�Logic Bomb: Malware logic executes upon certain conditions. The program is often used for otherwise legitimate reasons.� Examples:

� Software which malfunctions if maintenance fee is not paid.

� Employee triggers a database erase when he is fired.

�Trojan Horse: Masquerades as a benign program while quietly destroying data or damaging your system.

� Download a game: It may be fun but contains hidden code that

gathers personal information without your knowledge.

Page 11: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Social Engineering

� Manipulates people into performing actions or divulging confidential information. Similar to a confidence trick or simple fraud, the term applies to the use of deception to gain information, commit fraud, or access computer systems.

11

Phone Call:This is John, the System

Administrator. What is your

password?

Email:ABC Bank has

noticed a problem with

your account…In Person:What ethnicity are you? Your

mother’s maiden name?

and have some lovely

software patches!

I have come to repair

your machine…

Page 12: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Phishing: Counterfeit Email

� A seemingly trustworthy entity asks for sensitive information such as SSN, credit card numbers, login IDs or passwords via e-mail.

Page 13: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Pharming: Counterfeit Web Pages

� The link provided in the e-mail leads to a counterfeit webpage which collects important information and submits it to the owner.

� The counterfeit web page looks like the real thing

� Extracts account information 13

MisspelledMisspelled

Wiping over, but

not clicking the link

may reveal a different address.

Wiping over, but

not clicking the link

may reveal a different address.

With whom?With whom?Copyright date is oldCopyright date is old

Page 14: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Botnet

� A botnet is a number of compromised computers used to create and send spam or viruses or flood a network with messages as a denial of service attack.

� The compromised computers are called zombies.

14

Page 15: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Man In The Middle Attack

� An attacker pretends to be your final destination on the network. When a person tries to connect to a specific destination, an attacker can mislead him to a different service and pretend to be that network access point or server.

15

Page 16: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Rootkit

� Upon penetrating a computer, a hacker may install a collection of programs, called a rootkit.

� May enable:

� Easy access for the hacker (and others)into the enterprise

� Keystroke logger

� Eliminates evidence of break-in.

� Modifies the operating system.

Page 17: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Password Cracking

Dictionary Attack and Brute Force

Pattern Calculation

Result Time to Guess(2.6x1018

tries/month)

Personal Info: interests, relatives 20 Manual 5 minutes

Social Engineering 1 Manual 2 minutes

American Dictionary 80,000 < 1 second

4 chars: lower case alpha 264 5x105

8 chars: lower case alpha 268 2x1011

8 chars: alpha 528 5x1013

8 chars: alphanumeric 628 2x1014 3.4 min.

8 chars alphanumeric +10 728 7x1014 12 min.

8 chars: all keyboard 958 7x1015 2 hours

12 chars: alphanumeric 6212 3x1021 96 years

12 chars: alphanumeric + 10 7212 2x1022 500 years

12 chars: all keyboard 9512 5x1023

16 chars: alphanumeric 6216 5x1028

Page 18: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Threats From Password Cracking

� Access to email to send messages to authorize funds transfers

� If same password is used for other systems access to sensitive information such as customer information

� Access to systems to quietly steal funds from organization

� Example

� Cloud based HR systems such as Workday or Zenefits allows employees to manage their benefits and items such as direct deposit information

� These systems can be integrated with Office365/Gsuite so the same username and password can be used with both systems

� In Jan 2019 security experts released reports showing attackers are now using social engineering efforts to gain access to an employee’s mailbox, see that the organization uses Workday, use the same credentials to access the HR system, change the employees direct deposit account for their paycheck and steal funds from the organization quietly only to be noticed by the employee on their next pay cycle

Page 19: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

What is Ransomware?

� A malicious application written to generate revenue by simply disabling access to files, programs, or complete system.

� A ransom note is usually displayed informing the user that if they wish to gain access to their machine or files they will have to first pay a ransom usually in bitcoin currency

� With most Ransomware infections, there is a small chance of being able to recover the data or applications without having to pay the Ransom!

� Why do hacker groups keep writing these ransomware variants?

Page 20: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Because Its Working!

Page 21: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

How Does Ransomware Work?

Page 22: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Surprise! Questions

Why do malicious organizations continue to

make and distribute ransomware?

What's one new thing you learned so far?

When you were a kid what did you want to

be when you grew up?

Page 23: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Recommended Best Practices For Threat

Prevention

Page 24: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Best Practices to avoid these threats

uses multiple layers of defense to address technical, personnel and operational issues.

User Account Controls

Page 25: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Prevention Step 1: Patch Policy & Schedule

� Policy to patch systems within the organization not just operating systems but applications as well

� Schedule on when patching occurs on a weekly basis

� Management platform to push, install, and monitor patch health for the machines in the organization

� Removal of machines from network that are no longer under software support, example Windows XP

� Note: Microsoft will end support for Windows 7 Jan 2020

Page 26: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Prevention Step 2: Gateway Security Firewall/Router

� The basic function of your firewall/router no longer helps to prevent this threat

� Gateway antivirus and gateway malware subscription services installed, monitored, and updated

� Geo-blocking strategies

Page 27: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Prevention Step 3: Endpoint Security

� Central monitored and managed endpoint security for catching infections on machines

� Updated and monitored for infections

� All devices on your network should have an endpoint security product or they should not be on your network

� Guests on guest networks

� BYOD devices on guest networks

Page 28: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Prevention Step 4: Training/Education

� Educate staff on the importance of knowing trusted websites and email senders to click links or open files

� If they don’t know the person or file or link, don’t click it

� Once a year training with staff on security best practices and knowing who to contact when a security issue has been raised

� Put your staff to the test with monthly mock security threats to see how they are performing

� What is the largest security threat for YOUR organization?

Page 29: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Prevention Step 4: Training/Education

Answer

It’s Your STAFF!

Page 30: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Prevention Step 5: Lockdown Access

� Locking down machines preventing end users from installation of software

� Should they click and run something it will add another level of protection not allowing malicious software to install

� Limits software installations to be performed by IT after verified no malicious impact

Page 31: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Prevention Step 6: Strong Passwords

& MFA

Make passwords easy to remember but hard to guess

� USG standards:

� Be at least ten characters in length

� Must contain characters from at least two of the following four types of characters:

� English upper case (A-Z)

� English lower case (a-z)

� Numbers (0-9)

� Non-alphanumeric special characters ($, !, %, ^, …)

� Must not contain the user’s name or part of the user’s name

� Must not contain easily accessible or guessable personal information about the user or user’s family, such as birthdays, children’s names, addresses, etc.

Page 32: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Prevention Step 6: Strong Passwords

& MFA� A familiar quote can be a good start:

� Using the organization standard as a guide, choose the first character of each word:

� LIASMWTFOS

� Now add complexity the standard requires:

� L1A$mwTF0S (10 characters, 2 numerals, 1 symbol, mixed English case: password

satisfies all 4 types).

� Or be more creative!

“LOVE IS A SMOKE MADE WITH THE FUME OF SIGHS”

William Shakespeare

Page 33: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Prevention Step 6: Strong Passwords

& MFA� Never use admin, root, administrator, or a default account or password

for administrative access.

� A good password is:

� Private: Used by only one person.

� Secret: It is not stored in clear text anywhere,

including on Post-It® notes!

� Easily Remembered: No need to write it down.

� Contains the complexity required by your organization.

� Not easy to guess by a person or a program in a reasonable time, such as several weeks.

� Changed regularly: Follow organization standards.

� Avoid shoulder surfers and enter your credentials carefully! If a password is entered in the username field, those attempts usually appear in system logs.

Page 34: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Prevention Step 6: Strong Passwords & MFA

� What does MFA stand for?

� Multi Factor Authentication

� Its what you know and what you have

� Consider implementing for your organization to prevent attacks

Page 35: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Office 365 MFA Setup Instructions

Page 36: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Multi Factor Authentication – MFA

Office 365

Page 37: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Multi Factor Authentication – MFA

Office 365

Page 38: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Multi Factor Authentication – MFA

Office 365- Mobile App

38

Page 39: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Prevention Step 7: Backup, Backup, Backup

� Important data should never reside on machines but rather on servers or cloud resources, backups are your last line of defense

� Multi day backups should occur for your data and server infrastructure

� Not just nightly backups

� Backups of critical staff machines are recommended

� Backups should consist of onsite and cloud copies and more than one backup strategy should be considered

� Data in the cloud should also be backed up to alternate location, cloud to cloud backups

� Is your backup:

� Recent?

� Off-site & Secure?

� Process Documented?

� Encrypted?

� Tested?

Page 40: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Identifying Security Compromises

� Symptoms:

� Antivirus software detects a problem.

� Disk space disappears unexpectedly.

� Pop-ups suddenly appear, sometimes selling security software.

� Files or transactions appear that should not be there.

� The computer slows down to a crawl.

� Unusual messages, sounds, or displays on your monitor.

� Stolen laptop: 1 stolen every 53 seconds; 97% never recovered.

� The mouse pointer moves by itself.

� The computer spontaneously shuts down or reboots.

� Often unrecognized or ignored problems.

Page 41: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Malware detection

• Spyware symptoms:• Changes to your browser homepage/start

page.• Ending up on a strange site when

conducting a search.• System-based firewall is turned off

automatically.• Lots of network activity while not

particularly active.• Excessive pop-up windows.• New icons, programs, favorites which you

did not add.• Frequent firewall alerts about unknown

programs when trying to access the Internet.

• Poor system performance.

Page 42: DNS - MLTA - Cybersecurity Know The Threats & How To ... - MLTA - Cybersecurity...Background Providing IT consulting to organizations of various sizes across several states and regions

Sam Chawkat

Chief Operations Officer

Dynamic Network Solutions

(301) – 591 – 9609 X104

[email protected]

www.dnsolutions.com