36
Security @Work Mathan Kasilingam, CISSP Principal Solution Architect

Security threats and countermeasures in daily life - Symantec

  • View
    447

  • Download
    3

Embed Size (px)

DESCRIPTION

Security threats and countermeasures in daily life - Symantec. This walks you through various day-to-day information security threats one person undergoes on daily life and relevant counter-measures offered by Symantec. Find it useful, and shared it!

Citation preview

Page 1: Security threats and countermeasures in daily life - Symantec

Security @WorkMathan Kasilingam, CISSP

Principal Solution Architect

Page 2: Security threats and countermeasures in daily life - Symantec

2

Four Key Trends

Internet Security Threat Report, Vol. 17

Malware Attacks81% ↑

Targeted Attacks Expand

Mobile Threats

Expose All

Data Breaches on Rise

Page 3: Security threats and countermeasures in daily life - Symantec

3

Security never sleeps

Threat & Risk Visibility

Information Protection

Identity Protection

Systems Management

Infrastructure Protection

Security Intelligence

Reconn

Incursion

Discovery

Capture

Exfiltrate

Page 4: Security threats and countermeasures in daily life - Symantec

4

Portrait of a Cyber-Crime

Smith Inc Small company – BIG ideas

Page 5: Security threats and countermeasures in daily life - Symantec

5

Attack #1: Port Scan

Page 6: Security threats and countermeasures in daily life - Symantec

6

Attack methodology: Company target identified

The target Company

The Hacker – individual, organisation or Government

Page 7: Security threats and countermeasures in daily life - Symantec

7

Port Scan – probe for vulnerabilities

Look for an entry

Weak points

Defence alignments

System vulnerabilities

Open doors

Page 8: Security threats and countermeasures in daily life - Symantec

8

No entry

Security Incident & Event Management

Threat & Risk Visibility

Information Protection

Identity Protection

Systems Management

Infrastructure Protection

Security Intelligence

Reconn

Incursion

Discovery

Capture

Exfiltrate

Page 9: Security threats and countermeasures in daily life - Symantec

9

Attack #2: Social Engineering

Page 10: Security threats and countermeasures in daily life - Symantec

10

Company employee target identified

Simon: The target employee

Page 11: Security threats and countermeasures in daily life - Symantec

11

Social Engineering

Simon: The target employee

Facebookprofile

Home address

Workinghours

Mobile Devices

Passwords

Page 12: Security threats and countermeasures in daily life - Symantec

12

Tracking the target

Page 13: Security threats and countermeasures in daily life - Symantec

13

Capturing the device

Page 14: Security threats and countermeasures in daily life - Symantec

14

No entry

Device Encryption Technology

Threat & Risk Visibility

Information Protection

Identity Protection

Systems Management

Infrastructure Protection

Security Intelligence

Reconn

Incursion

Discovery

Capture

Exfiltrate

Page 15: Security threats and countermeasures in daily life - Symantec

15

Attack #3: Spear Phishing

Page 16: Security threats and countermeasures in daily life - Symantec

16

Desktop targeted via Malicious email

Page 17: Security threats and countermeasures in daily life - Symantec

17

Even if Desktop Protection fails

Page 18: Security threats and countermeasures in daily life - Symantec

18

DLP (Data Loss Prevention) can prevent the data from leaving the network

Page 19: Security threats and countermeasures in daily life - Symantec

19

No entry

Data Loss Prevention

Threat & Risk Visibility

Information Protection

Identity Protection

Systems Management

Infrastructure Protection

Security Intelligence

Reconn

Incursion

Discovery

Capture

Exfiltrate

Page 20: Security threats and countermeasures in daily life - Symantec

20

Attack #4: Buffer Overflow Attack

Page 21: Security threats and countermeasures in daily life - Symantec

21

Buffer Overflow Attack

Page 22: Security threats and countermeasures in daily life - Symantec

22

Detecting system vulnerabilities and apply patches

Identify areas of concern

Page 23: Security threats and countermeasures in daily life - Symantec

23

No entry

Automated Compliance Management SolutionCritical System Protection (Host FW / IPS / Sys

Baseline)

Threat & Risk Visibility

Information Protection

Identity Protection

Systems Management

Infrastructure Protection

Security Intelligence

Reconn

Incursion

Discovery

Capture

Exfiltrate

Page 24: Security threats and countermeasures in daily life - Symantec

24

Attack #5: Password Hacking Attack

Page 25: Security threats and countermeasures in daily life - Symantec

25

Advanced Persistent Threat

Simon’s mumMrs LeeL E E

Page 26: Security threats and countermeasures in daily life - Symantec

26

No entry

Identity & Access Management Solution

Threat & Risk Visibility

Information Protection

Identity Protection

Systems Management

Infrastructure Protection

Security Intelligence

Reconn

Incursion

Discovery

Capture

Exfiltrate

Page 27: Security threats and countermeasures in daily life - Symantec

27

Attack #6: Attacking mobile devices

Page 28: Security threats and countermeasures in daily life - Symantec

28

Anti theft – Mobility solutions (Device Management Solution)

Page 29: Security threats and countermeasures in daily life - Symantec

29

No entry

Mobile Device Security

Threat & Risk Visibility

Information Protection

Identity Protection

Systems Management

Infrastructure Protection

Security Intelligence

Reconn

Incursion

Discovery

Capture

Exfiltrate

Page 30: Security threats and countermeasures in daily life - Symantec

30

Defence against threats

Multiple layers of Security

Page 31: Security threats and countermeasures in daily life - Symantec

31

Complete Protection

Security Incident & Event Management

Encryption Technology

Data Loss Prevention

Automated Compliance Management

Critical System Protection

Identity & Access Management

Mobile Device Security

Page 32: Security threats and countermeasures in daily life - Symantec

32

Where should you go from here

Page 33: Security threats and countermeasures in daily life - Symantec

33

Symantec’s Information-Centric Approach

INFORMATION

Intelligence

Governance

InfrastructureStoreManageDedupeProtectRecover

DiscoverClassifyOwnershipAssess

RemediateCompliance

IdentifyAuthenticatePolicy RISK

COST VALUE

MobileVirtualisation

Cloud

Physical

Page 34: Security threats and countermeasures in daily life - Symantec

34

Stay Informed - Internet Security Threat Report

www.symantec.com/threatreport

Security Response Website

Twitter.com/threatintel

Page 35: Security threats and countermeasures in daily life - Symantec

Stay Informed

Internet Security Threat Report, Vol. 17

www.symantec.com/threatreport

Security Response Website

Twitter.com/threatintel

35

Page 36: Security threats and countermeasures in daily life - Symantec

Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

36

Thank You