SlideShare a Scribd company logo
Unravel the Enigma of Insecurity
1
Bulletproof IT Security…Is It Possible?
by Gary S. Miliefsky, Editor-in-Chief,
CyberDefenseMagazine.com
Brought to you by Concise-Courses.comit SEXY to have a
Unravel the Enigma of Insecurity
2
About Me
Editor of Cyber Defense Magazine
Former Lead Cover Story Writer for Hakin9
Founder of NetClarity, a BYOD/NAC Company
Founding Member of US Department of Homeland Security
Board and Advisory Membership
National Information Security Group (NAISG.org)
Norwich.edu Cyber-war Research Labs
Informal Advisor to White House.gov PCIPB
MITRE’s CVE – Global standard for vulnerability information
Unravel the Enigma of Insecurity
3
Look at The Current Stats….
Cybercrime up by 6% through January 1, 2013
(Source: PONEMON INSTITUTE)
WhiteHouse Hacked by China
(Sources: WHITEHOUSE.GOV and PENTAGON.MIL)
ADOBE UPDATE SERVER – HACKED IN SEPTEMBER
MICROSOFT INTERNET EXPLORER – HACKED IN OCTOBER
ORACLE – RELEASES OVER 109 SECURITY FIXES IN OCTOBER
Total Personally Identifiable Information Records Stolen (US): 563,000,000+
Total Common Vulnerabilities and Exposures (CVEs aka “holes”): ~54,000
Total MD5 Hash Entries in Top Anti-virus Databases: 100,000,000+ and growing
(Sources: CDM, Adobe, Microsoft, Oracle, MITRE, PrivacyRights.org, VirusBulletin)
Over 60% of Bing search results
lead to infected pages
Over 30% of Google search
results lead to infected pages
Unravel the Enigma of Insecurity
4
Bulletproof IT Security Best Practices…
Here's my best practice list, in order of importance:
1. Roll out corporate security policies
2. Deliver corporate security awareness and training
3. Run frequent information security self-assessments
4. Perform regulatory compliance self-assessments
5. Deploy corporate-wide encryption
6. Value, protect, track and manage all corporate assets
7. Test business continuity and disaster recovery planning
Unravel the Enigma of Insecurity
5
New Ideas – Does Your Supply Chain Matter?
If you BUILD or even BUY IT Networking and Security Equipment,
have you checked the supply chain?
• Walmart ships picture frames infected with zero-day malware from
China
• Spyware found on Brand New ‘blank’ USB sticks built in China
• Microsoft uncovers Nitol botnet which shipped on “new” PCs from
Distribution partners throughout USA who purchase their equipment
from China, September, 2012
• Huawei and ZTE Equipment may ship with remote ‘eavesdropping’
technology from China – US House Intelligence Panel, Oct 2012
In balance, the USA’s NSA.gov has admitted (through EPIC FOI requests)
asking for similar capabilities through US telco and network equipment
manufacturers, whether or not this has happened and to what extent…
Unravel the Enigma of Insecurity
6
New Ideas – Should You Become a Big Brother?
• Create Employee Policy Agreements That All Must Accept
• Proper use of resources
• Behavior on the network and internet
• Password rules and storage do matter
• Best practices about NOT being socially engineered
• BYOD and wireless devices must be managed and controlled
• Run Your Own HoneyPots on Your Own Employees and Consultants
• To catch a thief you have to give them something to steal
• Create a fake database of confidential information and make it
easy to find and easy to hack
• Log all activities and track the sources of the attacks
Visit www.honeynet.org to learn more about Honey Pots
Unravel the Enigma of Insecurity
7
New Ideas – You Deploy BYOD Security?
Do you allow employees to bring in their own equipment?
• What is the OS? What apps are running? Are they
patched?
• What if it is lost or stolen with data leakage potential?
• Do you have the controls in place to remote wipe it?
• Can you find a stolen device? Lojack or similar software?
• What’s it doing on your network anyway?
It’s time to….
• Detect, Log, Alert, Block, Audit, Quarantine
• There are agentless and agent-based ways to do this…
• Google “BYOD” and “NAC” and evaluate, then deploy
Unravel the Enigma of Insecurity
8
New Ideas – Centralize and Frequently Review CybOX
CybOX stands for Cyber Observable Expressions…
•Threat assessment & characterization
(detailed attack patterns)
•Malware characterization
•Operational event management
•Logging
•Cyber situational awareness
•Incident Response
•Digital Forensics
•Cyber Threat information sharing
Visit http://cybox.mitre.org to learn how to implement it.
Unravel the Enigma of Insecurity
9
System Hardening 101
1. Understand your software development weaknesses:
http://cwe.mitre.org
2. Understand your operating system weaknesses:
http://oval.mitre.org
3. Understand your network systems weaknesses:
http://cve.mitre.org and http://nvd.nist.gov
4. Remove these weaknesses by better software
development processes, patching and reconfiguring
operating systems and network systems. Repeat. Repeat.
Repeat. Repeat. Repeat….yes…Repeat again…and again…
Unravel the Enigma of Insecurity
10
System Hardening 101 (cont’)
Make sure you checkout http://www.first.org/ and find their local affiliate in your
country or region… First offers a FIRST Best Practice Guide Library (BPGL)
Also maintained by FIRST: the FIRST Security Reference Index
It is a complicated, arduous, and time-consuming task for even experienced system
administrators to know what a reasonable set of security settings is for any
operating system. Thus, the FIRST Best Practice Guide Library intends to assist FIRST
Team Members and public in general in configuring their systems securely by
providing configuration templates and security guidelines.
Also, this initiative aims at recognizing FIRST members' work and promote it outside
the FIRST community. Note: The Best Practice Guides Library is based on documents
and links submitted by FIRST members.
FIRST members are strongly encouraged to share their Best Practice guides or links
to Web sites hosting Best Practice guides.
The FIRST BPGL is found here: http://www.first.org/resources/guides
Unravel the Enigma of Insecurity
11
System Hardening 101 (cont’)
Want to see all of the UNCLASSIFIED STIGS so you can harden just about anything?
Here is the entire list of STIGS:
http://iase.disa.mil/stigs/a-z.html
Say you are worried about a Windows 7 deployment.
How would you harden it when you finish the install?
Go here: http://iase.disa.mil/stigs/os/windows/seven.html
Download the STIG…follow the instructions…
Unravel the Enigma of Insecurity
12
System Hardening 101 (cont’)
Leverage the NSA and NIST recommendations…
For example…How would you harden a bluetooth network?
www.nsa.gov/ia/_files/wireless/BlueToothDoc.pdf
All their guides can be found here:
http://www.nsa.gov/ia/mitigation_guidance/security_configuratio
What are the best checklists to follow to harden your
systems?
http://web.nvd.nist.gov/view/ncp/repository
Unravel the Enigma of Insecurity
13
Root Cause of Exploitation?
Common Vulnerabilities and Exposures (CVEs)
1. Although there might be 100,000,000 signatures in your McAfee or
Symantec anti-virus scanner database (and growing exponentially),
there are only ~54,000 CVEs. If you close just one CVE, for example,
you can block more than 110,000 variants of the W32 malware.
2. If you aren’t visiting http://nvd.nist.gov to see what kind of exploitable
holes you have in your network, cyber criminals CERTAINLY are…
3. Everything with an IP address has a CVE, you need to figure out which
ones are critical holes and how to patch, reconfigure and remove them
—i.e. system hardening.
Unravel the Enigma of Insecurity
14
Some Best Practices Free Tools
NETWORK-BASED VULNERABILITY TESTS:
http://www.openvas.org
(better than Nessus)
OPERATING SYSTEM-BASED VULNERABILITY TESTS:
http://oval.mitre.org
Try: http://threatguard.com/node/27 for
a great OVAL tool that’s FREE
Unravel the Enigma of Insecurity
15
Some Best Practices Free Tools (cont’)
COBIT 5 is the latest edition of ISACA’s globally accepted
framework, providing an end-to-end business view of the
governance of enterprise IT that reflects the central role of
information and technology in creating value for enterprises.
The principles, practices, analytical tools and models found in
COBIT 5 embody thought leadership and guidance from
business, IT and governance experts around the world.
http://www.isaca.org/COBIT/Pages/default.aspx
Unravel the Enigma of Insecurity
16
Some Best Practices Free Tools (cont’)
Stay on top of your CERTIFICATION…take some free online
quizzes at CCCURE.org
https://www.freepracticetests.org/quiz/index.php?page=register
Send an email to clement.dupuis@gmail.com mentioning you saw CCCURE.org in
my Concise-Courses.com presentation and Clement will send you a copy of his
Scenario Based questions practice test for FREE. This is a value of $59.99 The real
exam contains many scenario based question, get ready for this special format,
CCCURE.org is the only vendor providing such type of quizzes.
Unravel the Enigma of Insecurity
17
Some Best Practices Free Tools (cont’)
ENCRYPTION… http://www.truecrypt.org
Main Features: Creates a virtual encrypted disk within a file and mounts it as a real
disk. Encrypts an entire partition or storage device such as USB flash drive or hard
drive. Encrypts a partition or drive where Windows is installed (
pre-boot authentication). Encryption is
automatic, real-time (on-the-fly) and transparent. Parallelization and pipelining
allow data to be read and written as fast as if the drive was not encrypted.
Encryption can be hardware-accelerated on modern processors. Provides plausible
deniability, in case an adversary forces you to reveal the password: Hidden volume
(steganography) and hidden operating system. More information about the features
of TrueCrypt may be found in the documentation.
Unravel the Enigma of Insecurity
18
What Are The Best Ways to Stop Malware?
Checkout the VirusBulletin at
http://www.virusbtn.com/vb100/index
Upload a suspicious file to VirusTotal: https://www.virustotal.com/
or try Jotti’s here: http://virusscan.jotti.org/en
or try VirScan here: http://virscan.org/
or try MetaScan from Opswat: http://www.metascan-online.com/
Unravel the Enigma of Insecurity
19
Speaking of VirusBulletin…
Unravel the Enigma of Insecurity
20
Stopping Malware…Multi-pronged Approach
1. System Hardening is crucial. No CVEs. No holes. Almost
nowhere to exploit.
2. Educating Employees to not be socially engineered and to best
practices behavior is also crucial.
3. Controlling which devices come and go on your network (BYOD
through NAC) is also very important.
4. Most importantly, Host-based Intrusion Prevention is your final
resort.
5. The better the HIPS engine in the anti-virus solution, the higher
the rating.
Unravel the Enigma of Insecurity
21
So What is Bulletproof IT Security?
• Good Corporate Security Policies
• Frequent Employee Training
• Ongoing Self-Assessment
• Corporate-wide Encryption
• Consistent System Hardening
• Vulnerability Management
• Managing the BYOD Dilemma
• Testing your BCP and DRP Plans
• Leveraging Next Gen Malware Blocking
Unravel the Enigma of Insecurity
22
Get Your Free Copy…
www.cyberdefensemagazine.com
Signup Today for FREE E-Subscriptions:
FREE MONTHLY NEWSLETTERS
20-40 pages packed with tips, tricks, tools and
techniques for better IT Security and Regulatory
Compliance
FREE QUARTERLY MAGAZINE
Ships in print at RSA Conference 2013, Covers
next generation tools and techniques, Cyber
Defense Test Labs (CDTL) INFOSEC product
reviews, and much more…

More Related Content

PDF
How To Defeat Advanced Malware. New Tools for Protection and Forensics
PDF
How To Protect Your Website From Bot Attacks
PDF
Advanced Threat Detection in ICS – SCADA Environments
DOC
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
PDF
How to tell if that pop-up window is offering you a rogue anti-malware product
PDF
eForensics_17_2013_KMOKER
PDF
Security And Privacy Cagliari 2012
PDF
What is Penetration Testing?
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Protect Your Website From Bot Attacks
Advanced Threat Detection in ICS – SCADA Environments
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
How to tell if that pop-up window is offering you a rogue anti-malware product
eForensics_17_2013_KMOKER
Security And Privacy Cagliari 2012
What is Penetration Testing?

What's hot (20)

PPTX
Cyber Security: User Access Pitfalls, A Case Study Approach
PPTX
Owasp e crime-london-2012-final
PDF
Combating Phishing Attacks
PDF
Comilion introduction presentation 26102012 (1)
PDF
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
PDF
PPTX
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
PDF
Security Firm Program - Corporate College
PDF
beyond_the_firewall_0103
PDF
10 things you should know about cybersecurity
PDF
security_secure_pipes_frost_whitepaper
PDF
Information security
PDF
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
PDF
Security
PDF
Five Network Security Threats And How To Protect Your Business Wp101112
PPTX
NDIA 2021 - solar winds overview and takeaways
PDF
Cybersecurity Powerpoint Presentation Slides
PDF
Hacking 10 2010
PPT
Lumension Security - Adjusting our defenses for 2012
PDF
Top 12 Cybersecurity Predictions for 2017
Cyber Security: User Access Pitfalls, A Case Study Approach
Owasp e crime-london-2012-final
Combating Phishing Attacks
Comilion introduction presentation 26102012 (1)
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Security Firm Program - Corporate College
beyond_the_firewall_0103
10 things you should know about cybersecurity
security_secure_pipes_frost_whitepaper
Information security
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
Security
Five Network Security Threats And How To Protect Your Business Wp101112
NDIA 2021 - solar winds overview and takeaways
Cybersecurity Powerpoint Presentation Slides
Hacking 10 2010
Lumension Security - Adjusting our defenses for 2012
Top 12 Cybersecurity Predictions for 2017
Ad

Similar to Bulletproof IT Security (20)

PPTX
Intro to INFOSEC
PDF
Are you ready for the next attack? reviewing the sp security checklist (apnic...
PDF
Are you ready for the next attack? Reviewing the SP Security Checklist
PPTX
Keynote at the Cyber Security Summit Prague 2015
PPTX
Prevent Getting Hacked by Using a Network Vulnerability Scanner
PDF
Security For Free
PPTX
PCM Vision 2019 Breakout: IBM | Red Hat
 
PPTX
BsidesMCR_2016-what-can-infosec-learn-from-devops
PDF
CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...
PPTX
Security in the age of open source - Myths and misperceptions
PPTX
Defending Enterprise IT - beating assymetricality
PPTX
Open Source Defense for Edge 2017
PDF
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
PPTX
Why do women love chasing down bad guys?
PDF
Penetration Testing A Complete Pentesting Guide Facilitating Smooth Backtrack...
PPTX
Threat Modeling In 2021
PDF
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
PPTX
Presentation infra and_datacentrre_dialogue_v2
PPTX
Solnet dev secops meetup
PPT
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Intro to INFOSEC
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? Reviewing the SP Security Checklist
Keynote at the Cyber Security Summit Prague 2015
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Security For Free
PCM Vision 2019 Breakout: IBM | Red Hat
 
BsidesMCR_2016-what-can-infosec-learn-from-devops
CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...
Security in the age of open source - Myths and misperceptions
Defending Enterprise IT - beating assymetricality
Open Source Defense for Edge 2017
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Why do women love chasing down bad guys?
Penetration Testing A Complete Pentesting Guide Facilitating Smooth Backtrack...
Threat Modeling In 2021
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Presentation infra and_datacentrre_dialogue_v2
Solnet dev secops meetup
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Ad

More from London School of Cyber Security (17)

PDF
The Panama Papers Hack
PDF
ISIS and Cyber Terrorism
PDF
Silk Road & Online Narcotic Distribution
PDF
Ashely Madison Hack
PDF
How To Catch a Phish: User Awareness and Training
PPTX
What Everybody Ought to Know About PCI DSS and PA-DSS
PDF
Building an Effective Cyber Intelligence Program
PDF
Crowdsourced Vulnerability Testing
PDF
Memory forensics and incident response
PDF
Gauntlt Rugged By Example
PPTX
Application Hackers Have A Handbook. Why Shouldn't You?
PDF
Website Impersonation Attacks. Who is REALLY Behind That Mask?
PDF
Legal Issues in Mobile Security Research
PDF
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
The Panama Papers Hack
ISIS and Cyber Terrorism
Silk Road & Online Narcotic Distribution
Ashely Madison Hack
How To Catch a Phish: User Awareness and Training
What Everybody Ought to Know About PCI DSS and PA-DSS
Building an Effective Cyber Intelligence Program
Crowdsourced Vulnerability Testing
Memory forensics and incident response
Gauntlt Rugged By Example
Application Hackers Have A Handbook. Why Shouldn't You?
Website Impersonation Attacks. Who is REALLY Behind That Mask?
Legal Issues in Mobile Security Research
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
KodekX | Application Modernization Development
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Cloud computing and distributed systems.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Electronic commerce courselecture one. Pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Approach and Philosophy of On baking technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
KodekX | Application Modernization Development
20250228 LYD VKU AI Blended-Learning.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Cloud computing and distributed systems.
Chapter 3 Spatial Domain Image Processing.pdf
Machine learning based COVID-19 study performance prediction
Unlocking AI with Model Context Protocol (MCP)
Digital-Transformation-Roadmap-for-Companies.pptx
Review of recent advances in non-invasive hemoglobin estimation
The Rise and Fall of 3GPP – Time for a Sabbatical?
Electronic commerce courselecture one. Pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Spectroscopy.pptx food analysis technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Bulletproof IT Security

  • 1. Unravel the Enigma of Insecurity 1 Bulletproof IT Security…Is It Possible? by Gary S. Miliefsky, Editor-in-Chief, CyberDefenseMagazine.com Brought to you by Concise-Courses.comit SEXY to have a
  • 2. Unravel the Enigma of Insecurity 2 About Me Editor of Cyber Defense Magazine Former Lead Cover Story Writer for Hakin9 Founder of NetClarity, a BYOD/NAC Company Founding Member of US Department of Homeland Security Board and Advisory Membership National Information Security Group (NAISG.org) Norwich.edu Cyber-war Research Labs Informal Advisor to White House.gov PCIPB MITRE’s CVE – Global standard for vulnerability information
  • 3. Unravel the Enigma of Insecurity 3 Look at The Current Stats…. Cybercrime up by 6% through January 1, 2013 (Source: PONEMON INSTITUTE) WhiteHouse Hacked by China (Sources: WHITEHOUSE.GOV and PENTAGON.MIL) ADOBE UPDATE SERVER – HACKED IN SEPTEMBER MICROSOFT INTERNET EXPLORER – HACKED IN OCTOBER ORACLE – RELEASES OVER 109 SECURITY FIXES IN OCTOBER Total Personally Identifiable Information Records Stolen (US): 563,000,000+ Total Common Vulnerabilities and Exposures (CVEs aka “holes”): ~54,000 Total MD5 Hash Entries in Top Anti-virus Databases: 100,000,000+ and growing (Sources: CDM, Adobe, Microsoft, Oracle, MITRE, PrivacyRights.org, VirusBulletin) Over 60% of Bing search results lead to infected pages Over 30% of Google search results lead to infected pages
  • 4. Unravel the Enigma of Insecurity 4 Bulletproof IT Security Best Practices… Here's my best practice list, in order of importance: 1. Roll out corporate security policies 2. Deliver corporate security awareness and training 3. Run frequent information security self-assessments 4. Perform regulatory compliance self-assessments 5. Deploy corporate-wide encryption 6. Value, protect, track and manage all corporate assets 7. Test business continuity and disaster recovery planning
  • 5. Unravel the Enigma of Insecurity 5 New Ideas – Does Your Supply Chain Matter? If you BUILD or even BUY IT Networking and Security Equipment, have you checked the supply chain? • Walmart ships picture frames infected with zero-day malware from China • Spyware found on Brand New ‘blank’ USB sticks built in China • Microsoft uncovers Nitol botnet which shipped on “new” PCs from Distribution partners throughout USA who purchase their equipment from China, September, 2012 • Huawei and ZTE Equipment may ship with remote ‘eavesdropping’ technology from China – US House Intelligence Panel, Oct 2012 In balance, the USA’s NSA.gov has admitted (through EPIC FOI requests) asking for similar capabilities through US telco and network equipment manufacturers, whether or not this has happened and to what extent…
  • 6. Unravel the Enigma of Insecurity 6 New Ideas – Should You Become a Big Brother? • Create Employee Policy Agreements That All Must Accept • Proper use of resources • Behavior on the network and internet • Password rules and storage do matter • Best practices about NOT being socially engineered • BYOD and wireless devices must be managed and controlled • Run Your Own HoneyPots on Your Own Employees and Consultants • To catch a thief you have to give them something to steal • Create a fake database of confidential information and make it easy to find and easy to hack • Log all activities and track the sources of the attacks Visit www.honeynet.org to learn more about Honey Pots
  • 7. Unravel the Enigma of Insecurity 7 New Ideas – You Deploy BYOD Security? Do you allow employees to bring in their own equipment? • What is the OS? What apps are running? Are they patched? • What if it is lost or stolen with data leakage potential? • Do you have the controls in place to remote wipe it? • Can you find a stolen device? Lojack or similar software? • What’s it doing on your network anyway? It’s time to…. • Detect, Log, Alert, Block, Audit, Quarantine • There are agentless and agent-based ways to do this… • Google “BYOD” and “NAC” and evaluate, then deploy
  • 8. Unravel the Enigma of Insecurity 8 New Ideas – Centralize and Frequently Review CybOX CybOX stands for Cyber Observable Expressions… •Threat assessment & characterization (detailed attack patterns) •Malware characterization •Operational event management •Logging •Cyber situational awareness •Incident Response •Digital Forensics •Cyber Threat information sharing Visit http://cybox.mitre.org to learn how to implement it.
  • 9. Unravel the Enigma of Insecurity 9 System Hardening 101 1. Understand your software development weaknesses: http://cwe.mitre.org 2. Understand your operating system weaknesses: http://oval.mitre.org 3. Understand your network systems weaknesses: http://cve.mitre.org and http://nvd.nist.gov 4. Remove these weaknesses by better software development processes, patching and reconfiguring operating systems and network systems. Repeat. Repeat. Repeat. Repeat. Repeat….yes…Repeat again…and again…
  • 10. Unravel the Enigma of Insecurity 10 System Hardening 101 (cont’) Make sure you checkout http://www.first.org/ and find their local affiliate in your country or region… First offers a FIRST Best Practice Guide Library (BPGL) Also maintained by FIRST: the FIRST Security Reference Index It is a complicated, arduous, and time-consuming task for even experienced system administrators to know what a reasonable set of security settings is for any operating system. Thus, the FIRST Best Practice Guide Library intends to assist FIRST Team Members and public in general in configuring their systems securely by providing configuration templates and security guidelines. Also, this initiative aims at recognizing FIRST members' work and promote it outside the FIRST community. Note: The Best Practice Guides Library is based on documents and links submitted by FIRST members. FIRST members are strongly encouraged to share their Best Practice guides or links to Web sites hosting Best Practice guides. The FIRST BPGL is found here: http://www.first.org/resources/guides
  • 11. Unravel the Enigma of Insecurity 11 System Hardening 101 (cont’) Want to see all of the UNCLASSIFIED STIGS so you can harden just about anything? Here is the entire list of STIGS: http://iase.disa.mil/stigs/a-z.html Say you are worried about a Windows 7 deployment. How would you harden it when you finish the install? Go here: http://iase.disa.mil/stigs/os/windows/seven.html Download the STIG…follow the instructions…
  • 12. Unravel the Enigma of Insecurity 12 System Hardening 101 (cont’) Leverage the NSA and NIST recommendations… For example…How would you harden a bluetooth network? www.nsa.gov/ia/_files/wireless/BlueToothDoc.pdf All their guides can be found here: http://www.nsa.gov/ia/mitigation_guidance/security_configuratio What are the best checklists to follow to harden your systems? http://web.nvd.nist.gov/view/ncp/repository
  • 13. Unravel the Enigma of Insecurity 13 Root Cause of Exploitation? Common Vulnerabilities and Exposures (CVEs) 1. Although there might be 100,000,000 signatures in your McAfee or Symantec anti-virus scanner database (and growing exponentially), there are only ~54,000 CVEs. If you close just one CVE, for example, you can block more than 110,000 variants of the W32 malware. 2. If you aren’t visiting http://nvd.nist.gov to see what kind of exploitable holes you have in your network, cyber criminals CERTAINLY are… 3. Everything with an IP address has a CVE, you need to figure out which ones are critical holes and how to patch, reconfigure and remove them —i.e. system hardening.
  • 14. Unravel the Enigma of Insecurity 14 Some Best Practices Free Tools NETWORK-BASED VULNERABILITY TESTS: http://www.openvas.org (better than Nessus) OPERATING SYSTEM-BASED VULNERABILITY TESTS: http://oval.mitre.org Try: http://threatguard.com/node/27 for a great OVAL tool that’s FREE
  • 15. Unravel the Enigma of Insecurity 15 Some Best Practices Free Tools (cont’) COBIT 5 is the latest edition of ISACA’s globally accepted framework, providing an end-to-end business view of the governance of enterprise IT that reflects the central role of information and technology in creating value for enterprises. The principles, practices, analytical tools and models found in COBIT 5 embody thought leadership and guidance from business, IT and governance experts around the world. http://www.isaca.org/COBIT/Pages/default.aspx
  • 16. Unravel the Enigma of Insecurity 16 Some Best Practices Free Tools (cont’) Stay on top of your CERTIFICATION…take some free online quizzes at CCCURE.org https://www.freepracticetests.org/quiz/index.php?page=register Send an email to clement.dupuis@gmail.com mentioning you saw CCCURE.org in my Concise-Courses.com presentation and Clement will send you a copy of his Scenario Based questions practice test for FREE. This is a value of $59.99 The real exam contains many scenario based question, get ready for this special format, CCCURE.org is the only vendor providing such type of quizzes.
  • 17. Unravel the Enigma of Insecurity 17 Some Best Practices Free Tools (cont’) ENCRYPTION… http://www.truecrypt.org Main Features: Creates a virtual encrypted disk within a file and mounts it as a real disk. Encrypts an entire partition or storage device such as USB flash drive or hard drive. Encrypts a partition or drive where Windows is installed ( pre-boot authentication). Encryption is automatic, real-time (on-the-fly) and transparent. Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted. Encryption can be hardware-accelerated on modern processors. Provides plausible deniability, in case an adversary forces you to reveal the password: Hidden volume (steganography) and hidden operating system. More information about the features of TrueCrypt may be found in the documentation.
  • 18. Unravel the Enigma of Insecurity 18 What Are The Best Ways to Stop Malware? Checkout the VirusBulletin at http://www.virusbtn.com/vb100/index Upload a suspicious file to VirusTotal: https://www.virustotal.com/ or try Jotti’s here: http://virusscan.jotti.org/en or try VirScan here: http://virscan.org/ or try MetaScan from Opswat: http://www.metascan-online.com/
  • 19. Unravel the Enigma of Insecurity 19 Speaking of VirusBulletin…
  • 20. Unravel the Enigma of Insecurity 20 Stopping Malware…Multi-pronged Approach 1. System Hardening is crucial. No CVEs. No holes. Almost nowhere to exploit. 2. Educating Employees to not be socially engineered and to best practices behavior is also crucial. 3. Controlling which devices come and go on your network (BYOD through NAC) is also very important. 4. Most importantly, Host-based Intrusion Prevention is your final resort. 5. The better the HIPS engine in the anti-virus solution, the higher the rating.
  • 21. Unravel the Enigma of Insecurity 21 So What is Bulletproof IT Security? • Good Corporate Security Policies • Frequent Employee Training • Ongoing Self-Assessment • Corporate-wide Encryption • Consistent System Hardening • Vulnerability Management • Managing the BYOD Dilemma • Testing your BCP and DRP Plans • Leveraging Next Gen Malware Blocking
  • 22. Unravel the Enigma of Insecurity 22 Get Your Free Copy… www.cyberdefensemagazine.com Signup Today for FREE E-Subscriptions: FREE MONTHLY NEWSLETTERS 20-40 pages packed with tips, tricks, tools and techniques for better IT Security and Regulatory Compliance FREE QUARTERLY MAGAZINE Ships in print at RSA Conference 2013, Covers next generation tools and techniques, Cyber Defense Test Labs (CDTL) INFOSEC product reviews, and much more…