SlideShare a Scribd company logo
Social Networking and Cyber-Security:
Strength, Weakness, Opportunity, or Threat?


                        Aus-Cert, May 2010
About Palo Alto Networks

•   World-class team with strong security and networking experience
     • Founded in 2005 by security visionary Nir Zuk

     • Top-tier investors

•   Builds next-generation firewalls that identify / control 950+ applications
     • Restores the firewall as the core of the enterprise network security
       infrastructure
     • Innovations: App-ID™, User-ID™, Content-ID™

•   Global footprint: 1,100+ customers in 60+ countries, 24/7 support
Social Networking is No Longer a Fad
• Hundreds of millions of people use social applications daily
   • Facebook has over 400 million users

   • LinkedIn has over 60 million users

   • Social bookmarking applications have roughly 10 million users each

   • Youtube is the 3rd most popular website on the Internet

• Sales, marketing, public relations, human resources, product teams,
  and business development all see opportunity
Social Networking is A Hotbed of Risk
• Brand Damage
   • Mis-treat your customers at your own peril

• Compliance
   • Using unapproved applications, (FINRA)

• Business Continuity
   • Malware or application vulnerability induced downtime

• Operations Costs
   • Excessive bandwidth consumption, desktop cleanup

• Data Loss/Leakage
   • Unauthorized employee file transfer, data sharing

• Productivity
   • Uncontrolled, excessive use for non-work related purposes
Applications Are The Threat Vector
•   US$3.8M stolen from small
    school district in New York State
     •   Zeus banking trojan stole
         credentials, enabled transfers
     •   All but US$500K recovered
•   Increasingly, new and old threats
    using social networks
     •   Social network-specific (e.g.,
         Koobface, FBAction)
     •   New life for old threats (e.g.,
         Zeus/Zbot)
•   Huge user populations, high
    degree of trust, liberal use of SSL


•   But wait – we have those
    applications under control…
Existing Control Mechanisms?

• Applications have changed

   • Any port, random ports,
      encryption - all in use




                                  • Users feel entitled to use any
                                    application
                                  • New employees = always on,
                                    always connected
Employees Will Find A Way…
                                                                                            80%
                                      RDP

• Remote Access                        SSH                                             76%
                                                                                62%
                                     telnet
   • 27 variants found 95% of                                             53%
                                   LogMeIn
     the time                                                       42%
                                TeamViewer



                                  CGIProxy                   30%
• External Proxies                PHProxy
                                                             30%

                                                            27%
   • 22 variants found 76% of    CoralCDN
     the time                     FreeGate
                                                      15%

                                                      14%
                                Glype Proxy



• Encrypted Tunnels                    Tor
                                                      15%

                                                      13%
                                   Hamachi
   • Non-VPN related – found                         9%
                                  UltraSurf                   Frequency That the
     30% of the time                            3%
                                   Gbridge                  Application Was Detected
                                                3%
                                     Gpass

                                          00%         20%     40%         60%         80%
Applications Are Not What They Seem
                                                              Most Frequently Detected "Dynamic" Applications

           100%

            80%       83%
                                        78%             77%        73%
            60%                                                                            60%
                                                                                60%
                                                                                                           55%       54%       51%
            40%                                                                                                                          42%

            20%

             0%
                  Sharepoint        iTunes          MS RPC       Skype     BitTorrent MSN Voice           Ooyla   Mediafire   eMule   Teamviewer


                                         Applications That are Capable of Tunneling
                                                                                                              • 67% of the applications
       Networking (73)                        36                      18              17         2                use port 80, port 443, or
     Collaboration (46)            18                     25         12                                           hop ports
            Media (24)        8         12         13

  General-Internet (17)       6     7     4
                                                                                                              • 190 of them are
Business-Systems (15)         10        41
                                                                                                                  client/server
                          0                         25                     50                        75       • 177 can tunnel other
                                  Client-server (78)                 Browser-based (66)                           applications, a feature no
                                  Network-protocol (19)              Peer-to-peer (12)                            longer reserved for SSL or
                                                                                                                  SSH
Enterprise 2.0 Use is Consistent; Intensity Up
• Google Docs and Calendar
    resource consumption* is up
    55%


• Google Talk Gadget shot up by
    56% while Google Talk dropped
    76%


• Bandwidth consumed by
    SharePoint and LinkedIn is up
    14% and 48% respectively


• Bandwidth consumed by
    Facebook, per organization, is
    a staggering 4.9 GB

* Resource consumption = bandwidth and session usage
Social Networking: Strengths

         Top line revenue
  Reaching new markets/customer groups
Increasing sales in existing markets/customer
                     groups


         Bottom line profit
Reduction in cost of sales (disintermediation)
        Reduction in cost of support
       Reduction in cost of marketing
Social Networking: Weaknesses

   Fraught with unmanaged risk
            Few policies
Existing policies aren’t enforceable
                 Savvy users
  Content controls/logging/auditing outdated
  Security models too restrictive
             Coarse allow/deny
Social Networking: Opportunities



         Business opportunity
        Evolve security policies
            Evolve controls
Make risk management/security relevant
Threats - Social Networking Top 10

10 - Social networking worms
9 - Phishing bait
8 - Trojan vector
7 - Data leaks
6 - Shortened/obfuscated links
5 - Botnet command and control
4 - It’s a data source for attackers
3 - Cross-Site Request Forgery (CSRF)
2 - Impersonation
1 - Trust
Recommendations

• Policy
  • Gather

  • Listen

  • Redefine

• Model – re-think or refine
  • Blindly blocking is somewhat draconian; blindly allowing is a CLM

  • Safe enablement is your new mantra

• Controls
  • Visibility and control of applications, users, and content is key

  • “Allow, but…” controls are critical
www.paloaltonetworks.com/aur

More Related Content

PPTX
Future makers
DOC
Apuntes
PDF
Priority moments digital
PDF
Connected.
PPTX
Bb w ppt_content_conferencesession-ittakesa_village_final
PPT
здоров'я – найвища цінність життя людини
PPTX
ош № 2 отчет презентация о недели обж,нвп и мсп
PPT
ззт ехнологии царинная зош№1г.Харцызск
Future makers
Apuntes
Priority moments digital
Connected.
Bb w ppt_content_conferencesession-ittakesa_village_final
здоров'я – найвища цінність життя людини
ош № 2 отчет презентация о недели обж,нвп и мсп
ззт ехнологии царинная зош№1г.Харцызск

Viewers also liked (15)

PPT
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
PPTX
Jamaica
DOC
في الفصل
PDF
iPad Pilot Projects at Framingham State University: Three Use Cases
PPTX
Future makers
PPTX
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
PDF
Be the Hero
DOC
Apuntes
PPT
организация и методика выполнения проектов в физ ре
PPT
PDF
Bí Mật Kiếm Tiền Tay Trắng Thành Triệu Phú $ - Biến Tướng Đa Cấp Sang MMO
PPTX
Implementing MITREid - CIS 2014 Presentation
PPT
стимулирующие технологии как метод активизации собственных сил организма
PPT
презентация медико педагогічний контроль на уроках Microsoft power point (2)
Palo Alto Networks Application Usage and Risk Report - Key Findings for Korea
Jamaica
في الفصل
iPad Pilot Projects at Framingham State University: Three Use Cases
Future makers
Blackboard Mobile: Best Practices from the Field (Pre-Session Workshop)
Be the Hero
Apuntes
организация и методика выполнения проектов в физ ре
Bí Mật Kiếm Tiền Tay Trắng Thành Triệu Phú $ - Biến Tướng Đa Cấp Sang MMO
Implementing MITREid - CIS 2014 Presentation
стимулирующие технологии как метод активизации собственных сил организма
презентация медико педагогічний контроль на уроках Microsoft power point (2)
Ad

Similar to Aus cert event_2010 (20)

PDF
F5 beyond load balancer (nov 2009)
PDF
Presentation f5 – beyond load balancer
PDF
Load Balancing und Beschleunigung mit Citrix Net Scaler
PPTX
Vfm palo alto next generation firewall
PDF
Mu Studio Performance Suite
PPTX
Citrix Netscaler Intro
PDF
Web Performance Acceleration with Strangeloop AS1000
PPTX
#1 keynote get social_be_mobile_runcloud
PDF
SOA an architecture on the Desktop
PDF
Gdd Keynote V China
PPTX
Technology & Information Technology trends 2012
PDF
Miercom Report Websense Web Security Gateway Competitive For 30 Apr10
PDF
F5 Networks: architecture and risk management
PPTX
Rl net scaler-ha&dr_xendesktop_set2012
PDF
Keynote Client Connectivity And The Cloud
PDF
Telesemana ce nominum:mef
PPTX
Building and packaging highly scalable services for maximum market penetratio...
PPSX
Citrix Net Scaler V9.0 Lb Highload Mar2009
PPSX
Nikolay Sh Citrix Net Scaler V9.0 Lb
PPSX
Nikolay Sh Citrix Net Scaler V9.0 Lb
F5 beyond load balancer (nov 2009)
Presentation f5 – beyond load balancer
Load Balancing und Beschleunigung mit Citrix Net Scaler
Vfm palo alto next generation firewall
Mu Studio Performance Suite
Citrix Netscaler Intro
Web Performance Acceleration with Strangeloop AS1000
#1 keynote get social_be_mobile_runcloud
SOA an architecture on the Desktop
Gdd Keynote V China
Technology & Information Technology trends 2012
Miercom Report Websense Web Security Gateway Competitive For 30 Apr10
F5 Networks: architecture and risk management
Rl net scaler-ha&dr_xendesktop_set2012
Keynote Client Connectivity And The Cloud
Telesemana ce nominum:mef
Building and packaging highly scalable services for maximum market penetratio...
Citrix Net Scaler V9.0 Lb Highload Mar2009
Nikolay Sh Citrix Net Scaler V9.0 Lb
Nikolay Sh Citrix Net Scaler V9.0 Lb
Ad

More from Palo Alto Networks (18)

PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
PPTX
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
PPTX
Application Usage and Risk Report - Key Findings for US
PPTX
Application Usage on Enterprise Networks, December 2011.
Palo Alto Networks Application Usage and Risk Report - Key Findings for ANZ
Palo Alto Networks Application Usage and Risk Report - Key Findings for Rest ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Benelux
Palo Alto Networks Application Usage and Risk Report - Key Findings for Canada
Palo Alto Networks Application Usage and Risk Report - Key Findings for China
Palo Alto Networks Application Usage and Risk Report - Key Findings for Dach
Palo Alto Networks Application Usage and Risk Report - Key Findings for France
Palo Alto Networks Application Usage and Risk Report - Key Findings for Hong ...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Italy
Palo Alto Networks Application Usage and Risk Report - Key Findings for Midd...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Nordics
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Spain
Palo Alto Networks Application Usage and Risk Report - Key Findings for Taiwan
Palo Alto Networks Application Usage and Risk Report - Key Findings for Thailand
Palo Alto Networks Application Usage and Risk Report - Key Findings for UK
Application Usage and Risk Report - Key Findings for US
Application Usage on Enterprise Networks, December 2011.

Recently uploaded (20)

PPTX
A Presentation on Artificial Intelligence
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
A Presentation on Touch Screen Technology
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
August Patch Tuesday
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
A Presentation on Artificial Intelligence
cloud_computing_Infrastucture_as_cloud_p
Programs and apps: productivity, graphics, security and other tools
A Presentation on Touch Screen Technology
Assigned Numbers - 2025 - Bluetooth® Document
DP Operators-handbook-extract for the Mautical Institute
MIND Revenue Release Quarter 2 2025 Press Release
A novel scalable deep ensemble learning framework for big data classification...
August Patch Tuesday
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Web App vs Mobile App What Should You Build First.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Unlocking AI with Model Context Protocol (MCP)
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
WOOl fibre morphology and structure.pdf for textiles
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf

Aus cert event_2010

  • 1. Social Networking and Cyber-Security: Strength, Weakness, Opportunity, or Threat? Aus-Cert, May 2010
  • 2. About Palo Alto Networks • World-class team with strong security and networking experience • Founded in 2005 by security visionary Nir Zuk • Top-tier investors • Builds next-generation firewalls that identify / control 950+ applications • Restores the firewall as the core of the enterprise network security infrastructure • Innovations: App-ID™, User-ID™, Content-ID™ • Global footprint: 1,100+ customers in 60+ countries, 24/7 support
  • 3. Social Networking is No Longer a Fad • Hundreds of millions of people use social applications daily • Facebook has over 400 million users • LinkedIn has over 60 million users • Social bookmarking applications have roughly 10 million users each • Youtube is the 3rd most popular website on the Internet • Sales, marketing, public relations, human resources, product teams, and business development all see opportunity
  • 4. Social Networking is A Hotbed of Risk • Brand Damage • Mis-treat your customers at your own peril • Compliance • Using unapproved applications, (FINRA) • Business Continuity • Malware or application vulnerability induced downtime • Operations Costs • Excessive bandwidth consumption, desktop cleanup • Data Loss/Leakage • Unauthorized employee file transfer, data sharing • Productivity • Uncontrolled, excessive use for non-work related purposes
  • 5. Applications Are The Threat Vector • US$3.8M stolen from small school district in New York State • Zeus banking trojan stole credentials, enabled transfers • All but US$500K recovered • Increasingly, new and old threats using social networks • Social network-specific (e.g., Koobface, FBAction) • New life for old threats (e.g., Zeus/Zbot) • Huge user populations, high degree of trust, liberal use of SSL • But wait – we have those applications under control…
  • 6. Existing Control Mechanisms? • Applications have changed • Any port, random ports, encryption - all in use • Users feel entitled to use any application • New employees = always on, always connected
  • 7. Employees Will Find A Way… 80% RDP • Remote Access SSH 76% 62% telnet • 27 variants found 95% of 53% LogMeIn the time 42% TeamViewer CGIProxy 30% • External Proxies PHProxy 30% 27% • 22 variants found 76% of CoralCDN the time FreeGate 15% 14% Glype Proxy • Encrypted Tunnels Tor 15% 13% Hamachi • Non-VPN related – found 9% UltraSurf Frequency That the 30% of the time 3% Gbridge Application Was Detected 3% Gpass 00% 20% 40% 60% 80%
  • 8. Applications Are Not What They Seem Most Frequently Detected "Dynamic" Applications 100% 80% 83% 78% 77% 73% 60% 60% 60% 55% 54% 51% 40% 42% 20% 0% Sharepoint iTunes MS RPC Skype BitTorrent MSN Voice Ooyla Mediafire eMule Teamviewer Applications That are Capable of Tunneling • 67% of the applications Networking (73) 36 18 17 2 use port 80, port 443, or Collaboration (46) 18 25 12 hop ports Media (24) 8 12 13 General-Internet (17) 6 7 4 • 190 of them are Business-Systems (15) 10 41 client/server 0 25 50 75 • 177 can tunnel other Client-server (78) Browser-based (66) applications, a feature no Network-protocol (19) Peer-to-peer (12) longer reserved for SSL or SSH
  • 9. Enterprise 2.0 Use is Consistent; Intensity Up • Google Docs and Calendar resource consumption* is up 55% • Google Talk Gadget shot up by 56% while Google Talk dropped 76% • Bandwidth consumed by SharePoint and LinkedIn is up 14% and 48% respectively • Bandwidth consumed by Facebook, per organization, is a staggering 4.9 GB * Resource consumption = bandwidth and session usage
  • 10. Social Networking: Strengths Top line revenue Reaching new markets/customer groups Increasing sales in existing markets/customer groups Bottom line profit Reduction in cost of sales (disintermediation) Reduction in cost of support Reduction in cost of marketing
  • 11. Social Networking: Weaknesses Fraught with unmanaged risk Few policies Existing policies aren’t enforceable Savvy users Content controls/logging/auditing outdated Security models too restrictive Coarse allow/deny
  • 12. Social Networking: Opportunities Business opportunity Evolve security policies Evolve controls Make risk management/security relevant
  • 13. Threats - Social Networking Top 10 10 - Social networking worms 9 - Phishing bait 8 - Trojan vector 7 - Data leaks 6 - Shortened/obfuscated links 5 - Botnet command and control 4 - It’s a data source for attackers 3 - Cross-Site Request Forgery (CSRF) 2 - Impersonation 1 - Trust
  • 14. Recommendations • Policy • Gather • Listen • Redefine • Model – re-think or refine • Blindly blocking is somewhat draconian; blindly allowing is a CLM • Safe enablement is your new mantra • Controls • Visibility and control of applications, users, and content is key • “Allow, but…” controls are critical