!
Top 3 MAC Spoofing Challenges !
You Cannot Afford to Ignore
Data breaches are increasing
Identity Theft Resource !
Center reports in 2014
•  18.3% increase in data breaches
•  783 data breaches in the U.S.
•  85+ million records were affected

Verizon’s 2014 Data !
Breach Investigations Report
•  Internationally 1,367 confirmed data breaches in 2013
•  Over 10,000 data breaches in the last 10 years
Source:	
  Informa.on	
  is	
  Beau.ful	
  World’s	
  
Biggest	
  Data	
  Breaches	
  
Data breaches are costly
Ponemon’s 2014 report !
Cost of Data Breach: Global Analysis
•  Average data breach costs $3.5 million U.S. dollars
•  15% increase in cost over previous year

The research reveals that reputation and the loss of
customer loyalty does the most damage to the bottom line.
	
  
Data breaches are increasing
Figure from Verizon’s 2014 Data Breach Investigation Report
MAC spoofing
Definition: 

Connecting to the network with a falsified media access!
control (MAC) address
History of MAC spoofing
•  Whitelisting as a form of security
•  Falsifying MAC address was too easy for
hackers
•  Use MAC address as first line of defense,
and combine it with a more contextual
understanding of the device
Top 3 MAC spoofing challenges
Lack of visibility
Unable to keep a complete, real-time inventory of what
is on the network and where each endpoint is located

Internet of Things trend
Increase in headless and non-traditional devices on the
network

Trusting the device
Security that relies on the device being the sole source
of information
Challenge 1: Lack of visibility 
The problem

•  Don’t know where unauthorized access or entry
points into the system might be
•  Don’t know if there is an unauthorized device touching
the network (whether it is misconfigured, etc.)
•  Don’t know if security measures are protecting entire
network
The solution

•  Complete visibility of all endpoints on the network
–  Deeper historical and contextual understanding of
all devices on the network
Challenge 1: Lack of visibility
This is not as simple as it sounds
•  Time intensive task
•  Constantly changing landscape
–  Increased mobility
–  Guest access
•  BYOD initiatives
•  Need for user convenience
Challenge 1: Lack of visibility
To really solve the problem you need:

•  Automated technology to create an inventory
•  Access to contextual data
•  Continuous, real-time monitoring for an ever-changing network

Challenge 1: Lack of visibility
Challenge 2: Internet of Things
The trend
•  Increase in devices that use your network data to do
amazing things!

Fire extinguishers that tell you
when they are in use
Sprinklers that use weather
information to determine how
often to run
Trash cans that alert you
when they are full
The trend
VOIP Phones
HVAC Systems
Security Cameras
Challenge 2: Internet of Things
The problem

•  These devices are outside of the norm, meaning that
current solutions may have limited contextual information
about them
–  If the MAC address is spoofed the lack of context can make it
difficult to identify that a rogue device has been added to the
network
Challenge 2: Internet of Things
The solution

•  Visibility of all devices, including headless devices
•  Agentless or clientless security solution (since these often
have specific operating systems dependencies)
Challenge 2: Internet of Things
The problem

•  Trusting the device by MAC address or MAC OUI !
alone is risky
–  The MAC address is not enough information





MAC spoofing is based on a device being dishonest
Challenge 3: Trusting the device
“Communicating
externally”
	
  
“Running 
Windows apps”
	
  
176.16.232.134	
  
The solution
Warehouse of context
Challenge 3: Trusting the device
What is the
device?
How is 
the device!
behaving?
Where is the
device?
HOW WE CAN HELP?
The Beacon suite of solutions
Identify.
Ensure every endpoint accessing the network
is accounted for to eliminate vulnerable blind
spots.
Monitor.
Know how endpoints are behaving at all
times to easily identify and address potential
threats quickly.
Enforce.
Control access to the network to allow what
should be on the network on, and keep what
shouldn’t off.

“As far as seeing what’s "
on the network, it’s "
all about visibility and
troubleshooting. When you’re
trying to figure out, ‘what’s
plugged into this port?’ and
you can go and see that in
Beacon, it saves you time.” "
"
–Patrick Printz, "

current Beacon user
	
  
•  Comprehensive. !
Our software provides you with complete visibility. We detect and profile all device
types touching your network, including headless devices. 
•  Contextual. !
Our technology provides you with historical and real-time detailed context. 
–  What is the endpoint
–  Where is it located 
–  Is it behaving uncharacteristically
•  Scalable. !
Great Bay Software’s technology!
has been proven to scale to satisfy !
the largest of enterprise customers. 
•  Simple. !
Our technology is a sophisticated application that is actually easy to deploy and
manage. !

Why Beacon?
Contact Us
1.800.503.1715
info@greatbaysoftware.com

Find more resources and information at
www.greatbaysoftware.com 
QUESTIONS?

More Related Content

ODP
Cyber security awareness
PDF
Cyber security awareness presentation nepal
PPTX
The Evolution of Cybercrime
PPT
New internet security
PPT
Computer security
PPTX
Cyber security for Small and Medium CA
PPTX
Internet security
PPTX
Cybersecurity Awareness Session by Adam
Cyber security awareness
Cyber security awareness presentation nepal
The Evolution of Cybercrime
New internet security
Computer security
Cyber security for Small and Medium CA
Internet security
Cybersecurity Awareness Session by Adam

What's hot (20)

PPTX
Internet Security
PDF
How to make yourself hard to hack! slide share presentation
PPT
Cyber security awareness training by cyber security infotech(csi)
PPTX
Network basic security
PPTX
Information security awareness training
PDF
End-User Security Awareness
PPTX
Malware
PPT
It security training
PPTX
Cyber security
PDF
Covid 19, How A Pandemic Situation Shapes Cyber Threats
PPTX
Cyber Crime
PPTX
CYBER TERRORISM
PPTX
It security and awareness training 5 10-2018
PDF
To see things others can't - APTs, Incident Response, DDoS
PPTX
Basic Internet Security
PPT
internet security
PDF
Information Security Awareness Training
PPTX
Cybersecurity Awareness Training
PPTX
Information security awareness - 101
PPT
Cyber crime and security
Internet Security
How to make yourself hard to hack! slide share presentation
Cyber security awareness training by cyber security infotech(csi)
Network basic security
Information security awareness training
End-User Security Awareness
Malware
It security training
Cyber security
Covid 19, How A Pandemic Situation Shapes Cyber Threats
Cyber Crime
CYBER TERRORISM
It security and awareness training 5 10-2018
To see things others can't - APTs, Incident Response, DDoS
Basic Internet Security
internet security
Information Security Awareness Training
Cybersecurity Awareness Training
Information security awareness - 101
Cyber crime and security
Ad

Viewers also liked (10)

PPTX
Mac spoof avoider
PDF
Countermeasures to GPS Spoofing
PPT
1unit2ndpart
PPTX
Network Attacks and Countermeasures
PPT
RSA - WLAN Hacking
PPT
Seminariode Seguridad L2
PPT
Dynamic Port Scanning
PPTX
Packet sniffing in switched LANs
PDF
Neighbor discovery in wireless networks with multipacket reception
PDF
Network Attack Counter
Mac spoof avoider
Countermeasures to GPS Spoofing
1unit2ndpart
Network Attacks and Countermeasures
RSA - WLAN Hacking
Seminariode Seguridad L2
Dynamic Port Scanning
Packet sniffing in switched LANs
Neighbor discovery in wireless networks with multipacket reception
Network Attack Counter
Ad

Similar to Top 3 MAC Spoofing Challenges You Cannot Afford to Ignore (20)

PDF
ClubHack Magazine issue 26 March 2012
PDF
GBS - Prevent network security fires
PDF
CODE BLUE 2014 : Physical [In]Security: It’s not ALL about Cyber by Inbar Raz
PDF
A modern approach to safeguarding your ICS and SCADA systems
PDF
Plugging Network Security Holes Using NetFlow
PDF
Enterprise Edge Security with Cisco ISE
PPTX
2012 Reenergize the Americas 3B: Angel Avila
PPTX
Cyber Security
PPTX
Avila 3 b
PDF
IPv6 Security - Where is the Challenge?
PPTX
Gartner technologies for Infosec 2014-2015
PDF
LIFT OFF 2017: IoT and MSS Deep Dive
PDF
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
PDF
Luiz eduardo. introduction to mobile snitch
PPTX
security in IOT.pptx
PDF
Network Access Control (NAC)
PPTX
Iot(security)
PDF
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
PPT
Ids in wn
PDF
New challenges to secure the IoT (with notes)
ClubHack Magazine issue 26 March 2012
GBS - Prevent network security fires
CODE BLUE 2014 : Physical [In]Security: It’s not ALL about Cyber by Inbar Raz
A modern approach to safeguarding your ICS and SCADA systems
Plugging Network Security Holes Using NetFlow
Enterprise Edge Security with Cisco ISE
2012 Reenergize the Americas 3B: Angel Avila
Cyber Security
Avila 3 b
IPv6 Security - Where is the Challenge?
Gartner technologies for Infosec 2014-2015
LIFT OFF 2017: IoT and MSS Deep Dive
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Luiz eduardo. introduction to mobile snitch
security in IOT.pptx
Network Access Control (NAC)
Iot(security)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Ids in wn
New challenges to secure the IoT (with notes)

More from Great Bay Software (6)

PPTX
How Medical Devices Risk Patient Safety and Security
PDF
Decrease Cyber Risk at your Community Bank
PPTX
IoT DDoS Attacks: the stakes have changed
PPTX
IoT Slam Healthcare 12-02-2016
PPTX
OnDemand Webinar: Key Considerations to Securing the Internet of Things (IoT)...
PDF
Infographic: The crippled state of network security
How Medical Devices Risk Patient Safety and Security
Decrease Cyber Risk at your Community Bank
IoT DDoS Attacks: the stakes have changed
IoT Slam Healthcare 12-02-2016
OnDemand Webinar: Key Considerations to Securing the Internet of Things (IoT)...
Infographic: The crippled state of network security

Recently uploaded (20)

PDF
Vinod Bhatt - Most Inspiring Supply Chain Leader in India 2025.pdf
PPTX
Chapter 2 strategic Presentation (6).pptx
PDF
Business Communication for MBA Students.
PPTX
chapter 2 entrepreneurship full lecture ppt
PPTX
Market and Demand Analysis.pptx for Management students
PDF
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
PDF
#1 Safe and Secure Verified Cash App Accounts for Purchase.pdf
PPTX
33ABJFA6556B1ZP researhchzfrsdfasdfsadzd
PDF
Highest-Paid CEO in 2025_ You Won’t Believe Who Tops the List.pdf
PDF
Second Hand Fashion Call to Action March 2025
PPTX
Transportation in Logistics management.pptx
DOCX
Center Enamel A Strategic Partner for the Modernization of Georgia's Chemical...
PDF
Susan Semmelmann: Enriching the Lives of others through her Talents and Bless...
PPTX
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
PPT
Retail Management and Retail Markets and Concepts
PPTX
basic introduction to research chapter 1.pptx
PPTX
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
PDF
Cross-Cultural Leadership Practices in Education (www.kiu.ac.ug)
PPTX
Portfolio Example- Market & Consumer Insights – Strategic Entry for BYD UK.pptx
PDF
Comments on Clouds that Assimilate Parts I&II.pdf
Vinod Bhatt - Most Inspiring Supply Chain Leader in India 2025.pdf
Chapter 2 strategic Presentation (6).pptx
Business Communication for MBA Students.
chapter 2 entrepreneurship full lecture ppt
Market and Demand Analysis.pptx for Management students
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
#1 Safe and Secure Verified Cash App Accounts for Purchase.pdf
33ABJFA6556B1ZP researhchzfrsdfasdfsadzd
Highest-Paid CEO in 2025_ You Won’t Believe Who Tops the List.pdf
Second Hand Fashion Call to Action March 2025
Transportation in Logistics management.pptx
Center Enamel A Strategic Partner for the Modernization of Georgia's Chemical...
Susan Semmelmann: Enriching the Lives of others through her Talents and Bless...
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
Retail Management and Retail Markets and Concepts
basic introduction to research chapter 1.pptx
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
Cross-Cultural Leadership Practices in Education (www.kiu.ac.ug)
Portfolio Example- Market & Consumer Insights – Strategic Entry for BYD UK.pptx
Comments on Clouds that Assimilate Parts I&II.pdf

Top 3 MAC Spoofing Challenges You Cannot Afford to Ignore

  • 1. ! Top 3 MAC Spoofing Challenges ! You Cannot Afford to Ignore
  • 2. Data breaches are increasing Identity Theft Resource ! Center reports in 2014 •  18.3% increase in data breaches •  783 data breaches in the U.S. •  85+ million records were affected Verizon’s 2014 Data ! Breach Investigations Report •  Internationally 1,367 confirmed data breaches in 2013 •  Over 10,000 data breaches in the last 10 years Source:  Informa.on  is  Beau.ful  World’s   Biggest  Data  Breaches  
  • 3. Data breaches are costly Ponemon’s 2014 report ! Cost of Data Breach: Global Analysis •  Average data breach costs $3.5 million U.S. dollars •  15% increase in cost over previous year The research reveals that reputation and the loss of customer loyalty does the most damage to the bottom line.  
  • 4. Data breaches are increasing Figure from Verizon’s 2014 Data Breach Investigation Report
  • 5. MAC spoofing Definition: Connecting to the network with a falsified media access! control (MAC) address
  • 6. History of MAC spoofing •  Whitelisting as a form of security •  Falsifying MAC address was too easy for hackers •  Use MAC address as first line of defense, and combine it with a more contextual understanding of the device
  • 7. Top 3 MAC spoofing challenges Lack of visibility Unable to keep a complete, real-time inventory of what is on the network and where each endpoint is located Internet of Things trend Increase in headless and non-traditional devices on the network Trusting the device Security that relies on the device being the sole source of information
  • 8. Challenge 1: Lack of visibility The problem •  Don’t know where unauthorized access or entry points into the system might be •  Don’t know if there is an unauthorized device touching the network (whether it is misconfigured, etc.) •  Don’t know if security measures are protecting entire network
  • 9. The solution •  Complete visibility of all endpoints on the network –  Deeper historical and contextual understanding of all devices on the network Challenge 1: Lack of visibility
  • 10. This is not as simple as it sounds •  Time intensive task •  Constantly changing landscape –  Increased mobility –  Guest access •  BYOD initiatives •  Need for user convenience Challenge 1: Lack of visibility
  • 11. To really solve the problem you need: •  Automated technology to create an inventory •  Access to contextual data •  Continuous, real-time monitoring for an ever-changing network Challenge 1: Lack of visibility
  • 12. Challenge 2: Internet of Things The trend •  Increase in devices that use your network data to do amazing things! Fire extinguishers that tell you when they are in use Sprinklers that use weather information to determine how often to run Trash cans that alert you when they are full
  • 13. The trend VOIP Phones HVAC Systems Security Cameras Challenge 2: Internet of Things
  • 14. The problem •  These devices are outside of the norm, meaning that current solutions may have limited contextual information about them –  If the MAC address is spoofed the lack of context can make it difficult to identify that a rogue device has been added to the network Challenge 2: Internet of Things
  • 15. The solution •  Visibility of all devices, including headless devices •  Agentless or clientless security solution (since these often have specific operating systems dependencies) Challenge 2: Internet of Things
  • 16. The problem •  Trusting the device by MAC address or MAC OUI ! alone is risky –  The MAC address is not enough information MAC spoofing is based on a device being dishonest Challenge 3: Trusting the device “Communicating externally”   “Running Windows apps”   176.16.232.134  
  • 17. The solution Warehouse of context Challenge 3: Trusting the device What is the device? How is the device! behaving? Where is the device?
  • 18. HOW WE CAN HELP?
  • 19. The Beacon suite of solutions Identify. Ensure every endpoint accessing the network is accounted for to eliminate vulnerable blind spots. Monitor. Know how endpoints are behaving at all times to easily identify and address potential threats quickly. Enforce. Control access to the network to allow what should be on the network on, and keep what shouldn’t off. “As far as seeing what’s " on the network, it’s " all about visibility and troubleshooting. When you’re trying to figure out, ‘what’s plugged into this port?’ and you can go and see that in Beacon, it saves you time.” " " –Patrick Printz, " current Beacon user  
  • 20. •  Comprehensive. ! Our software provides you with complete visibility. We detect and profile all device types touching your network, including headless devices. •  Contextual. ! Our technology provides you with historical and real-time detailed context. –  What is the endpoint –  Where is it located –  Is it behaving uncharacteristically •  Scalable. ! Great Bay Software’s technology! has been proven to scale to satisfy ! the largest of enterprise customers. •  Simple. ! Our technology is a sophisticated application that is actually easy to deploy and manage. ! Why Beacon?
  • 21. Contact Us 1.800.503.1715 info@greatbaysoftware.com Find more resources and information at www.greatbaysoftware.com QUESTIONS?