SlideShare uma empresa Scribd logo
1 de 47
Baixar para ler offline
How Can a CIO Secure a Moving Target
      with Limited Resources?


                                Dr. Stefan Frei
                            Research Analyst Director
                                       Secunia


Session ID: SPO2-302
Session Classification: Intermediate
Know your Enemy
The Changing Threat Environment
                                                           Fastest
                                                          growing
             Personal                 Theft               segment
Motivation




                 Gain
                                                Author   Tools created by
             Personal                             of        experts now
               Fame                             Tools      used by less-
                         Vandalism                       skilled criminals,
                                                         for personal gain
             Curiosity


                          Script-    Hobbyist   Expert
                          Kiddy      Hacker

                              Attackers’ Expertise
Availability of Malware Tools
leads to ..

      High degree of attack
          automation



    More opportunistic attacks
Malware as a Service (MaaS)
                                     Malware offered for
                                     $249 with a Service
                                     Level Agreement and
                                     replacement
                                     warranty if the
                                     creation is detected
                                     by any anti-virus
                                     within 9 months




Source: www.turkojan.com
Malware Construction Kit
Live Demonstration
We “trojanize” Windows Minesweeper using an
off-the-shelf malware construction kit

Absolutely no coding expertise required!
Full Remote Control..
                              List / start / stop / disable services
Read clipboard


List and kill processes       Read / modify registry

Life capture and control of
desktop

                              Life capture of webcam or
Remote command console        microphone

Online / offline keylogger
                              Disable taskbar / desktop icons / start-
Execute commands              button, reboot, ..
                              Restart / update trojan. Load new
                              plug-ins
Malware Development Process
         Obfuscation & Quality Assurance
1 Original Malware
 Create core malicious
 functionality:
 DDoS, steal data,
 spread infection, ..




2     Permutations
                              3           Quality
                                                          4      Deployment
                                         Assurance            Only malware that
    Obfuscate malware.
    Create multiple serial        Test new creations          passed    QA     (not
    variants to thwart            against a number of         detected) is used for
    detection engines             up-to-date anti-virus       deployment
                                  engines

                             Reject if
                             detected
An Arms Race …

286 million    virus samples counted
               in 2010
 783,562       samples / day
  32,648       samples / hour
     544       samples / minute
       9       samples / second

       Source: Symantec Internet Security Threat Report (ISTR), Volume 16
Limitations of traditional defense
We are to loose this Arms Race ..


 25%           of 123 publicly known exploits
               missed by top 10 prevention products


 40%          missed after slight tweaking
              of the exploits
                                       NSS Labs Test of 2010/Q3

  Up to 9% of the end-points in enterprises are found to
  be bot infected
                                NSS Labs Anti-Malware Test Report 2010Q3
                                           Damballa on Darkreading, 2010
From a Criminal’s
      Perspective

#Hosts x #Vulnerabilities
           =
     Opportunity
Worldwide Internet Usage
    2,095 Million
    estimated Internet users on March 31st, 2011




                                    penetration of
                        31%         population


                       448%         growth from
                                    2000 to 2010
                                      Source: http://www.internetworldstats.com



                      12
2,095 Million potential victims..
End-points are increasingly targeted
     End-point are where the most valuable
 1   data is found to be the least protected
     By definition, end-point PCs have access to all data needed
     to conduct their business

     End-points are difficult to secure
 2   Highly dynamic environment and unpredictable usage
     patterns by users


     A single vulnerable program is enough
 3   Cybercriminals only need a single vulnerable program to
     compromise the entire system
From a Criminal’s
      Perspective

#Hosts x #Vulnerabilities
           =
     Opportunity
Analysis
What does an end-point look like?
Data: Scan results from more than 4.8 Mio users
of the Secunia Personal Software Inspector PSI

Secunia PSI is a lightweight scanner to
 enumerate and identify insecure programs
 automatically install missing patches




 Free for personal use http://secunia.com/psi
Distribution of   Distribution of
  #vendors         #programs
The Top-50 Software Portfolio ..
Covers the 50 most prevalent programs to
represent a typical end-point:
28 Microsoft and 22 third-party (non MS) programs
from 12 different vendors



   12                28                  22
                                          Third-
   Vendors          Microsoft
                                          party

                                     Top-50 Portfolio as of December 2011
An alarming trend ..
in # of end-point vulnerabilities
 Number of vulnerabilities continuously increased since 2007


                             870      Vulnerabilities
                                      in 2011




                                                        doubled
                                                         in two years
                             421 in 2009
                             229 in 2007



                                18
A relevant trend ..
in criticality and type of vulnerabilities

      800+
      Vulnerabilities


         of which


      >50%
What is the source
of this increasing trend?


            ?
OS          MS           TP
Operating   Microsoft   Third-party
 System     Programs     Programs
It is third-party programs
 Non-Microsoft programs are found to be almost
 exclusively responsible for this increasing trend

                                OS                What you
                                12%
                                      MS           patch
                                      10%
                  TP
                  Third-party
                  Programs

                  78%
Cybercriminals                                        Origin of vulnerabilities
                                        in the Top-50 Portfolio as of Dec 2011
  don’t care
The Operating System
& Top-50 Software Portfolio
                          Top 50 Portfolio
                                     2011


                                     +
  Vulnerabilities   870     Vulnerabilities   867   Vulnerabilities   869
How do we keep a typical
 end-point up to date?
Complexity hurts
12 different update mechanisms ..

 11 Update                                      1 Update
Mechanisms                       OS            Mechanism
                                 12%
   TO PATCH
                                       MS        TO PATCH
                                       10%
22 third-party
  programs
                   TP
                   Third-party
                                             OS+28 Microsoft
                                               programs
fix 78% of the     Programs                   fix 22% of the
 vulnerabilities                               vulnerabilities
                   78%
Cybercriminals
     know
patch available
       ≠
patch installed
Patch Complexity ..
has a measurable effect on security
           Percent of unpatched programs


                                              Third-Party




                                               Microsoft




                   2.7% insecure Microsoft programs
   2011 average    6.5% insecure Third-Party programs
You can’t hide
Even rare programs have exploits
                         Programs with low market share are
  FALLACY                not exposed - as no exploits exist


                               Exploit availability vs. market
                                    share of programs


  22% of the programs
  with 10-20% market
   share have exploits
Are we doomed?
The Good News
most patches are available on time!


72%
of the patches are available
 on the day of vulnerability   Patch Availability
                  disclosure

      72%           28%
Cybercriminals
.. don’t need zero-day exploits!
Malware propagation methods:

         of the attacks had no patch available at the
< 1%     day of attack (zero-day attack)
                                  Microsoft SIR 11 Report 1H2011




         Cybercriminals always find more than enough
         opportunity in unpatched and well
         understood program vulnerabilities
Instant patching of all programs is a
major challenge
                             What patching
                           strategy yields the
                               largest risk
                             reduction with
                           limited resources
                               available ?
Simulation
Static vs. Dynamic Patching
Say you have a portfolio of the 200 most
prevalent programs
On average, how many programs do you need
to patch every year to get a 80% risk reduction?

    Static Approach            Dynamic Approach
Patch the N most prevalent   Patch the N most critical
programs every year          programs every year
Statically patching
                        .. the most prevalent programs

                                       Percentage of risk remediated          Patching N of 200 programs
                                          by patching N programs
                                                                              Strategy 1: Static
                                100%                                          Risk remediated by patching the
Percentage of risk remediated




                                                                              N most prevalent programs
                                80%

                                60%

                                40%

                                20%
                                                                             80% risk reduction achieved
                                 0%                       37                 by patching the 37 most
                                       0         20            40       60   prevalent programs
                                           Number of programs patched
Statically patching
                        .. the most critical programs

                                       Percentage of risk remediated          Patching N of 200 programs
                                          by patching N programs
                                                                              Strategy 1: Static
                                100%                                          Risk remediated by patching the
Percentage of risk remediated




                                                                              N most prevalent programs
                                80%

                                60%
                                                                              Strategy 2: By Criticality
                                                                              Risk remediated by patching the
                                40%                                           N most critical programs

                                20%
                                                                             80% risk reduction achieved
                                 0%         12            37                 by either patching the 12 most
                                       0         20            40       60   critical programs, or by patch-
                                           Number of programs patched        ing the 37 most prevalent
                                                                             programs
Why?
.. chasing a moving target
    Programs vulnerable in one year, but not




                                               39%
        in the previous or following year




                                               of the programs vulnerable
                                               in one year are not
                                               vulnerable in the
                                               next year or
                                               vice versa


          Not vulnerable in
          other year
Job Security ..
It depends when you get 0wned
          ✓                      ✓                     ✗           time

  Patch not            Patch available           Patch available
  available             not installed              & installed
 valid excuse,                                 no excuse needed
 can’t do a lot             #@!;#$
limited feasible    protection available,         exploitation
   protection        not implemented            no more possible
           Patch released            Patch installed
A patch provides
       better protection
than thousands of signatures


    it eliminates the

root cause
Properties of a Patch
.. from a risk & operations perspective
    No false positives (no false alarms)
    No false negatives (no missed attacks)
    No latency or other delays introduced
    No resources whatsoever consumed after
     deployment


       A patch essentially terminates
        the arms race with cybercriminals
The Known Unknowns
Business                              Criminals
 View                                   View
              Your Infrastructure
           Microsoft    Third Party
           Programs      Programs
              1/5           4/5
The Known Unknowns
Business                                Criminals
 View                                     View
              Your Infrastructure
           Microsoft      Third Party
           Programs        Programs
              1/5             4/5

                business critical
                   programs
             programs you know
                   about
              programs you don’t
                 know about
The Known Unknowns
Business                                 Criminals
 View                                      View
               Your Infrastructure
            Microsoft      Third Party
            Programs        Programs
               1/5             4/5

 What you        business critical
  patch             programs
              programs you know
                    about
               programs you don’t
                  know about
The Known Unknowns
Business                                 Criminals
 View                                      View
               Your Infrastructure
            Microsoft      Third Party
            Programs        Programs
               1/5             4/5
                                         What they
 What you        business critical        attack
  patch             programs
              programs you know
                    about
               programs you don’t
                  know about
Common Fallacy

               Business                               Cybercriminal
Program X is not                                 Program X is just the
business critical,                               attack vector to
therefore we won’t                               compromise the entire
spend time patching it                           system

X = { Adobe Flash, Reader, Firefox, Java, .. }




                    Exploitation of any program can
                    compromise the entire end-point
Failure of End-Point Security
What is needed:
 Reduce Complexity
  We need tools to simplify and automate
  patch management in order to master the
  complexity

 Intelligence
  We need tools to enumerate and identify all
  critical programs to ensure we spend
  resources on the relevant parts
Conclusion - I
Know your enemy and risks
 Microsoft is still perceived as the primary
  attack vector
  Our defense likely locks the front door while
  the back door remains wide open

 Intelligence
  Knowing all programs and the risks is critical
  in this dynamic environment
  This saves resources in remediation process
Conclusion - II
Know your tools
 We need Antivirus, IDS/IPS, ..
  But we also need to know the limitations of
  those technologies

 Patching is a primary security measure
  Given the effectiveness of eliminating the
  root cause, and the availability of patches
Stay Secure!

    Dr. Stefan Frei

Mail: sfrei@secunia.com
 Twitter: @stefan_frei

    secunia.com
Supporting Material

 Secunia 2011 Yearly Report
 http://secunia.com/company/2011_yearly_report/


 How to Secure a Moving Target with Limited Resources
 http://bit.ly/hzzlPi


 RSA Paper “Security Exposure of Software Portfolios”
 http://bit.ly/eQbwus

 Secunia Quarterly Security Factsheets
 http://secunia.com/factsheets


 Secunia Personal Software Inspector (PSI)
  free for personal use
 http://secunia.com/psi

Mais conteúdo relacionado

Mais procurados

HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROIDHONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROIDIJCNCJournal
 
SecurityBSides London - Jedi mind tricks for building application security pr...
SecurityBSides London - Jedi mind tricks for building application security pr...SecurityBSides London - Jedi mind tricks for building application security pr...
SecurityBSides London - Jedi mind tricks for building application security pr...Security Ninja
 
Automated Sample Processing
Automated Sample ProcessingAutomated Sample Processing
Automated Sample ProcessingNohcs777
 
Malware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial ViewMalware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial ViewAntiy Labs
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile DeviceTyler Shields
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security SoftwareSymantec Italia
 
A software authentication system for the prevention of computer viruses
A software authentication system for the prevention of computer virusesA software authentication system for the prevention of computer viruses
A software authentication system for the prevention of computer virusesUltraUploader
 
Workshop on Setting up Malware Lab
Workshop on Setting up Malware LabWorkshop on Setting up Malware Lab
Workshop on Setting up Malware LabCharles Lim
 
An email worm vaccine architecture
An email worm vaccine architectureAn email worm vaccine architecture
An email worm vaccine architectureUltraUploader
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityUltraUploader
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?Windstream Enterprise
 

Mais procurados (18)

HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROIDHONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
 
SecurityBSides London - Jedi mind tricks for building application security pr...
SecurityBSides London - Jedi mind tricks for building application security pr...SecurityBSides London - Jedi mind tricks for building application security pr...
SecurityBSides London - Jedi mind tricks for building application security pr...
 
AVG Threat Report Q4 2012
AVG Threat Report Q4 2012AVG Threat Report Q4 2012
AVG Threat Report Q4 2012
 
Automated Sample Processing
Automated Sample ProcessingAutomated Sample Processing
Automated Sample Processing
 
Bilge12 zero day
Bilge12 zero dayBilge12 zero day
Bilge12 zero day
 
Threat Report H2 2012
Threat Report H2 2012Threat Report H2 2012
Threat Report H2 2012
 
Malware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial ViewMalware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial View
 
Sality peer to_peer_viral_network
Sality peer to_peer_viral_networkSality peer to_peer_viral_network
Sality peer to_peer_viral_network
 
Rm
RmRm
Rm
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile Device
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security Software
 
A software authentication system for the prevention of computer viruses
A software authentication system for the prevention of computer virusesA software authentication system for the prevention of computer viruses
A software authentication system for the prevention of computer viruses
 
Workshop on Setting up Malware Lab
Workshop on Setting up Malware LabWorkshop on Setting up Malware Lab
Workshop on Setting up Malware Lab
 
Privacy, Security
Privacy, SecurityPrivacy, Security
Privacy, Security
 
Security presentation
Security presentationSecurity presentation
Security presentation
 
An email worm vaccine architecture
An email worm vaccine architectureAn email worm vaccine architecture
An email worm vaccine architecture
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?
 

Destaque

Zarafa SummerCamp 2012 - Basic Introduction WebApp plugin development
Zarafa SummerCamp 2012 - Basic Introduction WebApp plugin developmentZarafa SummerCamp 2012 - Basic Introduction WebApp plugin development
Zarafa SummerCamp 2012 - Basic Introduction WebApp plugin developmentZarafa
 
Avaya Partners with Brand Embassy to Provide Digital Customer Service to Ente...
Avaya Partners with Brand Embassy to Provide Digital Customer Service to Ente...Avaya Partners with Brand Embassy to Provide Digital Customer Service to Ente...
Avaya Partners with Brand Embassy to Provide Digital Customer Service to Ente...Brand Embassy
 
Where the most popular Youtube stars are today
Where the most popular Youtube stars are todayWhere the most popular Youtube stars are today
Where the most popular Youtube stars are todaySimply Zesty Ltd
 
Netbiscuits Company Overview May 2014
Netbiscuits Company Overview May 2014Netbiscuits Company Overview May 2014
Netbiscuits Company Overview May 2014Netbiscuits
 
When Everyone Talks At Once, But Leaders Still Know What To Do
When Everyone Talks At Once, But Leaders Still Know What To DoWhen Everyone Talks At Once, But Leaders Still Know What To Do
When Everyone Talks At Once, But Leaders Still Know What To Do9Lenses
 
Evolution in memory games
Evolution in memory gamesEvolution in memory games
Evolution in memory gamesDEVART
 
Hive social student engagement
Hive social student engagementHive social student engagement
Hive social student engagementEnterprise Hive
 
CRCC Corporate Overview
CRCC Corporate OverviewCRCC Corporate Overview
CRCC Corporate OverviewBrett Payne
 
What Lies Ahead
What Lies AheadWhat Lies Ahead
What Lies AheadMoboom
 
SoulCRM Brochure
SoulCRM BrochureSoulCRM Brochure
SoulCRM BrochureSoulCRM
 
Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013GFI Software
 
Dynamic Benchmarking For Franchises
Dynamic Benchmarking For FranchisesDynamic Benchmarking For Franchises
Dynamic Benchmarking For FranchisesDynamic Benchmarking
 

Destaque (20)

Zarafa SummerCamp 2012 - Basic Introduction WebApp plugin development
Zarafa SummerCamp 2012 - Basic Introduction WebApp plugin developmentZarafa SummerCamp 2012 - Basic Introduction WebApp plugin development
Zarafa SummerCamp 2012 - Basic Introduction WebApp plugin development
 
Avaya Partners with Brand Embassy to Provide Digital Customer Service to Ente...
Avaya Partners with Brand Embassy to Provide Digital Customer Service to Ente...Avaya Partners with Brand Embassy to Provide Digital Customer Service to Ente...
Avaya Partners with Brand Embassy to Provide Digital Customer Service to Ente...
 
Where the most popular Youtube stars are today
Where the most popular Youtube stars are todayWhere the most popular Youtube stars are today
Where the most popular Youtube stars are today
 
Netbiscuits Company Overview May 2014
Netbiscuits Company Overview May 2014Netbiscuits Company Overview May 2014
Netbiscuits Company Overview May 2014
 
How to Hire a PR Firm
How to Hire a PR FirmHow to Hire a PR Firm
How to Hire a PR Firm
 
Infocom webinar race car metaphore
Infocom webinar   race car metaphoreInfocom webinar   race car metaphore
Infocom webinar race car metaphore
 
Presenting John Loder
Presenting John LoderPresenting John Loder
Presenting John Loder
 
CRM on Demand India ,
CRM on Demand India , CRM on Demand India ,
CRM on Demand India ,
 
When Everyone Talks At Once, But Leaders Still Know What To Do
When Everyone Talks At Once, But Leaders Still Know What To DoWhen Everyone Talks At Once, But Leaders Still Know What To Do
When Everyone Talks At Once, But Leaders Still Know What To Do
 
Impel elemech-company
Impel elemech-companyImpel elemech-company
Impel elemech-company
 
The Benefits of FileMaker Pro
The Benefits of FileMaker ProThe Benefits of FileMaker Pro
The Benefits of FileMaker Pro
 
Evolution in memory games
Evolution in memory gamesEvolution in memory games
Evolution in memory games
 
Step Up Business Intelligence
Step Up Business Intelligence Step Up Business Intelligence
Step Up Business Intelligence
 
первая
перваяпервая
первая
 
Hive social student engagement
Hive social student engagementHive social student engagement
Hive social student engagement
 
CRCC Corporate Overview
CRCC Corporate OverviewCRCC Corporate Overview
CRCC Corporate Overview
 
What Lies Ahead
What Lies AheadWhat Lies Ahead
What Lies Ahead
 
SoulCRM Brochure
SoulCRM BrochureSoulCRM Brochure
SoulCRM Brochure
 
Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013
 
Dynamic Benchmarking For Franchises
Dynamic Benchmarking For FranchisesDynamic Benchmarking For Franchises
Dynamic Benchmarking For Franchises
 

Semelhante a Maximize Computer Security With Limited Ressources

The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityLumension
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
Metascan Multi-scanning Technology
Metascan Multi-scanning TechnologyMetascan Multi-scanning Technology
Metascan Multi-scanning TechnologyOPSWAT
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...Lumension
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
The unprecedented state of web insecurity
The unprecedented state of web insecurityThe unprecedented state of web insecurity
The unprecedented state of web insecurityVincent Kwon
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...Andris Soroka
 
Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011Source Conference
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Deb Birch
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008tswong
 
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack SurfaceHow to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack SurfaceSparkCognition
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionWayne Huang
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasAditya K Sood
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionWebroot
 
Battling Malware In The Enterprise
Battling Malware In The EnterpriseBattling Malware In The Enterprise
Battling Malware In The EnterpriseAyed Al Qartah
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseLumension
 

Semelhante a Maximize Computer Security With Limited Ressources (20)

The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day Reality
 
NetWitness
NetWitnessNetWitness
NetWitness
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Metascan Multi-scanning Technology
Metascan Multi-scanning TechnologyMetascan Multi-scanning Technology
Metascan Multi-scanning Technology
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
The unprecedented state of web insecurity
The unprecedented state of web insecurityThe unprecedented state of web insecurity
The unprecedented state of web insecurity
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack SurfaceHow to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware Infection
 
Battling Malware In The Enterprise
Battling Malware In The EnterpriseBattling Malware In The Enterprise
Battling Malware In The Enterprise
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your Enterprise
 

Último

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Maximize Computer Security With Limited Ressources

  • 1. How Can a CIO Secure a Moving Target with Limited Resources? Dr. Stefan Frei Research Analyst Director Secunia Session ID: SPO2-302 Session Classification: Intermediate
  • 2. Know your Enemy The Changing Threat Environment Fastest growing Personal Theft segment Motivation Gain Author Tools created by Personal of experts now Fame Tools used by less- Vandalism skilled criminals, for personal gain Curiosity Script- Hobbyist Expert Kiddy Hacker Attackers’ Expertise
  • 3. Availability of Malware Tools leads to .. High degree of attack automation More opportunistic attacks
  • 4. Malware as a Service (MaaS) Malware offered for $249 with a Service Level Agreement and replacement warranty if the creation is detected by any anti-virus within 9 months Source: www.turkojan.com
  • 5. Malware Construction Kit Live Demonstration We “trojanize” Windows Minesweeper using an off-the-shelf malware construction kit Absolutely no coding expertise required!
  • 6. Full Remote Control.. List / start / stop / disable services Read clipboard List and kill processes Read / modify registry Life capture and control of desktop Life capture of webcam or Remote command console microphone Online / offline keylogger Disable taskbar / desktop icons / start- Execute commands button, reboot, .. Restart / update trojan. Load new plug-ins
  • 7. Malware Development Process Obfuscation & Quality Assurance 1 Original Malware Create core malicious functionality: DDoS, steal data, spread infection, .. 2 Permutations 3 Quality 4 Deployment Assurance Only malware that Obfuscate malware. Create multiple serial Test new creations passed QA (not variants to thwart against a number of detected) is used for detection engines up-to-date anti-virus deployment engines Reject if detected
  • 8. An Arms Race … 286 million virus samples counted in 2010 783,562 samples / day 32,648 samples / hour 544 samples / minute 9 samples / second Source: Symantec Internet Security Threat Report (ISTR), Volume 16
  • 9. Limitations of traditional defense We are to loose this Arms Race .. 25% of 123 publicly known exploits missed by top 10 prevention products 40% missed after slight tweaking of the exploits NSS Labs Test of 2010/Q3 Up to 9% of the end-points in enterprises are found to be bot infected NSS Labs Anti-Malware Test Report 2010Q3 Damballa on Darkreading, 2010
  • 10. From a Criminal’s Perspective #Hosts x #Vulnerabilities = Opportunity
  • 11. Worldwide Internet Usage 2,095 Million estimated Internet users on March 31st, 2011 penetration of 31% population 448% growth from 2000 to 2010 Source: http://www.internetworldstats.com 12
  • 12. 2,095 Million potential victims.. End-points are increasingly targeted End-point are where the most valuable 1 data is found to be the least protected By definition, end-point PCs have access to all data needed to conduct their business End-points are difficult to secure 2 Highly dynamic environment and unpredictable usage patterns by users A single vulnerable program is enough 3 Cybercriminals only need a single vulnerable program to compromise the entire system
  • 13. From a Criminal’s Perspective #Hosts x #Vulnerabilities = Opportunity
  • 14. Analysis What does an end-point look like? Data: Scan results from more than 4.8 Mio users of the Secunia Personal Software Inspector PSI Secunia PSI is a lightweight scanner to  enumerate and identify insecure programs  automatically install missing patches  Free for personal use http://secunia.com/psi
  • 15. Distribution of Distribution of #vendors #programs
  • 16. The Top-50 Software Portfolio .. Covers the 50 most prevalent programs to represent a typical end-point: 28 Microsoft and 22 third-party (non MS) programs from 12 different vendors 12 28 22 Third- Vendors Microsoft party Top-50 Portfolio as of December 2011
  • 17. An alarming trend .. in # of end-point vulnerabilities Number of vulnerabilities continuously increased since 2007 870 Vulnerabilities in 2011 doubled in two years 421 in 2009 229 in 2007 18
  • 18. A relevant trend .. in criticality and type of vulnerabilities 800+ Vulnerabilities of which >50%
  • 19. What is the source of this increasing trend? ? OS MS TP Operating Microsoft Third-party System Programs Programs
  • 20. It is third-party programs Non-Microsoft programs are found to be almost exclusively responsible for this increasing trend OS What you 12% MS patch 10% TP Third-party Programs 78% Cybercriminals Origin of vulnerabilities in the Top-50 Portfolio as of Dec 2011 don’t care
  • 21. The Operating System & Top-50 Software Portfolio Top 50 Portfolio 2011 + Vulnerabilities 870 Vulnerabilities 867 Vulnerabilities 869
  • 22. How do we keep a typical end-point up to date?
  • 23. Complexity hurts 12 different update mechanisms .. 11 Update 1 Update Mechanisms OS Mechanism 12% TO PATCH MS TO PATCH 10% 22 third-party programs TP Third-party OS+28 Microsoft programs fix 78% of the Programs fix 22% of the vulnerabilities vulnerabilities 78%
  • 24. Cybercriminals know patch available ≠ patch installed
  • 25. Patch Complexity .. has a measurable effect on security Percent of unpatched programs Third-Party Microsoft 2.7% insecure Microsoft programs 2011 average 6.5% insecure Third-Party programs
  • 26. You can’t hide Even rare programs have exploits Programs with low market share are FALLACY not exposed - as no exploits exist Exploit availability vs. market share of programs 22% of the programs with 10-20% market share have exploits
  • 28. The Good News most patches are available on time! 72% of the patches are available on the day of vulnerability Patch Availability disclosure 72% 28%
  • 29. Cybercriminals .. don’t need zero-day exploits! Malware propagation methods: of the attacks had no patch available at the < 1% day of attack (zero-day attack) Microsoft SIR 11 Report 1H2011 Cybercriminals always find more than enough opportunity in unpatched and well understood program vulnerabilities
  • 30. Instant patching of all programs is a major challenge What patching strategy yields the largest risk reduction with limited resources available ?
  • 31. Simulation Static vs. Dynamic Patching Say you have a portfolio of the 200 most prevalent programs On average, how many programs do you need to patch every year to get a 80% risk reduction? Static Approach Dynamic Approach Patch the N most prevalent Patch the N most critical programs every year programs every year
  • 32. Statically patching .. the most prevalent programs Percentage of risk remediated Patching N of 200 programs by patching N programs Strategy 1: Static 100% Risk remediated by patching the Percentage of risk remediated N most prevalent programs 80% 60% 40% 20% 80% risk reduction achieved 0% 37 by patching the 37 most 0 20 40 60 prevalent programs Number of programs patched
  • 33. Statically patching .. the most critical programs Percentage of risk remediated Patching N of 200 programs by patching N programs Strategy 1: Static 100% Risk remediated by patching the Percentage of risk remediated N most prevalent programs 80% 60% Strategy 2: By Criticality Risk remediated by patching the 40% N most critical programs 20% 80% risk reduction achieved 0% 12 37 by either patching the 12 most 0 20 40 60 critical programs, or by patch- Number of programs patched ing the 37 most prevalent programs
  • 34. Why? .. chasing a moving target Programs vulnerable in one year, but not 39% in the previous or following year of the programs vulnerable in one year are not vulnerable in the next year or vice versa Not vulnerable in other year
  • 35. Job Security .. It depends when you get 0wned ✓ ✓ ✗ time Patch not Patch available Patch available available not installed & installed valid excuse, no excuse needed can’t do a lot #@!;#$ limited feasible protection available, exploitation protection not implemented no more possible Patch released Patch installed
  • 36. A patch provides better protection than thousands of signatures it eliminates the root cause
  • 37. Properties of a Patch .. from a risk & operations perspective  No false positives (no false alarms)  No false negatives (no missed attacks)  No latency or other delays introduced  No resources whatsoever consumed after deployment  A patch essentially terminates the arms race with cybercriminals
  • 38. The Known Unknowns Business Criminals View View Your Infrastructure Microsoft Third Party Programs Programs 1/5 4/5
  • 39. The Known Unknowns Business Criminals View View Your Infrastructure Microsoft Third Party Programs Programs 1/5 4/5 business critical programs programs you know about programs you don’t know about
  • 40. The Known Unknowns Business Criminals View View Your Infrastructure Microsoft Third Party Programs Programs 1/5 4/5 What you business critical patch programs programs you know about programs you don’t know about
  • 41. The Known Unknowns Business Criminals View View Your Infrastructure Microsoft Third Party Programs Programs 1/5 4/5 What they What you business critical attack patch programs programs you know about programs you don’t know about
  • 42. Common Fallacy Business Cybercriminal Program X is not Program X is just the business critical, attack vector to therefore we won’t compromise the entire spend time patching it system X = { Adobe Flash, Reader, Firefox, Java, .. } Exploitation of any program can compromise the entire end-point
  • 43. Failure of End-Point Security What is needed:  Reduce Complexity We need tools to simplify and automate patch management in order to master the complexity  Intelligence We need tools to enumerate and identify all critical programs to ensure we spend resources on the relevant parts
  • 44. Conclusion - I Know your enemy and risks  Microsoft is still perceived as the primary attack vector Our defense likely locks the front door while the back door remains wide open  Intelligence Knowing all programs and the risks is critical in this dynamic environment This saves resources in remediation process
  • 45. Conclusion - II Know your tools  We need Antivirus, IDS/IPS, .. But we also need to know the limitations of those technologies  Patching is a primary security measure Given the effectiveness of eliminating the root cause, and the availability of patches
  • 46. Stay Secure! Dr. Stefan Frei Mail: sfrei@secunia.com Twitter: @stefan_frei secunia.com
  • 47. Supporting Material  Secunia 2011 Yearly Report http://secunia.com/company/2011_yearly_report/  How to Secure a Moving Target with Limited Resources http://bit.ly/hzzlPi  RSA Paper “Security Exposure of Software Portfolios” http://bit.ly/eQbwus  Secunia Quarterly Security Factsheets http://secunia.com/factsheets  Secunia Personal Software Inspector (PSI) free for personal use http://secunia.com/psi