O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.

Pentest trends 2017

1.022 visualizações

Publicada em

Artículo escrito en Pentest Magazine:
Zoomeye- search engine for cyberspace

Publicada em: Tecnologia
  • Login to see the comments

Pentest trends 2017

  1. 1. Managing Editor: Anna Kondzierska 
 anna.kondzierska@pentestmag.com Proofreaders & Betatesters: Lee McKenzie, Avi Benchimol, Da Co, David Kosorok, John Webb, Sagar Rahalkar. Special thanks to the Betatesters & Proofreaders who helped with this issue. Without their assistance there would not be a PenTest Magazine. Senior Consultant/Publisher: Pawel Marciniak 
 CEO: Joanna Kretowicz
 joanna.kretowicz@pentestmag.com DTP: Anna Kondzierska Publisher: Hakin9 Media Sp.z o.o. SK 02-676 Warsaw, Poland
 ul. Postepu 17D
 Phone: 1 917 338 3631 www.pentestmag.com Whilst every effort has been made to ensure the high quality of the magazine, the editors make no warranty, express or implied, concering the results of content usage. All trade marks presented in the magazine were used only for informative purposes. All rights to trade marks presented in the magazine are reserved by the companies which own them. DISCLAIMER! The techniques described in our articles may only be used in private, local networks. The editors hold no responsibility for misuse of the presented techniques or consequent data loss. 1
  2. 2. Table of contents Zoomeye- search engine for cyberspace
 by Jorge González Milla 4 SAP Security. Today’s state, future trends and predictions.
 by Darya Maenkova 9 Present and future of cyber security - What’s in store to become a cyber warrior?
 by Samrat Das 14 An IoT landscape for 2017
 by Jason Bernier 17 The Evolution of MicroEncryption® Type Technology
 by Steven Russo 18 Threat Modeling Template for Beginners
 by Dr. Narendiran Chandrasekaran 23 Watching the Watchers using Deception Techniques
 by Muruganandam 26 Cybersecurity and penetration testing.Trends in 2017 Approaches by: Ali Tabish 35 Mihai Raneti 38 Amar Wakharkar and Mary Nowottnick 41 Celal Cagri 43 Ahmed Atef Selim 45 Washington Umpierres de Almeida Junior 49
  3. 3. 3 Dear PenTest Readers, We would like to proudly present you the newest issue of PenTest Open, which is free to download for everyone interested in the topic. We hope that you will find many interesting articles inside the magazine and that you will have time to read all of them. We’re approaching the end of the year so it’s time to sum up past year and think about the future. During 2016 we could read about dozens, of data breaches. The biggest companies in the world suffered from them: Snapchat, Linkedin, Oracle, Dropbox, Yahoo or Cisco. What’s even more alarming is that the number of attacks on public institutions is rising. In 2016 we could observe attacks on University of Central Florida, U.S. Department of Justice, Philippine Commission on Elections, and couple of hospitals and power stations. Furthermore cybercriminals are using more advanced and complicated methods. We were overwhelmed by amount of information about malware, phishing attacks, ransomware, and data leaks. The good thing is that companies can deal better and better with attack and data breaches, but still it’s more about incident response than regular pentesting and constantly upgrading company’s security posture. So what can we expect next year? Are there going be more or less attacks and data breaches? And who is going to be a target? In this OPEN issue you will read different opinions about future of cybersecurity and penetration testing given by specialists from all around the world. You can read about MicroEncryption methodology and its features. We’ll cover topics like: business disruption, threat intelligence & management, IoT landscape, and cybersecurity market. There is also an article about Zoomeye - search engine for Cyberspace, and how to use it. We’ll dive into topics like MiTB and SSL/TLS protocol attacks and deception techniques. We’ll show you a threat modeling template for beginners, where features and components of this process will be broadly explained to you. We would also want to thank you for all your support. We appreciate it a lot. If you like this publication you can share it and tell your friends about it! Every comment means a lot to us. As always, special thanks to the Beta testers and Proofreaders who helped with this issue. Without your assistance there would be no PenTest Magazine. Also we want to take this opportunity to wish you a Happy New Year! Enjoy your reading, PenTest Magazine’s Editorial Team
  4. 4. Zoomeye- search engine for cyberspace When the internet is tried to be implemented where it is basically useless or has very little use and, moreover, ISPs do not help much, chaos takes over devices. A simple search in any given “dark engine” is enough to realize how many devices keep their default settings or come with no default configuration at all. ZoomEye is the cyberSpace search engine you never heard of… Everyone knows about the beloved Shodan and the new valid alternative Censys for searching IoT devices, but are you sure you aren’t missing anything? ZoomEye is a search engine for cyberspace, it is especially created for hunting the demons in cyberspace. ZoomEye is a search engine developed by Knownsec Inc, a Chinese security firm based in Beijing. The first version of ZoomEye was released on 1st July 2013 and it underwent continuous development until now, reaching version 3. ZoomEye uses Xmap and Wmap at its core to grab data from publicly exposed devices and web services and doing fingerprint analysis. ZoomEye is simpler and more intuitive than Shodan, it allows pagination without prior registration. We can use filters to search for devices, it is not illegal, because it simply collects devices that are visible on the Internet. It can also search for banners or make requests to some common ports and then it stores the information returned in the headers provided by the server. This information is stored and often used to indicate or identify the software that serves us. 4 ISPs should take their routers’ security seriously, whereas companies should do the same with their devices’ safety. Otherwise, everyday consumers will be unprotected. These days, any user with an average knowledge in the field could take control of devices to carry out unconstrained attacks. Many people already know Shodan, that engine for devices connected to the Internet, but today may
 I present to you… ZoomEye. by Jorge González Milla
  5. 5. Services, ports, countries, cities, default settings and many more possibilities at a mouse click’s reach, thanks to the potential of “dorks”. It is widely known that Windows XP no longer has support from Microsoft long ago. We can easily discover devices running Windows XP with a simple “dork” in ZoomEye. We can also discover services, servers, ports and many more… 5
  6. 6. Even printing systems… Surprisingly, some printers provide too much information when we try to access them (without any credentials). These are all hints and hints for cybercriminals. 6
  7. 7. Web servers running under Windows OS in Spain: If we move to the top mobile OS, we can find a huge amount of devices. When opening the main page, we can already see Android-based operating systems running that we can investigate, and we have noticed the following: Just by using our imagination, we can get loads of information. Raspberry is another widely used, inexpensive and easily accessible device. 7
  8. 8. Biometrics systems, coffee makers, light bulbs… all these devices, being connected and configured by an inexpert user or running the default settings... it can be scary. ISPs should take action, as they cannot expect the everyday user to correctly set their device. Remember, what we have shown you here is just the tip of the iceberg… Why take action? Simply by putting the filter “Anonymous access allowed”, we will observe that the services will be deployed to which we can access anonymously. And this is only in ZoomEye... Imagine such big problems, if some malicious intent tries to wreak havoc by uploading malware (as we saw above) or doing other kinds of things that are devised. If we do not take steps to prevent cyber attacks, the Internet could die. Thousands of attacks per second, infected people attacking without consent, etc. The chaos could be the Internet. 8 My name is Jorge, I am from Jaén, Andalucía, Spain. I am currently an analyst programmer and security analyst. I also do pentesting. Since 2006 I dedicate myself to computer science and since 2014 I am in cybersecurity. Aside from ethical hacking, I like to read, the sport and my work. I would like to work solely as a security analyst / pentester as it is my passion. I have worked in several companies to become a programmer analyst and I have also worked as a pentester although I do not have much experience, so I would like to work as a pentester, because it is what I really love. Author: Jorge González Milla
  9. 9. SAP Security. Today’s state, future trends and predictions. Interest in SAP security is growing. Within the last 10 years, experts delivered a lot of talks on SAP cybersecurity. Studies related to this topic were featured in the top international media (e.g., Forbes, The Guardian, Wired, Financial Times, etc.). So, nowadays, it’s hard to believe that SAP Security used to be terra incognita in the past. All these warnings were for a reason, as within the last three years, several highly significant incidents related to the SAP cybersecurity occurred (NVidia breach in 2014, OPM Breach in 2015, and US-CERT alert on an SAP vulnerability). To make accurate predictions, we should first get to know what the state of SAP Cybersecurity is today and what emerging use cases we can observe now. State of SAP Security To give a full picture of SAP Cybersecurity, we focused on two aspects: SAP Product Security and SAP Implementation Security. Product Security This part relates to vulnerability statistics. The average number of security patches for SAP products (aka SAP Security Notes) per year has slightly decreased. Surprisingly, it doesn’t mean that the number of the issues has dropped, too. The vendor now may fix multiple vulnerabilities in one patch, while three years ago, each patch addressed a particular one. Actually, the number of patches is still quite high. 9 The article describes the state of SAP cybersecurity with a special focus on SAP Product Security (statistics according to released patches) and SAP Implementation Security. In light of all the facts, we forecast which topics will attract researchers’ attention in the near future. by Darya Maenkova
  10. 10. Number of SAP Security Notes per year In total, 3794 SAP Security Notes and Support Package Implementation Notes have been published as of November, 2016. Most of the issues (69%) were rated high priority and hot news, i.e., about 2/3 of the fixes must be applied as soon as possible. The most common vulnerability types remain XSS, missing authorization check, and directory traversal. Figure 1. SAP Security Notes by type The list of vulnerable SAP platforms has extended and now it includes modern cloud and mobile technologies, such as HANA. The new platforms are more exposed to the Internet, which facilitates an attack. There are vulnerabilities in almost every SAP module: CRM takes the leading position among them, following by EP and SRM. However, one shouldn’t underestimate vulnerabilities affecting SAP HANA and SAP Mobile apps. The traditional SAP modules (like ones mentioned before) were introduced about two dozen years ago, but the first vulnerabilities were discovered just several years ago, i.e., SAP HANA and SAP Mobile apps attracted researchers’ (and, unfortunately, hackers’) attention quicker than the traditional ones. Figure 2. SAP Vulnerabilities by application area 10
  11. 11. The number of security issues in industry-specific solutions has grown significantly and now totals 160. The most vulnerable ones are SAP for Banking, Retail, Advertising Management, Automotive, and Utilities. Industry Solution Number of vulnerabilities Banking 33 Retail 21 Advertising Management (including Classified Advertising Management) 27 Automotive 14 Utilities 14 Healthcare 13 Campus Management 12 Oil and Gas 10 Defense Forces and Public Security 6 Aerospace and Defense 4 SAP Implementation Security This part describes how securely SAP Systems are implemented on a global scale. The statistics related to exposed SAP web applications can be gained with well-known Google search requests or Shodan, but this approach gives several false positive results. Because of that, we used our own scanning method to gather information about SAP system types. As a result of the scan, more than 11000 unique servers with different SAP web servers were identified. Further research reveals that most of the legitimate SAP application services exposed to the Internet are located in the USA (2332), India (1003), and Germany (895). The most interesting and complex research was performed for services that should not be accessible from the Internet; SAP has a set of modules that should not be accessible from the Internet, as they are designed only for internal use or require additional network filtration before being directly exposed to the Internet. There were found almost 25000 such web-exposed SAP systems (namely, SAP Gateway, SAP Message server, SAP HostControl, SAP Visual Admin P4, SAPRouter, SAP MC, SAP Afaria). Not only do they bring a potential risk but they have real vulnerabilities and misconfigurations that are well- known and described in public sources. In detail, it was found that: • 78% of ABAP systems (3177 Systems in total) on the Internet have the WebRFC service enabled. This service allows executing RFC functions (read data from SAP table, execute OS commands, make financial transactions, etc.) using HTTP requests to the NetWeaver ABAP ports and URLs. By default, any user can have access to this interface and execute the RFC_PING command by sending an XML packet. Other functions require additional authorizations. So there are two main risks: 11
  12. 12. - If there is a default username and password in the system, an attacker can execute numerous dangerous RFC functions because default users have dangerous rights. - If a remote attacker obtains any existing user credentials, he/she can execute a denial-of- service attack on the server by sending the RFC_PING request with a malformed XML packet. • 10% (533) of J2EE systems on the Internet have the CTC service enabled. The service is intended for managing the J2EE engine remotely. The Verb Tampering vulnerability in CTC allows bypassing authorization checks for remote access to the service. The non-intrusive scan cannot determine if identified services are vulnerable but the probability is rather high. • 1209 Message Servers HTTP (an HTTP part of Message Server) are exposed to the Internet. One of the issues of SAP Message Server HTTP is a possibility to get the values of the configuration parameters of SAP system remotely without authentication. This information can be used for further attacks. • 3465 SAP Management Console Services are exposed to the Internet, which are potentially vulnerable to unauthorized access to log files. • 859 SAP Visual Admin P4 services are exposed to the Internet. The service provides administrative functionality to manager SAP J2EE applications remotely. Near future Now, when we have drawn a picture of the SAP threat landscape, we can try to forecast what will be on the horizon for 2017. In short, as SAP Cybersecurity is a part of Cybersecurity, SAP Cybersecurity experts can expect in the coming year to encounter the same trends as the industry in general. Future trends and predictions about IT security are connected with such things as: - Cloud solutions. Enterprises are not thinking about migrating applications and data to the cloud, they are doing it. Threats posed by cloud solutions are rather well-known: data breaches, compromised credentials because of broken or missing authentication, exploited system vulnerabilities, to name a few. As for SAP in particular, SAP states that its SAP HANA in-memory technology has 110 million cloud subscribers around the world, so attack surface is potentially rather wide. - Internet of things – Vulnerabilities identified in different wearable devices hit the headlines of the major media a myriad of times in 2016. But what really represents a threat is industrial IoT, or IIoT. It includes sensor data, machine-to-machine communication and automation technologies. Such technologies have a potential to drastically change the future of the whole vertical. Nonetheless, one shouldn’t forget that the IIoT security is a challenge. Any device connected to the plant floor and at the same time exposed to the Internet is susceptible to be hacked. In its portfolio, SAP has a set of solutions for the IoT that includes a platform, applications, underlying and technical services. Moreover, researchers from ERPScan have even already identified several vulnerabilities in modules responsible for plant floor integration (SAP Plant Connectivity, SAP xMII). - Industry-specific attack vectors – Cybercrime is on the rise - and no vertical is immune to it. Several highly targeted attacks happened this year, for example, the hotel industry fell victim to Oracle MICROS data breach. We have identified a special attack vector against an oil and gas company. In particular, the researchers have discovered vulnerabilities in SAP xMII system, SAP Plant Connectivity, SAP HANA, Oracle E-Business Suite platform and some widely used OPC servers, such as Matricon 12
  13. 13. OPC. Configuration issues and these vulnerabilities can be used to conduct a multi-stage attack and get access to connected systems  Taking into account a huge number of vulnerabilities in industry solutions from SAP (160 as for the mid-2016), one can suppose that different kinds of cybercriminals may pay attention to these software vulnerabilities, especially to such industries as Oil & Gas, Automotive, and Banking. 13 Author: Darya Maenkova Darya is Sr. Analyst at Department of Security Evangelism, ERPScan. Her main fields of interest are statistical and analytical studies, as well as trend analysis. She participates in ERPScan’s research works, including monthly analysis of SAP Security Notes, quarterly overview of Oracle CPU, and annual SAP Security Reports.
  14. 14. Present and future of cyber security - What’s in store to become a cyber warrior? If we take a look at the most important sources of business today, it ranges from Financial Systems, Telecommunications, Aviation, Consumer Devices, Automobiles, Internet of Things. Imagine all these systems that are generating revenue along with people using all their services worldwide. All these have a serious impact both on usage and impact. At this stage, if an external attacker, or better, say insider, leaks the data, exposes the system hacking in and corrupting and manipulating data, it will become a huge loss along with loss of reputation and financial damage. Serious financial damage has been caused by security breaches. The most recent of things include security consulting firms producing estimation of total worldwide losses attributable to virus and worm attacks and to hostile digital acts in general. These range anywhere from $13 billion (worms and viruses only) to $226 billion (for all forms of covert attacks). Just in 2016, the following were some much talked about hacks: 1. AdultFriendFinder AdultFriendFinder lost close to 412 million users with their personal information exposed. The information was published on online criminal marketplaces for purchase. The information included e- mails and passwords, among others. 2. LinkedIn In May of 2016, 117 email addresses and passwords were published online. LinkedIn is still clueless to figure out who was behind the hack. 3. World Anti-Doping Agency 14 Cyber security in itself is a broad and diverse field. Its growing importance due to the increasing need on computer systems and the Internet in today’s society coupled with the “Internet of Things” is unparalleled. by Samrat Das
  15. 15. With the Olympics in full swing in 2016, Russian hackers leaked the medical data of athletes, like Simone Byles and Serena Williams. 4. SnapChat On March 3rd of this year, 700 current and former employees had their private data stolen in a phishing scam that posed as chief executive Evan Spiegel. 5. Yahoo! Yahoo lost 500 million usernames, passwords, telephone numbers, dates of birth in late 2014 itself. The revelation came finally in 2016. 6. Cisco Cisco was notified of a significant privacy vulnerability on their careers page, leaving job-seekers open to potential hacks. All this proved a single moral, the world needed hard core cyber security geeks and professionals who can test the systems and organizations to detect, patch and prevent all such attacks and vulnerabilities to a large extent. 7. Verizon A hack in the Verizon Enterprise Solutions division, a section of the company dedicated to IT services and data breach assistance to companies and government bodies alike. Hackers stole information from 1.5 million users. 8. Democratic Party Democratic Party experienced plenty of hacks to go around in 2016. 9. BitCoin One of the bitcoin exchanges, BitFinex in Hong Kong, was hacked, losing $65 million plus by still untraced hackers. 10. DropBox Data revealed in 2016 showed that 68 million users were at risk for stolen passwords and usernames. Such security measures may include: ! Vulnerability Management ! Secure Coding ! Penetration Testing ! Physical Security ! Security Compliance and Audits Going by the recent trends, according to Forbes, the global cybersecurity market reached $75 billion for 2015 and is expected to hit $170 billion in 2020. According to sources, cyber security is the most in demand profession one can look forward to in the coming future. As of this writing, the top seven skills you can master for looking forward to a bright career in cyber security are: • Security Analysis (Penetration Testing and Vulnerability Assessment) The most in demand and booming profession where demand exceeds supply, you are a person who is paid with a legal way to break into networks, find loopholes in websites and discover attack vectors in 15
  16. 16. mobile and rich clients, not to forgot wireless networks and IOT devices. This is one field that is deep rooted for the present and future with a promising cyber security career option. According to the US Bureau of Labor Statistics, the number of jobs for information security analysts is projected to increase 18% between 2014 and 2024. • Secure Software Development This involves finding exploits and vulnerable software code and patch them, your role as a secure developer/ source code reviewer will be to identity and patch the vulnerabilities. • Cloud Security Cloud security is identified as the place their organization has the biggest security skills deficit. Demand is high as large businesses generate jobs for cloud security architects. There are several threats particular to the cloud such as data breaches, system vulnerability exploits, and hijacked accounts, among others. This is a field for the present and a much more widespread future work where tons of things are to be done with lesser found skills to be deployed. • Intrusion Detection Intrusion detection involves discovering potentially harmful activity that could compromise the confidentiality, integrity, or availability of information, a field where you are in charge of assessing networks and infrastructure to find and detect/ block malicious attackers from penetrating into your network. • Network Security Combined with incident management, organizations also need professionals who secure and lock down firewalls, monitor systems and detect and analyze suspicious behavior. • Risk Mitigation/ Threat Modelling A field where you need to identify and discover risks, create mitigation plans and create blueprints for a secure infrastructure, the demand in present and coming time can’t be ruled out. In a nutshell, this sums up that cyber security is an ambitious, highly rewarding and a look forward to career option for people worldwide. This is one field away from the lack of opportunities, recessions, over supply and limited opportunities. For young people, out of college and interns, this is one really good field to grow by leaps and bounds and make a mark for yourself! 16 Samrat is a security researcher currently working for Deloitte India as a Security Consultant. His interests involve: Network and Web Penetration Testing, Reverse Engineering & Malware Analysis and Secure Code Review. He can be reached on sam9318@gmail.com and twitter: @Samrat_Das93 or his LinkedIn profile: https:// in.linkedin.com/in/samrat18 Author: Samrat Das
  17. 17. An IoT landscape for 2017 2016 was quite a year for cyber security. We saw a lot of new vulnerabilities and exploits published. It seems to be a never ending cycle of a researcher finding a vulnerability, and then the software developer publishes a patch, for the most part. One of the predictions for 2017 is more security incidents involving Internet of Things (IoT) devices. Something that occurred in October 2016, that I suspect few expected, was a massive Denial of Service attack by a massive botnet dubbed the “Mirai” botnet. The Mirai botnet was made up of thousands of compromised IoT devices. How is it that a simple device like a thermostat, or home security camera could effectively aid in performing a successful cyber-attack that denied thousands of users’ access to a large number of websites? Vendors of IoT devices need to employ better and more sophisticated security measures. Vendors need to take a more aggressive stance to creating a better cyber security posture for its consumers. Currently, vendors and manufacturers do not have any real incentive to add additional security measures other than potential legal issues. A potential solution to this would be to have legal regulation into any device that has the potential to connect to the internet. This would be plenty of incentive to have manufacturers and vendors at least take security more seriously and add additional security measures into their products. Another way to help improve security on IoT devices would be to have developers open source their code. This would allow for more people to help contribute and report critical findings. I suspect that incidents involving IoT devices will only increase in 2017. From DoS attacks to full on cyber invasions and intrusions hosted by IoT botnets. I am hopeful that researchers will find new ways to add additional security, and create further avenues to help combat such cyber-attacks. 
 17 Author: Jason Bernier A full time red team member on the US Army Red Team, performing computer exploitation at Sotera Defense Solutions, and a part time penetration tester at Lunarline Inc. He started his career in the military, working as a general IT admin/engineer. After serving in the military, he continued his IT career within the defense industry. He eventually made his way into security after earning a BS in IT/Security, and an MS in IT/Cyber Security. He has over 20 years of experience, including penetration testing, vulnerability assessment, and insider threat detection. by Jason Bernier
  18. 18. The Evolution of MicroEncryption® Type Technology The New Reality Secure and reliable encryption schemes are essential to protect sensitive information held by individuals, entities, organizations and governments. However, encryption combined with firewalls is no longer strong enough to stop malicious actors from acquiring sensitive data that is being protected. We must deploy new ways to essentially guarantee we are protected against potential cyber threats, both externally as well as internally. Today, if you were to ask most cyber experts, you might hear that there is no system that is 100% un-hackable. The Pioneers - How Change Came About Between 2006-2008, two individuals (David Schoenberger and Timothy Reynolds) were working within the payment card industry, protecting systems that connected into the back end of the Federal Reserve. While working with clients and protecting transactions to very high levels, requests continued to come asking why “Tokenization” could not be applied to both databases and files. After this continued to occur, David and Tim decided to develop this capability. After several years, they were successful in doing just that. As the capability was being designed and architected, additional enhancements were made to the Tokenization process they created. For example, their “DigiTokens”, unlike standard tokens, do not contain any part or piece of the data that is being protected. In other words, the DigiTokens are agnostic. Additionally, depending on client specific needs, within a given system architecture, the DigiTokens are not reused or repeated to protect other pieces of data in the future. 18 A new data security paradigm is required to secure sensitive data in the event of a perimeter defense breach. This new paradigm must ensure that only the right people get access to the right information at the right time. The MicroEncrypted Digital Vault capabilities ensure that data at rest and data in motion remain unavailable to exploitation even in the event of traditional network defense breach. by Steven Russo
  19. 19. A New Approach To Data Security While firewalls and encryption are not strong enough to hold back banks of supercomputers used by foreign actors, most all agree they can penetrate and access most any system they so desire. Where the twist comes in, is what can they get once inside. This is where additional security measures can thwart their efforts. With the advent of a new approach to cyber security on the back end, involving AES encryption, combined with use of a uniquely modified form of Tokenization, technology known as MicroEncryption®, once a bad actor successfully penetrates firewalls and encryption, there is nothing sensitive within that system to steal. One of the most significant challenges while considering protection schemas is not only the level of security. The data that is most sensitive is also the same data that must remain accessible to those authorized to access it. MicroEncryption accomplishes this while meeting these requirements. Also important to note is the fact that not all data contained within a database or file structure is sensitive. For example, if within a database, a record had no known association with an account number, a first/ last name, a social security number, or a city and state, there would be no correlation to the sensitive data, therefore making the remainder of the fields contained virtually useless to the hacker. These advancements work off an entirely different premise and methodology relative to current cyber security processes. While It has been repeatedly proven that “Bulk Encryption” is not efficacious in securing data, by MicroEncrypting the information, sensitive data is protected individually, down to the byte level, if that is what is desired, within the system design. This also means that not all data within a system requires encryption. Since the sensitive data is being protected on an individualized basis, it can be returned very rapidly when called upon. While custom solutions and a variety of APIs are available, in most cases a developer only requires access to a MicroEncryption API and they are ready to protect data. This methodology, while only recently available for commercial use, mitigates the effects of latency, regarding user experiences, while securing most all forms of data like never possible. Tokenization has existed for a long time within the digital arena. Substitution or surrogate key values, or “tokens”, have been used to isolate sensitive data elements from exposure to exploitation (16-character maximum) by replacing them with placeholders. MicroEncryption like concepts are now providing a security mechanism for both small and larger scale data protection, exceeding 2 GB in size - a feat previously unavailable within the Tokenization protection schemas. Now, through access via an SDK, developers of all sizes can adopt and utilize the schema for projects of all sizes. This includes not only files of all types, but databases, payments, payment processing, information around transactions and more. Its attraction is not only its scalability, but its simplicity to deploy. Depending on the complexity of a system, and what items developers determine require protection, connections have been made in as little as a few hours through published APIs. This service through the SDK is both PCI DSS Level 1 compliant as well as HIPAA compliant, allowing for the compliant storage of credit card information and healthcare data. ESB providers, such as Neuron ESB, have seen the benefits of MicroEncryption and taken it to the next level by creating a simplified pathway for MicroEncryption to be deployed into many industry standard applications. This reduces programming efforts in more than 40 commercial applications (including Microsoft and Oracle) more than 80 percent. You can see why this technology is rapidly becoming a schema of choice. 19
  20. 20. As MicroEncryption technology evolved, and adoption continues, certain entities requiring data protection expressed the desire to maintain the MicroEncrypted data within their own environment. Banks, financial institutions, large enterprises and governments are classic examples. To meet that demand, MicroEncryption is now available as a private hosted solution that can be deployed in a variety of ways, including a client’s own data center or private cloud. As of late, managed services providers, as well as data centers themselves, are taking advantage of this new form of hybrid security architecture. MicroEncryption like technology is rapidly becoming a vital tool in their toolbox of options and capabilities. Taking it to the next step, flexible adaptor based systems were developed that allow any data to transact with any other third-party system, as well as a recurring process scheduling engine that allows an organization to manage business rules that determine when, how often, and what kind of data processing to schedule and generate. These systems include, but are not limited to, payment processing, identity verification, bank systems, account systems, or any data transformation. Information and registration for a free trial of the recently released CertainSafe MicroTokenization SDK can be found at https://certainsafe.com/custom-solutions. The CertainSafe Digital Vault is not limited to fields of a database. Another unique feature of the architecture allows files up to 2GB to be secured in the Digital Vault. CertainSafe has developed a browser based app named the Digital Safety Deposit Box and Client Portal to manage secure storage and sharing of files and private messages. This gives users the ability to secure any data type, including simple text, Word Docs, Excel, x-ray files, video, voice, pictures, top secret documents and more. As the evolution continued, taking industry demands a step further, a Virtual Safety Deposit Box was developed for use by individuals, without requiring any additional programming whatsoever. It utilizes the complete MicroEncryption technology suite to protect the information contained within the CertainSafe Digital Vault. Its purpose is to allow for the storage of files, in an ultra-secure vault, providing a mechanism that enables the storage, ability to share, and the ability to control folders containing files, with ease, speed and efficiency. As an added feature set, individuals can communicate through an Instant Secure Chat, that too uses MicroEncryption to protect the instant chat messaging contained. This platform is called the CertainSafe Digital Safety Deposit Box. MicroEncryption as a service, whether through an SDK, or a private instance, due to its ease of use, as well as pricing structure, is quickly becoming a favorite of managed service providers of all sizes. As the evolution of data security continues forward, it is believed that MicroEncryption type schemas will be the top choice for those developers requiring the highest levels of security. 20
  21. 21. “The MicroEncryption technology is truly innovative with its ability to scale to future needs and evolve with the new best practices in the security world,” said Dan Furman, former CIO of the Federal Improvement Team. By tokenizing data and storing it fully encrypted, the data becomes both usable directly from the secure datacenter and simultaneously meets and exceeds industry standards and regulations. In addition, value can be gained from processing the data onsite and avoiding the potential security failure point, as data must move to an analysis server. From Personally Identifiable Information (PII) and Health Insurance Portability and Accountability Act (HIPAA) [http://www.hhs.gov/ocr/privacy/ ], mandated data restrictions to user password tokenization, the need for usable and secure data has never been so great. Companies of all sizes who store any information about their customers, employees, patients or partners must be conscious of how to protect this information. Unlike other security solutions, MicroEncryption technology is lightning fast and is currently being scaled to enable over 58 billion secure actions per second in a test portal environment. “Thanks to this new breakthrough in technology, MicroEncryption offers everyone access to the same speed and security as the billion-dollar giants,” said Mr. Fioto, Chairperson and CEO of RACE. Industry Recognition "CertainSafe, with the invention of MicroEncryption, has cracked the code on how to properly secure data that's both at rest and at motion." Richard Marshall, former director of Global Cybersecurity Management for the US Department of Homeland Security “I've closely investigated the MicroEncryption technology and am confident it is the most secure method for sharing and storing data, bar none.” Rep. Pete Hoekstra, former Chairman of the House Intelligence Committee "The CertainSafe approach to cloud security may be the most brilliant and effective that I've seen to date, in an area that is critical if Net-based commerce, applications, and transactions are to go forward." Mark Anderson, FiRe chair and CEO of the Strategic News Service Summary A new data security paradigm is required to secure sensitive data in the event of a perimeter defense breach. This new paradigm must ensure that only the right people get access to the right information at the right time. The MicroEncrypted Digital Vault capabilities ensure that data at rest and data in motion remain unavailable to exploitation even in the event of traditional network defense breach. These types of technology solutions are applicable on a global basis across dozens of industries including healthcare, financial services, hospitality, retail, energy/smart grid, supply chain management and government service sectors. The innovative processes make data stored fully usable and accessible while maintaining the highest levels of security. With MicroEncryption like technology deployed, users can store HIPAA, PCI, PFI, PHI, PII as well as other types of sensitive data requiring compliance. 21
  22. 22. Steven R. Russo launched his career as an entrepreneur at the age of 18. He later went to become a highly recognized leader in HVAC distribution where he displayed considerable sales and management contributions. In 2011, Steven and his business partner, John Nachef acquired a ground breaking cybersecurity technology. Steven and his partner formed Secure Cloud Systems (SCS) , raising more than $10M from private investors to fund operations to date. For the past five years, Steven managed day-to-day operations while working closely with the SCS technology team to prepare their cyber-platform for market. Steven has been inspirational in developing the CertainSafe® Product line which includes the game changing CertainSafe Digital Safety Deposit Vault, which then allowed for the creation of the CertainSafe Digital Safety Deposit Box. 22 Author: Steven R. Russo
  23. 23. Watching the Watchers using Deception Techniques We need to ensure we maintain both the attacker’s interest as well as their acceptance that they are attacking real targets. Honeypots have often been criticized for their lack of believability, causing many attackers to recognize the system as fake and avoid interaction. If we allow this to happen, the Labyrinth could provide no additional intelligence on the attackers, or on their tactics and techniques, and wouldn't allow for any additional timesaving afforded to the security team. So to begin, what is a Honeypot? A Honeypot is a non-production system, typically housed within a virtual environment, whose sole purpose is to be a target. The Honeypot is a decoy system that provides a deceptive layer, shifting the focus of attackers away from production systems. The objective of a Honeypot is to provide security teams with information about its every function, so the team can determine the tactics and techniques of those actors who interact with the system. To convince the attacker that the decoy system is genuine, "we need to be aware that he will be trying to fingerprint the decoy and its applications." It is critical that Honeypots do not stick out and cause an attacker to move in a different direction. Within an entire network of honeypots, even if an attacker does move in a different direction, it will likely be towards another honeypot. But, the goal of the Labyrinth is to be as believable as possible, to ensure we keep the attackers focused on what we want them to focus on, and not allowing them to question their actions. To assist with the believability of the Labyrinth, it should behave like a real network. Each system within the internal network should have representation within the Labyrinth, and the topological layout of the Labyrinth should essentially mimic that of the real network. To ensure the acceptance of the Labyrinth, a logical combination of honeypot systems within each subnet should resemble what the internal network would use. For example, within the DMZ section of the Security Analyst, the legitimate types of DMZ systems should be present: a fake Web Server, an external Domain Name Server (DNS), a Mail Server, and perhaps a File Server (FTP) or even a Voice 23 by Muruganandam
  24. 24. over IP (VoIP) server. However, if there were also unpatched Windows XP systems with large quantities of internal information, it may cause an advanced attacker to question their situation. This doesn’t mean you cannot have an unpatched Windows XP system in the Labyrinth. You should use a variety of OS's as long as they represent the types of systems with the real environment. Place these systems within subnets that resemble a functional network. Having a network within the Labyrinth that resembles an actual subnet of endpoint specific systems, e.g. user laptops, desktops, and printers, simply makes the Labyrinth more believable and facilitates the attacker to wander deeper into the Labyrinth, in turn, allowing the security team to develop a much more comprehensive listing of the TTPs on the attackers. The entire point is to make the attackers waste as much time as possible to allow your teams to counter their potential attacks. With the effort of designing and configuring the Labyrinth to be as believable as possible, there is another level of configuration that can make the Labyrinth resemble the real thing, administrative actions within the Labyrinth. "Day-to-day changes in the environment may include adding, upgrading and removing applications, networks, operating systems, endpoints, and devices." Creating network traffic within the Labyrinth and by essentially treating the Labyrinth like a real environment provides yet another layer of deception. To achieve this deception, we have several scripted actions within the Labyrinth simulating user actions, like requesting DNS lookups, Web Traffic, file transfers, and generating events that trigger log population on the systems. Creating what appears to be legitimate noise within the Labyrinth and aid in the believability of the Labyrinth's functionality. In turn, this can allow the attacker to interpret the network as normal and continue to probe and test the Labyrinth as they would any other network. The beneficial security information gleaned from a honeypot is without a 24 The entire point is to make the attackers waste as much time as possible to allow your teams to counter their potential attacks.
  25. 25. doubt the primary motivation for their use. However, there are limits and restrictions under which a Labyrinth environment should operate. "A primary concern for honeypot designers is that of an attacker getting control over it. If this happens, the attacker can initiate attacks from the honeypot, which is regarded by the network as a secure environment." While the primary purpose of the Labyrinth is to record and use the tactics and techniques of an attacker to better secure the legitimate network, the risk of having the attacker use the Labyrinth for malicious purposes against other sites are grounds for significant legal concern. The monitoring of suspected malicious actions within the Labyrinth is the primary goal of the Labyrinth. While ultimately protecting the legitimate network is the objective, protecting outside organizations from attacks based within the Labyrinth is equally as important. Should all identified malicious actions be stopped immediately? Within the Honeypot community it is loosely understood, that "it is sometimes better to observe the attack through to completion and then identify the stolen goods after the deed has been done." By keeping the attacker focused on what you want them to focus on, you gather information. You are also safeguarding the attacker from actively focusing on something, or someone, else. Since the Labyrinth can be wiped clean at a moment's notice, a critical event or an action targeting an outside entity, the malicious action can be stopped in its tracks as the Labyrinth is reset to a clean version. The defenders could fail to gain a complete picture of the attacker’s TTPs, but the information gathered from these actions still allow the security team to bolster their defenses. 25 Muruganandam is an Principal Security QA working with Oracle India Pvt Ltd. • Muruganandam has expertise in Security testing of web applications and network products. He is involving many industry security certifications like: PCI and Common Criteria. Author Muruganandam
  26. 26. Threat Modeling Template for Beginners Table of Contents 1. THREAT MODELING PROCESS 1.1. DEFINE AN ARCHITECTURE OVERVIEW 1.2. GATHER A LIST OF EXTERNAL DEPENDENCIES 1.3. IDENTIFY THE ASSETS AND SECURITY OBJECTIVES 1.4. DATA FLOW DIAGRAMS 1.4.1 TRUST BOUNDARIES 1.4.2 DATA FLOW 1.4.3 ENTRY POINTS 1.4.4 PRIVILEGED CODE 1.4.5 DFD ELEMENTS 1.5. DETERMINE AND INVESTIGATE THE THREATS 1.5. 1. Use STRIDE-per-Element Framework 1.5. 1. Threat Rating [Optional] 1.6. PROPOSE THE RESPECTIVE COUNTERMEASURE SOLUTIONS 1.7. VALIDATE THE COUNTERMEASURES 2. REFERENCES 1.Threat Modeling Process There are various thread modeling techniques that are defined by NIST, FIPS, Common Criteria and Microsoft. Particularly, for the application security, network security and embedded system security, the Microsoft defined STRIDE model is the recognized and approved technique by the various reputed secure R&D organizations including MSR (Microsoft Research Lab), Software Engineering Research Institute (SERI), Carnegie Mellon University, Global Security Research Forum and RSA Lab [1]. 26 The scope & objective of this paper is to regulate the threat modeling process and provide needed guidance for the developers, testers, and beginners to understand how to create a Threat Model for any embedded systems software before beginning to design implementation phases in the Secure Software Development Life Cycle (S-SDLC). by Dr. Narendiran Chandrasekaran
  27. 27. Before starting the threat modeling process, an architect, business analyst, developer and test lead meet together to identify the security objectives and goals. An architect begins by defining the architecture and walkthrough to ensure that all attendees understand the architecture from the same perspective. The following subsections describe the process of the Microsoft STRIDE Threat Modeling Technique [2,3,4]. Threat Modeling is an iterative process that starts during early phases of design of the system and continues throughout the system life cycle. Because it is impossible to identify all of the possible threats in a single pass, this process needs to be repeated as the system evolves, as shown in Figure 1. The following are the steps for the Threat Modeling Process: a) Define an Architecture Overview b) Gather a List of External Dependencies c) Identify Security Objectives d) Decompose and draw a Data Flow Diagram (DFD) for the identified Components e) Investigate the Threats: Use STRIDE Model to Identify/Define the Threats f) Threat Rating, Threat Table, Calculate the Risks and Quantitative Comparison g) Propose the respective Countermeasure Solutions h) Validate the Countermeasure Figure 1. Threat Modeling Process 27
  28. 28. 1.1. Define an Architecture Overview As a first step, create a high-level architecture that describes the composition and structure of the system/sub-systems as well as its physical deployment characteristics. Also, depending on the complexity of the system, it is the responsibility of the security developer/analyst/architect to create the additional diagrams that focus on different areas. Then, enhance the diagrams by adding details about the trust boundaries, data flow, authentication, authorization, etc. During DFD process, those details will be identified and documented. In addition, document the technologies to be used and what the software does, as shown in Table 1. Sl.No. Technology/Platform Implementation Details Table 1. Template for Technologies/Platform Details 1.2. Gather a List of External Dependencies Table 2 shows how to list out and document the external dependencies/entities that a system may use, for example, a database or server. Sl.No Dependencies Purpose Table 2. Template for Technologies/Platform Details 1.3. Identify the Assets and Security Objectives Understand the security objective and assets that need to be protected and achieved. This could range from confidentiality, integrity, authentication, authorization, non-repudiation, secret keys, availability, etc. 1.4. Data Flow Diagrams DFD is a graphical representation of data flows, data stores, and relationships between data sources and destinations. In threat modeling, DFD helps to identify trust boundaries, data flow, entry points, and privileged code of the proposed system. 1.4.1 Trust Boundaries Identify the trust boundaries that surround each of the noticeable components/assets of the system. 1.4.2 Data Flow Data flow is completed by analyzing the data flow between individual components and subsystems. Data flow across trust boundaries is particularly important because code that is passed data from outside its own trust boundary should assume that the data is malicious and perform thorough validation of the data. 28
  29. 29. 1.4.3 Entry Points In DFD, there are two types of entry points, namely internal and external. External entry point requests are from front-end application/external dependencies and internal entry points exposed by subcomponents across the levels of the system may only exist to support internal communication with other components. However, it is mandatory to know where these are, and what types of input they receive in case an attacker manages to bypass the front door of the system and directly attack an internal entry point. 1.4.4 Privileged Code Privileged code accesses specific types of secure resources and performs other sensitive operations. 1.4.5 DFD Elements A DFD contains four types of elements. Table 3 shows the elements are external entities, data flow, data store, and processes. When the DFD is used for threat modeling, there is one more element to keep track of, which is the trust boundary. The trust boundary represents data moving from a high trust to low trust, or vice versa. Process External Interactor Data Store Data Flow Trust Boundary Table 3. DFD Elements Mostly the diagrams are used to evaluate the threats by hand or with the help of automated tools. Figure 2 exhibits a simple example of how the data is flowing between an Electronic Control Unit (ECU) and Cloud Infrastructure Components for the authentication process via wireless connection. Figure 2. Simple DFD Model 1.5. Determine and Investigate the Threats This section deals with how to investigate and analyze the DFDs to capture and record the possible security gaps, attacks, bugs, and flaws in internal & external design components, infrastructure, interface, external communication, etc. 29
  30. 30. 1.5.1. Use STRIDE-per-Element Framework STRIDE is named after the six categories that the threats are divided into, namely Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. Table 4 shows the different threat types of the STRIDE Framework [4]. Threat Type Security Attributes Meaning Spoofing Authentication Pretending to be something or someone other than yourself. Tampering Integrity Modifying something on disk, on a network, or in memory. Repudiation Non-Repudiation Claiming that you didn't do something, or not responsible. Repudiation can be honest or false, and the key question for system designers is, what evidence do you have? Information Disclosure Confidentiality Providing information to someone not authorized to see it. Denial of Service Availability Absorbing resources needed to provide service. Elevation of Privilege Authorization Allowing someone to do something they're not authorized to do. Table 4. STRIDE Threat Types STRIDE-per-Element model evaluates every element in the DFDs. Table 5 shows different elements of the DFD and the different categories in STRIDE [3,5]. Element Type S T R I D E External Entity X X Data Flow X X X Data Store X X X X Process X X X X X X Table 5. Mapping of STRIDE to DFD element type After the DFD model of the system has been created, a list of all elements in the diagram has to be created. Table 6 shows the list of elements created from DFD in Figure 2. Element Type Item Numbers External Entity Infrastructure Server (1.0) Data Flow Server Command & response (1.0 <-> 2.0) Data Store Transform a Session Key (3.0) Process ECU (2.0) Table 6. Elements from DFD in Figure 2. Once the list of DFD elements is done, STRIDE will be applied to each element in the list. However, not all types of threats have to be applied to all types of elements. Table 7 shows the result of STRIDE-per- Element analysis. 30
  31. 31. Threat Type DFD Item Numbers Spoofing External entities: (1.0) Processes: (2.0) Tampering Processes: (2.0) Data Stores: (3.0) Data Flows: (1.0 <-> 2.0), (2.0 <-> 3.0) Repudiation External entities: (1.0) Processes: (2.0) Data Stores: (3.0) Information Disclosure Processes: (2.0) Data Stores: (3.0) Data Flows: (1.0 Ö 2.0), (2.0 Ö 3.0) DoS Processes: (2.0) Data Stores: (3.0) Data Flows: (1.0 Ö 2.0), (2.0 Ö 3.0) EoP Processes: (2.0) Table 7. Threats to the Model in Figure 3. The threats have been grouped after the STRIDE categories, refer to Appendix A to understand precisely. After STRIDE has been applied to the list of elements, it is time to calculate the risk attached to each threat. The advantage of STRIDE-per-element is that it is prescriptive; it helps to identify what to look for without having a checklist. When STRIDE-per-element is used by an experienced user, it can be useful for finding new types of weaknesses and common issues in system components [6]. 1.5.2. Threat Rating [Optional] Threat rating is rating the threats based on the level of the risks. This process allows the architect/ developer/customer to address the threats that present the most risk first, and then resolve the other threats. In fact, it may not be economically viable to address all of the identified threats, and one may decide to ignore some because the chance of them occurring is small and the damage that would result if they did is minimal. Microsoft has standardized the DREAD model, which is used to help rate the threats/risks[2]. The procedure to rate the threats using the DREAD model is described in the attached Excel sheet. 1.6. Propose the respective Countermeasure Solutions The mitigation process mainly addresses each threat and proposes the respective solutions. There are four standard ways to address the threats. i. Redesign the architecture to eliminate the threat ii. Apply Standard Mitigations, given in Table 5 iii. Invent New Mitigations (Riskier) iv. Accept Vulnerabilities in Design 31
  32. 32. Threat Type Security Attributes Meaning Spoofing Authentication Cookie Authentication Kerberos Authentication PKI Systems such as SSL/TLS and Certificates to Authenticate code or data Digital Signatures Tampering Integrity Mandatory Integrity Controls HMAC Digital Signatures Repudiation Non-Repudiation Secure Logging and Auditing Digital Signatures Information Disclosure Confidentiality Encryption ACLS Denial of Service Availability ACLS Filtering Quota Elevation of Privilege Authorization Input Validation ACLs Privilege Ownership Table 8. Standard Mitigation Techniques 1.7. Validate the Countermeasures Validation is the on-going and manual process in the Secure Software Development Life-Cycle. It validates all the threat models that are created during the DFD process. The following questions need to be answered: a. Does DFD match final code? b. Are threats enumerated? c. Has test/QA reviewed the model? d. Is each threat mitigated? e. Are mitigations done right? 2. References [1.] A. Shostack, Threat Modeling: Designing for Security. US: John Wiley & Sons Ltd, 2014. [2.] https://msdn.microsoft.com/en-us/library/ff648644.aspx [3.] Common Criteria, Common criteria for information technology security evaluation, part 1: Introduction and general model, 2012. [4.] M. Howard and S. Lepner, The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software (Developer Best Practices). Microsoft Press, 2006. [5.] CHU Ying, HAO Lin. STRIDE Critical Threat Modeling Using in Designing Certificate Authority. Journal of Yunnan University (Natural Science).2004.26 (supplement):54-57 (in Chinese)  32
  33. 33. [6.] A. Weimerskirch, C. Paar, and M. Wolf, “Cryptographic component identification: enabler for secure vehicles”, in proceedings of 69th IEEE vehicular Technology Conference(VTC ‘15), pp. 1227- 1231, Dallas, Texas, USA, September 2015. 33 Author: Dr. Narendiran Chandrasekaran Dr. Narendiran Chandrasekaran brings 13+ years of experience in the software industry. He has been working on various Security and Cryptography technologies including Mobile Security, Platform Security, Network Security, HDCP Content Protection, OMA/Google Widevine DRM Frameworks also Vulnerability/Threat Assessment, Fuzzing, Penetration Testing Tools & Techniques, Crypto acceleration, RFC Security Standards, PKI, ARM Trustzone - Trusted Execution Environment(TEE), Participate/Interact with various Security Standard Bodies(NIST/FIPS/Common Criteria/EMVCo/MPFI) and Certification Process for secure products (Global Platform/PCIDSS). He has published and presented more than 13 technical papers in the leading IEEE/ACM Security Conferences/Journals in India, US, China, and also filed a Grade "A" patent in India. He is currently working as a Principal Architect at Cyber Security Product and Engineering Service (P&ES) Lab, Capgemini India.
  34. 34. 34 Join our new course! Effectively Measuring and Communicating PenTest Results a CISO perspective Click here for more info
  35. 35. Approach by:
 Ali Tabish 2016 is about to wind down and multiple industries commence to fine-tune their business strategies for the upcoming year. Cyber criminals are making exactly the same strategies so they can work smarter. Criminals are getting smarter by exploring new practices, building organizations, bringing human expertise for more sophisticated and specialized cyber attacks. It’s like we have action and then reaction cycle, enterprise organizations are planning or implementing security measures so they become attentive in their reactions. Let’s flash back through the year 2016 stats, you will find devastating data breaches, spanning across multiple large and small industries. A few recent cyber attacks in 2016: ! DDoS Attack against Liberia Using Mirai Botnet. ! Hundreds Of Operations Canceled After Malware Hacks Hospitals Systems. ! Shadow Brokers reveals list of Servers Hacked by the NSA. ! Massive DDoS Attack Came from Just 100,000 Hacked IoT Devices. According to the ITRC (Identity Theft Resource Center), as of November 1st of this year, there were 845 reported breaches, exposing 29,765,131 records (keep in mind that this does not include the majority of breaches in which companies usually did not report the number of records affected). These breaches are targeting high-value data (includes confidential data like health information, classified information related to governments, phishing, etc). So… what will 2017 bring? We expect to see the following security threats and trends: BYOD – Smart Phones Having Smart Malware People who are unaware about the technology and security might assume that malware are relatively unchanging, but their concept is almost wrong. Smart application designs are continuously improving. Those improvements mean the ability to bypass security controls, data exfiltration through advance deception methods. As a result, we can expect to see high value data breaches that originate on bring your own devices (Smart Phones / Mobiles). Nowadays, newer application versions consume less computing power, causing less lag, and they are good at remaining fully undetected; late discovery could result in more files being stolen, which is becoming a major corporate security concern. As you were aware of recent state sponsored attacks on journalists’ smart phones that means attack methods are now in the feral and we should expect to see more organized crime. 35
  36. 36. Ransomware Threat Prevention It’s the most pervasive cyber threat since 2005. According to publicly available information, ransomware infections have outnumbered data breaches more than 7,000 over the past 11 years. Since then, ransomware has become an tool of choice for many cyber criminals. Ransom attacks are increasing 20-fold over the next year. With all this success, their increase in frequency is somewhat expected. Prevention of ransomware for an enterprise is like a cost of doing business; it becomes as prevalent as distributed denial of service attacks. Given the success rate, enterprises will have to deploy a multi- faceted prevention strategy, like advanced sandboxing and threat extraction for effective enterprise infrastructure protection. We are expecting to see more targeted attacks to influence an organization, with “legitimate” actors launching such attacks. Internet of Things (IoT) The Internet of Things (IoT) is quickly becoming a way of life; unfortunately, this shift comes with additional risk. IoT will continue to create never-ending shocking stories because these devices are not so secure.  In the coming year, we expect to see further research, increase in data-harvesting attacks and poc (proofs of concepts) demonstrating vulnerability against these devices as well. The convergence of informational technology and operational technology is making environments more vulnerable. The security concerns around the IoT will become similar to the set of security concerns around SCADA. Environments often run legacy systems that are obsolete or whose patches are not available. The industry should look towards best practices like NIST and others have formulated. Cloud Computing Using IT as a service to cut down the capital cost provides an opportunity for an enterprise to build their infrastructure on the cloud so they are continuously putting more data on the cloud, which leads towards the backdoor chance for hackers to access enterprise systems, to disrupt or take down a major cloud provider will affect all of their clients’ businesses. There will also be a rise in ransomware attacks impacting cloud-based data centers. These attacks will start finding their way through spreading encrypted files from cloud to cloud. Market Manipulation Cyber criminals are thinking way beyond that. These perpetrators are well prepared and have their eyes set on insider trading and market manipulation. For the past few years, we’ve seen widely publicized breaches, carried out by different groups. Sometimes hackers obtained credentials through sophisticated spear phishing attacks in order to hit the confidentiality by accessing classified information regarding upcoming mergers, or sometimes hackers gained access to news media outlets to disclose non-public corporate information like financial restatements and traded on that information prior to public release, making billions. Due to these opportunities for important payouts, such frauds will increase. Summary In the future, enterprise organizations will see an increase in cyber attacks or intrusions that are sophisticatedly designed. Cyber criminals will continue to exploit their success and venture into larger money making schemes via market manipulation. 36
  37. 37. So mid-size or enterprise organizations can protect themselves via implementing stronger controls and awareness programs, like employee training and proper reporting procedures. It’s better to couple these controls with well-tailored cyber insurance policies. 37 • Independent Security Researcher • CCISO, CHFI, CEH, CEI, ECSA, MCSE, STS • Ethical Hacker of the Year 2016 – Finalist https://www.linkedin.com/in/alitabishofficial https://twitter.com/atabishofficial Author: Ali Tabish
  38. 38. Approach by: Mihai Raneti Every year, you read yet another set of articles trying to predict what is going to happen in the cybersecurity field the following year. The sad thing is that in spite of that, breaches still take organizations by surprise. You do not need to be a close observer to realize there are some recurrent patterns. By definition, hackers are curious people who innovate and show proof of unstoppable creativity time after time. They are expected to continuously increase the complexity of their attacks and the sophistication of their techniques and tools. They are always one step ahead, thinking of tomorrow, while the majority of cybersecurity solutions are designed thinking of what happened yesterday. There is this big imbalance between cybercriminals and those trying to secure cyberspace, which keeps getting bigger and bigger. Clearly, we are not able to slow them down, let alone stop them. Even key security people in a company are easily tricked, because most of the time they do not have a hacker's mindset. When we hear the word hacker, we immediately think negatively. But a hacker is someone who dissects things. If you check Pinterest, it is full of life hacks, Photoshop hacks, parenting hacks, all kinds of hacks. It doesn't mean they are teaching you how to steal something, they are teaching you alternative ways of getting to the same result. Cybercriminals do have some advantages over cybersecurity specialists, though. They have time, resources, drive and skills. Let us take them one by one. One of the main traits of an attacker is determination. They will not give up until they are inside the network or get the info they are looking for. They have plenty of time to apply any strategy, to change their approach, to try again and again, and they do it with such finesse that most of the time they get away with it for months. They also benefit from plenty of material and financial resources. Sometimes they are backed by companies or even nation states looking to have the upper hand over their competitors. The most important feature of all is their passion for this kind of job. There is no special school for hackers, they are simply self taught people continuously looking to improve their performance, not because someone from the outside tells them to, but because they want it. The same applies to cybersecurity specialists. Everyone is complaining that there are not enough people on the right side, and we cannot see that changing anytime soon. We have been making massive efforts regarding HR, and we saw for ourselves how difficult it is to find someone who combines programming skills with a cybersecurity background. Things are especially hard when you are a startup. There is a handful of specialists, but they already belong to large enterprises, and you have to be ingenious enough to approach them and bring them to your team. That is if they are not motivated only by the money they can earn, because in that case, your startup is no match for the likes of Google or Microsoft. The cybersecurity job market is the reverse of almost all others: there are plenty of positions to fill and 38
  39. 39. very few people with the right qualifications and the right mindset. Universities are not aligned with the job market, and that is one big drawback. Cybersecurity degrees are still something quite rare and they stand no chance of meeting the demands of the market. Cybersecurity is critical for the survival of almost any business, since almost everything is happening online. It is essential to have people covering this aspect. Also, the military is the biggest traditional employer in this field, since intelligence is highly valued. A study from the Bureau of Labor Statistics shows that the growth rate of jobs in information security is estimated at 37% between 2012 and 2022. Needless to say, that is a much faster pace than the average for all other occupations. In the study “Mitigating the Cybersecurity Skills Shortage”, Cisco estimates that the current opening in cybersecurity jobs reached 1 million. Symantec projects a demand of 6 million positions that need to be filled globally by 2019, and foresees a shortfall of 1,5 million jobs. Since cybersecurity is a very dynamic field, there is a need for continuous professional development to keep up with the ever changing threats. Stopping intruders is ultimately a thing that depends on humans, no matter the amount of computing power involved. As we have said many times before, man and machine can achieve great things together. Machine learning is increasingly used, and someday in the future, it will probably be 99% in charge of security, leaving 1% to humans. Another key problem in cybersecurity is awareness. Although it is on the rise, and has been so for a while, that is not reflected in the real life situations. Breaches still occur because companies cannot possibly foresee the way they will be attacked. Some are surprised that they have been attacked at all, they underestimate themselves and think they have nothing of value. The main concerns of cybersecurity specialists should be helping organizations understand a breach will certainly take place sooner or later. They should have an idea about who would likely target them, the reasons behind the attack and what valuable pieces of information the attackers are after. There are three main risk factors for organizations. One is the BYOD policy. Assuming an employee has no hidden agenda, bringing personal wearable (IoT) technology to work can mean opening the door to vulnerabilities. Device security is the least of a person's worries, and a recent study from Microsoft shows that personal computers are two times more exposed to threats than enterprise computers. The same applies to other gadgets. Another risk factor, somehow related to BYOD policies, is working remotely. In this day and age, employees can work from anywhere, but there is no guarantee that the device, which apparently connects to the network, is legitimate or that the person at the other end of the device is really who they claim to be. We have the tendency of perceiving cybercrime as something coming from the outside, so we take the inside out of the equation. Which leads to the third and greatest risk factor, malicious insiders. More than 50% of attacks are caused by insiders, which can be divided into two categories. On the one hand, there are those with poor knowledge or adoption of proper security practices. No matter how strong cybersecurity policies are inside an organization, there will always be a person falling for spear phishing. They will most likely open the Word document, Excel spreadsheet or PDF attached to the email. Trojans are still on the rise, tricking people into clicking fake links with catchy titles, lowering their security settings or installing malware. On the other hand, there are those who aim for a big data theft. It can be quite difficult to detect them, because they have plenty of experience at hiding their traces and no one would suspect them. They are most often the model employees. Social engineering is the foundation for a large number of attacks and breaches, and as such it should be the main choice for pentesters. Lately, cyber attacks have started targeting infrastructure, and in the future, our basic commodities, 39
  40. 40. such as food, water, electricity, fuel and the ability to communicate will probably also be in jeopardy. As long as the internet is at the core of any modern society, it will always be a target. The past has showed a tendency of attacks to follow geopolitical criteria. That is especially true for countries like the US, Russia, China and North Korea. That will go on in the future for certain, probably resulting in greater disruptions. We have also seen attacks that leveraged a huge number of IoT devices in the last months. It is very difficult to keep track of entry points and data flow. We hear more and more about the Internet of insecure Things, and while that was supposed to be used ironically, it is starting to be 100% true. Cybercriminals are taking full advantage of this opportunity and reaping the benefits of poor security. Most of their work is already done for them, they only have to make a little effort to take control over devices. While this is relatively new, it has been expected to happen for a while now and it will most likely reach even larger proportions in the future. This could be an effect of the low prices of crimeware. For as little as $50, one can buy a USB stick that can destroy any device that has a USB port. Cybercriminals gain time because they can buy their tools, as opposed to having to create and develop them. Parts of botnets can be rented and used to target a specific geographical area. Not to mention how easy it is to buy anything on the dark web. A good deal of breaches come from vulnerabilities that have been known for at least one year. That is a consequence of the use or refurbishing of open source code. The attacks targeting the healthcare sector are starting to become commonplace. Unlike IoT devices, which can be set aside, implantable devices cannot be removed from the person. We also see further development in ransomware, and people's lives could become at risk if we talk about implants. The cybersecurity market is slowly going towards a new wave of solutions based on deception. A Gartner study estimates that by 2018 one in ten enterprises will be using tools and tactics based on deception to protect themselves against cyberattackers. The passage from cloud to cyber fog is also a signal of the increasing power of deception used as cybersecurity strategy. Fog computing could be the solution everyone has been waiting for. Fragmenting data into tiny pieces that make no apparent sense will render it useless for hackers. 40 Mihai has a degree in Psychology and various certifications in the field of IT and cybersecurity. He is passionate about quantum physics, math, history and technology. He has a critical thinking, always sees the bigger picture and is keen on problem solving. He is the brain behind
 a pioneering cybersecurity technology. Author: Mihai Raneti
  41. 41. Approach by: Amar Wakharkar and Mary Nowottnick Cyber security will be seen as one of the most pressing national security issues of 2017 due to sophisticated and highly publicized cyber-attacks, such as the ones reported by various media channels during the US Presidential election that the Russians hacked the Democratic National Committee’s computer systems. In addition to their attacks on Democratic organizations, cyber security will be increasingly framed as a strategic and national prestige issue. As a result, too much attention on a large scale probability will be targeted to cyber-attacks on the government and the national critical infrastructure. Cyber operations will be a significant component of future warfare. 2017 will be a pivotal year for governments, financial firms, the auto industry and IoT (Internet of Things) vendors as they try to stay ahead of the IT security curve. The current trends showcase that cyber security today is not just about securing your data, but about maintaining and managing the overall assets for your country, as well as your organization. With each day, it is important that the government, as well as other entities, know how cyber security threats are impacting their business and consumers, and how the cyber security solution industry is meeting these concerns. Entities need to be more vigilant, financially prepared and rapid to meet the security requirements and expectations from their customers, shareholders, and regulators. Some of the other key trends for 2017 will be: • 2017 will see increased spending on National Critical Cyber Infrastructure and increased regulatory monitoring. Regulatory guidelines will be far more stringent and followed strictly, backed by the government agenda to security national critical cyber infrastructure. • The growth of mobile technology adoption has driven a growth in corporate and end user security vulnerabilities and data breaches. Now, many applications ask for permission to access the user's contact list, personal information and location. In some scenarios, users are not even aware of such data or location sharing and have no clue about the proper security hygiene to be followed. It has resulted in a huge gap that may lead to far larger and a more impactful mobile security issue. Enterprise mobile security and BYOD solutions with concentration on policy management, device security, content security, mobile application security and identity and access management, will help organizations and individuals to set up an effective mobile security road map and ensure that the end user is secured. • We will see a significant increase in national political leadership targeting. Senior political leaders, diplomats and their online social presence will be the main target of attackers, resulting in the loss of confidence and prestige. Government and senior political leaders should assume that hackers already have a complete profile of them and are waiting for the right opportunity to strike. • IoT and IoT payment risk will emerge as a global risk. As many IoT vendors, banks and investment firms continue on the path to IoT, they will become increasingly inter-connected. A security breach at one firm can create negative effects that may greatly impact the adoption of IoT technology, and so, technology risks will continue to rise. 41
  42. 42. • Zero-day exploits and insider threats and organized attacks will continue to increase. In addition to technology risks, skill set development and staff augmentation will present greater challenges to organizations. The current industry trend shows that there is a discrepancy between demand and supply for certified, experienced and knowledgeable cyber security professionals. The existing workforce is struggling to keep up with the increasing payload. In response to this increased payload, the attack on organizational infrastructure, and the existing workforce is struggling. The demand for skilled cyber security professionals will increase exponentially in 2017. Currently, very few cyber security experts are linking the business and the security practice and making C-Suite decisions to impact the business environment. Companies will need many more experts in their C-Suite who can make the case for cybersecurity aligned to business challenges and business expansion. 42 Authors: Amar Wakharkar is cyber security expert at Capgemini USA based out of Houston, TX. Amar has more than nine years of global cyber security consulting experience across Nigeria, Kenya, India, Hong Kong, Singapore, Malaysia, Qatar, United Arab Emirates, USA with Fortune 500 clients in the area of application security, SSDLC, mobile security, ITGC, penetration testing and vulnerability assessment areas. Amar has published numerous articles in print media and was speaker in cyber security forum. He is reachable on AMARSUHAS@HOTMAIL.COM Amar Wakharkar is cyber security expert at Capgemini USA based out of Houston, TX. Amar has more than nine years of global cyber security consulting experience across Nigeria, Kenya, India, Hong Kong, Singapore, Malaysia, Qatar, United Arab Emirates, USA with Fortune 500 clients in the area of application security, SSDLC, mobile security, ITGC, penetration testing and vulnerability assessment areas. Amar has published numerous articles in print media and was speaker in cyber security forum. He is reachable on AMARSUHAS@HOTMAIL.COM Mary Nowottnick has six years of IT security experience, including work at the Goddard Space Flight Center in the Deep Space Science Missions Field. Currently she is working at a Fortune 500 company and can be reached at mcnowottnick@gmail.com Mary Nowottnick has six years of IT security experience, including work at the Goddard Space Flight Center in the Deep Space Science Missions Field. Currently she is working at a Fortune 500 company and can be reached at mcnowottnick@gmail.com
  43. 43. Approach by: Celal Cagri Nowadays, we have witnessed so much that people are referring to past times as "how did old people who did not have our opportunities in the past continue their lives?" It is impossible not to relate to this statement because computers, smartphones, intelligent home systems, intelligent cars, internet of things products and the Internet itself are a part of our lives now and we can’t imagine life without them. However, all of these things bring their own security problems to us. Pentest is one of the offensive ways to deal with these security issues. Pentest is a solution, a service. Pentest is a different approach for individuals, corporations and countries to look at their cyber security and privacy levels with the eyes of the hackers. Pentest is a system that is constantly improving, like other systems that have such a large usage volume. Just like every complex system, making its process as automated as possible is one of the goals of a pentest. To solve this part of the problem, machine learning and software engineering must be used effectively. However, besides this, a pentest has its own agenda, such as developing new methodologies, using new techniques, exploring new attack surfaces in cyberspace. It leads us to new trends in cyber security and pentest. When we look at 2017, we expect a different, beautiful year with new approaches. Among the trends of 2017, we must first consider the web pentest. The reason for this is obvious. All over the world, companies are developing their products to serve over the web. Many people may say that "Web pentest is already known and it is continuously performed". However, this web pentest is a little bit specialized. JavaScript platforms and its libraries are started to be used more all over the world. Applications are running node.js in the background. Backbone.js, ember.js and now mostly angular.js libraries are being used every day in front-end. This trend, which has been observed in application development, has led the attackers to find new vulnerabilities in these JavaScript libraries and platforms and exploit them. Therefore, to provide better security, it seems that the pentester will be spending a lot of time on JavaScript-based web applications in 2017. In social engineering, ransomware and web browsers attacks, especially man in the browser (MiTB), are very popular for attackers recently. Traditional precautions, such as SSL, CSRF tokens or two-step verifications to prevent sensitive data-theft, unauthorized transactions etc., do not have any impact on MiTB attack because they all can be bypassed very easily. Run Time Application Self Protection(RASP) is a new technology and is recommended for preventing the MiTB attacks. Although RASP is a good solution for SQL injections or XSS attacks, it’s still inadequate to stop MiTB attacks. When we consider everything, it is obvious that the most important purpose of the social engineering attacks in a pentest is to raise awareness of the users, thus simulating the real attack in the same way is the best solution. Therefore, for the pentester, using malicious web browser plugins/add-ons in social engineering attacks to compromise the target system with MiTB attacks or show clients what hackers can do in real life by infecting fake ransomware software to client systems, will be one of the most common trends for 2017. 43
  44. 44. One of the other important titles of 2017 is Mobile Pentest. What I mean by mobile pentest is not just the pentest of mobile applications. It should be considered as attacks that target phones and mobile operating systems directly. While new vulnerabilities are discovered, even in the most recent iOS and Android versions, the importance of this kind of mobile pentest is better understood if you realize that many people do not update their phones regularly. Advanced Persistent Threat (APT) attacks have been heard so much in recent years and it would not be wrong to say that attacking critical employees’ mobile phones directly will be a new trend in target oriented pentest projects that simulate to APT attacks. It is worth briefly mentioning the cyber security trends as well. There is an old concept that we have been hearing a lot lately: Web malware. Looking at the solutions offered so far, we see that there are popular products that fight against web malware and products that find classic web vulnerabilities. However, we don’t see a solution dealing with both together. For 2017 and after, products that address both web malware and web vulnerabilities will be a new trend solutions. Also, products especially focused on browser security will also be new trends for 2017. Every year, we expect some new qualifications for new car models such as an automatic parking system but we don’t expect to change basic components of the car such as wheels or tires. Likewise, the core components of the pentest (network attacks, wireless assessments, classic web application pentests, etc., and the way it is performed) will still continue (and it must be) in 2017. In addition, JavaScript-based web application pentests, social engineering attacks that target browsers, fake ransomware attacks, mobile attacks that target the phone itself will be a special place in 2017. 44 In social engineering, ransomware and web browsers attacks, especially man in the browser (MiTB), are very popular for attackers recently.
  45. 45. Approach by: Ahmed Atef Selim As 2016 is ending with many security incidents, research, conferences and discussions have taken place during the last 365 last days. It is time to have a look at the rising trends for 2017 and security controls suggested as lessons learned from research, incidents, etc. Security specialists need to pay attention to new trends in both defensive and offensive worlds, new techniques that will help defenders protect their assets more effectively. Also, bad guys have their own trends. In this article, we will try to cover the most rising trends in the security world (defensive and offensive), including the new trend of deception of an attacker, moving toward thread-intelligence-driven operations, business disruption attacks. Raising of Game Theory (Deception & Decoy) Imagine for a moment, that once an attack is detected in an end user’s environment, the user’s system had the ability to begin to lie and trick the attacker, giving false responses. This is now a reality and it’s called deception techniques. For the past 20 years, most active security control responses built into network security have remained fairly constant, offering only a limited number of response actions, such as log, reject, drop and 45 Security specialists need to pay attention to new trends in both defensive and offensive worlds, new techniques that will help defenders protect their assets more effectively.
  46. 46. quarantine, such responses visible to a skilled adversary, especially APT actors and can accordingly workaround them and change the attack strategy. On the contrary, deception by definition moves beyond detection to diversion and offers detection and disruption of the attack process, resulting in the delay of an attacker’s activities or failing the whole breach progression. Although the idea may seem nascent, deception techniques have been used widely to enhance threat detection and enhance threat response strategy. For years, most security practitioners used honeypots to gather threat intelligence, even in some cases during incident investigation, deception techniques are used to intercept and disrupt command-and-control communications. However, recent technology is offering more than information gathering (as honeypots offers), recent technology is capable of automated decoying. Today, deception technologies are being employed within security products and include the use of bot emulated/virtualized and real endpoint decoy systems, as well as network services, protocols, applications or fake data elements, where technology provider try to cover four levels (Network, Endpoint, Application and Data). One important thing to consider is how far the technology provider can trick the attacker, and this can be achieved by adopting deception on all steps of the kill chain. Figure 1 shows the deception strategies that can be used for each step of the kill chain. Figure 1 Deception facing Kill Chain Steps Finally, you need to know that deception techniques and technologies have existed and are being adopted in the market; such technology is gaining more fans within financial services and healthcare domains. Meanwhile, technology providers can certainly do more to articulate their threat deception capabilities and enhance old products (such as firewalls, IPS, etc.) to leverage deception techniques to thwart attackers and enhance detection. Raising of Threat Intelligence & Management (Analytics & Visualization) It is no secret that organization spending is directed toward solutions that could offer to close the "breach monitoring" gap, however, as much spending organizations do, the problem isn’t solved since attackers are always evolving and getting new ideas. Although this observation proves the common saying “There is no silver bullet”, it also shows the need for threat management over vulnerability management. Analytics and Visualization are terms that are coming to the security domain and raising, this trend gives the opportunity for security teams to shift operations towards threat management teams. Instead of focusing on a well-known vulnerability, threat management teams need to focus on all scenarios even if vulnerability doesn’t “currently” exist. 46
  47. 47. For proper threat management, a huge amount of data needs to be collected and then analyzed accordingly to make the right decisions. Therefore, Analytics and Visualization have become game- changers in the security domains and this trend will continue rising for a while as it impacts a security process, not just a routine operation. For simplicity, figure 2 shows the main function of analytics and how this serves the decision maker. On the other hand, visualization is important to show the decision maker how the analysis is done to support the decision. Next we will check two rising trends that need to be adopted or planned to evolve your operations. Figure 2 Security Analytics Function User and Entity Behavior Analysis: UEBA is the normal evaluation for the User Behavior analysis, as mentioned before that the analytics domain will keep evolving and raising more. Actually, UEBA is a conversation of another behavior analytics plus more analytics, so instead of analyzing data to capture fraudulent activities or an insider, you can capture misbehavior in the organization assets and most important to capture data exfiltration. Red Teaming Automation: Most organizations are investing to conduct penetration testing and vulnerability analysis to keep its organization secure, however, these exercises are not a replica of the real world attack (due to the limitations that exist to not impact availability or a false positive is involved as long as there is no testing for some vulnerabilities). Accordingly, analytics and visualization came into the picture to support these activities by conducting more powerful exercises as they have a huge data that gives them more penetration and have tools to help visualize these data and simulate attacks that can’t be done by traditional methods. On the offensive Side (Business Disruption) Although what has been seen in 2016 from ransomware spreading and all this attention from manufacturers and end-users, it may not be the year that will be remembered. Business Disruption attacks became a trend and it seems that the signs started early by an attack on KSA governmental entities. Ransomware is not the only way for business disruption, however, more ways are getting in the way. Business Disruption is rising to the surfs, specifically data integrity. The rise of this trend may be due to the big economics and profit coming from it, specifically that it targets business. The trend is expected to expand more to include not only organizations but strategic governmental entities and being used in political disruptions. 47
  48. 48. Final Words In conclusion, security specialists need to pay attention to new trends in both defensive and offensive worlds, and new techniques that will help defenders protect their assets. One of them is deception where the security specialist will not only detect and prevent, they will also have the ability to disrupt the attacking process, the same as playing chess. CISO/CSOs must start thinking about a threat intelligence-driven process instead of the ordinary ways for driving the security process (such as current practices, penetration testing, vulnerability assessment, etc.). On the other hand, the bad guys are still evolving and they have their own trends; one of the trends that keeps evolving and will be targeting much bigger entities is the business disruption attacks. Finally, alongside of the rising trends, some of the old trends keep evolving and will keep evolving, such as: • Governance Risk & Compliance (GRC): Every day we find new breach and Organizations and Governments are issuing regulation and standards, and it keeps getting tougher. • Identity and Access Management (IAM): is a dream for every big organization to achieve, as the number of employees increase and their security issues related to authentication become uncontrollable, the dream will become a must to have. Wish everyone preparing effective 2017 security plan and happy 2017. 48 Author: Ahmed A. Selim Professional Service Head at SecurityMeter, a Security Managed Service Provider in North Africa Middle East and East of Asia. He conducted a wide range of security services and deployment for major entities in the MENA Region including consultancy, strategic planning and organizational shift over. His early career in IT gave him the opportunity to have wide range of IT Domain and qualified him to focus on Security consultancy and lead a team of Professional Experts in Security Service and Solutions.
  49. 49. Approach by: Washington Umpierres de Almeida Junior The world society has watched the forms of communication evolve throughout its history. There have been times when the telegram was known as the fastest way to send a message to a person or company, and even in this scenario, there were people able to intercept this kind of information when it was in transit. However, in those times, these people should have physical access to the information since the data was traveling written on paper. But the forms of communication continued to evolve until the emergence of the Internet, where communication methods went through a process of evolution that revolutionized the way people and companies communicated with each other. Nowadays, the methods used to do things have been changing dramatically. Today people use electronic transfers instead of exchanging checkbook sheets, send e-mails instead of writing letters, share information in social network instead of meeting acquaintances and friends somewhere and so on. From an industry point of view, the evolution goes the same way. Companies have been implementing complex automated methods to increase their production and more recently, financial institutions are working to implement the blockchain-based technology, which indicates a movement to replace the traditional bank business model. The world and the way people and companies do things has been changing very quickly. This evolution has brought both benefits and challenges to modern society, which today has huge dependence on Internet resources. Along with these changes also arise the threats involved on each technological element around us. So what can we expect from incoming threats in 2017? Incoming Threats The incoming threats for the next years will be focused in SSL/TLS1 protocols, blockchain-based technology and smartphones. Why? Let us have a look at each one in more detail. Attacks on SSL/TLS protocols In a simplified way, the protocol running over SSL/TLS implementation adds an "S" in the end. Thus, for example, to a web application (http) implemented in a secure manner (SSL/TLS) it has the format "https", which is some times referenced as "http secure". After the development of the Secure Socket Layer by Netscape2, it seemed the technology information industry would have found a way to provide a secure manner to navigate in the Internet. For many years, the security provided by SSL/TLS protocols seemed to be the best way to guarantee privacy and security over on-line transactions. Although still widely used over the Internet, SSL/TLS protocols present serious vulnerabilities that allow hackers to exploit numerous variations of these flaws to compromise systems and as a consequence it can be used to capture sensitive data such as personal information, credit card details, user ids, passwords and so on. 49