SlideShare una empresa de Scribd logo
1 de 22
Datele mobile, amenintarile emergente




Teodor Cimpoesu
Managing Director, Romania&Bulgaria, Eastern Europe
Kaspersky Lab
Cateva stiri

2011-04
• SpyEye/mTAN: "Die Seriennummer des Zertifikats: 88689-1299F"

2011-03
• RSA –2011 Recruitment plan.xls
  “Our investigation has led us to believe that the attack is in the category of an
  Advanced Persistent Threat (APT). […]. Some of that information is specifically
  related to RSA's SecurID two-factor authentication products”
2011-03
• Ministère de l’Economie et des Finances
  “«Ceux qui ont agi sont des professionnels déterminés et organisés. C’est
  la première attaque contre l’Etat français de cette ampleur et à cette
  échelle»”
2011-02
• European Union Emissions Trading System
     “cyber-attackers are successfully breaching electronic trading systems not
     merely for the purpose of stealing funds, but to actively «spread panic
     among markets and destabilize western financial institutions. »”
 2
Numiti virusul!
1999



                  Efectul grafic din stanga
                  era afisat de catre virusul:

                  a) CodeRed
                  b) Melissa
                  c) Happy99
                  d) Cascade
Numiti virusul!
2003




        Cum se numeste virusul de mai sus?
       a) MyDoom           b) MyTob
       c) Rbot             d) Blaster/Lovesan
Numiti virusul!
2010




           Cum se numeste virusul de mai sus?

   a) BumBoom                    b) Ayran
   c) Robotz                     d) Stuxnet


PAGE 5 |             | 08 April 2011
Perimetrul de securitate - inainte
Perimetrul de securitate - acum
Basics
Metamorfoza troian-bot
Sitting on a time bomb

                         Retelele de tip botnet reprezinta
                         adevarate mine de aur pentru furtul
                         de informatie
                         • Cantitatea de informatie expusa la
                           riscul de a deveni publica este
                           ingrijoratoare


                         Utilizatorul de rand nu realizeaza
                         posibilele consecinte ale folosirii unui
                         calculator infectat
                         • E infectat, dar imi fac treaba cu el!
                         • Malware-ul clasic poate fi convertit
                           oricand in scopuri de furt de
                           informatie
Cifre ingrijoratoare

 Kaspersky Lab proceseaza mai mult de 70.000 de programe periculoase
 (virusi, troieni, viermi, adware, etc) in fiecare zi


25,000,000
22,500,000
20,000,000
17,500,000          2006: Un virus nou in fiecare minut
15,000,000
12,500,000       2011: Un virus nou in fiecare secunda
10,000,000
 7,500,000
 5,000,000
 2,500,000
         0
             2004      2005    2006     2007     2008     2009    2010
                                                    Sursa: Kaspersky Lab
Malware dedicat furtului de date
2009 vs. 2010 vs. 2011


  120000 2009 vs. 2010
         - 87% crestere in data stealing malware
  100000 - 135% crestere in familia Trojan-Spy

   80000 2010 a fost primul an in care am adaugat
         mai mult de 100.000 de semnaturi
   60000
         pentru malware-ul dedicat furtului de date.

   40000

   20000

        0
               2006      2007    2008       2009          2010
Sursa: Kaspersky Lab                      Trojan-Banker   Trojan-PSW   Trojan-Spy
Malware
Number of signatures


 Amenintarile la adresa smartphone-urilor sunt in crestere
 Numarul total de semnaturi pentru mobile malware la 15 februarie 2011: 1990




 Sursa: Kaspersky Lab
Structură standard rețea corporate




               | 08 April 2011
Back to basics
Protectia endpoint-ului devine vitala

Ce inseamna endpoint in ziua de azi:
• Desktop
• Laptop
                              Endpoint-urile din ce in ce mai
• Smartphone                  mobile aduc o noua provocare:
• Tablet                    protejarea perimetrelor deschise
• ?




Protectia endpoint-ului devine vitala:
• Retele securizate, cu politici stricte, dar cu utilizatori mobili
• Adoptia accelerata a smartphone-urilor, o noua problema pentru managerii IT
Kaspersky Open Space Security
Protecție complexă

Linia de produse Kaspersky Open Space Security a fost dezvoltată
pentru a proteja rețelele de tip corporate împotriva celor mai noi
tipuri de amenințări indiferent de dimensiune și complexitate.




                     | 08 April 2011
Kaspersky Open Space Security
Linie de produse




                   | 08 April 2011
Kaspersky Work Space Security




              Kaspersky Anti-Virus for Windows Workstations



              Kaspersky Anti-Virus for Linux Workstation



               Kaspersky Endpoint Security for Mac Nou!



               Kaspersky Endpoint Security for Smartphone Nou!




Kaspersky Open Space Security Essentials | 08 April 2011
Kaspersky Business Space Security


             Kaspersky Work Space Security components

             Kaspersky Anti-Virus for Windows Servers

             Kaspersky Anti-Virus for Linux File Server Nou!

             Kaspersky Anti-Virus for Novell NetWare

             Kaspersky Anti-Virus for Windows Servers EE Nou!




Kaspersky Open Space Security Essentials | 08 April 2011
Kaspersky Enterprise Space Security


               Kaspersky Business Space Security components

               Kaspersky Security 8.0 for Microsoft Exchange Servers Nou!

               Kaspersky Security for Microsoft Exchange Server 2003

               Kaspersky Anti-Virus for Linux Mail Server

               Kaspersky Anti-Virus 8.0 for IBM Lotus Domino Nou!



              Platforme
              suportate
                                                 Microsoft Exchange        Linux
                                                Servers 2003/2007/2010                 Lotus/Domino
                                                                         Mail Server




Kaspersky Open Space Security Essentials | 08 April 2011
Total Space Security


               Componente Kaspersky Enterprise Space Security

               Kaspersky Anti-Virus for Microsoft ISA Server and Forefront
               TMG Standard EditionNou!

               Kaspersky Anti-Virus for Microsoft ISA Server

               Kaspersky Anti-Virus for Proxy Server

               Kaspersky Anti-Spam

               Kaspersky Mail Gateway


              Platforme                Microsoft           Proxy
              suportate                ISA / TMG           Servers
                                       Server


Kaspersky Open Space Security Essentials | 08 April 2011
Perspective



 Securitatea este un process nu
un produs

 Adoptarea de noi tehnologii este
urmata si de cresterea potentialului
de criminalitate informatica


 Revizuiti-va riscurile de securitate in perimetrele deschise


 Unde va sunt datele, si cum sunt ele accesate?
 Exista riscuri si asupra afacerii dvs?
Multumesc
Intrebari, va rog!




teodor.cimpoesu@ro.kaspersky.com
twitter.com/cteodor

Más contenido relacionado

La actualidad más candente

Risq mark bullen - juniper (11-16-16)
Risq   mark bullen - juniper (11-16-16)Risq   mark bullen - juniper (11-16-16)
Risq mark bullen - juniper (11-16-16)ColloqueRISQ
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer supportbozzerapide
 
A history of computer viruses three special viruses
A history of computer viruses   three special virusesA history of computer viruses   three special viruses
A history of computer viruses three special virusesUltraUploader
 
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...Jacob Tranter
 
Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6
Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6
Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6Knowledge & Experience
 

La actualidad más candente (8)

Risq mark bullen - juniper (11-16-16)
Risq   mark bullen - juniper (11-16-16)Risq   mark bullen - juniper (11-16-16)
Risq mark bullen - juniper (11-16-16)
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
A history of computer viruses three special viruses
A history of computer viruses   three special virusesA history of computer viruses   three special viruses
A history of computer viruses three special viruses
 
APTs can you catch’em all
APTs can you catch’em allAPTs can you catch’em all
APTs can you catch’em all
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
 
Virus part1
Virus part1Virus part1
Virus part1
 
Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6
Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6
Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6
 

Destacado

Class it 14052012
Class it 14052012Class it 14052012
Class it 14052012Agora Group
 
Trend - HPC-29mai2012
Trend - HPC-29mai2012Trend - HPC-29mai2012
Trend - HPC-29mai2012Agora Group
 
Adrsv 18nov2010-1
Adrsv 18nov2010-1Adrsv 18nov2010-1
Adrsv 18nov2010-1Agora Group
 
30ian2009 docusoft
30ian2009 docusoft30ian2009 docusoft
30ian2009 docusoftAgora Group
 
Ronua - Programatica2010
Ronua - Programatica2010Ronua - Programatica2010
Ronua - Programatica2010Agora Group
 
Fonduri Structurale - Proiecte IT&C pentru dezvoltarea afacerii în mediul pri...
Fonduri Structurale - Proiecte IT&C pentru dezvoltarea afacerii în mediul pri...Fonduri Structurale - Proiecte IT&C pentru dezvoltarea afacerii în mediul pri...
Fonduri Structurale - Proiecte IT&C pentru dezvoltarea afacerii în mediul pri...Agora Group
 
Rad gs cas programatica2012
Rad gs cas programatica2012Rad gs cas programatica2012
Rad gs cas programatica2012Agora Group
 
Bmanolea programatica2010
Bmanolea   programatica2010Bmanolea   programatica2010
Bmanolea programatica2010Agora Group
 

Destacado (9)

Class it 14052012
Class it 14052012Class it 14052012
Class it 14052012
 
Trend - HPC-29mai2012
Trend - HPC-29mai2012Trend - HPC-29mai2012
Trend - HPC-29mai2012
 
Hp - 27mai2011
Hp - 27mai2011Hp - 27mai2011
Hp - 27mai2011
 
Adrsv 18nov2010-1
Adrsv 18nov2010-1Adrsv 18nov2010-1
Adrsv 18nov2010-1
 
30ian2009 docusoft
30ian2009 docusoft30ian2009 docusoft
30ian2009 docusoft
 
Ronua - Programatica2010
Ronua - Programatica2010Ronua - Programatica2010
Ronua - Programatica2010
 
Fonduri Structurale - Proiecte IT&C pentru dezvoltarea afacerii în mediul pri...
Fonduri Structurale - Proiecte IT&C pentru dezvoltarea afacerii în mediul pri...Fonduri Structurale - Proiecte IT&C pentru dezvoltarea afacerii în mediul pri...
Fonduri Structurale - Proiecte IT&C pentru dezvoltarea afacerii în mediul pri...
 
Rad gs cas programatica2012
Rad gs cas programatica2012Rad gs cas programatica2012
Rad gs cas programatica2012
 
Bmanolea programatica2010
Bmanolea   programatica2010Bmanolea   programatica2010
Bmanolea programatica2010
 

Similar a Kaspersky - 07apr2011

Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011Source Conference
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersKaseya
 
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitPR Americas
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...DefCamp
 
Esteban Próspero
Esteban PrósperoEsteban Próspero
Esteban PrósperoClusterCba
 
The Year the Internet Fell Apart
The Year the Internet Fell ApartThe Year the Internet Fell Apart
The Year the Internet Fell ApartIBM Security
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to InfrastructureJorge Orchilles
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Nancy Nimmegeers
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 
Evolución de la Ciber Seguridad
Evolución de la Ciber SeguridadEvolución de la Ciber Seguridad
Evolución de la Ciber SeguridadCristian Garcia G.
 
The unprecedented state of web insecurity
The unprecedented state of web insecurityThe unprecedented state of web insecurity
The unprecedented state of web insecurityVincent Kwon
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry moreBHack Conference
 
Online Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat ModelOnline Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat ModelEoin Keary
 
2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat ReviewESET
 
Defending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecurityDefending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecuritySophos Benelux
 
Cansec West 2009
Cansec West 2009Cansec West 2009
Cansec West 2009abhicc285
 
Mc afee conectando las piezas
Mc afee conectando las piezasMc afee conectando las piezas
Mc afee conectando las piezasSoftware Guru
 
Maximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesMaximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesSecunia
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security
 

Similar a Kaspersky - 07apr2011 (20)

Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and Hackers
 
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
 
Esteban Próspero
Esteban PrósperoEsteban Próspero
Esteban Próspero
 
The Year the Internet Fell Apart
The Year the Internet Fell ApartThe Year the Internet Fell Apart
The Year the Internet Fell Apart
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to Infrastructure
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Evolución de la Ciber Seguridad
Evolución de la Ciber SeguridadEvolución de la Ciber Seguridad
Evolución de la Ciber Seguridad
 
The unprecedented state of web insecurity
The unprecedented state of web insecurityThe unprecedented state of web insecurity
The unprecedented state of web insecurity
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry more
 
Online Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat ModelOnline Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat Model
 
2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat Review
 
Defending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecurityDefending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen Security
 
Cansec West 2009
Cansec West 2009Cansec West 2009
Cansec West 2009
 
Mc afee conectando las piezas
Mc afee conectando las piezasMc afee conectando las piezas
Mc afee conectando las piezas
 
Maximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesMaximize Computer Security With Limited Ressources
Maximize Computer Security With Limited Ressources
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 

Más de Agora Group

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...Agora Group
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseAgora Group
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftAgora Group
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Agora Group
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital ForensicsAgora Group
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMAgora Group
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the EnterpriseAgora Group
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateAgora Group
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessAgora Group
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu DopAgora Group
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru paciențiAgora Group
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...Agora Group
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Agora Group
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateAgora Group
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wireAgora Group
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileAgora Group
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Group
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LANAgora Group
 

Más de Agora Group (20)

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe procese
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms Shift
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004
 
Curs OSINT
Curs OSINTCurs OSINT
Curs OSINT
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital Forensics
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPM
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the Enterprise
 
ABPMP Romania
ABPMP RomaniaABPMP Romania
ABPMP Romania
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de Sănătate
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent Business
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu Dop
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru pacienți
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatate
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wire
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobile
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorni
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LAN
 

Kaspersky - 07apr2011

  • 1. Datele mobile, amenintarile emergente Teodor Cimpoesu Managing Director, Romania&Bulgaria, Eastern Europe Kaspersky Lab
  • 2. Cateva stiri 2011-04 • SpyEye/mTAN: "Die Seriennummer des Zertifikats: 88689-1299F" 2011-03 • RSA –2011 Recruitment plan.xls “Our investigation has led us to believe that the attack is in the category of an Advanced Persistent Threat (APT). […]. Some of that information is specifically related to RSA's SecurID two-factor authentication products” 2011-03 • Ministère de l’Economie et des Finances “«Ceux qui ont agi sont des professionnels déterminés et organisés. C’est la première attaque contre l’Etat français de cette ampleur et à cette échelle»” 2011-02 • European Union Emissions Trading System “cyber-attackers are successfully breaching electronic trading systems not merely for the purpose of stealing funds, but to actively «spread panic among markets and destabilize western financial institutions. »” 2
  • 3. Numiti virusul! 1999 Efectul grafic din stanga era afisat de catre virusul: a) CodeRed b) Melissa c) Happy99 d) Cascade
  • 4. Numiti virusul! 2003 Cum se numeste virusul de mai sus? a) MyDoom b) MyTob c) Rbot d) Blaster/Lovesan
  • 5. Numiti virusul! 2010 Cum se numeste virusul de mai sus? a) BumBoom b) Ayran c) Robotz d) Stuxnet PAGE 5 | | 08 April 2011
  • 9. Sitting on a time bomb Retelele de tip botnet reprezinta adevarate mine de aur pentru furtul de informatie • Cantitatea de informatie expusa la riscul de a deveni publica este ingrijoratoare Utilizatorul de rand nu realizeaza posibilele consecinte ale folosirii unui calculator infectat • E infectat, dar imi fac treaba cu el! • Malware-ul clasic poate fi convertit oricand in scopuri de furt de informatie
  • 10. Cifre ingrijoratoare Kaspersky Lab proceseaza mai mult de 70.000 de programe periculoase (virusi, troieni, viermi, adware, etc) in fiecare zi 25,000,000 22,500,000 20,000,000 17,500,000 2006: Un virus nou in fiecare minut 15,000,000 12,500,000 2011: Un virus nou in fiecare secunda 10,000,000 7,500,000 5,000,000 2,500,000 0 2004 2005 2006 2007 2008 2009 2010 Sursa: Kaspersky Lab
  • 11. Malware dedicat furtului de date 2009 vs. 2010 vs. 2011 120000 2009 vs. 2010 - 87% crestere in data stealing malware 100000 - 135% crestere in familia Trojan-Spy 80000 2010 a fost primul an in care am adaugat mai mult de 100.000 de semnaturi 60000 pentru malware-ul dedicat furtului de date. 40000 20000 0 2006 2007 2008 2009 2010 Sursa: Kaspersky Lab Trojan-Banker Trojan-PSW Trojan-Spy
  • 12. Malware Number of signatures Amenintarile la adresa smartphone-urilor sunt in crestere Numarul total de semnaturi pentru mobile malware la 15 februarie 2011: 1990 Sursa: Kaspersky Lab
  • 13. Structură standard rețea corporate | 08 April 2011
  • 14. Back to basics Protectia endpoint-ului devine vitala Ce inseamna endpoint in ziua de azi: • Desktop • Laptop Endpoint-urile din ce in ce mai • Smartphone mobile aduc o noua provocare: • Tablet protejarea perimetrelor deschise • ? Protectia endpoint-ului devine vitala: • Retele securizate, cu politici stricte, dar cu utilizatori mobili • Adoptia accelerata a smartphone-urilor, o noua problema pentru managerii IT
  • 15. Kaspersky Open Space Security Protecție complexă Linia de produse Kaspersky Open Space Security a fost dezvoltată pentru a proteja rețelele de tip corporate împotriva celor mai noi tipuri de amenințări indiferent de dimensiune și complexitate. | 08 April 2011
  • 16. Kaspersky Open Space Security Linie de produse | 08 April 2011
  • 17. Kaspersky Work Space Security Kaspersky Anti-Virus for Windows Workstations Kaspersky Anti-Virus for Linux Workstation Kaspersky Endpoint Security for Mac Nou! Kaspersky Endpoint Security for Smartphone Nou! Kaspersky Open Space Security Essentials | 08 April 2011
  • 18. Kaspersky Business Space Security Kaspersky Work Space Security components Kaspersky Anti-Virus for Windows Servers Kaspersky Anti-Virus for Linux File Server Nou! Kaspersky Anti-Virus for Novell NetWare Kaspersky Anti-Virus for Windows Servers EE Nou! Kaspersky Open Space Security Essentials | 08 April 2011
  • 19. Kaspersky Enterprise Space Security Kaspersky Business Space Security components Kaspersky Security 8.0 for Microsoft Exchange Servers Nou! Kaspersky Security for Microsoft Exchange Server 2003 Kaspersky Anti-Virus for Linux Mail Server Kaspersky Anti-Virus 8.0 for IBM Lotus Domino Nou! Platforme suportate Microsoft Exchange Linux Servers 2003/2007/2010 Lotus/Domino Mail Server Kaspersky Open Space Security Essentials | 08 April 2011
  • 20. Total Space Security Componente Kaspersky Enterprise Space Security Kaspersky Anti-Virus for Microsoft ISA Server and Forefront TMG Standard EditionNou! Kaspersky Anti-Virus for Microsoft ISA Server Kaspersky Anti-Virus for Proxy Server Kaspersky Anti-Spam Kaspersky Mail Gateway Platforme Microsoft Proxy suportate ISA / TMG Servers Server Kaspersky Open Space Security Essentials | 08 April 2011
  • 21. Perspective Securitatea este un process nu un produs Adoptarea de noi tehnologii este urmata si de cresterea potentialului de criminalitate informatica Revizuiti-va riscurile de securitate in perimetrele deschise Unde va sunt datele, si cum sunt ele accesate? Exista riscuri si asupra afacerii dvs?

Notas del editor

  1. http://www.h-online.com/security/news/item/Attacks-on-German-mTAN-banking-users-1222260.htmlhttp://www.rsa.com/node.aspx?id=3872http://www.parismatch.com/Actu-Match/Societe/Actu/Affaire-d-espionnage-au-ministere-par-de-l-Economie-et-des-Finances-Paris-Match-258213/http://www.securityweek.com/attackers-subtle-markets-manipulation-could-tilt-global-economies
  2. On August 29, 2003, Jeffrey Lee Parson, an 18-year-old from Hopkins, Minnesota was arrested for creating the B variant of the Blaster worm; he admitted responsibility and was sentenced to an 18-month prison term in January 2005.[2]
  3. Transformareaunui calculator intr-unzombi cu ajutorulunuitroian
  4. While highly customized malware is being used in sophisticated targeted attacks to gain access inside corporate or governmental networks, the potential dangers of classic malware infections are being massively overlooked by the security industry. Right now, cybercriminals are inadvertently sitting on a goldmine of information in the PCs they have already infected and added to their botnets.
  5. But let’s move back down to Earth just a little bit and realize that for every major information leakage incident that’s making headlines out there right now there are thousands of average users’ computers getting infected and creating a much bigger risk.
  6. 2006 2007 2008 2009 2010Trojan-Banker 3829 6724 18033 22552 27524Trojan-PSW 7540 11252 17434 23772 46029Trojan-Spy 6641 11115 24692 27460 64466 18010290916015973784138019
  7. Hereweseethatthenetworkperimeterispracticallyfullofholesandyouhavetoworkinsidetheperimeterasifitdidnotexistatallandasifthisworkweredoneunderconditionsofunprotectedopenspace. Intheseconditions, thefocusininformationsafetyshiftsfromthenetworkperimeterdirectlytothenodesthatcomprisethisnetwork– theworkstationsandfileservers. Inordertoensuresafetytheyhavetobecapableofindependentlyprotectingthemselvesfromdatathreatswithoutrelyingtoomuchontheprotectedperimeter.
  8. Thecorrectandmodernapproachtoprotectingacorporatenetworkforvirusthreats, firstofall, involvesthecorporatenetworknodes – workstationsandfileservers – ensuringprotection. Intermsofreliability, wecontinueasbeforetoprotectthenetworkperimeter, thatis, emailserversandaccessgatewaystotheInternet.A correctlyprotectednetworklooksjustlikethediagrambelow.
  9. InApril 2007, Kaspersky Lab launchedthesimilarlynamedfamilyofproducts – Kaspersky Open Space Security, whichmeettheaboverequirementsinpractice.Thefamilyincludesfourproducts. Dependingonthesizeandcomplexityofanetworkaswellasthecustomer'sneeds, thecustomershoulduseanyoftheproductsfromOpen Space.Theintroductorystageproduct – Kaspersky Work Space Securityonlyprotectsworkstationsandmobiledevicessuchasnotebooksandsmartphones.Ifacustomeralsorequirestheprotectionoffileservers, thenthecustomerneedsKaspersky Business Space Security.TheproductKaspersky Enterprise Space Security protectscorporateemailserversinadditiontoworkstationsandfileservers.WhileKaspersky Total Space Securitygenerallyprotectseverything, includingInternetgatewayssuchasMicrosoft ISA-Server, Linux Proxy Server orCheck-Point Firewall.
  10. AsfortheantivirusprotectionofInternetgateways, Kaspersky Laboratoriesoffersthefollowingrangeofproducts:Kaspersky antivirusforvariousversionsofMicrosoft ISA server: ISA server 2000, 2004 and 2006 Standard andEnterprise Edition.antivirusforProxy server. AllpopulartypesofProxy serversaresupported, forinstance: Squid (with ICAP protocol), Blue Coat SG Appliance, NetApp/Blue Coat NetCache, Cisco ACNS Content Engine, appliedontheGNU/LinuxOSAllantivirusesforInternetgatewaysutilizeasimilarprinciple: Internetgatewayserver (software) receivestheincomingdatastream, thenittransfersthedatathroughitssoftwareinterfacetotheantiviruskernelforchecking. Thenthekerneltakestheobjectsfromthetrafficandchecksthem. Whennecessary, itgrabsthemaliciousobjectsandreturnstheprocessedandcleanedflowbacktotheInternetgateway.
  11. AsfortheantivirusprotectionofInternetgateways, Kaspersky Laboratoriesoffersthefollowingrangeofproducts:Kaspersky antivirusforvariousversionsofMicrosoft ISA server: ISA server 2000, 2004 and 2006 Standard andEnterprise Edition.antivirusforProxy server. AllpopulartypesofProxy serversaresupported, forinstance: Squid (with ICAP protocol), Blue Coat SG Appliance, NetApp/Blue Coat NetCache, Cisco ACNS Content Engine, appliedontheGNU/LinuxOSAllantivirusesforInternetgatewaysutilizeasimilarprinciple: Internetgatewayserver (software) receivestheincomingdatastream, thenittransfersthedatathroughitssoftwareinterfacetotheantiviruskernelforchecking. Thenthekerneltakestheobjectsfromthetrafficandchecksthem. Whennecessary, itgrabsthemaliciousobjectsandreturnstheprocessedandcleanedflowbacktotheInternetgateway.
  12. Let'sbeginwithmailprotection.WeprotectalltypesofExchange servers. Exchange 2000 and 2003 areprotectedbyKAV forMS Exchange 2000/2003.Also, thereisanapplicationforExchange 2003 calledKaspersky Security forMS Exchange Server 2003thatprotectsagainstvirusesandspam.ThereisalsoaproductforMS Exchange 2007 calledKaspersky Security, butitonlyprotectsfromvirusesandhasnointegratedanti-spamfunction, anditprobablywon'tbeintegratedalthoughitwasinitiallyplanned.ThereisalsoanantivirusforIBMLotus Domino, butonlyforWindows.ThereareantivirusesforUNIX systemsthatprotectmailservicesbasedonSendmail, Qmail, Postfix, and Exim. (Forfurtherinformation, seesystemrequirements).UNIX systemsrequireaseparateKaspersky Antispam installation.ThereistheKaspersky Mail-Gateway application, designedforasinglecomputerthatchecksallmailtrafficformaliciouscodeandspam.
  13. AsfortheantivirusprotectionofInternetgateways, Kaspersky Laboratoriesoffersthefollowingrangeofproducts:Kaspersky antivirusforvariousversionsofMicrosoft ISA server: ISA server 2000, 2004 and 2006 Standard andEnterprise Edition.antivirusforProxy server. AllpopulartypesofProxy serversaresupported, forinstance: Squid (with ICAP protocol), Blue Coat SG Appliance, NetApp/Blue Coat NetCache, Cisco ACNS Content Engine, appliedontheGNU/LinuxOSAllantivirusesforInternetgatewaysutilizeasimilarprinciple: Internetgatewayserver (software) receivestheincomingdatastream, thenittransfersthedatathroughitssoftwareinterfacetotheantiviruskernelforchecking. Thenthekerneltakestheobjectsfromthetrafficandchecksthem. Whennecessary, itgrabsthemaliciousobjectsandreturnstheprocessedandcleanedflowbacktotheInternetgateway.