SlideShare una empresa de Scribd logo
1 de 18
hackers
      vs suits
what's wrong with security
         today?
agenda


   the suit
   the hacker
   questions?
the suit
    http://www.flickr.com/photos/23912576@N05/
experimen
    t
 “playing card data loss”
T1: Sleight of hand                  T4: The pair is together
C1: Don't let the attacker handle    C4: Deal into two piles
the cards
                                     T5: If the location of one card is
T2: Marked cards                     known in one pack, the other card
C2: Keep the attacker at a           will be in a similar location in the
distance where he cannot see         other pack
small marks                          C5: Mix both packs

T3: The approximate location of
the pair is known
C3: Cut deck while attacker is not
looking




countermeasure
T1: Sleight of hand
                                         C1: Don't let the attacker
                                         handle the cards

                                         T2: Marked cards
                                         C2: Keep the attacker at a
                                         distance where he cannot see
                                         small marks

                                         T3: The approximate location of
                                         the pair is known
                                         C3: Cut deck while attacker is
                                         not looking

                                         T4: The pair is together
                                         C4: Deal into two piles

                                         T5: If the location of one card is
                                         known in one pack, the other
                                         card will be in a similar location
                                         in the other pack
                                         C5: Mix both packs




Model Source: taosecurity.blogspot.com
an
experimen
(unfortunately)
t
3 March 2011: A brief phishing attack began which targeted
RSA staff with no unusual privileges



6 April 2011, US defense contractors Lockheed Martin and L-
3 had been attacked via cloned RSA SecurIDs


6 June 2011, RSA partially admitted that something bad had
happened in March and offered to replace current customers'
SecurIDs at no cost


Sources
•   http://www.wired.com/threatlevel/2011/08/how-rsa-got-hacked/
•   http://blogs.rsa.com/rivner/anatomy-of-an-attack/
•   http://www.wired.com/threatlevel/2011/06/rsa-replaces-securid-tokens/
•   http://www.wired.com/threatlevel/2011/05/l-3/
•   http://www.rsa.com/node.aspx?id=3891
T1: Direct attacks from Internet      T4: Malicious activity may go
C1: State of the art perimeter        unnoticed
defenses                              C4: State of the art monitoring

T2: User authentication attacks       T5: Sensitive data could exit the
against Internet exposed services     network
C2: State of the art authentication   C5: State of the art data loss
controls                              prevention (DLP) technology

T3: Malware                           T6: Social engineering
C3: State of the art end-point        C6: State of the art security
controls                              awareness program




countermeasure
T1: Direct attacks from Internet
                                         C1: State of the art perimeter
                                         defenses

                                         T2: User authentication attacks
                                         against Internet exposed
                                         services
                                         C2: State of the art
                                         authentication controls

                                         T3: Malware
                                         C3: State of the art end-point
                                         controls

                                         T4: Malicious activity may go
                                         unnoticed
                                         C4: State of the art monitoring

                                         T5: Sensitive data could exit
                                         the network
                                         C5: State of the art data loss
                                         prevention (DLP) technology

                                         T6: Social engineering
                                         C6: State of the art security
                                         awareness program

Model Source: taosecurity.blogspot.com
http://blogs.rsa.com/rivner/anatomy-of-an-
                                             “Recently the UK payment council
                                             announced that in 2010 online banking
                                             fraud declined 22%, despite phishing levels
                                             increasing 21%. This is turning the tide. It
                                             took the financial sector 7 years to build
                                             a new defense doctrine against social
                                             engineering attacks like Phishing and
                                             Trojans. I was part of this gargantuan
                                             effort, and I think we’ve learned a thing or
                                             two that can help us build a new defense
                                             doctrine against APTs much faster. Already
                                             we’re learning fast, and every organization
                                             hit by an APT is much more prepared
                                             against the next one; I’m confident it will
                                             take us far less than 7 years to say we’ve
                                             turned the tide on APTs.”
good idea
but...
new threats
                                 our current approach
Identifying and cataloging new threats


Standardizing countermeasures


Adding these to vendor product lines
      When will we see the first APT-no-more product from a major
      vendor?
Entrenching into the standards canon
All too often we only change our defensive doctrine
   when:

      •   We get hit badly
      •   Compliance standards change
      •   When new products become available
      •   When the new fiscal cycle starts

   The attackers we face change their offensive doctrine
   much more frequently




we are too slow to adapt
John Boyd (1927-1997)

         a.k.a
         Forty Second Boyd

         .:
         Genghis John
         The Mad Major
         The Ghetto Colonel
                     Photo credit: Wikipedia
The adversaries that we
are defending against are
continually producing          Boyd
novelty (there will be
something else after APT)

“Now, in order to thrive and
                               novelt
                               on
grow in such a world we
must match our thinking
and doing, hence our
orientation, with that
                               y
emerging novelty”

Winning in inherently
dynamic environments
involves running through
flexible decision making
cycles faster than your
All major advances in science and
                         engineering were born of the
   you are               realization that current models -
    here                 or orientations, in Boyd's terms -
                         were mismatched with reality


our challenge
How can we gain the ability to traverse the
observe, orient, decide, act cycle as rapidly or more rapidly than our
opponents?


a possible answer?
We need to change our information security doctrine from compliance
and product-centred to innovation and human-centred
Chris Hammond-Thrasher
CISSP
Associate Director, Consulting
Security, Privacy and Compliance
Founder, Fujitsu Edmonton Security Lab
FUJITSU CANADA
chris.hammond-thrasher@ca.fujitsu.com
7809178426

Más contenido relacionado

Similar a hackers vs suits

54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
alinainglis
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a Solution
Dr Laurent Guiraud
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
Symantec
 
Eset trends report_2018
Eset trends report_2018Eset trends report_2018
Eset trends report_2018
malvvv
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
Austin Eppstein
 

Similar a hackers vs suits (20)

Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1
 
Deep Dive to Understanding the Mirai Botnet
Deep Dive to Understanding the Mirai BotnetDeep Dive to Understanding the Mirai Botnet
Deep Dive to Understanding the Mirai Botnet
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
Start here! Deconstructing the Blockchain Ecosystem
Start here! Deconstructing the Blockchain EcosystemStart here! Deconstructing the Blockchain Ecosystem
Start here! Deconstructing the Blockchain Ecosystem
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
The Internet is on fire – don't just stand there, grab a bucket!
The Internet is on fire – don't just stand there, grab a bucket!The Internet is on fire – don't just stand there, grab a bucket!
The Internet is on fire – don't just stand there, grab a bucket!
 
Pay attention to that man behind the curtain: Current state of Hacking Back
Pay attention to that man behind the curtain: Current state of Hacking BackPay attention to that man behind the curtain: Current state of Hacking Back
Pay attention to that man behind the curtain: Current state of Hacking Back
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a Solution
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
 
Eset trends report_2018
Eset trends report_2018Eset trends report_2018
Eset trends report_2018
 
Cybersecurity Trends 2018: The costs of connection
Cybersecurity Trends 2018: The costs of connectionCybersecurity Trends 2018: The costs of connection
Cybersecurity Trends 2018: The costs of connection
 
Why_TG
Why_TGWhy_TG
Why_TG
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digital
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
1. What are computer viruses Worms Describe the main effects of on.docx
1. What are computer viruses Worms Describe the main effects of on.docx1. What are computer viruses Worms Describe the main effects of on.docx
1. What are computer viruses Worms Describe the main effects of on.docx
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
 

Más de Chris Hammond-Thrasher

Más de Chris Hammond-Thrasher (12)

Alice and bob: Love & the most important crypto on the net
Alice and bob: Love & the most important crypto on the netAlice and bob: Love & the most important crypto on the net
Alice and bob: Love & the most important crypto on the net
 
Six health privacy experiments that should *NEVER* be caried out
Six health privacy experiments that should *NEVER* be caried outSix health privacy experiments that should *NEVER* be caried out
Six health privacy experiments that should *NEVER* be caried out
 
Introduction to Green IT
Introduction to Green ITIntroduction to Green IT
Introduction to Green IT
 
Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tooltalk: Social Engineering Toolkit (SET)Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tooltalk: Social Engineering Toolkit (SET)
 
Hacker tool talk: kismet
Hacker tool talk: kismetHacker tool talk: kismet
Hacker tool talk: kismet
 
Hacker tool talk: maltego
Hacker tool talk: maltegoHacker tool talk: maltego
Hacker tool talk: maltego
 
Hacker tool talk: kismet
Hacker tool talk:  kismetHacker tool talk:  kismet
Hacker tool talk: kismet
 
Open Source Library Software
Open Source Library SoftwareOpen Source Library Software
Open Source Library Software
 
Infosec Workshop - PacINET 2007
Infosec Workshop - PacINET 2007Infosec Workshop - PacINET 2007
Infosec Workshop - PacINET 2007
 
Popular GIS: a webliography
Popular GIS: a webliographyPopular GIS: a webliography
Popular GIS: a webliography
 
Popular GIS
Popular GISPopular GIS
Popular GIS
 
How hackers do it
How hackers do itHow hackers do it
How hackers do it
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

hackers vs suits

  • 1. hackers vs suits what's wrong with security today?
  • 2. agenda the suit the hacker questions?
  • 3. the suit http://www.flickr.com/photos/23912576@N05/
  • 4. experimen t “playing card data loss”
  • 5. T1: Sleight of hand T4: The pair is together C1: Don't let the attacker handle C4: Deal into two piles the cards T5: If the location of one card is T2: Marked cards known in one pack, the other card C2: Keep the attacker at a will be in a similar location in the distance where he cannot see other pack small marks C5: Mix both packs T3: The approximate location of the pair is known C3: Cut deck while attacker is not looking countermeasure
  • 6. T1: Sleight of hand C1: Don't let the attacker handle the cards T2: Marked cards C2: Keep the attacker at a distance where he cannot see small marks T3: The approximate location of the pair is known C3: Cut deck while attacker is not looking T4: The pair is together C4: Deal into two piles T5: If the location of one card is known in one pack, the other card will be in a similar location in the other pack C5: Mix both packs Model Source: taosecurity.blogspot.com
  • 8. 3 March 2011: A brief phishing attack began which targeted RSA staff with no unusual privileges 6 April 2011, US defense contractors Lockheed Martin and L- 3 had been attacked via cloned RSA SecurIDs 6 June 2011, RSA partially admitted that something bad had happened in March and offered to replace current customers' SecurIDs at no cost Sources • http://www.wired.com/threatlevel/2011/08/how-rsa-got-hacked/ • http://blogs.rsa.com/rivner/anatomy-of-an-attack/ • http://www.wired.com/threatlevel/2011/06/rsa-replaces-securid-tokens/ • http://www.wired.com/threatlevel/2011/05/l-3/ • http://www.rsa.com/node.aspx?id=3891
  • 9. T1: Direct attacks from Internet T4: Malicious activity may go C1: State of the art perimeter unnoticed defenses C4: State of the art monitoring T2: User authentication attacks T5: Sensitive data could exit the against Internet exposed services network C2: State of the art authentication C5: State of the art data loss controls prevention (DLP) technology T3: Malware T6: Social engineering C3: State of the art end-point C6: State of the art security controls awareness program countermeasure
  • 10. T1: Direct attacks from Internet C1: State of the art perimeter defenses T2: User authentication attacks against Internet exposed services C2: State of the art authentication controls T3: Malware C3: State of the art end-point controls T4: Malicious activity may go unnoticed C4: State of the art monitoring T5: Sensitive data could exit the network C5: State of the art data loss prevention (DLP) technology T6: Social engineering C6: State of the art security awareness program Model Source: taosecurity.blogspot.com
  • 11. http://blogs.rsa.com/rivner/anatomy-of-an- “Recently the UK payment council announced that in 2010 online banking fraud declined 22%, despite phishing levels increasing 21%. This is turning the tide. It took the financial sector 7 years to build a new defense doctrine against social engineering attacks like Phishing and Trojans. I was part of this gargantuan effort, and I think we’ve learned a thing or two that can help us build a new defense doctrine against APTs much faster. Already we’re learning fast, and every organization hit by an APT is much more prepared against the next one; I’m confident it will take us far less than 7 years to say we’ve turned the tide on APTs.”
  • 13. new threats our current approach Identifying and cataloging new threats Standardizing countermeasures Adding these to vendor product lines When will we see the first APT-no-more product from a major vendor? Entrenching into the standards canon
  • 14. All too often we only change our defensive doctrine when: • We get hit badly • Compliance standards change • When new products become available • When the new fiscal cycle starts The attackers we face change their offensive doctrine much more frequently we are too slow to adapt
  • 15. John Boyd (1927-1997) a.k.a Forty Second Boyd .: Genghis John The Mad Major The Ghetto Colonel Photo credit: Wikipedia
  • 16. The adversaries that we are defending against are continually producing Boyd novelty (there will be something else after APT) “Now, in order to thrive and novelt on grow in such a world we must match our thinking and doing, hence our orientation, with that y emerging novelty” Winning in inherently dynamic environments involves running through flexible decision making cycles faster than your
  • 17. All major advances in science and engineering were born of the you are realization that current models - here or orientations, in Boyd's terms - were mismatched with reality our challenge How can we gain the ability to traverse the observe, orient, decide, act cycle as rapidly or more rapidly than our opponents? a possible answer? We need to change our information security doctrine from compliance and product-centred to innovation and human-centred
  • 18. Chris Hammond-Thrasher CISSP Associate Director, Consulting Security, Privacy and Compliance Founder, Fujitsu Edmonton Security Lab FUJITSU CANADA chris.hammond-thrasher@ca.fujitsu.com 7809178426

Notas del editor

  1. Rivner is correct, we do need a new doctrine. However, an anti-APT doctrine is not the answer.
  2. It is good news that we can see that we have a mismatch