security threats and countermeasures in daily life - symantec
Post on 14-Sep-2014
447 views
DESCRIPTION
Security threats and countermeasures in daily life - Symantec. This walks you through various day-to-day information security threats one person undergoes on daily life and relevant counter-measures offered by Symantec. Find it useful, and shared it!TRANSCRIPT
![Page 1: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/1.jpg)
Security @WorkMathan Kasilingam, CISSP
Principal Solution Architect
![Page 2: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/2.jpg)
2
Four Key Trends
Internet Security Threat Report, Vol. 17
Malware Attacks81% ↑
Targeted Attacks Expand
Mobile Threats
Expose All
Data Breaches on Rise
![Page 3: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/3.jpg)
3
Security never sleeps
Threat & Risk Visibility
Information Protection
Identity Protection
Systems Management
Infrastructure Protection
Security Intelligence
Reconn
Incursion
Discovery
Capture
Exfiltrate
![Page 4: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/4.jpg)
4
Portrait of a Cyber-Crime
Smith Inc Small company – BIG ideas
![Page 5: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/5.jpg)
5
Attack #1: Port Scan
![Page 6: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/6.jpg)
6
Attack methodology: Company target identified
The target Company
The Hacker – individual, organisation or Government
![Page 7: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/7.jpg)
7
Port Scan – probe for vulnerabilities
Look for an entry
Weak points
Defence alignments
System vulnerabilities
Open doors
![Page 8: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/8.jpg)
8
No entry
Security Incident & Event Management
Threat & Risk Visibility
Information Protection
Identity Protection
Systems Management
Infrastructure Protection
Security Intelligence
Reconn
Incursion
Discovery
Capture
Exfiltrate
![Page 9: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/9.jpg)
9
Attack #2: Social Engineering
![Page 10: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/10.jpg)
10
Company employee target identified
Simon: The target employee
![Page 11: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/11.jpg)
11
Social Engineering
Simon: The target employee
Facebookprofile
Home address
Workinghours
Mobile Devices
Passwords
![Page 12: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/12.jpg)
12
Tracking the target
![Page 13: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/13.jpg)
13
Capturing the device
![Page 14: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/14.jpg)
14
No entry
Device Encryption Technology
Threat & Risk Visibility
Information Protection
Identity Protection
Systems Management
Infrastructure Protection
Security Intelligence
Reconn
Incursion
Discovery
Capture
Exfiltrate
![Page 15: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/15.jpg)
15
Attack #3: Spear Phishing
![Page 16: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/16.jpg)
16
Desktop targeted via Malicious email
![Page 17: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/17.jpg)
17
Even if Desktop Protection fails
![Page 18: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/18.jpg)
18
DLP (Data Loss Prevention) can prevent the data from leaving the network
![Page 19: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/19.jpg)
19
No entry
Data Loss Prevention
Threat & Risk Visibility
Information Protection
Identity Protection
Systems Management
Infrastructure Protection
Security Intelligence
Reconn
Incursion
Discovery
Capture
Exfiltrate
![Page 20: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/20.jpg)
20
Attack #4: Buffer Overflow Attack
![Page 21: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/21.jpg)
21
Buffer Overflow Attack
![Page 22: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/22.jpg)
22
Detecting system vulnerabilities and apply patches
Identify areas of concern
![Page 23: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/23.jpg)
23
No entry
Automated Compliance Management SolutionCritical System Protection (Host FW / IPS / Sys
Baseline)
Threat & Risk Visibility
Information Protection
Identity Protection
Systems Management
Infrastructure Protection
Security Intelligence
Reconn
Incursion
Discovery
Capture
Exfiltrate
![Page 24: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/24.jpg)
24
Attack #5: Password Hacking Attack
![Page 25: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/25.jpg)
25
Advanced Persistent Threat
Simon’s mumMrs LeeL E E
![Page 26: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/26.jpg)
26
No entry
Identity & Access Management Solution
Threat & Risk Visibility
Information Protection
Identity Protection
Systems Management
Infrastructure Protection
Security Intelligence
Reconn
Incursion
Discovery
Capture
Exfiltrate
![Page 27: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/27.jpg)
27
Attack #6: Attacking mobile devices
![Page 28: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/28.jpg)
28
Anti theft – Mobility solutions (Device Management Solution)
![Page 29: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/29.jpg)
29
No entry
Mobile Device Security
Threat & Risk Visibility
Information Protection
Identity Protection
Systems Management
Infrastructure Protection
Security Intelligence
Reconn
Incursion
Discovery
Capture
Exfiltrate
![Page 30: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/30.jpg)
30
Defence against threats
Multiple layers of Security
![Page 31: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/31.jpg)
31
Complete Protection
Security Incident & Event Management
Encryption Technology
Data Loss Prevention
Automated Compliance Management
Critical System Protection
Identity & Access Management
Mobile Device Security
![Page 32: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/32.jpg)
32
Where should you go from here
![Page 33: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/33.jpg)
33
Symantec’s Information-Centric Approach
INFORMATION
Intelligence
Governance
InfrastructureStoreManageDedupeProtectRecover
DiscoverClassifyOwnershipAssess
RemediateCompliance
IdentifyAuthenticatePolicy RISK
COST VALUE
MobileVirtualisation
Cloud
Physical
![Page 34: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/34.jpg)
34
Stay Informed - Internet Security Threat Report
www.symantec.com/threatreport
Security Response Website
Twitter.com/threatintel
![Page 35: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/35.jpg)
Stay Informed
Internet Security Threat Report, Vol. 17
www.symantec.com/threatreport
Security Response Website
Twitter.com/threatintel
35
![Page 36: Security threats and countermeasures in daily life - Symantec](https://reader034.vdocuments.us/reader034/viewer/2022042623/5415f1508d7f728a6c8b48d4/html5/thumbnails/36.jpg)
Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
36
Thank You