security measures to protect your organisation from fraud and cyber terrorism: how to prevent it...
TRANSCRIPT
![Page 1: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/1.jpg)
Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism:
How To Prevent IT From Costing Your Organisation Millions
Wong Joon HoongCountry Sales Manager
Trend Micro Malaysia
![Page 2: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/2.jpg)
Copyright 2002-2003, Trend Micro, Inc. 2
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
Agenda
Ever Changing Network Today’s Security Top Concern Social Engineering Spam mail & Virus evolution Summary Q & A
![Page 3: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/3.jpg)
Copyright 2002-2003, Trend Micro, Inc. 3
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
Ever changing network
Broadband adoption Wireless Network Integrated communication devices Information Island -> LAN -> MAN -> WAN Internet ->Intranet -> Extranet-> Internet commerce
![Page 4: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/4.jpg)
Copyright 2002-2003, Trend Micro, Inc. 4
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
Goal of Security
Previous :
Security is to prevent losses, protect against confidentiality breaches
Today:
The goal of Security is enabling e-Business
![Page 5: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/5.jpg)
Copyright 2002-2003, Trend Micro, Inc. 5
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
Security Challenges
Spam
Viruses & Worms
System Vulnerabilities
Unwelcome Visitors Firewall ensures that unauthorized users/hackers can’t gain access to internal company network
Remote Access
VPN ensures that employees may securely access company data on the road or from home.
Monitoring for and applying patches to applications and OS as soon as they are made available
YTD, 50% of Internet email is spam, and growing Spam clogs resources and drain productivity
85% of viruses comes from the Internet Difficult to maintain current antivirus versions and to protect all possible access points
![Page 6: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/6.jpg)
Copyright 2002-2003, Trend Micro, Inc. 6
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
Spam – The Rising Problem
Junk Mail Rate 2002*
75%
100%
125%
150%
175%
200%
Jan Feb Mar Apr May Jun Jul AugSept
20%
25%
30%
35%
40%
* Source: 7 billion actual customer messages processed by Postini
Junk mail rate for corporations approaching 50% and continuing to rise.
Pornographic spam causing workplace liability concerns.
There is no end in sight, thus email for business use could become useless by 2004. (Think it couldn’t happen? Usenet Newsgroups suffered a similar fate)
![Page 7: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/7.jpg)
Copyright 2002-2003, Trend Micro, Inc. 7
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
Got Spam?
Censored!!!!
![Page 8: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/8.jpg)
Copyright 2002-2003, Trend Micro, Inc. 8
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 lineWhat is the tangible cost of Spam?
Base on 500 User email users in an organsition!
![Page 9: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/9.jpg)
Copyright 2002-2003, Trend Micro, Inc. 9
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
Un-be-lievable.
IDC survey: more than a third (37 percent) of business email users would still open the attachment of an email titled 'ILOVEYOU' The report found that on any day of the year, business users
would open an email appearing to be from someone they know if the following appeared in the subject line:
• “Great Joke” (54 percent)
• “Look at this” (50 percent)
• “Message” (46 percent)
• “No title” (40 percent)
• “Special offer” (39 percent)
Source: http://www.theregister.co.uk/content/8/16668.html 2/6/2001
![Page 10: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/10.jpg)
Copyright 2002-2003, Trend Micro, Inc. 10
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
Malicious Code Growth
183 1,000
5,000 10,000
18,000
38,000
48,000
60,000
73,000
77,000+
0
10000
20000
30000
40000
50000
60000
70000
80000
90000
Malicious Code Growth (1990- 2003)
1990 1991 1994 1996 1998 1999 2000 2001 2002 2003
![Page 11: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/11.jpg)
Copyright 2002-2003, Trend Micro, Inc. 11
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
Evolution of Viruses
![Page 12: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/12.jpg)
Copyright 2002-2003, Trend Micro, Inc. 12
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
Recent Network Virus Attacks
Year Attack Number of Infected
PC’s
Est. Amount of Loss (USD)
Y 2003 Worm_MSBLAST 1.4 Million + Still Counting……
Y 2003 SQL Slammer 200,000 + 950 million ~ 1.2 billion
Y 2002 Klez 6 Million + 9 Billion
Y 2001 CodeRed 1 Million + 2.6 billion
Y 2001 NIMDA 8 Million + 600 million
Y 2000 Love Letter 8.8 billion
![Page 13: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/13.jpg)
Copyright 2002-2003, Trend Micro, Inc. 13
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 lineVirus attack and mail spamming are the most common types of security breaches experienced
49
37
31
27
19
16
15
14
11
8
2
4
83
50
49
87
Types of security breach(es) experienced before%
Virus attack
Mail spamming
Employee's abuse: Downloading pornography
Employee's abuse: Inappropriate use of e-mail system
Employee's abuse: Downloading pirated software
Denial of service
Theft: Hardware/ Computer
Hack threat/ system penetration
CDs/ Diskette stolen
Website unauthorized access/ misuse
Sabotage of data or network
Theft: proprietary information
Website vandalism
Financial fraud
Active wire tap
None of the above
Base : All organisations 100
NISER 2003 Survey
![Page 14: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/14.jpg)
Copyright 2002-2003, Trend Micro, Inc. 14
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 lineProblem #1: Network Viruses (Worms) Have been Unstoppable
No security solution has stopped or contained these network virusesMost often it has been too late = $2.15B in damages in Year 2003 alone
Source: Trend Micro, Computer Economics
Central Site
VPN
Firewall
DoS Protection
IntrusionPrevention
TraditionalAntivirus
Vulnerability AssessmentNimda
Code Red
Slammer MSBlaster.AWelchia
SecurityMgmt.
Internet
![Page 15: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/15.jpg)
Copyright 2002-2003, Trend Micro, Inc. 15
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 lineProblem #2: Vulnerability Prioritization and Isolation is Daunting
Window of time from patch availability to outbreak is shrinking Difficult to prioritize patches to apply and isolate unpatched machines during an outbreak Source: Trend Micro
MSBlaster.A
Aug. 11, 2003Patch: MS03-026
Jul. 16, 2003
Patch: MS02-039Jul. 24, 2002
Slammer
Jan. 25, 2003
Nimda
Patch: MS00-078Oct.17, 2000 Sept. 18, 2001
SASSER.B
May,02, 2004Patch: MS04-01
Apr 13, 2004 Window
26 days
185 days
336 days
17 days
![Page 16: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/16.jpg)
Copyright 2002-2003, Trend Micro, Inc. 16
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
0.00
1.00
2.00
3.00
4.00
5.00
6.00
Problem #3: Ineffective Policy Enforcement Leads to Re-infections
1999 2002 2003M
illio
ns o
f in
fect
ions
(20
03)
2001
5 of Top 10 viruses in 2003 released 1-4 years ago
Non-compliant devices connect from multiple network access pointsIneffective access control of these devices leads to re-infections
Source: Trend Micro
![Page 17: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/17.jpg)
Copyright 2002-2003, Trend Micro, Inc. 17
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
Why the current industry solution is ineffective
Mixed threat attacks need more than pattern files Attack-specific policy and system assessment and cleanup
Inconsistent or inaccurate security policy settings Lack of central policy management
Inability to respond quickly enough when outbreak or reinfection occurs Pattern files take time to develop
Out-of-date pattern files, AV not present on all hosts and pathways Lack of central management and updates = missed detections
Security devices don’t coordinate Enterprises must coordinate themselves with several vendors
![Page 18: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/18.jpg)
Copyright 2002-2003, Trend Micro, Inc. 18
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
Virus Outbreak Lifecycle = Customer Experience
Threat Information
Attack Prevention
Notificationand
Assurance
Pattern File
Scan and Eliminate
Assess and Cleanup
Restore and Post-
mortem
Antivirus focus is not sufficient
Antivirus focus is not sufficient
Enterprise TCO and lost productivity affects the
customer at all stages of the lifecycle.
Enterprise TCO and lost productivity affects the
customer at all stages of the lifecycle.
$$ $$$$$$$ $$
“An estimated 74% of outbreak cost is related to cleaning.” -- Computer
Economics, 2002
$ $
The Result
Vulnerability Assessment
Vulnerability Assessment
$$
![Page 19: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/19.jpg)
Copyright 2002-2003, Trend Micro, Inc. 19
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 lineSecurity Wish List Requirements Remain Unfulfilled
Security Policy Enforcement
Network Virus Detection
Network Outbreak Monitoring
Traditional Antivirus
Security
Mgmt.
Infection Locator/Automated Cleanup
Centralized Outbreak Management
IDS/
IDP
VA
Network Virus Outbreak Prevention
Vulnerability Isolation
Security Wish List
Security Policy Enforcement
Network Virus Detection
Network Outbreak Monitoring
Traditional Antivirus
Security
Mgmt.
Infection Locator/Automated Cleanup
Centralized Outbreak Management
IDS/
IDP
VA
Network Virus Outbreak Prevention
Vulnerability Isolation
Security Wish List
No combination of security solutions fulfills this security wish list
Legend: Partially Addresses Need VA - Vulnerability AssessmentIDS - Intrusion Detection System
IDP – Intrusion Detection/Prevention
![Page 20: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/20.jpg)
Copyright 2002-2003, Trend Micro, Inc. 20
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
Which Security Solution should I invest to?
Point Products Proactive Mixed defense Security
Solution
Security Suites:
Integrated firewall, AV, CF, IDS
![Page 21: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/21.jpg)
Copyright 2002-2003, Trend Micro, Inc. 21
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
Vulnerability Assessment Outbreak Prevention Services
Virus ResponseServices
Damage Cleanup Services O
utb
rea
kM
gm
t.
You need protection strategy instead of product
COMMAND CENTRE
Malicious Code Eliminated
Outbreak Prevention
Virus Response
Assessment and Restoration
Malicious Code Attack
VulnerabilityPrevention
Vulnerability Discovered
Proactive Outbreak Lifecycle Management
![Page 22: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/22.jpg)
Copyright 2002-2003, Trend Micro, Inc. 22
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
Summary
Network and security landscape ever changing
Virus/Worn and Spam making use of social engineering delivery mixed threat attack, traditional way of handling virus/spam is no longer effective
Antispam : 2/3 of today spam email is 1st time spam and hybrid behaviour. Need heuristic antispam approach and integration of AV + Content Filtering + Antispam as solution.
Internal : Enforce Security policy, practice secure computing, Management involvement and support in IT security decision
External : Deployed proactive, centrally managed, precise security mixed threat defense solution instead of point product or suite product
Let the security system work for you instead!
![Page 23: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/23.jpg)
Copyright 2002-2003, Trend Micro, Inc. 23
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
Fastest growing antivirus vendor in the world.*
Founded in the US in 1988. Corporate headquarters in Tokyo, Japan. Publicly traded on NASDAQ and NIKKEI exchanges
Antivirus and content security software and services provider to enterprise, small and medium business, and consumer segments
Transnational company with 1800+ employees across 30 business units worldwide
First and only security solution provider pioneering end-to-end proactive outbreak life cycle management
*Antivirus Software 2002: A Segmentation of the Market (IDC)
Trend Micro Overview
![Page 24: Security Measures To Protect Your Organisation From Fraud And Cyber Terrorism: How To Prevent IT From Costing Your Organisation Millions Wong Joon Hoong](https://reader030.vdocuments.site/reader030/viewer/2022032709/56649e9c5503460f94b9d130/html5/thumbnails/24.jpg)
THANK YOU