Se­cu­rity Ba­sics

Voice&Data - - TELECOM INFRA -

To­day’s most dam­ag­ing at­tacks are Ad­vanced Per­sis­tent Threats (APT). Cy­ber­crime is no longer ran­dom or about brute force, it’s more sub­tle - aim­ing to in­fil­trate, stay hid­den, and ex­tract data with­out de­tec­tion. Rapid in­no­va­tion on the mal­ware front, the ex­ploita­tion of new zero-day vul­ner­a­bil­i­ties, and emerg­ing eva­sion tech­niques can all ren­der any sin­gle se­cu­rity ap­proach in­ef­fec­tive. A deeper, more com­pre­hen­sive ap­proach is needed to counter th­ese in­creas­ingly so­phis­ti­cated at­tacks. It’s not one par­tic­u­lar tech­nol­ogy that’s the key to Ad­vanced Threat Pro­tec­tion (ATP), but the no­tion of the in­te­gra­tion and col­lab­o­ra­tion be­tween them.

Pre­vent–The Known Threats

Lots of mal­ware is al­ready known. Last year, nearly a quar­ter of mal­ware was more than 10 years old and al­most 90% dis­cov­ered be­fore 2014. Known threats should be blocked im­me­di­ately through the use of next-gen­er­a­tion fire­walls, se­cure email gate­ways, end­point se­cu­rity, and other sim­i­lar prod­ucts lev­er­ag­ing highly ac­cu­rate se­cu­rity tech­nolo­gies.

De­tect–The Un­known

Many new ap­proaches can de­tect pre­vi­ously un­known threats and cre­ate ac­tion­able threat in­tel­li­gence. Sand­box­ing al­lows po­ten­tially ma­li­cious soft­ware to be handed off to a shel­tered en­vi­ron­ment so its full be­hav­iour can be di­rectly ob­served with­out af­fect­ing pro­duc­tion net­works.

Mit­i­gate–Tak­ing Ac­tion

The preven­tion of threats into the net­work is the first pri­or­ity for any se­cu­rity sys­tem. But a clear de­tec­tion and re­me­di­a­tion process is key when, not if, they do. Once an in­tru­sion has been val­i­dated, users, de­vices and con­tent should be quar­an­tined, with au­to­mated and man­ual sys­tems in place to en­sure the safety of net­work re­sources and or­ga­ni­za­tional data. Pre­vi­ously un­known threats should be for­warded and an­a­lysed in depth, re­sult­ing in up­dates be­ing fed back to the dif­fer­ent ser­vices in the net­work pro­vid­ing ev­ery layer with the right mix of up-to-date pro­tec­tion.

In­dus­tri­al­iza­tion of the Hack­ing Sec­tor

The av­er­age hack­ing house has evolved from the script kid­die to groups of spe­cial­ized ex­perts whose goal is to ex­tract rev­enue from com­pro­mised in­for­ma­tion (User data, Ran­somware, etc.,) Ad­ver­saries are in­creas­ing at an un­prece­dented rate and are be­com­ing more so­phis­ti­cated not only in their ap­proaches to launch­ing at­tacks, but also in evad­ing de­tec­tion. They are chang­ing their tac­tics and tools from mo­ment to mo­ment, dis­ap­pear­ing from a net­work be­fore they can be stopped, or quickly choos­ing a dif­fer­ent method to gain en­try.

Newspapers in English

Newspapers from India

© PressReader. All rights reserved.