cyber security - nbaa · automated tools search for exploits in a network. used for launching...

50
Satcom Direct, Inc ©2015 All Rights Reserved. Cyber security Mark Mata – Training Director Josh Wheeler – Entry Into Service Director

Upload: others

Post on 13-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Satcom Direct, Inc ©2015 All Rights Reserved.

Cyber security

Mark Mata – Training DirectorJosh Wheeler – Entry Into Service Director

Page 2: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information
Page 3: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Satcom Direct, Inc ©2015 All Rights Reserved.

Percent of CIO’s have beenattacked or expect one.

Percent of Millennials who haveviolated IT software policy.

Ransomware attacks in 2016.

Dollars in global ransomware damage projected for 2017.

Dollar cost of each stolen record.

Percent of professionals who identified phishing and socialengineering as the biggest security threat their organization.

Page 4: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Network Security

Data stealing or disruption of network systems is a critical issue.

Costs money, downtime and possible embarrassment to a company.

Some methods for stealing include:

Social engineering attacks

Theft of passwords and credentials

Spam

Malware

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 5: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Network Security

Measures must be taken within all environments for data to be secure

Remote locations must follow the same policies set forth by a company

Users have a responsibility to help secure data

Being educated

Following policies

Knowledge of what you are connecting to.

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 6: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Network Security

https://databreachcalculator.mybluemix.net/

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 7: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Satcom Direct, Inc ©2015 All Rights Reserved.

What is a cyber-attack?

Page 8: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

What is a cyber-attack?

Attack

Intentional malicious action taken to exploit

vulnerabilities in computer applications or

network hardware without authorization.

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 9: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

What is a cyber-attack?

Threat

An intentional or unintentional lurking event or action that could result in the violation of a security

policy, or procedures.

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 10: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Network Security Risks

Vulnerabilities

Improperly configured or installed hardware or software.

Bugs in software or operating systems.

Poorly designed networks.

Poor physical security.

Insecure passwords.

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 11: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Satcom Direct, Inc ©2015 All Rights Reserved.

Malware

Page 12: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Malware

Malware

Intentionally harmful software.

Can perform any level of negative or harmful functions.

Annoying pop-up ads, displaying distracting, harmless ads or jokes.

Silent observer capturing and sending confidential information to a hacker.

Fatal system corruption.

Almost any odd system behavior you notice could be attributable to malware.

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 13: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Malware

Denial of Service (DoS)

Constant bombarding attacks on all device types to gain network access.

Automated tools

Search for exploits in a network.

Used for launching phishing emails.

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 14: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Malware

Malware

Computer viruses

Malicious software which replicates itself.

Intent is to cause harm - delete files, steals resources, steals information.

Imbedded in files, software and email attachments.

Computer worms

Stand alone virus – not imbedded.

Spreads on the network or through email.

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 15: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Malware

Malware

Trojans

Specifically meant to extract sensitive data.

Allows command and control via back door

access.

Spyware

Infects web browsers to record web behavior

and usage patterns.

Disguises as legitimate software.

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 16: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Malware

Malware

Ransomware

Encrypts files until demand for payment is met.

Expensive and NO guarantee or decryption

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 17: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Malware

Malware mitigation - Usage

End users should be familiar with the basic functions of their

devices.

Recognize strange behavior.

Ensure software need outweigh the risks.

Malware mitigation – Awareness

Verify URL’s before clicking.

Ensure email, USB drives, and applications are from trusted

sources.

Software may ask to install third-party software from untrusted

sources.

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 18: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Satcom Direct, Inc ©2015 All Rights Reserved.

Social Engineering

Page 19: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Social Engineering

A psychological ploy intended to trick people to gain access or information.

Plays off people’s compassionate, trusting and pleasing nature.

Social engineering is the weakest link in all data security.

Reliance for security is on people to make smart decisions.

Attacks are made via several avenues

Phone

Internet

Email

In person

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 20: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Social Engineering

The key to an attack is deception.

Most common method used for network intrusion.

Social engineering attackers attempts to trick victims into an abnormal act.

Divulge passwords.

Grant access to a secure area.

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 21: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Social Engineering

Social engineers present themselves as a person of authority, trusted individual.

Keep you focused on their story to keep you from identifying warning signs.

Con Artists

Social engineering message lead users to believe they are useful or important.

Attackers take advantage of:

Fear

Greed

Sense of urgency

Desire to be helpful

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 22: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Social Engineering

Intent of social engineering

Data theft

Usernames, passwords, credit card information, sensitive company data.

Data destruction

Focused on punishing or crippling infrastructure or records.

Financial gain

Political gain

“Fake news”, fabricated documents to destabilize, disrupt or sway.

Revenge

Reputation destruction

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 23: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Social Engineering

Common types of social engineering attacks

Email – Phishing

Tailgating

Satcom Direct, Inc ©2015 All Rights Reserved.

Phone – Vishing

Page 24: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Social Engineering

Common types of social engineering attacks

Dumpster diving

Satcom Direct, Inc ©2015 All Rights Reserved.

Shoulder surfing

Whaling

Page 25: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Social Engineering

Vishing attack

Pushing her own story

Urgency

Person of authority

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 26: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Social Engineering

Awareness

Be suspicious

Questions asked by people.

Sense of urgency, pressure, threat, hurried, confused

Surroundings

Do people belong?

Be aware of strangers.

Be aware of badges and require them.

Don’t fall for “I forgot my badge”.

Always close locked doors or gates behind you.

Be aware of who is over your shoulder.

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 27: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Satcom Direct, Inc ©2015 All Rights Reserved.

Security Threats

Page 28: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Security Threats

Common types of network threats

Evil Twin/Rogue Access Points - Setup

a fake wireless network to capture data

Spear Phishing - Increased exposure

due to limited controls

Command and Control - Reduced

controls allows tools to call home

Advanced Persistent Threats (APT)

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 29: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Security Threats

Secure Passwords

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 30: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Security Threats

https://www.my1login.com/resources/password-strength-test/

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 31: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

An email which appears to be from a known

individual or business but is not

Typically targets a specific organization or group

Intent is to get credit card, bank account numbers,

passwords, trade secrets, etc. typically by clicking a link

to enter information

Increased exposure due to limited controls

End user (employee) can decide to click the rouge link

Security ThreatsS P E A R P H I S H I N G

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 32: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Security ThreatsE V I L T W I N / R O G U E A C C E S S P O I N T S

Satcom Direct, Inc ©2015 All Rights Reserved.

A user may unknowingly associate with a rouge or fake wireless access point which has the same name

as the legitimate access point

The intent is to capture/steal data passing through the rouge access point

Page 33: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Security ThreatsC O M M A N D A N D C O N T R O L M A LW A R E

Satcom Direct, Inc ©2015 All Rights Reserved.

Malware gets unknowingly installed

Conducts a “call-home” to fetch updated and instructions from the Command and Control

servers.

Sends back stolen information

Page 34: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Security Threats

Example

Web browser add-ons are

inherently trusted by users and are

being targeted as vehicles for

installation of malware

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 35: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Network Security RisksA D VA N C E D P E R S I S T E N T T H R E AT S ( A P T )

APT: a network attack in which a person gains

access to a network (through a variety of sources)

and resides undetected for an extended period of

time

Goal: steal data undetected vs. cause damage to the

network

Target: high-value sectors, such as national defense,

manufacturing and finance

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 36: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Satcom Direct, Inc ©2015 All Rights Reserved.

SD Security Solutions

Page 37: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

SD Security Solutions

Satcom Direct, Inc ©2015 All Rights Reserved.

Secure Network Solutions

Cyber Security Assessments

Secure Hosting Services

Professional Services

Security training – end user.

Page 38: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

SD Security SolutionsS E C U R E N E T W O R K S O L U T I O N S

Satcom Direct, Inc ©2015 All Rights Reserved.

IT/Security groups treat the airborne Internet as P.I.

P.I. = Public Internet

Public = Untrusted

Why?

Lack of visibility

Lack of control

Harder to support

Not traditional IT

Fear

Page 39: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Untrusted = Insecure Trusted = Secure

www

Page 40: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

SD Security SolutionsD E V I C E B A S E D V P N

Satcom Direct, Inc ©2015 All Rights Reserved.

A standard solution for Public Internet

Provides excellent security when used properly

Automatic or manual?

Can it be disabled?

What about mobile devices?

What about other devices?

The airplane router still uses a Public IP Address

Device VPNs secure the devices, not the cabin network

The cabin network is still on the Internet

Page 41: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

SD Security SolutionsS E C U R E N E T W O R K S O L U T I O N S

Satcom Direct, Inc ©2015 All Rights Reserved.

Provide a secure network solution for the entire cabin including all devices.

Do not advertise the router IP address on the Internet.

Give IT/SEC ability to monitor and control all traffic similar to a branch office.

Be adaptable to meet corporate governance and compliance objectives.

Shift security responsibility from flight department/passenger to IT/SEC.

Page 42: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

SD Security SolutionsS E C U R E N E T W O R K S O L U T I O N S

Satcom Direct, Inc ©2015 All Rights Reserved.

Highly redundant global network

SDR on the airplane

The SD Data Center

Professional Services

Industry leading support

Page 43: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

SD Security SolutionsS E C U R E N E T W O R K S O L U T I O N S

Satcom Direct, Inc ©2015 All Rights Reserved.

Provides a platform to enable customer security.

Every solution is designed to meet requirements.

Flexible enough to meet specific demands.

Removes router from Public Internet.

All secure passenger traffic is routed privately to SD Data Center and/or customer Data Center.

Airplane cabin network can be classified as Trusted.

Page 44: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

SD Security SolutionsS E C U R E N E T W O R K S O L U T I O N S

Satcom Direct, Inc ©2015 All Rights Reserved.

Corporate Security departments are overloaded

Most Cyber companies have no aviation experience

Identify risks and provide remediation

Evaluate internal cabin networks

Test external perspective

Review flight department applications

Investigate flight department network and hardware

Deliver actionable plan to improve security posture

Page 45: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

SD Security SolutionsS E C U R E N E T W O R K S O L U T I O N S

Satcom Direct, Inc ©2015 All Rights Reserved.

Purpose-built data center with fully redundant systems

185 MPH wind rated structure

Ability to run long term on backup generator power

100% uptime since opening

On-site, in-house engineering staff

Multi-carrier Internet service

100% uptime since opening

Page 46: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

SD Security SolutionsS D D ATA C E N T E R

Satcom Direct, Inc ©2015 All Rights Reserved.

Page 47: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

SD Security SolutionsS D D ATA C E N T E R

Satcom Direct, Inc ©2015 All Rights Reserved.

Secure Colocation Services

Private Suites, Cages, Cabinets, Partial Cabinets

Secure Network Services

Interconnects, Firewalls, Monitoring, Logging

Secure Cloud Services

Private Cloud, Hybrid Cloud, Self or Fully Managed

Page 48: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

SD Security SolutionsS E C U R E N E T W O R K S O L U T I O N S

Satcom Direct, Inc ©2015 All Rights Reserved.

SD has extensive expertise and experience in all areas of airborne and terrestrial

connectivity and IT

Gather and define requirements, solution design, implementation and support

Application installations and migrations

Migration of in-house applications to cloud hosting

Project based

Desktop support

Page 49: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

SD Security SolutionsT R A I N I N G

Satcom Direct, Inc ©2015 All Rights Reserved.

CyberSAFE

End-user security training.

Identify and avoid threats.

Malware

Social engineering

Safe internet browsing.

Email

Social networking

Cloud services

Physical and network security.

Page 50: Cyber security - NBAA · Automated tools Search for exploits in a network. Used for launching phishing emails. ... trade secrets, etc. typically by clicking a link to enter information

Satcom Direct, Inc ©2015 All Rights Reserved.