sigurnost it resursa nove generacije copyright © 2005 blue ... · pdf file• balkan...

37
Dalibor Ratković [email protected] TeleGroup 03.11.2010. god. Sigurnost IT resursa nove generacije

Upload: doanthien

Post on 23-Mar-2018

222 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Dalibor Ratković[email protected]

03.11.2010. god.

Sigurnost IT resursa nove generacije

Presenter
Presentation Notes
Copyright © 2005 Blue Coat Systems, Inc. Presentation updated July 2005. Speaker notes are provided for key points, analogies and background information. Please send any questions about this presentation to [email protected]
Page 2: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 2

Agenda

• Današnja situacija na polju IT sigurnosti• Mehanizmi zaštite

• Praktična riješenja

• Pitanja i odgovori

• Demonstracija i pilot projekti kod korisnika

Presenter
Presentation Notes
We encourage presenters to add in the EXPERIENCE presentation as a fourth agenda item…an interesting look at ProxySG from a user’s desktop. (The presenter may want to ADD a ProxySG product demonstration after this presentation. Partners, please visit our Partner Lounge for our ProxySG Demonstration Guide.)
Page 3: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 3

Rizici kojima ste izloženi

• Prekid poslovnih aktivnosti• Gubitak produktivnosti• Krađa informacija• Odgovornost za nastalu situaciju• Narušena reputacija i gubitak povjerenja kod

korisnika

Page 4: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 4

Upravljanje procesom sigurnosti

• 99% organizacija je prijavilo incident iako su imali antivirusnu zaštitu i firewall sisteme

• Potrebno je izvršiti zaštitu od svih mogućih prijetnji

Presenter
Presentation Notes
Ovde neka uvodna priča o tome koliko su LAN mreže postale značajan faktor u poslovanju danas. Neophodan je temeljan pristup dizajnu svakog rešenja.
Page 5: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 5

Kreatori čuvenih virusa

• Profil:– Muškarci– Između 14 i 34 godine– Bez djevojke– BEZ KOMERCIJALNOG INTERESA !!!!

Page 6: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 6

Današnja realnost

• According to investigators, in 2003, a student of Balakov Institute of Engineering, Technology and Management, Ivan Maksakov, 22, developed a few knowbots and set up a network of hackers. The bots initiated DoS-attacks on the web-sites of bookmakers, which were accepting stakes in the Internet.

Page 7: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 7

Organizovane kriminalne grupe

Page 8: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 8

Phishing

• Andrew Schwarmkoff• Connection to the russian Mafia• Phishing of Creditcard-Numbers• „The Phisher-King“

Page 9: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 9

Koliko je velika malware industrija?

The FBI claims financial loss from spyware and other computer-related crimes have cost U.S. businesses $62 Billion in 2005

26,150 unique phishing variations counted in August 2006 by the Anti-Phishing Working Group

Costs of goods and services in cybercrime forums:$1000 – $5000: Trojan program, which could steal online account information$ 500: Credit Card Number with PIN$80-$300: Change of billing data, including account number, billing

adress, Social Security number, home adress and birth date$150: Driver‘s licence$150: Birth certificate$100: Social Security Card$7 - $25: Credit card number with security code and expiration date.$7: Paypal account log-on and password

Page 10: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 10

Threat Evolution to Crimeware

2001

Com

plex

ity

2003 2004 2005 2007

Crimeware

Spyware

SpamMass Mailers

IntelligentBotnets

Web BasedMalware Attacks

• Multi-Vector• Multi-

Component • Web

Polymorphic• Rapid Variants• Single

Instance• Single Target• Regional

Attacks• Silent, Hidden • Hard to Clean• Botnet

Enabled

VulnerabilitiesWorm/

Outbreaks

Page 11: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 11

More Dangerous & Easier To Use

Packet Forging/ Spoofing

19901980

Password Guessing

Self Replicating Code

Password Cracking

Exploiting Known Vulnerabilities

Disabling Audits

Back Doors

Sweepers

Sniffers

Stealth DiagnosticsHigh

Low 2000

DDOS

Internet Worms

Technical Knowledge Required

Page 12: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 12

Sadašnja Situacija

• 22,000 new malware samples per day, a network worm breakout and the sandbox-enabled antivirus

• Nearly 30,000 Malicious Web Sites Appear Each Day

Page 13: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 13

Međunarodni standardi

• Financial Services RegulationsBasel II – GlobalGramm-Leach-Bliley Act (GLBA) – USPayment Card Industry (PCI) Security Standard –Global

• Industrijski standardiBS ISO/IEC 27002 Compliance - GlobalCobiT - GlobalData Protection Act (DPA) - UK

Page 14: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 14

Metodologija zaštite u IP mrežama

Page 15: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 15

Zaštita na klijentu/hostu na više nivoa

1025

??

445

135

115

80

Page 16: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 16

Zaštita na Internet gateway na više nivoa

Page 17: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 17

Dva nivoa zaštite two-tier

FIREWALL 1

FIREWALL 2

ISP 1

ISP 2

WEB ServerMail Server Internet Serveri

HA

L3 SWITC

H

L3 SWITC

H

INTRANET DMZ INTERNET

HA

Page 18: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 18

RIješenja 1

• Firewall• IPS/IDS sitemi• Content Monitoring/Filtering• Antivirus na hostovima, mail box i na nivou

GW• Antispam zaštita• Endpoint security• WAF• SSL VPN

Page 19: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 19

RIješenja 2

• Data Leakage Prevention• Encryption/PKI/Digital Certificates• Identity & Access Management (NAC)• Patch Management• Penetration Testing/Risk & Vulnerability

Assessment• Log and Event Management Platform• Database Security• IT Forensics

Page 21: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 21

Partneri

Page 22: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 22

Content Monitoring/Filtering

• Kontrola Internet pristupa kao značajnog elementa u poslovanju

• Privatno korištenje Interneta narušava poslovne aplikacije– 30-40% saobraćaja ne koristi se u poslovne svrhe– P2P programi, Instat Messanger, Skype, Kaaza ...

• 30% od ukupnog broja zaposlenih šalju povjerljive informacije slučajno ili namjerno

Page 23: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 23

Web Threats are Increasing

The Malware Landscape is slowly shifting to Web-based attacks (HTTP) and a collaboration of existing technologies is needed to combat the new wave of malware threats

WormsNo fundamental change, slow growth

WebThreatsHigh Volume and Growing

Presenter
Presentation Notes
Web threats are more pervasive today and the fastest growing threat vector. They are much more sophisticated, comprised of multiple components, and leverage the Web to update, hide, communicate, and transmit stolen information. Growing numbers of people worldwide are going online and the Web is becoming an intrinsic part of their lives. With hackers becoming more organized and increasingly motivated by profit, criminal opportunity is greater than ever.
Page 24: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 24

Blue Coat - kompletno rešenje

Public Internet

Internal Network

Port 80 traffic

Reporter Visual Policy Manager

Management Tools

Director

Authenticate

IM

ProxySG Streaming

P2P

ProxyAVWeb AV

Filtering

Page 25: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 25

IPS/IDS riješenja

Page 26: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 26

IPS/IDS riješenja

Page 27: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 27

IPS/IDS riješenja

Page 28: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 28

EndPoint Security

Know your environmentVulnerability assessment and network discovery

Manage Known Risk Through effective patch management

Manage Unknown ThreatsThrough white list based application control

Prevent data leakageWhite list based peripheral device managementSecure data in transit

Secure mobile devicesDisk encryption with boot protectionProtection for mobile devices

Page 29: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 29

Lumension Device Control

Enables only authorized removable (peripheral) devices to connect to network, laptop, thin client, laptop and desktop

Reduces risk of data theft, data leakage and malware introduction via unauthorized removable media

Assures and proves compliance with the landslide of regulations governing privacy and accountability

Page 30: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 30

Blue Coat Visibility

• PacketShaper– Install onto network (inline or out)– AutoDiscover & measure

• Classify– Find all applications on network– See hard to find -

P2P, Skype, YouTube, iTunes, Flash TV– Break down Enterprise applications

SAP, Citrix, Microsoft

• Measure– Utilization– Response times – 120+ stats

Presenter
Presentation Notes
Can be installed - inline or mirror/span/tap
Page 31: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 31

Top 10 and Response Times• Top 10 : Where Budget is Spent

– How much bandwidth is recreational – P2P, YouTube, FlashTV, iTunes, etc– What % goes to mission critical

• Response Times– Total Delay: per transaction, per app– Network Delay: time on network– Server Delay: Time spent by server

SAP Response Times Spiking

Cause: Spike in connection hitting server. Most connections ignored

Total Delay SAP Order Entry: 1220 ms

Network Delay: 340 ms

Server Delay: 880 ms

Presenter
Presentation Notes
Can be installed - inline or mirror/span/tap
Page 32: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 32

PacketShaper

• Visibility– All Applications– Real Time Voice MOS

• Granular QOS– Per App, User, Call– Intelligent MPLS– Real Time Optimization

• Compression– Diskless– 2x-4x Capacity Gain

32

Page 33: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 33

Reference

• Telekom Srpske• Uprava za Indirektno oprezivanje, MUP RS• Klinički Centar• Univerzitet Apeiron, Slobomir Univerzitet, Statistički

zavod RS, HET• Vlada Brčko distrikta• VolksBanka, Komercijalna Banka• Nova Banka• Balkan Investment Banka• Pavlović Banka• Bobar Banka

Page 34: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 34

Implementirano rješenje

Page 35: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 35

Implementirano rješenje br. 2

Page 36: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Slide 36

Implementirano rješenje br. 2

Page 37: Sigurnost IT resursa nove generacije Copyright © 2005 Blue ... · PDF file• Balkan Investment Banka • Pavlović Banka • Bobar Banka. Slide 34 Implementirano rješenje

Pitanja i odgovori!

TeleGroupMarije Bursać 8

78000 Banja Luka, Republika Srpska, BiH+387 51 321 000

http://www.telegroup-bih.com

Presenter
Presentation Notes
This is the Blue Coat Systems SOLUTION presentation, updated July 2005. Please review the ProxySG Demonstration Guide to provide a live product demonstration and to answer specific questions about ProxySG with prospects.