Security Awareness by Fortinet
Security Awareness by Fortinet
Security Awareness
Termphong Tanakulpaisal
NIST SP 800-30
Information Assets
• Business Requirements
– Client / customer / stakeholder
– Marketing
– Trustworthy
– Internal management tool
• Legal Requirements
– Revenue Department
– Stock Exchange of Thailand
– Copyright, patents, ….
Why Information Assets are the most
important?(2)
• 100 people start their day clearing junk mails, each receives 20 junk
mails per day, each mail needs 10 seconds to open/read/delete
• Each of these staffs gets average THB18,000 income/month from
the company
– Company pays THB 102.27/staff/hr
– 100 people x 10 sec/mail x 20 mails/day x 220 days/yr = 1,222.2
hrs/year
– Company pays for this “clearing junk mail” 125,000 Baht/year
• Do you believe that
– There are only 20 junk mails per day?
– Average time spent is only 10 seconds/junk mail?
– You pay only 18,000 Baht/month?
…. some more calculations…
• Policy/Process/Pocedure
– Clear
– Coverage
– Compliance – Legal, Standard, guideline etc.
• People
– Awareness (e.g. Password on screen)
– Discipline
• Technology
– Enablers
– Management Tools
What is Threat?
• Non-Computerized system
– Masquerade
– Social Engineering
– Theft
– System malfunction (disaster, power interruption)
• IT Network Threat
– Network Level
– Application Level
Threat – Network Level
• Denial of Services
– Services has been disable by excessive
workload.
• Information sniffing
– Information has been tapped and viewed by
unauthorized person
• Unauthorized access
– Low level worker can access to critical
information.
Sample of Threats
Snooping
202.104.10.5
m-y-p-a-s-s-w-o-r-d
203.152.145.121
Telnet 203.152.145.121
username:daeng
password:
Sample of Threats (cont.)
3-way handshake
3-way handshake
SYN REQ
WWW
SYN ACK
ACK
DATA TRANSFER
Sample of Threats (cont.)
SYN attack
202.104.10.5 2 203.152.145.121
SYN ACK D=202.104.10.5 S=203.152.145.121
WAIT
Internet WWW
Attacker
1
SYN REQ D=203.152.145.121 S=202.104.10.5
Sample of Threats (cont.)
Smurf Attack
192.168.1.0
• Virus vs Worms..?
– Virus
• Viruses are computer programs that are designed to spread
themselves from one file to another on a single computer.
• A virus might rapidly infect every application file on an
individual computer, or slowly infect the documents on that
computer,
• but it does not intentionally try to spread itself from that
computer to other computers.
– Worms
• Worms, on the other hand, are insidious
• because they rely less (or not at all) upon human behavior in
order to spread themselves from one computer to others.
• The computer worm is a program that is designed to copy
itself from one computer to another over a network (e.g.
by using e-mail).
Threat – Application Level – Spam Mail
• E-mail spoofing
– Pretend to be someone e.g.
[email protected],
• Spam Mail
– Unsolicited or unwanted e-mail or Phising
Threat – Application Level - Desktop
Desktop Threat
Viruses, worms, Trojan, Backdoor
Cookies
Java Script and Java Applet
Zombies network
Key logger (Game-Online)
How to overcome Threat?
• Policy Compliance
– ISO 17799
• Compliance Checking
– CobiT Audit Tools
• NIST security standard guideline
– NIST – 800 series
• Organization Control
– Business Continuity Plan
People Control
Web Traffic—
customers, partners, employees
Email Traffic
VPN Traffic
Remote user remote and mobile users
• Type of firewall
– Packet filtering
Screened Host
– Application Firewall
– Stateful Inspection
• Type of implementation Dual home Host
– Packet Filter
– Screened host
– Dual home Host Screened Subnet
– Screen Subnet (DMZ)
References: CISSP Certification
Basic Firewall Implementation
Intrusion Detection & Intrusion Prevention Solution
Known Zero-day
DOS/DDOS
Attacks Attacks
Source: Symantec/
Brightmail
How serious spam is?
• Block Override
– Authoritative user logs in to enable
site block override
– Bypasses filter block on a user’s
session and lasts until timer expires
• Rate Image
– URL rating capabilities are extended
to include image URLs contained in
web page – rates gif, jpeg, png,
bmp, and tiff images
• Web Filter Consolidation
– Web filter menu items of URL
Exempt, URL Block, and Web
Pattern have been consolidated to a
single menu item to speed
configuration
• Active Directory Integration
– Single sign-on
– Policy based on AD User/Group
– Requires FSAE agent software
Web Filtering: Banned Word
Desktop Security
• Anti – Virus
• VPN - Client
• Personal Firewall
• IDS
• Web-Filtering
– Small group, Home used, Computer Laboratory,
etc.
URL Filtering
Instant Messaging(IM)/Peer-to-Peer(P2P)
• IM
– Virus
– Exploit
– Voice Chat
• P2P
– Bandwidth Usage
– Spyware
– BackDoor
Enterprise IM, P2P Challenges
Internet
Traffic bottlenecks
Confidentiality breech
• PPT
• Security system without performance degradation
• "You don't put brakes on a car to go slower, you put
brakes on a car to go faster, more safely. Along the
same lines, IT security is not meant to slow down a
company, but rather to enhance and facilitate the
growth of a company... safer growth."--Quoted from
Gartner Group's Information Security Show, June
2001