Meeting the Cyber Security Challenge

Total Page:16

File Type:pdf, Size:1020Kb

Meeting the Cyber Security Challenge Research Series 01.2012 - Newidea 7 - 2012 GCSP avenue de la Paix 7bis Meeting the P. O. Box 1295 CH - 1211 Geneva 1 T + 41 22 906 16 00 Cyber Security Challenge F + 41 22 906 16 49 [email protected] www.gcsp.ch Gustav Lindstrom Impartial, Inclusive, Influential The opinions and views expressed in this document do not necessarily reflect the position of the Swiss authorities or the Geneva Centre for Security Policy. Copyright © Geneva Centre for Security Policy, 2012 Meeting the Cyber Security Challenge Gustav Lindstrom GCSP Geneva Papers — Research Series n° 7, June 2012 The Geneva Centre for Security Policy The Geneva Centre for Security Policy (GCSP) is an international training centre for security policy based in Geneva. An international foundation with over forty member states, it offers courses for civil servants, diplomats and military officers from all over the world. Through research, workshops and conferences it pro- vides an internationally recognized forum for dialogue on timely issues relating to security and peace. The Geneva Papers and l’Esprit de Genève With its vocation for peace, Geneva is the city where international organizations, NGOs, and the academic community, working together, have the possibility of creating the essential conditions for debate and concrete action. The Geneva Pa- pers intend to serve the same goal by promoting a platform for constructive and substantive dialogue. Geneva Papers – Research Series The Geneva Papers – Research Series is a new set of publications offered by the GCSP. It complements the Geneva Papers – Conference Series that was launched in 2008, whose purpose is to reflect on the main issues and debates of an event organized by the GCSP. The Geneva Papers – Research Series seeks to analyse international security issues through an approach that combines policy analysis and academic rigor. It encour- ages reflection on new and traditional security issues that are relevant to GCSP training, such as the globalization of security, new threats to international secu- rity, conflict trends and conflict management, transatlantic and European security, the role of international institutions in security governance, and human security. The Research Series offers innovative analyses, case studies, policy prescriptions, and critiques, to encourage discussion in International Geneva and beyond. Drafts are peer-reviewed by the GCSP Review Committee. All Geneva Papers are available online, at www.gcsp.ch/Resources-Publica- tions/Publications For further information, please contact : Anne-Caroline Pissis, External Relations Manager : [email protected] Series Editor : Thierry Tardy Copyright © Geneva Centre for Security Policy, 2012 Table of Contents About the Author .................................................................................................4 List of Acronyms ..................................................................................................5 Executive Summary .............................................................................................6 Introduction..........................................................................................................8 Why Should We Care About Cyber Security?......................................................10 What Are the Principal Cyber Security Challenges? ...........................................15 Cyber security challenges primarily impacting the individual user .......15 Cyber security challenges primarily impacting national security ...........19 What Is Being Done to Address Cyber Security Challenges? ..................................23 Preventive measures ...............................................................................23 Consequence management measures .....................................................26 What Are the Outstanding Issues?.....................................................................28 Reaching balance between defensive and offensive cyber capabilities.........28 Clarifying the legal landscape and the application of international law....30 Making progress on a governance model ..............................................32 Conclusion..........................................................................................................35 Annex A: Glossary of Technical Terms .................................................................36 Geneva Papers – Research Series.........................................................................39 GCSP Geneva Papers — Research Series n°7 3 About the Author Dr Gustav Lindstrom is Head of the Euro-Atlantic Security Programme and Course Director of the European Training Course in Security Policy (ETC) at the Geneva Centre for Security Policy (GCSP). He received his doctorate in Policy Analysis from the RAND Graduate School and M.A. in International Policy Studies from Stanford University. Prior to his tenure at the GCSP, Dr Lindstrom served as a Senior Research Fellow at the EU Institute for Security Studies (EUISS) in Paris. His areas of expertise include transatlantic relations, the EU’s Common Security and Defence Policy (CSDP), terrorism, non-proliferation, and cyber security. 4 GCSP Geneva Papers — Research Series n° 7 List of Acronyms ATM Automated Teller Machine CERT Computer Emergency Response Team CoE Council of Europe CSIRT Computer Security Incident Response Team CSIS Center for Strategic and International Studies DARPA Defense Advanced Research Projects Agency DCS Distributed Control System DDoS Distributed Denial of Service DNSSEC Domain Name System Security Extensions EMP Electromagnetic Pulse ENISA European Network and Information Security Agency EU European Union GGE Group of Governmental Experts GSM Groupe Spécial Mobile (Global System for Mobile Communications) ICANN International Corporation for Assigned Names and Numbers ICS Industrial Control System IHL International Humanitarian Law IPv6 Internet Protocol Version 6 IT Information Technology ITU International Telecommunication Union LoAC Law of Armed Conflict NATO North Atlantic Treaty Organization OECD Organization for Economic Cooperation and Development Malware Malicious Software RFID Radio Frequency Identification Device SCADA Supervisory Control and Data Acquisition System SIM Subscriber Identity Module GCSP Geneva Papers — Research Series n°7 5 Executive Summary While most policymakers agree that there are substantial risks in cyber space, there is disagreement on whether or not it poses a threat to national security. The divergence in opinions is most obvious when references are made to terms such as cyber war and cyber warfare. In spite of these differences, there are many reasons why policymakers should care about developments in cyber space. With society’s growing reliance on cyber space, a disruption can have wide ranging implications and cascading effects. At the level of national security, there are also indications that government systems are routinely probed for weaknesses. It comes as no surprise that the losses from sabotage, the theft of intellectual property, and cyber crime are counted in the billions of Euros. While the prospects of cyber war are unlikely, it is increasingly evident that a cyber dimension is likely to be part of future conflicts. According to a preliminary assessment carried out by the Center for Strategic and International Studies (CSIS) in Washington, DC, 33 countries presently include cyber warfare in their military planning and organization. These might include “cyber capabilities for reconnaissance, information operations, the disruption of critical networks, for ‘cyber-attacks’, and as a complement to electronic warfare and information operations.”1 In response, there are a number of measures being undertaken to address dif- ferent types of cyber security challenges. These include both technical and insti- tutional means that can be applied in a preventive and consequence management situation. Key among these measures are raising awareness of cyber risks and promoting international cooperation. Looking ahead, policymakers in national security will have to give careful consideration to three key issues: 1 J. Lewis and K. Timlin, “Cybersecurity and Cyberwarfare: Preliminary Assessment of National Doctrine and Organization”, Center for Strategic and International Studies, Washington, DC, 2011, p.3. Ac- cessed on 7/05/2012 at http://www.unidir.org/pdf/ouvrages/pdf-1-92-9045-011-J-en.pdf 6 GCSP Geneva Papers — Research Series n° 7 • Finding a balance between defensive and offensive cyber capabilities – What are the implications of a shift to more offensive cyber capabilities? For exam- ple, could it lead to a cyber arms race? How might it affect the future conduct of warfare? • Clarifying the legal landscape and the application of international law – A key question is whether a cyber operation can be equated to an armed attack or a wrongful threat or use of force. • Examining the prospects for or against an Internet governance model – Spe- cifically, is there need for a more formal government role to manage the Internet? Regardless of the paths taken, the choices will have longstanding implications for cyber security and how cyber space is used in the future. GCSP Geneva Papers — Research Series n°7 7 INTRODUCTION Introduction2 The link between cyber security and national security is a recent phenomenon.3 As of 2000, an increasing number of national security strategies and white papers link cyber security to one of three aspects associated with national security: the need to protect critical
Recommended publications
  • The Most Common Blunder People Make When the Topic of a Computer Virus Arises Is to Refer to a Worm Or Trojan Horse As a Virus
    Trojan And Email Forging 1) Introduction To Trojan&viruses: A Trojan horse, or Trojan, in computing is a generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm. The term is derived from the story of the wooden horse used to trick defenders of Troy into taking concealed warriors into their city in ancient Anatolia, because computer Trojans often employ a form of social engineering, presenting themselves as routine, useful, or interesting in order to persuade victims to install them on their computers.[1][2][3][4][5] A Trojan often acts as a backdoor, contacting a controller which can then have unauthorized access to the affected computer.[6] While Trojans and backdoors are not easily detectable by themselves, computers may appear to run slower due to heavy processor or network usage. Malicious programs are classified as Trojans if they do not attempt to inject themselves into other files (computer virus) or otherwise propagate themselves (worm).[7] A computer may host a Trojan via a malicious program a user is duped into executing (often an e-mail attachment disguised to be unsuspicious, e.g., a routine form to be filled in) or by drive-by download. The Difference Between a Computer Virus, Worm and Trojan Horse The most common blunder people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. One common mistake that people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus.
    [Show full text]
  • Surveying a World of Advanced Threats
    Chapter 1 Surveying a World of Advanced Threats In This Chapter ▶ Distinguishing between basic and advanced threats ▶ Recognizing three types of cyberenemies ▶ Counting the cost of data breaches It’s getting rough out there. I’m not kidding. In more than two decades of observing the effects of enterprise and government data breaches, I’ve never seen anything like today’s threat landscape. The sheer number of recent high-profile cyberattacks is staggering. The bad guys clearly have the upper hand, and it seems like there’s nothing that any of us can do about it. Given the efficacy of modern-day threats, today’s informa- tion security professionals are judged not only on how well they can block known threats but also on how quickly they can uncover, identify, and mitigate unknown threats. Unfortunately, too many security professionals lack the tools andCOPYRIGHTED training needed to stay ahead MATERIAL in this cyberarms race. In this chapter, I distinguish between basic and advanced cyberthreats while exploring common variations of advanced threats along the way. I also cite recent data-breach statistics, describe three types of cyberenemies, and review high-profile commercial and government cyberattacks that recently made international headlines. But first, allow me to clarify the differences between basic and advanced threats. 004_9781118658765-ch01.indd4_9781118658765-ch01.indd 3 77/1/13/1/13 112:452:45 PMPM 4 Advanced Threat Detection For Dummies Contrasting Basic and Advanced Threats The following are key characteristics of basic and advanced cyberthreats: ✓ Basic threats are known threats against known operat- ing system (OS) or application-level vulnerabilities.
    [Show full text]
  • Chapter 3: Viruses, Worms, and Blended Threats
    Chapter 3 Chapter 3: Viruses, Worms, and Blended Threats.........................................................................46 Evolution of Viruses and Countermeasures...................................................................................46 The Early Days of Viruses.................................................................................................47 Beyond Annoyance: The Proliferation of Destructive Viruses .........................................48 Wiping Out Hard Drives—CIH Virus ...................................................................48 Virus Programming for the Masses 1: Macro Viruses...........................................48 Virus Programming for the Masses 2: Virus Generators.......................................50 Evolving Threats, Evolving Countermeasures ..................................................................51 Detecting Viruses...................................................................................................51 Radical Evolution—Polymorphic and Metamorphic Viruses ...............................53 Detecting Complex Viruses ...................................................................................55 State of Virus Detection.........................................................................................55 Trends in Virus Evolution..................................................................................................56 Worms and Vulnerabilities ............................................................................................................57
    [Show full text]
  • Cyber-Crime, Securities Markets and Systemic Risk, Joint Staff
    Staff Working Paper: [SWP2/2013] Cyber-crime, securities markets and systemic risk 16 July, 2013 Joint Staff Working Paper of the IOSCO Research Department and World Federation of Exchanges Author: Rohini Tendulkar (IOSCO Research Department) Survey: Grégoire Naacke (World Federation of Exchanges Office) and Rohini Tendulkar This Staff Working Paper should not be reported as representing the views of IOSCO or the WFE. The views and opinions expressed in this Staff Working Paper are those of the author and do not necessarily reflect the views of the International Organisation of Securities Commissions or the World Federation of Exchanges, or its members. For further information please contact: [email protected] IOSCO Staff Working Paper July 2013 Contents About this Document ................................................................................................................ 2 Executive Summary ................................................................................................................... 3 Introduction .............................................................................................................................. 6 Understanding the Cyber-Crime Risk ...................................................................................... 11 Systemic risk scenarios ........................................................................................................ 22 A Focus on The World’s Exchanges ......................................................................................... 23
    [Show full text]
  • TROJANS, WORMS, and SPYWARE This Page Intentionally Left Blank
    TROJANS, WORMS, AND SPYWARE This page intentionally left blank TROJANS, WORMS, AND SPYWARE A Computer Security Professional’s Guide to Malicious Code Michael Erbschloe AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Elsevier Butterworth–Heinemann 200 Wheeler Road, Burlington, MA 01803, USA Linacre House, Jordan Hill, Oxford OX2 8DP, UK Copyright © 2005, Elsevier Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, e-mail: [email protected]. You may also complete your request on-line via the Elsevier homepage (http://elsevier.com), by selecting “Customer Support” and then “Obtaining Permissions.” Recognizing the importance of preserving what has been written, Elsevier prints its books on acid-free paper whenever possible. Library of Congress Cataloging-in-Publication Data Application submitted. British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. ISBN: 0-7506-7848-8 For information on all Butterworth–Heinemann publications visit our website at http://books.elsevier.com/security 03 04 05 06 07 08 09 10 9 8 7 6 5 4 3 2 1 Printed
    [Show full text]
  • The Roles and Responsibilities for Defending the Nation from Cyber Attack
    S. HRG. 115–597 THE ROLES AND RESPONSIBILITIES FOR DEFENDING THE NATION FROM CYBER ATTACK HEARING BEFORE THE COMMITTEE ON ARMED SERVICES UNITED STATES SENATE ONE HUNDRED FIFTEENTH CONGRESS FIRST SESSION OCTOBER 19, 2017 Printed for the use of the Committee on Armed Services ( Available via the World Wide Web: http://www.govinfo.gov/ U.S. GOVERNMENT PUBLISHING OFFICE 36–192 PDF WASHINGTON : 2019 VerDate Nov 24 2008 11:07 May 02, 2019 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 Y:\REIER-AVILES\2017\2017 HEARINGS TO BE PRINTED\36192.TXT WILDA COMMITTEE ON ARMED SERVICES JOHN MCCAIN, Arizona, Chairman JAMES M. INHOFE, Oklahoma JACK REED, Rhode Island ROGER F. WICKER, Mississippi BILL NELSON, Florida DEB FISCHER, Nebraska CLAIRE MCCASKILL, Missouri TOM COTTON, Arkansas JEANNE SHAHEEN, New Hampshire MIKE ROUNDS, South Dakota KIRSTEN E. GILLIBRAND, New York JONI ERNST, Iowa RICHARD BLUMENTHAL, Connecticut THOM TILLIS, North Carolina JOE DONNELLY, Indiana DAN SULLIVAN, Alaska MAZIE K. HIRONO, Hawaii DAVID PERDUE, Georgia TIM KAINE, Virginia TED CRUZ, Texas ANGUS S. KING, JR., Maine LINDSEY GRAHAM, South Carolina MARTIN HEINRICH, New Mexico BEN SASSE, Nebraska ELIZABETH WARREN, Massachusetts LUTHER STRANGE, Alabama GARY C. PETERS, Michigan CHRISTIAN D. BROSE, Staff Director ELIZABETH L. KING, Minority Staff Director (II) VerDate Nov 24 2008 11:07 May 02, 2019 Jkt 000000 PO 00000 Frm 00002 Fmt 8486 Sfmt 8486 Y:\REIER-AVILES\2017\2017 HEARINGS TO BE PRINTED\36192.TXT WILDA C O N T E N T S OCTOBER 19, 2017 Page THE ROLES AND RESPONSIBILITIES FOR DEFENDING THE NATION FROM CYBER ATTACK .................................................................................................................
    [Show full text]
  • An Intelligence Based Model for the Prevention of Advanced Cyber-Attacks
    An Intelligence based Model for the Prevention of Advanced Cyber-Attacks Olawale Surajudeen Adebayo Associate Professor (Dr.) Normaziah Bintin 1 AbdulAzeez Computer Science Department, International Islamic Computer Science Department, International Islamic University Malaysia, 2CSS Department, Federal University University Malaysia of Technology Minna, Nigeria [email protected] [email protected], [email protected], [email protected] Abstract — The trend and motive of Cyber-attacks have gone Nimda, Conficker, Code Red etc.), and APTs (Advanced beyond traditional damages, challenges to information stealing Persistent Threat which is a sophisticated cyber-attack that for political and economic gain. With the recent APT (Advance employs advanced stealth techniques to remain undetected Persistent Threat), Zero-day malware, and Blended threat, the over times) [17]. The important cyber-attacks considered in task of protecting vita infrastructures are increasingly becoming this research are Malware and APTs (Andvanced Persistent difficult. This paper presents an intelligence based technique that combined the traditional signature based detection with the next Threats). generation based detection. The proposed model consists of virtual execution environment, detection, and prevention module. Next Generation Security is a security that is meant to deal The virtual execution environment is designated to analyze and with the recent next generation threats and cyber-attacks. New execute a suspected file contains malware while other module Generation Security is a defence strategy that capable of not inspect, detect, and prevent malware execution based on the only scanning and detecting but also preventing the feature intelligent gathering in the central management system (CMS). escalation of occurrence of next generation threats like zero- The model based on Next Generation Malware Detection of day malware, polymorphic and blended malware.
    [Show full text]
  • Cyber-Security Threat Characterisation a Rapid Comparative Analysis
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public INFRASTRUCTURE AND service of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY Support RAND TERRORISM AND Browse Reports & Bookstore HOMELAND SECURITY Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Europe View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND Web site is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This report is part of the RAND Corporation research report series. RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for research quality and objectivity. EUROPE Cyber-security threat characterisation A rapid comparative analysis Neil Robinson, Luke Gribbon, Veronika Horvath, Kate Robertson Prepared for the Center for Asymmetric Threat Studies (CATS), Swedish National Defence College, Stockholm The research described in this document was prepared for the Center for Asymmetric Threat Studies (CATS), Swedish National Defence College, Stockholm.
    [Show full text]
  • Design, Analysis, and Evaluation
    An Anomaly Behavior Analysis Methodology for the Internet of Things: Design, Analysis, and Evaluation Item Type text; Electronic Dissertation Authors Pacheco Ramirez, Jesus Horacio Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 02/10/2021 07:40:12 Link to Item http://hdl.handle.net/10150/625581 1 AN ANOMALY BEHAVIOR ANALYSIS METHODOLOGY FOR THE INTERNET OF THINGS: DESIGN, ANALYSIS, AND EVALUATION By Jesus Horacio Pacheco Ramirez Copyright Jesus Horacio Pacheco Ramirez 2017 A Dissertation Submitted to the Faculty of the DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING In Partial Fulfillment of the Requirements For the Degree of DOCTOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIZONA 2017 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Dissertation Committee, we certify that we have read the dissertation prepared by Jesus Horacio Pacheco Ramirez entitled “An Anomaly Behavior Analysis Methodology for the Internet of Things: Design, Analysis, and Evaluation” and recommend that it be accepted as fulfilling the dissertation requirement for the Degree of Doctor of Philosophy _______________________________________________________Date: June 08, 2017 Dr. Salim Hariri _______________________________________________________Date: June 08, 2017 Dr. Ali Akoglu _______________________________________________________Date: June 08, 2017 Dr. Gregory Ditzler Final approval and acceptance of this dissertation is contingent upon the candidate's submission of the final copies of the dissertation to the Graduate College. I hereby certify that I have read this dissertation prepared under my direction and recommend that it be accepted as fulfilling the dissertation requirement.
    [Show full text]
  • Security Policies and Procedures.Pdf
    ptg16525539 Security Program and Policies: Principles and Practices Second Edition ptg16525539 Sari Stern Greene 800 East 96th Street, Indianapolis, Indiana 46240 USA Security Program and Policies: Principles and Practices, Editor-in-Chief Second Edition Dave Dusthimer Sari Stern Greene Acquisitions Editor Betsy Brown Copyright ® 2014 by Pearson Education, Inc. Development Editor All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or Box Twelve, Inc. transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in Managing Editor the preparation of this book, the publisher and author assume no responsibility for errors or Sandra Schroeder omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. Project Editor Seth Kerney ISBN-13: 978-0-7897-5167-6 ISBN-10: 0-7897-5167-4 Copy Editor Bart Reed Library of Congress Control Number: 2014932766 Indexer Printed in the United States of America Heather McNeill Second Printing: July 2015 Proofreader Anne Goebel ptg16525539 Trademarks Technical Editors All terms mentioned in this book that are known to be trademarks or service marks have Ronald Gonzales been appropriately capitalized. Pearson IT Certification cannot attest to the accuracy of this Tatyana Zidarov information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Publishing Coordinator Vanessa Evans Warning and Disclaimer Interior Designer Every effort has been made to make this book as complete and as accurate as possible, but Gary Adair no warranty or fitness is implied.
    [Show full text]
  • CA Threat Portfolio Technology Brief
    TECHNOLOGY BRIEF: CA THREAT MANAGEMENT SOLUTIONS The CA Threat Management Solutions Table of Contents Executive Summary SECTION 1: CHALLENGE 2 The Security Threat Landscape Security Threats Productivity Threats SECTION 2: OPPORTUNITY 4 Types of Malicious Software Viral Threats Spyware and Other Non-Viral Threats Blended Threats SECTION 3: BENEFITS 8 An Effective Threat Strategy Yields Multi-Fold Benefits Business Benefits of the CA Threat Management Solutions SECTION 4: CONCLUSIONS 12 SECTION 5: REFERENCES 12 ABOUT CA Back Cover Copyright © 2007 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. This document is for your informational purposes only. To the extent permitted by applicable law, CA provides this document “As Is” without warranty of any kind, including, without limitation, any implied warranties of merchantability or fitness for a particular purpose, or non-infringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document including, without limitation, lost profits, business interruption, goodwill or lost data, even if CA is expressly advised of such damages. Executive Summary Challenge Businesses are critically dependent upon their IT systems and failure to counter threats to IT systems can not only result in damage to network, systems and data, but can also affect the reputation of your business. Threats to computer systems affect both system security and productivity. Viruses and spyware are the main threats to business IT systems, but blended threats, where different types of malicious software are used in combination, are now very common.
    [Show full text]
  • Definitive Guide to Next-Generation Threat Protection
    Definitive GuideTM to Next-Generation Threat Protection Winning the War Against the New Breed of Cyber Attacks Steve Piper, CISSP Compliments of: FOREWORD BY: David DeWalt About FireEye FireEye is the leader in stopping today’s new breed of cyber attacks, such as zero-day and APT attacks, that bypass traditional defenses and compromise over 95% of networks. The FireEye platform supplements signature-based firewalls, IPS, anti-virus, and gateways, and provides the world’s only cross-enterprise, signature-less protection against Web and email threat vectors as well as malware resident on file shares. It is the industry’s only integrated platform that stops attacks across every stage of an attack life cycle, from exploit to exfiltration. Using its patented Virtual Execution technology engine across its platform, FireEye is uniquely able to protect against today’s new breed of cyber attacks. FireEye solutions are deployed in over 40 countries and more than 25% of the Fortune 100. • Ranked #4 on the Deloitte 2012 Technology Fast 500™ North America • Awarded the Wall Street Journal 2012 Technology Innovation Award • Inducted into JPMorgan Chase Hall of Innovation Definitive GuideTM to Next-Generation Threat Protection Winning the War Against the New Breed of Cyber Attacks Steve Piper, CISSP Foreword by David DeWalt Definitive Guide™ to Next-Generation Threat Protection Published by: CyberEdge Group, LLC 1997 Annapolis Exchange Parkway Suite 300 Annapolis, MD 21401 (800) 327-8711 www.cyber-edge.com Copyright © 2013, CyberEdge Group, LLC. All rights reserved. Definitive Guide™ and the CyberEdge Press logo are trademarks of CyberEdge Group, LLC in the United States and other countries.
    [Show full text]