SlideShare a Scribd company logo
1 of 31
Radware 2012 Global Application &
Network Security Report


January 2013
AGENDA

About 2012 Global Security Report
Key Findings & Trends
Attack Tools Trend
Recommendations
Information Resources

• Industry Security Survey    • ERT Cases
   – External survey            – Internal survey
   – 179 participants           – Unique visibility into attack
   – 95.5% are not using          behavior
     Radware DoS mitigation     – 95 selected cases
     solutions                      • Customer identity remains
                                      undisclosed




                                  ERT gets to see attacks in
                                    real-time on daily basis

                                                                  3
AGENDA

About 2012 Global Security Report
Key Findings & Trends
Attack Tools Trend
Recommendations
Organizations Bring a Knife to a Gunfight

• “Someone who brings a knife to a gun fight”
   – Organizations who do prepare for the fight, but do not
     understand its true nature


• Organizations today are like that
   – They do invest in security before the attack starts, and conduct
     excellent forensics after it is over
   – However, there is one critical blind-spot – they don't have the
     capabilities or resources to sustain a long, complicated attack
     campaign.


• Attackers target this blind spot!


                                                                         5
Attacked in 2012




   They had the budget.
 They made the investment.
And yet they went offline.



                                            6
Organizations Deploy Two-phase Security Approach




                                                   7
Attacks Today Have 3 Phases




                              8
ERT Cases – Attack Duration Trend




                                    9
ERT Cases – Attack Vectors Trend




                               10
ERT Introduces Its APT Score




                           11
ERT Cases – APT Score Trend




                          12
How Likely is It That Your Organization Will Be Attacked?




                                                        13
How Well Are You Prepared?




                         14
Attack Vector Trends




                   15
Entities That Are The Bottlenecks in DoS Attacks




                                               16
Solutions Used Against DoS Attacks




                                 17
Dedicated Versus General Solutions




                                 18
Attackers Motivation Trend




                         19
Who’s on the Target List?




                        20
AGENDA

About 2012 Global Security Report
Key Findings & Trends
Attack Tools Trend
Recommendations
HTTPS Based Attacks

•   HTTPS based attacks are on the rise
•   SSL traffic is not terminated by DDoS Cloud scrubbers or DDoS solutions
•   SSL traffic is terminated by ADC or by the web server
•   SSL attacks hit their target and bypass security solutions




                                                                              22
Content Delivery Network (CDN)




                             23
Attacks Evade CDN Service

                          GET                                                 Legitimate requests
                     www.example.com                                          are refused


Legitimate users




                                          Internet                            Backend Webserver
        • In recent cyber attacks, the CDN was easily bypassed
            GET changing the page request in every Web
            by
                transaction
  www.example.com/?[Random]

 Botnet • These random request techniques forced CDNs to
           “raise the curtain”
                   – All the attack traffic is disembarked directly to the
                     customer premise
                   – More difficult to mitigate attacks masked by CDN        CDN service




                                                                                                    24
Servers Enlisted to the Botnets Army


• In 2012 a dramatic change occurred in the DDoS
  landscape
• Attackers build and activate Botnets of powerful servers to
  achieve:
   – Greater firepower - x100 higher bandwidth capacity vs. home PC
   – Greater reliability - servers are always online
   – Greater control – fewer machine to control vs. botnet of PCs




                                                                   25
DDoS Infrastructure Changes




                          26
AGENDA

About 2012 Global Security Report
Key Findings & Trends
Attack Tools Trend
Recommendations
Attackers Are Well Prepared

•   Attackers plan and run attacks on a regular basis
•   Turning DDoS attacks into their profession
•   Organizations face attacks a few times per year
•   Too limited experience to build the required “know how”




                                                                28
Conclusions

• Today’s attacks are different:
   – Carefully planned
   – Last days or weeks
   – Switching between attack vectors


• Organizations are ready to fight yesterdays’ attacks:
   – Deploy security solutions that can absorb the first strike
   – But when attacks prolong - they have very limited gunfire
   – By the time they succeed blocking the first two attack vectors,
     attackers switch to a third, more powerful one




                                                                       29
Recommendations


•   Acquire capabilities to sustain long attacks
•   Train a team that is ready to respond to persistent attacks
•   Deploy the most up-to-date methodologies and tools
•   24 x 7 availability to respond to attacks
•   Deploy counterattack techniques to cripple an attack




                                                                  30
Thank You
www.radware.com

More Related Content

What's hot

Denial Of Service Attacks (1)
Denial Of Service Attacks (1)Denial Of Service Attacks (1)
Denial Of Service Attacks (1)
Waheb Samaraie
 
2012 Reenergize the Americas 3B: Charles Hamilton
2012 Reenergize the Americas 3B: Charles Hamilton2012 Reenergize the Americas 3B: Charles Hamilton
2012 Reenergize the Americas 3B: Charles Hamilton
Reenergize
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
tschraider
 
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHSInsight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Government Technology and Services Coalition
 

What's hot (20)

Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacks
 
Managing Insider Risk
Managing Insider RiskManaging Insider Risk
Managing Insider Risk
 
201408 fire eye korea user event press roundtable
201408 fire eye korea user event   press roundtable201408 fire eye korea user event   press roundtable
201408 fire eye korea user event press roundtable
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
Denial Of Service Attacks (1)
Denial Of Service Attacks (1)Denial Of Service Attacks (1)
Denial Of Service Attacks (1)
 
2012 Reenergize the Americas 3B: Charles Hamilton
2012 Reenergize the Americas 3B: Charles Hamilton2012 Reenergize the Americas 3B: Charles Hamilton
2012 Reenergize the Americas 3B: Charles Hamilton
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
 
The Economics of Cyber Security
The Economics of Cyber SecurityThe Economics of Cyber Security
The Economics of Cyber Security
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
 
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHSInsight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
 
Building CSIRT and its competency
Building CSIRT and its competencyBuilding CSIRT and its competency
Building CSIRT and its competency
 
Top Level Cyber Security Strategy
Top Level Cyber Security Strategy Top Level Cyber Security Strategy
Top Level Cyber Security Strategy
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
Vendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskVendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the risk
 
Adequate securitynew1404.019
Adequate securitynew1404.019Adequate securitynew1404.019
Adequate securitynew1404.019
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
 
Case Study: WoW Warlords of Draenor Launch - Risk Management
Case Study: WoW Warlords of Draenor Launch - Risk ManagementCase Study: WoW Warlords of Draenor Launch - Risk Management
Case Study: WoW Warlords of Draenor Launch - Risk Management
 
Using the Threat Agent Library to improve threat modeling
Using the Threat Agent Library to improve threat modelingUsing the Threat Agent Library to improve threat modeling
Using the Threat Agent Library to improve threat modeling
 
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation ThreatsWeaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
 

Viewers also liked

Viewers also liked (10)

2011 Global Application and Network Security Report
2011 Global Application and Network Security Report2011 Global Application and Network Security Report
2011 Global Application and Network Security Report
 
In the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-AttacksIn the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-Attacks
 
Radware ERT Threat Alert: Shellshock Bash
Radware ERT Threat Alert: Shellshock BashRadware ERT Threat Alert: Shellshock Bash
Radware ERT Threat Alert: Shellshock Bash
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber Attacks
 
Radware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF ServiceRadware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF Service
 
Briefing on Recent US Bank Attacks and 2012 Attack Trends
Briefing on Recent US Bank Attacks and 2012 Attack TrendsBriefing on Recent US Bank Attacks and 2012 Attack Trends
Briefing on Recent US Bank Attacks and 2012 Attack Trends
 
SecureWorld: Information Security Adaption: Survival In An Evolving Threat L...
SecureWorld:  Information Security Adaption: Survival In An Evolving Threat L...SecureWorld:  Information Security Adaption: Survival In An Evolving Threat L...
SecureWorld: Information Security Adaption: Survival In An Evolving Threat L...
 
The Real Cost of Slow Time vs Downtime
The Real Cost of Slow Time vs DowntimeThe Real Cost of Slow Time vs Downtime
The Real Cost of Slow Time vs Downtime
 
DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
 

Similar to 2012 Global Application and Network Security Report

Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022
PECB
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Stephanie McVitty
 

Similar to 2012 Global Application and Network Security Report (20)

Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?
 
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Navigating the Web Security Landscape
Navigating the Web Security LandscapeNavigating the Web Security Landscape
Navigating the Web Security Landscape
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
 
Reducing Attack Surface in Budget Constrained Environments
Reducing Attack Surface in Budget Constrained EnvironmentsReducing Attack Surface in Budget Constrained Environments
Reducing Attack Surface in Budget Constrained Environments
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats
 
DNS Security Presentation ISSA
DNS Security Presentation ISSADNS Security Presentation ISSA
DNS Security Presentation ISSA
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
 
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Software Security for Project Managers: What Do You Need To Know?
Software Security for Project Managers: What Do You Need To Know?Software Security for Project Managers: What Do You Need To Know?
Software Security for Project Managers: What Do You Need To Know?
 
The 2019 Security Strategy
The 2019 Security StrategyThe 2019 Security Strategy
The 2019 Security Strategy
 
ddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdfddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdf
 
Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
 

More from Radware

Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
Mobile Web Stress:  Understanding the Neurological Impact of Poor PerformanceMobile Web Stress:  Understanding the Neurological Impact of Poor Performance
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
Radware
 
Attackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the EquilibriumAttackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the Equilibrium
Radware
 

More from Radware (19)

Cyber Security Through the Eyes of the C-Suite (Infographic)
Cyber Security Through the Eyes of the C-Suite (Infographic)Cyber Security Through the Eyes of the C-Suite (Infographic)
Cyber Security Through the Eyes of the C-Suite (Infographic)
 
What’s the Cost of a Cyber Attack (Infographic)
What’s the Cost of a Cyber Attack (Infographic)What’s the Cost of a Cyber Attack (Infographic)
What’s the Cost of a Cyber Attack (Infographic)
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security Services
 
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
 
The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]
 
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
Mobile Web Stress:  Understanding the Neurological Impact of Poor PerformanceMobile Web Stress:  Understanding the Neurological Impact of Poor Performance
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
 
Emotional Engagement and Brand Perception
Emotional Engagement and Brand PerceptionEmotional Engagement and Brand Perception
Emotional Engagement and Brand Perception
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber War
 
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...
OpenStack Networking:  Developing and Delivering a Commercial Solution for Lo...OpenStack Networking:  Developing and Delivering a Commercial Solution for Lo...
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...
 
SecureWorld St. Louis: Survival in an Evolving Threat Landscape
SecureWorld St. Louis:  Survival in an Evolving Threat LandscapeSecureWorld St. Louis:  Survival in an Evolving Threat Landscape
SecureWorld St. Louis: Survival in an Evolving Threat Landscape
 
Survival in an Evolving Threat Landscape
Survival in an Evolving Threat LandscapeSurvival in an Evolving Threat Landscape
Survival in an Evolving Threat Landscape
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber Attacks
 
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber Attacks
 
Providing best response times, tightest security and highest availability for...
Providing best response times, tightest security and highest availability for...Providing best response times, tightest security and highest availability for...
Providing best response times, tightest security and highest availability for...
 
Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks
Stock Exchanges in the Line of Fire-Morphology of Cyber AttacksStock Exchanges in the Line of Fire-Morphology of Cyber Attacks
Stock Exchanges in the Line of Fire-Morphology of Cyber Attacks
 
Attackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the EquilibriumAttackers Vs. Defenders: Restoring the Equilibrium
Attackers Vs. Defenders: Restoring the Equilibrium
 
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
Radware DefensePipe:  Cloud-Based Attack Mitigation SolutionRadware DefensePipe:  Cloud-Based Attack Mitigation Solution
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
 

2012 Global Application and Network Security Report

  • 1. Radware 2012 Global Application & Network Security Report January 2013
  • 2. AGENDA About 2012 Global Security Report Key Findings & Trends Attack Tools Trend Recommendations
  • 3. Information Resources • Industry Security Survey • ERT Cases – External survey – Internal survey – 179 participants – Unique visibility into attack – 95.5% are not using behavior Radware DoS mitigation – 95 selected cases solutions • Customer identity remains undisclosed ERT gets to see attacks in real-time on daily basis 3
  • 4. AGENDA About 2012 Global Security Report Key Findings & Trends Attack Tools Trend Recommendations
  • 5. Organizations Bring a Knife to a Gunfight • “Someone who brings a knife to a gun fight” – Organizations who do prepare for the fight, but do not understand its true nature • Organizations today are like that – They do invest in security before the attack starts, and conduct excellent forensics after it is over – However, there is one critical blind-spot – they don't have the capabilities or resources to sustain a long, complicated attack campaign. • Attackers target this blind spot! 5
  • 6. Attacked in 2012 They had the budget. They made the investment. And yet they went offline. 6
  • 7. Organizations Deploy Two-phase Security Approach 7
  • 8. Attacks Today Have 3 Phases 8
  • 9. ERT Cases – Attack Duration Trend 9
  • 10. ERT Cases – Attack Vectors Trend 10
  • 11. ERT Introduces Its APT Score 11
  • 12. ERT Cases – APT Score Trend 12
  • 13. How Likely is It That Your Organization Will Be Attacked? 13
  • 14. How Well Are You Prepared? 14
  • 16. Entities That Are The Bottlenecks in DoS Attacks 16
  • 17. Solutions Used Against DoS Attacks 17
  • 18. Dedicated Versus General Solutions 18
  • 20. Who’s on the Target List? 20
  • 21. AGENDA About 2012 Global Security Report Key Findings & Trends Attack Tools Trend Recommendations
  • 22. HTTPS Based Attacks • HTTPS based attacks are on the rise • SSL traffic is not terminated by DDoS Cloud scrubbers or DDoS solutions • SSL traffic is terminated by ADC or by the web server • SSL attacks hit their target and bypass security solutions 22
  • 24. Attacks Evade CDN Service GET Legitimate requests www.example.com are refused Legitimate users Internet Backend Webserver • In recent cyber attacks, the CDN was easily bypassed GET changing the page request in every Web by transaction www.example.com/?[Random] Botnet • These random request techniques forced CDNs to “raise the curtain” – All the attack traffic is disembarked directly to the customer premise – More difficult to mitigate attacks masked by CDN CDN service 24
  • 25. Servers Enlisted to the Botnets Army • In 2012 a dramatic change occurred in the DDoS landscape • Attackers build and activate Botnets of powerful servers to achieve: – Greater firepower - x100 higher bandwidth capacity vs. home PC – Greater reliability - servers are always online – Greater control – fewer machine to control vs. botnet of PCs 25
  • 27. AGENDA About 2012 Global Security Report Key Findings & Trends Attack Tools Trend Recommendations
  • 28. Attackers Are Well Prepared • Attackers plan and run attacks on a regular basis • Turning DDoS attacks into their profession • Organizations face attacks a few times per year • Too limited experience to build the required “know how” 28
  • 29. Conclusions • Today’s attacks are different: – Carefully planned – Last days or weeks – Switching between attack vectors • Organizations are ready to fight yesterdays’ attacks: – Deploy security solutions that can absorb the first strike – But when attacks prolong - they have very limited gunfire – By the time they succeed blocking the first two attack vectors, attackers switch to a third, more powerful one 29
  • 30. Recommendations • Acquire capabilities to sustain long attacks • Train a team that is ready to respond to persistent attacks • Deploy the most up-to-date methodologies and tools • 24 x 7 availability to respond to attacks • Deploy counterattack techniques to cripple an attack 30