Contenu connexe
Similaire à 106 Threat defense and information security development trends (20)
106 Threat defense and information security development trends
- 1. www.huawei.com
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Threat Defense and
Information Security
Development Trends
15 MINUTES BREAK – CLASS RESUMES 8:30 PM EAT
(+3 UTC)
- 2. Page 2
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
The previous courses have introduced some basic concepts and knowledge
about information security and common attack types. Consider this
question: What measures should we take to ensure enterprises'
information security?
Defense against security threats not only requires professional tools but
also the awareness of everyone involved in information security
construction.
- 3. Page 3
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
Upon completion of this course, you will be able to:
Describe the basic elements of security threat defense.
Describe the importance of information security awareness in security
protection.
Describe the future development trends of information security.
- 4. Page 4
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Security Threat Defense
2. Information Security Awareness
3. Information Security Development Trends
- 5. Page 5
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Key Elements of Information Security Protection
• Ensure security compliance during
process operations of enterprises.
Implement in-time response, defense, and
improvement when threats occur.
• Security protection
technologies ensure
appropriate action can be
implemented.
• Security protection
technologies have
different protection
methods at different
technical layers and
domains.
• "People are the weakest
link in information
security."
• It is very important to
ensure that enterprise
employees have high
security awareness.
Security O&M
and Management
People
Security Products
and Technologies
Three interconnected elements
- 6. Page 6
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Information Security Protection Methods
Security products and
technologies
• Network security: firewall, IPS/IDS, anti-DDoS, etc.
• System security: server security, host security, etc.
• Endpoint security: secure access, identity authentication, etc.
• Application security: antivirus, vulnerability scanning, penetration testing, etc.
O&M and management
• Security operation
• Emergency response
• Disaster recovery
Security awareness
• Fostering security awareness in enterprise employees
• Raising awareness of social engineering
- 7. Page 7
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Security Threat Defense
2. Information Security Awareness
3. Information Security Development Trends
- 8. Page 8
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Cyber Security Awareness Survey
Do you read the User Agreement in detail when you register an account?
Do you use the same password for all your accounts?
Do you think the current cyber environment is secure?
Unique
password to
each account
24.1%
Not all
accounts use
the same
password
61.4%
The same
password to
all accounts
13.8%
Others 0.7%
6.9%
49.1%
32.8%
9.2%
2.0%
Extremely safe Very safe Safe Very dangerous Extremely
dangerous
- 9. Page 9
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Public Wi-Fi Security Awareness
Do you connect to free Wi-Fi in public places?
Do you do online shopping, payment, money transfer, or
other similar things while connected to a public Wi-Fi network?
Access any free Wi-Fi
network available
19%
Do not access any
public Wi-Fi
network
19%
Access only
protected Wi-Fi
networks of
well-known
brands
60%
Others…
Connection to Public Wi-Fi Networks
25.1%
13.6%
Email & chatting Online shopping & banking
transactions
Things People Do on Public Wi-Fi
Networks
- 10. Page 10
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Security Risks of Wi-Fi in Public Places
Eighty percent of Wi-Fi networks can be easily cracked. Every year, access to public Wi-Fi
networks incurs an economic loss as high as CNY 5 billion (eBank theft, online account theft,
etc.). Below are some examples of public Wi-Fi security risks:
The hacker steals CNY 34,000 from the
person who steals the neighbor's Wi-Fi
A financial scam using McDonalds' Wi-
Fi cost some users CNY 2000
Phishing Wi-Fi in buses
Online game purchases accumulated
over a number of years stolen by
hackers
Those who intend to save money may
be at risk due to weak security
Hackers routinely succeed in obtaining
user password information
Unexpected Shocking Up-to-date
Suffocating Aggrieved Harmful
- 11. Page 11
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Social Engineering
Social engineering was first appeared in the 1960s as a formal discipline.
Social engineering was discussed in The Art of Deception by the infamous hacker Kevin Mitnick, who
authored the book following a prison term for hacking-related offenses. It refers to the psychological
manipulation of people to give away important personal information, which can cause great damage to
the victims.
Is this an example of social engineering?
People are the weakest link.
— World's most notorious hacker Kevin Mitnick
- 12. Page 12
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Case Study
Discussion: If you find another person's SIM card, what information can you
obtain?
Insert the SIM card into a
phone. The phone displays the
SIM card number.
Phone number
Obtain name of the card
owner.
Alipay Login
details
Use QQ (Chinese Facebook)
and Weibo (Chinese Twitter) to
obtain information such as the
birthday, location, and age of
the card owner.
Personal information of the
SIM card owner
Obtain the first four and last four digits of the card
owner ID number. Hackers can guess the remaining
digits based on the birth date and area.
Login for the online service
center of the SIM card Using the web browsing history provided by the
service center, you can obtain the owner's most
frequently visited websites, QQ account, and
Weibo account.
Web browsing
history
Obtain information about friends,
relatives, and photos of the card
owner from social platforms such
as Weibo.
Information about social
relationships
- 13. Page 13
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Fostering Security Awareness
Remaining vigilant when online is an effective way to defend against cyber
security scams.
Think like a detective
Be Observant
Willing to
learn
Be Skeptical
Think before you act
Attention to details
Search for the truth
Practices
- 14. Page 14
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Security Threat Defense
2. Information Security Awareness
3. Information Security Development Trends
- 15. Page 15
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Gartner Top 10 Security Technologies
Cloud access
security brokers
(CASBs)
Endpoint
Detection and
Response
(EDR) Gartner Top 10 Security
Technologies
- 16. Page 17
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Future Development Trends of Security
Protection
Security as a service
Endpoint detection
increasingly important
Traffic control
IP addresses -> applications
Software-defined security
protection solution
- 17. Page 18
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Trend 1: Security as a Service
Reverse proxy
Client
Behavior
File
Traffic
App Anomaly
Internet
Security check
service
- 18. Page 19
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Trend 2: Endpoint Detection Increasingly
Important
Detect unknown malicious files and C&C
communications
Locate internal endpoints infected by
malicious files
1
2
3
1
2
3
MD5 of
malicious
files
MD5 of
executed
files
Correlate to
malicious files
Correlate to C&C
attack source IP
addresses
Targeted IP
addresses of
C&C attacks
IP addresses
of infected
endpoints
Unknown
malicious files
C&C
anomalies
E E E E E
E E E E E
Infected
endpoints
First infected
endpoint
Locate infected endpoints using
MD5 and address threats
Locate infected endpoints based on
the C&C attack traffic. Find the first
infected endpoint and end further
infection.
Sandbox
Detection
Log
Traffic
Metadata
Endpoint
Log
Analysis
- 19. Page 20
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Trend 3: Traffic Control — from IP Addresses to
Applications
Content
User
Threat
App
location
IP
Port
Protocol
VPN
IPS
Antivirus
DDoS
DLP
Anti
Spam
URL
Layer-4 quintuple
control
Layer-7 application threat control
- 20. Page 21
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Trend 4: Software-defined Security Solution
(Huawei SDSec)
• Service-driven policy management, manual
O&M -> intelligent O&M
• Automated service provision for tenants
• Based on automatic mapping from services to
policies
O&M Intelligence
Enforcer
Switch
Router Wi-Fi AR FW/vFW AntiDDoS DFW
DFW
Controller
SecoManager
CIS FireHunter
Global security
intelligence center
Analyzer
• Cyber security collaboration, single-point defense
-> network-wide associative defense
• Security service orchestration
• AI-based auto-learning and detection of threats,
from reactive to proactive defense
• Huawei third-generation sandbox based on deep
neural network algorithms
Detection Intelligence
Handling Intelligence
Controller
Analyzer
Third-party
security
Integrate
Associate
- 21. Page 22
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. Which of the Esecurity protection?
A. A. Security O&M and management
B. B. Monitoring
C. C. Security products and technologies
D. D. People
2. Which of the following password settings is more secure?
A. A. Digits only
B. B. Letters only
C. C. Digits + letters
D. D. Digits + letters + special characters
- 22. Page 23
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Summary
Basic elements of security threat defense
Importance of information security awareness in
security protection
Future development trends of information security
- 23. Page 24
Copyright © 2018 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com