Security Slideshow: Enterprise Security Risks, Part 2: Behind the Threats

By Dennis McCafferty  |  Posted 09-02-2010

Enterprise Security Risks, Part 2: Behind the Threats

Do You Know the Hottest Security "Catch Phrase" of 2010?It's Advanced Persistent Threat (APT), which is an insidious attack from well-funded, state-sponsored intelligence organization.

Enterprise Security Risks, Part 2: Behind the Threats

Enterprise Security Risks, Part 2: Behind the Threats - Page 2

What's different about APT?APT attackers are more patient than your typical bored Gen Y hacker or financially motivated crook. They're willing to linger within a network for long periods to slowly access information/data, while staying below activity thresholds that would attract attention.

Enterprise Security Risks, Part 2: Behind the Threats  - Page 2

Enterprise Security Risks, Part 2: Behind the Threats - Page 3

What information do they want?From social-media sites, APT attackers can get a sense of where employees travel and what business is discussed. This helps them identify individuals who have access to the data they seek. A targeted, social-engineering attack often follows.

Enterprise Security Risks, Part 2: Behind the Threats  - Page 3

Enterprise Security Risks, Part 2: Behind the Threats - Page 4

Six factors contributing to an increase in attacks1. Malware design is better than ever, with rich-feature sets that rival those of commercial software products.

Enterprise Security Risks, Part 2: Behind the Threats  - Page 4

Enterprise Security Risks, Part 2: Behind the Threats - Page 5

Six factors contributing to an increase in attacks2. Rather than focusing on a single point of entry, threats now aggressively target multiple resources within an enterprise to ensure successful exploitation - every employee and endpoint is a potential point of entry.

Enterprise Security Risks, Part 2: Behind the Threats  - Page 5

Enterprise Security Risks, Part 2: Behind the Threats - Page 6

Six factors contributing to an increase in attacks3. Sophisticated exploitations combine techniques such as spamming, phishing, malicious URL sending and social engineering.

Enterprise Security Risks, Part 2: Behind the Threats  - Page 6

Enterprise Security Risks, Part 2: Behind the Threats - Page 7

Six factors contributing to an increase in attacks 4. Employees are also being targeted through documents they use every day - PDF files and office docs.

Enterprise Security Risks, Part 2: Behind the Threats  - Page 7

Enterprise Security Risks, Part 2: Behind the Threats - Page 8

Six factors contributing to an increase in attacks 5. JavaScript's flexibility allows for optimal obfuscation on the part of attackers. It's relatively easy to "hide" exploitative payloads within the heavily encoded data portions of JavaScript, according to IBM.

Enterprise Security Risks, Part 2: Behind the Threats  - Page 8

Enterprise Security Risks, Part 2: Behind the Threats - Page 9

Six factors contributing to an increase in attacks6. Through BlackHat search engine "poisoning," cyber-criminals use major news events to get their malicious links at the top of search-engine results pages.

Enterprise Security Risks, Part 2: Behind the Threats  - Page 9

Enterprise Security Risks, Part 2: Behind the Threats - Page 10

Three future trends that will impact enterprise security1. IPv6: The "new generation Internet" is now supported by the majority of operating systems, but will enterprises transition rapidly enough to avoid the emergence of black markets for IPv4 addresses?

Enterprise Security Risks, Part 2: Behind the Threats  - Page 10

Enterprise Security Risks, Part 2: Behind the Threats - Page 11

Three future trends that will impact enterprise security2. Virtualization: The virtualization market is $15.2 billion and growing, leading to expanded opportunity for host/Web app/Web server and other vulnerabilities.

Enterprise Security Risks, Part 2: Behind the Threats  - Page 11

Enterprise Security Risks, Part 2: Behind the Threats - Page 12

Three future trends that will impact enterprise security3. The Cloud: Security continues to be the greatest barrier to adopting cloud-computing tech for IT decision-makers.

Enterprise Security Risks, Part 2: Behind the Threats  - Page 12