InfoSecurity Professional Magazine Sept Oct2014
InfoSecurity Professional Magazine Sept Oct2014
InfoSecurity Professional Magazine Sept Oct2014
InfoSecurity
PROFESSIONAL
SEPTEMBER/OCTOBER 2014
COMMUNITY!
Privacy + Security
Ransomware on the Rise
Tapping into
Threat Intelligence
A 'Colossus' Problem
Conference Highlights
Visit http://mcaf.ee/focus
to learn more
www.McAfee.com/FOCUS14
Follow us at #McAfeeFOCUS
Contents
VOLUME 7 ISSUE 5
DEPARTMENTS
4
EDITORS NOTE
BY ANNE SAITA
EXECUTIVE LETTER
Finding it increasingly
hard to handle big data
security? PAGE 30
FEATURES
BY VEHBI TASAR
FIELD NOTES
PROFESSIONAL DEVELOPMENT
16
MALWARE
20
14
MODERATOR'S CORNER
Let's Share
BY BRANDON DUNLAP
35 GIVING CORNER
Living the
Scholar's Life
BY JULIE PEELER
37
2020 VISION
RISK MANAGEMENT
25
DATA SECURITY
30
A cybersecurity instructor
asks if it's time to start
viewing risk differently.
4
AD INDEX
InfoSecurity Professional is published by Twirling Tiger Press Incorporated, 7 Jeffrey Road, Franklin, MA 02038. Contact by email: [email protected]. The information contained in this publication represents the views and opinions of the respective authors and may not represent the views and opinions of (ISC)2 on
the issues discussed as of the date of publication. No part of this document print or digital may be reproduced, stored in, or introduced into a retrieval system,
or transmitted in any form by any means (electronic, mechanical, photocopying, recording or otherwise), or for any purpose, without the express written permission of (ISC)2. (ISC)2, the (ISC)2 digital logo and all other product, service or certification names are registered marks or trademarks of the International
Information Systems Security Certification Consortium, Incorporated, in the United States and/or other countries. The names of actual products and companies
mentioned herein may be the trademarks of their respective owners. For subscription information, please visit www.isc2.org. To obtain permission to reprint
materials, please email [email protected]. To request advertising information, please email [email protected]. 2014 (ISC)2 Incorporated. All rights
reserved.
RE TURN TO
CONTENTS
Editors Note
OPPORTUNITIES TO
'SPREAD THE WORD'
ing Eskimos and Aleuts, among many others, on an Alaskan island. Little did I know, thousands of miles away, a
consortium was convening to help shape an industry. That
group, of course, would become (ISC)2.
The information security professional of today has far different duties
and expectations than the one recruited into the field in the late 1980s and
early 1990sbefore widespread adoption of the personal computer and the
World Wide Web. Todays information security professional not only must
manage the growing risks arising from the latest technologies, but keep up
with privacy rules and regulations, and speak the business language.
Todays practitioners also are evangelists, helping
to spread the word on privacy and security best
practices. Each October provides an opportunity to
better educate our communities as part of National
Cyber Security Awareness Month (NCSAM). The
now-international movement is widely embraced
at (ISC)2.
Youll no doubt be seeing more consumer- and
industry-specific articles, blog posts, podcasts, and
videos featuring (ISC)2 leaders and members during
NCSAM. Were kicking off NCSAM at our annual
Security Congress event. Each week during the
month of October, well distribute a list of cybersecurity awareness tips for children, parents, seniors,
Anne Saita, editor-inhomeowners, CEOs, and software developers.
chief, lives and works
Ill be attending ASIS 2014/(ISC)2 Security Conin Southern California.
gress in Atlanta this month and hope to meet some
of you in person. Thank you all for doing your part
to keep us all a little safer.
ANNE SAITA [email protected]
ADVERTISER INDEX
Rob Andrew Photography
For information about advertising in this publication, please contact Tim Garon at [email protected].
McAfee................................................................... 2
Trend Micro..........................................................24
Security Compass................................................ 5
Promisec...............................................................29
Walden University................................................ 7
Guidance Software.............................................32
Bit9...........................................................................9
Symantec..............................................................38
Microsoft............................................................... 11
(ISC)2. ...................................................................39
Capella University...............................................15
CA Technologies................................................ 40
(ISC)2. ....................................................................21
www.twirlingtigerpress.com
RE TURN TO
CONTENTS
PHYSICAL DIVISION
Learn how to hack physical infrastructures such as door locks, key pads, and logic circuits.
WEB DIVISION
Gain an understanding of common website vulnerabilities, and common phishing
and social engineering tactics that attackers use to try and steal user information.
NETWORK DIVISION
Learn about dierent DDoS attack vectors by having access to a monitoring system
choose an appropriate DDoS attack in order to overwhelm that particular monitor.
MOBILE DIVISION
Through dierent examples you will learn how an NFC enabled
phone can be leveraged and how to stay protected.
BATTLE ROOM
After gaining skills from the four divisions, you will be able to attempt
a hack on the battle room - a safe environment to test your skills.
THE LATEST
FROM (ISC)2S
LEADERSHIP
OFTWARE IS THE lifeblood of technology. Regardless of where we live and in which industry
we work, the devices, tools, and environments
we rely on daily all function because of the
embedded code programmed into a product.
Flawed, maliciously manipulated software is nothing new, but
the din from dissatisfied customers is growing louder with each
massive security breach making headlines. So is the growing influence of (ISC)2s Application Security Advisory Council (ASAC)
(https://www.isc2.org/ASAC/default.aspx), whose members are
committed to embedding security throughout the entire software
development lifecycle.
In 2010, the council (then a board) was comprised of people
from large companies who were asked to evangelize secure software within their companies. But with the advent of the Internet
of Things, even the smallest vendors now
can have a huge impact.
So weve expanded the ASAC to include
Vehbi Tasar is
more people with a passion for secure softDirector of Profesware assurance. That includes people like
sional Programs
Mikko Varpiola, a security researcher who
Development. He
can be reached at
is an expert on fuzz testinga technique
[email protected].
that is commonly used to test for security
problems in software.
Leading the ASAC is (ISC)2 Sacramento
Chapter Co-Founder and President Tony
Vargas, CSSLP, CISSP-ISSAP. Tony was instrumental in creating a large developer security awareness program at Cisco Systems.
Tony has also taught thousands of school
children, parents, and teachers about Internet security through the (ISC)2 Foundations
Safe and Secure Online program.
The councils work touches every area
and is woven into every one of (ISC)2s
RE TURN TO
CONTENTS
Recognized Quality
FIELD
NOTES
Photograph FranckreporteriStock
RE TURN TO
CONTENTS
MEMBER SPOTLIGHT ON
es and rapid
changes of the
field, and I still
do today.
RE TURN TO
CONTENTS
FIELD NOTES
CONTINUED
FROM PAGE 9
RE TURN TO
CONTENTS
ACKNOWLEDGING LEADERSHIP
ACHIEVEMENT IN ASIA-PACIFIC REGION
CONGRATULATIONS TO THIS year's (ISC)2 Asian-Pacific Information Security Leadership Achievement recipients, who were honored
at a recent gala in Beijing, China.
You can learn more details about each honoree and showcased
project at www.isc2.org/isla.
RE TURN TO
CONTENTS
FIELD NOTES
CPEs
TOASTING TOGETHER
RE TURN TO
CONTENTS
Graduate, and Undergraduate Scholarships. Kudos also to those who earned a Faculty Certification Exam Voucher. To
learn more about the Cyber Security student scholars, turn to pages 35-36.
Scholarship Awarded
Name
Country of Birth
Institution Enrolled
Womens
M. Alexis Greenidge
U.S.A.
Womens
Sreedevi Sreekandan
India
Womens
Shruti Gupta
India
Purdue University
Graduate
Scott Ruoti
U.S.A.
Graduate
Mark ONeill
U.S.A.
Graduate
Anna Truss
Turkmenistan
Excelsior College
Graduate
Lokesh Pidawekar
India
Northeastern University
Graduate
Chunyue Du
China
Graduate
Cheryl Devaney
U.S.A.
Duquesne University
Graduate
Pratibha Dohare
India
Undergraduate
Saradha Kannan
India
Lewis University
Undergraduate
Christopher Goes
U.S.A.
University of Idaho
Undergraduate
Kyle Murbach
U.S.A.
Undergraduate
Lassine Cherif
Ivory Coast
Undergraduate
Dulce Gonzalez
Mexico
Undergraduate
Robin Saunders
U.S.A.
Undergraduate
Katherine McGinn
U.S.A.
Undergraduate
Fumi Honda
U.S.A.
Undergraduate
Rose Reinlib
U.S.A.
Undergraduate
Yue Zhu
China
University of Connecticut
Undergraduate
Samantha Houston
U.S.A.
Undergraduate
Patrick Katamba
Uganda
Eamon Doherty
U.S.A.
Mohamed Kazi
United Kingdom
Louay Karadsheh
Kuwait
ECPI University
Tahir Abbas
Pakistan
Rizwan Ahmad
Pakistan
Helio DeCastro
ITT-Technical Institute
Diane Murphy
United Kingdom
Marymount University
Timothy Perez
U.S.A.
Brandman University
Vivek Gupta
India
Donna Schaeffer
U.S.A.
Marymount University
Trevor Chandler
U.S.A.
RE TURN TO
CONTENTS
TEACHABLE
MOMENTS FROM
(ISC)2 SECURE
WEBINARS
AND EVENTS
RE TURN TO
CONTENTS
37%
PROFESSIONAL
DEVELOPMENT
SECURITY + PRIVACY =
FUTURE SUCCESS
TOMORROWS
PROFESSIONALS
WILL BRIDGE TWO
FIELDS THAT MOST
COMPANIES AND
CONSUMERS
ALREADY BELIEVE
ARE THE SAME
BY ANNE SAITA
Photograph SnvviStock
RE TURN TO
CONTENTS
25
YEARS
IN THE MAKING
(ISC)2's new partnership with IAPP is the latest alliance to best prepare members
for the information security challenges aheadjust as its founders envisioned.
0
68,978
94,437
wasn t 1994
t
s
e
t
t
s
t h e f i r i st e r e d u n t i l
ad min
YEAR 1989
YEAR 2010
YEAR 2014*
information security
professionals by gender
*as of 7/31/14
4,612
CSSLP
11% female
89% male
RE TURN TO
CONTENTS
CONTINUED
FROM PAGE 16
Many of those risks fall under broad titles of privacy and security, he continues. We frequently use
the terms interchangeably, but there is a distinction
between the two fields.
Indeed, security is a technology-driven field, while
privacy relies heavily on law, policy, and compliance.
But to succeed and move up the career ladder, those
working in either profession must become proficient,
if not fluent, in both worlds to provide appropriate risk
mitigation in the era of cloud computing, big data, and
the Internet of Everything.
As a result, (ISC)2 members seeking certifications
or renewing their certs will soon find more materials
on the privacy side of data security. The newest version
of the CISSP coursework and exam (coming out in Q1
2015), for instance, will include more depth in privacy.
Its not that we try to make a privacy professional
out of the CISSP, but they must have a platform of basics
to understand what they need to know in privacy. And
they can go deeper in that if they choose, Tipton said.
Nowhere is the merge more apparent than in one
of (ISC)2s newest credential programsthe HealthCare Information Security and Privacy Professional
(HCISPP), which gives equal weight to security,
privacy, and risk.
And, according to Tipton, nowhere is reassurance
more necessary than in patient medical privacy, where
research indicates hundreds of thousandsif not
millionsof people with terminal or life-threatening
illnesses, particularly cancer and HIV/AIDS, refuse to
see a doctor for fear their confidential health data will
be exposed.
This loss of trust from the public is something that
weve got to turn around, he says. If people do not
trust us because of the risks that we take and ensuing
breaches, or the lack of due diligence or due care of
their data, then no solution is going to work.
Eventually, hed like to see certifications of completion for privacy and security programs grace healthcare facilities walls the way college diplomas do. We
need to press the point that our healthcare facilities
should be as proud of having people in their offices
qualified in privacy and security, so their patients are
assured theyve invested in training people in this very
important aspect.
Organizations must also consider the penalties for
failing to educate their IT staff continually in data
security and data privacy.
RE TURN TO
CONTENTS
study this
Y E AR 20 0 4*
global reach
(ISC)2 members now live and work in
169 countries. More than 87,000 of
the 100,000+ members are located
in the following 10 countries:
(ISC)2 credentials
an IT professional is
likely to have in 2014
1
Established: 1994
Established: 2001
Established: 2003
4
5
Established: 2003
Certified Authorization
Professional (CAP)
Established: 2005
7
8
Established: 2013
Established: 2003
Established: 2008
Netherlands.......................................1,698
India......................................................1,698
Canada.................................................4,473
Republic of Korea.............................3,551
Japan.....................................................1,436
Australia.............................................. 1,778
Germany............................................. 1,344
RE TURN TO
CONTENTS
MALWARE
DATA HELD
HOSTAGE
BY TOM TOLLERTON
RE TURN TO
CONTENTS
THE STANDARD
in
CYBER FORENSICS
DOWNLOAD the
CCFP Snapshot
Hostage-Taking 101
RE TURN TO
CONTENTS
Multiple variants of ransomware targeting the Android platform are circulating the Internet. The Koler
Trojan has demonstrated resilience and is not bound to
a particular geographic location or language. Typically,
users are redirected from an intentionally infected
website and prompted to install an app (generally
focused on providing quick access to adult content)
which quickly passes unique identifier information
about the device to a C&C server. Similar to PC variants, a popup will appear that impairs a users ability
to access the device. SimplLocker, Reveton, and other
ACTIONS TO
PREVENT A
RANSOMWARE
ATTACK
1. Beef Up User Security. Infection
starts with a compromised user. Avoiding the installation of malicious software altogether is the best prevention
of ransomware, yet unsuspecting and
inherently trusting users continue to
click on suspicious links and open email
attachments from people they dont
know, immediately exposing their computer systems to the risk of infection.
Combined with administrative privileges, a malicious file can often install unauthorized software that is difficult to
eradicate. If this recommendation could
be executed perfectly, there would be
no fear of system infection. Unfortunately, human beings will always be the
weakest link in the security chain, so we
must rely upon the effective implementation of additional layers of protection.
2. Run Offline Backups. An important
part of IT governance, regardless of
the risk of ransomware, is the frequent
completion of data backup processes.
The latest variants of Cryptolocker and
other ransomware have the ability to
BY TOM TOLLERTON
RE TURN TO
CONTENTS
RE TURN TO
CONTENTS
RISK MANAGEMENT
GETTING
LEFT OF
THE HACK
BY RANDY BORUM
Photograph StocksnapperiStock
RE TURN TO
CONTENTS
Although the term intelligence may be unfamiliar or unclear to many traditional cybersecurity
practitioners, both NISTs National Cybersecurity
Framework (http://www.nist.gov/itl/csd/launch-cybersecurity-framework-021214.cfm) and DHSs Task Force
on CyberSkills (http://www.dhs.gov/homeland-security-advisory-council-0) emphasize the value of the
intelligence function.
Intelligence is not just a national security activity.
It concerns a range of organizations in the private
and public sectors. At the broadest level, intelligence
might be thought of as actionable knowledge, but as
John Felker, director of Cyber Intelligence Strategy
for Hewlett-Packard (Palo Alto, Calif., U.S.A.), points
out, intelligence for cybersecurity is more than 1s and
0s. Felker also co-chairs a national task force on cyber
intelligence for the Intelligence and National Security
Alliance (INSA) (http://www.insaonline.org).
The operational level focuses on enabling and sustaining day-to-day operations and output, including logistics. At this level, cyber intelligence looks at the organizations internal operations and collateral partners and
at external threats posing the greatest risk to business
continuity and with the greatest potential business impact. Those analyses inform risk-based decisions about
resource allocation and defensive actions.
The tactical level focuses on the specific steps and
actions the organization takes to protect assets, maintain continuity, and restore operations. In the cyber
domain, the tactical level is where on-the-network
actions take place and malicious actors and network
defenders maneuver actively against each other.
Intelligence examines the technical/logical tactics,
techniques and procedures (TTP) used to target the
organization.
The three-level frameworkstrategic, operational,
and tacticalilluminates the big picture of cyber
intelligence. Too often, threat intelligence focuses
only on the tactical level: the technical dimensions of
an attack such as implants, tools, and artifacts. There
is no question that this information is valuable, but
it is only one dimension of actionable information in
cyber defense. Cyber intelligence must collect and
analyze more than network logs; it must go beyond
the network.
RE TURN TO
CONTENTS
CYBER INTELLIGENCE TASK FORCES THREE-PART FRAMEWORK
Strategic Cyber
Intelligence is:
1
2
3
Produced for senior leaders at the C-Suite level in both private and public sectors;
Used to maintain a competitive advantage and to inform the development of
organizational/national strategy and policy that will direct the organization, often
over the long term (3+ years);
Collected broadly within the sector to which the organization belongs and likely includes complementary sectors (e.g.,
R&D and manufacturing, supply chain);
Focused broadly on threat vectors and adversaries that include nation and non-nation state actors with intent and
capability and on contextual political, economic, social trends; and
Generally non-technical in nature, focusing instead on inter/intra sector trend analysis, stated and unstated objectives of
nation and non-state actors, and other strategic indicators.
Operational Cyber
Intelligence is:
Produced for executive managers in IT and security, such as the CIO and CISO;
Used to inform risk-based decisions about resource allocation and activity to maintain
business continuity and prevent disruption, often for the foreseeable near-term;
Focused on targeted, opportunistic, and persistent vectors that pose the greatest risk to business continuity and that
would have the greatest business impact; and
Blends technical and non-technical collection to explore and prioritize organization-specific threats, the mechanisms and
signatures of potential attacks, and the vulnerability of the organization's layered defense.
Tactical Cyber
Intelligence is:
RE TURN TO
CONTENTS
its own risk profile based on the assets it possesses and the competitors or adversaries vying for
their space. This combination is the organizations
threat surface. First, the organization must
assess and prioritize its assets, analyzing security
An Evolving Discipline
Cyber intelligence continues to evolve as a discipline
and an area of practice. Some companies have created
sophisticated capabilities, with dedicated personnel
integrated across the enterprise working at strategic,
operational and tactical levels. Others, however, may
have no analytic capacity but serve a security function
that is compartmented and gathers intelligence only
from their CERT feeds. A range of vendors and firms
has emerged over the past several years offering cyber
intelligence solutions for companies that cannot create
their own.
RE TURN TO
CONTENTS
Come see
what we see...
FREE for 30
days.
www.promisec.com
RE TURN TO
CONTENTS
DATA SECURITY
ILLUSTRATION BY
PETER AND MARIA HOEY
RE TURN TO
CONTENTS
high-variety information assets that demand costeffective, innovative forms of information processing
for enhanced insight and decision making. For businesses, the ability to analyze big data will become a
key basis of competition, predicted McKinsey Global
Institute in a 2011 report (http://www.mckinsey.com/
insights/business_technology/big_data_the_next_
frontier_for_innovation). And if you look at Apple,
Google, Amazon and Walmart, to name a few, its
clear that competition now has boots on the ground.
For information security professionals, big data is
the yin and the yang, says Larry Ponemon, CIPP,
chairman and founder of the Michigan-based Ponemon Institute LLC, a research organization focused
on privacy, data protection, and information security
policy. On one hand, it creates a lot of risk. But if you
harness the information properly, you can get a lot of
value to help you understand your security environment
in ways you can never imagine, and you can focus
resources there.
Keeping It Private
Privacy is one of the big issues with big data, says Ponemon. You collect information, and unbeknownst to
consumers, it is suddenly in the hands of a third-party
RE TURN TO
CONTENTS
Right now
Im worried we have
been breached and
dont even know it
EnCase Analytics empowers
you to detect hidden threats.
Visit us at (ISC)2 Security Congress
Booth #5146
www.encase.com
Right Now
You Need EnCase
RE TURN TO
CONTENTS
3.
4.
5.
6.
RE TURN TO
CONTENTS
anti-malware; and
80 percent say anti-DoS/DDoS would make
their organizations more secure.
STEPS TO
IMPROVING
BIG DATA
SECURITY
RE TURN TO
CONTENTS
Giving Corner
FOSTERING GOODWILL, EDUCATION, AND RESEARCH INITIATIVES
BY JULIE PEELER
RE TURN TO
CONTENTS
RE TURN TO
CONTENTS
2020 Vision
A ROUNDUP OF MEMBERS
AND INDUSTRY EXPERTS
PREDICTIONS
BY BEN MALISOW
RISKY BUSINESS
Image KieferpixiStock
he Target
breach, the
VAs massive
inadvertent
disclosure,
the TJX hack, Sonys disastrous
loss of almost all data associated
with PSN users, Choicepoints
data theft by internal actorsall
these incidents have something in
common: an almost total dearth
of appreciable consequences.
Nobody went to jail. And punitive monetary judgments were
less significant than other external factors. For instance, Sony
claimed that the financial impact
of their breach was less than that
of an earthquake in Japan that
same year.
RE TURN TO
CONTENTS
Information is the key to protecting information. Thats why our security solutions
are backed by world-class intelligence to help you identify threats in real time and
keep your information safe. Learn more at symantec.com/security-intelligence
When you can do it safely, you can do it all.
#GoKnow
Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered
trademarks of Symantec Corporation or its affiliates in the U.S. and other countries.
RE TURN TO
CONTENTS
education.isc2.org/csslp-webcast