The Evolving Cyber Threat
and what businesses can do about it
Larry Clinton, President
Direct 703/907-7028 lclinton@isalliance.org
Founders Our Partners The Old Web The Web Today Source: - - PowerPoint PPT Presentation
The Evolving Cyber Threat and what businesses can do about it Larry Clinton, President Direct 703/907-7028 lclinton@isalliance.org Founders Our Partners The Old Web The Web Today Source:
Direct 703/907-7028 lclinton@isalliance.org
Source: http://cm.bell-labs.com/who/ches/map/gallery/index.html
4,129 2,437 171 345 311 262 417 1,090
500 1,000 1,500 2,000 2,500 3,000 3,500 4,000 4,500
1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 132 110,000 55,100 21,756 9,859 3,734 2,134 2,573 2,412 2,340 1,334 773 406 252 6
20000 40000 60000 80000 100000 120000
Organized criminals, corporate spies, disgruntled employees, terrorists Who: Kids, researchers, hackers, isolated criminals
Why: Seeking fame & glory, use widespread attacks for maximum publicity Seeking profits, revenge, use targeted stealth attacks to avoid detection Risk Exposure: Downtime, business disruption, information loss, defacement Direct financial loss via theft and/or embezzlement, breach disclosure, IP compromised, business disruption, infrastructure failure
Multilayer pre-emptive and behavioral systems Defense: Reactive AV signatures
Recovery: Scan & remove System wide, sometimes impossible without re-image of system Type: Virus, worm, spyware Targeted malware, root kits, spear phishing, ransomware, denial of service, back door taps, trojans, IW
Source: PricewaterhouseCoopers survey of 7,000 companies 9/06
41 39 55 20 40 60 80 100 2004 2005 2006
In 2006 insiders committed more theft of IP & proprietary information and sabotage than outsiders! Total (%) Insider (%) Outsider (%) Theft of IP 30 63 45 Theft of Proprietary Info. 36 56 49 Sabotage 33 49 41 Most common insider incidents in 2006 survey:
Source: US Congressional Research Service 2004
Source Carnegie Mellon CyLab 2007