The Operational View
by Giorgio Garasto
Evolution of hacker attacks
- In the 2000s, hackers used to use worms
- Now, hackers use BotNet
-
To prevent attacks, you can't just
- Prevent attacks to singular hosts
- Have a good security policy on the hosts
- Have a well configured firewall
You need these things all together!
How Cisco reacts to attacks
-
CSIRT (Cisco Security Incident Response Team)
- Monitors all the activities from and to the Cisco servers
- Queries the log database if something happens
-
SIO (Cisco Security Intelligence Operations Team)
- Specialized branch of the CSIRT
-
It's devided into
- Analysis team (analyzes the NetFlow)
- Investigation team (investigates if an attack happens)
Tools to prevent and detect attacks
- IronPort: prevents spam and bad attachments on the emails
- Proxy (WSA/WCCP): silently checks all of the network traffic
- Firewall: blocks incoming and outgoing network traffic based on predefined rules
- NetFlow: logs everything that happens on the network
- IPS/IDS: checks inflow packets using predefined patterns
- FireEye: checks attachments using stored hashes
- Data Collection: allows to know exactly what happened before, during and after an attack
IronPort
IronPort Systems, Inc. was a company best known for its AntiSpam, SenderBase email reputation services and email security appliances. In 2007, IronPort was acquired by Cisco Systems.
Proxy (WSA/WCCP)
-
WSA (Web Security Appliance): combines advanced threat defense, advanced malware protection, application visibility and control, insightful reporting and secure mobility into a single solution
- WCCP (Web Cache Communication Protocol): it's a routing protocol that allows to redirect traffic flows in real-time
NetFlow
NetFlow is an hardware
How does FireEye work
Malware attack example
The End
Source:
Cyber Security: The Operational View by Gavin Reid
The Operational View
By Giorgio Garasto
The Operational View
Summary of The Operational View explanation by Gavin Reid
- 204