Securing the Borderless Network -...

34

Transcript of Securing the Borderless Network -...

Page 1: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,
Page 2: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

Securing the Borderless Network

Security for the Web 2.0 World

Tom Gillis

Copyright© 2010 Cisco Systems, Inc.

Published by:Cisco Press800 East 96th Street Indianapolis, IN 46240 USA

All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means,electronic or mechanical, including photocopying, recording, or by any information storage and retrievalsystem, without written permission from the publisher, except for the inclusion of brief quotations in areview.

Printed in the United States of America

First Printing April 2010

Library of Congress Cataloging-in-Publication data is on file.

ISBN-13: 978-1-58705-886-8

ISBN-10: 1-58705-886-3

Warning and DisclaimerThis book is designed to provide information about the challenges and benefits of creating a secure infor-mation network. Every effort has been made to make this book as complete and as accurate as possible,but no warranty or fitness is implied.

The information is provided on an “as is” basis. The authors, Cisco Press, and Cisco Systems, Inc. shall haveneither liability nor responsibility to any person or entity with respect to any loss or damages arising fromthe information contained in this book or from the use of the discs or programs that may accompany it.

The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc.

Trademark AcknowledgmentsAll terms mentioned in this book that are known to be trademarks or service marks have been appropriate-ly capitalized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this information. Use ofa term in this book should not be regarded as affecting the validity of any trademark or service mark.

ii Securing the Borderless Network

Page 3: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

Corporate and Government SalesThe publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or spe-cial sales, which may include electronic versions and/or custom covers and content particular to your busi-ness, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales

1-800-382-3419 [email protected]

For sales outside the United States, please contact: International Sales

[email protected]

Feedback InformationAt Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each bookis crafted with care and precision, undergoing rigorous development that involves the unique expertise ofmembers from the professional technical community.

Readers’ feedback is a natural continuation of this process. If you have any comments regarding how wecould improve the quality of this book, or otherwise alter it to better suit your needs, you can contact usthrough email at [email protected]. Please make sure to include the book title and ISBN in yourmessage.

We greatly appreciate your assistance.

Publisher: Paul Boger Cisco Representative: Erik Ullanderson

Associate Publisher: Dave Dusthimer Cisco Press Program Manager: Anand Sundaram

Executive Editor: Brett Bartow Technical Editors: Fred Kost and Patrick Peterson

Managing Editor: Patrick Kanouse Copy Editor: Apostrophe Editing Services

Senior Project Editor: Tonya Simpson Development Editor: Deadline Driven Publishing

Editorial Assistant: Vanessa Evans Indexer: Ken Johnson

Book Designer: Louisa Adair Proofreader: Sheri Cain

Composition: Mark Shirar

iii

Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.

CCDE, CCENT, Cisco Eos, Cisco HealthPresence, the Cisco logo, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, Cisco WebEx, DCE, and Welcome to the Human Network are trademarks; Changing the

Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the

Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step,

Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers,

Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and

the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.

All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0812R)

Americas HeadquartersCisco Systems, Inc.

San Jose, CA

Asia Pacific HeadquartersCisco Systems (USA) Pte. Ltd.

Singapore

Europe HeadquartersCisco Systems International BV

Amsterdam, The Netherlands

Page 4: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

Foreword“I have been impressed with the urgency of doing. Knowing is not enough; we mustapply. Being willing is not enough; we must do.”

—Leonardo da Vinci

One fascinating aspect about technology and information security and assurance—if notthe most fascinating aspect to me—is that problems and questions seemingly alwayscome before solutions and answers, and the answers oftentimes prove quite elusive. It’slike playing a game of chess where strategy, tactics, and time horizon connect, and youfind yourself facing a skilled opponent who knows your weaknesses, and how to exploitthem. This intellectual challenge of move/counter-move is energizing and exhausting, yetis never the same two days in a row. We face a seminal moment right now, today, inbehavior and practice.

Within the past two decades as a practitioner in the Internet Age, I’ve observed four dis-tinct eras that, in totality, represent the information security art form: Perimeter Security(Era I), Mobile Security (Era II), Application Security (Era III), and now CollaborationSecurity (Era IV). During the first three, exploitation speeds shortened, electronic crimebecame its own market, and layered technology became the defense—and also our weak-ness. And yet, the basic tenets for information security practitioners worldwide were thesame—confidentiality, integrity, and availability.

It’s time to add trust to the model.

This fourth era, Collaboration, is at least an order of magnitude more complicated tosolve. The defense process is quite different and does not naturally build on past, andmore traditional, practices. Information today is never simply “in” one physical or logicalplace. It is available for fast access, and its very location may not be well understood—itmight be local, remote, in the data center, in the cloud, on the Web, on P2P, composedfrom multiple locations—and the list continues. It also may be on a PC; it may well be ona phone, a heads-up display, a television, or something that isn’t invented yet.

We also became reliant on technology…somewhere in those 20 years.

Today, we are seeing signs that existing practices are fragile. Antivirus vendors are over-whelmed with malware, IP scanning doesn’t work for broad IPv6 networks, and patchingis nearly impossible because networks and infrastructures must support 7×24 operations.Our online world is viral, with more than 1.5 billion people around the world connecting,and the systems that support them are increasingly brittle, fragile, and vulnerable to dis-ruption, corruption, and exploitation.

Plainly speaking, the information security art form, as we’ve practiced it for two decades,is inadequate for the threats we are facing today, especially when juxtaposed against howwe are using the networks and technology in our daily lives. Perhaps that’s why you arereading this book: Have you come to similar conclusions?

xi

Page 5: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

However, all is not lost. I find myself remembering a hobbit from Lord of the Rings say-ing, “Certainty of death, small chance of success…what are we waiting for?” Today andtomorrow’s economies will base themselves upon cost-efficient, quality services wherefirst-to-market globally defines the opportunity. It has also been stated that Web 2.0 andSecurity cannot co-exist and are, in fact, at odds.

I say, provided we have the courage to change course, and the conviction to believe, secu-rity as we know it will fundamentally change to face this new reality.

For our digitally connected world, the major influences for tomorrow’s information secu-rity practices revolve around three important themes: technology evolution (in the formsof collaboration, virtualization, and automation), mobile user communities, and threat(both complexity and speed). Threat is at the list’s end because it always seems that wefocus on that first when, in fact, arguably it ought to be at least after we define what isvaluable.

Mobile, connected, Web 2.0-enabled worlds are going to happen, and in some casesalready have—whether we think we can allow them to or not. The human desire to com-municate took a radical turn here, and it is fundamentally changing how we live, work,play, and learn. We need to adapt, as methods, not motives, are what need our full atten-tion right now. This book seeks to do that and then provide ideas and answers to theproblems it raises.

So turn the page…and as da Vinci observed, be more than willing, and “do.”

John N. StewartVice President, Chief Security OfficerCisco Systems, Inc.

xii Securing the Borderless Network

Page 6: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

IntroductionIn the 1880s, the advent of the railroad spurred the manufacturing economy. The rail-road’s capability to distribute raw materials and finished goods efficiently unlocked acentury of economic growth.

In the 1980s, a similar revolution began with the introduction of the personal computer,the network, and the World Wide Web. These inventions unlocked the information econ-omy, and we’re still harnessing the full efficiencies and potential of this information econ-omy. As with any economic development, up and down cycles, dotcom booms, and reces-sionary busts occur. But from a historical perspective, the opportunity for growth drivenby continued refinement of the tools of the information economy has never lookedbrighter.

Imagine a business world in which information is efficiently available in the palm of yourhand, with anywhere, anytime access. A good idea at 7 p.m. on a Saturday can be cap-tured and efficiently shared with no friction. That world is here, and it involves some sig-nificant changes to the way we access and safeguard our valuable information.

Change creates winners and losers. The basic principle of Darwinism suggests that it is notthe strongest species that survive, nor the most intelligent, but the one most adaptive tochange. Change is flooding in to the corporation, driven by second- and third-generationweb apps and handheld computing devices built first for consumers but irresistible tobusiness users. Some companies have found ways to embrace these new techniques,whereas many others attempt to prevent their use.

For example, a national insurance company blocks its employees from using social net-working websites and instant messaging—and finds that its policies are driving awayyounger employees who are hooked on Facebook and Twitter.

A U.K.-based marketing agency prevents its workers from using Google Docs, the popu-lar online document-sharing application—and nearly started an uprising among employ-ees who insisted they needed Google Docs to work with clients and finish projects ontime.

Fearing data loss and security compromises, a healthcare provider in the Midwest wantsto limit its practitioners to BlackBerry devices when they’re working in the field—buttheir practitioners are pleading to use the Palm Pre or iPhone, which the provider doesn’tsupport.

The wave of new collaboration and mobility technologies promise to change the way wedo business and in the process create new efficiencies for businesses large and small. Butwith the new computing freedoms come new risks. The IT team is caught in the middleof two powerful countervailing forces: One is tearing down traditional enterprise borders,and the other is building those borders higher.

On one hand, new trends such as mobility and handheld computing are changing the waywe think about enterprise computing. These always-on devices drive huge gains in pro-ductivity. At the same time, the rise of Internet-based collaboration techniques such associal networking, wikis, and high-definition video conferencing systems enable workers

xiii

Page 7: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

to share information more freely than ever before. Anyone who has joined a CiscoWebEx session from his iPhone can speak to this efficiency directly.

These new technologies are being pushed into the enterprise by enlightened managerswho look to gain competitive advantage, or are being pulled in by workers who have usediPhones and Facebook at home and consider them basic tools required to get their jobsdone. All these new trends are leading to more people accessing more data residing atmore places on the Internet from more types of devices than ever before. This is driving amovement of openness in the enterprise, a trend we call the borderless network.

On the other hand, malware is getting more sophisticated, more malicious, and more dif-ficult to detect than ever before. New technologies such as social networking sites, and agrowing realization that employees need to mix some personal traffic with business traf-fic, are forcing companies to reevaluate their acceptable-use policies. And increasingly,companies are looking for ways to protect their sensitive data, either for regulatory com-pliance or to safeguard their most precious asset: information. These trends are drivingthe need for tighter security, or a move toward the closed enterprise.

And the IT team is often in the unenviable position of needing to restrict the businessfrom operating efficiently, resisting new technologies and making users frustrated andangry—when the real value of IT is to become an enabler of new business efficiency.

When I visit with customers of Cisco and IronPort and ask them what their biggest secu-rity headaches are, they typically produce smartphones from their pocket, and say,“This.” They’re worried about workers accessing data on devices they feel they can’t fullyprotect. And they know that this revolution is steamrolling ahead, whether they’re readyfor it or not.

The borderless network cannot be stopped because it is creating real competitiveadvantage for companies. At Cisco, the widespread use of its TelePresence high-definition conferencing system has cut the company’s travel costs by more than$200 million and has increased the flow of critical information. Statistics like thiscannot be ignored.

Although the tools of collaboration and information sharing are changing rapidly, somust the tools of security and policy enforcement change. These tools need to enable theIT team to embrace new technologies and at the same time increase safeguards over valu-able information. IT departments must be enablers of new efficiencies and competitiveadvantage, not inhibitors. Wouldn’t it be nice if the IT team could say, “Yes—use youriPhone,” instead of always saying no? After all, everyone wants to be loved, even thepoor IT team.

In the following chapters, we examine businesses that have embraced these new ways tocollaborate and communicate, even as they acknowledge the security pitfalls. We explorethe technologies that are revolutionizing business and the threats that have sprung up inthe wake of these innovative solutions. And we learn how these threats are being cor-ralled and managed, freeing workers to collaborate with confidence, no matter where orwhen—or with what technology—they choose to connect with each other.

xiv Securing the Borderless Network

Page 8: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

How This Book Is OrganizedThis book begins by examining how Web 2.0 technologies are dramatically changing theway we work—and how we must think about network security. You learn about the chal-lenges and threats today’s businesses face as they struggle to fully embrace the value ofmobility and Web 2.0 without sacrificing enterprise security. The book closes with a dis-cussion about the intelligent, intuitive technology required to secure the emerging bor-derless enterprise.

■ Chapter 1, “Network Security—Yesterday, Today, and Tomorrow”—Security wassimpler when the security perimeter was a well-defined, defensible zone. But Web2.0, mobility, and handheld devices have changed that. This chapter briefly examinesthe history of network security, including the evolution of firewalls, and asks thequestion, “Where do we go from here?”

■ Chapter 2, “Collaboration and Web 2.0 Technologies”—This chapter discusseshow collaboration and Web 2.0 are enhancing productivity and having a profoundimpact on organizations of all sizes; why easy online collaboration is transforminghow people work together; the growth of enterprise-level online collaboration tools;and storage and applications in the cloud.

■ Chapter 3, “Building Relationships with Web 2.0”—This chapter explores how oneindustry—financial services—is using Web 2.0 technology, such as social networking,to strengthen customer relationships, build new business, and streamline internalcommunications to create a more connected workforce.

■ Chapter 4, “The Cloud Computing Revolution”—This chapter examines how twomanufacturing companies use hosted, web-based CRM applications to streamlineoperations and create an environment for fast, seamless collaboration.

■ Chapter 5, “You’re in San Jose, I’m in Bangalore—Let’s Meet”—This chapter exam-ines the new generation of collaboration technologies, such as Cisco TelePresenceand WebEx, that enable people to conduct virtual meetings from almost any pointon the globe.

■ Chapter 6, “Watson, Can You Hear Us?”—This chapter offers a brief history ofcommunication and computing tools that have dramatically enhanced our connectiv-ity and mobility—from Bell’s telephone to the Osborne luggable to the AppleNewton to today’s smartphones, including the BlackBerry and iPhone.

■ Chapter 7, “The Consumerization of IT”—This chapter explores how there is grow-ing demand in the enterprise both for, and for the acceptance of, new computingtools that first gain popularity in the consumer space. What impact is this trend hav-ing on security policies and the workforce?

■ Chapter 8, “The Bad Guys from Outside: Malware”—Today’s malware is smarterand harder than ever to detect. This chapter explains how malware creators ply theirtrade and examines the dangers that malware poses to enterprise security.

xv

Page 9: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

■ Chapter 9, “Who Are These Guys?”—This chapter offers a deeper look into theworld of online criminals and discusses how their business and economic models areconstructed.

■ Chapter 10, “Signs of Hope”—This chapter examines the signs that the “goodguys” are succeeding in their battles to thwart online criminals. Security vendors useantimalware technologies and techniques that harness the power of the network andtake advantage of processing power improvements.

■ Chapter 11, “Acceptable Use Policies”—This chapter explains how the consumer-ization of IT and the growing popularity of handheld mobile devices are forcingcompanies to move away from antiquated notions of how employees should do theirwork. Meanwhile, management and IT leadership struggle to create realistic, enforce-able acceptable use policies for the Web 2.0 world.

■ Chapter 12, “The Realities of Data Loss”—This chapter explores this question:Given that the data loss problem is snowballing and compliance does not assuresecurity, is data loss prevention even feasible? The answer: Yes and no. First, anorganization must recognize that it cannot protect all its data. Second, it must realizethat it doesn’t need to.

■ Chapter 13, “Collaboration Without Confidence”—This chapter pulls togetherdiscussions about security challenges highlighted in previous chapters and includesinsight into how businesses are struggling to find ways to enable employees toharness the power of Web 2.0 tools and fully embrace mobile devices withoutcompromising security.

■ Chapter 14, “Identity Management: We Need to Know if You Are a Dog”—Theability to differentiate between individual users on a network and their levels ofaccess and control is critical in today’s computing environment. This chapter discuss-es how user identity is becoming a core element of enterprise security.

■ Chapter 15, “Security for the Borderless Network: Making Web 2.0 and 3.0 Safe

for Business”—Companies must accept that the Web 2.0 world is already here—and Web 3.0 is emerging. This concluding chapter discusses the secure borderlessnetwork and the need for intuitive security that is widely distributed throughout thenetwork to enforce policies effectively. Also discussed is the Cisco vision to createan interface between policy and enforcement systems that is open and built onindustry standards.

xvi Securing the Borderless Network

Page 10: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

Chapter 8

The Bad Guys from Outside:Malware

This chapter includes the following topics:

■ Modern Malware Overview

■ Finding the Weak Points

■ Social Engineering for Success

■ Spamming and Phishing Get Targeted

■ Profit Motive

Along with acceptable use policies (AUP) and data loss prevention (DLP), malware, ormalicious software, is one of the three critical areas that enterprise security policies mustaddress. Malware is pervasive, painful, and expensive to detect and block.

Malware has been part of computing for decades. In the 1990s, it got onto your computeror network when you stuck an infected floppy disk into your drive, or when a cleverhacker gained access to your network. Then, with email becoming more prevalent, hackersdesigned malware to spread as infected email attachments. Today, the Internet is a fantas-tic distribution mechanism for malware.

In this chapter, you can find out how malware works and why it presents such a threat tothe enterprise. In addition, you learn about the newest sophisticated tactics that malwarecreators use to trick computer users into downloading their wares.

Modern Malware Overview

Malware, which is malicious software that infiltrates computers, networks, and mobiledevices, is part of life in the information age. Malware is sent via email, spreads viaportable media storage and drives—such as CDs, USB drives, and MP3 players—and can secretly download onto your computer from websites you trust.

Page 11: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

62 Securing the Borderless Network

Today, the primary distribution mechanism for malware is the World Wide Web. Malwareis served not only from entirely malicious, fraudulent websites but also legitimate web-sites that have been compromised.

One way in which malware has changed over time is that it’s a lot smarter and harder todetect than before. This makes it very difficult to get it out of your systems after they areinfected. But malware still depends on vulnerabilities in technology—and weaknesses inhuman nature—to infiltrate computers and networks.

And hackers aren’t trying to get malware onto your computers just for fun, or to see howfar they can spread the code they wrote. Modern malware is a for-profit, big-businessundertaking. Online criminals invest significant amounts of money and time in more effi-cient malware and better malware distribution mechanisms because they know the finan-cial rewards can be enormous.

Types of Malware

The original email–propagated viruses, such as the circa-2000 Melissa or I Love You viruses,did not do much besides slow down the performance of your computer and your network.They soaked up bandwidth and processing power by sending copies of themselves tomillions of people. This type of malware was created primarily to enable its authors toshow off their “development” skills. For David Smith of New Jersey, the author of theMelissa virus, the erstwhile use of his computer skills backfired; following a tip from anAOL employee to law enforcement, Smith ended up spending 20 months in prison.

Following the success of these earlier mass-mailer viruses, a new class of malware wasborn. This malware, or spyware, was used to deliver pop-up ads. A full spectrum ofpop-up ad malware exists, ranging from the legitimate but annoying to the illegitimateand harmful.

A good example of legitimate but annoying spyware is the pop-up ad generators (alsocalled adware) often embedded in peer-to-peer applications, such as Kazaa. Users down-loading the desired application had to agree to install the adware, but the adware wasvirtually impossible to remove. Many other pop-up generators and tracking cookies areloaded onto a user’s PC without their knowledge, creating annoying ads and capturingpersonal web browsing information to help target more unwanted advertising.

Other forms of malware are more hostile. A particularly ugly variant of malware, knownas ransomware, shuts down functionality of the end user device unless the victim pays aransom. In 2008, several kinds of malware and ransomware for mobile phones showed upin Asia, where workers are more likely to have a mobile phone than a personal computer.As VNUnet reported, when the mobile phone was infected, the phone’s owner wouldreceive a message instructing them to pay to restore the phone’s functionality.1

In a classic scam, a lot of computer-based ransomware masquerades as antispyware orantivirus software. It pretends to scan your computer for malware, tells you your deviceis infected, and asks you to fork over money to access the “full” version of the software

Page 12: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

Chapter 8: The Bad Guys from Outside: Malware 63

that can remove the “found” infections. In 2008, a family of fake antivirus software,known as XP Antivirus, infected millions of computers netting the criminals millions of dollars.

Keylogging malware tracks every keystroke you make and sends the information back toonline criminals so that they can use or resell your login names, passwords, credit cardnumbers, and other useful personal or corporate information.

Rootkits gain access to the core of your operating system and let criminals control yourcomputer or network as administrators. (Some of the fake antimalware products partakein these activities instead of, or as well as, demanding money to “clean” your computer.)After criminals infiltrate your computer, they want to use it to profit. To do so, theymake it part of a botnet, which is a network of thousands of infected computers thatcarry out the orders of online criminals by sending out massive amounts of spam, hostingwebsites, or participating in attacks on websites that are designed to deny visitors accessto the sites (also known as a denial of service attack). This type of malware can also turnthese websites into malware redirect hubs.

Another technique used by criminals is to create malicious software that looks for a flawin the browser code or, more often, a flaw in a browser plug-in such as the Flash player.The malware creates a buffer overflow. This is one of the most common and dangerousvulnerabilities; malware piles extra data into a program’s buffer or temporary data storagearea. Rather than rejecting the extra data, the vulnerable software enables the extra datato be written to the next operation. A carefully crafted exploit can ensure the extra datais an attack vector, which is written to an overflow area that executes the attack. Themost common exploits today target web browsers or browser plug-ins such as the Flashplayer or Adobe Reader. In this case, the victims merely visit a website and can beexploited and have malware installed on their computer without their interaction orknowledge; this is known as a drive-by download.

A 2008 Google study of drive-by downloads indicated that more than 3 million URLs on the Internet were found to initiate drive-by downloads. And 1.3 percent of incomingsearch queries to Google brought up at least one malicious URL in the search results.2

Botnets

Botnets are the backbone of criminal activity on the Internet today, and they keep grow-ing in number and sophistication. Internet experts have likened botnets to a pandemic,and say that at one time, up to 25 percent of all Internet-connected computers were partof a botnet.3 With the steady rollout of broadband infrastructure and unprotected PCs inthe emerging economies of the world, the supply of botnets appears unlimited.

Usually, the computer owner won’t even know the computer is part of a botnet except foroccasional slowdowns in performance. The malware that turns the computer into a botnetnode, or “zombie,” often invisibly downloads in the background while the computer userinnocently surfs the Web. It can also be very clever at hiding from antivirus software, withcode that changes every so often (making it harder to identify) or goes dormant for a while(making it harder to find).

Page 13: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

64 Securing the Borderless Network

Even Trusted Sites Can’t Be Trusted

A recent development in malware distribution is the infection of legitimate websites—inenormous numbers—so they start serving up malware. The advantage for malware cre-ators: These sites have been around for a long time, have a good reputation, and aretrusted by large numbers of site visitors and security solutions—so they might be easierto exploit.

Modern malware has managed to penetrate the websites of media organizations and pub-lications such as BusinessWeek,4 major companies, government organizations, banks, andonline social networks. This enables criminals to take advantage of the millions of visitorsto these trusted sites without having the inconvenience and expense of building appeal-ing malware-distributing websites of their own.

In these cases, online criminals attack millions of legitimate websites looking for weak-nesses. If they find a vulnerable site, they insert small bits of code, called iFrames, onthese trusted webpages so that they start sending visitors to websites that host malware.The iFrame codes make it possible to embed one HTML document inside another one.For instance, the banner ad found on a webpage is often hosted by a different web serverthan the main content. Online criminals can simply incorporate a malicious URL some-where in the iFrame, or they can hide it with JavaScript.

How do online criminals get their malicious iFrame onto a legitimate website? Mostoften, they use SQL injections.

This technique exploits a vulnerability in the database layer of certain web applicationsand servers. When website developers don’t properly sanitize the data transmitted in userinput fields (such as forms and user logins) on webpages that use SQL, criminals can takeadvantage of this weakness to take control of the website and turn it into a malware redi-rection hub.

Finding the Weak Points

To gain a foothold on your computer and in your corporate network, malware exploitsweak points, or vulnerabilities, in widely used technologies. The myriad rapidly develop-ing applications that make up the Web provide a wealth of vulnerabilities for online crim-inals to exploit.

The Web is made up of billions of pages created by different people with different levelsof technical skills, offering rich content in many different formats. Accessing some of thiscontent requires helper applications, such as media players. Many different types of back-end software serve up these webpages and content. And many of those formats, applica-tions, and tools have weaknesses hackers can exploit.

Hackers also can exploit the Web’s core infrastructure and basic standards. Many of thestandards and much of the infrastructure the Web runs on were designed long before any-one thought of today’s amazingly wide-ranging uses of the Web. For example, e-commerce,online banking, online social networking, and enterprise-level cloud-based computing are

Page 14: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

Chapter 8: The Bad Guys from Outside: Malware 65

all common on the Web today. Ideally, you want to feel secure while engaging in thoseactivities. But in the early days, decisions about the Internet and Web’s standards and infra-structure heavily emphasized improving connectivity and access to content rather thanwalling off content in easily securable chunks. So, underlying infrastructure vulnerabilities,along with vulnerabilities in higher-level applications, remain a concern.

Hackers use these vulnerabilities to create exploits that let them penetrate your computeror network. Often, when you visit an infected webpage or open an infected email, theattack code starts snooping around for any known weaknesses in your system.

The malware found on a malicious website—such as one involved in an iFrame attack—begins a series of probes, looking for unpatched weaknesses in your browser, the myriadbrowser plug-ins you might have installed, your operating system, or any applications youmight have running.

The level of sophistication is remarkable in that the malware sites can actually identifythe particulars of your computer and operating system and infect or attack the systemappropriately. For instance, if you run Safari as your browser, the malware sites won’tbother trying any known Internet Explorer vulnerabilities. Instead, they focus on Safarior Safari plug-in weaknesses.

When a useful vulnerability is found, the goal of the malware attack is to create a bufferoverflow condition in your computer. This then gives the malware the capability to initi-ate the download of harmful code—the keyloggers, botnet software, spyware ad genera-tors, or other malware previously discussed.

Malware doesn’t only exploit vulnerabilities in technologies. Malware creators and dis-tributors also take advantage of “weaknesses” in human nature, such as curiosity, trust,desire for connection, and carelessness, to dupe users into handing over the keys to theirsystem security.

Social Engineering for Success

To distribute malware, send spam, and acquire sensitive information by posing as a trustedsource (also called phishing), online criminals increasingly take advantage of humannature to get victims to open an email, visit a website, or give up information. They usesophisticated social engineering techniques, and they hijack reputations of trusted web-sites and email senders to get their message or malware into your system.

For example, they appear to offer useful Web 2.0 tools, cool games, or interesting newscontent. When you click the link in the email and visit the site, the site often appears nor-mal. However, in the background it’s probing your machine, searching for a vulnerabilitythat lets it install malware on your computer.

Other attacks try to appear like a legitimate bank or commerce site in hopes of capturingyour username and password—phishing for your information. Other forms of malwaresites try to get you to “buy” something from the site, giving the criminals your creditcard information.

Page 15: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

66 Securing the Borderless Network

In Figure 8-1, we contrast an image of the legitimate ticketing website for the Beijing2008 Summer Olympics with a scam ticketing website. Oddly enough, the scam site was much better looking and more user-intuitive than the real ticketing site, with bettergraphics and navigation—which meant visitors to the fake site were lulled into a sense ofcomfort. Unfortunately, people who entered orders on the fake site received no ticketsbut had their credit card numbers stolen.

Some malware is still distributed as email attachments, but the more successful ofthese campaigns also depend heavily on social engineering to make the emails appeartrustworthy so that you’ll open them. (And the more sophisticated malware payloadsavailable today can avoid being filtered out by antimalware solutions for a longerperiod, also increasing the email-borne malware’s chance of getting through.) Recentsuccessful email-borne malware campaigns include

■ Emails with attachments pretending to be “shipping department profit and lossstatement” spreadsheets, which are highly personalized and sent to specific com-pany executives.

■ Emails with attachments that pretend to be delivery confirmation requests frommajor shipping services, such as UPS or FedEx.

Figure 8-1 Fake Sites Can Look Better Than the Real Thing

Page 16: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

Chapter 8: The Bad Guys from Outside: Malware 67

■ Emails that are highly personalized and pretend to be from tax authorities or con-sumer information bureaus, asking company executives to fill out the attached formin response to a tax concern or business complaint.

The social engineering involved in the preceding attacks often is irresistible to endusers. How many of us wouldn’t open an email from FedEx saying the package we senton a certain date couldn’t be delivered, especially if we had sent off a few packages thatsame week?

Advanced social engineering techniques usually involve additional information to person-alize the attack and make it seem closer to legitimate traffic. To support this next wave ofpersonalized attacks, criminals mine social networking sites for personal information thatthey can later use to personalize phishing messages sent to you, or to your colleagues,friends, or family.

Spamming and Phishing Get Targeted

Spamming and phishing are becoming much more sophisticated. Spam emails use highlytopical subject lines, often related to current news events. The content in the messagelooks and sounds much more legitimate and professional than it used to. Spam oftenclosely mimics legitimate senders’ messages—not just in style but by “spoofing” thesender information, making it look like it comes from a reputable sender.

The increasing personalization and sophistication of spam messages benefits the spam-mer in two ways:

■ If it looks more like legitimate traffic, modern spam is more likely to slip past anti-spam software.

■ Because of the targeted content, more people will actually open the message. Moremessages getting through filters and more messages opened means increased profitsfor the spammer.

The majority of spam is still classified as mass mailing spam, for example, billions ofcopies of messages for illegal pharmaceutical sites or the venerable get-rich-quick scams.The original mass mailers would send large volumes of the same message from a fewsource locations on the Internet. But these types of campaigns are relatively easy forspam filters to block through keyword analysis and blacklists of the mailing sources.Modern mass mailing spam still involves billions (yes, billions) of messages per attack,but they typically come from millions of different sources—coordinated by botnets—toobscure their origin. A modern mass mailer can also include tens of thousands of varia-tions in the content, to defy keyword or signature filters.

Page 17: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

68 Securing the Borderless Network

In addition to the increasingly sophisticated camouflage techniques of the high-volumespammers, more and more spam campaigns are aimed at specific groups, such as sportsfans, or at people in certain geographic regions. These campaigns are even harder todetect due to the low volume associated with a targeted attack. Figure 8-2 shows theincreasing trend of targeted attacks over time.

For phishing spam that’s aimed at obtaining personal or financial information, targetedphishing—also known as spear-phishing—has become the norm. Figure 8-3 shows howspear-phishing has become more frequent, and more lucrative, than traditional spamcampaigns.

Some recent spear-phishing campaigns involved personalized messages sent to customersof specific banks or frequent flyer programs to prompt them to log in or input theiraccount information on a phishing website. Other campaigns are based on personalizedemails sent to company executives, claiming they were subpoenaed or needed to giveinformation to tax authorities. Figure 8-4 shows a sample targeted phishing email.

Criminals aren’t solely depending on email and websites to practice their craft. Text mes-saging to mobile phones, combined with fake call-center setups, are another way theygather information. For instance, they send an SMS (Short Message Service, or text mes-sage) that claims to be from a regional bank to mobile phone numbers in a certain area

Targeted Attacks as a Percentage of Spam

Month

0.50%

Per

cen

t

0.45%

0.40%

0.35%

0.10%

0.05%

0.00%1/08

0.30%

0.25%

0.20%

0.15%

2/08 3/08 4/08 5/08 6/08 7/08 8/08 9/08 10/08 11/08 12/08

Figure 8-2 Targeted Attacks as a Percentage of Overall Spam

Fighting Spam

Stopping today’s mass mailers requires large data collection networks and sophisticatedcorrelation techniques that can identify common elements or fingerprints in the campaign.Only a small number of antispam vendors have the reach required to sample enough ofthese huge attacks and the technical resources required to analyze them.

The constantly increasing investment required to keep a spam filter accurate has led to theconsolidation of the spam filter industry. Five years ago, more than a hundred plausiblevendors existed; today, you can count them on one hand.

Page 18: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

Chapter 8: The Bad Guys from Outside: Malware 69

Number of Threat Emails in Each Campaign

Traditional SpamCampaigns

NewSpear-Phishing

AttacksV

alu

e p

er T

hre

at A

ttem

pt

Figure 8-3 Spear-Phishing Attacks Versus Traditional Spam

Figure 8-4 Example of a Targeted Phishing Email

code. The SMS asks recipients to call a number to confirm their account information, butof course, the number isn’t actually that of the bank. It’s staffed by criminals.

Mining Online Social Networks

Online criminals have also been tapping into all the information—and contacts—availableon social networks such as Facebook and MySpace. They’re hijacking accounts to beg formoney, mining social networking sites for information for phone scams, and constantly find-ing new ways to capitalize on the wealth of information available on online social networks.

Take the case of Bryan Rutberg. As reported on MSNBC.com’s Redtape Chronicles, hisFacebook account was hijacked.5 The online criminal reset the password to lock Rutbergout of his own account, after possibly having obtained the original using a clever phishing

continues

Page 19: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

70 Securing the Borderless Network

email. Then the criminals changed Rutberg’s Facebook “status” message saying he was introuble while on vacation overseas, and, claiming that his credit card wasn’t working, thathe needed a quick loan that he’d repay when he got back home.

This was a variant of a classic “419 scam”—named after the section of Nigeria’s penal codethat covers them because Nigeria is where both classic versions of the scam (faxes oremails asking for assistance in obtaining large amounts of money from overseas bankamounts) and modern versions often originate. It worked; one of Rutberg’s concernedfriends wired over money.

Similar scams are run on other online social networks and will increase as people spendmore of their online time and attention there.

Profit Motive

Much of today’s malware has one goal in common: financial profit. Hackers used to cre-ate viruses largely for fun and glory. These days, hackers and online criminals are part ofa sophisticated shadow economy that wants to make money.

Like any maturing industry, the online crime market has begun to segment into special-izations. Some online criminals focus on the social engineering, marketing, and fulfill-ment of merchandise. Others work on building and maintaining massive bot networksthat they make available for rent. And some organizations specialize in building anddeploying tools for malware creation and delivery.

Talented developers have been creating ever-better variants of malware. They create mal-ware for a specific, popular purpose and sell it “as is” or together with tech support. Theyalso develop custom malware for specific projects. Of the types of malware now for saleor rent, the following are just a few examples:

■ Mass blog-posting tools

■ Volume spamming tools

■ Account-generating tools for webmail accounts or community posting sites, such asCraigslist

■ Keylogging programs

■ Botnet management tools

Because malware is generating significant profits for online criminals, they’ll keep invest-ing in it. That means more new kinds of malware that take advantage of weaknesses inboth existing and newly popular technologies and tools, and malware that works evenharder to be efficient and stay hidden.

But how exactly are online criminals profiting from malware? And who’s reaping thesefinancial returns? In the next chapter, we explore the business aspects of malware.

Page 20: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

Chapter 8: The Bad Guys from Outside: Malware 71

Endnotes1 Nichols, Shaun. “Ransomware attacks target Symbian mobiles,” VNUnet. March 5,2008. http://www.vnunet.com/vnunet/news/2211194/ransomware-goes-mobile.

2 Provos, Niels. “All Your iFrame Are Point to Us,” Google Online Security Blog.February 11, 2008. http://googleonlinesecurity.blogspot.com/2008/02/all-your-iframe-are-point-to-us.html.

3 Weber, Tim. “Criminals ‘may overwhelm the web,’” BBC News. January 25, 2007.http://news.bbc.co.uk/1/hi/business/6298641.stm.

4 Cluley, Graham. “Hackers infect BusinessWeek website via SQL Injection attack,”Graham Cluley’s blog on Sophos.com. September 15, 2008.http://www.sophos.com/blogs/gc/g/2008/09/15/hackers-infect-businessweek-website-via-sql-injection-attack/.

5 Sullivan, Bob. “Facebook ID Theft Targets ‘Friends,’” MSNBC.com. January 30, 2009.http://redtape.msnbc.com/2009/01/post-1.html.

References

Cisco 2008 Annual Security Report.www.cisco.com/en/US/prod/collateral/vpndevc/securityreview12-2.pdf.

IronPort Targeted Phishing Overview PPT 061308—Nilesh Bhandari, IronPort.

IronPort Targeted Phishing Security Trends Overview.www.ironport.com/pdf/ironport_targeted_phishing.pdf.

IronPort 2008 Internet Malware Trends Report—Storm and the Future of SocialEngineering. http://www.ironport.com/malwaretrends/.

Cisco IntelliShield Cyber Risk Reports.http://tools.cisco.com/security/center/cyberRiskReport.x.

ZDnet Zero Day blog. http://blogs.zdnet.com/security/.

CNet Security News. http://news.cnet.com/security/.

The Spamhaus Project news blog. http://www.spamhaus.org/newsindex.lasso.

Page 21: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

Index

NUMBERS

3G LTE (Long Term Evolution),smartphone development, 47

4G smartphone development, 47

419 scams, 70

2008 Global State of InformationSecurity Study(PricewaterhouseCooper), 101

2008 Summer Olympics, phishingattacks, 66

A

ads (pop-up), 62

adware, 62

Aerospace Composite Products,cloud computing, 21-24

AM-OLED diodes, smartphone development, 48

Amit, Ian, 78

analyzing threats, 130

Android (Google), smartphone development, 47

antispyware, ransomware as, 62

antivirus software, ransomware as, 62

Apple

iPhone OS X, smartphone development, 47

Newton, 44

application layer security, 3

Atrivo/InterCage Internet serviceprovider, malware, 78

attachments (email), malware in, 66

attacks, 61

adware, 62

attack strategies, 81-82

botnets, 63

DDoS attacks, 74

pharmaceutical spam, 75

buffer overflows, 63-65

criminal organizations

Atrivo/Intercage Internet service provider, 78

GlavMed (SpamIt), 77

HerbalKing, 77

McColo Internet serviceprovider, 78

RBN (Russian BusinessNetwork), 77

Rock Phish gang, 77

Page 22: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

DDoS (Distributed Denial of Service)attacks, 74

developers, 74

distribution of, 61-62

DoS (Denial of Service) attacks, 63

drive-by downloads, 63

email attachments, 66

financial benefits from, 70, 73-74

goals of, 70

iFrames, 64

keylogging, 63

law enforcement, 79

malicious websites, 64

maximizing effect via multiple technologies, 82-83

NeoSploit, 78

networks and, 82-83

phishing attacks, 65-67

419 scams, 70

Facebook, 69-70

Rock Phish gang, 77

Rutberg, Bryan, 69-70

spear phishing attacks, 68

text-messaging, 68

pop-up ads, 62

preventing

behavioral analysis, 84

Cisco Global ThreatCorrelation initiative, 89

Cisco SIO, 89

global correlation, 88

reputation filtering, 85-87

signature scanning, 83

profitting from, 70, 73-74

ransomware, 62

rootkits, 63

spam, 67, 75-77

spyware, 62

threat analysis, 130

viruses, 62

weak points, finding, 64-65

Web 2.0 attacks, 113-114

AUP (acceptable use policies)

employee free will versus, 96-97

evolution of, 91-92

generational habits, 92-93

necessity of, 94-95

authentication, user identity, 117-120

flexible identity fabric, 122

wired networks, 121

wireless networks, 121

B

banking industry

Bank of America Corp., social networking, 13

communication silos, demolishing,15

customer communication, 13-16

developing innovation with, 14

employee communication, 15-16

social networking, 13-16

batteries, smartphone development,48

behavioral analysis (software), mal-ware prevention, 84

Bell, Alexander Graham, 38

Bell Telephone Company, telephonedevelopment, 38

BlackBerry, 45

corporate security policies, 111-112

Obama, Barack, 56

smartphone development, 47

136 attacks

Page 23: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

blacklists, 87

Blendtec, online video marketingstrategies, 8

blogs, microblogs, 9

Bobcat, benefits of collaborationtechnologies, 29

borderless network security architectures

Cisco SIO, 127-131

delivery mechanisms, 127

next-generation endpoints, 127-128,132

policy management consoles, 127

scanning engines, 127-130

botnets, 63

DDoS (Distributed Denial of Service)attacks, 74

pharmaceutical spam, 75

breaches (security)

Challenge of Data Leakage forBusinesses and EmployeesAround the World report, The,101

Chronology of Data Breaches(Privacy Rights Clearinghouse),100

insider threats, 100-102

internal threats, 99

Tiversa, 109

TJX data breach, 100

Brogan, James, 32

buffer overflows, 63-65

Bush, George W., 56

businesses

employee Internet/network access

AUP, 91-97

DLP, 101-104

virtual meetings

benefits of, 29

cloud-based teleconferencing, 31

telepresence, 27-28, 32-34

videoconferencing, 27

WebEx, 27-32

C

Calhoun, Pat, 121-122

Cammack, Chris, 31

cellular phone development, 39-41

Cerf, Vint, 119

Challenge of Data Leakage forBusinesses and Employees Aroundthe World report, The, 101

Chevrolet, online video marketingstrategies, 8

China, 2008 Summer Olympics phishing attacks, 66

Christiansen, Chris, 54

Chronology of Data Breaches(Privacy Rights Clearinghouse), 100

Cisco

Challenge of Data Leakage forBusinesses and EmployeesAround the World report, The,101

Ethernet and Wireless TechnologyGroup, authenticating user identity, 121

Global Threat Correlation initiative,89

Global Threat Correlation technique,130

IronPort, 86

SensorBase, 86

SIO (Security IntelligenceOperation), 89, 127-131

Cisco 137

Page 24: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

TelePresence, 27-28, 32

local Internet access and, 34

networks and, 33-34

WebEx, 28, 30-32

Wireless, Security, and RoutingTechnology Group, smartphonedevelopment, 47

cloud computing, 11, 22-24

beneficiaries from, 20

defining, 19

IaaS (Infrastructure as a Service), 20

manufacturing companies, 21-24

PaaS (Platform as a Service), 19

SaaS (Software as a Service), 19

Salesforce CRM, 21, 24

security and, 25-26

teleconferencing, 31

coding, behavioral analysis, 84

Cogent Research, Social Media’sImpact on Personal Finance &Investing, 14

collaboration (online)

benefits of, 29

cloud computing, 11, 31

enterprise-level collaboration tools,10

Google Apps, 9-10

Google Docs, 10

lightweight collaboration tools, 9-10

online video, 8

social networks, 9

teleconferencing, 31

telepresence, 27-28, 32

local Internet access and, 34

networks and, 33-34

videoconferencing, 27

Web 2.0 and, 133

Web 3.0 and, 133

WebEx, 28, 30-32

webinars, 27

communication silos, demolishing, 15

company employee Internet/networkaccess

AUP, 91-97

DLP, 101-104

compliance, security policies, 103

Computing magazine, Web 2.0 access,109

connection managers, borderless network security architectures, 132

context (threat analysis), 130

Cooper, Dr. Martin, 39

Corporate Insight (market researchfirm), Social Media: Trends andTactics in the Financial ServicesIndustry, 13

corporate security policies, handhelddevices, 57

Countrywide Financial, insider security threats, 102

craigslist.com, criminal activity and,74

criminal activity, social networkingand, 74

“culture of no,” security policies and,108-110

customer communication, financialservices industry, 13-16

D

data breaches

Challenge of Data Leakage forBusinesses and EmployeesAround the World report, The,101

138 Cisco

Page 25: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

Chronology of Data Breaches(Privacy Rights Clearinghouse),100

insider threats, 100-102

internal threats, 99

Tiversa, 109

TJX data breaches, 100

Data Leakage Worldwide: TheEffectiveness of Security Policies,94

DDoS (Distributed Denial of Service)attacks, 74

delivery mechanisms (borderless network security architectures), 127

Deloitte

netbook market, growth of, 48

Protecting What Matters: The SixthAnnual Global Security Survey, 16

desktop virtualization, 59-60

disconnected workflows, 22

DLP (data loss prevention), 101-104

DoS (Denial of Service) attacks, 63

Dosan Infracore, benefits of collaboration technologies, 29

drive-by downloads, 63

DTZ Holdings, Web 2.0 access, 109

Duarte, Joe, 32

DynaTAC 8000x cellular phone(Motorola), 39

E

Edwards, Nick, 78

email

attachments, malware in, 66

Bush, George W., 56

presidential emails, 56

employees

communication, financial servicesindustry, 15-16

Internet access

AUP, 91-97

DLP, 101-104

security policies, adherence to, 109-110

encryption, 2008 Global State ofInformation Security Study(PricewaterhouseCooper), 101

endpoints

bordless network security architectures, 127-128, 132

redefining, 132

security, evolution of, 128

enforcing security policies, 131-132

Engel, Dr. Joel, cellular phone development, 39

Ethernet and Wireless TechnologyGroup (Cisco), authenticating useridentity, 121

F

Facebook, 9

financial services industry, 13

phishing attacks, 69-70

security policies and, 110

Visa Business Network, 14

Fast Company magazine, 9

financial services industry

communication silos, demolishing,15

customer communication, 13-16

developing innovation with, 14

employee communication, 15-16

social networking, 13-16

financial services industry 139

Page 26: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

firewalls, 1

as web proxies, 4

evolution of, 2-3

packet-filtering firewalls, 2-4

proxy-based firewalls, 2-4

stateful inspection firewalls, 2-4

Friendster, 9

G

Galloway, Brett

iPhone and the consumerization ofIT, 54

smartphone development, 47

GlavMed (SpamIt), pharmaceuticalspam, 77

global correlation, malware prevention, 88

Global Threat Correlation technique(Cisco), 130

Google

Android smartphone development, 47

Apps, 9-10

Docs, 10

Graham, Russell

generational differences in Internethabits, 92

security policies, 109

Grote Industries, WebEx, 31

Grote, Dominic, 31

GTRC (Global Technical ResponseCenter), 58

H - I

hacking, finding vulnerabilities (security), 65

handheld devices

corporate security policies, 57

in the workplace, 57

incorporating into the workplace, 58-59

personal expression and, 56

HerbalKing, pharmaceutical spam, 77

HTTP (Hypertext Transfer Protocol),4

“I Love You” virus, 62

IaaS (Infrastructure as a Service), 20

identity (user), authenticating, 117-120

flexible identity fabric, 122

ITRC (Identity Theft ResourceCenter), 100

wired networks, 121

wireless networks, 121

iFrames, 64

Infonetics Research, smartphonedevelopment, 47

insider fraud, 99-102

Intel

microprocessors, 41-42

smartphone development, 41-42

internal data breaches, 99-102

Internet access

AUP

employee free will versus, 96-97

evolution of, 91-92

generational habits, 92-93

necessity of, 94-95

DLP, 101-104

smartphone development, 46

telepresence and, 34

140 firewalls

Page 27: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

iPhone (Apple)

consumerization of IT, 54

smartphone development, 47

iPod (Apple), consumerization of IT,55

IT (information technology)

consummerization of, 53

benefits from, 57

Blackberry devices, 56

desktop virtualization, 59-60

handheld devices and personalexpression, 56

handheld devices in the work-place, 57

incorporating handheld devicesinto the workplace, 58-59

music and, 55

Obama, Barack, 56

smartphones, 54

technological development and,54

security policy development, 108

ITRC (Identity Theft ResourceCenter), 100

J - K - L

Jacoby, Rebecca,

GTRC (Global Technical ResponseCenter), 58

handheld devices

incorporating handheld devicesinto the workplace, 58

personal expression and, 56

keylogging (malware), 63

Knapp, David, 13

KPF (Kohn Pedersen Fox) Associates,WebEx, 31-32

laptops, development of, 54

law enforcement, malware, 79

LinkedIn, 9

local Internet access, telepresenceand, 34

M

Malloy, Jim, 21

malware, 61

adware, 62

attack strategies, 81-82

botnets, 63

DDoS attacks, 74

pharmaceutical spam, 75

buffer overflows, 63-65

criminal organizations

Atrivo/Intercage Internet service provider, 78

GlavMed (SpamIt), 77

HerbalKing, 77

McColo Internet serviceprovider, 78

RBN (Russian BusinessNetwork), 77

Rock Phish gang, 77

DDoS (Distributed Denial of Service)attacks, 74

developers, 74

distribution of, 61-62

DoS (Denial of Service) attacks, 63

drive-by downloads, 63

email attachments, 66

malware 141

Page 28: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

financial benefits from, 70, 73-74

goals of, 70

iFrames, 64

keylogging, 63

law enforcement, 79

malicious websites, 64

maximizing effect via multiple technologies, 82-83

NeoSploit, 78

networks and, 82-83

phishing attacks, 65-67

419 scams, 70

Facebook, 69-70

Rock Phish gang, 77

Rutberg, Bryan, 69-70

spear phishing attacks, 68

text-messaging, 68

pop-up ads, 62

preventing

behavioral analysis, 84

Cisco Global ThreatCorrelation initiative, 89

Cisco SIO, 89

global correlation, 88

reputation filtering, 85-87

signature scanning, 83

profitting from, 70, 73-74

ransomware, 62

rootkits, 63

spam, 67, 75-77

spyware, 62

threat analysis, 130

viruses, 62

weak points, finding, 64-65

Web 2.0 attacks, 113-114

manufacturing companies, cloud computing and, 21-24

Marconi, Guglielmo, 39

marketing

online video, 8

social networks, 9

Marshalls department store, TJX databreach, 100

mass mailing spam, 67

Mazid, Rami

handheld devices, incorporating intothe workplace, 58

security policies, 97

telepresence, 32

McColo Internet service provider,malware, 78

meetings (virtual)

benefits of, 29

cloud-based teleconferencing, 31

telepresence, 27-28, 32

local Internet access and, 34

networks and, 33-34

videoconferencing, 27

WebEx, 28-32

webinars, 27

“Melissa” virus, 62

messaging (text), phishing attacks, 68

microblogs, 9

microprocessors, smartphone development, 41-42

Miyachi Unitek Corporation, cloudcomputing, 21-24

mobile technologies, security policies,111-112

mobile WiMAX, smartphone development, 47

Morgan Stanley, adopting new technologies, 133

142 malware

Page 29: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

Motorola

cellular phone development, 39

DynaTAC 8000x, 39

market growth, 47

Moto smartphones(Motorola/Verizon), 47

mp3 players

consumerization of IT, 55

personal expression and, 56

MSNBC.com, phishing attacks, 69-70

multilayer signature scanning, malware prevention, 84

music, consumerization of IT, 55

MyCanadianPharmacy website, pharmaceutical spam, 76-77

MySpace, 9, 110

N

NeoSploit, 78

netbooks, market growth, 48

networks

AUP

employee free will versus, 96-97

evolution of, 91-92

generational habits, 92-93

necessity of, 94-95

botnets, 63

DDoS attacks, 74

pharmaceutical spam, 75

DLP, 101-104

malware and, 82-83

security, 83

telepresence and, 33-34

wired networks, authenticating useridentity, 121

wireless networks, authenticatinguser identity, 121

New Yorker magazine, user identityand, 117

Newton (Apple), 44

“Next Great Innovator Challenge”(RBC), 14

next-generation endpoints (borderlessnetwork security architectures),127-128, 132

Nigeria, 419 scams, 70

NPD Group, smartphone development, 47

O - P

Obama, Barack

Blackberry devices, 56

social networking marketing strategies, 9

online video, marketing strateges and,8

Osborne, Adam, 42

PaaS (Platform as a Service), 19

packet-filtering firewalls, 2-4

PalmPilot, 45

PDA (personal digital assistants)

Apple Newton, 44

BlackBerry, 45

corporate security policies, 111-112

PalmPilot, 45

smartphone development, 44

Peterson, Patrick, 75-77

Peterson, Patrick 143

Page 30: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

pharmaceutical spam, 75-77

phishing attacks, 65-67

419 scams, 70

Facebook, 69-70

Rock Phish gang, 77

Rutberg, Bryan, 69-70

spear phishing attacks, 68

text-messaging, 68

phones (smart)

consumerization of IT, 54

development of, 54

personal expression and, 56

police, malware and, 79

policy management consoles (borderless network security architectures), 127

Ponemon Institute, data breaches,101

pop-up ads, 62

portable devices

corporate security policies, 57

in the workplace, 57

incorporating into the workplace, 58-59

personal expression and, 56

presidential emails, 56

Presidential Records Act of 1978, 56

PricewaterhouseCooper, 2008 GlobalState of Information SecurityStudy, 101

Privacy Rights Clearinghouse, 100

Protecting What Matters: The SixthAnnual Global Security Survey, 16

proxy-based firewalls, 2-4

Q - R

radiotelephones, 39

ransomware, 62

RBC (Royal Bank of Canada), NextGreat Innovator Challenge, 14

RBN (Russian Business Network),malware, 77

Redtape Chronicles (MSNBC.com),phishing attacks, 69-70

remote access security policies, 111-112

reputation filtering, malware prevention, 85-87

restrictive use policies (Internet/networks)

AUP

employee free will versus, 96-97

evolution of, 91-92

generational habits, 92-93

compliance, 103

Data Leakage Worldwide: TheEffectiveness of Security Policies,94

DLP, 101-104

necessity of, 94-95

RIM (Research in Motion),BlackBerry, 45

Rock Phish gang (phishing attacks),77

rootkits, 63

Rutberg, Bryan, 69-70

144 pharmaceutical spam

Page 31: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

S

SaaS (Software as a Service), 19

Salesforce CRM, 21, 24

scanning engines (borderless networksecurity architectures), 127-130

Scott, Duncan, 109

script kiddies, 74

security

breaches

Challenge of Data Leakage forBusinesses and EmployeesAround the World report,The, 101

Chronology of Data Breaches(Privacy RightsClearinghouse), 100

insider threats, 100-102

internal threats, 99

Tiversa, 109

TJX data breach, 100

cloud computing, 25-26

corporate security policies, handhelddevices, 57

desktop virtualization, 59-60

networks, 83

policies, 107-109

compliance, 103

control via, 108

“culture of no,” 108-110

Data Leakage Worldwide: TheEffectiveness of SecurityPolicies, 94

developing, 108

employee adherence to, 109-110

employee free will versus, 96-97

enforcing, 131-132

evolution of, 114-115

Facebook, 110

mobile technologies, 111-112

MySpace, 110

necessity of, 94-95

remote access, 111-112

social networking websites, 110

technological advances and, 108

Web 2.0, 109-110, 126

weak points, finding, 64-65

SenderBase. See Cisco SensorBase

signature scanning, malware prevention, 83

silos (communication), demolishing, 15

smartphones, 37

consumerization of IT, 54

development of, 49, 54

3F LTE, 47

4G, 47

AM-OLED diodes, 48

batteries, 48

cellular phones, 39-41

Internet, 46

microprocessors, 41-42

PDA, 44-45

radiotelephones, 39

telephones, 38

transistors, 39

WiFi, 47

evolution of, 47-49

personal expression and, 56

Smith, David, 62

Snyder, Joel

application layer security, 3

firewalls, evolution of, 2

packet filtering, 2

stateful inspection firewalls, 2

Snyder, Joel 145

Page 32: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

social engineering, phishing attacks,65, 67

Social Media’s Impact on PersonalFinance & Investing (CogentResearch), 14

Social Media: Trends and Tactics inthe Financial Services Industry(Corporate Insight market researchfirm), 13

social networking

criminal activity and, 74

financial services industry, 13-16

marketing and, 9

security policies and, 110

software, behavioral analysis, 84

Sony Corporation

batteries, 48

Walkman, consumerization of IT, 55

spam, 67

attack strategies, 81-82

maximizing effect via multiple tech-nologies, 82-83

networks and, 82-83

pharmaceutical spam, 75-77

preventing

behavioral analysis, 84

Cisco Global ThreatCorrelation initiative, 89

Cisco SIO, 89

global correlation, 88

reputation filtering, 85-87

signature scanning, 83

threat analysis, 130

Sparr, Justin, 22-24

spear phishing attacks, 68

spyware, 62

SQL injections, iFrames, 64

“Stagecoach Island” (Wells Fargo), 14

stateful inspection firewalls, 2-4

Stewart, John, 119, 122

Summer Olympics 2008, phishingattcks, 66

Symbian, smartphone development,47

T

“Team Obama,” marketing via socialnetworking, 9

Tedlow, Richard

cellular phone development, 41

smartphone development, 37, 41, 46

telephones, development of, 38

cellular phones, 39-41

radiotelephones, 39

transistors, 39

telepresence, 10, 27-28, 32

local Internet access and, 34

networks and, 33-34

text-messaging, phishing attacks, 68

threat analysis, 130

Tiversa, security breaches, 109

TJ Maxx department store, TJX databreach, 100

TJX data breach, 100

transistors, smartphone development,39

travel, collaboration technologies and,29

Twitter, 9

financial services industry, 13

Visa Business Network, 14

146 social engineering, phishing attacks

Page 33: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

U - V

user identity, authenticating, 117-120

flexible identity fabric, 122

wired networks, 121

wireless networks, 121

Verizon, Moto smartphones(Motorola/Verizon), 47

video

online video marketing strategies, 8

videoconferencing, 27

viral video marketing strategies, 8

virtual meetings

benefits of, 29

cloud-based teleconferencing, 31

telepresence, 27-28, 32

local Internet access and, 34

networks and, 33-34

videoconferencing, 27

WebEx, 28-32

webinars, 27

virtualization, 59-60

viruses, 62

antivirus software, ransomware as,62

attack strategies, 81-82

maximizing effect via multiple technologies, 82-83

networks and, 82-83

preventing

behavioral analysis, 84

Cisco Global ThreatCorrelation initiative, 89

Cisco SIO, 89

global correlation, 88

reputation filtering, 85-87

signature scanning, 83

threat analysis, 130

Visa Business Network, 14

VM (virtual machines), 59

vulnerabilities (security), finding, 64-65

W

Walkman (Sony), consumerization ofIT, 55

Watson, Thomas A., 38

weak points (security), finding, 64-65

Web 2.0

collaboration (online), 133

cloud computing, 11

enterprise-level collaborationtools, 10

lightweight collaboration tools,9-10

online video, 8

social networks, 9

financial services industry

customer communication, 13-16

employee communication, 15-16

malware attacks, 113-114

scanning engines, 129

security policies, 109-110, 126

Web 3.0 collaboration, 133

web proxies, 4

WebEx, 28-32

webinars, 27

websites

iFrames, 64

malicious websites, 64

social networks, 9

websites 147

Page 34: Securing the Borderless Network - pearsoncmg.comptgmedia.pearsoncmg.com/images/9781587058868/samplepages/1587058863_sample.pdfI find myself remembering a hobbit from Lord of the Ringssay-ing,

Wells Fargo

customer communication, 14

employee communication, 15

Stagecoach Island, 14

WEP (Wired Equivalent Privacy), TJXdata breach, 100

Wesley College

generational differences in Internethabits, 92

security policies, 109

WiFi (wireless fidelity), smartphonedevelopment, 47

“Will it Blend?” videos (Blendtec),online video marketing strategies, 8

Wilson, Scott, 108

WiMAX, smartphone development,47

wired networks, authenticating useridentity, 121

wireless networks, authenticating useridentity, 121

workflows (disconnected), 22

X - Y - Z

Yammer, 9

YouTube, marketing strategies, 8

148 Wells Fargo