Site icon IT World Canada

Detect, Disrupt, and Deny the Attack

Cisco Annual Security Report

The Best Cyber Security Defense is Being Prepared.

Much of information technology is about problem solving. And there’s tremendous satisfaction in meeting a challenge and resolving it. But security can be the frustrating side of IT; more about problem managing than problem solving.

Cunning attackers have become highly proficient in finding holes in software and architectures and even in fooling employees through social media to divulge confidential information that could ultimately help a hacker—so skilled that no organization is completely safe from intrusion. For this reason, best practice has switched from trying to stop attacks at the network perimeter to assuming and preparing for the fact that intrusions are likely.

For the IT security pro, that can be a difficult assumption to build an IT security strategy around. But with good preparation, including a thorough risk analysis, an intrusion won’t inevitably mean that valuable data will escape or that IT assets will be destroyed.

For example, a security consulting firm recently studied breaches and found that many of them are caused by users not changing default passwords, a lack of clear text authentication and misconfiguration of systems.

Recognizing that intrusions are inevitable is step 1 to developing a comprehensive defense posture. Step 2 and beyond include recognizing what this means for the security team. Among the implications of this new approach are:

Looking at attacks through the prism of a threat chain may also help the Chief Information Security Officer (CISO) develop resilient mitigations against intruders and prioritize investments in new technology or processes.

Lockheed Martin, for example, created a seven-step model for computer network defence: Reconnaissance, weaponization (creating an attack tool), delivery (via, for example, email), installation, establishing a link to a command and control server, and exfiltration or destruction of data.

Other companies have collapsed this model to four steps. Regardless, the point is to ensure the organization has defences that can detect, disrupt and deny the attack.

Building that strategy starts with knowing the current threat landscape the CISO faces, and Cisco Systems’ 2015 Security Report can be of help.

“Security must be considered a growth engine for the business,” the report says. “Security should never be a roadblock or hassle that undermines user productivity and stands in the way of business innovation.”

Exit mobile version