Whats the key to handling threats

what every company has in common with all required security in practice?
– not just good thing but right thing

1)Understanding threat
2)Counter measures

We are protecting, but detection is a MUST
Detection – identify deviation in
outbound traffic
Any packet going outside, ip should be in DNS cache otherwise suspicious
Legitimate connections per ip, outgoing traffic is less than incoming. If else suspicious

Generally attackers connect encrypted traffic connection started from inside.
This is 90% caused due to user clicking link/opening exploited app – social engg.

Executive Management is worried about Reputational Damage.
Caused by exposure of sensitive data

Threat landscape
Majority of threat comes from main variants of malware.
1)malware 25K/day
2)1.5M sites/month, DNS attacks, CSS, Phishing
3) DDos Attacks
4) Data – autorun.ini
5) SPAM

Is cloud computing a threat as breaking into cloud gives access to vast data. — This is a serous topic that needs to dwelled in.
Getting the right thing is three questions asked – which is the key to handling threats
What is risk? Priority of risk? Cost-Effective solution to mitigate the risk?

Wow…we use it Likelihood and Impact drives the risk calculation which we work this way
We work on (likelihood*consequence)*Impact = RISK

Advertisements

About wikihead

A security freak
This entry was posted in Articles, security, Security Management and tagged , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s