Page 105 - CDM-CYBER-DEFENSE-eMAGAZINE-December-2018
P. 105

3.  Web  Application  Firewalls  (WAF)  have  traditionally  monitored  external  customers  using  an
                   application hosted by your website and offer protection against SQL injections and other attacks.
                   These devices are still adopted widely because they are now primarily software-based, which
                   advances  their  capabilities  to  be  on  par  with  real-time  application  self-protection  (RASP)
                   technology. Software-defined WAFs allow you to add a small piece of code to a web application.
                   The code checks traffic and runs analysis in the cloud, letting you know if you should block or
                   allow each attempted connection. The best part is that software-defined WAFs enable changes
                   and updates to be applied to a small piece of code, so the chances of application performance
                   being affected are slim.


               4.  Lateral  Movement  Detection  includes  network  traffic  analysis  tools  that  look  for  anomalous
                   behavior so you can identify and mitigate malicious connections that may get by your NAC and
                   firewall. It’s an important layer to a network security strategy because no perimeter defense can
                   offer 100% protection. If someone slips past your firewall and gets a user to download malware,
                   it may be difficult to detect the anomalous activity unless you are monitoring traffic. A key aspect
                   to consider in evaluating a traffic monitoring tool is the machine learning algorithm, because it’s
                   this feature that controls the threshold for false positives. It’s inevitable that you’ll experience some
                   false alarms, but when there are too many, they distract the security team from investigating real
                   threats. To find a solution with a strong algorithm that does not generate too many false positives,
                   run a proof-of-concept for at least two weeks to see how it performs. Lateral movement detection
                   tools also help you determine if anyone is jumping from machine-to-machine on your network.
                   This is particularly helpful for flat networks that utilize a reduced number of routers and switches.
                   Attackers who break into a flat network can easily jump from one part of the network to another,
                   staying ahead of your scans. Detecting lateral movement will help you find adversaries moving
                   around your environment and network monitoring analysis tools can help you find insider threats.
                   You can also trace how malware spreads, making it easier to contain.


               5.  DDoS  Mitigation  protects  you  from  distributed  denial  of  service  (DDoS)  attacks  that  use
                   hundreds or even thousands of devices to send large amounts of traffic to overwhelm a server.
                   When  that  happens,  web  sites  and  applications  become  unavailable,  or  worse,  entire
                   organizations  go  offline.  As  a  result,  you  risk  loss  of  revenue  and  customer  churn.  Many
                   businesses rely on their ISP to prevent DDoS attacks, but some ISPs have better threat detection
                   and mitigation capabilities than others so the level of security varies. Adding to the uncertainty of
                   protection is the fact that ISPs don’t have good visibility into your applications and their use, so
                   they don’t have the ability to determine which traffic is legitimate, so all users and traffic are
                   blocked until an attack is thwarted. But the leading DDoS mitigation solutions are able to block
                   only the attack traffic so that legitimate traffic can pass through the network. So, while the attack
                   is being mitigated, the business continues as usual.


               6.  Deception Technologies are the evolution of the honeypot, giving you a way to trick attackers
                   with decoy servers, workstations, and user credentials. Businesses used to rely on honeypots to
                   distract cybercriminals into spending their time in a place where they couldn’t do much harm. But
                   attackers  have  caught  on  and  know  a  honeypot  when  they  see  one.  Today’s  deception
                   technologies  feature  decoy  devices  that  you  can  place  within  a  production  environment.  For
                   example, if you have a /24 subnet that can host 254 devices, but you are only using 100 of the IP





                                 105
   100   101   102   103   104   105   106   107   108   109   110