Page 113 - Cyber Defense eMagazine January 2024
P. 113

streamlined architecture with fewer vulnerabilities, mainframes are virtually impervious to hackers. There
            is the misconception that they exist in isolation within the enterprise IT framework, disconnected from the
            external world where genuine threats lurk. And then there’s the age factor. People newer to the profession
            have  relatively  little  experience  with  mainframe  systems  when  compared  to  their  more  experienced
            counterparts and will tend to not question their viewpoints or approaches of their leaders or senior team
            members.

            This  state  of affairs  can’t  continue.  In the  contemporary  landscape,  modern  mainframes  are routinely
            accessed  by  employees  and  are  intricately  linked  to  applications  that  encompass  a  wide  array  of
            functions, ranging from processing e-commerce transactions to facilitating personal banking services.

            The implications  of a breach can’t  be overstated.  Given  the substantial  financial  toll of a data  breach,
            estimated to be USD $9.48 million on average, it’s imperative to swiftly detect any potential threat to the
            mainframe.

            To counter this threat to mainframes,  security teams  must look at two key areas: encryption  and early
            warning.




            Encryption is now a weapon, and must be treated accordingly

            Encryption is a double-edged sword in today’s IT environment. On one hand it serves as a crucial defense
            mechanism against cyberattacks  targeting sensitive data. On the other, encryption can be manipulated
            by unscrupulous  individuals,  disgruntled  employees,  or  even rogue  state  actors.  It has  emerged  as a
            favored  attack  vector  among  hackers  due  to  its  remarkable  speed  on  modern  mainframes  and  its
            susceptibility to reversal. Consequently, malicious actors often follow a straightforward modus operandi:
            infiltrate a system, initiate malicious  encryption, and then attempt to sell the decryption  key back to the
            victim.

            It is paramount  to proactively  halt encryption before  it causes substantial  harm. The primary challenge
            lies in establishing  a reliable method  for detecting  encryption in progress, while preventing  the support
            staff from being overwhelmed  with an avalanche of alerts. This is especially important in large business
            and government settings, where the routine exchange of encrypted files is common. A glut of alerts can
            lead to a desensitized response, ultimately leaving the system no more secure than it was.

            To  address  this,  an  immediate  response,  ideally  within  seconds,  is  imperative.  Unfortunately,  relying
            solely  on  human  intervention  falls  short  of  achieving  the  required  speed.  The  solution  lies  in  the
            deployment  of  a specialized  tool  capable  of  swiftly  detecting  the  initiation  of  encryption  and promptly
            initiating corrective measures.



            Achieving near real-time encryption monitoring

            IBM Security's  2023 Cost of a Data Breach Report highlights  a troubling  reality: it takes an average of
            204 days to detect a breach, followed by an additional 73 days to recover. During this prolonged period,






            Cyber Defense eMagazine – January 2024 Edition                                                                                                                                                                                                          113
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   108   109   110   111   112   113   114   115   116   117   118