news / tech talk
Cyber-Espionage
by Lee LeClair12/18/2009
As seen in Inside Tucson Business
- Arizona Daily Star
- BizPlanIt
- Linux World Expo
- 40 under 40
- They're on the A-List
- Dotche system built by Ephibian
- AzBusiness
- Arizona Daily Star
- Arizona Daily Star
- Phoenix Business Journal
- Ranking Arizona
- The Arizona Republic
- Hostingtech.com
- American City Business Journals Inc.
- AZtechBiz
- Inside Tucson Business
- Arizona Business Gazette
- Inside Tucson Business
- Fiesta Mall
- Arizona Daily Star
- .com Success!
- Business Wire
- Buck's Woodside Menu
- CRN
- Arizona Daily Star
- LocalBusiness.com
- The Business Journal - Phoenix
- Phoenix Business Journal
- LocalBusiness.com
- Business Wire
- Inside Tucson Business
- internet.com
- AzBusiness
- AZtechBiz
- designshops.com
- AZtechBiz
- BizAZ
- Virtualized Cloud
- Collaboration and Communication
- Personally Identifiable Information
- Cyberwarfare
- iPad and E-Readers
- Trusted Platform Module
- Smartphone Data Security
- Cyber-Espionage
- DTNs
- Have a Plan
- Cloud Computing - Part 2
- Impact of Technology on Existing...
- Data Archiving
- Mobile Telephony - Part 2
- Cloud Computing
- Social Networks
- Password Management
- Netbooks
- Microtargeting
- Packet Analysis
- IP v6
- Surge Protection
- Traveling Safely
- Thin Client
- Uptime
- Mobile Telephony
- Know Thy Programs
- Voice Over IP - Part 3
- Google Apps
- Virtual Computing
- Securing Users
- Simple Desktop Management
- Service Oriented Architecture
- Light-based Communication
- Data Mining
- Small Business Architecture
- Voice Over IP - Part 2
- Business Automation
- Database Needs
- DMZs
- CPUs
- SPAM & Botnets
- Security Testing
- Customer Advocacy
- Laptop Security
- Windows Vista
- Large Scale Deployment
- Network Access Control
- Generator Use
- Uninterrupted Power Supplies
- Web Site Security
- Blu-ray vs. HD-DVD
- Dual-Core Processors
- Business Security
- AJAX
- 3G Mobile Internet
- Apple Intel Processors
- Entertainment Tech
- Cafe Wireless
- Commercial Hosting
- Gaming Consoles
- Voice Over IP
- Blogging
- Is WI-FI Secure?
- OpenDocument Format
- Allured Publishing Changes Name to...
- Computer Model Can Help Prevent War?
- Defense contractors run gamut from...
- ASU gears on-site construction...
- The Cleveland Foundation Selects...
- Global Partners Join Forces to Speed...
- Intuit Completes Acquisition of...
- Strategy unveiled on how tobacco tax...
- Gaiam's, Real Goods' revenues increase...
- LSST Awarded Time on TeraGrid
- Aldine Independent School District...
- Miraval featured in Natural Solutions...
- Ventana Medical Systems Joins TSIA to...
- UA $3 Million Bioterrorism Grant...
- Arizona Center for Integrative...
Cyber-Espionage. It sounds like something from a Bond movie, doesn't it? It seems like a threat the Defense Department needs to consider but hardly anything that a business owner has to worry about. Yet that may not be true. First let's define the term: cyber-espionage is the practice of obtaining information not intended for the public about or from a company through network or computerized means, often illegally. Ultimately, the goal is to get sensitive information about or from a company through computers and networks.
The information gathered might be direct, like customer details, business strategies, trade secrets, financial information, credit card numbers, etc. or indirect like which computer systems are critical to online sales transactions during Black Friday. The objective could vary from stealing information or harming reputation to business disruption or extortion.
One would typically ask “how likely is this to actually affect my business”? Keep in mind that the virtual world is completely detached from the physical world and a malicious probing program running from asia or eastern Europe is indiscriminate about whether it finds a target in New York or Tucson. These kinds of programs operate automatically and 24x7x365. “Wide net” trolling provides output which is then refined for obtaining credit card information, personal identification information, bank account information, proprietary business information, providing a platform for deeper attack, spam, phishing, or at the very least assimilation into a botnet.
I set up a packet capture system on the outside of my home firewall and was not surprised to find that probes and attacks occur almost constantly. There is no question of “if” your business is being probed and tested constantly, it is. The question is how focused are your attackers on your systems and do you have vulnerable exposures. Home thieves drive through neighborhoods performing high level checks of which houses are likely candidates (poor lighting, no dogs, cheap locks, unlocked fence gates, etc.). They return and check more vulnerable houses more thoroughly for actual breakin. The same applies for businesses, especially small ones.
What can a business owner do to deter or combat this? Well the primary actions are defensive as the probes themselves are extremely difficult to do anything about; the systems performing them are often outside the US and even the ones inside are difficult to track down across state lines and through Internet Service Providers. Beside, cyber-laws and enforcement are barely existent.
First, ensure you have a good firewall with an intelligent administrator that understands exactly what type of traffic goes into and out of your network. Second, ensure that the only systems that are visible to the Internet are limited to necessary systems that are carefully configured to safely perform a limited function. In addition, ensure that visible systems reside in a Demilitarized Zone (DMZ) that does not have internal network access so that if a visible system is compromised, it cannot be used as a platform for deeper attack. Finally, ensure your administrators update visible systems with security patches quickly after they are released; it is critical these systems be kept up-to-date. It is also advisable to periodically perform external checks of your own to ensure that nothing has changed or become vulnerable.
Intrusion detection systems are good tools but provide little benefit on the outside of your network simply because probes are always happening. They are more efficient on the inside of your network, just in front of your main servers as there should be no attacks occurring at that point in your network. And of course tools like these are of no use if a human being isn't monitoring them and on the lookout for suspicious behavior. It's a tough cyberworld out there; one where distance doesn't matter and law enforcement is difficult. Be vigilant and be careful.
Lee Le Clair is the CTO at Ephibian. His Tech Talk column appears the third week of each month in Inside Tucson Business
The information gathered might be direct, like customer details, business strategies, trade secrets, financial information, credit card numbers, etc. or indirect like which computer systems are critical to online sales transactions during Black Friday. The objective could vary from stealing information or harming reputation to business disruption or extortion.
One would typically ask “how likely is this to actually affect my business”? Keep in mind that the virtual world is completely detached from the physical world and a malicious probing program running from asia or eastern Europe is indiscriminate about whether it finds a target in New York or Tucson. These kinds of programs operate automatically and 24x7x365. “Wide net” trolling provides output which is then refined for obtaining credit card information, personal identification information, bank account information, proprietary business information, providing a platform for deeper attack, spam, phishing, or at the very least assimilation into a botnet.
I set up a packet capture system on the outside of my home firewall and was not surprised to find that probes and attacks occur almost constantly. There is no question of “if” your business is being probed and tested constantly, it is. The question is how focused are your attackers on your systems and do you have vulnerable exposures. Home thieves drive through neighborhoods performing high level checks of which houses are likely candidates (poor lighting, no dogs, cheap locks, unlocked fence gates, etc.). They return and check more vulnerable houses more thoroughly for actual breakin. The same applies for businesses, especially small ones.
What can a business owner do to deter or combat this? Well the primary actions are defensive as the probes themselves are extremely difficult to do anything about; the systems performing them are often outside the US and even the ones inside are difficult to track down across state lines and through Internet Service Providers. Beside, cyber-laws and enforcement are barely existent.
First, ensure you have a good firewall with an intelligent administrator that understands exactly what type of traffic goes into and out of your network. Second, ensure that the only systems that are visible to the Internet are limited to necessary systems that are carefully configured to safely perform a limited function. In addition, ensure that visible systems reside in a Demilitarized Zone (DMZ) that does not have internal network access so that if a visible system is compromised, it cannot be used as a platform for deeper attack. Finally, ensure your administrators update visible systems with security patches quickly after they are released; it is critical these systems be kept up-to-date. It is also advisable to periodically perform external checks of your own to ensure that nothing has changed or become vulnerable.
Intrusion detection systems are good tools but provide little benefit on the outside of your network simply because probes are always happening. They are more efficient on the inside of your network, just in front of your main servers as there should be no attacks occurring at that point in your network. And of course tools like these are of no use if a human being isn't monitoring them and on the lookout for suspicious behavior. It's a tough cyberworld out there; one where distance doesn't matter and law enforcement is difficult. Be vigilant and be careful.
Lee Le Clair is the CTO at Ephibian. His Tech Talk column appears the third week of each month in Inside Tucson Business