dfm covers

Dispruptive Data Security Key to Outwitting Hackers

Print PDF
Tuesday, 21 July 2015 18:16 Written by James Henry

Dispruptive Data Security Key to Outwitting Hackers
It is now widely accepted that the enterprise will be subjected to and may even succumb to cyber attack and yet we continue to rely upon a defensive security strategy. A far more effective way to combat the threat is to focus on disrupting the attack while keeping data safe. This article contains some practical do’s and don’ts to help the enteprise transition to a data-centric strategy.

Enterprises need to move towards a data-centric disruptive security strategy given the inevitability of network compromise. The continued emphasis on network security solutions is out-of-step with the changing nature of threats, with attackers increasingly utilising automatic probing, botnets and malware to detect and exploit network weaknesses. By assuming a position of compromise the organisation can focus security resource on strategies such as disruptive data that uses dummy data repositories or bait records to automatically trigger alerts. This subterfuge buys the organisation the time needed to both respond and protect critical data.

To date, many organisations have sought to defend the network using a combination of defence-in-depth and point solution systems to sweep the network and feed a SIEM system. However, as data generation increases, collating and applying intelligence to interpret the relevance of these reports is becoming more difficult. In addition, the attacker is now able to draw on a far wider pool of resources and strategies to infiltrate the network, making the probability of a successful breach far higher.

Once inside the system, there is often little to prevent the attacker from acquiring prized data assets as most security spend is dedicated to prevention rather than protection. In contrast, an effective data protection strategy employs data encryption, multi-factor authentication, and data deidentification procedures as well as data subterfuge practices, to secure databases and access mechanisms. Regularly tested and audited, this level of data protection ensures that the lifeblood of the business – data – is kept safe from unauthorised access.


·      Anticipate further growth in sensitive corporate data and accept the prospect of an attack. Evaluate and record risk in a breach risk register

·    Carry out an enterprise-wide assessment of data assets and record the information lifecycle process to determine how data will be handled from creation to destruction

·    Make provisions for securing valuable data assets. Is sensitive data encrypted in transit as well as at rest? Is access restricted according to role? Who has responsibility for assigning or rescinding access? Consider key management and ensure keys are not stored in the same location.

·    Obfuscate data through the use of mechanisms such as dummy data, bait records, and network segregation


·    Rely on network systems to give real time intelligence. As the amount of data the organisation processes over time grows, this will become cost prohibitive and burdensome. Information from point systems should be seen as supplementary information useful for monitoring traffic or investigations but should not be relied upon to stop an attack

·     Confuse compliance with data security. Regulatory requirements should be seen as a generic bare minimum requirement and tailor the data protection policy to meet business requirements. Prevent security mechanisms from obstructing workflow by making them relevant and workable

·     Make the assumption technology is more effective than people and process. There is no substitute for a meaningful enterprise-wide policy that is consistently applied by all personnel. Attacks will infiltrate the business. Accepting that as a fact may sound daunting but it can also be empowering, provided you know where to focus your efforts. Targeted attacks use advanced evasive actions, as the attacker wishes to operate discreetly to extract data, often amongst the noise of daily network business activities. Disrupting that activity by confusing the attacker, laying false trails and using segregation to protect the data ‘crown jewels’ has to be the way forward.

     James Henry is Consulting Practice Manager, Auriga


Please make cache directory writable.

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Noemi Kuncik

Noemi Kuncik is an IT Forensics Specialist at Grant Thornton


Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 38 on sale from February 2019:

Crowd Sourcing Digital Evidence The Risk v The Reward

All digital devices used today can be considered as a potential source for digital evidence. Andrew Ryan investigates the current state in the art of crowd sourced digital evidence. Read More »

Recovery of Forensic Artifacts from Deleted Jump-List in Windows 10

Jump-Lists are widely discussed in forensics community since the release of Windows 7 and are having more capabilities to reveal forensics artifacts in Windows 10. Read More »

Subscribe today

Operacion Bitcoin

The article is an actual case study of an Interpol investigation carried out in association with CertUY that has been ongoing for some months. It is written by the first hacker sent to prison in Uruguay who is currently out on bail pending sentencing. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue