dfm covers
 
 

Dispruptive Data Security Key to Outwitting Hackers

Print PDF
Tuesday, 21 July 2015 18:16 Written by James Henry

Dispruptive Data Security Key to Outwitting Hackers
It is now widely accepted that the enterprise will be subjected to and may even succumb to cyber attack and yet we continue to rely upon a defensive security strategy. A far more effective way to combat the threat is to focus on disrupting the attack while keeping data safe. This article contains some practical do’s and don’ts to help the enteprise transition to a data-centric strategy.



Enterprises need to move towards a data-centric disruptive security strategy given the inevitability of network compromise. The continued emphasis on network security solutions is out-of-step with the changing nature of threats, with attackers increasingly utilising automatic probing, botnets and malware to detect and exploit network weaknesses. By assuming a position of compromise the organisation can focus security resource on strategies such as disruptive data that uses dummy data repositories or bait records to automatically trigger alerts. This subterfuge buys the organisation the time needed to both respond and protect critical data.


To date, many organisations have sought to defend the network using a combination of defence-in-depth and point solution systems to sweep the network and feed a SIEM system. However, as data generation increases, collating and applying intelligence to interpret the relevance of these reports is becoming more difficult. In addition, the attacker is now able to draw on a far wider pool of resources and strategies to infiltrate the network, making the probability of a successful breach far higher.


Once inside the system, there is often little to prevent the attacker from acquiring prized data assets as most security spend is dedicated to prevention rather than protection. In contrast, an effective data protection strategy employs data encryption, multi-factor authentication, and data deidentification procedures as well as data subterfuge practices, to secure databases and access mechanisms. Regularly tested and audited, this level of data protection ensures that the lifeblood of the business – data – is kept safe from unauthorised access.


DO

·      Anticipate further growth in sensitive corporate data and accept the prospect of an attack. Evaluate and record risk in a breach risk register

·    Carry out an enterprise-wide assessment of data assets and record the information lifecycle process to determine how data will be handled from creation to destruction

·    Make provisions for securing valuable data assets. Is sensitive data encrypted in transit as well as at rest? Is access restricted according to role? Who has responsibility for assigning or rescinding access? Consider key management and ensure keys are not stored in the same location.

·    Obfuscate data through the use of mechanisms such as dummy data, bait records, and network segregation


DON’T

·    Rely on network systems to give real time intelligence. As the amount of data the organisation processes over time grows, this will become cost prohibitive and burdensome. Information from point systems should be seen as supplementary information useful for monitoring traffic or investigations but should not be relied upon to stop an attack

·     Confuse compliance with data security. Regulatory requirements should be seen as a generic bare minimum requirement and tailor the data protection policy to meet business requirements. Prevent security mechanisms from obstructing workflow by making them relevant and workable

·     Make the assumption technology is more effective than people and process. There is no substitute for a meaningful enterprise-wide policy that is consistently applied by all personnel. Attacks will infiltrate the business. Accepting that as a fact may sound daunting but it can also be empowering, provided you know where to focus your efforts. Targeted attacks use advanced evasive actions, as the attacker wishes to operate discreetly to extract data, often amongst the noise of daily network business activities. Disrupting that activity by confusing the attacker, laying false trails and using segregation to protect the data ‘crown jewels’ has to be the way forward.


     James Henry is Consulting Practice Manager, Auriga


        



 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Angus Marshall

Angus Marshall is an independent digital forensic practitioner, author and researcher

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 42 on sale from February 2020:


Forensic Syntactical & Linguistic Investigation

Mark Iwazko presents a case study regarding a Forensic Syntactical & Linguistic investigation: Instructed by the Moscow General Council of one of the actual big four accountants. Read More »

Forensic Readiness: A Proactive Approach to Support Forensic Digital Analysis

An increasing number of criminal actions are inflicting financial and brand damage to organizations around the globe. An impressive number of such cases do not reach the courts, mainly because of the organization’s inefficiency to produce robust digital evidences that are acceptable in the courts of law. Read More »

Subscribe today


Using Error-Patterns for Attribution: An Applied Linguistics Technique

Corpus Linguistics within Second Language Acquisition has developed models of error patterns made by defined groups of second language learners. This knowledge base can be leveraged by a knowledgeable analyst to attribute content to a subset of authors. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue