dfm covers

Dispruptive Data Security Key to Outwitting Hackers

Print PDF
Tuesday, 21 July 2015 18:16 Written by James Henry

Dispruptive Data Security Key to Outwitting Hackers
It is now widely accepted that the enterprise will be subjected to and may even succumb to cyber attack and yet we continue to rely upon a defensive security strategy. A far more effective way to combat the threat is to focus on disrupting the attack while keeping data safe. This article contains some practical do’s and don’ts to help the enteprise transition to a data-centric strategy.

Enterprises need to move towards a data-centric disruptive security strategy given the inevitability of network compromise. The continued emphasis on network security solutions is out-of-step with the changing nature of threats, with attackers increasingly utilising automatic probing, botnets and malware to detect and exploit network weaknesses. By assuming a position of compromise the organisation can focus security resource on strategies such as disruptive data that uses dummy data repositories or bait records to automatically trigger alerts. This subterfuge buys the organisation the time needed to both respond and protect critical data.

To date, many organisations have sought to defend the network using a combination of defence-in-depth and point solution systems to sweep the network and feed a SIEM system. However, as data generation increases, collating and applying intelligence to interpret the relevance of these reports is becoming more difficult. In addition, the attacker is now able to draw on a far wider pool of resources and strategies to infiltrate the network, making the probability of a successful breach far higher.

Once inside the system, there is often little to prevent the attacker from acquiring prized data assets as most security spend is dedicated to prevention rather than protection. In contrast, an effective data protection strategy employs data encryption, multi-factor authentication, and data deidentification procedures as well as data subterfuge practices, to secure databases and access mechanisms. Regularly tested and audited, this level of data protection ensures that the lifeblood of the business – data – is kept safe from unauthorised access.


·      Anticipate further growth in sensitive corporate data and accept the prospect of an attack. Evaluate and record risk in a breach risk register

·    Carry out an enterprise-wide assessment of data assets and record the information lifecycle process to determine how data will be handled from creation to destruction

·    Make provisions for securing valuable data assets. Is sensitive data encrypted in transit as well as at rest? Is access restricted according to role? Who has responsibility for assigning or rescinding access? Consider key management and ensure keys are not stored in the same location.

·    Obfuscate data through the use of mechanisms such as dummy data, bait records, and network segregation


·    Rely on network systems to give real time intelligence. As the amount of data the organisation processes over time grows, this will become cost prohibitive and burdensome. Information from point systems should be seen as supplementary information useful for monitoring traffic or investigations but should not be relied upon to stop an attack

·     Confuse compliance with data security. Regulatory requirements should be seen as a generic bare minimum requirement and tailor the data protection policy to meet business requirements. Prevent security mechanisms from obstructing workflow by making them relevant and workable

·     Make the assumption technology is more effective than people and process. There is no substitute for a meaningful enterprise-wide policy that is consistently applied by all personnel. Attacks will infiltrate the business. Accepting that as a fact may sound daunting but it can also be empowering, provided you know where to focus your efforts. Targeted attacks use advanced evasive actions, as the attacker wishes to operate discreetly to extract data, often amongst the noise of daily network business activities. Disrupting that activity by confusing the attacker, laying false trails and using segregation to protect the data ‘crown jewels’ has to be the way forward.

     James Henry is Consulting Practice Manager, Auriga


Please make cache directory writable.

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Noemi Kuncik

Noemi Kuncik is an IT Forensics Specialist at Grant Thornton


Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 39 on sale from February 2019:

Making Sense of Digital Forensic International Standards

To many the complexity of Standards, their numbering and obscure contents fail to make practical sense and confuse the entry points for effective use. A roadmap is provided in this paper for Standard information access and optimal use. Read More »

Evidentiary Challenges: Social media, the Dark Web, and Admissibility

This article takes a look at two categories of remote evidence: social media, and the dark web. We will also examine two interesting cases: The Target store credit card breach; and the civil case of Fero v Excellus Health Plan, Inc. Read More »

Subscribe today

Vehicle Data Forensics on Unsupported Systems

The article will help readers understand how to approach a vehicle from a digital forensics’ perspective, it will cover a range of infotainment units from popular manufacturers, data extraction methods and examples of data types found which may be considered intelligence and or used as digital evidence. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue