Professional Documents
Culture Documents
Agenda
Cc mi him ha v tn cng
Chin lc phng th
Tng kt
97% of websites at immediate risk of being hacked due to vulnerabilities! 69% of vulnerabilities are client side-attacks
- Web Application Security Consortium
secure applications.
Tnh trng cc mi e da
It is no secret that attackers are moving up the stack and targeting the application layer. Why dont our defenses follow suit?
-Verizon 2011 Data Breach Report
As in previous years, Verizon has found that most cyberattacks were avoidable if network managers followed best practices for information security. Verizon said that 96% of attacks were not highly difficult, and 97% of attacks were avoidable through simple or intermediate controls.
-Verizon 2012 Data Breach Report
Jun 2009
Feb 2010
Nov 2010
Nov 2010
Jul 2011
Aug 2011
Sep 2011
Oct 2011
Impact
Attack can be launched remotely, Denial of Services (DOS), Resource Exhaustion, tools and script publicly available
Global access
Application diversity
CLOUD The cloud
Remote access
HACKER
Is it that EASY ??
%27%20%6f%72%20%31%3d%31 %20%6f%72%20%27
Thiu tm nhn
(MT KH NNG HIU NG CNH)
Network DDoS
Application DDoS
Firewall (Front-end)
DMZ
UTM /NGFW
User Directory
DNS Servers
Proxy
Web Servers
Email Servers
Web/Email Access Management
CHIN LC PHNG TH
Application Application Cust Cust Online Online Tx Tx Srv Srv Self Help Portal Exchg Outlook
Hardened (Default Deny) Platform, Multi-stack Architected OS Purpose built HW for High Performance Stateful failover redundancy
Lack sophistication & visibility (LOSE REAL TIME CONTEXT) who, where, what?
Mismatched collection of nonintegrated defences (POOR ECONOMIC OF SCALE) complexity to manage, maintain and high cost
BROKER
ENFORCER
BROKER
ENFORCER
Application Security
Perimeter Defence
Security Lifecycle
Content Control
Risk Factor
(Enforcer)
TNG KT
Data Path
USER
Geo Location
Device Type
Security Posture
APP
Physical
Cloud
Hybrid
Whenever you find yourself on the side of the majority, it is time to pause and reflect. Mark Twain
Thank You