Advertisment

Tips to build offensive security strategy

author-image
CIOL Bureau
Updated On
New Update

BANGALORE, INDIA: A new MacAfee report details the following methods for building a more offensive security strategy:

Advertisment

·Use hacker techniques: Data loss is accelerating at an alarming rate, as there were 222 million records lost in 2009 in the United States alone. Organizations should use hacker techniques, such as fuzzing and penetration testing, to find bugs within their own products and address the issues, shutting the door on the bad guys.

Also read: McAfee says malware threat at a new high

·Provide data to help prosecute cybercriminals: A major component for combating spam lies in the hands of ICANN (the Internet Corporation for Assigned Names and Numbers), as it accredits the registrants that sell the domains which cybercriminals use to host malicious sites. Working with the security industry, ICANN should take a stronger stance against cybercrime.

Advertisment

·Share information: Computer users, security professionals and administrators should share intelligence information with their trusted security vendor, and in turn security vendors should cooperate in live metadata sharing. Legislators should take these issues into account when drafting laws within their respective countries.

·Implement “shuns” and “stuns”: Three successful “tried and true” takedowns to date–MoColo, Atrivo and Mega-D–fall into one of two categories: “shuns,” in which the Internet community ostracized the network, and “stuns,” which focused on incapacitating botnets. An offensive security practice should involve the entire security industry while incorporating methods that have proven successful. Shuns and stuns have beaten the odds in the past and industry experts as well as law enforcement should embrace these methods as a common security practice.

·Use tactics that increase risk for cybercriminals: Cybercrime has become an increasingly for-profit endeavor. Like any enterprise business model, the psychology of organized cybercrime follows the three major factors: risk, effort and reward. By using a number of potential tactics affecting each of these factors, the ratio can flip, so that cybercriminals faced actual risk for substantially reduced reward, diminishing cybercrime overall. Some of those tactics include publicly disclosing the names of cybercriminals, increasing the fines against cybercriminals, increasing the shutdowns of affected domains, more effective spam filtering, closing “dropped” email accounts and freezing payment accounts that are suspected of fraud.

·Educate: Security experts should work with governments to provide models to tie together cybercrime-reporting with cybereducation, so users can start to link uninformed behavior to their risk of becoming victims. This includes educating those fighting cybercrime “on the streets” to have the latest in malware techniques, bringing tools to the mass population to help identify risky behavior, pointing users to the right contacts to report crimes, and helping to build education and awareness at the kindergarten level through higher education.

tech-news