如何在数字时代预防⺴⽹网络威胁 
 耿强
 Palo Alto Networks⼤大中华区技术总监 Challenges Facing – the Evolution of Attack In the news… Real Malware Threat What this looks like in the real world, specifically, Los Angeles Appear as a SaaS in Cloud 
 More than 40 Ransomware Major attacking vectors Spear Phishing Watering Hole Phishing Mail & Targeted Attack Spear Phishing Email Target Attacker Backdoor Access Ransomware Exploit Document
 (MSOffice, PDF,js) Encrypt Data Watering Hole Attack Compromise specific types of website http://... Best Practices to prevent Ransomware 1. 2. 3. 4. 5. 6. 7. 8. 9. Update latest Security patch or update for OS and Application. Prevent / control using high risk applications Full Visibility for Network and Application, including HTTPS traffic Local file inspection and analyze (block malware download and delivery and encryption key) Advance Email threat control (Spam, Phishing mail quarantine) APT Sandboxing Protection with URL update on 0-day Threats Advanced EndPoint Protection on UNKNOWN Threats Regular Data Backup, even Offline data copy Employee Security Awareness Defense Path 1. Delivery 2. Malware Download 3. Infection and C2 Callback Web proxy SMTP relay Storage Mail Server App Server Endpoint ! ! ! ! ! Wildfire Signature Signature: af12e45b49cd23... Malware URL: yyyreryuhh.ru C2 Server: 48.67.234.25:443 68.57.149.56:80 d4.mydns.cc b1.mydns.cc ... Complete Office 365 Security APERTURE SANCTIONED GLOBALPROTECT WILDFIRE NEXT GEN FIREWALL TOLERATED CONSUMER UNSANCTIONED 6 12 ADVERTISING Comprehensive SaaS Reporting 13 Gathering the Intelligence Intelligence with context 900M session WildFireTM Threat
 Intelligence Cloud 800M samples URL intelligence 180B artifacts Dynamic DNS 50+ third
 party feeds WildFire intelligence correlated Policy detects unknown
 threats on Gateway and Endpoint 32,000 devices worldwide 3.5M samples per day 30k unique malware per day Over 9000 Paying Customers for WildFire (That’s over double our nearest competitor) Prevention Platform Confirmed New threat (5min) Lots of file Sources Lots of Customers Potential Threat Potential Threat Known Exploit Techniques Expected Threats Expected Applications Expected Users Exploit Prevention Modules Founding Members: Purpose: The Cyber Threat Alliance is a group of cyber security practitioners that have chosen to share threat information with each other for the purpose of improving defenses against advanced cyber adversaries across member organizations and their customers. Additional members: Barracuda Networks Inc., ReversingLabs, Telefónica, Zscaler. Expansive partner ecosystem Virtualization Networking Mobility Security analytics 17 Enterprise security Keung Kang SE Manager – Greater China 
 kkang@paloaltonetworks.com 18

pdf文档 2016-《如何在数字时代预防网络威胁》

安全研究库 > 网络论坛材料 > 2016乌云峰会-分论坛 > 文档预览
18 页 0 下载 35 浏览 0 评论 0 收藏 3.0分
温馨提示:如果当前文档出现乱码或未能正常浏览,请先下载原文档进行浏览。
2016-《如何在数字时代预防网络威胁》 第 1 页 2016-《如何在数字时代预防网络威胁》 第 2 页 2016-《如何在数字时代预防网络威胁》 第 3 页 2016-《如何在数字时代预防网络威胁》 第 4 页 2016-《如何在数字时代预防网络威胁》 第 5 页
下载文档到电脑,方便使用
还有 13 页可预览,继续阅读
本文档由 张玉竹2022-04-08 09:12:42上传分享
给文档打分
您好可以输入 255 个字符
安信天行文库的中文名是什么?( 答案:安信天行 )
评论列表
  • 暂时还没有评论,期待您的金玉良言