{"id":63,"date":"2017-01-19T23:41:02","date_gmt":"2017-01-19T23:41:02","guid":{"rendered":"https:\/\/hjinterim.wordpress.com\/?p=63"},"modified":"2017-01-19T23:41:02","modified_gmt":"2017-01-19T23:41:02","slug":"innovations-awareness-and-anticipating-on-security-threats","status":"publish","type":"post","link":"https:\/\/hjinterim.tech\/index.php\/2017\/01\/19\/innovations-awareness-and-anticipating-on-security-threats\/","title":{"rendered":"Innovations, Awareness and anticipating on Security threat\u2019s"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone  wp-image-1755\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/01\/cyber-security-and-impact-on-national-security-3-1-638.jpeg\" alt=\"cyber-security-and-impact-on-national-security-3-1-638\" width=\"819\" height=\"615\" \/><\/p>\n<p>Recently I was writing my former blogs \u201c<a href=\"https:\/\/www.linkedin.com\/pulse\/finance-hacker-prof-dr-ir-henk-jan-jansen?trk=prof-post\" target=\"_blank\" rel=\"noopener\">Finance a Hacker<\/a>\u201d and \u201c<a href=\"https:\/\/www.linkedin.com\/pulse\/100-awareness-cyber-data-security-within-many-jan-jansen?trk=prof-post\" target=\"_blank\" rel=\"noopener\">No 100% awareness of Cyber and Data Security within many companies worldwide<\/a>\u201d<\/p>\n<p>I want to go a little deeper in to these topics and hope to make people aware of the known risks. There are still companies, security architects who think that when you place a firewall you are more then secure. Nevertheless this is a true statement, instead of being more secure you gained even more vulnerability!<\/p>\n<p><strong>Now I hear you already thinking why\u2026<\/strong><\/p>\n<p>1.\u00a0\u00a0\u00a0\u00a0 <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20160817-asa-snmp\" target=\"_blank\" rel=\"nofollow noopener\">Firewalls<\/a> are <span class=\"underline\">NOT<\/span> secure instead they became weaker and can be accessed from outside your environment.<\/p>\n<p>2.\u00a0\u00a0\u00a0\u00a0 Look for example how <a href=\"https:\/\/www.youtube.com\/watch?v=viGNDA6Be3s&amp;feature=youtu.be\" target=\"_blank\" rel=\"noopener\">Shell&#8217;s Approach To ICS Security<\/a> is being done and understand what they are telling about Firewalls.<\/p>\n<p>People should understand that there are some basics rules to follow, let me call out some of them for you:<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Raise Awareness Company wide<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Know your enemy!<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Innovation leading to more secure environment(s)<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <a href=\"http:\/\/www.unisys.com\/offerings\/security-solutions\/unisys-stealth\" target=\"_blank\" rel=\"nofollow noopener\">Stealth Technology<\/a> from Unisys, basically it is what you cannot see you cannot hack<\/p>\n<ul>\n<li>Standardize<\/li>\n<li>Simplify<\/li>\n<li>Focus on the basics right that is your foundation where upon you or your clients can build up on, if you not have these things in place than it dosed matter what technology your on because it would not work. Concentrate on the basics than look to new technologies. Apply these basics true out the total lifecycle.<\/li>\n<\/ul>\n<p>Imaging that you one day discover that your data is being used by a third party and you did not even have a clue how it came there? Well now you know. You also have to be aware what kind of hardware and software you have within your infrastructure, however if you are not aware of this you could also contact us at <a href=\"http:\/\/www.cybersecurity.industries\/\" target=\"_blank\" rel=\"nofollow noopener\">Passport Cyber Security<\/a> We can do a security check if your equipment is vulnerable, or that your cloud provider is secure or insecure? We can also check your data center and create a full report about all vulnerabilities.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-1756\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/01\/encryption-938x465-1.jpg\" alt=\"Encryption-938x465\" width=\"938\" height=\"465\" \/><\/p>\n<p>Firewalls and their real security, Tyler Williams Shell Global, speaking about this during his presentation <a href=\"https:\/\/www.youtube.com\/watch?v=T5jfjzoHl5s\" target=\"_blank\" rel=\"noopener\">Industrial Cyber Security Risks<\/a><\/p>\n<p>A fraise from <a href=\"http:\/\/www.linkedin.com\/in\/rtylerwilliams\" target=\"_blank\" rel=\"noopener\">Tyler Williams<\/a> about \u201cShiny objects\u201d are pretty they sound great, blinking lights but does not mean that something good is happen or worse? You only thinking that the device is busy\u00a0and\u00a0doing his job.<\/p>\n<p>Your vision about security could be clear to you as an architect at the time you designed it and they should be clear. Know the current security standards and be critical to your vision when you look back after the implementation. Looking back, make sure to add value to the business its not just another typical exercise for an IT implementation.<\/p>\n<p>It\u2019s very good to have a document and concept concerning your security environment, but if you stick this in a drawer and never use this than it is useless for your security.<\/p>\n<h2><strong>Awareness<\/strong><\/h2>\n<p>I was reading a blog from <a href=\"http:\/\/cz.linkedin.com\/in\/valery-marchuk-100552109\/en%3A1471883828153%2Ctas%3AValery%20Marchuk\" target=\"_blank\" rel=\"noopener\">Valery Marchuk<\/a> CEO at Cybersecurity Help s.r.o.<\/p>\n<p>This is also related to my former blogs \u201c<a href=\"https:\/\/www.linkedin.com\/pulse\/finance-hacker-prof-dr-ir-henk-jan-jansen?trk=prof-post\" target=\"_blank\" rel=\"noopener\">Finance a Hacker<\/a>\u201d and \u201c<a href=\"https:\/\/www.linkedin.com\/pulse\/100-awareness-cyber-data-security-within-many-jan-jansen?trk=prof-post\" target=\"_blank\" rel=\"noopener\">No 100% awareness of Cyber and Data Security within many companies worldwide<\/a>\u201d<\/p>\n<p><strong>Secret services are after vulnerabilities in hardware<\/strong><\/p>\n<p>The recent\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/hack\" target=\"_blank\" rel=\"nofollow noopener\">hack<\/a>\u00a0of the\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/equation-group\" target=\"_blank\" rel=\"nofollow noopener\">Equation Group<\/a>\u00a0(closely connected with NSA) made publicly available information about exploits against\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/networking\" target=\"_blank\" rel=\"nofollow noopener\">networking<\/a>\u00a0equipment, manufactured by the biggest US\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/vendors\" target=\"_blank\" rel=\"nofollow noopener\">vendors<\/a>: Cisco,\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/juniper\" target=\"_blank\" rel=\"nofollow noopener\">Juniper<\/a> and Fortinet.<\/p>\n<p class=\"left\">\n<p><img decoding=\"async\" class=\"size-full wp-image-1757 alignleft\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/01\/vuln-just-ahead_yp95oc.jpg\" alt=\"vuln-just-ahead_yp95oc\" width=\"471\" height=\"314\" \/><\/p>\n<p>Only today we have issued several security bulletin describing two\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/zero-day\" target=\"_blank\" rel=\"nofollow noopener\">zero day<\/a>\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/vulnerabilities\" target=\"_blank\" rel=\"nofollow noopener\">vulnerabilities<\/a>\u00a0in\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/cisco\" target=\"_blank\" rel=\"nofollow noopener\">CISCO<\/a><a href=\"https:\/\/www.peerlyst.com\/tags\/asa\" target=\"_blank\" rel=\"nofollow noopener\">ASA<\/a>\u00a0Appliances (<a href=\"https:\/\/www.cybersecurity-help.cz\/vdb\/SB2016081803\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2016-6366<\/a>,\u00a0<a href=\"https:\/\/www.cybersecurity-help.cz\/vdb\/SB2016081804\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2016-6367<\/a>),\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/remote-code-execution\" target=\"_blank\" rel=\"nofollow noopener\">remote code execution<\/a>\u00a0in FortiOS (<a href=\"https:\/\/www.cybersecurity-help.cz\/vdb\/SB2016081801\" target=\"_blank\" rel=\"nofollow noopener\">SB2016081801<\/a>) and a very inconvenient issue with default public ssh-key in\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/vmware\" target=\"_blank\" rel=\"nofollow noopener\">VMware<\/a>\u00a0Photon OS (<a href=\"https:\/\/www.cybersecurity-help.cz\/vdb\/SB2016081802\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2016-5332<\/a>).<\/p>\n<p>Cisco\u00a0<a href=\"https:\/\/blogs.cisco.com\/security\/shadow-brokers\" target=\"_blank\" rel=\"nofollow noopener\">confirmed<\/a>\u00a0EXTRABACON and EPICBANANA exploits, however there is no information from other vendors.\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/fortinet\" target=\"_blank\" rel=\"nofollow noopener\">Fortinet<\/a>\u00a0did not make any official statement, just released an advisory describing remote code execution\u00a0vulnerability\u00a0in FortiOS. It is unknown, if this issue is connected with the leak.<\/p>\n<p>Earlier this year Juniper had to deal with\u00a0<a href=\"http:\/\/forums.juniper.net\/t5\/Security-Incident-Response\/Advancing-the-Security-of-Juniper-Products\/ba-p\/286383\" target=\"_blank\" rel=\"nofollow noopener\">backdoor<\/a>\u00a0in\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/screenos\" target=\"_blank\" rel=\"nofollow noopener\">ScreenOS<\/a>\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/source-code\" target=\"_blank\" rel=\"nofollow noopener\">source code<\/a>, which was present in security solutions at least since 2009.<\/p>\n<p>Clearly, such interest in vulnerabilities within networking equipment is due to lack of implemented <a href=\"https:\/\/www.peerlyst.com\/tags\/protection\" target=\"_blank\" rel=\"nofollow noopener\">protection<\/a>\u00a0mechanisms. While workstations and servers are updated frequently and equipped with <a href=\"https:\/\/www.peerlyst.com\/tags\/firewalls\" target=\"_blank\" rel=\"nofollow noopener\">firewalls<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/antivirus\" target=\"_blank\" rel=\"nofollow noopener\">antivirus<\/a>\u00a0software,\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/devices\" target=\"_blank\" rel=\"nofollow noopener\">devices<\/a>\u00a0intended to provide basic perimeter protection fail.\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/firmware\" target=\"_blank\" rel=\"nofollow noopener\">Firmware<\/a> update process for majority of networking equipment is complicated and often requires additional efforts from IT stuff or can cause outage.<\/p>\n<p>The situation with vulnerabilities in\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/hardware\" target=\"_blank\" rel=\"nofollow noopener\">hardware<\/a>\u00a0is very disturbing. Devices, which are supposed to provide at least the most basic level of protection for your\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/network\" target=\"_blank\" rel=\"nofollow noopener\">network<\/a>\u00a0assets can be as easily compromised, as any other host. It is no longer safe to rely just on one device from one vendor. And even if you have a dozen firewalls, it does not mean they do not have faulty implementation of some networking protocol.<\/p>\n<p>Anyways, we can suggest at least limiting access to\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/services\" target=\"_blank\" rel=\"nofollow noopener\">services<\/a>, which are facing the\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/undefined\" target=\"_blank\" rel=\"nofollow noopener\">Internet<\/a>\u00a0directly. You can use our\u00a0<a href=\"https:\/\/www.cybersecurity-help.cz\/tools\/\" target=\"_blank\" rel=\"nofollow noopener\">free online vulnerability scanner<\/a>\u00a0to check publicly open\u00a0<a href=\"https:\/\/www.peerlyst.com\/tags\/ports\" target=\"_blank\" rel=\"nofollow noopener\">ports<\/a>\u00a0and presence of vulnerable software on your systems.<\/p>\n<p>Source:\u00a0<a href=\"https:\/\/www.peerlyst.com\/posts\/secret-services-are-after-vulnerabilities-in-hardware-valery-marchuk\" target=\"_blank\" rel=\"nofollow noopener\">Cybersecurity Help<\/a><\/p>\n<p><strong>Another severe example of a threat:<\/strong><\/p>\n<p>Source: <a href=\"http:\/\/www.arabianindustry.com\/oil-gas\/news\/2016\/aug\/14\/iran-probing-if-oil-accidents-were-cyberattack-5457517\/\" target=\"_blank\" rel=\"nofollow noopener\">www.arabianindustry.com<\/a><\/p>\n<p>Published: 14 August 2016 &#8211; 3:12 a.m. By: Indrajit Sen<\/p>\n<h2><strong>Iran probing if oil accidents were cyber attack<\/strong><\/h2>\n<p>After weeks of speculation on the cause of an unprecedented string of fires and explosions in major Iranian oil and gas facilities, Iran\u2019s Supreme National Cyberspace Council has said that it is looking into cyber-attacks as a possible cause.<\/p>\n<p>\u201cSpecial teams will be sent to the afflicted sites to study the possibility of cyber systems having a role in the recent fires,\u201d Abolhasan Firoozabadi, secretary of the council according to local media said last week, the\u00a0<em>Time<\/em>\u00a0magazine reported.<\/p>\n<p>The first of the fires, which started on July 6, in the Bouali petrochemical plant on the Gulf coast, took three days to put out and threatened to send toxic clouds of smoke into the nearby city of Mahshahr, with a population of 300,000.<\/p>\n<p>Damages from the accidents are estimated to be tens of millions of dollars and insurers say it could be the biggest compensation claim in Iran\u2019s history.<\/p>\n<p>Less than 48 hours after the Bouali fire was put out a worker was killed in the Marun Oil and Gas Production Company when a liquefied gas pipeline exploded. This was followed by a fire in the Bisotoon petrochemical plant in the western Iranian city of Kermanshah on July 29, which took two days to put out.<\/p>\n<p>The Iranian Petroleum Ministry, in charge of all of the affected sites denied the plants were sabotaged and the Iranian Oil Minister Bijan Namdar Zanganeh said the fires and explosions were due to technical faults and human error.<\/p>\n<p>However when an explosion in a gas pipeline near Gonaveh, which killed a worker, and another fire in the Imam Khomeini petrochemical plant, occurred within hours of each other on August 6, the ministry refused to comment until after investigations.<\/p>\n<p>If the cyberspace council does rule that cyber attacks were behind these fires and explosions it wouldn\u2019t be the first time that Iran\u2019s petroleum industry was the victim of such an attack.<\/p>\n<p>In April 2012 a virus forced the ministry to disconnect its main oil terminals and facilities from the Internet to protect them from damage. Officials later claimed that they had traced the service providers used by the attackers back to the US.<\/p>\n<p>In 2010 Iran\u2019s nuclear sites were the victims of the Stuxnet worm. Officials said the worm was designed and used by the US and Israel to hinder Iran\u2019s nuclear Programme.<\/p>\n<p>Iran has never quantified the damage done by Stuxnet but nuclear experts believe the damage was extensive.<\/p>\n<p>After the Stuxnet attack, Iran decided to create a nation-wide intranet to prevent further attacks on sensitive infrastructures but the \u2018National Internet\u2019, has yet to be launched.<\/p>\n<p>Have the awareness that security attacks can also happen to your company! It would be a clever move to contact us at <a href=\"http:\/\/www.cybersecurity.industries\/\" target=\"_blank\" rel=\"nofollow noopener\">Passport Cyber Security<\/a>. We can do a security check if your equipment is vulnerable, or if your cloud provider is secure or insecure? We can also check your data center and create a full report about all vulnerabilities.<\/p>\n<p>Read also my <a href=\"http:\/\/www.linkedin.com\/today\/author\/0_1h5ddYuAfsAY3IOCjs0blz?trk=prof-sm\" target=\"_blank\" rel=\"noopener\">former blogs<\/a> on LinkedIn. Will keep you posted on all related Data and Cyber Security topics.<\/p>\n<p>Have a wonderful secure day.<\/p>\n<p><a href=\"http:\/\/de.linkedin.com\/in\/henkjanjansen\" target=\"_blank\" rel=\"noopener\">Prof. Dr. Ir. Henk Jan Jansen<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently I was writing my former blogs \u201cFinance a Hacker\u201d and \u201cNo 100% awareness of Cyber and Data Security within many companies worldwide\u201d I want to go a little deeper in to these topics and hope to make people aware of the known risks. There are still companies, security architects who think that when you &#8230; <a title=\"Innovations, Awareness and anticipating on Security threat\u2019s\" class=\"read-more\" href=\"https:\/\/hjinterim.tech\/index.php\/2017\/01\/19\/innovations-awareness-and-anticipating-on-security-threats\/\">Read more<span class=\"screen-reader-text\">Innovations, Awareness and anticipating on Security threat\u2019s<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1757,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[20],"tags":[],"class_list":["post-63","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-gdpr"],"_links":{"self":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/63","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/comments?post=63"}],"version-history":[{"count":0,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/63\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/media?parent=63"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/categories?post=63"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/tags?post=63"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}