HOW TO PROTECT AGAINST DATA BREACHES
Data
breaches effect nearly 1 in 5 internet users and expose close to 1 billion
emails in one year (Griffiths, 2023). In 2022, data breaches cost businesses an
average of $4.35 million. In the first half of 2022, approximately 236.1
million ransomware attacks occurred globally. Intrusion detection and
prevention systems (IDPS) are software that possesses the capabilities of an
intrusion detection system that can also attempt to stop possible incidents (RSI
Security, 2021). There are four different types of IDPS: network-based,
wireless, network behavior analysis (NBA), and host-based (RSI Security, 2021).
Network
based intrusion detection (NIDS) or prevention (NIPS) systems can be used to
detect and protect against these malicious network traffic and cyber-attacks (Misenar
et al., 2017). NIDS is a passive device that monitors network traffic and does
not interfere with it. NIDS usually requires promiscuous access to analyze
network traffic. NIPS on the other hand react to network traffic and patterns.
NIPS will alter the flow of traffic if anomalies are detected. When configured
properly, NIPS will often “shoot down” malicious traffic through a variety of
different methods (Misenar et al., 2017).
IPDS
leverage the power of artificial intelligence (AI) and pattern recognition to
catch cyber criminals. It does this by monitoring for irregular events and
referencing the known methods used to breach security parameters. IPDS will
monitor activity and information logs for observed events, sent notification
emails to security administrators regarding the observed threats, and generate
reports on the observed events (RSI Security, 2021).
An
IDPS utilizes three different types of detection methodologies: signature based
detection, anomaly based detection, and stateful protocol analysis (RSI
Security, 2021). Signature based
detection relies on consistent and known cyber threat patterns. This option is
considered elementary as it depends on a static list for comparison and can
only evaluate one activity at a time. Anomaly based detection learns and recognizes
normal activity patterns, then detects abnormalities that may be an indicator
of a cyber threat. This allows the IDPS to better anticipate internal or
unknown cyber threats (RSI Security, 2021). Stateful protocol analysis, in every state,
recognizes benign protocol activity and compares it against observed event.
This method uses preset profiles to provide the IDPS with a reference point for
benign protocol activity, usually supplied by the vendor (RSI Security, 2021).
Although
an IDPS is an extremely powerful defense tool for an organization, special
considerations should be taken prior to implementation:
·
The
technical specifications and requirements of the IDPS
·
The
organizations existing technical specifications and software, security,
policies, and procedures
·
Both
the expected and most dangerous threats to monitor against
·
Any
systems, applications, or other resources of higher value should receive higher
scrutiny
·
External
and industry compliance requirements
·
The
existing logging, detection, and prevention capabilities in the organization
·
Performance
requirements
·
Current
scalability, resource constraints, and management ease
References
Griffiths, C. (2023, April 28). The latest
Cyber Crime Statistics (updated April 2023): Aag it support. AAG IT Services.
Retrieved May 2, 2023, from
https://aag-it.com/the-latest-cyber-crime-statistics/#:~:text=Headline%20Cyber%20Crime%20Statistics,the%20first%20half%20of%202022.
How to implement an intrusion prevention
system. RSI Security. (2021, September 21). Retrieved May 2, 2023, from
https://blog.rsisecurity.com/how-to-implement-an-intrusion-prevention-system/
Magnusson, A. (2023, January 5). What is data
exfiltration? (and the best way to prevent it). StrongDM. Retrieved May 2,
2023, from https://www.strongdm.com/blog/data-exfiltration
Misenar, S., Feldman, J., & Conrad, E.
(2017). Chapter 7 - Domain 7: Security operations. In Eleventh Hour CISSP®:
Study guide. essay, Syngress.
Strickland, D. (2022, December 29). Top 7 data
exfiltration risks [data theft prevention tips]. CurrentWare. Retrieved May 2,
2023, from https://www.currentware.com/blog/top-data-exfiltration-risks/
Comments
Post a Comment