Preventive Protection for Large Companies

Transcription

Preventive Protection for Large Companies
Preventive Protection
for Large Companies
The information contained in this document represents the current
view of Panda Software, S.L. on the issues discussed herein as of
the date of publication. This document is for informational purposes
only. Panda Software, S.L. makes no warranties, express or implied,
in this document.
© Panda Software, S.L. 2004-2005.
Complying with all applicable copyright laws is the responsibility of
the user. Without limiting the rights under copyright, no part of this
document may be reproduced, stored in or introduced into a retrieval
system, or transmitted in any form or by any means (electronic,
mechanical, photocopying, recording or otherwise) or for any purpose,
without the express written permission of Panda Software , S.L.
Panda Software, S.L. may have patents, patent applications,
trademarks, copyrights or other intellectual property rights covering
subject matter in this document. Except as expressly provided in
any written license agreement from Panda Software, S.L. the
furnishing of this document does not give you any license to these
patents, trademarks, copyrights or other intellectual property.
T E C H N O L O G I E S
Compatible with
your current antivirus
The most intelligent technologies
to combat unknown viruses and intruders
www.pandasoftware.com
PREVENTIVE PROTECTION FOR LARGE COMPANIES
Contents
The Need For Preventive Security To Combat New Threats .................3
Target ....................................................................................................3
Executive Summary .................................................................................3
The Problem Posed By New Internet Threats........................................4
The Evolution Of Internet Threats ............................................................4
Impact On Companies .............................................................................7
What The Future Holds ..........................................................................10
The Need For A New Generation Of Security Solutions .............................12
Preventive Security ...............................................................................14
What Is Preventive Security? ..................................................................14
Phases Of Total Protection .....................................................................16
The Panda Approach..............................................................................17
TruPrevent Technologies ........................................................................18
A Practical Example ...............................................................................19
Now Is The Time To Take Actions...........................................................20
Conclusions ............................................................................................22
Appendix A. Panda Software Worldwide..............................................23
Appendix B. Glossary Of Terms.............................................................25
Appendix C. Abreviations And Acronyms..............................................27
Appendix D. References ........................................................................28
Index of tables and graphs
Figure 1. Evolution Of Computer Threats. .................................................................................................... 4
Table 1. Some Of The Biggest Threats To Emerge Over The Last Few Years. ..............................................6
Figure 2. The IT Security Threats That Caused The Most Problems For IT Managers In 2002. ..................7
Figure 3. IT Attacks In 2002. ......................................................................................................................... 8
Figure 4. IT Attacks In 2003. ......................................................................................................................... 9
Figure 5. Effects Of Virus Attacks In 2002. ................................................................................................... 10
Figure 6. Number Of Incidents Reported To Cert. ........................................................................................10
Figure 7. Damage Caused By Viruses In 2002.............................................................................................. 11
Figure 8. Attacks That Companies Will Have To Deal With...........................................................................11
Table 2. Conventional Security Systems. ....................................................................................................... 13
Figure 9. Proactive Security Philosophy. ...................................................................................................... 14
Figure 10. Phases Of Total Protection. ......................................................................................................... 16
Table 3. Methods Used By Internet Threats................................................................................................... 17
Figure 11. Expected Investment In IT Security. ............................................................................................. 20
Figure 12. Growth In Security Investment According To IDC. .....................................................................21
Figure 13. Number Of Security Products Deployed. .....................................................................................21
Contents
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
02
PREVENTIVE PROTECTION FOR LARGE COMPANIES
The Need For Preventive Security To
Combat New Threats
Target
This document is aimed at people in charge of any aspect of IT security in large companies:
IT security managers.
Systems administrators.
Security administrators.
CTO (Chief Technology Officer).
CIO (Chief Information Officer).
CSO (Chief Security Officer).
CPO (Chief Privacy Officer).
Executive Summary
IT attacks continue to cause losses in companies, despite high investment in security infrastructure,
such as firewalls or IDS (Intrusion Detection Systems). This leaves many IT (Information Technology)
security managers wondering why security holes keep opening in their companies, and what is the
best way to close them off, especially when it is getting more unmanageable to keep up with the
increasing number of security patches and upgrades released everyday.
The main weapons used by the majority of attacks to spread and penetrate corporate networks
are techniques like vulnerability exploits and social engineering, but also surprise and innovation.
A large number of attacks, including Code Red, SQLSlammer, MSBlaster, Mydoom, Netsky or Sasser,
have slipped past traditional security systems over the last few years, evidencing the need for new
preventive security tools that can detect and block new and unknown advanced threats before they
disrupt the business.
Panda Software understands that foresight and prevention are the most effective weapons for
combating the increasing number of attacks of all kinds. In this way, it is necessary a truly proactive
solution capable of minimizing the impact of new and unknown threats, while effectively complementing
traditional reactive security systems like firewalls, IDS and antivirus.
Based on this philosophy, Panda Software developed a solution that proactively protects IT assets
against massive or pinpoint attacks, that could compromise data integrity or cause financial damage
to companies. Panda’s preventive security solution keeps network resources safe until security
patches and updates are released, maintaining productivity and reducing the cost of potential
attacks on vulnerable systems.
The need for preventive security to combat new threats
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
03
PREVENTIVE PROTECTION FOR LARGE COMPANIES
The Problem Posed By New Internet
Threats
The Evolution Of Internet Threats
Since the first generation of file infectors, boot viruses, etc., whose only means of transmission
was floppy disks, through the first macro viruses that appeared in 1995, to Internet viruses in 1999,
computer threats have become more widespread, sophisticated and damaging1.
1 According to Yankee Group, 80% of companies were hit by a virus or worm during 2003.
Similarly, according to the latest ICSA survey (ICSA Virus Prevalence Survey) 28% of large
organizations with more than 500 PCs have been affected by some kind of computer virus attack,
resulting in significant damage and financial costs. The result of sector studies show that computer
virus attacks cost companies worldwide 13,000 million dollars in 2001. This figure grew to 30,000
million dollars in 2002, and in 2003, the IT consultancy M12G put this cost to companies and
home users at 72,737 million dollars.
With the appearance of mass-mailing worms and blended threats over the last few years, attacks
have emerged that go beyond those of conventional viruses. Worms are programs that are very
similar to viruses, as they can also self-replicate and cause damage to computers. However, unlike
viruses, worms do not need to infect other files to replicate. They are used by hackers to reach
their targets and spread to as many computers as possible.
Figure 1. Evolution of computer threats.
The problem posed by new Internet threats
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
04
PREVENTIVE PROTECTION FOR LARGE COMPANIES
The risk posed by these types of threats can be largely attributed to the increased sophistication
of heterogeneous operating systems and applications used by companies, which results in multiple
security holes along corporate networks. Hackers use many different strategies to ensure that their
creations are spread and run, such as exploiting vulnerabilities or using social engineering.
Vulnerability exploits have recently become one of the biggest threats to the integrity of computer
systems. A software vulnerability is an unknown flaw in the design of applications which, if discovered,
can be exploited by a hacker in order to access the computer and carry out malicious actions. The
biggest danger of vulnerabilities lies in how they are discovered. Most vulnerabilities are discovered
by users that are not related in any way to the manufacturers of the affected application. In most
cases, these users inform the manufacturer, who then develops and releases patches to fix the
flaw. However, in the meantime, hackers work against the clock to develop viruses or attacks that
exploit these vulnerabilities.
Unfortunately, hackers usually win the race against time and get to users’ computers before the
patches do. This is due to a number of factors. New vulnerabilities that need urgent patching are
discovered every day and as network administrators need to dedicate more time to this tedious
task, the patches are applied either too late or not at all. Furthermore, even if they are installed,
many patches need to be configured and this couldn’t be done properly. On the other hand, hackers
and virus writers are developing viruses that spread more rapidly. Finally, home users do not have
immediate access to security patches, thus they are more vulnerable and with potential knock-on
effects for companies whose workers connect to the corporate network from laptops or home PCs.
Another way in which hackers extend the impact of their attacks is what has been dubbed social
engineering. This technique involves getting the user to help spread the virus or its impact. An
example of social engineering is the mass-mailing of a message that pass itself off as a message
from financial entities like Barclays, Halifax, Nationwide, NatWest or Westpac in order to steal
confidential user information. This technique is known as phishing, and were done massively at the
end of 2003. Another example is the Gibe.C or W32/Swen worm, which reaches computers in an
e-mail message in HTML, which is a perfect imitation of a Microsoft web page in order to make
users believe that the attached file is a security patch. This worm tricks users into giving away
confidential information such as, e-mail addresses, passwords, etc.
The time it takes for exploits to be unleashed after vulnerabilities is dramatically reducing everyday.
On the other hand, the rate at which they spread is getting faster and hackers are using new
polymorphic and encryption techniques to prevent their worms from being detected. This is in
addition to the impact of new technologies like instant messaging, P2P (peer-to-peer), wireless
connections, etc., which are being widely used as new means of transmission.
Below are some examples of attacks that have caused the most damage worldwide over the last
few years. Each of these examples demonstrates a new development in the creativity of hackers
to find new attack strategies, but in all cases, the impact of these attacks is due to the fact that
they took users by surprise. New viruses usually cause the most damage in the first couple of weeks
after they have been released, as after a short while they can usually be detected and eliminated
by antivirus programs once signatures are available.
The problem posed by new Internet threats
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
05
PREVENTIVE PROTECTION FOR LARGE COMPANIES
DESCRIPTION
ATTACK
Melissa
This was the forerunner to mass-mailing worms. This macro virus reaches
computers hidden in a Word document attached to an e-mail message with a
subject that entices the recipient into opening it. It spreads extremely rapidly,
as it automatically sends itself out to the first fifty contacts in the Outlook
Address Book.
Nimda
This worm was extremely contagious. Its danger lies in its capacity to spread
through different means: web pages, by exploiting a vulnerability in IIS to insert
a script; e-mail, by exploiting a vulnerability in Outlook to run when the message
is viewed in the Preview Pane; or Windows computer networks, by sharing
network drives and spreading across them.
Love Letter
This worm appeared in 2000, and set a precedent for other worms, like Sircam
by using social engineering techniques to spread. It uses a fake love letter as
bait and spreads via e-mail and IRC channels. It sends itself out by accessing
the Outlook Address Book, and deletes information from affected computers
and sends out confidential user information to the virus author.
Sircam
This worm reaches computers in an e-mail message that encourages the user
to open it. It automatically sends itself out to all the contacts in the address
book. This worm infects all the Windows NT workstations in a network, making
it particularly dangerous in corporate environments. Its main effects are: it
steals confidential user information, uses up the free space on the hard disk
and deletes the information stored on the hard disk.
Code Red
This Internet worm spreads across computer networks, and targets IIS servers
in particular by exploiting a buffer overflow vulnerability. It spreads rapidly to
other servers through port 80, slipping past network firewalls and IDS. It restarts
and crashes computers by flooding their memory.
Klez.I
This worm reaches computers in a file attached to an e-mail message that is
capable of automatically running when the message is viewed in the Preview
Pane by exploiting a vulnerability in Outlook. It uses camouflage techniques
and spreads automatically and rapidly to all the contacts in the Outlook Address
Book. It attacks user confidentiality by sending random data and files from the
affected computer to third-parties. It also deletes certain files from the computer
and drops the Elkern.C virus.
SQLSlammer
This worm exploits a buffer overflow vulnerability for which a patch was released
six months before this malicious code emerged. It is capable of attacking and
infecting Microsoft SQL servers, sending itself out, launching denial of service
(DoS) attacks on servers and collapsing networks due to the huge volume of
traffic it generates.
Bugbear.B
Autorooter
This dangerous mass-mailing worm is capable of automatically running when
the message is viewed in the Preview Pane by exploiting a vulnerability in
Outlook, and also spreads across net shares. It is designed to infect a large
number of files and open a port, allowing a hacker to gain remote access to
the resources on the affected computer. It contains a long list of domains, the
majority of which belonged to financial entities. If it detects an e-mail address
belonging to one of these domains it obtains the network dial-up connection
password and sends it out via e-mail. Finally, it captures the keystrokes entered
by the user of the affected computer in order to steal confidential data like
passwords, bank account numbers and credit card numbers. This worm is
difficult for antivirus programs to detect, as it uses polymorphic techniques.
This Trojan exploits a vulnerability in the Windows operating system in order
to open a port and log on with the same privileges as the user of the affected
computer. It also creates a backdoor, allowing hackers to gain remote control
and steal or destroy information.
The problem posed by new Internet threats
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
06
PREVENTIVE PROTECTION FOR LARGE COMPANIES
DESCRIPTION
ATTACK
Blaster
This worm exploits a buffer overflow vulnerability to spread to as many
computers as possible. It launches denial of service (DoS) attacks by sending
a large number of data packets through TCP port 80. Blaster spreads by
attacking randomly-generated IP addresses and downloading a copy of itself
to the affected computer through its own TFTP server.
Mydoom.A
This worm spreads via e-mail in a message with variable characteristics and
through P2P file sharing online applications like KaZaA. It launches distributed
denial of service (DDoS) attacks, and opens a backdoor in affected computers,
allowing opportunistic hackers to gain remote access.
Doomjuice
This worm uses a new attack strategy, as it exploits computers infected
by Mydoom to carry out its actions.
Table 1. Some of the biggest threats to emerge over the last few years.
Attack strategies used by worms are becoming more sophisticated, as they can spread either using
social engineering techniques or without user intervention by exploiting vulnerabilities or sneaking
in through communication ports. These techniques allow to drop viruses in computers directly
through the Internet, launch denial of service attacks against servers and even open backdoors
into computers to allow hacker to gain remote access.
Many of these viruses are still infecting computers and causing damages to corporations, even
though the patches that fix the vulnerabilities that many of them exploit are available to be applied.
Impact On Companies
The graph below shows the consequences of computer attacks for the IT security managers of
large companies along 2002.
Figure 2. The IT security threats that caused the most problems for IT managers in 2002.
The problem posed by new Internet threats
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
07
PREVENTIVE PROTECTION FOR LARGE COMPANIES
The actions of the Melissa virus caused companies like Microsoft, Intel or Lucent to block their
connections to the Internet. Nimda interrupted IT services to the New York Times and damage
reached the amount of 530 million dollars worldwide. Nimda attacked 86,000 computers, causing
huge problems in companies that, before this worm appeared, were thought to be well protected,
and even forced them to temporarily disconnect from the Internet. Love Letter caused financial
losses of 10,000 million euros around the globe, and Code Red affected 360,000 servers in less than
14 hours, resulting in losses valued at 2.62 billion dollars.
Even though SQLSlammer exploited a buffer overflow vulnerability for which a patch was released
six months before this malicious code emerged, in January 2003 this worm shut down Internet
service providers in South Korea, disrupted plane schedules and knocked out automatic teller
machines. It affected thousands of servers worldwide and caused losses of over 900 million dollars.
Slammer infected the monitoring system at Davis-Besse nuclear power plant in Ohio, leaving the
system that monitors the functioning of the plant out of action for five hours.
Sobig.F affected the US Department of Defense and caused a significant increase in the volume of
spam circulating around the globe. Blaster exploited a known Windows vulnerability for which a
patch had already been released and made available, but still spread like wildfire and infected
570,000 computers in just one week. This extremely dangerous virus even got into the US Federal
Reserve, interrupting the activity of many US companies, shutting down Internet services to 20,000
TeliaSonera clients in Sweden, and affecting companies like Boeing, BMW and several networks
in China. Mydoom reach record levels of transmission, infecting 500,000 computers around the
globe, thousands of which belonged to corporate networks. CNN puts the financial costs generated
by this worm, due to technical support costs, etc., at 250 million dollars, the same as Microsoft
and SCO offered as reward “for information leading to the arrest and conviction of the individual
or individuals responsible for creating the Mydoom virus".
Figure 3. IT attacks in 2002.
The problem posed by new Internet threats
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
08
PREVENTIVE PROTECTION FOR LARGE COMPANIES
Figure 4. IT attacks in 2003.
A report published by the Yankee Group concludes that four out of every five companies were hit
by a virus or worm in 2003. Similarly, according to the latest ICSA Virus Prevalence Survey, 28%
of large organizations with more than 500 PCs have been affected by some kind of computer virus
attack, resulting in significant damage and financial loss. Furthermore, the average cost of an
attack of this kind is 81,000 dollars. According to the 2003 CSI/FBI survey, 251 companies reported
losses of 202 million dollars as a result of IT attacks.
The objectives of hackers can range from notoriety or revenge to damage for damage’s sake, and
some even set themselves personal challenges by targeting a specific objective. All of this is done
by creating a mass-mailing worm, exploiting a vulnerability to reach a specific target or even using
a Trojan that silently damages the computer. Around mid-2003 attacks like Sobig introduced a new
objective of viruses: to transmit spam by setting up users computers around the world to act as
involuntary mail relay servers.
However, the direct or indirect target of any of these attacks can be your company. Even though
these kinds of attacks can have many different effects, as demonstrated in the graph below, they
always have economic consequences.
The problem posed by new Internet threats
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
09
PREVENTIVE PROTECTION FOR LARGE COMPANIES
Figure 5. Effects of virus attacks in 2002.
What The Future Holds
Attacks created in the future are expected to continue looking for ways to exploit new vulnerabilities
in widely used software in order to spread far and wide. In fact, the use of this strategy has been
increasing for sometime now, as all too often, it has proved extremely effective. Similarly, the time
between the vulnerability being discovered and the exploit being unleashed is getting shorter. The
following graph shows the evolution of the number of incidents reported to CERT over the last
years.
Figure 6. Number of incidents reported to CERT.
The problem posed by new Internet threats
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
10
PREVENTIVE PROTECTION FOR LARGE COMPANIES
Figure 7. Damage caused by viruses in 2002.
The most common attack is from worms, as shown in figure 8. Their capacity to spread rapidly
and carry Trojans make them an excellent means of launching and spreading massive attacks.
Additionally the most damaging threats that are going to be exploited are blended attacks, which
use different techniques (viruses, worms, Trojans, vulnerability exploits, etc.) combined in the same
attack.
Figure 8. Attacks that companies will have to deal with.
The problem posed by new Internet threats
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
11
PREVENTIVE PROTECTION FOR LARGE COMPANIES
It is also worth highlighting the probable increase in the number of hacker attacks, who will be
given a helping hand from backdoor Trojans and hacking tools like those that have emerged over
the last few months.
As blended attacks against the most widely used systems and applications are increasing in both
number and sophistication and worms are spreading much faster than users can react, a good
method of preventing and detecting these attacks and a quick response to vulnerabilities are the
best forms of defense.
The Need For A New Generation Of Security
Solutions
Over the last few years, protection against Internet threats have been based on security systems
like firewalls, IDS (Intrusion Detection Systems) and antivirus software, and it has been almost enough.
Firewalls were first implemented to control inbound and outbound network traffic, and formed part
of the perimeter defense. Firewalls filters traffic according to a series of rules or policies, being
extremely effective against certain types of network attacks, as they inspect network protocols and
IP addresses, blocking traffic that does not meet certain predefined rules. In order to ensure that
the firewall is effective, its policies must be correctly configured and updated, which is not always
the case, causing the firewall is useless. Rules define what type of network attacks the firewall
must block.
However, hackers know how to slip past firewalls through attacks that use reliable protocols that
contain the real attack, whose target is located inside the corporate network. These new types of
attacks avoid firewalls by sneaking in through open ports, for example, and target internal components
of the network. What hackers actually does is attacking applications, by-passing network-level
controls.
Another usual security device is IDS (Intrusion Detection System). IDS is based on inspecting network
traffic or system logs for patterns that indicate some kind of intrusion. These systems work using
predefined types, which means that if an unknown intrusion attack is launched, they do not react.
When they detect an attack, they generate and save events and send warnings to administrators
so that they take the appropriate measures. By doing this, an IDS can detect intrusions and send
warnings, but it cannot block them. This type of system is only useful for preventing known attacks.
Anyway, its main disadvantage is that it returns a large number of false positives, resulting in
increased traffic, making it difficult to distinguish useful information from the useless and requiring
a lot of time.
Antivirus software has proved to be the most effective tool for preventing downtime and maintaining
productivity if a company is hit by any kind of virus attack. Antivirus programs scan attachments
and executable files, comparing them with known virus signatures, and are capable of eliminating
all traces of known viruses. Antivirus software has been improved with the incorporation of heuristic
techniques based on identifying certain static patterns that, although they do not necessarily match
those of known viruses, are common in known viruses. Antivirus programs are similar to IDS in
their reactive response to attacks, when an attack is first launched, there is not much they can
do.
The problem posed by new Internet threats
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
12
PREVENTIVE PROTECTION FOR LARGE COMPANIES
Weaknesses
Functions
Antivirus
Antivirus programs scan
attachments and executable files,
comparing them with known virus
signatures.
Network
firewalls
Firewalls inspect network data
packets. They allow traffic through
or block it when it tries to enter a
network segment or system,
according to predefined rules.
IDS
Detect known intrusions when they
are taking place and warn the
administrator who will take the
appropriate action.
They are not effective at combating
Internet viruses and unknown viruses.
Firewalls offer minimum protection at
application level, as firewalls need ports
to be left open in order to communicate.
IDS informs that an intrusion attack has
taken place, but it does not block it or
prevent it from causing damage.
Table 2. Conventional security systems.
Taking into consideration the table above, and due to the consequences of attacks like Code Red,
SQLSlammer or Mydoom.A, it can be concluded that, even though large companies have made
important investments in security systems, corporate networks are still vulnerable to new attacks
that use combined attack techniques.
The reason for this is that traditional defense systems like firewalls, IDS or antivirus software are
not designed to combat unknown threats, as they are reactive. This does not mean that traditional
security systems are useless –in fact, if used properly, they are extremely effective at protecting
against known attacks and viruses–, but they do need to be complemented by new preventive
solutions developed specifically to combat these kind of threats.
The problem posed by new Internet threats
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
13
PREVENTIVE PROTECTION FOR LARGE COMPANIES
Preventive Security
What Is Preventive Security?
Earlier it was explained how traditional security mechanisms need to be complemented with new
solutions to deal with unknown threats. The most interesting approach to this problem is the use
of what has become known as proactive or preventive security, a new technological philosophy
designed to complement current techniques which anticipates and blocks unknown attacks. These
new solutions can drastically reduce losses caused by hackers.
The basic premise of preventive security is the anticipation against all kinds of threats and security
risks. This philosophy centers not just on the detection of problems but also on their prevention,
heading off attacks before any damage is incurred. Achieving this is not trivial, but applying certain
advanced techniques can result in very interesting overall performance.
Figure 9. Proactive security philosophy.
A proactive and preventive security approach allows real time blocking of attacks, rather than just
detection, even if they have breached firewalls or IDS. In the event of new viruses or worms, this
preventive technology requires no prior specific knowledge of the code as it is based on the analysis
of certain parameters to detect and block without needing signatures. What makes preventive
security a complement to antivirus solutions is the ability to detect complex, newly created viruses,
without having previously identified them and even if they don’t follow the pattern of other known
viruses.
Preventive Security
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
14
PREVENTIVE PROTECTION FOR LARGE COMPANIES
At the same time, the information obtained from the detection of new viruses can be very useful,
as it helps to reconfigure firewalls and IDS to improve their effectiveness. When it comes to really
revolutionary types of attack, preventive solutions are the ideal defense mechanism. The danger
of worms like Nimda lies in their ability to spread and infect. With behavioral analysis techniques,
it is possible to block an attack of this type, as it causes buffer overflows in applications and uses
e-mail to spread to other victims.
These new technologies are highly effective when implemented at network endpoints (servers and
desktops), which are so often the target of attacks –either because they contain the assets that
are the real target of the attack or because they are the means by which the infection will spread.
If an attack can breach firewall control by using legitimate network protocol to enter, it will still
be detected in the host, by this low level scan.
Solutions of this type applied in network endpoints are known as HIPS (Host Intrusion Prevention
Systems) and may combine various techniques. The method which has so far proved to be most
effective is behavioral analysis at operating system level. This technique is based on monitoring
calls to the operating system kernel from the applications and processes running on a computer,
looking out for suspicious behavior that can correspond to an attack.
Preventive Security
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
15
PREVENTIVE PROTECTION FOR LARGE COMPANIES
Phases Of Total Protection
When a new vulnerability is discovered, two parallel processes are set in motion: the software
manufacturer develops a patch and viruses and attacks are created that try to exploit this vulnerability.
From the moment a vulnerability is discovered, users are at risk, as you they can never know what
kind of attack will be unleashed and how it will arrive.
By combining a preventive solution and antivirus protection, you can dramatically reduce this risk,
as you will be completely protected against worm attacks, for example.
Proactive analysis detects and blocks worms based on his behavior.
The antivirus eliminates the cause of the attack, once signature is available.
It blocks the entry point, fixing the vulnerability with the patch.
Figure 10. Phases of total protection.
Preventive protection is the most effective way of protecting computers from unknown attacks in
the short term. If a virus or worm attacks, it will be detected and blocked until the corresponding
signature is added to the antivirus and the malicious code is completely eliminated.
Preventive Security
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
16
PREVENTIVE PROTECTION FOR LARGE COMPANIES
The Panda Approach
For Panda Software, preventive security means a set of tools necessary for preventing attacks
before they are launched. For this reason, its new preventive security solutions use behavioral
analysis techniques, capable of detecting malicious activity before it damages computers.
As new threats are unknown for reactive security systems, they are extremely difficult to detect.
As it can be seen in the table below, the most damaging worms that have appeared recently exploit
vulnerabilities and use a combination of techniques to reach their objectives avoiding detection
systems.
Exploits
vulnerabilities
Nimda
Code
Red
Klez.I
Yes
Yes
Yes
Bugbear.B Autorooter
Yes
Yes
Blaster
Yes
Uses social
engineering
Yes
Uses e-mail
Yes
Modifies files
Yes
Opens
communication
ports
Opens
backdoors
Mydoom
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Table 3. Methods used by Internet threats
Panda’s solution combines several technologies in order to get the best of breed approximation
to proactive security by analyzing every symptom that can be caused by an attack, and applying
different techniques appropriately in order to block only malicious activity.
In order to guarantee that effective protection is implemented across the corporate IT infrastructure,
it is essential to protect every network component, from workstations and database, application
and mail servers to network gateways, etc. Panda Software protects every layer of your corporate
infrastructure, safeguarding the information transmitted across your network, and the business
processes associated to your applications. Centralized management of all elements provides maximum
control of resources and corporate network security.
Preventive Security
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
17
PREVENTIVE PROTECTION FOR LARGE COMPANIES
TruPrevent Technologies
Panda Software has developed solutions based on TruPrevent Technologies, capable of protecting
the corporate environment in an effective way against new threats. They combine several technologies,
such as process behavioral analysis and event correlation, and they have been optimized by Panda
to minimize organizational impact of any external malicious exploit, going beyond simply unknown
viral attack detection, and without false positive generation.
Your systems will be effectively protected against threats such as new virus and Trojan, worm
pandemics, vulnerabilities exploits using buffer overflow flaws and network virus using packages
instead of files as propagation method. This type of attacks usually pass antivirus control, because
antivirus solutions are based on a reactive technology.
TruPrevent Corporate solution by Panda Software allows you to extend your current antivirus
protection with an additional layer of preventive protection, fully efficient on detection and
neutralization of unknown and new threats targeting your corporate network. If you have already
deployed an antivirus solution, which ever it is, you can install TruPrevent Corporate with no
hassle, because this solution is totally compatible, and unnoticeable to your system performance.
It is also a second opinion in your antivirus analysis, and a powerful way to insure a better protection
against unknown threats. Simply, it will detect attacks which evade traditional security products
like antiviruses.
BusinesSecure with TruPrevent Technologies and EnterpriSecure with TruPrevent
Technologies are the global security options presented by Panda Software to let you own
simultaneously and from a single point both technologies, antivirus and TruPrevent Technologies.
Management is accomplished from a single administration console, AdminSecure, in a truly centralized
and global manner.
TruPrevent Technologies protection is transparent to end-user. Your employees won’t need
specific skills to use the product, because protection acts in background to reduce client perception
about it.
System administrators will manage these solutions in an easy and centralized way, accessing to
any incident-related information and having the option of delivering any suspicious process to
PandaLabs, Panda Software laboratories, in order to get a full certainty about the problem scope
and its solution.
Panda Software solutions include TruPrevent Technologies to keep your organization safe from
new threats, letting your employees grow while reducing unnecessary costs.
Preventive Security
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
18
PREVENTIVE PROTECTION FOR LARGE COMPANIES
A Practical Example
There are several parameters that can be used to demonstrate how much damage any of the
attacks described earlier can cause to a company. Below is an example of the implications of the
issues discussed in this white paper in a company with 500 employees.
Consider a company with 500 employees with an average annual salary of $20,000 and a
turnover of 100 million dollars at optimum levels of productivity.
As a rule of thumb, a company of this size will usually invest 5% of its annual turnover
in IT. The latest ISM survey shows that 5% of the IT budget is dedicated to security, and therefore
this company would assign a budget of $250,000 per year to security solutions. Imagine that this
company assigns $190,000 to implementing security solutions.
Imagine that the cost of implementing a preventive security solution is $90 per computer and the
company in this example has 580 computers, between workstations and servers, the total cost of
the preventive security solution would be $52,200.
To sum up, by spending 27% of the annual security budget on implementing a preventive
security solution like Panda’s, this company would be protected against the types of
threats that, according to Yankee Group, affected 80% of companies in 2003 and which according
to several other studies, will increase in number and cause more damage over the next few years.
Due to the noticeable increase in the security incidents reported to CERT, it can be concluded that
over the next few years, most companies will probably be hit by at least one attack per year.
Furthermore, according to ICSA Labs, the average cost of a virus attack is $81,000, which means
that by preventing a single attack, it would return the investment made in this solution,
which would protect the network as soon as it was installed and would continue protecting it for
a lot longer than a year.
Preventive Security
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
19
PREVENTIVE PROTECTION FOR LARGE COMPANIES
Now Is The Time To Take Action
Large companies have already started taking action after an alarming increase in the number of
attacks and threats they face. Corporate investment in IT security system has increased this year
to 70,000 million dollars, and is expected to reach 116,000 million dollars in 2007 in order to stop
threats in their tracks.
Figure 11. Expected investment in IT security.
As figure 11 shows, 91% of companies will invest the same or more in security over the next few
years, whereas, 54% will increase investment in security over the next three years. The graphs
below give quantitative data.
Preventive Security
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
20
PREVENTIVE PROTECTION FOR LARGE COMPANIES
Figure 12. Growth in security investment
according to IDC.
Figure 13. Number of security products deployed.
The large majority of the 1,138 professionals consulted in Information Security’s 2003 Product
Survey said that they would deploy more IT security products in the next two years than they have
in the previous two years. According to this study, intrusion detection and prevention will become
the most important issue, with annual growth rates of over 40% between 2001 and 2005.
Panda TruPrevent Technologies allow you to focus on your business activity without needing
to worry about keeping up-to-date on the latest security issues, such as new hacking techniques,
software patches, etc. Similarly, it alleviates the burden of restoring networks after attacks by new
threats.
Preventive Security
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
21
PREVENTIVE PROTECTION FOR LARGE COMPANIES
Conclusions
Although they are effective against known network attacks, viruses and worms, traditional security
solutions cannot combat latest attacks specially created by hackers to penetrate corporate networks
and spread across the systems rapidly.
There is an evident need for a new generation of preventive security solutions, capable of detecting
and blocking new and unknown threats, which according to ICSA Labs costs companies an average
of 81,000 dollars per attack.
TruPrevent Technologies are a set of preventive security technologies included on Panda
Software's solutions that covers this need, protecting corporate networks from new and unknown
attacks, minimizing costs related to security issues, while safeguarding productivity and reputation.
About Panda Software
Panda Software (http://www.pandasoftware.com/), a world leader in virus and intrusion prevention, offers
unrivalled proactive security solutions for all types of users, from the largest corporations through small and
medium-sized companies to home users. Its corporate products offer hassle-free automatic and centralized
administration and provide network-wide protection, via multi-layer security technology, to ensure uniform
protection across the enterprise, from remote users and workstations to mail gateways and internal and perimeter
servers. Panda Software’s solutions have received awards and quality certifications from the sector’s most
widely-respected organizations, including ICSA Labs and Checkmark and its commitment to customer service,
innovative products, and the pioneering concept of 24h-365d tech support have revolutionized the IT security
industry.
Conclusions
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
22
PREVENTIVE PROTECTION FOR LARGE COMPANIES
Appendix A. Panda Software Worldwide
Panda Headquarters Europe
Ronda de Poniente 19
Tres Cantos
28760 Madrid, Spain
Phone: +34 91 806 37 00
E-mail: info@pandasoftware.com
Panda Headquarters USA
230 N. Maryland, Suite 303
P.0. Box 10578
Glendale, CA 91209, USA
E- mail: usa@pandasoftware.com
Panda Software Argentina
Calle Roque Saenz Peña 1160, piso9b
Buenos Aires
Phone: +00 5411 43823448
E-mail: argentina@pandasoftware.com
Panda Software Austria
Dr.-Detlev-Karsten-Rohwedder-Str. 19
47228 Duisburg
Phone: +49 20 65 9 87 654
Phone: +00 5411 43823448
E-mail: austria@pandasoftware.com
Panda Software Belgium
Mechelsesteenweg 311
1800 Vilvoorde
Phone: +32 2 756 08 80
E-mail: belgium@pandasoftware.com
Panda Software Bolivia
Calle Miguel de Cervantes Nro. 2725,
Sopocachi, La Paz
Phone: +591 2 411823
E-mail: bolivia@pandasoftware.com
Panda Software Brazil
Rua Dr Barcelar 173 Conjunto 114
Vila Clementino
04026-000 Sao Paulo – SP
Phone: +55 61 5082 4414
E-mail: brasil@pandasoftware.com
Panda Software Bulgaria
126, Tzar Boriss III Blvd.
office 111
1612 – Sofía-Bulgaria
Phone: +359 2 9556575
E-mail: bulgaria@pandasoftware.com
Panda Software Chile
Mosqueto 428, oficina 502
6500426, Santiago
Phone: +56 2 639 7541
E-mail: chile@pandasoftware.com
Panda Software Colombia
Carrera 41 N.46-26 Itagui
Antioquia
Phone: + 57 4-3735588
E-mail: colombia@pandasoftware.com
Panda Software Denmark
Ny Vestergardsvej 15
DK 3500 – Værløse
Phone: +45 44 355 375
E-mail: denmark@pandasoftware.com
Panda Software France
33 bis Boulevard Gambetta.
78300 Poissy
Phone: +33 1 30 06 15 15
E-mail: france@pandasoftware.com
Panda Software China
Room 501, No.20, 421 Siping Rd.,
Shangai 200020
Phone: +86 21 6351 9020
E-mail: china@pandasoftware.com
Panda Software Costa Rica
Calle 25, Ave 6 y 8 #648
San José
Phone: 00 506 258 0100
E-mail: costarica@pandasoftware.com
Panda Software Finland
P.O.BOX 636
33101 Tampere
Phone: +358 3 339 26 700
E-mail: finland@pandasoftware.com
Panda Software Germany
Dr.-Detlev-Karsten-Rohwedder-Str. 19
47228 Duisburg
Phone: +49 20 65 9 87 654
E-mail: germany@pandasoftware.com
Panda Software Greece
Botsari 12-14
18538 Pireaus
Phone: +30 210 4588 085
E-mail: greece@pandasoftware.com
Panda Software Guatemala
Avenida Reforma 8-60 Zona 9
Edificio Galería Reforma, Torre 1 Oficina 1102
Ciudad de Guatemala
Phone: +502 385 6657
E-mail: guatemala@pandasoftware.com
Panda Software Hungary
Szugló utca 54
1145 Budapest
Phone: +36 1 469 70 97
E-mail: hungary@pandasoftware.com
Panda Software Israel
43 Hamelacha street, New Industrial Zone
42504 Natanya
Phone: +972 9 - 8859611
E-mail: israel@pandasoftware.com
Panda Software Italy
Viale E. Marelli 165
20099 Sesto S. Giovanni (Mi)
Phone: 02-24 20 22 08
E-mail: italy@pandasoftware.com
Panda Software Japan
Nakameguro GT Tower 7F, 2-1-1 Kamimeguro,
Meguro-ku, Tokyo 153-0051
Phone: +81-3-6412-6020
E-mail: japan@pandasoftware.com
Panda Software Latvia
Merkela Street 1
1050 Riga
Phone: +371 7211636
E-mail: latvia@pandasoftware.com
Panda Software Lithuania
Žemaites g. 21
LT-2009 Vilnius -Lithuania
Phone: +370 5 2397833
E-mail: lithuania@pandasoftware.com
Appendix A. Panda Software Worldwide
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
23
PREVENTIVE PROTECTION FOR LARGE COMPANIES
Panda Software Luxembourg
Mechelsesteenweg 311
1800 Vilvoorde
Phone: +32 2 756 08 80
E-mail: luxembourg@pandasoftware.com
Panda Software México
Tuxpan #39, Despacho 503
06760 México, D.F.
Phone: +52 5 2642127
E-mail: mexico@pandasoftware.com
Panda Software Netherlands
Fellenoord 23 – Postbus 2020
5600 CA Eindhoven
Phone: +31 40 233-3501
E-mail: netherlands@pandasoftware.com
Panda Software Norway
ViroSafe Norge AS
Midtbyen Park
Skolegt. 2
2315 Hamar
Phone: 00 47 62 53 96 80
E-mail: norway@pandasoftware.com
Panda Software Paraguay
Eliseo Reclus 247 Calle Guido Spano,
República del Paraguay
Asunción
Phone: +00 595 21 607594
E-mail: paraguay@pandasoftware.com
Panda Software Poland
Ul. Wiktorska 63
02-587 Warszawa –Poland
Phone: +48 (22) 540 18 06
E-mail: poland@pandasoftware.com
Panda Software Puerto Rico / Dominican
Rep.
Av. Luis Muñoz Rivera 1058, Suite 1
Pto. Nuevo
Puerto Rico, 00920
Phone: +1 787 296 1139
E-mail: caribe@pandasoftware.com
Panda Software Slovak Republic
Lublanska 1
83102 Bratislava
Phone: +421 2 444 55 702
E-mail: slovakia@pandasoftware.com
Panda Software Spain
Ronda de Poniente 19
Tres Cantos
28760 Madrid
Phone: 902 365 505
E-mail: info@pandasoftware.es
Panda Software Switzerland
Route Champ-Colin, 10
1260 Nyon
Phone: +41 22 994 89 40
E-mail: switzerland@pandasoftware.com
Panda Software Turkey
Darulaceze Cad
Karatas Sok. SNS Plaza Nº 6
80270 Okmeydani – Istanbul
Phone: 90 212 222 1520/90 212 210 2200
E-mail: turkey@pandasoftware.com
Panda Software United Kingdom
5 Signet Court, Swanns Road
Cambridge CB5 8LA
Phone: +44 (0)870 444 5640
E-mail: uk@pandasoftware.com
Panda Software Uruguay
Jose Enrique Godó 1955
11200 Montevideo
Phone: +5982 4020673
E-mail: uruguay@pandasoftware.com
Panda Software Peru
Calle Lord Cochrane 521
Miraflores – Lima 18 - Perú
Phone: 00 51 1 221 6001/ 221 0159
E-mail: peru@pandasoftware.com
Panda Software Portugal
Quinta da francelha - Edificio Sagres, 7B
2685-338 Prior Velho
Phone: + 351 219426800
E-mail: portugal@pandasoftware.com
Panda Software Russia
Tveritina 38/3
Ekaterinburg, 620026 Russia
Phone: +7 3432 78-31-27
E-mail: russia@pandasoftware.com
Panda Software Slovenia
Stari trg 5A,
SI-8210 Trebnje
Phone: +386 7 34 61 020
E-mail: slovenia@pandasoftware.com
Panda Software Sweden
P. O. Box 26026
100 41 Stockholm
Phone: +46 8-545 25030
E-mail: sweeden@pandasoftware.com
Panda Software Thailand
192 Soi Laprao 107
Bangkapi, Bangkok 10240
Phone: 00 662 7311480
E-mail: thailand@pandasoftware.com
Panda Software United Arab Emirates
Bldg-5 Office No. 5G-15
P O Box 41573 – Hamriyah
Free Zone, Sharjah, United Arab Emirates
Phone: +971 (6-526.30.14)
E-mail: UAE@pandasoftware.com
Panda Software United States
230 N. Maryland, Suite 303
P.0. Box 10578
Glendale, CA 91209, USA
E- mail: usa@pandasoftware.com
Panda Software Venezuela
Av. Libertador, C.C. Libertador, PH-7
Caracas
Phone: +5821 276188 60
E-mail: venezuela@pandasoftware.com
Appendix A. Panda Software Worldwide
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
24
PREVENTIVE PROTECTION FOR LARGE COMPANIES
Appendix B. Glossary Of Terms
TecnologíaThese are programs that scan the memory,
Antivirus /
Antivirus Program
Backdoor Trojan
Boot virus
Browser
Buffer
Buffer overflow
disk drives and other parts of a computer for
viruses.
This is a program that enters the computer
and creates a backdoor through which it is
possible to control the affected system without
the user realizing.
A virus that specifically affects the boot sector
of both hard disks and floppy disks.
A browser is the program that lets users view
Internet pages. The most common browsers
are: Internet Explorer, Netscape Navigator,
Opera, etc.
This is an intermediary memory space used
to temporarily save information transferred
between two units or devices (or between
components in the same system).
This is a vulnerability that is frequently used
by hackers to attack a computer. It involves
using a certain part of the memory of the
computer to insert malicious code in order to
run it and cause damage.
DdoS
Distributed Denial of Service: This is a Denial
of Service (DoS) attack where multiple
computers attack a single server at the same
time.
Desktop /
Workstation
A computer used by the employees of a
company. It is usually a personal computer
connected to a network.
DoS / Denial
of Service
This is a type of attack, sometimes caused by
viruses, that prevents users from accessing
certain services ( in the operating system, web
servers etc.).
Estación
Máquina dedicada a servir de puesto de trabajo
de un usuario dentro de una empresa.
Normalmente es un ordenador personal
conectado en red.
Encryption
Exploit
Firewall
Gateway
This is a mechanism for protecting information
which involves varying the format of the data
according to certain criteria in order to prevent
unauthorized access
This can be a technique or a program that
takes advantage of a vulnerability or security
hole in a certain communication protocol,
operating system, or other IT utility or
application.
This is a barrier that can protect information
in a system or network when there is a
connection to another network, for example,
the Internet.
A computer that allows communication between
different types of platforms, networks,
computers or programs. To do this it translates
the various communication protocols that it
handles.
IIS (Internet
Information
Server)
This is a Microsoft server (Internet Information
Server), designed for publishing and maintaining
web pages and portals.
IP (Internet
Protocol)
/ TCP-IP
An IP address is a code that identifies each
computer. The TCP/IP protocol is the system,
used in the Internet, which interconnects
computers and prevents address conflicts.
Kernel
This is the central module of an operating
system.
LAN (Local
Area Network)
A network of interconnected computers in a
reasonably small geographical area (generally
in the same city or town or even building).
Log
Macro
Fragment of information that is registered
when an event occurs. Logs are usually
generated by detection systems so that they
can then be studied.
A macro is a series of instructions defined so
that a program, say Word, Excel, PowerPoint,
or Access, carries out certain operations. As
they are programs, they can be affected by
viruses. Viruses that use macros to infect are
known as macro viruses.
Macro virus
A virus that affects macros in Word documents,
Excel spreadsheets, PowerPoint presentations,
etc.
Malware
Programs, documents or messages liable to
have negative effects on IT systems. MALicious
softWARE.
Means of
infection
A fundamental characteristic of a virus. This
is the way in which a virus infects a computer.
Means of
transmission
A fundamental characteristic of a virus. This
is the way in which a virus spreads from one
computer to another.
P2P (Peer
to peer)
Polymorphic/
Polymorphism
A program -or network connection- used to
offer services via the Internet (usually file
sharing), which viruses and other types of
threats can use to spread. Some examples of
this type of program are KaZaA, Emule, eDonkey,
etc.
Technique used by viruses to encrypt their
signature in a different way every time and
even the instructions for carrying out the
encryption.
POP (Post
This is a protocol for receiving and sending
Office Protocol) e-mails.
Port /
Point through which a computer transfers
Communication information (inbound / outbound) via TCP/IP.
port
Proactivity
Capacity to forecast events, using any technique
to act in advance to deal with an expected
difficulty.
Script /
Script Virus
The term script refers to files or sections of
code written in programming languages like
Visual Basic Script (VBScript), JavaScript, etc.
Security patch
A set of additional files for original software,
tools or computer applications, which are used
to solve deficiencies, vulnerabilities or bugs.
This is like the virus passport number. A
sequence of characters (numbers, letters, etc.)
that identify the virus.
Hacker
Someone who accesses a computer illegally
or without authorization.
Signature
Hoax
This is not a virus, but a trick message warning
of a virus that doesn’t actually exist.
Spam
Host
This refers to any computer that acts as a
source of information.
Unsolicited e-mail, normally containing
advertising. These messages, usually massmailings, can be highly annoying and waste
both time and resources.
Appendix B. Glossary Of Terms
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
25
PREVENTIVE PROTECTION FOR LARGE COMPANIES
Trojan /
Trojan horse
Virus
Vulnerability
Strictly speaking, a Trojan is not a virus,
although it is often thought of as such. Really
they are programs that enter computers
appearing to be harmless programs, install
themselves and carry out actions that affect
user confidentiality. Its name comes from the
famous wooden horse in which Greek soldiers
hid so that they could enter the city of Troy
undetected.
Windows
Registry
This is a file that stores all configuration and
installation information of programs installed,
including information about the Windows
operating system.
Worm
This is similar to a virus, but it differs in that
all it does is make copies of itself (or part of
itself).
Viruses are programs that can enter computers
or IT systems in a number of ways, causing
effects that range from simply annoying to
highly-destructive and irreparable.
Flaws or security holes in a program or IT
system, and often used by viruses as a means
of infection.
Appendix B. Glossary Of Terms
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
26
PREVENTIVE PROTECTION FOR LARGE COMPANIES
Appendix C. Abbreviations And Acronyms
CERT
Computer Emergency Response Time.
DoS
Denial of Service.
FBI
Federal Bureau of Investigation.
HIPS
Host Based Intrusion Prevention System.
IDS
Intrusion Detection System.
IT
Tecnologías de la información.
IIS
Internet Information Server. Microsoft
LAN
Local Area Network.
P2P
Peer To Peer.
OS
Operating System
SQL
Structured Query Language.
TFTP
Trivial File Transfer Protocol.
WLAN
Wireless Local Area Network.
Appendix C. Abbreviations And Acronyms
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
27
PREVENTIVE PROTECTION FOR LARGE COMPANIES
Appendix D. References
ICSA Labs 8th Annual Computer Virus Prevalence Survey 2002 - ICSA, 2003.
2002 ISM Survey. ISM, 2002.
2003 Global Security Survey. Deloitte Touche Tohmatsu, 2003.
2003 ISM Product Survey. ISM, 2003.
Intrusion Detection, Systems for Today and Tomorrow. SANS Institute, 2001.
Event Correlation Systems. SANS Institute, 2003.
Evolution of the Computer Virus. SANS Institute, 2002.
GIAC Security Essentials. SANS Institute, 2003.
The Security Revolution - CIO 2002.
The UCLA Internet Report. UCLA Center For Communications Policy, 2003.
Threats of the Future. RSA, 2003.
Viruses and Worms: What Can We Do About Them? – CERT, 2003.
A Patch in Time – Information Security, 2004.
Mydoom lesson: Take proactive steps to prevent DDoS attacks – Computerworld, 2004.
Dawn of the Superworm – PCWorld, 2003.
Security Threats Will Get More Serious – PC World, 2003.
Virus costs keep rising – VNUNET, 2003.
Emerging IT Security Threats Underscore Need for Vigilance. FRBC, 2003.
Appendix D. References
Copyright © 2004 Panda Software S.L. All rights reserved. This white paper is for information purposes only.
28