Balancing Social Networking with Network Security Objectives

Transcription

Balancing Social Networking with Network Security Objectives
Balancing Social Networking with Network Security Objectives >
October, 2010
Balancing Social Networking with Network Security Objectives in a Government Environment
Social Networking is Here to Stay
With the explosion of other options for social networking, interaction and
collaboration, email has lost its position as the primary Internet-based
communication tool. In fact, The Wall Street Journal reported that there
were more social networking accounts than Webmail accounts in 2009.i
Today, users rely more on blogs, tweets, social networking posts and
even video clip communications to enrich both personal and professional
information exchange.
Even businesses are leveraging social networking
Email vs Social Networking Users
and other Web 2.0 services to communicate with
customers, employees and partners. A recent survey
found that 65 percent of the largest 100 international
companies have active accounts on Twitter, 54 percent
have a Facebook fan page, 50 percent have a YouTube
channel and one-third have corporate blogs.ii One in
230.2
229.2
2008
five of major international businesses are actually
using all four of these technologies.
Email
While these sites and services offer tremendous
Social Networking
business benefits, they also present serious risks that
have to be managed. For instance, they are often the
target of malicious attacks due to their popularity.
Video sites like YouTube consume tremendous
276.9
301.5
2009
amounts of bandwidth if they are not properly
managed on the corporate network. And employees
may intentionally or accidentally leak sensitive
company data onto a social networking site, breaches
Source: Wall Street Journal3
that can result in lost competitive information, public
relations headaches, fines, legal action and more. The good news is, with the
right security approach, these consequences can be successfully avoided.
1
< >
Balancing Social Networking with Network Security Objectives in a Government Environment
Managing the risks
The benefits of social networking also come with significant risks, including:
Security: Threats such as malware, phishing and data loss are increasingly
targeting social networking because the wide range of communication
features makes it easier to spread untrustworthy messages or hazardous
malware. By exploiting the trust factor inherent in social networking,
malware can more easily bypass traditional security approaches by
manipulating users to download malicious content that appears to come
from a trusted source, such as a friend or familiar organization.
Bandwidth management: The rich media inherent in much of social
networking’s interactions, including pictures, music, and video, consume
vast amounts of bandwidth. If left uncontrolled, streaming video to hundreds
of systems at the same time can shut down critical applications.
Inappropriate Internet use:
Recreational surfing and posting on
personal blogs or social networking
accounts not only diminish employee
productivity, they can have other costs
as well. If not properly managed,
recreational network use can impact
business application performance,
create liability risks, and potentially
introduce malware into the
organization. Enforcing network usage
policies and maintaining a secure
web gateway are critical to ensuring
optimum business performance.
Responses to these challenges are equally broad. Luckily, the best practices
for securing social networking are similar to those used for web threats in
general. The task facing today’s businesses, therefore, is to understand their
organizations’ priorities around effective and appropriate social networking
use, and the strengths and limitations of the various security options. The
ultimate goal is to find the balance between achieving the productivity
benefits of social networking while protecting the organization from
dangerous threats.
2
< >
Balancing Social Networking with Network Security Objectives in a Government Environment
The usual suspects
Practically every web threat against email or web browsing has found new
life in the world of social networking. Sites and services like Facebook and
Twitter provide new ways for cybercriminals to hide malware, set up fake
sites, compromise legitimate sites and spread an attack from one member
of a social network to another. They simply bypass most traditional defenses
along the way. Here’s how these different types of attacks work:
Malware
Malware remains the number one threat to anyone using the Internet,
and these threats often combine botnets, spyware, viruses, Trojans,
worms and other techniques into complex attacks. Malware can also be
part of a targeted attack on an organization with potentially catastrophic
consequences. For example, between January and March 2010, the
computers of 13 South Korean Army officers became infected with
malware that resulted in the theft of war operation plans.iii
In a recent survey, antivirus solution vendor Sophos reported that 36%
of users revealed that they had been sent malware via social networking
sites.iv Blue Coat Security Labs reported that two-thirds of all malware
attacks in 2009 were spread when users were offered a video clip
which, when clicked, would report that the user needed to update their
Flash player or install new software to view the video.v This malwarespreading mechanism depends on a user behavior that is almost
automatic among social networking users where video content sharing
is so common. In addition, many threats often capitalize on highly
publicized events and catastrophes such as natural disasters, massive
power outages, civil disturbances and more. These attacks may pose
as charitable organizations to solicit donations or offer fake video of
dramatic events to manipulate users into downloading malware.
Phishing
Phishing attacks – attempts to trick users into revealing confidential
information – are on the rise within social networking environments.
Some are designed to simply collect hundreds of thousands of email
addresses that can then be used for spam, email virus attacks and so
forth. Other phishing attempts can be complex, targeted attacks intended
to dupe smaller numbers of select individuals into revealing more valuable
details such as financial or personal data.
In 2009, blended threats evolved
into much more complex
structures, adapting to the current
environment of technology, users
and vulnerabilities.
3
< >
Balancing Social Networking with Network Security Objectives in a Government Environment
Phishing attacks use social engineering techniques to deceive people into
divulging confidential information. Just like malware, these attacks have been
extremely successful within social networking sites because they exploit the
high level of trust users place in their network of “friends.” Unlike suspiciouslooking URLs sent anonymously via email, users are far more likely to trust
content, such as a video link, that comes from a familiar source. The success
of these attacks is perhaps why Facebook is the fourth most popular online
phishing target.vi
The sheer popularity of these sites makes them attractive targets for
cybercriminals. In fact, Blue Coat Security Labs found that social networking
sites account for 25% of the top 10 most active URL categories.vii So, as their
popularity has grown, so have the attacks. And while personal information
loss is typically the first victim of these attacks, corporate assets may also be
compromised as a result.
Data Loss
Industry analyst Forrester Research has reported that Web 2.0 applications
such as blogs, wikis and social networking sites provide an easy way for data
to escape from an organization.viii An individual who wants to steal corporate
data is highly unlikely to use the company’s email system because it’s almost
impossible to do quickly or anonymously. As a result, social networking
services have become a highly attractive way to steal information because they
provide several ways to post documents, video or plain text.
However, nearly 80 percent of data loss is unintentional, and accidental
information leakage through social networking sites may present a greater risk
than criminal activity.ix This may be the result of the casual and open nature
in which users approach social networking, or the atmosphere of trust that
weakens a user’s judgment. Things that they would never discuss openly in a
public setting are often shared freely within social networking sites – including
confidential data.
Bandwidth Abuse
Social networking encourages frequent communication. It often involves
visiting pages that contain dozens or even hundreds of comments and links.
Every time a user visits a page to see what is new, their browser is also
presented with mostly old content as well. And the user dynamically moves
4
< >
Balancing Social Networking with Network Security Objectives in a Government Environment
from one page to another as they follow different trains of
thought or simply visit the pages of key members of their
40M
social network. The total gateway bandwidth hit can be
staggering for many organizations.
Combine this with the extensive sharing of multimedia
on social networks and it’s easy to see that bandwidth
consumption can quickly become a problem, and could
cause more mission-critical applications to fall below
30M
20M
10M
their necessary performance levels. Critical tasks such as
Jan 09
retrieving database records or electronically submitting
important information frequently hits performance
bottlenecks. Bandwidth abuse is even more detrimental
to organizations who rely on Software-as-a-Service (SaaS)
solutions, or who manage virtual desktops for remote or
Jul 09
Dec 09
Source: Twitter
The number of “tweets” per day grew from just 2.5
million in January 2009 to over 30 million by the
end of the year, with no indication of slowing down.
mobile users.
Layered defenses optimize security and bandwidth
Just as cybercriminals have applied innovative techniques to leverage social
networking, IT must find equally innovative ways to apply their security
knowledge, expertise and available technologies to a new environment.
A layered defense helps protect against malware, phishing, data loss and
bandwidth abuse with a comprehensive security approach that includes
real-time web filtering, antivirus software,
data loss prevention, mobile security and
user education components. Each of these is
described in detail below:
Web filtering
Web filtering provides a front line to neutralize
links, scripts and other techniques used to
either trick a user or automatically cause the
computer to connect to a malware infection
source. Next-generation web filtering solutions
can preserve and support legitimate social
networking activities while preventing the victim’s browser from accessing
potentially dangerous content and phishing scams. However, many solutions
5
< >
Balancing Social Networking with Network Security Objectives in a Government Environment
tend to block legitimate pages or even entire domains because they lack
more granular response capabilities. So it’s important to have a solution that
can filter URLs using multiple categories, real-time ratings and a deep level
of visibility.
Today’s web threats move quickly, with an average lifespan of less than two
hours in any one location. Even a web filtering solution that provides hourly
updates is statistically going to miss half of all active, fast-moving threats.
Therefore, an effective web filtering solution must be paired with cloudbased services that increase awareness of web activity and provide access
to constantly evolving defense technologies – all without requiring frequent
downloads and updates to on-premise solutions.
Blue Coat WebFilter includes full access to the Blue Coat WebPulse™ cloud
service with over 70 million users and a 100% uptime record since 2004. As
a result, it is the largest, most reliable and most respected security cloud
service in the industry. Increased web awareness, provided by WebPulse,
helps direct and prioritize research efforts to concentrate where users are
surfing. WebPulse also includes many automated technologies and can
provide real-time category ratings for never-before-seen URLs from around
the world in 50 languages. Rather than depending on a single technology,
such as reputation analysis, WebPulse accurately categorizes URLs by
applying reputation, heuristics, sandboxing, content analysis, deep link
inspection and other technologies to web requests.
Also, WebFilter is one of the few solutions that can differentiate URLs that
are sources of potential malware infection from those used by systems
already infected with spyware that attempts to send stolen information
back to its creator. First, this ability provides another layer of defense using
a single technology. Second, it can immediately alert IT about potentially
compromised systems so they can evaluate and clean the system if
necessary and ensure nothing else has been compromised on the end point.
Antivirus
There is little truth to the rumors that antivirus has become a commodity.
Indeed, the fast-moving, rapidly evolving nature of today’s malware has
put even greater demands on antivirus vendors. Yet while the best practice
of “multi-vendor” antivirus has not changed, the reasons behind this
practice have.
6
< >
Balancing Social Networking with Network Security Objectives in a Government Environment
In the 1990’s, multi-vendor antivirus usage evolved because it was never
clear which vendor would be the first to respond to a new threat at a time
when response times were measured in days. Having two vendors increased
the chance of at least one vendor catching the threat. But today’s vendors
can typically respond in just a few hours to a totally new threat.
However, most “new” threats are simply variants of previously identified
malware. In a single day, hundreds or even thousands of variants of a single
virus may be released onto the web. So each antivirus vendor has developed
their own approach to identify and block a variant of known malware.
However, few can claim even a 40-50% detection rate. Therefore, using
one AV vendor on the end point, and another at the gateway, increases the
likelihood of blocking a recently introduced malware variant.
Since the first FTP/HTTP antivirus scanners were introduced in the mid´90s, performance was the primary obstacle to fully implementing a gateway
antivirus security layer. So Blue Coat introduced the ICAP protocol and the
ProxyAV™ platform, which works in conjunction with Blue Coat ProxySG
to help leading AV vendors deliver web security solutions that optimize
performance as well.
Data Loss Prevention (DLP)
DLP must protect against both intentional data theft
and accidental data loss. And while email has been the
traditional area of focus for DLP deployments, it is clear
that email is no longer the dominant form of electronic
communication. Organizations must ensure their DLP
strategies include the ability to inspect all SSL traffic as
well as that used by social networking offerings.
Forrester Research has reported that “deep content
analysis and data-centric control is on many users’ wish
lists, yet web filtering products that offer good DLP
functionality are few and far between.”x Other research has shown DLP
buyers and users to be frustrated with solutions that are either too complex
to be usable or too simplistic to be effective. An effective DLP strategy
must include data registration features for accurate content identification,
offer multi-function capabilities (for email, web and network DLP), include
proactive discovery DLP capabilities and still be easy to use and maintain.
7
< >
Balancing Social Networking with Network Security Objectives in a Government Environment
The Blue Coat Data Loss Prevention appliance was created to deliver on
those requirements. With a typical one-day deployment, companies can
quickly begin to detect and block potential data leaks. Pre-defined policies
can be used as-is or customized to monitor and control information
traveling across the network, in email, or to the web, including posts to
social networks. Support for full data registration capabilities help ensure
accurate, proactive discovery and real-time leak detection while minimizing
false positives.
Bandwidth Management
Managing bandwidth is a complicated responsibility. While it’s easy to
completely block malicious or inappropriate sites, managing connections
to other URLs can be more complex. Web filtering is the most effective
way to control malicious or recreational web traffic, but require granular
capabilities that enable more than just the ability to allow or deny access.
Controlling bandwidth requires visibility into current traffic patterns. IT must
identify which applications are in use, their performance requirements,
peak usage times and their importance to the business. Mission-critical
applications should be given priority to ensure quality of service, and
some applications or types of network traffic may be restricted to a fixed
percentage of available bandwidth.
The impact from video clips and streaming
media may be constant or IT may find
spikes in activity at certain times of the
day or around certain events. Personnel
conducting research, or just staying on top
of the news as part of their morning ritual,
are now watching video clips as well as
reading articles. For instance, many U.S.
businesses found their networks saturated
and mission-critical applications failing on
the day their employees tried to watch the
presidential inauguration of Barack Obama
online. Sports events often pose another
performance threat to network bandwidth as online broadcasting expands.
The most effective way to manage peak demand is to grant various levels of
8
< >
Balancing Social Networking with Network Security Objectives in a Government Environment
access based on a user’s role, time of day and the content type. For example,
Facebook access may be permissible during certain hours but not the games
offered through the site.
By limiting bandwidth consumption and setting application priorities, it’s
possible to provide access to social networking and multimedia content and
still ensure mission-critical applications operate at acceptable levels. For
example, employees can view YouTube, but only with 8% bandwidth. And if
a mission-critical application periodically requires additional bandwidth,
lower priority applications and traffic can be further restricted. Thus,
employees can access bandwidth-consuming applications without impacting
key agency functions.
Blue Coat PacketShaper provides these granular features with integrated
visibility and control capabilities in a single appliance. With PacketShaper’s
application performance monitoring capabilities, IT can identify all the
applications on the network and monitor response times and utilization at
the application level. Web traffic can be correlated with URL categories to
ensure mission-critical application bandwidth requirements are met before
social networking, for example. Social networking access would remain
available during these times, although with reduced performance due to its
lower priority.
Mobile Security
Mobile and remote workers also require web filtering for front-line
protection against malware and phishing attacks. Mobile workers have
a far greater need for effective security because they typically operate in
unsecured environments such as airports, hotels or on their home networks.
Because these systems frequently operate outside of the corporate network,
they face threats that go beyond social networking.
Blue Coat ProxyClient™ provides a critical way to protect mobile and remote
workers on any network. ProxyClient is centrally managed and enforces the
organization’s policies on web access, and works with the WebPulse cloud
service to gather the latest categorization intelligence. But ProxyClient also
delivers WAN optimization to help deliver a headquarters work experience
to all employees wherever they are. With ProxyClient, you can define
which applications to accelerate and which to block based on security and
9
< >
Balancing Social Networking with Network Security Objectives in a Government Environment
bandwidth requirements. As a result, web filtering is the perfect
complement to the end-point antivirus solution, which has become
standard on end points.
User Education
In addition to addressing technology gaps, you also have to educate users
about social networking security problems that stem from simple human
error. And while the end user will likely remain the number one security
risk for any organization, dramatic results can be achieved with just general
security training.
Education should begin
with the basics, but can
be placed in the context of
social networking to make
them fresh and interesting.
For example, good login
and password practices
are a common problem
within social networking.
Routinely changing login
credentials and protecting the confidentiality of passwords are basic security
requirements – or should be. While this may sound like common sense,
the recent “Climategate” fiasco may have been caused by one scientist
who actually included his password in his email signature.xi So even highly
educated users need to be reminded about basic security measures.
Cybercriminals also know that many users use the same login ID and
password on multiple sites, which enables attackers to easily gain access
to social networking accounts. In one instance, many Twitter accounts were
hacked when users were tricked into creating an account on a fake torrent
site.xii Other examples that are much less dramatic, but occur much more
frequently, take place when users try to share something to a select group
in an appropriate way, but do not realize that the way they shared it made it
available to a broader group.
Some applications may be popular enough to reasonably provide in-depth
application training for users. A great example of an easily avoidable issue
recently occurred when over 100 million Facebook pages were compromised
simply because most users did not understand some of the security settings
10
< >
Balancing Social Networking with Network Security Objectives in a Government Environment
available.xiii It may be worthwhile to start surveying users to identify their
needs, applications of choice and perhaps even their own list of concerns.
Then prepare a plan to ensure users are aware of how to use those
applications safely.
Also, users need to be reminded that there are no safe zones on the web
– including social networking sites. Assume that everything revealed on a
social networking site will be visible on the Internet forever. Once it has been
searched, indexed and cached, it may later turn up online no matter what
steps are taken to delete it.
Finally, most users are no different than IT – no one reads the manual. So
many users won’t really understand security guidelines until they violate
them once or twice. “Coaching screens” are informational pop-ups or
browser redirects that would appear at the instant a violation occurs to
inform the user they have violated a policy, someone else knows about
it, and explains how to prevent it from happening again. From a product
standpoint, IT should look for solutions that not only provide security, but can
also support education efforts.
Conclusion
Social networking has achieved a level of popularity that
requires reasonable access at work, but it is also sufficiently
mature to bring value to many businesses. But safe social
networking requires an aggressive and layered security
strategy at the web gateway, as well as the definition of new
usage policies and priorities from management and IT. Better
end-user education will also be required to ensure workers
use social networking applications safely and appropriately.
The combination of layered security and education can help
organizations dramatically reduce the risks from malware,
phishing, data loss and bandwidth abuse.
Why is all this necessary? As Jon Otsik of the Enterprise Strategy Group
said, “Clearly, cybercriminals are taking advantage of social networking’s
fundamental model of familiarity, trust, sharing and open communications
to dupe users and steal valuable data.”xiv To close these security gaps, IT
and business leaders must ensure they have the right security strategies
in place to identify and protect against the rapid evolution of social
networking threats.
11
< >
Balancing Social Networking with Network Security Objectives in a Government Environment
The Wall Street Journal, October 12, 2009: “Why email no longer rules…”
http://online.wsj.com/article/SB10001424052970203803904574431151489408372.html
i
Burson-Marsteller, February 23, 2010: “The Global Social Media Check-up.”
http://www.burson-marsteller.com/Innovation_and_insights/blogs_and_podcasts/BM_
Blog/Lists/Posts/Post.aspx?ID=160
ii
Softpedia, August 21, 2010: “Malware Used to Steal South Korean Military Secrets”
http://news.softpedia.com/news/Malware-Used-to-Steal-South-Korean-MilitarySecrets-153153.shtml
iii
Sophos, February 2010: “Security Threat Report: 2010”
http://www.sophos.com/pressoffice/news/articles/2010/02/security-report-2010.html
iv
Blue Coat Security Labs: “Web Security Report for 2009”
http://dc.bluecoat.com/content/SecurityReport2010?refer=securitylab
v
Mashable, May 12, 2010: “Facebook Attracts More Phishing Attacks Than Google and IRS”
http://mashable.com/2010/05/12/facebook-phishing-target/
vi
Blue Coat Security Labs, 2009
vii
Forrester Research, April 16, 2009: “The Forrester Wave™: Web Filtering, Q2 2009”
viii
eWeek, April 29, 2010: “How to Integrate Data Loss Protection in Web 2.0 Security
Strategies” http://www.eweek.com/c/a/Web-Services-Web-20-and-SOA/How-toIntegrate-Data-Loss-Protection-in-Web-20-Security-Strategies/
ix
Forrester Research, April 16, 2009
x
TechWorld, November 26, 2009
xi
SC Magazine, February 4, 2010: “Twitter accounts compromised in torrent site scam”
http://www.securecomputing.net.au/News/166357,twitter-accounts-compromised-intorrent-site-scam.aspx
xii
SC Magazine, July 30, 2010: “100 million Facebook accounts exposed”
http://www.securecomputing.net.au/News/221419,100-million-facebook-accountsexposed.aspx
xiii
Enterprise Strategy Group, July 2010: “Cloud-based Community Security”
http://dc.bluecoat.com/content/ESG
xiv
12
< >
Blue Coat Systems, Inc. • 1.866.30.BCOAT • +1.408.220.2200 Direct
+1.408.220.2250 Fax • www.bluecoat.com
Copyright © 2010 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be
reproduced by any means nor translated to any electronic medium without the written consent of Blue Coat
Systems, Inc. Specifications are subject to change without notice. Information contained in this document is
believed to be accurate and reliable, however, Blue Coat Systems, Inc. assumes no responsibility for its use. Blue
Coat, ProxySG, PacketShaper, CacheFlow, IntelligenceCenter and BlueTouch are registered trademarks of Blue
Coat Systems, Inc. in the U.S. and worldwide. All other trademarks mentioned in this document are the property
of their respective owners.
v.WP-BALANCE-SOCIALNETWORKS-NETWORK-SECURITY-OBJECTIVES-V1-1110