Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Taking a new approach to combating cyber threats

Zafirah Salim and Nurdianah Md Nur | March 10, 2015
Speakers at the Computerworld Security Summit 2015 in Singapore share tips for IT leaders to effectively secure their organisations based on risk assessment, user policies and asset management.

While speed to service provision would be a great advantage, associated with it then would be security,which would become ven more important when the network was virtualised, said Rahabok.

He also explained the philosophy behind Zero Trust, a way of thinking about network security by "not trusting packets as if they were people," he said. Instead, security professionals should eliminate the idea of a trusted network (usually the internal network) and an untrusted network (external networks).

In Zero Trust, all network traffic is untrusted. Thus, security professionals must verify and secure all resources, limit and strictly enforce access control, and inspect and log all network traffic.

Zero Trust mandates that IT managers treat all network traffic as untrusted. Zero Trust does not claim that employees are untrustworthy; instead it claims that trust is a concept that should not be applied to packets, network traffic and data. "The malicious insider reality demands a new trust model," said Rahabok. "By changing the trust model, we reduce the temptation for insiders to abuse or misuse the network, and we improve our chances of discovering security breaches before they impact the environment."

These approaches wrap security controls around much smaller groups of resources - often down to a small group of virtualised resources or individual VMs. Micro-segmentation has been understood to be a best approach from a security perspective, but difficult to apply in traditional environments.

When it comes to security patching, Rahabok believes that the solution must be "safe, simple, scalable and stable".

Interpol's role and effort in combating cybercrime

Next to take the stage was Dr Madan M. Oberoi, Director of Cyber Innovation and Outreach, Interpol Global Complex for Innovation.

According to Oberoi, Interpol has come up with a guide on tackling online crime. It is based on three pillars - operational support, harmonisation, and capacity building - that Oberoi wholly described as the "global alliance against cyber crime."

The first pillar, operational support, was about supporting member countries during cyber investigations and helping to coordinate joint operations, said Oberoi.

He added that within the Interpol Digital Crime Centre (IDCC), there is a Cybercrime Fusion Centre and a Digital Forensics Laboratory. The Cybercrime Fusion Centre provides essential assistance to Interpol's member countries throughout all stages of an investigation. It provides real-time monitoring and analysis of malicious online activity, giving member countries the intelligence and expertise required to be more effective in digital crimes investigation.

The Digital Forensics Laboratory, on the other hand, builds national digital forensic capacity through training, while at the same time providing practical forensic support to member countries during an investigation.

The second pillar, harmonisation, refers to the "unification of perspectives", said Oberoi. There are different jurisdictions involved in cybercrime investigations; and each of them has a different legal framework. He highlights that Interpol is working towards overcoming these varying legal structures to develop a more common approach.

 

Previous Page  1  2  3  4  5  6  Next Page 

Sign up for CIO Asia eNewsletters.