War Gaming: Necessary ExercisesPublished 13th Apr 2009 | Source - Intel | Pages - 4
Several times a year, Intel employees meet and plot how to hijack shipments of microprocessors, sell our intellectual property to competitors, blackmail our coworkers, and hack our networks. And we pay them to do it. We even provide lunch.
This is war gaming. For a few days we give the group a hypothetical target-some asset we want to protect - and ask them to think like blackmailers, hackers, terrorists, and hijackers. Intel's Information Security team uses those malicious plots to identify holes in our defenses and patch them, so that Intel assets remain safe.
Who are Threat Agents, and What Do They Want?
We have identified numerous archetypes, called threat agents, that differ in intent, capability, and resources. They all endanger your assets.The lone teenage hacker proving his acumen is a stereotype from the 1980s (think of Matthew Broderick in the 1983 film called, coincidentally, "WarGames"), and is a minor threat today. Now, other threat agents like terrorists and disgruntled employees are out to cause your company embarrassment or financial damage. Organized crime or hostile governments might want your property or secrets for resale. An attacker might be part of a well-resourced, ultra-sophisticated syndicate, or a lone opportunist from inside your company.
But not all threat agents are attackers. Some are simply untrained employees who create security gaps, or honest people with more network access than they require to do their jobs.
Every threat agent, hostile or not, endangers a company's assets. For a bank, the asset is obviously money. For a tobacco company, it is cartons of cigarettes, and for years those companies were targeted by hijackers who knew when and where to intercept trucks.
Intel produces microprocessors, which are like gemstones in terms of high value in a small package. So our assets are our products, as well as our product designs, high-value equipment, financial databases, and employee records. Indeed, employee records are a very attractive target for organized crime intent on identity theft.
Download this whitepaper to know how Palo Alto Networks’ security solution can meet the network security demands found in both types of datacenter environments: Internal and Internet-based, eliminate many of the unacceptable compromises related to datacenter network security and increase flexibility, achieve greater visibility and easily integrate threat prevention.Source Palo Alto Network
Download this whitepaper to know how Palo Alto Networks delivers threat prevention against all threats – known and unknown, how Palo Alto Networks’ consistent security policies help enterprises with the dynamic nature of modern networks and what makes Palo Alto Networks a highly efficient solution to operate.Sponsored by Palo Alto Network
Download this whitepaper to know how IT teams can actively test unknown files to determine if they are malicious, look at internal traffic for threats and anomalies that can reveal an attack and achieve flexibility of updates to keep pace with evolving attack techniques.Source Palo Alto Network