02.12.2019 Views

Cyber Defense eMagazine December 2019

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

98<br />

Some of the most damaging Insider Data Breaches that occurred in <strong>2019</strong> include:<br />

• Capital One data breach that compromised the personnel data of 100 million customers. Capital<br />

One encrypts data as a standard, however since the breach was done by a rogue insider, the<br />

insider was able to steal decrypted confidential database data.<br />

• Trend Micro had a rogue employee that sold the confidential data of 68,000 customers to a third<br />

party.<br />

• Two Twitter employees leaked proprietary and confidential user data for over 6,000 Twitter users.<br />

• AT&T employees were bribed by a foreign national to plant malware and unlock 2 million phones<br />

How to Protect Confidential Database Data from Insider Threats and Hackers?<br />

Confidential database data includes: credit card, tax ID, medical, social media, corporate, manufacturing,<br />

law enforcement, defense, homeland security and public utility data. This data is almost always stored in<br />

Cassandra, DB2, Informix, MongoDB, MariaDB, MySQL, Oracle, PostgreSQL, SAP Hana, SQL Server<br />

and Sybase databases. Once inside the security perimeter a Hacker or Rogue Insider can use commonly<br />

installed database utilities to steal confidential database data.<br />

Non-intrusive network sniffing can capture and analyze the normal database query and SQL activity from<br />

a network tap or proxy server with no impact on the database server. This SQL activity is very predictable.<br />

Database servers servicing 10,000 end-users typically process daily 2,000 to 10,000 unique query or<br />

SQL commands that run millions of times a day.<br />

Advanced SQL Behavorial Analysis of Database Query and SQL Activity<br />

Advanced SQL Behavioral Analysis of the database SQL activity can learn what the normal database<br />

activity is. Then from a network tap or proxy server the database query and SQL activity can be nonintrusively<br />

monitored in real-time and non-normal SQL activity immediately identified. Non-normal SQL<br />

activity from Hackers or Rogue Insiders can be detected in a few mili seconds. The Hacker or Rogue<br />

Insider database session can be immediately terminated and the Security Team notified so that<br />

confidential database data is not stolen.<br />

Advanced SQL Behavioral Analysis of the query activity can go even further and learn the maximum<br />

amount of data queried plus the IP addresses all queries were submitted from for each of the 2,000 to<br />

10,000 unique SQL queries sent to a database. This type of data protection can detect never before<br />

observed query activity, queries sent from a never observed IP address and queries sending more data<br />

to an IP address than the query has ever sent before. This allows real-time detection of Hackers and<br />

Rogue Insiders attempting to steal confidential web site database data. Once detected the security team<br />

can be notified within a few milli-seconds so that a data breach is prevented.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!