More than 75,000 unique visitors read papers in the Reading Room every month and it has become the starting point for exploration of topics ranging from SCADA to wireless security, from firewalls to intrusion detection. The SANS Reading Room features over 2,230 original computer security white papers in 83 different categories.
Latest 25 Papers Added to the Reading Room
The Spy with a License to Kill
by Matthew Hosburgh - October 24, 2014 in SCADA
The opening scene of GoldenEye underscores the skills and precision of James Bond, 007. Years of experience and training make impossible missions look routine. These skills alone would not allow 007 to succeed; rather, a calculated plan that targeted the vulnerabilities in the Archangel Chemical Weapons Facility coupled with 007's skills provided for a successful mission.
Detect, Investigate, Scrutinize and Contain with Rapid7 UserInsight
by Jerry Shenk - October 23, 2014 in Security Awareness
- Associated Webcasts: Detecting Risky Activity "Wherever" Before It Becomes A Problem
- Sponsored By: Rapid7 Inc.
A review of Rapid7 UserInsight by SANS senior analyst Jerry Shenk. It discusses a tool that highlights user credential misuse while tracking endpoint system details that would be valuable to an incident response team.
Intelligence-Driven Incident Response with YARA
by Ricardo Dias - October 20, 2014 in Forensics
The concept of threat intelligence is gaining momentum in the cyber-security arena. As targeted attacks increase in number and sophistication, organizations are beginning to develop and integrate the concept of threat intelligence into their cyber-defensive strategies. By doing so, organizations are taking the next step forward to respond to cyber-attacks. Recent threat reports reveal promising results.
Reducing the Catch: Fighting Spear-Phishing in a Large Organization
by Joel Anderson - October 20, 2014 in Forensics
The phishing problem isn't new. Over 150 years ago, Charles Dickens wrote a passionate and witty letter about fraudsters of his day who, like Nigerian 419 scammers today, preyed upon the generosity and gullibility of well-meaning folk. The differences in our time are that of scale and scope, as the perpetrators have taken on seven league boots and covered continents with their shameless appeals.
Breaches Happen: Be Prepared
by Stephen Northcutt - October 14, 2014 in Risk Management
A whitepaper by SANS Analyst and Senior Instructor Stephen Northcutt. It describes how improved malware reporting and gateway monitoring, combined with security intelligence from both internal and external resources, helps organizations meet the requirements of frameworks such as the Critical Security Controls.
An Analysis of Meterpreter during Post-Exploitation
by Kiel Wadner - October 14, 2014 in Forensics
Much has been written about using the Metasploit Framework to gain access to systems, utilizing exploits, and the post-exploitation modules. What has received less attention is how they work, what they actually do on the system and how it can be detected. That is the focus of this research paper.
Forensicator FATE - From Artisan To Engineer
by Barry Anderson - October 13, 2014 in Forensics
The SANS Investigative Forensic Toolkit (SIFT) is an awesome set of (free!) tools for the forensics professional. Using these tools effectively however can be overwhelming, especially in the case of a large complex case such as an APT intrusion.
Finding the Advanced Persistent Adversary
by Fayyaz Rajpari - October 10, 2014 in Hackers
The Advanced Persistent Threat was born long before the days of computers. However, the security industry has brought more emphasis to this scare-word. Its first real use as the term APT came from the US Air force in 2006 due to the sole fact that nation state and government backed espionage turned to significantly more advanced attacks.
Hardening Retail Security
by John Pescatore - October 10, 2014
- Associated Webcasts: Hardening Retail Security: Why and How to Prevent Breaches and Attacks
- Sponsored By: LogRhythm
Read this article and learn what IT security staff in the retail industry say about their security budgets, behavioral baselining, and endpoint forensics practices.
Analytics and Intelligence Survey 2014
by Dave Shackleford - October 8, 2014
- Associated Webcasts: 2nd Annual Analytics and Intelligence Survey 2nd Annual Analytics and Intelligence Survey - Pt 2. Future State: Improving Intelligence and Threat Protection
- Sponsored By: McAfee, a division of Intel Security HP LogRhythm Rapid7 Inc. AlienVault ThreatStream
This paper explores the use of analytics and intelligence today and exposes the impediments to successful implementation.
Security Operations Centre (SOC) in a Utility Organization
by Babu Veerappa Srinivas - October 7, 2014 in SCADA
Cyber security threats are an increasing manifold, irrespective of the size of an organization. This is evident after reviewing many industry reports such as Verizon 2014 Data Breach Investigation Report (Verizon, 2014), Trustwave 2014 Global Security Report ((Trustwave, 2014) and Symantec Internet Security Threat Report 2014 (Symantec, 2014).
Ninth Log Management Survey Report
by Jerry Shenk - October 3, 2014
Using the results of the 2014 Log Management Survey, this paper identifies strengths and weaknesses in log management systems and practices, and provides advice for improving visibility across systems with proper log collection, normalization and analysis.
Data Charging Bypass: How your IDS can help.
by Hassan Mourad - October 2, 2014 in Mobile Security
The recent increase in the number of smart devices, the introduction of high speed mobile connections (4G/LTE), as well as the hype in social networking has all led to the dramatic increase in mobile Internet traffic.
A Practical Big Data Kill Chain Framework
by Brian Nafziger - October 2, 2014 in Information Warfare
Traditional toolsets using atomic syntactic-based detection methods have slowly lost the ability, in and of themselves, to detect and respond to today's well-planned, multi-phased, multi-asset, and multi-day attacks thereby leaving a gap in detecting these attacks.
Creating a Threat Profile for Your Organization
by Stephen Irwin - October 2, 2014 in Threats/Vulnerabilities
Developing a detailed threat profile, provides organizations with a clear illustration of the threats that they face, and enables them to implement a proactive incident management program that focuses on the threat component of risk. Organizations are facing new types of advanced persistent threat (APT) scenarios that existing risk management programs are not able to evaluate completely and incident management programs are not able to defend against. This paper provides information about how to expand existing risk management models to better illustrate APTs and provides a framework on how to gather threat related information so that detailed threat profiles that include APTs can be developed for organizations.
Next Generation Firewalls and Employee Privacy in the Global Enterprise
by Ryan Firth - September 30, 2014 in Legal Issues, Work Monitoring
An obligation to protect company resources is something nearly every organization tries to instill in their staff.
Validating Security Configurations and Detecting Backdoors in New Network Devices
by Christoph Eckstein - September 30, 2014 in Network Devices
With the discovery of admin (root level) backdoors in network devices of Barracuda in January last year, it once again has become apparent that internet-facing network devices are vulnerable to unauthorized remote access (Goodin, Secret backdoors found in firewall, VPN gear from Barracuda Networks, 2013).
A Guide on How to Find Cardholder Data without Automated Tools for PCI Assessors
by Christian Moldes - September 30, 2014 in Auditing & Assessment
The PCI Data Security Standard requires organizations to determine the scope of their compliance obligation accurately. A critical aspect of PCI DSS scope definition is identifying all the locations where cardholder data is stored. During the course of an assessment, PCI Assessors must validate that the perceived compliance scope is in fact accurately defined and documented. Automated discovery tools, while effective to find cardholder data, sometimes are not an option due to the negative impact they may have in a production environment. In this paper, the author discusses audit techniques and tips on how to find cardholder data without using automated tools.
Home Field Advantage - Using Indicators of Compromise to Hunt down the Advanced Persistent Threat
by Matthew Toussain - September 25, 2014 in Intrusion Detection
Current cyber defense strategies focus on building a wall around the network and "digging in". Behind this cyber version of the Maginot Line, network defenders attempt to block adversary intrusions in any way possible.
Modeling Security Investments With Monte Carlo Simulations
by Dan Lyon - September 24, 2014 in Data Loss Prevention, Security Modeling
Technical leaders and architects are frequently the interface from sponsors and management into projects.
A Qradar Log Source Extension Walkthrough
by Michael Stanton - September 22, 2014 in Logging Technology and Techniques
The acronym SIEM refers to "Security Information and Event Management". Due to the many and varied functions provided, a concise definition is illusive.
Security Visibility in the Enterprise
by Jim Hendrick - September 19, 2014 in Project Management
A large (Fortune 100) company decided to improve its corporate "security visibility." Through this effort they intended to move from simply meeting regulatory and compliance requirements toward a more mature model capable of focusing on specific areas of risk.
Forensic Images: For Your Viewing Pleasure
by Sally Vandeven - September 19, 2014 in Forensics
Digital forensic investigations often involve creating and examining disk images. A disk image is a bit-for-bit copy of a full disk or a single partition from a disk. Because the contents of a disk are constantly changing on a running system, disk images are often created following an intrusion or incident to preserve the state of a disk at a particular point in time.
Critical Security Controls: From Adoption to Implementation
by James Tarala - September 18, 2014 in Auditing & Assessment, Standards, Threats/Vulnerabilities
- Associated Webcasts: The Critical Security Controls: From Adoption to Implementation A SANS Survey
- Sponsored By: Qualys Tripwire, Inc. McAfee, a division of Intel Security EiQnetworks
This SANS survey report explores how widely the CSCs are being adopted, as well as what challenges adopters are facing in terms of implementation of the controls and what they are looking for to improve their implementation practices.
MalwareD: A study on network and host based defenses that prevent malware from accomplishing its goals.
by Dave Walters - September 17, 2014 in Best Practices, Intrusion Prevention, Threats/Vulnerabilities
Malware is an ever-growing problem on the Internet. Organizations struggle to prevent, detect, and responds to malware threats.
All papers are copyrighted. No re-posting or distribution of papers is permitted.