E N D
1. 2002 Symantec Corporation, All Rights Reserved Threats to Email Security Ken Schneider		
Chief Architect   Network & Gateway Security 
2. Current threat landscape
Techniques to fight spam
Phishing 
Whats Next?  
Questions? 
3. World-Wide Attack Trends  
4. Spam Continues to Grow and Evolve 
5. The Bullet is Fired Here was have some statistics showing how the rate of spread of computer worms has grown.  The high-profile Code Red threat, released in mid-2001, doubled its infection rate every 37 minutes.  Less than two years later, the Slammer worm, released in January of 2003, doubled its infection rate every 8.5 seconds!  At this rate, Slammer was able to infect 90% of unprotected servers across the Internet in just 10 minutes.
Many of the fastest-spreading threats exploit known vulnerabilities or holes in the operating system which have been publicly announced.  The time between the announcement of a known vulnerability and the release of a threat targeting that vulnerability is also diminishing.  During the summer of 2003, the Blaster threat was released just 27 days after the associated vulnerability was announced, the shortest such time period ever.  As this time period shrinks in the future, industrys ability to respond will be increasingly difficult.
Finally, the recent MyDoom worm infected email systems across the world  at its peak, 1 out of every 12 emails on the Internet carried MyDoom.
Clearly, the newest threats are spreading orders of magnitude too fast for any response-based security mechanism to stop.  And the threats of the future could make even Slammer seem slow by comparison.  We need to find fundamentally new ways to stop the bullet.
Code Red, Slammer references:http://news.com.com/2009-1001-983540.html
Blaster reference: Symantec Internet Security Threat Report
MyDoom reference: http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci946423,00.html
Here was have some statistics showing how the rate of spread of computer worms has grown.  The high-profile Code Red threat, released in mid-2001, doubled its infection rate every 37 minutes.  Less than two years later, the Slammer worm, released in January of 2003, doubled its infection rate every 8.5 seconds!  At this rate, Slammer was able to infect 90% of unprotected servers across the Internet in just 10 minutes.
Many of the fastest-spreading threats exploit known vulnerabilities or holes in the operating system which have been publicly announced.  The time between the announcement of a known vulnerability and the release of a threat targeting that vulnerability is also diminishing.  During the summer of 2003, the Blaster threat was released just 27 days after the associated vulnerability was announced, the shortest such time period ever.  As this time period shrinks in the future, industrys ability to respond will be increasingly difficult.
Finally, the recent MyDoom worm infected email systems across the world  at its peak, 1 out of every 12 emails on the Internet carried MyDoom.
Clearly, the newest threats are spreading orders of magnitude too fast for any response-based security mechanism to stop.  And the threats of the future could make even Slammer seem slow by comparison.  We need to find fundamentally new ways to stop the bullet.
Code Red, Slammer references:http://news.com.com/2009-1001-983540.html
Blaster reference: Symantec Internet Security Threat Report
MyDoom reference: http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci946423,00.html
 
6. 2002 Symantec Corporation, All Rights Reserved Spam Filtering Technology 
7. AntiSpam Technology Approach Examine the source 
Examine the content 
Examine the call to action  (URL filters) 
8. Solutions Need Multi-Layered Defences Multiple technologies creates a comprehensive defence
Force spammers to contend with each layer 
9. 2002 Symantec Corporation, All Rights Reserved Phishing 
10. Phishing Theft of financial information and/or identity
Growing problem both in terms of magnitude and awareness
Targets expanding from Financial Services to all organizations with financial information online
Banks, ecommerce sites, phone companies, government agencies, etc.
Global problem  US, UK, Europe, Australia, South America 
11. Fraud is Bigger Threat than Spam 
12. Messages Are Deceptive 
13. Websites Are Also Deceptive 
14. Growth and Impact of Email Fraud 
15. 2002 Symantec Corporation, All Rights Reserved Whats Next? Mobile Threats/More Sophisticated Phishing 
16. Handheld Virus Propagation Through infected e-mail when using a PDA over a wired or wireless Internet connection 
When synching with an infected PC 
Via an infected file transferred from another PDA via infrared (IR) or Bluetooth 
By downloading infected files from the Internet 
17. Vectors of Delivery  Synching with a PC
 Peer to Peer Connectivity
Bluetooth
Infrared
 Telephony
GSM
GPRS
UTMS  Data Transfer
SMS
MMS
WAP
 Network Connectivity
WLAN (802.11)
PCMCIA Network Cards When you look at mobile devices they provide more vectors of delivery for malicious code and hence more opportunity to be exploited.When you look at mobile devices they provide more vectors of delivery for malicious code and hence more opportunity to be exploited. 
18. Indirect SMS Worm One example of a threat is an Indirect SMS womOne example of a threat is an Indirect SMS wom 
19. Indirect SMS Worm 
20. Indirect SMS Worm 
21. Policy and technology Technical solutions exist
No silver bullet
Insufficient/improper implementation
Lack of holistic approach
Security is a process not a just product
Lack of security in specific areas may mean inadequate overall security 
Lack of awareness
Businesses
Consumers
Policy makers
Technology is not the only solution
Coherent legal framework
Co-operation between the different actors
Governments  security professionals  communications industry
 
22. Legal & Regulatory Measures: Government International cooperation
Appropriate legislation (data protection, fraud, consumer protection, unfair competition)
Transposition of existing directives
Technological neutrality
Clear allocation of responsibilities between national authorities
Stronger enforcement of data protection rules
Tough penalties for individuals
Spammers should pay for the spam
Rules for evidence collection
 
23. Legal & Regulatory Measures:  Industry Distinguishing Spam from legitimate marketing
Using clear opt-out procedures
Use of clear codes of conduct
Cooperation with government
Implementation of best-practice technology
 
24. Awareness & Education Role of government in promoting understanding
Role of business as employers
Role of ISPs
Role of the individual