Cyber attacks in the area of telecommunications
The free exchanging of information is leading to new risks in the communications environment
In the telecommunications sector, every new order starts with detailed research on the internet. In contrast to banks or the public sector, all of the domains, including those with a low security status, also have to be accessible. This enables malware or viruses to be transferred rapidly to company systems, and the only thing that can stop them being sophisticated data protection systems.
The securing of the internal network is therefore a key priority of the data protection. These are the most sensitive variety of data segment and it is frequently the case that they do not have sufficient protection against cyber threats.
The conventional technology can slow the data traffic down
Firewalls, virus scanners, filters and encrypted ports are no longer sufficient for being able to respond to cyber threats sufficiently effectively. Since higher tier services also fail to offer sufficient protection, a combination of a firewall and honeyBox® is recommended.
Then there is the problem that active solutions can slow the circulation of the data down and impair the flow of data. Conventional IDS can cause speed-related problems with the internet connection. As a passive solution however, the honeypot appliance offers flawless protection without impairing the network traffic.
APT - The underestimated threat from the cyber sphere
An APT (advanced persistent threat) is the name given to a targeted attack that is carried out by experienced hackers to large-scale networks or systems and the associated theft of data or manipulation of systems over an extended time frame.
Hackers of this kind take a targeted and long term approach to their attacks, which are also configured on a sophisticated basis, making them hard to detect. According to the BSI, research suggests that it takes an average of 87 to 229 days for an attack to be discovered. In extreme cases, it can take 2 to 3 years.
Using the honeyBox® can prevent such a scenario. The honeyBox® is capable of revealing and reporting these attacks. In this context, unwanted visitors are attracted to a virtual trap and an alarm is raised.
A monitoring of your LAN with IDS/IPS is insufficient
Companies require reliable data about the security status of their network. With IDS/IPS, this cannot, on the whole, be achieved. In contrast to this, with honeypots it is, on the whole, possible to detect cases of unauthorised access.
Situation: You do not use comprehensive monitoring in your LAN. Attacks to your internal systems can, however, cause considerable damage.
Implementation: With the use of the honeypot appliances, you rapidly gain a solution which can be used in order to detect internal attacks to your LAN. This makes changes to the network structure unnecessary.
The result: through the detection and possible logging of attacks, you receive up-to-date notification on whether hackers are active in your network. If required, you can introduce steps so as to contain and analyse the attack.