Cyber Resillience ReportIn this document
What does it speak about?Cyber resilience is the ultimate goal, final display, summary page of the cybersecurity. The cyber risk posture is a snapshot of the risk any given moment; if you take tens of thousands of risk posture snapshot and correlate it with forensics and apply AI, you end up with Cyber Resilience Risk. According to Gartner, a leading research company, by 2025, 40% of programs will deploy socio-behavioral principles (such as nudge techniques) to influence security culture across the organization, up from less than 5% in 2021. And by 2025, 60% of organizations will use cybersecurity risk as a significant determinant in conducting third-party transactions and business engagements.
Cyber Resilience Risk can be calculated from many different datasets, DefensX provides a user centric, behavioral cyber resilience risk scoring. With more than 30 data-probes deployed in a traditional web browsers individual risk profiles are created while the end user is performing their routine tasks. Which lets the enterprise/MSP to focus on what and who matters most. It simply reduces the noise and pinpoints the individuals who most probably be the reason of the next breach. Cyber Risk = Likelihood × Impact While calculating the Cyber Resilience Risk, DefensX carefully manages the end user data. No critical data ever leaves the web browser and end user’s device. Proprietary algorithms run on the web browser context to prepare data points locally and only the analytics calculation and AI touch happens in the cloud on the intermediate data. In example, for the password dark web analysis, DefensX uses algorithms to create one way hash to perform the lookup. Password information never leaved the end-point. Following is an example report for 30 days of usage, where for an enterprise each individual employees are rated based on four main category: Password Hygiene, Social Engineering Risk, Malware Risk and Sensitive Data Exposure Risk. It is possible to drill down to every single event that has caused a risk increase for the individual. Password HyginePassword Hygine report was based on the data points created DefensX Browser Extension. Our extension always monitor password entry fields in any website on the client side. When a user enter a password, extension do the following jobs:
How pwned score calculation works? We’re using k-anonymity algorithm for checking the pwned database score for a given password. This is a proofed way of checking an item included in a database which is hosted on cloud without sending item or item’s full hash on the network. The same method also used internally by the Browser’s embedded password managers when they’re showing whether your saved passwords already included a data breach or not. Here you can find good articles from Cloudflare and Pwned database system about how the flows working without exposing any information on the network. In summary, checking a pwned score works like this:
As a result, we found the number without sending any meaningful information to the network. If the searched hash not found in this content, we can say that this password is not included any known data breach. How password strength calculation works? Choosing a good password is the first step of keeping our accounts safe. But latest development of the new hardwares specifically for graphics cards drammatically improved the calculated number of hash values. For example, if MD5 hash used for storing passwords a RTX 2080 GPU can find the password in given times:
We are using zxcvbn algortihm to check strength of a given password inside of the extension. Algorithm used here developed by the Dropbox as an open-source project which you can download it from Github. It is a well known and widely used algorithm to provide strengthness information for the password under 5 categories:
Javascript version of the algorithm embedded in DefensX extension, so there is no need to send any information on the cloud to calculate the password strength value. You can also find much information about the method in the zxcvbn: Low-Budget Password Strength Estimation USENIX Security Symposium article. Social EngineeringSocial engineering in its shortest explanation is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. Each digital employee is a potential attack target for social engineering, also known as the layer-8 problem. To better understand the risk attached to the social engineering, it is important to look at the attack life cycle: DefensX follows the footsteps of the individual and scores each action according to the "what is the most important for an attacker" principle. Anything exposes information that can be used at the information gathering step, for instance, increases the risk score for the individual employee. Also the time spent in certain web services which are the main source for information gathering increases the risk. Malware RiskTo be clear, DefensX is not focusing on the files themselves. On the contrary DefensX focuses on the human behavior towards the files on the Internet. EDR tools are best for assessing the risk for the files but leaves a great attack surface for the zero-days. They work aftermath because they require the malware to be deployed to do the analysis. DefensX lays the human-malware risk monitoring layer as the frontier line of defense and let the enterprise understand the risk attached to individual behavior. For instance, downloading random power point files to copy/paste some slides is not anything EDR’s can or will tackle, but it is a great source of individuals behavior. Similarly, downloading files from Bulletin boards say a lot about the individual risk behavior. DefensX data probes provide rich contextual information to be able to determine, which employee will most likely to become a victim of a malware and cause the next breach. Sensitive DataDefensX monitors the file uploads, passwords and similar data exposed over the Internet using web browsers. Individual actions taken during the monitoring period affects the sensitive data exposure risk score for the individual. |
||||||||||||||||||||||||||||||||||||