Skip to main content
Part of complete coverage on

Cloud threats and firewalls: Internet guru demystifies cyber security

STORY HIGHLIGHTS
  • Gil Shwed is the CEO of Check Point, a leading name in computer security software
  • He says Check Point provide security software used by every Fortune 100 company
  • Company launching a new collaborative approach to cyber security called "ThreatCloud"
  • "ThreatCloud" will share information on attempted cyber attacks between users

Tel Aviv, Israel (CNN) -- Gil Shwed is an Israeli programmer and entrepreneur who is regarded as one of the fathers of modern Internet security.

He got his first job writing software at the age of 12, and by 1993, at the age of 24, he formed the Internet security company Check Point with two business partners and a borrowed computer in his associate's grandmother's apartment in Tel Aviv.

Check Point created the first firewall using "stateful inspection" -- the second-generation of firewall technology widely used today.

In the years since, hacking has become big business -- one of the fastest growing areas of crime, according to Interpol, with an estimated global cost of $1 trillion a year.

Read: Materials that magically mend themselves

As a result, his company Check Point now has grown to boast nearly 3,000 staff and accounts for one third of the global security software market, with its security software used by every Fortune 100 company.

"In 1993, most people didn't know what the Internet is all about," says Shwed, who sensed the Internet would be big but had no idea it would grow to become as central to modern life as it has.

"Twenty years ago, the typical hacker was like a student trying to show his technical skills with no bad intentions. Today it's governments, sophisticated organizations
Gil Shwed, Check Point

"I never imagined the Internet to have such a huge effect on the world or for Check Point to be a company that sells for nearly a billion-and-a-half dollars today," he said.

But as vital as the Internet -- and by extension, cyber security -- has become to our lives, few of us really have a handle on how it works. Here, Shwed explains of some of the basic concepts.

What's a firewall?

A firewall is a piece of software or hardware that protects the security of a computer network -- be it a home or business network -- by controlling incoming and outgoing traffic between the network and the rest of the Internet.

Some form of security is necessary to protect computer networks from hackers.

"Basically, a simple system connected to the Internet, every hacker can break in in a few seconds. You put some layers of security; the efforts required to break in are becoming bigger."

A firewall works by analyzing incoming data packets and determining whether they should be allowed through.

Read: Smartphone knows if you're happy or sad

"It can just sit in the entrance to the organization like a door and you block whoever goes in or goes out," says Shwed.

"It knows how to analyze the traffic and basically classify each type of connection."

Today, firewalls are becoming increasingly complicated, says Shwed.

Harvesting rubber from dandelions
The bionic hand with the human touch
Invention makes objects liquid repellent

"There are multiple layers and you need to provide... many different types of protection, many different types of the system," he says.

"Today, the firewall does probably ten more things: it knows how to encrypt your traffic when you communicate with mobile devices, it knows how to scan the data for potential leakage... It knows how to look for very sophisticated attacks; it knows how to look for bots."

What are bots?

Also known as web robots, bots are software applications that run automated tasks over the Internet, and are often used for malicious purposes.

"Bots are small software agents that sit on our personal computers. They hide there, they communicate with their operator which tells them what bad things to do," says Shwed.

Bots can often be disguised in legitimate-looking content to infect vulnerable computer networks.

Read: Will dandelion tires gain traction?

"(The firewall) knows how to find these kinds of communications that disguise themselves in sort of legal communications."

Computers infected with malicious bots can be by directed by the third party controlling them -- known as a "bot herder" -- to perform tasks en masse, such as a distributed denial of service, or DDoS attack. In a DDoS attack, massive networks of infected "zombie" computers are directed to target a system with traffic, overloading and effectively crashing the targeted network.

How has the threat environment changed?

"Twenty years ago, the typical hacker was like a student trying to show his technical skills with no bad intentions," says Shwed. "Today it's governments, sophisticated organizations."

He said that "every business today is facing hundreds, if not thousands of attacks everyday. And these attacks can go from small things that slow you down to bad things that will stop your business right away immediately.

"The general break-ins are not happening by targeted attacks ... the general attacks (come through) tools that scan the Internet and find the place to break in ...
Gil Shwed, Check Point

"That motivation can be political, it can be financial -- stealing data or things like that. It can be extortion."

The extortion could take the form of a threat to take down a network if a sum was not paid, or a more subtle approach.

"We've seen several cases where somebody calls an organization and says 'I'm a security researcher, I've found that your company is being targeted. I'll let you know how to block it if you pay me my consulting fees.' It can start from small amounts, $5000, $15000."

But while large companies and governments were obvious and attractive targets, home computer users were just as vulnerable, as general attacks were aimed at security vulnerabilities, rather than specific targets.

"The general break-ins are not happening by targeted attacks, by somebody trying to attack you or your organization. The general attacks (come through) tools that scan the Internet and find the place to break in -- and wherever they can break in, they'll break into."

It sounds overwhelming. Are there any new approaches to the problem?

Shwed's company has a new product called ThreatCloud, which it bills as the first collaborative approach to fighting cybercrime.

"One of the things we realized about two years ago is that today every company, every person in the world fights cyber threats individually. We all install systems, we're all being attacked, in many cases, by the same people, thousands of times a day.

"So what we came up with was that idea of a threat cloud. And ThreatCloud is like a collaboration network -- whenever a customer network sees an attack or sees something suspicious, it reports to the ThreatCloud service (which) analyzes threats from multiple sources.

"If it finds out that it's actually an attack, it can automatically update the rest of the world and let everybody enjoy that intelligence, that know-how that some attack has been happening and everybody should block that source."

ADVERTISEMENT
Part of complete coverage on
updated 1:08 PM EDT, Wed April 9, 2014
Forget wearable tech, embeddable implants are here. Learn more about the pioneers who are implanting devices into their bodies.
updated 8:15 AM EDT, Mon March 31, 2014
iRobot, creators of vacuuming robot Roomba reveal how they learned from secret experiments -- in space travel, minefields, and toys.
updated 12:23 PM EDT, Fri March 28, 2014
A light-bulb glowing in middle of a room with no wires attached. "It's the future," says Dr Katie Hall.
updated 11:26 AM EST, Mon March 3, 2014
Knee replacements that encourage cells to regrow could soon be manufactured -- by spiders. Find out how.
updated 9:03 AM EST, Fri February 14, 2014
Meet Chuck Hull: the humble American engineer who changed the world of manufacturing.
updated 9:48 AM EST, Thu February 6, 2014
The key to self-knowledge? Or just the return of the phony "mood ring"? Check out our top mood-sensing technology in development.
updated 5:01 PM EST, Fri February 21, 2014
One of the Games' most impressive spectacles has nothing to do with sports. It's visitors' own faces, rendered on a giant morphing wall.
updated 4:52 AM EST, Tue February 4, 2014
Inside the incredible cardboard Boeing 777 that's taken one man 10,000 hours to build.
updated 11:11 AM EST, Thu January 30, 2014
We climb inside the Aouda.X: an "intelligent" spacesuit designed for the most treacherous environment yet to be encountered by a human.
updated 9:23 AM EST, Fri January 24, 2014
The world's fastest supercar might soon be electric. The Rimac Concept_One is the Tesla-beating electric car, capable 300 kph.
updated 3:45 PM EST, Wed January 8, 2014
Is that Tupac and Sinatra performing live? How did that happen?! Meet Eyeliner: the optical system that can bring the dead back to life.
updated 8:19 AM EST, Wed January 15, 2014
From wearable technology to space tourism: we take a look through some of the most ground-breaking developments of the year ahead.
updated 7:16 AM EST, Thu December 19, 2013
In the past 12 months, several ventures have managed to raise over $1 million. Check out the projects that joined the Kickstarter millionaires' club.
updated 5:02 AM EST, Mon December 9, 2013
Watch digital artist Kyle Lambert's stunning photo-realistic iPad paintings emerge from a blank screen.
ADVERTISEMENT