Skip to main content
Part of complete coverage on

Cloud threats and firewalls: Internet guru demystifies cyber security

STORY HIGHLIGHTS
  • Gil Shwed is the CEO of Check Point, a leading name in computer security software
  • He says Check Point provide security software used by every Fortune 100 company
  • Company launching a new collaborative approach to cyber security called "ThreatCloud"
  • "ThreatCloud" will share information on attempted cyber attacks between users

Tel Aviv, Israel (CNN) -- Gil Shwed is an Israeli programmer and entrepreneur who is regarded as one of the fathers of modern Internet security.

He got his first job writing software at the age of 12, and by 1993, at the age of 24, he formed the Internet security company Check Point with two business partners and a borrowed computer in his associate's grandmother's apartment in Tel Aviv.

Check Point created the first firewall using "stateful inspection" -- the second-generation of firewall technology widely used today.

In the years since, hacking has become big business -- one of the fastest growing areas of crime, according to Interpol, with an estimated global cost of $1 trillion a year.

Read: Materials that magically mend themselves

As a result, his company Check Point now has grown to boast nearly 3,000 staff and accounts for one third of the global security software market, with its security software used by every Fortune 100 company.

"In 1993, most people didn't know what the Internet is all about," says Shwed, who sensed the Internet would be big but had no idea it would grow to become as central to modern life as it has.

"Twenty years ago, the typical hacker was like a student trying to show his technical skills with no bad intentions. Today it's governments, sophisticated organizations
Gil Shwed, Check Point

"I never imagined the Internet to have such a huge effect on the world or for Check Point to be a company that sells for nearly a billion-and-a-half dollars today," he said.

But as vital as the Internet -- and by extension, cyber security -- has become to our lives, few of us really have a handle on how it works. Here, Shwed explains of some of the basic concepts.

What's a firewall?

A firewall is a piece of software or hardware that protects the security of a computer network -- be it a home or business network -- by controlling incoming and outgoing traffic between the network and the rest of the Internet.

Some form of security is necessary to protect computer networks from hackers.

"Basically, a simple system connected to the Internet, every hacker can break in in a few seconds. You put some layers of security; the efforts required to break in are becoming bigger."

A firewall works by analyzing incoming data packets and determining whether they should be allowed through.

Read: Smartphone knows if you're happy or sad

"It can just sit in the entrance to the organization like a door and you block whoever goes in or goes out," says Shwed.

"It knows how to analyze the traffic and basically classify each type of connection."

Today, firewalls are becoming increasingly complicated, says Shwed.

Harvesting rubber from dandelions
The bionic hand with the human touch
Invention makes objects liquid repellent

"There are multiple layers and you need to provide... many different types of protection, many different types of the system," he says.

"Today, the firewall does probably ten more things: it knows how to encrypt your traffic when you communicate with mobile devices, it knows how to scan the data for potential leakage... It knows how to look for very sophisticated attacks; it knows how to look for bots."

What are bots?

Also known as web robots, bots are software applications that run automated tasks over the Internet, and are often used for malicious purposes.

"Bots are small software agents that sit on our personal computers. They hide there, they communicate with their operator which tells them what bad things to do," says Shwed.

Bots can often be disguised in legitimate-looking content to infect vulnerable computer networks.

Read: Will dandelion tires gain traction?

"(The firewall) knows how to find these kinds of communications that disguise themselves in sort of legal communications."

Computers infected with malicious bots can be by directed by the third party controlling them -- known as a "bot herder" -- to perform tasks en masse, such as a distributed denial of service, or DDoS attack. In a DDoS attack, massive networks of infected "zombie" computers are directed to target a system with traffic, overloading and effectively crashing the targeted network.

How has the threat environment changed?

"Twenty years ago, the typical hacker was like a student trying to show his technical skills with no bad intentions," says Shwed. "Today it's governments, sophisticated organizations."

He said that "every business today is facing hundreds, if not thousands of attacks everyday. And these attacks can go from small things that slow you down to bad things that will stop your business right away immediately.

"The general break-ins are not happening by targeted attacks ... the general attacks (come through) tools that scan the Internet and find the place to break in ...
Gil Shwed, Check Point

"That motivation can be political, it can be financial -- stealing data or things like that. It can be extortion."

The extortion could take the form of a threat to take down a network if a sum was not paid, or a more subtle approach.

"We've seen several cases where somebody calls an organization and says 'I'm a security researcher, I've found that your company is being targeted. I'll let you know how to block it if you pay me my consulting fees.' It can start from small amounts, $5000, $15000."

But while large companies and governments were obvious and attractive targets, home computer users were just as vulnerable, as general attacks were aimed at security vulnerabilities, rather than specific targets.

"The general break-ins are not happening by targeted attacks, by somebody trying to attack you or your organization. The general attacks (come through) tools that scan the Internet and find the place to break in -- and wherever they can break in, they'll break into."

It sounds overwhelming. Are there any new approaches to the problem?

Shwed's company has a new product called ThreatCloud, which it bills as the first collaborative approach to fighting cybercrime.

"One of the things we realized about two years ago is that today every company, every person in the world fights cyber threats individually. We all install systems, we're all being attacked, in many cases, by the same people, thousands of times a day.

"So what we came up with was that idea of a threat cloud. And ThreatCloud is like a collaboration network -- whenever a customer network sees an attack or sees something suspicious, it reports to the ThreatCloud service (which) analyzes threats from multiple sources.

"If it finds out that it's actually an attack, it can automatically update the rest of the world and let everybody enjoy that intelligence, that know-how that some attack has been happening and everybody should block that source."

ADVERTISEMENT
Part of complete coverage on
June 24, 2014 -- Updated 0909 GMT (1709 HKT)
Discover a dancing cactus field, basketball on the Hudson River, and mind-bending 3D projections on robotic screens.
May 23, 2014 -- Updated 1707 GMT (0107 HKT)
Would you live there? Design student Peter Trimble says it's actually a surprisingly good idea.
May 14, 2014 -- Updated 1450 GMT (2250 HKT)
Alpha Sphere
Singing Tesla coils, musical ice cream, vegetables on drums... and this ball? Find out how "hackers" have created a new generation of instruments.
May 28, 2014 -- Updated 1643 GMT (0043 HKT)
Technology has long learned from nature, but now it's going micro. "Cellular biomimicry" sees designers take inspiration from plant and animal cells.
April 9, 2014 -- Updated 1708 GMT (0108 HKT)
Forget wearable tech, embeddable implants are here. Learn more about the pioneers who are implanting devices into their bodies.
May 7, 2014 -- Updated 1026 GMT (1826 HKT)
A visitor of the 'NEXT Berlin' conference tries out Google Glass, a wearable computer that responds to voice commands and displays information before your eyes. It is expected to go to market in late 2013.
We know how wearable tech can enhance our fitness lives but there's evidence that its most significant application is yet to come: the workplace.
April 10, 2014 -- Updated 0813 GMT (1613 HKT)
Samsung's research unit announces new way to synthesize graphene, potentially opening the door to commercial production.
March 31, 2014 -- Updated 1215 GMT (2015 HKT)
iRobot, creators of vacuuming robot Roomba reveal how they learned from secret experiments -- in space travel, minefields, and toys.
March 28, 2014 -- Updated 1623 GMT (0023 HKT)
A light-bulb glowing in middle of a room with no wires attached. "It's the future," says Dr Katie Hall.
March 3, 2014 -- Updated 1626 GMT (0026 HKT)
Knee replacements that encourage cells to regrow could soon be manufactured -- by spiders. Find out how.
February 14, 2014 -- Updated 1403 GMT (2203 HKT)
Meet Chuck Hull: the humble American engineer who changed the world of manufacturing.
February 6, 2014 -- Updated 1448 GMT (2248 HKT)
The key to self-knowledge? Or just the return of the phony "mood ring"? Check out our top mood-sensing technology in development.
February 4, 2014 -- Updated 0952 GMT (1752 HKT)
Inside the incredible cardboard Boeing 777 that's taken one man 10,000 hours to build.
January 30, 2014 -- Updated 1611 GMT (0011 HKT)
We climb inside the Aouda.X: an "intelligent" spacesuit designed for the most treacherous environment yet to be encountered by a human.
January 8, 2014 -- Updated 2045 GMT (0445 HKT)
Is that Tupac and Sinatra performing live? How did that happen?! Meet Eyeliner: the optical system that can bring the dead back to life.
ADVERTISEMENT