Skip to main content
Part of complete coverage on

Cloud threats and firewalls: Internet guru demystifies cyber security

STORY HIGHLIGHTS
  • Gil Shwed is the CEO of Check Point, a leading name in computer security software
  • He says Check Point provide security software used by every Fortune 100 company
  • Company launching a new collaborative approach to cyber security called "ThreatCloud"
  • "ThreatCloud" will share information on attempted cyber attacks between users

Tel Aviv, Israel (CNN) -- Gil Shwed is an Israeli programmer and entrepreneur who is regarded as one of the fathers of modern Internet security.

He got his first job writing software at the age of 12, and by 1993, at the age of 24, he formed the Internet security company Check Point with two business partners and a borrowed computer in his associate's grandmother's apartment in Tel Aviv.

Check Point created the first firewall using "stateful inspection" -- the second-generation of firewall technology widely used today.

In the years since, hacking has become big business -- one of the fastest growing areas of crime, according to Interpol, with an estimated global cost of $1 trillion a year.

Read: Materials that magically mend themselves

As a result, his company Check Point now has grown to boast nearly 3,000 staff and accounts for one third of the global security software market, with its security software used by every Fortune 100 company.

"In 1993, most people didn't know what the Internet is all about," says Shwed, who sensed the Internet would be big but had no idea it would grow to become as central to modern life as it has.

"Twenty years ago, the typical hacker was like a student trying to show his technical skills with no bad intentions. Today it's governments, sophisticated organizations
Gil Shwed, Check Point

"I never imagined the Internet to have such a huge effect on the world or for Check Point to be a company that sells for nearly a billion-and-a-half dollars today," he said.

But as vital as the Internet -- and by extension, cyber security -- has become to our lives, few of us really have a handle on how it works. Here, Shwed explains of some of the basic concepts.

What's a firewall?

A firewall is a piece of software or hardware that protects the security of a computer network -- be it a home or business network -- by controlling incoming and outgoing traffic between the network and the rest of the Internet.

Some form of security is necessary to protect computer networks from hackers.

"Basically, a simple system connected to the Internet, every hacker can break in in a few seconds. You put some layers of security; the efforts required to break in are becoming bigger."

A firewall works by analyzing incoming data packets and determining whether they should be allowed through.

Read: Smartphone knows if you're happy or sad

"It can just sit in the entrance to the organization like a door and you block whoever goes in or goes out," says Shwed.

"It knows how to analyze the traffic and basically classify each type of connection."

Today, firewalls are becoming increasingly complicated, says Shwed.

Harvesting rubber from dandelions
The bionic hand with the human touch
Invention makes objects liquid repellent

"There are multiple layers and you need to provide... many different types of protection, many different types of the system," he says.

"Today, the firewall does probably ten more things: it knows how to encrypt your traffic when you communicate with mobile devices, it knows how to scan the data for potential leakage... It knows how to look for very sophisticated attacks; it knows how to look for bots."

What are bots?

Also known as web robots, bots are software applications that run automated tasks over the Internet, and are often used for malicious purposes.

"Bots are small software agents that sit on our personal computers. They hide there, they communicate with their operator which tells them what bad things to do," says Shwed.

Bots can often be disguised in legitimate-looking content to infect vulnerable computer networks.

Read: Will dandelion tires gain traction?

"(The firewall) knows how to find these kinds of communications that disguise themselves in sort of legal communications."

Computers infected with malicious bots can be by directed by the third party controlling them -- known as a "bot herder" -- to perform tasks en masse, such as a distributed denial of service, or DDoS attack. In a DDoS attack, massive networks of infected "zombie" computers are directed to target a system with traffic, overloading and effectively crashing the targeted network.

How has the threat environment changed?

"Twenty years ago, the typical hacker was like a student trying to show his technical skills with no bad intentions," says Shwed. "Today it's governments, sophisticated organizations."

He said that "every business today is facing hundreds, if not thousands of attacks everyday. And these attacks can go from small things that slow you down to bad things that will stop your business right away immediately.

"The general break-ins are not happening by targeted attacks ... the general attacks (come through) tools that scan the Internet and find the place to break in ...
Gil Shwed, Check Point

"That motivation can be political, it can be financial -- stealing data or things like that. It can be extortion."

The extortion could take the form of a threat to take down a network if a sum was not paid, or a more subtle approach.

"We've seen several cases where somebody calls an organization and says 'I'm a security researcher, I've found that your company is being targeted. I'll let you know how to block it if you pay me my consulting fees.' It can start from small amounts, $5000, $15000."

But while large companies and governments were obvious and attractive targets, home computer users were just as vulnerable, as general attacks were aimed at security vulnerabilities, rather than specific targets.

"The general break-ins are not happening by targeted attacks, by somebody trying to attack you or your organization. The general attacks (come through) tools that scan the Internet and find the place to break in -- and wherever they can break in, they'll break into."

It sounds overwhelming. Are there any new approaches to the problem?

Shwed's company has a new product called ThreatCloud, which it bills as the first collaborative approach to fighting cybercrime.

"One of the things we realized about two years ago is that today every company, every person in the world fights cyber threats individually. We all install systems, we're all being attacked, in many cases, by the same people, thousands of times a day.

"So what we came up with was that idea of a threat cloud. And ThreatCloud is like a collaboration network -- whenever a customer network sees an attack or sees something suspicious, it reports to the ThreatCloud service (which) analyzes threats from multiple sources.

"If it finds out that it's actually an attack, it can automatically update the rest of the world and let everybody enjoy that intelligence, that know-how that some attack has been happening and everybody should block that source."

ADVERTISEMENT
Part of complete coverage on
September 2, 2013 -- Updated 0934 GMT (1734 HKT)
Next time you marvel at the computer hardware in your hand, spare a thought for the billions of tiny transistors within. Without them our modern gizmos wouldn't work.
August 5, 2013 -- Updated 0916 GMT (1716 HKT)
Simon Dale Hobbit house
As far-fetched as it sounds, if you can't afford to buy a house then designing and building your own may be more viable than you assumed.
August 5, 2013 -- Updated 1749 GMT (0149 HKT)
The world's first stem cell burger, which cost a cool $300,000 to develop, has been cooked and eaten by two volunteer tasters in London
August 15, 2013 -- Updated 1356 GMT (2156 HKT)
Copenhagen Suborbitals launch a rocket
Amateur space enthusiasts are reviving humanity's interplanetary dreams through crowd-researched and crowd-funded space projects.
Do you need a new TV, house or limb? All you need is to press print. Take an interactive scroll through to the future of 3D printing.
August 5, 2013 -- Updated 0919 GMT (1719 HKT)
Tree climber
See how India's frugal innovators are adapting existing tools and technologies to provide all manner of imaginative low-cost solutions.
June 20, 2013 -- Updated 2032 GMT (0432 HKT)
The Paravelo flying bicycle
It could easily be a deleted scene from the classic movie, ET, but two British inventors claim to have invented the world's first flying bicycle.
June 20, 2013 -- Updated 1523 GMT (2323 HKT)
The Toji Pagoda in Kyoto, Japan.
What's 1,200-years-old, made of wood and responsible for the smart-phone in your pocket? Japan's Toji Pagoda, of course!
June 7, 2013 -- Updated 1012 GMT (1812 HKT)
Google self-driving car
The inventor of GPS technology, Bradford Parkinson, tells CNN the future of transport is self-driving cars.
May 29, 2013 -- Updated 1253 GMT (2053 HKT)
Justin Beckerman in his submarine
It may be constructed from drainage pipes but according to its 18-year-old inventor, this single-person U-boat can plunge to a depth of 30 feet.
May 24, 2013 -- Updated 1728 GMT (0128 HKT)
Rare Apple 1 computer
A treasure trove of technological 'firsts', including an incredibly rare Apple 1 computer, goes on auction in Germany
May 10, 2013 -- Updated 1124 GMT (1924 HKT)
How did an ex-cop fashion a fully functioning robot from old hi-fi speakers, DVD players and assorted household items?
April 26, 2013 -- Updated 1341 GMT (2141 HKT)
More than 10 billion USB sticks are believed to be in use around the world today ensuring co-inventor, Ajay Bhatt, has a place in tech's unofficial hall of fame.
ADVERTISEMENT