Cybersecurity and Computer Forensics Education DUE:

Slides:



Advertisements
Similar presentations
Homeland Security at the FCC July 10, FCCs Homeland Security Focus Interagency Partnerships Industry Partnerships Infrastructure Protection Communications.
Advertisements

Idaho Critical Infrastructure and Key Resources Protection Program and Fusion Center Brief.
Facilitating a Dialog between the NSDI and Utility Companies J. Peter Gomez Manager, Information Requirements, Xcel Energy.
GEORGE MASON UNIVERSITY Center for Infrastructure Protection and Homeland Security Integrating Critical Infrastructure into Emergency Management Programs.
WebCast 5 May 2003 NERC Cyber Security Standard Overview of Proposed Cyber Security Standard.
DHS, National Cyber Security Division Overview
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
1 Research on National Security at the Wharton Risk Center Advisory Committee Meeting Wharton School University of Pennsylvania June 16, 2006.
Critical Infrastructure Interdependencies H. Scott Matthews March 30, 2004.
Geneva, Switzerland, September 2014 Critical telecommunication infrastructure protection in Brazil Antonio Guimaraes / Paulo Moura National Telecommunication.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Critical Infrastructure Interdependencies H. Scott Matthews March 3, 2003.
Infrastructure Management Review H. Scott Matthews April 30, 2003.
Stephen S. Yau CSE , Fall Security Strategies.
Food Safety and Inspection Service U.S. Department of Agriculture Homeland Security: Protecting the U.S. Food Supply Office of Food Security & Emergency.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Review of Power Blackout on Telecom P. J
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Space Systems as Critical Infrastructure Iulia-Elena Jivanescu 1st Space Retreat, Tenerife, Spain, 8-22 January, 2013.
THE RAILROAD COMMISSION OF TEXAS EMERGENCY MANAGEMENT AND HOMELAND SECURITY A Collaborative Effort By: Team RRC Emergency Management Homeland Security.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
Association of Defense Communities June 23, 2015
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
1 Crisis Management / Emergency Management Overview.
The NIGF CONFERENCE © 2013 ADDRESSING THE VULNERABILITY OF CRITICAL ICT INFRASTRUCTURE by Ernest Ndukwe, OFR Chairman Openmedia Communications Ltd 18 th.
Water Security Updates & Initiatives Asset Management Workshop May 5, 2005 Presented by: Jim Wheeler Office of Wastewater Management U.S. Environmental.
WebCast 5 May 2003 Proposed NERC Cyber Security Standard Presentation to IT Standing Committee Stuart Brindley, IMO May 26, 2003.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Health Emergency Risk Management Pir Mohammad Paya MD, MPH,DCBHD Senior Technical Specialist Public Health in Emergencies Asian Disaster Preparedness Center.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
Cyber Storm Overview Wednesday 2/1/ PT. Cyber Storm Cyber Storm National Cyberspace Security Exercise Mandated in National Strategy to Secure Cyberspace.
ORDER ENVIRONMENTAL PROTECTION PROGRAM WORKSHOP OVERVIEW OF ORDER Larry Stirling
Aoife Longmore and Donny Cummings City of Austin Office of Homeland Security and Emergency Management (HSEM) Austin RESILIENCE IMPLEMENTATION PROCESS Austin.
Overview Briefing Threat and Hazard Identification and Risk Assessment (THIRA) Presidential Policy Directive 8 / PPD-8: National Preparedness May 2012.
Community Resilience Jill J Artzberger, MPH 2011 Texas Emergency Management Conference Thursday, April 28, 2011.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Community Health Centers of Arkansas Hazard Vulnerability Assessment Workshop August 11, 2017 Mark Fuller.
“My opinions: not necessarily the USG, DOD, or NDU!”
Information Security Program
Iowa Communications Alliance
Ken Watson 9 Sep 2003 Critical Infrastructure Assurance: Business Case for Public-Private Partnership Ken Watson 9 Sep 2003
HSGP Funding for Security Efforts
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
and Security Management: ISO 28000
French Port Cybersecurity Initiative
California Cybersecurity Integration Center (Cal-CSIC)
USCG Roles & Responsibilities During a Ship Fire
Critical Infrastructure Protection Policy Priorities
ATD session 2: compliancy versus mission assurance
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Industrial Control Systems Security Market to reach $7bn by 2024: Global.
NERC Cyber Security Standards Pre-Ballot Review
Protective Security Advisor Program Brief
NERC Critical Infrastructure Protection Advisory Group (CIP AG)
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Oman Experience on Telecommunications Emergency Plan
NERC Cyber Security Standard
The U.S. Department of Homeland Security
Cybersecurity ATD technical
Security for Safety: Enabling Digitalization of Railway Systems
Larry Bugh ECAR Standard Drafting Team Chair June 1, 2005
Business Continuity Program Overview
Cybersecurity Threat Assessment
Cyber Security in a Risk Management Framework
European Programme for Critical Infrastructure Protection (EPCIP)
Deborah Housen-Couriel, ADV.
Civil Air Patrol Critical Infrastructure Austin Worcester 15 Jul 2019.
Presentation transcript:

Cybersecurity and Computer Forensics Education DUE:0302734 ATE PI Conference Using Cyber Security Command Post Exercises (CPX) To Identify Workforce Needs Larry Lee Cybersecurity and Computer Forensics Education DUE:0302734

Overview Related Terms Critical Infrastructure Types of CPXs Dark Screen Workforce Skills 1

Related Terms CPX (Command Post Exercises) Cyber War Games Desktop Exercises Scenario-based Exercises Scenario-driven Brain Storming TTX (Tabletop Exercises) Tabletop War Gaming War Gaming 2

Critical Infrastructures Definition “those systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety” 3

GAO Designates Cybersecurity a High Risk Significant, pervasive information security weaknesses continue to put critical federal operations and assets at high risk. Among other reasons for designating cyber critical infrastructure protection high risk is that terrorist groups and others have stated their intentions of attacking our critical infrastructures, and failing to adequately protect these infrastructures could adversely affect our national security, national economic security, and/or national public health and safety. GAO Report to Congress on Protecting Information Systems Supporting the Federal Government and the Nation’s Critical Infrastructures (January 2003) 4

Critical Infrastructures Energy Oil, Gas Transportation Air, Ground Banking and Finance Information and Telecommunications Public Utilities Transportation Government Banks/Finance Satellite WALL ST. Wall Street Oil & Gas Production and Storage Water Supply Telecom Business Emergency Services Information Electric Power Agriculture Adapted from Kelly, 2001 and Scalingi, 2003 5

Critical Infrastructure Interdependency Power for Compressors, Storage, Control Systems Fuel for Generators Power for Pump and Lift Stations, Control Systems Power for Switches Water for Cooling, Emissions Reduction Heat Power for Pumping Stations, Storage, Control Systems Fuel for Generators, Lubricants Fuels, Lubricants SCADA, Communications SCADA, Communications Water for Cooling Fuel Transport, Shipping Fuel Transport, Shipping Power for Signaling, Switches Water for Production, Cooling, Emissions Reduction Water Transpor- tation Oil Telecom Natural Gas Electric Power Adapted from Rinaldi et al., 2001, and Scalingi, 2003 6

Critical Infrastructure Interdependency “We, as a country, have put all of our eggs in one basket...we’ve successfully dominated the world economically and militarily because of the systems that we have designed, and relied upon....its our Achilles heel” Richard Clarke 7

Cyber Security CPXs Argonaut (England) Black Demon (USAF/DD) Black Ice (DOE Office of CIP) Blue Cascade (Pacific NW) Cyber Defense Exercise (CDX) 2004 Service Academies Dark Screen (UTSA) Eligible Receiver (DOD/NSA) Hackfest (ARFL/Symantec) Livewire (DHS) TopOff (DHS/ODP) 8

Types of CPX Table Top Exercise Normally very low cost Anyplace, anytime Small number of participants Could be for any type of objective Could be the first phase of a larger exercise 9

Types of CPX Scenario-based Many organizations, not many people Frequently examines existing or new procedures Also could be part of an exercise “buildup” More costs, more disruption to regular activities 10

Type of CPX Full-scaled Highest cost Most people involved Inter-agency, inter-governmental, inter-sector Occasional due to costs 11

Operation Dark Screen Year-long, three phased scenario-based exercise Table top Scenario-based Modified Full-scaled Designed to evaluate regional organizations’ capabilities to prevent, detect, and respond to cyber security incidents Initiated by Rep. Ciro Rodriguez (D-TX) Conducted by UTSA’s Center for Infrastructure Assurance and Security (CIAS) 12

ODS-CC Participants 2003-2004 City of Corpus Christi (CC) MIS Corpus Christi EOC CCPD MIS CCFD MIS CC Emergency Management Office CC Risk Management Division CC Water & Gas FBI Probado Technologies USN USCG Port of Corpus Christi Del Mar College Texas A&M Corpus Christi 13

Workforce Skills Interpersonal skills Analyzation and identification Communications Written or oral Common body of language Analyzation and identification Developing Solutions Team building 14

Workforce Skills Gather and document data with the ability to: Analyze information Ask relevant questions Accurately summarize and document information Synthesize and organize information 15

Workforce Skills Review and test plans and strategies for compliance with applicable regulations and standards with the ability to: Generate and evaluate solutions Compare multiple viewpoints Identify key sources of information Pose critical questions 16

Workforce Skills Identify, analyze and evaluate infrastructure and network vulnerabilities Ability to: Analyze information for accuracy and consistency Evaluate system configuration Use prior training/experience to predict outcome 17

Workforce Skills Implement/test contingency and backup plans and coordinate with stakeholders Ability to: Systematically organize information Evaluate critically of problems, identify possible causes and propose solutions Communicate effectively with clients 18

Workforce Skills Develop information assurance plans and implementation strategies Ability to: Synthesize and organize information Assume responsibility for accomplishing team goals Analyze group/individual response Create and develop new rules/principles 12

Workforce Skills Maintain and update information assurance plans and strategies as appropriate Ability to: Create data gathering process Monitor and correct system Devise and implement plan of action 20

References Kaucher, C.E., “Exercise in Defending Cyberspace: The Capstone of Education, Training and Awareness”, Nation Defense University Long, H.M., “Higher Education Contribution to the National Strategy to Secure Cyberspace”, ITS, Yale University St, Sauver,J., “Practical Steps to Take to mitigate Computer and Network Risks”. Infraguard Conference, March 2004 Goles, T; White, G; Dietrich, G; “Dark Screen: An Exercise in Cyber Security”, University of Texas-San Antonio, 2003 Building A Foundation for Tomorrow, Skill Standards for Information Technology, NWCET