Threat Trends and Protection Strategies Barbara Laswell, Ph. D

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

OCTAVESM Process 4 Create Threat Profiles
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Prepared for: DISA September 17, 2003 Establishing a Government Information Security System Presented to the IT AND COMMUNICATIONS SYSTEMS SECURITY CONFERENCE.
© 2003 Carnegie Mellon University slide 1 Building CSIRT Capabilities and the State of the Practice Georgia Killcrece CSIRT Development Team CERT ® Training.
Building Capabilities for Incident Handling and Response
S2-1 © 2001 Carnegie Mellon University OCTAVE SM Process 2 Identify Operational Area Management Knowledge Software Engineering Institute Carnegie Mellon.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
CERT Centers, Software Engineering Institute Carnegie Mellon University Pittsburgh, PA SEI is sponsored by the U.S. Department of Defense ©
© 2001 by Carnegie Mellon University PPA-1 OCTAVE SM : Participants Briefing Software Engineering Institute Carnegie Mellon University Pittsburgh, PA
© Carnegie Mellon University The CERT Insider Threat Center.
DHS, National Cyber Security Division Overview
Protection of Classified Information & Cyber Security
1  Carnegie Mellon University System Security and U. Rich Pethia Software Engineering Institute Carnegie Mellon University Pittsburgh, PA
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
S5-1 © 2001 Carnegie Mellon University OCTAVE SM Process 5 Identify Key Components Software Engineering Institute Carnegie Mellon University Pittsburgh,
1 Case Study ESTABLISHING NATIONAL CERT By Saleem Al-Balooshi Etisalat - AE.
(Geneva, Switzerland, September 2014)
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
© 2003 by Carnegie Mellon University page 1 Information Security Risk Evaluation for Colleges and Universities Carol Woody Senior Technical Staff Software.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
US-CERT National Cyber Security Division/ U.S. Computer Emergency Readiness Team (US-CERT) Overview Lawrence Hale Deputy Director, US-CERT.
IDENTIFYING THREATS IN A GLOBAL MARKETPLACE Ira S. Somerson, BCFE, CPP Loss Management Consultants, Inc. Institute for Global Management Studies And Temple.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Seán Paul McGurk National Cybersecurity and Communications
© 2001 by Carnegie Mellon University PSM-1 OCTAVE SM : Senior Management Briefing Software Engineering Institute Carnegie Mellon University Pittsburgh,
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
1  Carnegie Mellon University Protecting Information Infrastructures Rich Pethia Software Engineering Institute Carnegie Mellon University Pittsburgh,
Resources to Support Training Programs for CSIRTs.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Larry Clinton Operations Officer Internet Security Alliance
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
H UMAN R ESOURCES M ANAGEMENT Beki Webster Director, HR, Intelligence Systems Division Northrop Grumman Information Systems July 31, 2009.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
CSCI 6231 – Final Lecture Additional Resources and Topics.
Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by the U.S. Department of Defense © 2000 by Carnegie Mellon.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
CERT Centers, Software Engineering Institute Carnegie Mellon University Pittsburgh, PA SEI is sponsored by the U.S. Department of Defense ©
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering.
1  Carnegie Mellon University Overview of the CERT/CC and the Survivable Systems Initiative Andrew P. Moore CERT Coordination Center.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
Advanced Planning Brief to Industry Jerry L. Davis DAS, Office of Information Security June 9, 2011.
S7-1 © 2001 Carnegie Mellon University OCTAVE SM Process 7 Conduct Risk Analysis Software Engineering Institute Carnegie Mellon University Pittsburgh,
The Need of CSIRT in Enterprise Keyur Desai – Vice President - IT
Building Global CSIRT Capabilities Barbara Laswell, Ph. D
Information Security Program
Cybersecurity - What’s Next? June 2017
Team 1 – Incident Response
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Information Technology Sector
Process Maturity Profile
California Cybersecurity Integration Center (Cal-CSIC)
Securing Cisco Networks with Threat Detection and Analysis practice-questions.html.
Cyber Security coordination in Europe CERT-EU’s perspective
Securing Cisco Networks with Threat Detection and Analysis practice-questions.html.
Cyber Threat Intelligence Sharing Standards-based Repository
8 Building Blocks of National Cyber Strategies
CRITICAL INFRASTRUCTURE CYBERSECURITY
Cyber Security Culture
Security week 1 Introductions Class website Syllabus review
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 26 September 2018.
Final Conference 18 Set 2018.
CERT® System and Network Security Practices
Presentation transcript:

Threat Trends and Protection Strategies Barbara Laswell, Ph. D Threat Trends and Protection Strategies Barbara Laswell, Ph.D. September 2003 CERT® Centers Software Engineering Institute Carnegie Mellon Pittsburgh, PA 15213 Sponsored by the U.S. Department of Defense

Software Engineering Institute Federally Funded Research and Development Center (FFRDC) Sponsored by the U.S. Department of Defense Operated by Carnegie Mellon Purpose is to help others make measured improvements in their software engineering capabilities CERT® Centers are part of the SEI

Growth in Number of Incidents Reported to the CERT/CC

Growth in Number of Vulnerabilities Reported to the CERT/CC

Attack Sophistication vs. Intruder Knowledge

Lack of Boundaries Today we see the shift in thinking from bounded to unbounded systems, specifically shifting from the presence of well-defined geographic, political, cultural, and legal/jurisdictional boundaries to their absence.

Trends Steady increase in both vulnerabilities and incidents, as well as a growing dependency on the Internet Cyber attackers using vulnerabilities and easy connectivity to the Internet to conduct criminal activities, compromise information, and launch denial of service attacks that seriously disrupt operations Attacks are cheap, easy, difficult to trace, and growing increasingly sophisticated Cyber-space and physical space are one

Strategy for Organizations

Protect Strategy Conduct risk analyses Develop policy and implement risk mitigation plans Use security practices

Protect Resources Risk-based information security assessment methods OCTAVE http://www.cert.org/octave/ Security practices http://www.cert.org/security-improvement/ Survey on network security and insider threats [USSS and CERT] https://www.survey.cert.org/InsiderThreat/index.php

Detect Strategy Use modern technology and system management processes to identify and analyze attacks and compromises

Detect Resources Analysis techniques and methods http://www.cert.org/analysis/

Respond Strategy Have incident response teams and procedures in place to quickly react to attacks and compromises Recover and restore critical services Conduct cybercrime investigations

Respond Resources CERT Advisories Vulnerability notes database http://www.cert.org/nav/index_red.html Vulnerability notes database Automated Incident Reporting (AirCERT) http://www.cert.org/kb/aircert/ Computer Security Incident Response Team (CSIRT) guidance, training and certification http://www.cert.org/csirts/ “Tracking and Tracing Cyber Attacks” http://www.cert.org/archive/pdf/02sr009.pdf

Sustain/Improve Strategy Develop an information assurance empowered workforce

Sustain/Improve Resources Awareness and training at all levels http://www.isalliance.org/resources/papers/ISAhomeuser.pdf http://www.cert.org/homeusers/ http://www.cert.org/training/ Secure programming practices and training TSP/PSP pilots

Our Mission An Internet community that is in information assurance and survivability

Countries of CERT course attendees

Recent Publications

For More Information CERT® Centers Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 USA +1 (412) 268-7090 http://www.cert.org