Cybersecurity EXERCISE (CE) ATD Scenario questions

Slides:



Advertisements
Similar presentations
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholde r to insert your own image. Cybersecurity.
Advertisements

Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
1 Continuity Planning for transportation agencies.
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
Greg Shaw How do we turn private sector preparedness into an investment rather than a cost of doing.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Computer Security: Principles and Practice
Stephen S. Yau CSE , Fall Security Strategies.
EASTERN MICHIGAN UNIVERSITY Continuity of Operations Planning (COOP)
 Jonathan Trull, Deputy State Auditor, Colorado Office of the State Auditor  Travis Schack, Colorado’s Information Security Officer  Chris Ingram,
SEC835 Database and Web application security Information Security Architecture.
Session 16: Distribution of Geospatial Data 1 Distribution of Geospatial Data in the Public Environment Hazard Mapping and Modeling.
Company duties under the ISM Code
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Building Capability.  In order to successfully operate an architecture function within an enterprise, it is necessary to put in place appropriate organization.
FAR Part 10 Market Research. FAR Part 10 - Prescribes policies and procedures for conducting Market Research.
NFPA 1600 Disaster/Emergency Management and Business Continuity Programs.
SecSDLC Chapter 2.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Business Continuity Planning 101
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Proactive Incident Response
Cybersecurity: Risk Management
BruinTech Vendor Meet & Greet December 3, 2015
Procurement Integrity
Office 365 Security Assessment Workshop
Disaster and Emergency Planning
Team 1 – Incident Response
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
CON 280: Source Selection and the Administration of Service Contracts
Cyber Security: State of the Nation
Vessels and Facilities that are Temporarily Out of Service or Laid-up
Cyber Protections: First Step, Risk Assessment
Security Engineering.
Joe, Larry, Josh, Susan, Mary, & Ken
Cybersecurity EXERCISE (CE) ATD Scenario intro
Cybersecurity EXERCISE (CE) ATD threat brief: Round 1
ATD session 2: compliancy versus mission assurance
Panel Discussion Can We Handle an Advanced Cyber Threat?
Cyber defense management
I have many checklists: how do I get started with cyber security?
8 Building Blocks of National Cyber Strategies
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Safety and Security- From Assessment to Implementation
Systems analysis and design, 6th edition Dennis, wixom, and roth
Continuity Guidance Circular Webinar
Keeping your data, money & reputation safe
Cybersecurity ATD Scenario conclusion
Cybersecurity ATD technical
Acquisition training day Two Wrap up
Enhanced alerting and collaborative incident management
Continuity of Operations Planning
Strategic threat assessment
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Data Security and Privacy Techniques for Modern Databases
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
A New Concept for Laboratory Quality Management Systems
Presentation transcript:

Cybersecurity EXERCISE (CE) ATD Scenario questions

Exercise ground rules There are no right or wrong answers or ideas Maintain a no-fault, stress-free environment Use the scenario to provide context and spark creative ideas Do not limit discussion to positions or policies Tap community resources and assets to aid/enhance brainstorming Students should be able to understand: the difference between threat, risk, attack and vulnerability how threats materialize into attacks where to find information about threats, vulnerabilities and attacks typical threats, attacks and exploits and the motivations behind them high-level understanding of how example attacks work (e.g. DDOS, phishing and buffer overflow) how users are targeted in an attack and why this must be considered in defending against such attacks the concept of a threat landscape, its dynamic nature and how to create a landscape for an organization how to classify threats and example categories that there are different attacks, which have different patterns and different steps – for example be able to compare a DDOS to an attack designed to copy information how to classify threats and example categories that there are different types of malware – for example viruses, Trojans and spyware – their distribution mechanism and a detailed understanding of how they compromise information and systems that attacks can be combined for greater effect (e.g. phishing email, followed by social engineering phone call)

Our approach Instead of thinking about cyber attacks as events, it might be more useful to consider them as a process, or the end result of a planning and preparation process. That approach implies a need to assess and understand potential adversaries, maintain situational awareness, and consider how the operating environment and features of our own organization or system might affect an adversary’s actions and objectives Understand the Adversary Maintain Situational Awareness Consider the Operating Environment

Round 1 – Identify & Protect Identify – Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities Protect – Develop and implement the appropriate safeguards to ensure delivery of critical services Round 1 – Identify & Protect Evaluation of GPS Threat for Our Navigation Systems

Starting information 1. During Identify Phase and Protect Phase, you realize that your current Navigation system: Interfaces with numerous other systems (at least 20 other systems on the ship) Has access to the ships’: steering; propulsion; and autopilot Is very dependent upon GPS information 2. You determine a critical risk – spoofing your ships’ Navigation system, which could lead to ship destruction and loss of life 3. With your knowledge of GPS spoofing, do you want to modify your existing Navigation system (harden the existing system), buy a different system, or some combination of both?

CE round 1 CONTRAINTS Funding limited to Operational & Maintenance (O&M), and Procurement (PROC) funds in Current Year (CY) dollars with limited Management Reserve (MR) Ship availability for installations are limited to 4-days per month per ship Technical solution(s) shall include the use of GPS Increases in shipboard manning must be justified

Exercise 1 As a team, discuss and develop: What is the main problem for ships from GPS spoofing? How might we detect the GPS is spoofed?

Exercise 2 As a team, discuss and develop: How could you explain this risk to leadership? What can we do about it?

Exercise 3 As a team, discuss and develop: The options of modifying your existing Navigation system (hardening the existing system), buying a different system, or some combination of both What criteria might we use to pick between these options? (consider cost, speed to execute or acquire, and maturity of the option) Can your need be met by a commercial item?

Exercise 4 As a team, discuss and develop: Use your decision criteria, as a team pick between the options of modifying your existing Navigation system (hardening the existing system), buying a different system, or some combination of both What is your action? (which alternative did you pick) What are the contracting strategies to support the chosen COA?

Template Issue(s) Alternatives Decision Criteria Assumption(s) Action

Round 2 – Detect Operations against an Identified Threat to Detect – Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event Round 2 – Detect Operations against an Identified Threat to Navigation Systems across our Fleet

Additional information 1. During Detect Phase, you realize your current Navigation COTS: The Maritime Community and National Intelligence Agencies have provided threat warning 2. You are warned of an identified attacker (the Void) by the Maritime Information Sharing Community and National Intelligence agencies – your ships’ navigation system could be spoofed with false GPS signals 3. IMO, Maritime National Coast Guards, and all major Port Authorities are on alert for oddly behaving ships

CE round 2 CONTRAINTS Funding limited to Operational & Maintenance (O&M), and Procurement (PROC) funds in Current Year (CY) dollars with limited Management Reserve (MR) Ship availability for installations are limited to 4-days per month per ship Technical solution(s) other than GPS must be justified Increase in current shipboard manning must be justified

Exercise 1 As a team, discuss and develop: How can we detect the threat’s operations? Assume the ship works with a shore Security Operations Center (SOC), what should we be asking the SOC to look for?

Exercise 2 As a team, discuss and develop: How could you explain this risk to leadership? What can we do about it?

Exercise 3 As a team, discuss and develop: With the increased possibility of attack, does your team need to change its option? (modifying your existing Navigation system, buying a different system, or some combination of both Does a higher chance of a threat change your decision criteria? (consider cost, speed to execute or acquire, and maturity of the option) Assuming in Round 1 that a contract was awarded to address the requirements in Round 1, would a modification to that contract to address to need identified in Round 2 still be within scope?

Exercise 4 As a team, discuss and develop: Use your decision criteria, as a team pick between the options of modifying your existing Navigation system, buying a different system, or some combination of both What is your action? (did you change your alternative) What are the contracting strategies to support the chosen COA?

Template Issue(s) Alternatives Decision Criteria Assumption(s) Action

Round 3 – Respond & Recover Respond – Develop and implement the appropriate activities to take action regarding a detected cybersecurity event Recover – Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event Round 3 – Respond & Recover Crisis Mode

Additional information 1. During Respond Phase and Recover Phase, your company has experienced a disastrous attack that caused a massive economic loss and loss of life 2. You are in extreme crisis

CE round 3 CONTRAINTS Funding limited to Operational & Maintenance (O&M), and Procurement (PROC) funds in Current Year (CY) dollars with limited Management Reserve (MR) Ship availability for installations are limited to 4-days per month per ship Technical solution(s) other than GPS must be justified Increase in current shipboard manning must be justified

Exercise 1 As a team, discuss and develop: How can we respond and recover? Is there an alternative mode of operation for the navigation system?

Exercise 2 As a team, discuss and develop: What are possible effects on shipboard personnel with alternate modes of operation? Can you explain this problem to leadership?

Exercise 3 As a team, discuss and develop: With an attack incident, does your team need to change its option? (modifying your existing Navigation system, buying a different system, or some combination of both Does an incident change your decision criteria? (consider cost, speed to execute or acquire, and maturity of the option) Are there any emergency acquisition flexibilities available in the case of a cyber attack?

Exercise 4 As a team, discuss and develop: Use your decision criteria, as a team pick between the options of modifying your existing Navigation system, buying a different system, or some combination of both What is your action? (did you change your alternative) What are the contracting strategies to support the chosen COA?

Template Issue(s) Alternatives Decision Criteria Assumption(s) Action

DAU ALTERNATE RESPONSE All PORs should execute threat scenarios against their plans to establish baselines Use the CEO Cybersecurity Checklist as a guideline to ensure PORs are considering cybersecurity concerns and issues Consider all FAR/non-FAR options to address emergent cyber requirements

Questions