Module 11 Trends.

Slides:



Advertisements
Similar presentations
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Mary Ann Fitzsimmons Regional.
Advertisements

1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
1 Telstra in Confidence Managing Security for our Mobile Technology.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Lecture 11 Reliability and Security in IT infrastructure.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
CYBER CRIME AND SECURITY TRENDS
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
SEC835 Database and Web application security Information Security Architecture.
Storage Security and Management: Security Framework
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Lessons Learned in Smart Grid Cyber Security
Study Results Advanced Persistent Threat Awareness.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Topic 5: Basic Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
CSCE 548 Secure Software Development Security Operations.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
The Internet of Things, WTF? Rik Ferguson Vice President, Security Research Trend #CLOUDSEC.
Computer Security By Duncan Hall.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
IS3220 Information Technology Infrastructure Security
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Critical Infrastructure Protection and the Role of the Next Generation Firewall Blaž Ivanc.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Servers in the Wild… …and the threats that lurk about. DePaul University Information Security Team TLT Presentation 08 May 2002.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
AP CSP: Cybercrime.
Proactive Incident Response
Principles Identified - UK DfT -
Society for Maintenance and Reliability Professionals (SMRP)
Botnets A collection of compromised machines
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Security of In-Vehicle Software
Real-time protection for web sites and web apps against ATTACKS
Secure Software Confidentiality Integrity Data Security Authentication
Advanced Threat Protection
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
Botnets A collection of compromised machines
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Endpoint Security Market to grow at 7% CAGR from 2017 to 2024: Global Market.
Cyber Threat Intelligence Sharing Standards-based Repository
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Industrial Control Systems Security Market to reach $7bn by 2024: Global.
Risk of the Internet At Home
C4I, Internet of Things and Critical Infrastructure Protection
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
Home Internet Vulnerabilities
The University of Adelaide, School of Computer Science
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
The Practical Side of Meaningful Use:
How to Mitigate the Consequences What are the Countermeasures?
Intrusion Detection system
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Test 3 review FTP & Cybersecurity
6. Application Software Security
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
IoT and Supply Chain Risk Management
IoT in Healthcare: Life or Death
Presented by Shashank Shekhar Sahoo
Presentation transcript:

Module 11 Trends

Lesson Objectives Identify emerging trends and demonstrate an understanding of emerging technologies. Understand the Internet of Things (IoT) and how it expands the cyber “attack surface.” Be able to make educated predictions of what the future might look like for the cybersecurity critical infrastructure framework. Discuss ethical issues that can arise in relation to new technology and new defense strategies.

Critical Infrastructure Threat Trends Attacks on critical infrastructure systems continue to evolve and multiply. These include: Increased number of data integrity attacks Multiple Advanced Persistent Threat (APT) actors on the system Compromised infrastructure Many are covertly communicating data to embargoed countries Increased use of social engineering Growing attack surface with the Internet of Things (IoT)

Data Integrity Attacks "If you take a controlled system like the power grid or water system that involves machinery that's operated by computers and make some change in the operational instructions for that equipment, that can lead to some catastrophic results — power outages or changes in chemical balance.“ —Eddie Schwartz, international vice president, ISACA Rather than be satisfied with denial-of-service attacks that make the system unavailable, attackers will increasingly launch attacks that include modification of machine instructions or data sets that cause equipment to act on skewed data. From the NSTAC IoT Report to the President: “These systems also include any adaptive behaviors exhibited by the objects, either through pre-programmed or machine learning algorithms. Although these are automated behaviors, the fact that their functions can be reconfigured based on machine learning algorithms introduces a certain level of unpredictability. “ Citation: President’s National Security Telecommunications Advisory Committee. (2014). “Report to the President on the Internet of Things – Draft. Retrieved from: https://www.dhs.gov/sites/default/files/publications/IoT%20Final%20Draft%20Report%2011-2014.pdf

Multiple Advanced Persistent Threats An advanced persistent threat (APT) is a network attack in which an attacker gains unauthorized access and remains for a long period of time, undetected. Agencies are seeing multiple attackers on networks, sometimes warring with each other for dominance over the compromised system. This has given rise to research efforts to develop operating systems that can securely continue to operate, even with the presence of APTs on the network.

Compromised Infrastructure Critical infrastructure systems will be compromised and used to launch attacks against other systems. This is facilitated, in part, by the lack of security hardening on sensors and devices. In many cases, these devices and systems have been found to have default passwords or vulnerable legacy software in use. In some cases, systems are covertly communicating data, some of which is even encrypted, to embargoed countries. Increased use of social engineering Growing attack surface with the Internet of Things – Machine-to-Machine devices present a large attack surface for exploitation.

Increased Use of Social Engineering People will continue to be “the weak link” in the security chain. Historically, as systems become hardened, making them more difficult to hack into through system vulnerabilities, attacks against personnel in the workforce increase. Spear-phishing attacks contributed to a significant number of attacks against the manufacturing sector in 2015, according to ICS-CERT.

Growing Attack Surface with the “Internet of Things” IoT expands the attack surface and diversifies threat types with billions of connected devices. Secure and insecure locations Security may or may not be built in Not IT – but usually connected to the network New bleeding-edge protocols and technologies in use The small nature of the devices leave many vulnerable to attack Billions of connected devices – The IoT contains billions of devices and sensors that collect and distribute information. Most of these are in public and other insecure locations. Gartner forecasts that more than 20 billion devices will be in use worldwide by 2020. (http://www.gartner.com/newsroom/id/3165317) However, others estimate that as many as 50 billion IoT devices will be in use by 2020. (NSTAC Report to the President). The scale of deployment is larger than any seen before. Secure and insecure locations – Many of these sensors are located on oil pipelines or on railroad tracks and in other publicly accessible locations in remote locations, making them vulnerable to physical attacks (close-in attacks where the attacker has physical access to the device), as well as to cyber attacks if they are connected to a network to send data. Security may or may not be built in – Manufacturers and implementers of these devices are not as familiar with network threats as those that have worked within traditional cyber fields. As a result, security is sometimes not “baked” into the product when it is designed. Not IT – but usually connected to the network – Again, as with other cyber physical systems (such as HVAC systems), IoT implementers may lack the experience with networking technologies and attacks sufficiently to understand the threats to the network that the sensors present. As an example, a former student once told an instructor that his father installed pipeline sensors, placing a password of an “!” on the sensors. New bleeding-edge protocols and technologies in use – Many new protocols specific to this industry are on the rise. Additionally, these devices often use other vulnerable wireless protocols to communicate data to the controllers. The small nature of the devices leave many vulnerable to attack – Due to the size of the device, these sensors may be unable to support remote firmware updates or encryption for its communications across the network, or be able to support digitally signed (authenticated) pushes of updates. As a result, many systems, even those in smart cars, accept changes to firmware and programmatic code without validating the source.

Case Study: IoT Attacks On October 21, 2016, a Mirai botnet hacked into conneted home devices and launched a distributed denial-of-service attack against Dyn, a large domain name server that took down Twitter, Spotify, Reddit, the NY Times, Pinterest, PayPal, and other major websites, with attacks coming from millions of IP addresses at the same time. October 21, 2016, article on Engadget, “Blame the Internet of Thing’s for today’s web blackout” available at https://www.engadget.com/2016/10/21/mirai-botnet-hacked-cameras-routers-internet-outage/ Image source: Conditt, Jessica. (2016). Engadget. “Web Blackout.” via Engadget. Retrieved from https://www.engadget.com/2016/10/21/mirai-botnet-hacked-cameras-routers-internet-outage/ © 2017 AOL Inc. All rights reserved. © 2017 AOL Inc. All rights reserved. Conditt, Jessica. (Oct 21 2016). Engadget. “Web Blackout.” Retrieved from https://www.engadget.com/2016/10/21/mirai-botnet-hacked-cameras-routers-internet-outage/

Case Study 2: IoT Attacks Mirai is a malicious worm that spreads to connected Internet devices, such as cameras, insecure routers, digital video recorders, etc., by continuously scanning the Internet for these systems, looking for devices that have not changed their factory default passwords. Once compromised, these devices are turned into “bots” that allow an attacker to control them to attack other systems. In September 2016, a massive Mirai attack took down security site KrebsonSecurity, peaking at nearly 620Gbps. In that case, more than 145,000 devices were compromised and used in the attack.

Move to “Active Defense” Traditional incident response processes, while a significant part of an organization’s security program, are reactive in nature. In response to the increase of highly sophisticated attacks and vulnerable attack surfaces, and the rapidity of attacks, organizations and agencies are adopting more proactive measures, known as “active defense.” Active defense takes into consideration threat intelligence information (information about threats that is collected, analyzed, and shared among communities) to rapidly act on threat information.

Active Defense Components An active defense relies on the following components: Identification of mission-critical assets and systems that will be targets of attack Identification of “threat actors,” or those who would be most likely to attack these assets Knowledge of attacker tactics, techniques, and procedures (TTPs), identifying the methods that would be used by the attacker to attack the asset Using this knowledge, the organization can take steps to fortify (harden) the assets, increasing monitoring for anomalous events at vulnerable assets, installing additional security devices, such as firewalls, Intrusion Prevention Systems, or honeypots (the installation of fake servers designed to deceive or redirect attacker activities). While not entirely in scope of this introduction to the active defense concept, a good reference to use is Lockheed-Martin’s “Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains.” Focused principally on how to target and engage adversaries by understanding how they will attack, this paper describes the approaches that can be taken to defend the assets. The document is available for download from the National CyberWatch Center website, URL https://www.nationalcyberwatch.org/resource/intelligence-driven-computer-network-defense-informed-by-analysis-of-adversary-campaigns-and-intrusion-kill-chains-2/.

Ethical Issues Ethical and privacy issues are arising on a daily basis with critical infrastructure protection. Some of these issues include: The use of unmanned aerial vehicles (UAVs, or drones) to monitor critical infrastructure assets, such as oil pipelines, bridges, or power lines. This technology could be abused to spy on individuals, collecting unauthorized data. (Infosec Institute, 2014) Existing data privacy standards do not translate well into IoT. A Hewlett-Packard study performed in 2014 found that “more than 90 percent of all IoT devices examined collected at least one piece of personal information.” Of these devices, over 70% lacked sufficient authentication to the data on the device, as well as lacked encryption. (NSTAC, 2014) Can you think of other ethical issues associated with different sectors, such as the Financial Services Sector or the Healthcare and Public Health Sector? Infosec Institute. “Privacy and Security Issues for the Usage of Civil Drones.” April 25, 2014. Retrieved from http://resources.infosecinstitute.com/privacy-security-issues-usage-civil-drones/. Have students review the source document. President’s National Security Telecommunications Advisory Committee. (2014). “Report to the President on the Internet of Things.” Draft. Retrieved from: https://www.dhs.gov/sites/default/files/publications/IoT%20Final%20Draft%20Report%2011-2014.pdf. Additional issues might concern identifiable patient health information collected or with the potential manipulation of financial information.

Privacy-by-Design Implement privacy-by-design at project initiation. Privacy-by-design provides standards for: Privatizing, or anonymizing, data at collection so that it is collected anonymously but data can still be aggregated for analysis. NIST has begun a privacy engineering initiative, integrating the Fair Information Practice Principles (FIPPS) to risk management frameworks. This provides an excellent example of government and private sector collaboration to arrive at a solution. (NSTAC, 2014) Citation: President’s National Security Telecommunications Advisory Committee. (2014). “Report to the President on the Internet of Things – Draft. Retrieved from: https://www.dhs.gov/sites/default/files/publications/IoT%20Final%20Draft%20Report%2011-2014.pdf