IMPROVING THE INTERNATIONAL COMPARABILITY OF STATISTICS PRODUCED BY CSIRTs Developing Cybersecurity Risk Indicators panel 26 th Annual FIRST Conference.

Slides:



Advertisements
Similar presentations
Network Security Highlights Nick Feamster Georgia Tech.
Advertisements

1 OECD Conference: Assessing the Feasibility of Micro-Data Access Micro-Data Access Questionnaire: Synthesis Luxembourg, October 2006 Nadim Ahmad,
1 Regional workshop for African countries Systems of Economic Surveys Statistics South Africa October 2007.
APEC Air Cargo Security Workshop June 2008 Bangkok Plenary 6: Air Cargo Security: Capacity Building.
A presentation for CIOs. What are the biggest challenges that face a modern CIO? (Lets list them…)
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
The shadow war: What policymakers need to know about cybersecurity Eric Miller Vice President, Policy, Innovation, and Competitiveness Canadian Council.
© Carnegie Mellon University The CERT Insider Threat Center.
A Framework to Implement a National Cyber Security Structure for Developing Nations ID Ellefsen - SH von Solms - Academy.
Incidence Response & Computer Forensics, Second Edition Chris Prosise Kevin Mandia.
0ictQATAR October 13, 2008 Qatar’s ICT Statistical Information Areas Tariq Gulrez.
Matteo Cavallini – ULS MEF/Consip Digital Agenda Assembly – Cybersecurity: barriers and incentives Matteo Cavallini Cybersecurity: State of the Art and.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Session 4.2 Creation of national ICT security infrastructure for developing countries Industry-wide approach: Raising awareness for ICT security infrastructure.
Cyber Security Issues in South Korea and CSIRTs Cooperation September 17, 2014 Eunju Pak
“When out of ammo, Reload” CYBERSECURITY CHALLENGES AND THREATS Ahmed Husain Managing Director.
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
Small County Data Center Project: Phase 1
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
“Learning from Existing Evaluation Practices on the Impacts and Effects of Intellectual Property on Development” Geneva 6th/7th October 2011 Evaluation.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Working Group 1 - Research Aims  1st phase - Collect… Data on:  current legislative environment  current practice at partner institutions On the basis.
Computer and Network Security Issues –the Security Officer’s Perspective Jeff Savoy, Information Security Officer.
APRICOT 2015 Security Day Cooperation between Security Teams and Network Operators: Actionable Intelligence on ShellShock Arnold S. Yoon Information Security.
Overview of KSAccreditation Support OverviewAccreditation Statistical ReportsComparison Groups 2003 SBAA Summer Workshop Accreditation Data Reporting Comparison.
Short-Term Economic Statistics Working PartyJune Short Term Economic Statistics Timeliness Framework Richard McKenzie OECD.
Addressing User Needs Lena Åström Statistics Sweden International Consulting Office Bishkek May 2006.
STATISTICAL TRAINING AT THE INTERNATIONAL LEVEL – CONFERENCE OF EUROPEAN STATISTICIANS Paris, June 2006 Richard Laux Office for National Statistics,
Module 5b: Measuring Household ICT Ms Sheridan Roberts, Consultant Information Society Statistics Tuesday 10 March 2009.
National Statistical Offices/NSO’s/ Capabilities to Collect ICT Indicators Yasin Mossa Central Statistical Authority of Ethiopia Geneva, 9 Sept.2003.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Conficker Update John Crain. What is Conficker? An Internet worm  Malicious code that is self-replicating and distributed over a network A blended threat.
How we work as a national CERT in China ZHOU Yonglin CNCERT/CC, China 2 Addressing security challenges on a global scaleGeneva, 6-7 December 2010.
CERT cooperation with ISP’s on Cybersecurity C ă t ă lin P ă trașcu CERT-RO 29 October 2015 RONOG 2 Meeting1.
Short-Term Economic Statistics Working PartyJune Short Term Economic Statistics Timeliness Framework Richard McKenzie OECD.
Internet2 Abilene & REN-ISAC Arbor Networks Peakflow SP Identification and Response to DoS Joint Techs Winter 2006 Albuquerque Doug Pearson.
MIS323 – Business Telecommunications Chapter 10 Security.
Practical IT Research that Drives Measurable Results Manage Help Desk Staffing 1Info-Tech Research Group.
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
1  Carnegie Mellon University Overview of the CERT/CC and the Survivable Systems Initiative Andrew P. Moore CERT Coordination Center.
Best DDoS Protected Colocation Services
CAPACITY BUILDING & INFORMATION SHARING [ SETUP OF NATIONAL WEBSITE ] – FIJI ISLANDS Ajnesh Chandra Area Organizer – NUFCW Fiji Trades Union Congress Suva,
What is SWGfL? A not-for-profit charity owned and directed by the 15 member LAs An organisation that deals exclusively with education and public sector.
Servers in the Wild… …and the threats that lurk about. DePaul University Information Security Team TLT Presentation 08 May 2002.
I2Coalition: How To Build Relationships And Save Money With Better Abuse Reporting Moderator: Michele Neylon CEO, Blacknight.
06 JULY 2016 NHISSA MEETING mHEALTH REGISTRY M.J. NKGAPELE.
Phishing, Spear Phishing, and what to do about it.
Updating the Value Proposition:
Phishing, Spear Phishing, and what to do about it.
Chapter 7: Identifying Advanced Attacks
Instructor Materials Chapter 7 Network Security
Chapter 2 Introduction to Computer User Support
Decrypting Data Compliance in China
The Forum of Incident Response and Security Teams (FIRST)
183 countries under study (percentages are calculated on this basis)
Joe, Larry, Josh, Susan, Mary, & Ken
28 November - 1 December 2016, Amman, Jordan
The Forum of Incident Response and Security Teams (FIRST)
“CYBER SPACE” - THE UNDERGROUND ECONOMY
EU Security Awareness Campaign
Reducing Cyber Security Risks in the UK Public Sector
28 November - 1 December 2016, Amman, Jordan
Chapter 4: Protecting the Organization
Education and Training Statistics Working Group, May 2011
Computer Emergency Response Team
The Forum of Incident Response and Security Teams (FIRST)
What is it? Where does it go?
Comprehensive M&E Systems
U.S. Funding for Global Health Security, FY FY 2020 Request
Presentation transcript:

IMPROVING THE INTERNATIONAL COMPARABILITY OF STATISTICS PRODUCED BY CSIRTs Developing Cybersecurity Risk Indicators panel 26 th Annual FIRST Conference Aaron Martin

Feasibility study design Questionnaire developed to determine: – Can CSIRTs respond to these questions? – Would the data collected help produce quality statistical indicators? Widely distributed to national CSIRTs 25 responses Analysis of results ongoing

Preliminary analysis Three sets of primary questions 1.General aspects of CSIRTs 2.Organisational capacity 3.Incidents Feedback questions – Explaining non-responses – Additional information Basis for calculations Difficulties encountered How to improve the questions

General aspects Accounting for more than one national CSIRT per country/economy Classifying CSIRTs by constituency IP addresses as an indicator of network size Internet users as an indicator of network size Understanding CSIRT data sources

Capacity questions CSIRT annual budget Percentage of budget funded by government FTEs employed by the CSIRT FTEs employed for security incident handling Technical skills Incident reports handled without human intervention (i.e. automated) Requests for assistance  dedicated action taken Targeted mitigation (proactive notice) Formal co-operation Informal co-operation

Incident-related questions Phishing websites hosted in the CSIRT’s constituency DoS attacks targeting the constituency Defaced websites hosted in the constituency Servers hosting malware Servers directing to malware Botnet C&C servers