Cybersecurity Summit 2004: Conclusions and Recommendations Tom Bettge and Ginger Caldwell Scientific Computing Division National Center for Atmospheric.

Slides:



Advertisements
Similar presentations
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Advertisements

Information Security Policies and Standards
1 Next-Generation Secure Internet: Security Overview and Context Adrian Perrig in collaboration with Steven Bellovin, David Clark, Dawn Song.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
(Geneva, Switzerland, September 2014)
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
Computer Security: Principles and Practice
IBM Security Network Protection (XGS)
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Network security policy: best practices
1 Fighting Back With An Alliance For Secure Computing And Networking Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush,
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
University of Missouri System 1 Security – Defending your Customers from Themselves StateNets Annual Meeting February, 2004.
Incident Response Updated 03/20/2015
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
Fermi Computer Incident Response Team Computer Security Awareness Day March 8, 2005 Michael Diesburg.
Incident Handling and Response Breakout Overview.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
1 The Auditor’s Perspective Division of Sponsored Research Research Administration Training Series Presented by: Joe Cannella Audit Manager,
Information Assurance Program Manager U.S. Army Europe and Seventh Army Information Assurance in Large-Scale Practice International Scientific NATO PfP/PWP.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
NSF and IT Security George O. Strawn NSF CIO. Outline Confessions of a CIO Otoh NSF matters IT security progress at NSF IT security progress in the Community.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
August Mr. Mike Finley, CISSP Senior Security Engineer Computer Science Corporation.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
Federated Environments and Incident Response: The Worst of Both Worlds? A TeraGrid Perspective Jim Basney Senior Research Scientist National Center for.
Belinda Seto, Ph.D. Acting Deputy Director for Extramural Research National Institutes of Health Human Subjects Research Enhancements Awards Renaissance.
SAN DIEGO SUPERCOMPUTER CENTER NATIONAL CENTER FOR SUPERCOMPUTING APPLICATIONS Case 216 The Incident That Brought Us Together December 12, 2005 Jim Barlow,
Note1 (Admi1) Overview of administering security.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
1 NSF/TeraGrid Science Advisory Board Meeting July 19-20, San Diego, CA Brief TeraGrid Overview and Expectations of Science Advisory Board John Towns TeraGrid.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, EU-FP6 Project ISS e G Integrated Site Security for.
“The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers,
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
IT Summit November 4th, 2009 Presented by: IT Internal Audit Team Leroy Amos Sue Ann Lipinski Suzanne Lopez Janice Shelton.
Computer Security By Duncan Hall.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Role Of Network IDS in Network Perimeter Defense.
Resources for Meeting Internet Safety Requirements Cheryl Elliott James Madison University Bill Johnsen Virginia Beach City Public Schools Educational.
IS3220 Information Technology Infrastructure Security
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Gaspar Modelo-Howard NEEScomm Cybersecurity Software Engineer Saurabh Bagchi NEEScomm Cybersecurity Officer.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, EU-FP6 Project ISS e G Integrated Site Security for.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Logging and Monitoring. Motivation Attacks are common (see David's talk) – Sophisticated – hard to reveal, (still) quite limited in our environment –
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
1 Presented by David Thompson, TIA December 14, 2005 NFPA 1600 and Emergency Communications.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
Information Technology Acceptable Use An Overview
WISE WG STAA Awareness and Training
Chapter 8 – Administering Security
Data Compromises: A Tax Practitioners “Nightmare”
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
How to Mitigate the Consequences What are the Countermeasures?
Federated Environments and Incident Response: The Worst of Both Worlds
Security week 1 Introductions Class website Syllabus review
Presentation transcript:

Cybersecurity Summit 2004: Conclusions and Recommendations Tom Bettge and Ginger Caldwell Scientific Computing Division National Center for Atmospheric Research Boulder, CO USA 23 March 2005

Overview l l Motivation for Cybersecurity Summit 2004 (CSS 2004) –Unauthorized and unprecedented intrusion into numerous university and federally funded research computer systems –FBI Case 216 –NSF’s concern about cybersecurity for projects and facilities l By invitation only –120 participants –Systems and security professionals –Center Management –End Users …..in a confidential setting.

23 March 2005 Goals of CSS 2004 l Share information on Case 216 l Explore needs of maintaining open, collaborative research environment while protecting the integrity of computing assets l Develop and/or enhance communication via trust relations l Develop secure computing environments while evaluating the impact on researchers, the computers, and the network l Discuss different needs/requirements between centers

23 March 2005 Program Committee l Tom Bettge, ChairNCAR l RuthAnne BevierCalifornia Institute of Technology l Ginger Caldwell NCAR l Walter Dykas Oak Ridge National Laboratory l Victor Hazlewood SDSC l Chris Hempel Texas Advanced Computer Center l Jim Marsteller PSC l Marla Meehl NCAR l George Strawn NSF l John Towns NCSA l Howard Walter National Energy Research Scientific Computer Center

23 March 2005 Attendance by Agency/Job Duty

23 March 2005 Attendance from Geographic Region

23 March 2005 CSS 2004 Breakout Group Topics l l User Policies/Education l l System Admin Policies/Education l l Network Based Intrusion Detection l l Host Based Intrusion Detection l l Grid Security

23 March 2005 CSS 2004 Common Themes l l Incident Response l l Training and Education l l Security Planning l l Future Meetings

23 March 2005 Incident Response Conclusions l Widespread nature caused by collaborative relationships, yet communication between labs was deficient l Trust relationships between labs/centers was weak –Timely response was inhibited by easily determined, trusted contacts l Responses to intrusion events must be coordinated

23 March 2005 Incident Response Recommendations l For incident reporting and tracking, a contact model is needed to bring multi-agency security teams together l Site: Security starts at home…….local sites need to establish incident response link on web for incident reporting l Site: Create incident response plan as part of comprehensive security policy: –Procedure to notify users/customers –Procedure for notifying peer sites –Define protocol to alerting legal authorities –Instructions on public relations issues

23 March 2005 Training and Education Conclusions l Users –passwords are weak –understanding of risks and protection is poor l Systems Administrators only slightly better than user understanding of security l Intrusion events usually exploit known and patchable vulnerabilities, and could be prevented l Education needed by systems administrators, users, and center management

23 March 2005 Training and Education Recommendations l Case 216 can/should be used to heighten awareness and foster acceptance of need for education l NSF should explore, in conjunction with its community, methods to provide security training in an efficient and cost effective manner. l Site: Develop a comprehensive security plan: –security education –strong security policies and enforcement mechanisms that sufficiently gain the attention of all personnel –develop plan in collaboration with peer centers

23 March 2005 Security Planning Conclusions l Current security activities are primarily reactive l Planning should begin at system design and installation l Case 216 revealed need for better intrusion monitoring and logging –need effective and efficient forensic analysis –automated! l Grid amplifies existing security issues, rather than creating new ones –e.g., local sites likely to strengthen firewalls

23 March 2005 Security Planning Recommendations l NSF should impose security requirements on grant awards –include a security plan and a security budget l NSF should fund study to investigate replacements for passwords which are user friendly – careful about One Time Passwords (OTP) l NSF should increase support (find balance?) for security tool development –automated security tool development l Community should build cooperation relations with firewall/router vendors to address common needs

23 March 2005 Future Meetings l Face-to-face meetings of security professionals, users, management, and agency program managers are valuable and should continue. –…not incident based! l NSF and other agencies should sponsor an annual event to provide forum for establishing and maintaining trust infrastructure. …but avoid duplication with existing forums!

23 March 2005 From a CSS Participant Near the end of the second day in DC, it occurred to me that, hey, here's a room full of security-minded people, so I bet we're batting close to (if not at) 100% in the non-sniffability game. So I fired up a copy of tcpdump just to check... There were numerous unencrypted connections to pop and imap and smtp servers…..perhaps they were using PGP-encryption…….even so, I've got {hostname, username, password} information that quite a few people used to identify themselves to their mail servers.

23 March and it gets worse….. But wait, it gets a lot worse. There were three telnet sessions active; one was to a host at a supercomputing center, and one of the others was to a machine in the army.mil domain! If we, individuals with an expressed interest in computer security, can't get it right % right -- how can we possibly expect Joe User to?

23 March 2005 Final Comments l l User Awareness / Education –security of wireless –basic connection to VPN l l Security Enterprise Service –simplify techno-jargon –simplify the procedures The problem of secure computing in an open environment with many users is unsolved, and it appears to be quite hard. The best we can hope for is gradual mitigation, converging on a safer world. Bill Cheswick

23 March 2005 End