COMPLEXITY AND CYBER DEFENSE TTI/VANGUARD TAMING COMPLEXITY October 5, 2011 Michael A. Wertheimer, DoD.

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

FIRST LINE OF DEFENSE Intrusion Prevention System Stephen Gates – CISSP Hoàng Thế Long – Nguyễn Thái Bình
The shadow war: What policymakers need to know about cybersecurity Eric Miller Vice President, Policy, Innovation, and Competitiveness Canadian Council.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Did You Know? Number of spam s sent each day? 100 billion.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
DuWayne Aikins Information Security Forum May 21, 2015 Cyber, A Militarized Domain: What is Means to Texas.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Internet Security In the 21st Century Presented by Daniel Mills.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
Discovery of Emergent Malicious Campaigns in Cellular Networks Nathaniel Boggs, Wei Wang, Suhas Mathur, Baris Coskun, Carol Pincock © 2013 AT&T Intellectual.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Akamai Technologies - Overview RSA ® Conference 2013.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or computers. However we do not realize how fast internet is getting bigger.
Are you ready Relentless change
Cybersecurity: Expanding the Front Lines of Defense Dr. George K. Kostopoulos Professor Electrical and Computer Engineering Cybersecurity New York Institute.
A New Security Blueprint Shantanu Ghosh Vice President, Enterprise Security & India Product Operations.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
An Introduction to Deception Based Technology Asif Yaqub Nick Palmer February 5, 2016.
Building Our IT Security Lines of Defense Working together to protect Government’s IT systems.
Internet Security TEAMS March 18 th, ISP:Internet Service Provider.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Protect your Digital Enterprise
Nation State Actors Lex Dunlap.
Executive Director and Endowed Chair
Overview: Cloud Datacenters
Stuxnet By Shane Serafin.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
Security Risk Profiles – Tips and Tricks
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Endpoint Security Market to grow at 7% CAGR from 2017 to 2024: Global Market.
Get instant internet security | | Wire IT Solutions
Extended Authentication Protocol (EAP) Vulnerabilities exploited through Rogue Access Points Stephen Cumella.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Internet Security Threat Status
Home Internet Vulnerabilities
Secure once, run anywhere Simplify your security with Sophos
Chapter 4: Protecting the Organization
Building an Integrated Security System Microsoft Forefront code name “Stirling” Ravi Sankar Technology Evangelist | Microsoft
Anatomy of a Large Scale Attack
Place Value.
Tom Murphy Chief Information Security Officer
Objectives Explain the role of computers in client-server and peer-to-peer networks Explain the advantages and disadvantages of client- server and peer-to-peer.
Introduction to Internet Worm
Mobile Security What is mobile secuirty & Identifying smartphone security holes& Sayed Hashimi Proposal Project.
Cybersecurity Simplified: Ransomware
Cloud Computing for Wireless Networks
Presentation transcript:

COMPLEXITY AND CYBER DEFENSE TTI/VANGUARD TAMING COMPLEXITY October 5, 2011 Michael A. Wertheimer, DoD

The Problem After infiltrating Natanz's industrial-control systems, Stuxnet automatically ordered subsystems operating the centrifuge motors to spin too fast and make them fly apart. At the same time, Stuxnet made it appear random breakdowns were responsible so plant operators would not realize a nasty software weapon was behind it. -Ralph Langner German industrial control system expert

The Problem Simplified We are building our lives around our wired and wireless networks. The question is, are we ready to work together to defend them? -FBI

The Domain 5 BILLION MOBILE PHONES 60% in developing countries AT&T volume in 2010 will be exceeded in first 7 weeks of 2015 Commoditization of base stations Model No.: 900MHz&DCS 1800MHz Standard: ISO9001, ISO9002, CE Trademark: HELIOS Origin: China

The Domain 2 BILLION INTERNET USERS 107 Trillion s sent – 89% spam 255 Million websites 202 Million domain names 2015: more hosts than people Hundreds of thousands of SERVERS Tens of thousands Layer 1 & 2 SWITCHES

Threats to DoD 20K malicious /month targeted at DoD networks 40K pieces of malware/year detected phoning home from DoD networks 1K attempts/month to compromise DoD systems using public exploits 1200 XSS attempts launched against DoD systems last year

Threats to You Web-based applications fastest growing target 75% of companies reported cyber attacks. 92% incurred costs averaging $2M per company McAfee identifies 55K unique new pieces of malware each day That’s more than one piece of malware every second

Blah, Blah, Blah So what to do?

Make Big Small, Private Public Number of Internet Appliances is small (billions) IPv6 assigns everything an identity Compute Clouds are cheap, effective, and scale Profile appliances, not people. s There is no security through obscurity – go open source Create the Internet’s analytic engine(s) as a common good SE Linux  SE Android Edge to core with heterogenous diversity Mature the legal framework Attribution as a last resort