CERT Polska Experiences in incident handling The CLOSER Project Mirosław Maj Chisinau, 11/10/2004.

Slides:



Advertisements
Similar presentations
Clara CSIRTs in Latin America and the Caribbean CCIRN 2004 Cairns, Australia July 2004 Michael Stanton CLARA Technical Committee RNP- Brazil (material.
Advertisements

WHOIS – Data Elements – making a Difference ICANN Carthage Meeting October 2003 Marilyn Cade, Director AT&T Commercial and Business Constituency (BC)
Computer Emergency Response Teams
Tanzania Communications Regulatory Authority - TCRA Response to Cyber incidences in Tanzania: Where are we? Presented at Cyber Security Mini Conference.
TERENA General Assembly meeting, Poznań 9-10 June 2005 Workshop on FP7 Brussels, 11 April Theme: “Research Networking: Where do we go next?”. Attendees:
News from Latvia Baiba Kaškina, Katrīna Sataki LITNET conference 2008,
Joint efforts in incident response in AP region and future work with RIR Suguru Yamaguchi JPCERT/CC.
Academic and Research Network of Slovenia 1 The CSIRT initiative Gorazd Božič ARNES SI-CERT, Jamova 39, Ljubljana, Slovenia NATO.
© 2003 Carnegie Mellon University slide 1 Building CSIRT Capabilities and the State of the Practice Georgia Killcrece CSIRT Development Team CERT ® Training.
A Framework to Implement a National Cyber Security Structure for Developing Nations ID Ellefsen - SH von Solms - Academy.
MINISTRY OF NATIONAL DEFENCE REPUBLIC OF POLAND CLASSIFIED INFORMATION PROTECTION DEPARTMENT COL. PIOTR GRZYBOWSKI, Director, Classified Information Protection.
TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
23 June Strategy Proposal Heinz Stockinger on behalf of the Executive Board SwiNG Assembly Meeting Berne, 23 June 2008.
TF-CSIRT outside Europe How to act ?. Are the TF-CSIRT ToR limiting the geographical scope? "1.1 The Task Force is established to promote collaboration.
Polska Infrastruktura Informatycznego Wspomagania Nauki w Europejskiej Przestrzeni Badawczej Security Best Practices: Applying Defense-in-depth Strategy.
Experiences from establishing a national Centre for Information Security in Norway TERENA Networking Conference 2003 Maria Bartnes Dahl &
Incident Handling and Response Breakout Overview.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
Giandonato CAGGIANO ENISA MANAGEMENT BOARD REPRESENTATIVE LEGAL ADVISER ON EUROPEAN AFFAIRS OF THE MINISTRY OF COMMUNICATIONS U. OF ROMA TRE LAW FACULTY.
1 ENISA’s contribution to the development of Network and Information Security within the Community By Andrea PIROTTI Executive Director ENISA Cyprus, 28.
CCIRN meeting, Cairns, 3 July 2004 Computer security co-operation in Europe Karel Vietsch Based on materials provided by TERENA TF-CSIRT.
Peter Burnett Head of Information Sharing National Infrastructure Security Co-ordination Centre.
Setting up a Grid-CERT Experiences of an academic CSIRT TERENA Networking Conference May, Lyngby, Denmark Klaus Möller DFN-CERT Services GmbH.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
2005 © SWITCH The Role of Security in NRENs Christoph Graf SWITCH.
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
John Dyer Business & Technology Strategist TERENA 10 February 2014 TF-MSP Meeting ACOnet, Vienna Aggregation of Demand Collaborative.
Rutger Coolen, TNC 2005 Collaborative network monitoring for NREN’s Use cases for LOBSTER.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Copyright © 2010 APCERT Graham Ingram AusCERT SC member of APCERT AP* Retreat, Gold Coast 23 rd August 2010.
Day 4-2 Inter-Network Cooperation 4-2.inter-network-cooperation 1 Cooperation and Coordination community, sharing, incident response, trust.
CERT AM: Securing NREN in Armenia. Armenian NREN ASNET AM – Connecting more than 40 academic institutes of NAS RA and more than 10 other research, educational.
Recent Cyber Attacks and Countermeasures September 2006.
Creating A CERT at WARP Speed.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
IRT Co-ordination in Europe Brian Gilmore The University of Edinburgh.
Kiev, NREN in Ukraine: Present State and Future Developments Piotr Sąsiedzki POL-34 Silesian University of Technology Computer Centre Financial.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
TERENA update Karel Vietsch TERENA CEO Internet2 Fall Meeting, Atlanta 30 October 2000.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Connect. Communicate. Collaborate Click to edit Master title style PERT OPERATIONS.
How we work as a national CERT in China ZHOU Yonglin CNCERT/CC, China 2 Addressing security challenges on a global scaleGeneva, 6-7 December 2010.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
Peter Burnett Head of Information Sharing National Infrastructure Security Co-ordination Centre
Connect. Communicate. Collaborate The Security Model of GÉANT2: A Co-operative Approach Christoph Graf, SWITCH TNC’07, Lyngby, 22 May 2007.
MTA SZTAKI For furthur information please contact: Éva Feuer Head of Quality Management Head of IST liaison office
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
8 th February 2012 Making and Retaining Contacts in Industry Prof. PA Mawby.
Who is protecting Internet in Latvia ? - CERT initiative Baiba Kaškina, IMCS UL Baltic IT&T April 2007, Rīga.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Sofia, 09 June Sofia, 09 June 2010 MINISTRY OF TRANSPORT, INFORMATION TECHNOLOGY AND COMMUNICATIONS Executive Agency “Electronic Communication Networks.
Agenda Past & Present Who we are & what we do Activities Challenges.
European collaboration on research networking development update on TERENA activities Karel Vietsch TERENA CEO Spring 2002 Internet2 Member Meeting Arlington.
The Practices of CERT -- Building National Computer Network Emergency Response Capability Mingqi CHEN CNCERT/CC APCERT APAN Bangkok.
Academic and Research Network of Slovenia Avgust Jauk NATO ANW, Ljubljana, Sep
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
1  Carnegie Mellon University Overview of the CERT/CC and the Survivable Systems Initiative Andrew P. Moore CERT Coordination Center.
The Case for National CSIRTs ENOG 12 | Yerevan | 3-4 Oct 2016
WISE 2017 Collaborating Communities
Real-time protection for web sites and web apps against ATTACKS
Establishing national (governmental) CERTs in CIS Countries
CSIRT collaboration in Europe
Cyber Security coordination in Europe CERT-EU’s perspective
گروه پاسخگویی به فوریتهای رایانه ای Computer Emergency Response Team (CERT) سیدمحمدرضا رشتی اسفندماه
Computer Emergency Response Team
Computer Security Cooperation in Europe
CSIRT collaboration in Europe
Streamline your move to the cloud
Presentation transcript:

CERT Polska Experiences in incident handling The CLOSER Project Mirosław Maj Chisinau, 11/10/2004

Agenda  Who we are? Not too much about NASK  A bit of history. We look to the past but not only  What do we do and for whom? Incidnet handling Some projects  Why bother with security?  How to be CLOSER? A few words about CLOSER project

Who we are?  NASK is the Research and Academic Network in Poland Academic background Commercial services Administrator of the top-level domain - *.pl  CERT Polska is the incident handling team within NASK  We ARE NOT incident handling team for NASK!

A bit of history  June 1995 – First contact with CERT/CC INET conference and pre-conference NATO sponsored networking workshop for developing countries: Security Track lead by Barbra Fraser (CERT/CC): idea of Incident Response was introduced  September 1995 – First contact with FIRST 4th FIRST conference in Karlsruhe  1996 – establishing CERT NASK Visit to DFN-CERT to learn best practices  1997 – joining FIRST (sponsored by DFN-CERT)  2000 – extending the formula of our IRT new roadmap to introduce new project for polish constituency Changing the name to CERT Polska  2001 – joining TERENA TF CSIRT

Who we are? Krzysztof Silicki Mirosław MajPrzemek JaroszewskiPiotr Kijewski Irek Parafjańczuk Andrzej DereszowskiDariusz Sobolewski

Who we are?  FIRST (Forum of Incident Response and Security Teams)  TERENA TF-CSIRT (Trans European Reaserch and Academic Networks Association – Task Force Computer Security Incident Response Teams)  Trusted Introducer (Team Level 2)

What do we do and for whom?  Our goals: providing a single, trusted point of contact in Poland for the NASK customers community and other networks in Poland to deal with network security incidents and their prevention responding to security incidents in networks connected to NASK and networks connected to other Polish providers reporting of security incidents providing security information and warnings of possible attacks cooperation with other incident response teams all over the world

Incident Handling

Incident handling

Incident Handling

Some projects  Security vortal:  ARAKIS Project:  Hotline:just started…

So… why bother with security?  Security threats are real: Do not just think about your infrastructure – think also about security of your end users Source:

So… why bother with security? From: "Susie Ward" To: xxxxxxx CC: xxxxxxx Subject: S p a m - H o s t i n g $ Date: Tue, 17 Feb :57: Hello. Spam Hosting. Location: Korea OS: FreeBSD Port: 100mbit. IP: + PHP, CGI, MYSQL, 500MB, cPanel. 250$/mesyac. Fraud Hosting. Location: Korea OS: FreeBSD Port: 100mbit. IP: + PHP, CGI, MYSQL, 500MB, cPanel. 450$/mesyac. Dedicated form 500$ per mounth. Contacts: ICQ: extant brisk abbot ancestor swift cavitate gourd crisscross spool assay acapulco empiric brandon citrus classmate berserk

Why bother with security?  Ignoring threats cost resources D(D)oS - It costs to be offline Data theft – Backups do not help much when sensitive information is stolen Compromise – How much does your reputation cost?.. So what is an idea for a solution?

The CLOSER project CL uster O f SE curity R esources  3rd call IST 6FP  Goals: Learn and describe current situation in Europe Build and strengthen awareness of security overall and the incident handling services in particular Exchanging experiences of the existing CSIR Teams Transferring these experiences and knowledge to newly established teams

The CLOSER project TPF

The CLOSER project

 Final remarks NRENs are tidbits for hackers Regardless of it will be CERT or just CERT’s services – having it will pay off We do not know whether the CLOSER project will be approved or not Anyway we promise to help anybody who is interesing as much as possible Daddy, I can see that hackers don’t sleep!

CERT Polska Daddy, I can see that hackers don’t sleep!