PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

Incident Response Managing Security at Microsoft Published: April 2004.
The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
Tanzania Communications Regulatory Authority - TCRA Response to Cyber incidences in Tanzania: Where are we? Presented at Cyber Security Mini Conference.
IMPROVING THE INTERNATIONAL COMPARABILITY OF STATISTICS PRODUCED BY CSIRTs Developing Cybersecurity Risk Indicators panel 26 th Annual FIRST Conference.
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
A Framework to Implement a National Cyber Security Structure for Developing Nations ID Ellefsen - SH von Solms - Academy.
1 Telstra in Confidence Managing Security for our Mobile Technology.
(Geneva, Switzerland, September 2014)
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Session 4.2: Creation of national ICT security infrastructure for developing countries National IP-based Networks Security Centres for Developing Countries.
Strategic Information Systems Planning
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Jackie Phahlamohlaka Mapule Modise Nthumeni Nengovhela
Resources to Support Training Programs for CSIRTs.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
TTA activity for countering BOTNET attack and tracing cyber attacks 14 July, 2008 Heung-youl Youm TTA, Korea DOCUMENT #:GSC13-GTSC6-07 FOR:Presentation.
APRICOT 2015 Security Day Cooperation between Security Teams and Network Operators: Actionable Intelligence on ShellShock Arnold S. Yoon Information Security.
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
Experience to create and manage Computer Security Incident Response Team in Latvia Egils Stūrmanis DDIRV (VITA CSIRT) manager State Joint Stock Company.
The NIGF CONFERENCE © 2013 ADDRESSING THE VULNERABILITY OF CRITICAL ICT INFRASTRUCTURE by Ernest Ndukwe, OFR Chairman Openmedia Communications Ltd 18 th.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
ETHICS, POLICY & SECURITY ISSUES
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Babak Akhgar, Simeon Yates & Eleanor Lockley Chapter 1 - Strategy Formation in a Globalized and Networked.
What is Network and Security Research? Network and Security Research, or Information Communication Technology (ICT) Research involves: the collection,
Legitimate Vulnerability Markets By: Jeff Wheeler.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
Introducing the First Southern African Cyber Security Awareness Workshop (SACSAW) IST-Africa, 12 May 2011 Gaborone, Botswana Dr Jackie Phahlamohlaka CSIR.
Conficker Update John Crain. What is Conficker? An Internet worm  Malicious code that is self-replicating and distributed over a network A blended threat.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
HRG Security Suite™. Why have we created HRG Security Suite? To enhance our global security proposition Help clients with compliance to CSR policy Encourage.
Introduction to Security CS432 – Security in Computing Copyright © 2005, 2009 by Scott Orr and the Trustees of Indiana University.
Describe the potential of IT to improve internal and external communications By Jim Green.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Sofia, 09 June Sofia, 09 June 2010 MINISTRY OF TRANSPORT, INFORMATION TECHNOLOGY AND COMMUNICATIONS Executive Agency “Electronic Communication Networks.
TLP:Green FIRST/TF-CSIRT Technical Colloquium January 25 th – 27 th, 2016 Prague, CZ TLP:Green.
Safe’n’Sec IT security solutions for enterprises of any size.
MIS323 – Business Telecommunications Chapter 10 Security.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
1  Carnegie Mellon University Overview of the CERT/CC and the Survivable Systems Initiative Andrew P. Moore CERT Coordination Center.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Information Management System Ali Saeed Khan 29 th April, 2016.
Servers in the Wild… …and the threats that lurk about. DePaul University Information Security Team TLT Presentation 08 May 2002.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Combating Botnets Botnets are a complex and continuously evolving challenge to user confidence and security on the Internet. Introduction Botnets are.
Information Technology Sector
LCG/EGEE Incident Response Planning
OSG Computer Security Plans
Cyber Security coordination in Europe CERT-EU’s perspective
Role of CERT in fighting against cyber crime
How to approach a top-down call topic in Horizon 2020?
AVI AFRIQUE October 2018 Tshepo Peege
Networking for Home and Small Businesses – Chapter 8
Community of Users.
Computer Emergency Response Team
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*

© CSIR Agenda Introduction Why a CSIRT in the Military Typical threats to information infrastructure What is a CSIRT Benefits of a CSIRT Conclusion

© CSIR Introduction Civilian infrastructure is under constant threat Increasingly the millitary relies on commercial and civil systems The threats are similar The civilian approach is a CSIRT – equally necessary for the military

© CSIR Why a CSIRT in the Military (1)‏ The use of commercial software The use of common information infrastructure (e.g. hardware systems)‏ Microsoft systems are actively targeted Threat of class breaks “Class break in simple terms means vulnerability because of commonality” The growing market of vulnerability exploits is also a threat

© CSIR Current situation… No more security through obscurity Lack of close cooperation with civil society Lack of trust and human network of relationships Military CSIRT leads to… Trust and collaboration International cooperation “My security depends on your security” mindset Attraction of qualified and skilled professionals Why a CSIRT in the Military (2)‏

© CSIR Typical threats and risks to information infrastructure Viruses and worms Trojans Botnets and Distributed Denial of Service (DDoS) attacks Vulnerability and exploits Spam Targeted attacks agains the systems

© CSIR Then... What is a CSIRT (1)‏ Team of experts focused on IT security Provides services and support for preventing, handling and responding to IT security incidents Collaboration and networking with the CSIRT community

© CSIR What is a CSIRT (2)‏ The role Reactive services Proactive services Security quality management

© CSIR What is a CSIRT (3)‏ Constituency User base that needs protection against incidents Needs to be clearly defined Services tailored to their needs

© CSIR Benefits of a CSIRT in the military Military focuses on its core function CSIRT focuses on security issues Inspires confidence by having an internally safe infrastructure A stable infrastructure even in warfare times Centralised incident response coordination Access to and building technical expertise

© CSIR Conclusion No more security through obscurity Military infrastructure exposed to the same risk as civilian infrastructure Civillian counter-measure is a CSIRT We propose the Military follow suite

© CSIR Conclusion “ Africa, and hence South Africa (and the South African National Defence Force) cannot escape the impact of the Information Age. It is therefore both a national and military strategic objective to leverage the advantage posed by modern communication, computer and information systems, and to mitigate the vulnerability introduced by the presence and use of these systems.” - SANDF Philosophy for Information Warfare

© CSIR I thank you Any questions welcome