In the Crossfire International Cooperation and Computer Crime Stewart Baker.

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Ethics, Privacy and Information Security
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
1 Telstra in Confidence Managing Security for our Mobile Technology.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Factors to be taken into account when designing ICT Security Policies
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
New Data Regulation Law 201 CMR TJX Video.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Securing Information Systems
Information Security Technological Security Implementation and Privacy Protection.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Study Results Advanced Persistent Threat Awareness.
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Blueberry Software IT Security Audit Results. Results: Good.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Scott Charney Cybercrime and Risk Management PwC.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer.
Computer Security By Duncan Hall.
Security threats from pervasive broadband access Prof. Jim Norton Chartered Director & Chartered Engineer Senior Policy Adviser e-Business & e-Government.
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
MIS323 – Business Telecommunications Chapter 10 Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Information Systems Design and Development Security Precautions Computing Science.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Information Management System Ali Saeed Khan 29 th April, 2016.
UNIT V Security Management of Information Technology.
Securing Information Systems
Securing Information Systems
Lecture 14: Business Information Systems - ICT Security
DETAILED Global CYBERSECURITY SURVEY Summary RESULTS
Securing Information Systems
Teaching Computing to GCSE
I have many checklists: how do I get started with cyber security?
Cyber attacks on Democratic processes
Contact Center Security Strategies
Implementing Client Security on Windows 2000 and Windows XP Level 150
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
G061 - Network Security.
Presentation transcript:

In the Crossfire International Cooperation and Computer Crime Stewart Baker

Waterloo Mt. Tambora

1817

6 th century BC

Stability and speed Stability Speed A B C

What Point B Looks Like

Stability and speed Stability Speed A B C

What Point C Looks Like

Have we reached Point C for information technology? What the CSIS report found

Summary Attacks are already heavy Adoption of security measures lags The many roles of governments – Regulator – Policeman – Attacker

1. Attacks are already heavy 60% reported theft-of-service cyberattacks – Low: Germany, UK (42%) – High: India (83%), Brazil (77%), France (76%) 29% reported multiple large-scale denial of service attacks each month, and nearly two-thirds of those reported an impact on operations – High: France (60%), India (50%) 89% report infection with viruses or other malware 70+% report a wide range of other attacks – E.g., phishing and pharming. More sophisticated attacks like DNS poisoning or SQL injection are less common, but still widespread – more than half of respondents report these attacks

2. Adoption of security measures lags behind the threat Basic, key security measures are not widely adopted – Fewer than 60% patched and updated software on a regular schedule – User name and password the most common form of login/authentication – more than three-quarters of SCADA/ICS systems are connected to an IP network or the Internet nearly half of those admitted that these connections create unresolved security issues Security measure adoption rates vary widely by country

Security measure adoption rate More than two dozen different security measures -- technologies, policies and procedures Security Information and Event Management tools Network access control measures Intrusion prevention systems Database security and access controls Data leak prevention tools Intrusion detection systems Firewalls to public network Firewalls between systems Application whitelisting Role and activity anomaly detection Standardized desktop Use threat monitoring service Encryption for – Online transmission to network Laptop hard drives Individual s Data in databases Data while in network storage Tapes, portable media Authentication by – User name and password Token Biometrics Regular patches and updates Threat information sharing Restrict or ban USB sticks

China leads in adopting security measures

3. The many roles of governments Regulators – Regulation seen as generally positive 74% have implemented new measures as a result of regulation 58% say regulation has “sharpened policy and improved security” 28% say it has “diverted resources from improving security to recording/reporting incidents or other forms of compliance” – Audit frequency varies widely Policemen – Widespread skepticism about governments’ ability to protect networks Attackers, infiltrators and adversaries

Regulator: auditing to enforce compliance varies widely

Policeman: Little faith in laws against cyber- attack

Attacker: 60% believe governments are already attacking their country

Attacker: Many report government-style attacks Half report “stealthy infiltration by high-level adversary … like in Ghostnet” Half report DDOS attacks by “high-level adversaries” including governments:

Attacker: United States and China are most feared; Russia is third

China the outlier Chinese executives report -- – Uniquely close cooperation with officials – High levels of regulation and auditing – Very robust confidence in government – Much higher adoption of security measures China is taking concerted steps to bolster its industries’ defenses Are the steps effective? – Chinese companies report low to average levels of attack and damage – China does appear better protected than other large developing countries, such as India and Brazil

Changing the Trajectory

Is there a broader solution? Deterrence depends on attribution – Attribution is not possible today – Can’t depend on international cooperation as long as attribution is not possible – Technology has been tilted against attribution An end to anonymity on the serious Internet? – Code – Devices – Routing

The End