GVF CyberSecurity Task Force Rakesh Bharania Chair, GVF Security Task Force Network Consulting Engineer, Cisco Tactical Operations 2015 Update on Activities.

Slides:



Advertisements
Similar presentations
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Advertisements

CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
IPv4 Depletion and IPv6 Adoption Today Community Use Slide Deck Courtesy of ARIN May 2014.
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. Tribal Telecom 2015.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Website Hardening HUIT IT Security | Sep
Treasury in the Cloud Bob Stark – Vice President, Strategy September 17, 2014.
Steering Committee CSRIC Working Group 2A Cyber Security Best Practices October 7, 2010.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Information Systems Security Computer System Life Cycle Security.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
CHAPTER 10 Session Hijacking. INTRODUCTION The act of taking over a connection of some sort, for examples, network connection, a modem connection or other.
AASSA Conference 2012 Quito, Ecuador March 16 th 2012 All the rights reserved.Instructor: Francisco Bolaños, Ing. InterAmerican Academy Ethical Hacking.
Appendix C: Designing an Operations Framework to Manage Security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
CHAPTER 15 Reporting Security Problems. INTRODUCTION There are two choices that can be made when you find a security problem in some software, hardware.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Improving Security through Software Dr Warren Toomey School of Computer Science Australian Defence Force Academy.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Lecture 24 Wireless Network Security
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Enterprise Cybersecurity Strategy
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
IoT BBQ Carve Systems. Outline About us (Carve) About IoT Our IoT assessment methodology The Sacred Tenants of IoT Security Some bugs IoT IRL.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
ASU/City of Tempe Wireless By William E. Lewis. Agenda Goals for the project What has been done? Current functionality Where do we go from here?
Full Disclosure: Is It Beneficial? Project Based Information Systems Tim Schultz 12/02/02.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
© 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design.
TUF: Secure Software Updates Justin Cappos NYU Poly Computer Science and Engineering.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Proactive Incident Response
Principles Identified - UK DfT -
Enhancing Network Security
CSCE 548 Student Presentation By Manasa Suthram
3.6 Fundamentals of cyber security
ISSeG Integrated Site Security for Grids WP2 - Methodology
Case Study - Target.
Security Testing Methods
Agenda Control systems defined
Secure Software Confidentiality Integrity Data Security Authentication
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch.
Six Steps to Secure Access for Privileged Insiders and Vendors
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Common Operating System Exploits
I have many checklists: how do I get started with cyber security?
SAM GDPR Assessment <Insert partner logo here>
IS4680 Security Auditing for Compliance
David J. Carter, CISO Commonwealth Office of Technology
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Test 3 review FTP & Cybersecurity
Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd
Presentation transcript:

GVF CyberSecurity Task Force Rakesh Bharania Chair, GVF Security Task Force Network Consulting Engineer, Cisco Tactical Operations 2015 Update on Activities and Security Implications for HTS

Agenda: Media reports of VSAT security GVF Response GVF Product Security Baseline (PSB) Conclusion…

Cisco Public 3 © Cisco and/or its affiliates. All rights reserved. Timeline of recent media reports…

Cisco Public 4 4 © Cisco and/or its affiliates. All rights reserved. 1/9/2014: IntelCrawler report: Scan of entire IPv4 address space “found approximately 313 open UHP VSAT Terminals, 9045 open HUGHES Terminals, 1142 SatLink VSAT”, “use of default passwords, telnet” Timeline: VSAT Security In the Media

Cisco Public 5 5 © Cisco and/or its affiliates. All rights reserved. 1/31/2014: CERT/CC Publishes Bulletin on BGAN Vulnerability Note VU : “Firmware developed by Hughes Network Systems used in a number of BGAN satellite terminals contains undocumented hardcoded login credentials (CWE-798) … contains insecure proprietary protocol on TCP 1827 that can be used to perform privileged operations (CWE-306) Timeline: VSAT Security In the Media

Cisco Public 6 6 © Cisco and/or its affiliates. All rights reserved. 2/20/2014: GVF Announces Cybersecurity Task Force “…global initiative to address escalating cyber- security threats with the establishment of a task force that will identify best practice and provide guidance on how users and industry can optimize the application of VSATs to reinforce network integrity.” Timeline: VSAT Security In the Media

Cisco Public 7 7 © Cisco and/or its affiliates. All rights reserved. 4/17/2014: IO Active report “A Wake up Call for SATCOM Security” Discussed vulnerabilities in Harris, Hughes, Thuraya, Cobham, JRC, Iridium products Attacks included: backdoors, hardcoded credentials, insecure and undocumented protocols, weak password reset mechanisms. Attempted coordinated disclosure with vendors & CERT/CC, but only Iridium responded to inquiries. HUGE media uptake: industry press, BBC, Wired, Ars Technica, Christian Science Monitor, 60+ articles written Timeline: VSAT Security In the Media

Cisco Public 8 8 © Cisco and/or its affiliates. All rights reserved. Sometime later this year… The other shoe will drop “Specific details needed to replicate or test for the vulnerabilities discovered in this phase will not be disclosed publicly until the latter half of 2014–allowing time for the relevant fixes to be developed and deployed. ” Challenge to the VSAT industry: are you paying attention? Timeline: VSAT Security In the Media

Cisco Public 9 © Cisco and/or its affiliates. All rights reserved. The GVF Product Security Baseline

Cisco Public 10 Cisco Public 10 © Cisco and/or its affiliates. All rights reserved. Voluntary specification created by the members of the task force Representation from vendors, network operators, end-users of VSAT (FSS/MSS) Details requirements and recommendations for all VSAT hardware and software that supports or transmits on an IPv4 or IPv6 network. Details requirements and recommendations for all VSAT equipment and software vendors for vulnerability management, disclosure, etc. The GVF Product Security Baseline

Cisco Public 11 Cisco Public 11 © Cisco and/or its affiliates. All rights reserved. Current Status: GVF PSB is in “near final” state. Task Force members have access to the specification, and are starting implementation, since we do not know when vulnerabilities will be detailed or exploited. Successful implementation requires a “culture of security,” may not be easy (or cheap) – but it does need to happen. The GVF Product Security Baseline

Cisco Public 12 © Cisco and/or its affiliates. All rights reserved. Wrapping up…

Cisco Public 13 Cisco Public 13 © Cisco and/or its affiliates. All rights reserved. Security scrutiny of the satellite industry is higher than it’s ever been. Exploitation of systems is widely discussed, and we should assume the bad guys are paying attention too – and using that knowledge maliciously. GVF Security Task Force – a coordination center for satellite security knowledge Vendors and network operators should implement robust protection, abandon widely discredited practices where they still exist. In conclusion: This isn’t going away.

Thank you.

Cisco Public 15 © Cisco and/or its affiliates. All rights reserved. Backup Slides

Cisco Public 16 Cisco Public 16 © Cisco and/or its affiliates. All rights reserved. GAO Report, August 2002 “Commercial Satellite Security Should Be More Fully Addressed” “Commercial satellite service providers have established operational procedures, including security techniques, some of which, according to officials, cannot be easily changed.” Because we have been here before…

Cisco Public 17 Cisco Public 17 © Cisco and/or its affiliates. All rights reserved. “Satellite Hacking, a Guide for the Perplexed” (May 2013) “A root cause of many satellite vulnerabilities is an attempt to cut cost… profit driven risk assessment, particularly with commercial operators, has resulted in increased Internet connectivity and reduced redundancy, hardening, and encryption. Increasing Internet connectivity of satellite systems increases performance and reduces the cost of operations, but it exposes satellite systems to increased risk of malicious activity.” Because we have been here before…