Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Understanding Which New Threats Operators Can Expect To Face Within The Next Two To Five Years To Improve The On- Going Management Of Security Systems.

Similar presentations


Presentation on theme: "1 Understanding Which New Threats Operators Can Expect To Face Within The Next Two To Five Years To Improve The On- Going Management Of Security Systems."— Presentation transcript:

1 1 Understanding Which New Threats Operators Can Expect To Face Within The Next Two To Five Years To Improve The On- Going Management Of Security Systems Prof. Ravi Sandhu Executive Director and Endowed Chair Cyber Security For Process Control: Remote Oil & Gas Assets CSPC16 Houston, Texas June 23, 2016 ravi.sandhu@utsa.edu www.profsandhu.com www.ics.utsa.edu © Ravi Sandhu World-Leading Research with Real-World Impact!

2  Computer security  Computer security + Communications security  Information security  Information assurance  Mission assurance  Larger than cyber security © Ravi Sandhu 2 World-Leading Research with Real-World Impact! Cyber Security Evolution

3  Computer security  Computer security + Communications security  Information security  Information assurance  Mission assurance  Larger than cyber security © Ravi Sandhu 3 World-Leading Research with Real-World Impact! Cyber Security Evolution Things that can go boom is a game changer

4  Segregate  Authenticate  Authorize  Monitor  Contain  Adapt © Ravi Sandhu 4 World-Leading Research with Real-World Impact! Cyber Security Foundations

5  Segregate  Authenticate  Authorize  Monitor  Contain  Adapt © Ravi Sandhu 5 World-Leading Research with Real-World Impact! Cyber Security Foundations ● Data Access versus System Access ● Human Users versus Machine Users

6 © Ravi Sandhu 6 World-Leading Research with Real-World Impact! Threat Matrix Examples High Skill Low Skill Opportunistic Targeted Default passwords Spear phishing Zero-day attack Stuxnet

7 © Ravi Sandhu 7 World-Leading Research with Real-World Impact! Threat Matrix Defenses High Skill Low Skill Opportunistic Targeted Basic hygiene Security awareness Be better than your neighbor ??

8 ALLOW GOOD GUYS IN KEEP BAD GUYS OUT  IP Spoofing predicted in Bell Labs report ≈ 1985  Unencrypted Telnet with passwords in clear  1st Generation firewalls deployed ≈ 1992  IP Spoofing attacks proliferate in the wild ≈ 1993  VPNs emerge ≈ late 1990’s  Vulnerability shifts to accessing end-point  Network Admission Control ≈ 2000’s  Persists as a Distributed Denial of Service (DDoS) mechanism ≈ 2010’s © Ravi Sandhu 8 World-Leading Research with Real-World Impact! IP Spoofing Story

9 © Ravi Sandhu 9 World-Leading Research with Real-World Impact! Ravi’s Laws 2010 1.Attackers exist You will be attacked 2.Attackers have sharply escalating incentive Money, terrorism, warfare, espionage, sabotage, … 3.Attackers are lazy (follow path of least resistance) Attacks will escalate BUT no faster than necessary 4.Attackers are innovative (and stealthy) Eventually all feasible attacks will manifest 5.Attackers are copycats Known attacks will proliferate widely 6.Attackers have asymmetrical advantage Need one point of failure

10 © Ravi Sandhu 10 World-Leading Research with Real-World Impact! Cyber Security Principles A. Prepare for tomorrow’s attacks, not just yesterday’s Good defenders strive to stay ahead of the curve, bad defenders forever lag B. Take care of tomorrow’s attacks before next year’s attacks Researchers will and should pursue defense against attacks that will manifest far in the future BUT these solutions will deploy only as attacks catch up C. Use future-proof barriers Defenders need a roadmap and need to make adjustments D. It’s all about trade-offs Security, Convenience, Cost


Download ppt "1 Understanding Which New Threats Operators Can Expect To Face Within The Next Two To Five Years To Improve The On- Going Management Of Security Systems."

Similar presentations


Ads by Google