1 Emerging Risks Emerging Risks in Network and Information Systems Security Evangelos Markatos FORTH-ICS, Crete, Greece in collaboration with Louis Marinos ENISA
2 Roadmap Motivation Why is this work important? Which are the drivers of the emerging threats? Technical Dimensions New Applications Market Trends Which are the Risks? Current, Emerging, and Future Scenarios Objectives How do you come up with one? Examples
3 Roadmap Motivation Why is this work important? Which are the drivers of the emerging threats? Technical Dimensions New Applications Market Trends Which are the Risks? Current, Emerging, and Future Scenarios Objectives How do you come up with one? Examples
4 Motivation Prepare for the future Anticipate the emerging risks you can prepare better you can inform beneficiaries you may be one step ahead in the security arms race
5 A strategy for a Secure Information Society one of the cornerstones in developing a culture of security is improving our knowledge of the problem. to facilitate effective responses to existing and emerging threats to electronic networks...
6 Federal Plan for Cybersecurity We need to Assess security implications of emerging information technologies Develop and apply new metrics to assess cyber security and information assurance They found that: Integration of emerging technologies into the IT infrastructure increases the breadth of and access to vulnerabilities. emerging technologies will present more information than can reasonably be analyzed with existing capabilities. A particularly difficult problem is finding trends and patterns in attacks
7 So We need to Collect information for Current, Emerging, and Future threats and vulnerabilities in Network and information systems security Current threats: now Emerging threats: next 3 years Future threats: 3 years after that
8 Roadmap Motivation Why is this work important? Which are the drivers of the emerging threats? Technical Dimensions New Applications Market Trends Which are the Risks? Current, Emerging, and Future Scenarios Objectives How do you come up with one? Examples
9 What drives emerging threats? Technical Dimensions What will be the technologies of the future? Application Dimensions What will be the applications of the future? Future Market Trends and Dimensions What are the trends in the market?
10 Drivers: Technical Dimensions Which technical dimensions drive future threats? Wireless Networks Wireless networks could potential be eavesdropped Wireless devices may become more transparent Less visible more integrated with other appliances Proliferation of Broadband Networks i.e. compromised computers have more firepower today. e.g. a 1 Mbps DSL computer can send 10 Gbytes of information per day One million (1,000,000) SPAM messages 10 million attack packets 10 years ago a computer on a 28.8Kbps modem Had two-three orders of magnitude less firepower
11 Drivers: Technical Dimensions (II) Which technical dimensions drive future threats? Device miniaturization Devices will not remind of a traditional computer They will be integrated into other devices (doors, kitchens, etc.) They may not run (properly configured) protection software (e.g. Antivirus) Digital identities (e.g. RFID) More products will have a digital ID People will frequently carry (or wear) products with digital IDs Digital ID readers will proliferate (in public buildings, etc.)
12 Drivers: Applications Smart Mobile Phones Eavesdropping, Loss of privacy, stalking E-banking, e-commerce, e-everything Financial loss, attacks to banking system, attacks to the stock market, etc. Smart Home AmI Lots of wireless potential vulnerable devices Smart Vehicles What if the computer that controls the brakes is compromised?
13 Drivers: Applications (II) E-health What if the computer which controls a medical device gets compromised? What if our medical record is stored in a compromised computer? E-government More and more of our personal information will be stored on-line Blogs Blogs encourage people, including minors, to publish their information on the web This may be used for stalking today It may be used to invade their privacy, etc.
14 Drivers: Future Market Trends and Dimensions On-line services will become more common Online services: commerce, entertainment, news, etc. Even a second-life is possible on-line Mobile phone use will prevail People are on the go mobile phones are needed to support our mobile world Much like electricity supports industrialized nations Service-oriented information society European Economy moves away from traditional products and steps into new forms of services The Internet enables these services to be composed to create even fancier ones E.g. find a doctor who has an opening at a date a time compatible with your schedule and your mother s schedule and who is located nearby
15 Roadmap Motivation Why is this work important? Which are the drivers of the emerging threats? Technical Dimensions New Applications Market Trends Which are the Risks? Current, Emerging, and Future Scenarios Objectives How do you come up with one? Examples
16 Current Risks SPAM to addresses, phones, etc. Botnets zombie computers Phishing Using more means (phones, SMS) More targeted ( Hi Pal. We met at the IST conf. Let me tell you about ) Identity theft Login/password Route hijacking Divert/Intercept traffic from the Internet Instant Messaging Chat, etc. SMS, etc.
17 Current Risks Peer-to-peer systems File sharing systems Download malware Malware on Cell Phones Through SMS, MMS, (free) games Hackers in Stock Market Through compromised bank accounts Software Vulnerabilities Software is getting larger and more complex No protection (e.g. antivirus) in some devices Mobile phones Printers, Refrigerators, kitchens, stoves, etc.
18 Emerging Risks SCADA Supervisory Control And Data Acquisition Increased home automation A hacker may penetrate the computer which controls the front door Massive collections of personal data Invisible data collection in public places Invisible data collection in private premises Security is more an art rather than a science
19 Emerging Risks (II) DoS attack to the home telephone Image hackers/spamers calling all the time on the telephone Hacking home heat and/or air-conditioning system Turn on/off the stove while the owner is away Internet users are younger, less experienced, and more prone to targeted attacks Internet users may not have strong motives to clean up their compromised computers Malware over multiple networks (GSM, GPRS, Internet, Bluetooth)
20 Future Risks Manageability Currently we manage a few digital devices: Computer, PDA, mobile phone, laptop In the future we will have 10 s if not 100 s of such devices most of which will be hidden Over-use of ICT People use ICT even when not needed They send instead of talking to people They use e-voting systems when traditional raise your hand votes work just fine Such approaches open the road to cyber attackers Use home appliances to attack infrastructures Use thousands of compromised phones to jam the telephone network Use thousands of compromised Airconditioning units to overload the electric power GRID
21 Roadmap Motivation Why is this work important? Which are the drivers of the emerging threats? Technical Dimensions New Applications Market Trends Which are the Risks? Current, Emerging, and Future Scenarios Objectives How do you come up with one? Examples
22 Scenarios: Objectives Goals: Present easy to say story Set the stage by an example Explain Who may be the victims? Who may be the attackers? What is the magnitude of the attack? Is there any way we could have prevented it?
23 Scenarios: How do you come up with one? Think 1. Ask what if questions What if an attacker manages to compromise X? What if an attacker manages to get my login and password for my bank She would be ample to empty my bank account 2. Combine them with real-life events What of an attacker manages to compromise X at a time of Y? What if an attacker manages to get my login and password for my bank at the time of my Christmas bonus? She would be able to get more money
24 Scenarios: How do you come up with one? II 3. Explore the dimension of scale What if an attacker manages to compromise X? What if an attacker manages to compromise lots of Xes? e.g. what if an attacker manages to compromise 1000 bank accounts? She may be able to steal 1000 times more money She may be able to shutter the credibility of the bank What if an attacker manages to compromise lots of accounts in several different banks She may be able to undermine the credibility of the banking system
25 Bank Compromization: What if an attacker manages to compromise one bank account? Time: What if the attacker waits before withdrawing the money from the account? Scale: What if the attacker manages to compromise a large number of accounts? Real Life: What if the attacker compromises an account at a time of a stock market crisis? The attacker may be able to compromise more accounts without getting noticed and withdraw a large amount of money The attacker may be able to collect personal information about the owner of the account and use it for blackmail The attacker may be able to escalate the stock market crisis
26 Scenario I: Stock Market Manipulation Mr Smith subscribes to an stock-market alerting SMS service which informs him of promising stock One day he received an alert for a large rise in OILUC (Oil United Consortium) and he decided to immediately sell some of his OILUC stock through his mobile phone. The day after he realized that there was no rise in the price of OILUC Actually thousands of people sold their OILUC stock at rock bottom price as a result of the fake SMS messages they received
27 Scenario I: Stock Market Manipulation Dimensions of the problem Phishing: Mr Smith received a fake SMS for an alleged increase in his stock m-banking Mr. Smith was able to sell stock via his mobile phone Mobile way of life People on the go make important financial decisions without having the time to thoroughly double-check them
28 Scenario II: Bank Crash John Cracker managed to get the personal data (names, phones, and addresses) of customers of the Western European Credit Bank He sent a phishing to half of them inviting them to check out the alleged new features of the web site of the bank. John managed to collect usernames and passwords for about 500 accounts. Then he launched a double attack: He robbed the accounts He send the telephone numbers of the victims to reporters alerting them of the fact
29 Scenario II: Bank Crash Most of the victims found themselves learning about the phishing scam live on the evening news. The impact was so huge that all the bank s customers demanded to withdraw their money. To avoid crashing, next day the bank remain closed until people calm down. Then John released the second part of his attack. He sent to the rest of the bank s customers seemingly on behalf of the Bank president where he: Apologized for the problem Told them that although the bank is closed, the web site of the bank is open and that through it they can transfer their money to an account of their choice
30 Scenario II Dimensions of the problem: Phishing The customers of the bank were tricked by messages E-banking People used e-banking to transfer money The media The extend of the problem was aggravated by the media and this eventually resulted in panic Two-phase attack The first phase creates panic through a small number of compromised accounts The second phase harvests more money from people in panic
31 In closing The dimensions that drive emerging risks are: New technology Wireless networks, residential broadband networks, device miniaturization, etc. New applications Mobile phones, e-banking, e-government, etc. Social Engineering Phishing, etc. We need to Understand the dimensions of the problem Work towards addressing current, emerging and future risks.
32 Emerging Risks Emerging Risks in Network and Information Systems Security Evangelos Markatos FORTH-ICS, Crete, Greece in collaboration with Louis Marinos ENISA
33 Back up Slides
34 PITAC s Report 2005 US Report Findings: Funding for fundamental research in civilian cyber security should also be substantially increased at other agencies, most notably DHS and DARPA. As a result, the PITAC recommends that the Federal government strengthen its cyber security technology transfer partnership with the private sector. Specifically, the Federal government should place greater emphasis on the development of metrics, models, datasets, and testbeds so that new products and best practices can be evaluated;
35 Things to remember What is the most important thing I would like you to remember Privacy Pervasiveness ICT Integration Social ENGineering PPING
36 Scenarios (III) Exploit both scale and real-life events What if an attacker manages to compromise one traffic light? She may be able to obstruct traffic in one intersection She may even cause accidents, which will obstruct traffic even further What if an attacker manages to compromise several traffic lights? She may be able to obstruct traffic in a whole city What of an attacker manages to compromise several traffic lights during rush hour? She may create chaos
APRIL 2015 VOLUME 20 INTERNET SECURITY THREAT REPORT 2 2015 Internet Security Threat Report MOBILE & IOT WEB THREATS SOCIAL MEDIA & SCAMS TARGETED ATTACKS 4 Introduction 5 Executive Summary 9 IN NUMBERS
CHAPTER 7 Information and communications technology (ICT) in small business WHY IT IS IMPORTANT We are currently living through a massive revolution in communications. Even in your lifetime so far, you
The Critical Security Controls for Effective Cyber Defense Version 5.0 1 Introduction... 3 CSC 1: Inventory of Authorized and Unauthorized Devices... 8 CSC 2: Inventory of Authorized and Unauthorized Software...
2014 Year of Mega Breaches & Identity Theft Findings from the 2014 BREACH LEVEL INDEX POWERED BY BREACH LEVEL INDEX THE NUMBERS RECORDS BREACHED IN 2014 1,023,108,267 NUMBER OF BREACH INCIDENTS 1,541 BREACHED
New York State Office of the State Comptroller Division of Local Government and School Accountability LOCAL GOVERNMENT MANAGEMENT GUIDE Information Technology Governance Thomas P. DiNapoli State Comptroller
In the Dark Crucial Industries Confront Cyberattacks McAfee second annual critical infrastructure protection report Written with the Center for Strategic and International Studies (CSIS) In the Dark Authors:
European Cyber Security Perspectives 2015 3 Preface Dear reader, Following the success of last year s publication, we are proud to present the second edition of our European Cyber Security Perspectives
VOIP THEFT OF SERVICE: PROTECTING YOUR NETWORK ====== Table of Contents Introduction to VoIP Theft of Service... 2 Meet Our Expert Phone Power... 2 The Anatomy of International Revenue Sharing Fraud...
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
10101010101010101010101010101010101010101010101010101010101010101 01010101010101010101010101010101010101010101010101010101010101010 NCSRA II 01010101010101010101010101010100101010101010101010101010101010101
V 1.0 November, 2010 CYBERSECURITY The protection of data and systems in networks that connect to the Internet 10 Best Practices For The Small Healthcare Environment Your Regional Extension Center Contact
The Custom Defense Against Targeted Attacks A Trend Micro White Paper Contents Executive Summary...3 The Anatomy of a Targeted Attack...4 The Reality and Costs of Targeted Attacks...5 Strategic Choices
Summary of Responses to an Industry RFI Regarding a Role for CMS with Personal Health Records Table of Contents EXECUTIVE SUMMARY... 4 1. INTRODUCTON... 7 2. CMS ROLE WITH PHRs... 9 What PHR functionalities
A REPORT BY HARVARD BUSINESS REVIEW ANALYTIC SERVICES Meeting the Cyber Risk Challenge Sponsored by ABOUT ZURICH INSURANCE GROUP Zurich Insurance Group (Zurich) is a leading multi-line insurance provider
Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR-2015-026 July 6, 2015 Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications
EUROPEAN COMMISSION Brussels, 6.5.2015 COM(2015) 192 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
How mobile phones help learning in secondary schools A report to Becta March 2008 Authors: Elizabeth Hartnell-Young and Nadja Heym Learning Sciences Research Institute University of Nottingham www.lsri.nottingham.ac.uk
Responding to a Data Breach Communications Guidelines for Merchants Responding to a Data Breach Communications Guidelines for Merchants It all comes down to one word: TRUST. How merchants respond to data
Summit on Education in Secure Software Final Report Dr. Diana L. Burley The George Washington University Dr. Matt Bishop University of California, Davis GW: UCD: Report GW-CSPRI-2011-7 Technical Report
Cyber security and fraud: The impact on small businesses Federation of Small Businesses Telephone: 020 7592 8100 Facsimile: 020 7233 7899 Website: www.fsb.org.uk Cyber security and fraud: the impact on
Convergence of Social, Mobile and Cloud: 7 Steps to Ensure Success June, 2013 Contents Executive Overview...4 Business Innovation & Transformation...5 Roadmap for Social, Mobile and Cloud Solutions...7
A Trend Micro Research Paper Suggestions to Help Companies with the Fight Against Targeted Attacks Jim Gogolinski Forward-Looking Threat Research Team Contents Introduction...3 Targeted Attacks...4 Defining