KYPO A Platform for Cyber Defence Exercises
|
|
|
- Nancy Freeman
- 10 years ago
- Views:
Transcription
1 Pavel Čeleda, Jakub Čegan, Jan Vykopal, Daniel Tovarňák Institute of Computer Science, Masaryk University, Botanická 554/68a, Brno CZECH REPUBLIC ABSTRACT Correct and timely responses to cyber attacks are crucial for the effective implementation of cyber defence strategies and policies. The number of threats and ingenuity of attackers is ever growing, as is the need for more advanced detection tools, techniques and skilled cyber security professionals. KYPO Cyber Exercise & Research Platform is focused on modelling and simulating complex computer systems and networks in a virtualized and separated environment. The platform enables realistic simulations of critical information infrastructures in a fully controlled and monitored environment. Time-efficient and cost-effective simulation is feasible using cloud resources instead of a dedicated infrastructure. In this paper, we present the KYPO platform and its use cases. We aim to execute current and sophisticated cyber attacks against simulated infrastructure since this is one of the key premises for running successful cyber security training exercises. To make the desirable improvement in the skills of the participants, a powerful storyline for the exercise is essential. Last but not least, we understand that technical skills must be complemented by communication, strategy and other skills for effective cyber defence. 1.0 INTRODUCTION Operational systems and networks are not suitable for testing cyber attacks. However, to train cyber defence and develop responses to cyber attacks, a dedicated infrastructure (cyber range, testbed) is usually built. A cyber range provides a place to practice correct and timely responses to cyber attacks. In such a way, the security teams (CSIRT/CERT) can practice skills such as network monitoring, attack detection and mitigation, penetration testing, and many others in a realistic environment. In this paper, we shall present KYPO Cyber Exercise & Research Platform. KYPO aims to provide a virtualised environment for performing complex cybernetic attacks against a simulated critical infrastructure. The KYPO platform was made for research and development of new security methods, tools and for training security teams and students. KYPO was developed, and is operated, by CSIRT-MU the security team of Masaryk University. Today, KYPO is the largest academic cyber range in the Czech Republic. The proposed platform is fully cloud-based and supports multiple use cases (research, training). To validate KYPO, we co-organized the Czech national cyber exercise, Cyber Czech In this paper, we shall provide a brief overview of the cyber exercise. The cyber exercise will be held in the KYPO Lab in October This paper is divided into six sections. Section 2 shall provide background information about cyber defence exercises and cyber ranges. Section 3 will describe KYPO s architecture and list the main requirements for the proposed architecture. Section 4 shall describe three main KYPO use cases. Section 5 will explain the design of a cyber defence exercise, it s technical implementation, and demonstrates the KYPO Lab. Finally, Section 6 will conclude the paper and outline the future development of KYPO. STO-MP-MSG
2 2.0 RELATED WORK Cyber defence exercises and competitions are held in many diverse types of technical infrastructures. At the one end, there are table-top exercises of strategic skills (such as [1]) with no ICT interaction or ICT support during the actual exercise. At the other end, technical exercises (such as [2] or [3]) employ cyber ranges and supportive infrastructure for communication within the exercise and evaluation of participants actions. The cyber ranges simulate complex network setups in a contained environment. Therefore, participants can realistically interact with an assigned host or network infrastructure, and their actions cannot interfere with the operational environment. There are more than 30 known cyber ranges and testbeds that can be used for cyber exercises worldwide [4]. This number is based on publicly available, non-classified information. Since the development and operation of some cyber ranges is funded by the military of various countries, there may be other classified cyber ranges. An extensive survey of the state-of-the-art of cyber range implementations was published by Davis and Magrath from the Australian Department of Defence in 2013 [4]. Due to very limited public information about the usage of particular cyber ranges in the exercises, we can report only on the technical infrastructure used in the cyber defence exercises we participated in. The Estonian Cyber Range, developed by NATO Cooperative Cyber Defence Centre of Excellence (CCD CoE), is a backbone of two NATO exercises: Locked Shields [2] and Cyber Coalition [3]. The Estonian Cyber Range relies on a VMware vsphere platform which simulates a complete game network of hundreds of hosts with various OS platforms. All types of participants attackers, defenders and evaluators access their part of the game network remotely using their own devices connected to a Virtual Private Network (VPN) provided by the range. The participants were also provided with an ad-hoc support infrastructure: communication and reporting tools (Jabber, mail), systems for sharing indicators of compromise, online scoring, and web portal hosting knowledge base of the exercise (rules, scenario, access instructions etc.). In contrast to the two NATO exercises, the technical phase of Cyber Europe 2014 [5] took a different approach. This is organized by European Union Agency for Network and Information Security (ENISA). The participants have access to several web applications which simulate social media networks, news, plain text sharing and data (images of compromised hosts, suspicious files, traffic traces) for analysis in accordance with an exercise scenario. Standard infrastructure and web portal were used for communication between the organizers and participants. 3.0 KYPO ARCHITECTURE The KYPO platform was developed using requirements-driven development process. The most important design choices related to the high-level architecture were also based on functional and non-functional requirements defined in the preliminary phases of the project lifecycle. Some of the main requirements are listed below. Flexibility the platform should support the instantiation of arbitrary network topologies, ranging from single node networks to multiple connected networks. For the topology nodes, a wide range of operating systems should be supported (including arbitrary software packages). The creation and configuration of such topologies should be as dynamic as possible. Scalability the platform should scale well in terms of: the number of topology nodes, processing power and other available resources of the individual nodes, network size and bandwidth, the number of sandboxes (more on sandboxes later), and the number of users. Isolation vs. Interoperability if required, different topologies and platform users should be isolated from the outside world and each other. On the other hand, integration with (or connection 8-2 STO-MP-MSG-133
3 to) external systems should be achieved with reasonable effort. Cost-effectiveness the platform should support deployment on Commercial Off-The-Shelf (COTS) hardware without the need for a dedicated data center. The operational and maintenance costs should be kept as low as possible. Built-in monitoring the platform should natively provide both real-time and post mortem access to detailed monitoring data. These data should be related to individual topologies, including flow data and captured packets from the network links, as well as node metrics and logs. Easy access users with a wide range of experience should be able to use the platform. Web-based access to its core functions should be available. Service-based access since the development effort and maintenance costs of a similar platform are non-trivial for a typical security team or a group of professionals, our goal is to provide transparent access to the platform in the form of a service (PaaS). Open source the platform should reuse suitable open source projects (if possible) and its release artefacts should be distributed under an open source licences. Figure 1: The core building blocks of the platform. It can be seen that many of the requirements can be reasonably fulfilled by mapping the high-level architecture onto a cloud computing model. One of the main decisions to make was whether to develop the KYPO Platform as a Service and the high-level architecture reflects this fact. Since the traditional three-layer cloud service model (IaaS, PaaS and SaaS) is somewhat coarse grained, we describe the KYPO platform in more detail using the building blocks depicted on Figure 1 and described below (from bottom to top). Computing infrastructure includes housing facilities, physical machines, network devices, other hardware and related configuration artefacts. It forms the raw computing resources such as storage, operating memory, and processing power. The KYPO platform currently runs on top of the computing infrastructure provided by courtesy of CERIT s Scientific Cloud [6]. The OpenNebula platform [7] allows for the management of heterogeneous computing resources (usually virtualized) in order to implement the Infrastructure as a Service model. OpenNebula is still managed by CERIT-SC and it is transparently used by the upper layers of KYPO to provide and create virtual machines and configure networking. OpenNebula GUI is sometimes used by KYPO developers to edit and configure particular virtual machines. The cloud API serves as a common interface to the shield upper layers from a particular IaaS implementation, which allow for greater flexibility of the KYPO platform. A driver is currently at its STO-MP-MSG
4 core which translates OpenNebula-specific commands to common API methods. The monitoring API is responsible for monitoring management, i.e. it provides fine-grained control over network links and hosts monitoring configuration (starting, stopping, and attributes manipulation). It interacts both with OpenNebula and with created virtual machines. The scenario and sandbox management API is used to configure, create, edit and destroy the main logical entities of the platform sandboxes by the means of the underlying layers. A Sandbox is an isolated set of virtual machines, networks and monitoring configuration, and provides key features to users, e.g., the flexibility and repeatability of an experiment. Figure 2 illustrates the deployment of two sandboxes in the KYPO platform. The portal is a Graphical User Interface (GUI) of the platform based on the Liferay Portal project. It is used by the users in order to interact with the created sandboxes. The GUI is based on the concept of portlets independent building blocks that encapsulate well-defined functionality. For example, the Topology portlet enables the users to view the network topology of a particular sandbox and open Virtual Network Computing (VNC) connections to its machines using a VNC portlet. Users with a wide range of experience can interact with the KYPO platform via Portal and underlying APIs. The mode of interaction heavily depends on the use case they employ the platform for. For the description of main use cases, see Section 4. Figure 2: An illustration of two isolated sandboxes deployed in the KYPO platform. 4.0 KYPO USE CASES The architecture and implementation of the KYPO follows three main use cases: cyber research and development, forensics analysis and network simulations, security training and exercises. 8-4 STO-MP-MSG-133
5 All these use cases have similar requirements on the infrastructure, but they differ in the expected knowledge, skills, and effort level of its users. However, the concept of sandboxes helps us to cope with this fact, i.e. various types of sandboxes can be provided from an empty sandbox for researchers, to a fully populated and configured sandbox for a basic security training. 4.1 CYBER RESEARCH AND DEVELOPMENT The first use case is oriented towards research and the development of new methods for detecting and defending against cyber attacks on infrastructures of various types. In this case, KYPO provides an empty sandbox and optional monitoring infrastructure for experiments. Users are able to create various networks populated with desktops, servers, and even mobile devices in this sandbox. Network traffic and host based statistics can be monitored and stored within KYPO infrastructure, where they are available for further analysis. This case is designed for security researchers and experienced network administrators because it requires a good level of knowledge about networking, host configuration and some knowledge of virtualization techniques. However, we are able to provide generic types of images to ease the work, such as desktops running common operating systems and applications. 4.2 FORENSICS ANALYSIS AND NETWORK SIMULATIONS The second use case covers basic forensic analysis, which can be partly automated by tools deployed in the sandbox. Users can deploy an image of a malicious machine to the sandbox, connect available probes and run a basic automated analysis. They can also continue with an advanced manual analysis of the machine. A great advantage of this case is that users need only basic knowledge of forensics to perform an automated analysis. The precious time of forensic analysts can be therefore be used for more complicated and detailed forensic analysis. 4.3 SECURITY TRAINING AND EXERCISES The last use case focuses on training security skills and cyber exercises and competitions. This case has zero requirements for user knowledge of KYPO infrastructure, virtualization and other underlying infrastructure. The organizers prepare and deploy a scenario for users who can focus only on the training subject, such as a penetration testing tutorial or game. Furthermore, we can facilitate training such as this with experienced lecturers to improve the learning curve. Cyber exercises are much more complex than games and tutorials. While they require substantial preparation effort from the organizers, the end users (participants) are not affected. They can still focus only on the exercise subject, but requirements on the infrastructure team are significantly higher. This is caused by the fact that training tutorials can be repeated numerous times, but an exercise is a one-off event. 5.0 THE DESIGN OF A CYBER DEFENCE EXERCISE We have designed a one-day cyber defence exercise for 20 players (Blue team) as proof of the last use case listed above. The exercise involves: training objectives, story and a detailed scenario, about 40 participants grouped into Red, Blue, White and Green teams, a KYPO sandbox with the game network simulated according to the scenario, STO-MP-MSG
6 a physical facility hosting all participants. 5.1 EXERCISE OBJECTIVES, STORY AND SCENARIO The designed exercise is focused on defending critical information infrastructure against skilled and coordinated attackers with unclear motivations. Similarly to other defence exercises, participants are put into the role of members of emergency security teams which are sent into organisations to recover compromised networks. They have to secure the simulated critical infrastructure, investigate possible data exfiltration and collaborate with other emergency teams, the coordinator of the operation and the media. Participants are provided with a background story to introduce them to the situation before they enter the compromised networks. This is very important since the exercise is not set in a real environment and participants have no previous knowledge who is who in the fictitious scenario (their users, popular news portal, superordinate security team). They are also provided with technical facts related to the game network: network topology including their network that will be defended, network architecture and current setup, access credentials etc. Before the actual exercise, participants access their simulated network in KYPO to get familiar with the exercise. The exercise is driven by a scenario which includes the actions of attackers and assignments for defenders prepared by the organizers. The attackers exploit specific vulnerabilities left in the compromised network in a fixed order. The completion of each successful attack is recorded by the attackers. On top of that, participants should also answer to media requests. The performance of each defending team is scored based on successful attacks or their mitigation, the availability of specified critical services and the quality of reporting. 5.2 PARTICIPANT ROLES Participants are divided into four groups according their skills, role and tasks in the exercise. These are now listed according as commonly used in other cyber exercises: Green team a group of operators responsible for the exercise infrastructure (the KYPO sandbox in this case). They configure all virtual computers and networks, complex monitoring and scoring infrastructure. The Green team also monitors the sandbox s health and fixes crashes and infrastructure issues if needed. White team masterminds, referees and organizers of the cyber defence exercise. They provide the background story, exercise rules and framework for the Red team and Blue teams competition. The White team sends tasks (called injects) to the Blue teams and thus simulates media and the operation coordinator. They also provide hints to a Blue teams if in trouble. Red team plays the role of attackers and consists of cyber security professionals. They do not attack targets in the infrastructure of a Blue team randomly, but they carefully follow a predefined attack scenario to equally load the Blue teams. This means the Red team exploits vulnerabilities left in a Blue team s network. They should not use any other arbitrary means of attack against the Blue teams. They are also not allowed to attack the service infrastructure. Blue team several Blue teams (five in our case) are responsible for securing compromised networks and dealing with the Red team s attacks. They have to follow exercise rules and local cyber law. Members of Blue teams are the main target user group of the exercise. 8-6 STO-MP-MSG-133
7 Interactions between the four groups of players are depicted in Figure 3. Figure 3: Groups of exercise participants, their interactions and tasks. 5.3 TECHNICAL IMPLEMENTATION The technical part of the exercise relies on the built-in capabilities of KYPO described in Section 3. On top of that, we have prepared and developed the following: a sandbox containing approximately 110 interconnected hosts and other network architecture, a scoring system for real-time performance evaluation of participating Blue teams, a logging infrastructure for detailed post-mortem analysis and overall evaluation of the exercise Exercise Network Setup The essential component of the exercise is the simulated network which serves as a virtual battlefield. Figure 4 shows the logical topology of the network, whereas Figure 5 is a screenshot of the deployed topology in the KYPO platform. All participants use the interface in Figure 5 to access hosts. The exercise network is segmented into two main types of subnetworks: The global network hosting attackers and common network infrastructure, such as DNS and e- mail; this network simulates the global Internet. The network of a Blue team representing the defended network with all critical (and vulnerable) services; this subnetwork is further segmented into a demilitarized zone, desktops and servers. The main effort in the preparation phase is spent on setting up all hosts, especially hosts within networks of Blue teams, since they contain vulnerabilities which will be exploited according to the exercise scenario. STO-MP-MSG
8 Figure 4: The logical topology of the simulated exercise network. Figure 5: The topology of the simulated exercise network, which is deployed in a KYPO portal. Some hosts are hidden for better clarity of the user interface. They appear after clicking on the symbol of a cloud. 8-8 STO-MP-MSG-133
9 5.3.2 Logging Infrastructure Apart from built-in network-based monitoring (provided by the KYPO platform), we have designed and developed dedicated logging infrastructure. It is the basis of the scoring system and an indispensable source of monitoring data for post-mortem analysis. Each host is configured to forward all log messages (all syslog facilities to be precise) to the central logging server. A processing chain of additional tools is deployed on the central server in order to provide real-time transparent access to the normalized log data from the exercise topology. In addition to this, the state of a Blue team s network services are periodically checked by Nagios [8], a popular monitoring system. Events related to service state changes are logged into the central logging server, where they are further processed by the scoring system Scoring System The choice of scoring components is tightly connected to its technical implementation. The weights of scoring components are directed by the exercise s objectives one may prefer availability, whilst another confidentiality. In the designed exercise, we focused on service availability and defensive capabilities against the actions of the Red team. Scoring based on availability can be handled automatically using the logging infrastructure described above. The logging infrastructure caters the scoring system with events which are then transferred to the score. The more time a service is up and running, the more points are granted to the particular Blue team responsible for the service. Since the Red team conducts attacks manually, the score is assigned manually too. Members of the Red team enter points for each attack objective via the web interface of the scoring system. The same applies for injects (tasks) of the White team. Based on our experience from participation in other exercises, we present a real-time total score of all teams on a scoreboard produced by the scoring system. We believe that this is an important factor fuelling participants with stress as well as a competitive mood. 5.4 PHYSICAL FACILITY Although the KYPO platform provides remote access, we decided to invite all participants to one physical place. The participants come from different institutions, but there is the potential for their cooperation even after the exercise. Furthermore, we believe that one physical place allows us to deliver a better experience of the exercise, improve the learning curve of participants, and manage the whole exercise in a more agile and responsive manner for any possible changes. To accommodate all participants, we use a KYPO Lab complemented with other meeting rooms on our premises [9]. Figure 6 depicts the seating of the Blue teams in the KYPO Lab. Each table accommodates one Blue team. Members of Blue teams communicate with each other in person. Communication with other teams (Red, White and Green) is delivered via . They access the exercise sandbox via a web browser. The most important global information, such as the scenario topology and score of all teams is displayed on a display wall and projector for their convenience. Other teams (Red, White and Green) share detached meeting rooms. Considering the need for resolving issues and managing of the exercise efficiently, we established communication between other teams as a conference call (audio and video). Teams also access the sandbox via their browser. In addition to this, they interact with the scoring system (e.g., log successful attacks) according to their role in the exercise. STO-MP-MSG
10 Figure 6: The KYPO Lab is a versatile room. Its setting can be adjusted to best fit the needs of ongoing exercises. 6.0 CONCLUSION In this paper we have presented KYPO Cyber Exercise & Research Platform. Using the KYPO platform, the trainers may focus on the exercise objectives, story and scenario. We prepared a set of use cases to evaluate KYPO and to demonstrate its benefits for common users. Various groups of users have successfully participated in our Capture the Flag (CTF) exercise in the past two years. We have designed a one-day cyber defence exercise to demonstrate the key features of KYPO. This technical exercise will be used at Cyber Czech Our future work will focus on research into tools for a more economically-and-time efficient simulation of real critical infrastructures. We will create tools to automate the preparation and execution of security teams training and exercises. We plan to connect KYPO to other facilities (e.g., SCADA, ICS and LTE networks) to provide a more realistic environment. We would like to continue with our involvement in co-organising national cyber exercises and challenges. ACKNOW LEDGEM ENT This material is based upon work supported by Cybernetic Proving Ground project (VG ) funded by the Ministry of the Interior of the Czech Republic. Access to the CERIT-SC computing and storage facilities provided under the programme Center CERIT Scientific Cloud, part of the Operational Program Research and Development for Innovations, reg. no. CZ. 1.05/3.2.00/ , is greatly appreciated STO-MP-MSG-133
11 7.0 REFERENCES [1] European Defence Agency. Comprehensive and Strategic Decision Making on Cyber Security and Defence. [online] [Accessed September 1, 2015]. Available from: info-hub/press-centre/latest-news/2015/06/22/cyber-defence-exercise-for-decision-makers [2] NATO Cooperative Cyber Defence Centre of Excellence. Locked Shields [online] [Accessed September 1, 2015]. Available from: [3] NATO Communications and Information Agency. Exercise Cyber Coalition [online] [Accessed April 13, 2015]. Available from: cyber-coalition.aspx [4] DAVIS, Jon; MAGRATH, Shane. A Survey of Cyber Ranges and Testbeds. Defence Science and Technology Organisation Edinburgh (Australia) Cyber and Electronic Warfare Div, URL: [Accessed on September 1, 2015] [5] European Union Agency for Network and Information Security (ENISA). Cyber Europe 2014 Information. [online] [Accessed April 13, 2015]. Available from: activities/resilience-and-ciip/cyber-crisis-cooperation/cce/cyber-europe/ce2014/cyber-europe information [6] CERIT Scientific Cloud. [online] [Accessed August 28, 2015]. Available from: [7] MORENO-VOZMEDIANO, R.; MONTERO, R. S.; LLORENTE, I. M. IaaS Cloud Architecture: From Virtualized Datacenters to Federated Cloud Infrastructures. IEEE Computer, vol. 45, pp , Dec [8] Nagios Enterprises. Nagios The Industry Standard In IT Infrastructure Monitoring. [online] [Accessed August 28, 2015]. Available from: [9] Google. Virtual tour of KYPO Lab in Brno. [online] [Accessed 1 September 2015]. Available from: STO-MP-MSG
12 8-12 STO-MP-MSG-133
Lessons Learned from KYPO Cyber Exercise & Research Platform Project
Lessons Learned from KYPO Cyber Exercise & Research Platform Project Jakub Čegan [email protected] Institute of Computer Science Masaryk University Brno,Czech Republic Martin Vizváry [email protected]
ASCETiC Whitepaper. Motivation. ASCETiC Toolbox Business Goals. Approach
ASCETiC Whitepaper Motivation The increased usage of ICT, together with growing energy costs and the need to reduce greenhouse gases emissions call for energy-efficient technologies that decrease the overall
Future of DDoS Attacks Mitigation in Software Defined Networks
Future of DDoS Attacks Mitigation in Software Defined Networks Martin Vizváry, Jan Vykopal Institute of Computer Science, Masaryk University, Brno, Czech Republic {vizvary vykopal}@ics.muni.cz Abstract.
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Locked Shields 2013. Kaur Kasak 24 Sept 2013
Locked Shields 2013 Kaur Kasak 24 Sept 2013 Disclaimer: This briefing is a product of the CCD COE. It does not represent the opinions or policies of NATO and is designed to provide an independent position.
CyberNEXS Global Services
CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
The Open Cyber Challenge Platform *
The Open Cyber Challenge Platform * Jacob Fonseca, Kevin Bryan, Lisa DiPippo, Victor Fay-Wolfe * Supported By The U.S. National Science Foundation grants: Federal Cyber Service Scholarship For Service
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
Virtualization Impact on Compliance and Audit
2009 Reflex Systems, LLC Virtualization Impact on Compliance and Audit Michael Wronski, CISSP VP Product Management Reflex Systems Agenda Introduction Virtualization? Cloud? Risks and Challenges? Compliance
The Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
An Introduction to Private Cloud
An Introduction to Private Cloud As the word cloud computing becomes more ubiquitous these days, several questions can be raised ranging from basic question like the definitions of a cloud and cloud computing
How To Understand Cloud Computing
Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition
Spyware Doctor Enterprise Technical Data Sheet
Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)
Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security
i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.
Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time. 2 Barry Brueseke (619) 401 7334 www.inetwork west.com 4/3/2014 IEEE Cyber Security Workshop
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing
Capturing the New Frontier:
Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Executive Summary Cloud computing is garnering a vast share of IT interest. Its promise of revolutionary cost savings
INTRODUCING isheriff CLOUD SECURITY
INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.
INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION Sanjay Razdan Department of Computer Science and Eng. Mewar
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
Cloud computing: benefits, risks and recommendations for information security
Cloud computing: benefits, risks and recommendations for information security Dr Giles Hogben Secure Services Programme Manager European Network and Information Security Agency (ENISA) Goals of my presentation
Cloud Computing. Adam Barker
Cloud Computing Adam Barker 1 Overview Introduction to Cloud computing Enabling technologies Different types of cloud: IaaS, PaaS and SaaS Cloud terminology Interacting with a cloud: management consoles
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment Introduction 1 Distributed SCADA security 2 Radiflow Defense-in-Depth tool-set 4 Network Access
White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for
White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web
IBM QRadar as a Service
Government Efficiency through Innovative Reform IBM QRadar as a Service Service Definition Copyright IBM Corporation 2014 Table of Contents IBM Cloud Overview... 2 IBM/Sentinel PaaS... 2 QRadar... 2 Major
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
APPLICATION PERFORMANCE MONITORING
APPLICATION PERFORMANCE MONITORING PRACTICAL WAYS TO MONITOR THE END USER EXPERIENCE WHITE PAPER Performance of key applications is a critical item to monitor in many IT environments where users depend
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
What Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
Securing Your Business s Bank Account
Commercial Banking Customers Securing Your Business s Bank Account Trusteer Rapport Resource Guide For Business Banking January 2014 Table of Contents 1. Introduction 3 Who is Trusteer? 3 2. What is Trusteer
An Introduction to Cloud Computing Concepts
Software Engineering Competence Center TUTORIAL An Introduction to Cloud Computing Concepts Practical Steps for Using Amazon EC2 IaaS Technology Ahmed Mohamed Gamaleldin Senior R&D Engineer-SECC [email protected]
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad
Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
Chapter 2 Addendum (More on Virtualization)
Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
Cloud-based Testbed for Simulation of Cyber Attacks
Cloud-based Testbed for Simulation of Cyber Attacks Daniel Kouřil, Tomáš Rebok, Tomáš Jirsík, Jakub Čegan, Martin Drašar, Martin Vizváry, Jan Vykopal Masaryk University, Institute of Computer Science Botanická
CLOUD COMPUTING IN HIGHER EDUCATION
Mr Dinesh G Umale Saraswati College,Shegaon (Department of MCA) CLOUD COMPUTING IN HIGHER EDUCATION Abstract Technology has grown rapidly with scientific advancement over the world in recent decades. Therefore,
ABSTRACT: [Type text] Page 2109
International Journal Of Scientific Research And Education Volume 2 Issue 10 Pages-2109-2115 October-2014 ISSN (e): 2321-7545 Website: http://ijsae.in ABSTRACT: Database Management System as a Cloud Computing
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
Planning the Migration of Enterprise Applications to the Cloud
Planning the Migration of Enterprise Applications to the Cloud A Guide to Your Migration Options: Private and Public Clouds, Application Evaluation Criteria, and Application Migration Best Practices Introduction
Whitepaper. The ABC of Private Clouds. A viable option or another cloud gimmick?
Whitepaper The ABC of Private Clouds A viable option or another cloud gimmick? Although many organizations have adopted the cloud and are reaping the benefits of a cloud computing platform, there are still
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
White Paper: 5GL RAD Development
White Paper: 5GL RAD Development After 2.5 hours of training, subjects reduced their development time by 60-90% A Study By: 326 Market Street Harrisburg, PA 17101 Luis Paris, Ph.D. Associate Professor
Relational Databases in the Cloud
Contact Information: February 2011 zimory scale White Paper Relational Databases in the Cloud Target audience CIO/CTOs/Architects with medium to large IT installations looking to reduce IT costs by creating
AVeS Cloud Security powered by SYMANTEC TM
Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by
SERENA SOFTWARE Serena Service Manager Security
SERENA SOFTWARE Serena Service Manager Security 2014-09-08 Table of Contents Who Should Read This Paper?... 3 Overview... 3 Security Aspects... 3 Reference... 6 2 Serena Software Operational Security (On-Demand
A Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
Leveraging SDN and NFV in the WAN
Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined
IBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
Enterprise Cybersecurity: Building an Effective Defense
: Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced
The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
Virtualization Technologies (ENCS 691K Chapter 3)
Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing
Single Product Review - Bitdefender Security for Virtualized Environments - November 2012
Single Product Review Bitdefender Security for Virtualized Environments Language: English November 2012 Last Revision: 1 st December 2012 Review commissioned by Bitdefender - 1 - Bitdefender Security for
Cost effective methods of test environment management. Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA
Cost effective methods of test environment management Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA 2013 Agenda Basic complexity Dynamic needs for test environments Traditional
Cloud Computing Architecture and Forensic Investigation Challenges
Cloud Computing Architecture and Forensic Investigation Challenges Ghania Al Sadi Sohar University, Computing Department Sohar, University Rd, 311 Sultanate of Oman ABSTRACT Contrasting to traditional
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection September 2011 10 Potential Risks Facing Your IT Department: Multi-layered Security & Network Protection 2 It s
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
Implementing Digital Forensic Readiness for Cloud Computing Using Performance Monitoring Tools
Implementing Digital Forensic Readiness for Cloud Computing Using Performance Monitoring Tools F.R. Van Staden and H.S. Venter University of Pretoria Abstract Cloud computing is a scalable, distributed
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
AppStack Technology Overview Model-Driven Application Management for the Cloud
AppStack Technology Overview Model-Driven Application Management for the Cloud Accelerating Application Time-to-Market The last several years have seen a rapid adoption for public and private cloud infrastructure
CLOUD CLOUT WITH OPEN APIS WHAT YOU SHOULD ASK OF YOUR CLOUD PROVIDER
CLOUD CLOUT WITH OPEN APIS WHAT YOU SHOULD ASK OF YOUR CLOUD PROVIDER STRATEGIC WHITE PAPER As cloud services become increasingly popular, more questions arise about the capabilities of cloud solutions.
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
Private Compute-as-a-Service
BROCHURE PRIVATE COMPUTE-AS-A-SERVICE Private Compute-as-a-Service Today, organisations of all sizes are facing challenges unlike any they ve experienced before. Globalisation and economic pressures are
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Zak Khan Director, Advanced Cyber Defence
Securing your data, intellectual property and intangible assets from cybercrime Zak Khan Director, Advanced Cyber Defence Agenda (16 + optional video) Introduction (2) Context Global Trends Strategic Impacts
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
Media Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
< IMPACT > START ACCELERATE IMPACT
START ACCELERATE IMPACT IMPACT project has received funding from the European Union Seventh Framework Programme (FP7/2007-2013) under grant agreement n 632828 START ACCELERATE IMPACT WEBINAR #2 Technology
Software Defined Security Mechanisms for Critical Infrastructure Management
Software Defined Security Mechanisms for Critical Infrastructure Management SESSION: CRITICAL INFRASTRUCTURE PROTECTION Dr. Anastasios Zafeiropoulos, Senior R&D Architect, Contact: [email protected]
Windows Server 2003. Your data will be non-compliant & at risk on
Your data will be non-compliant & at risk on Windows Server 2003. On July 14 th 2015, Microsoft will cease its support (including automatic bug fixes, updates and online technical assistance) for Windows
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered
ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY
ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY One of the largest concerns of organisations is how to implement and introduce advanced security mechanisms to protect
WEBSENSE TRITON SOLUTIONS
WEBSENSE TRITON SOLUTIONS INNOVATIVE SECURITY FOR WEB, EMAIL, DATA AND MOBILE TRITON STOPS MORE THREATS. WE CAN PROVE IT. PROTECTION AS ADVANCED AND DYNAMIC AS THE THREATS THEMSELVES The security threats
Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... 3. Improve Processes...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... 3 Improve Processes... 3 Innovation... 4 IT Planning & Alignment
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS Foued Jrad, Jie Tao and Achim Streit Steinbuch Centre for Computing, Karlsruhe Institute of Technology, Karlsruhe, Germany {foued.jrad, jie.tao, achim.streit}@kit.edu
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
CHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST
Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government
Understanding the Business Case of Network Function Virtualization
White paper Understanding the Business Case of Network Function Virtualization Part I of the series discusses the telecom market scenario in general, market and business drivers behind push for a building
