Safety & Security in Computer Based Systems. Brian Gladman
|
|
|
- Joleen Rogers
- 10 years ago
- Views:
Transcription
1 Safety & Security in Computer Based Systems Brian Gladman
2 Talk Outline Compare and contrast the approach to safety and security in computer based systems Consider the impact of politics on the provision of security in commercial market computer systems Consider security models for UK government systems handling citizen owned data
3 Computer Systems Safety Examples Nuclear reactor monitoring & control Aircraft flight control Air traffic control Engine management & control Railway signalling Road traffic management Weapons fusing, arming & control Nuclear weapons command & control
4 Characteristics of the Safety Domain The safety requirement almost always dominates other requirements A mostly open community in which experience (good & bad) is shared No significant opposition to safety attainment Safety certification owned by the community and based on best current practice
5 Characteristics of the Security Domain Government (NSA, GCHQ) opposition to security technology deployment in open market systems Little sharing of practical experience, especially of security failures Radically different security models (open & closed) promoted by different political interest groups Security certification based on ideal requirements rather than best current practice; imposed by minority (defence) customers in an attempt to drive the market
6 Computer Security & The Civil Market Security historically of low priority but large IT suppliers are now showing an increased interest in providing security The Trusted Computing Group (was TCPA) is now leading an industry effort to improve computer systems security But is this a genuine effort to improve end user security or an attempt to support the licensing & digital rights management (DRM) needs of content and software suppliers? Putting high grade security capabilities in the hands of novice end users could provide ideal exploitable capabilities for those with nefarious objectives (crypto viruses, bot-nets, ) There are hence serious concerns among technologists that improved computer security won t serve end user interests (but I don t think this will stop these developments)
7 Security Models The Closed Systems Security Model: Security through obscurity Historically almost universal within UK government (even when inappropriate) Widely used by many commercial suppliers The Open Systems Security Model: Open publication of specifications, design & implementation Applied by the open source community and some commercial companies Technical analysis of these models is limited but what exists suggests that one is not necessarily better than the other
8 Principle: Government IT Systems That Process Citizen Owned Information The person (or persons) who carry the risks of security failures (i.e. the citizens) have the right to determine for themselves whether the security provided is sufficient for their purposes The Closed Security Model might assist security but it might equally hide insecurity --- citizens have no way of knowing which applies Hence only the Open Security Model meets the above principle While the government applies the closed security model in its citizen facing IT systems, we cannot have confidence in their security Will the Home Office openly publish full details of the procedural, technical and operational mechanisms that will be used to protect seized keys BEFORE the GAK provisions are bought into force?
9 Security, Functionality and Scale The more people who share a secret the less likely it is to remain secret The promotion of data sharing across systems is hence in direct conflict with good security and privacy principles Government IT systems holding citizen owned data should hold only that data needed to meet their immediate purpose At the current state of the art such computer systems can only be built to provide two of the following three properties: Security Functionality Scale Security will remain elusive while the government insists that it must have all three properties in such systems
10 My Conclusions The security community lacks cohesion and is driven by conflicting political and economic forces that hamper technical developments Government information systems holding data on which the safety, security and privacy of individual citizens may depend must adopt the Open Security Model Now (and for the foreseeable future) such systems can provide only two of the three properties of scale, functionality & security Traditionally security has lost out but we now need to reduce either scale or functionality in order to provide effective safety, security and privacy In particular, limiting systems functionality will be essential if we are to achieve effective, affordable and reasonably secure citizen facing government IT systems
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace
working group on foreign policy and grand strategy
A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established
European Security Standards Reference Implementation Initiative (ESSRII)
European Security Standards Reference Implementation Initiative (ESSRII) A Proposal for Action in Europe on International Information Security Standards Brian Gladman, European Technical Director, Trusted
How To Prevent Fraud Through Ad Verification
What Pharma Marketers Need to Know About Ad Verification December 2013 Page 1 Fraudulent advertising behaviors are becoming more prevalent, costing advertisers millions of dollars a month in wasted ad
CHAPTER SEVEN FEES, CHARGES AND INCOME GENERATION. Summary. Introduction. Landing and Navigation Charges
CHAPTER SEVEN FEES, CHARGES AND INCOME GENERATION Summary This Chapter deals with the charges that MOD makes for various services provided to civil aircraft at MOD airfields, the circumstances in which
Offensive capabilities
Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Performance Standards and Test Procedures for Environmental Data Management Software. Martin Lloyd
Performance Standards and Test Procedures for Environmental Data Management Software Martin Lloyd Dr M H Lloyd, Farside Technology Research / SIRA Environmental Ltd 12 Acorn Industrial Park, Crayford Road,
www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS)
www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS) Certified Foundation Watchkeeper X is built to the same standards as a manned aircraft, and conforms to CAA/MAA standards. It
OPC & Security Agenda
OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information
Expert Seminar. Engagement with Non-State Armed Groups in Peace Processes
Expert Seminar Engagement with Non-State Armed Groups in Peace Processes Sept. 14 th and 15 th, 2010, Berlin Background: Non-state armed groups (NSAG) conflict regions. By exercising armed violence and
ORIGINAL: ENGLISH 11th May, 1967 DOCUMENT DPC/D(67)23. DEFENCE PLANNING COMMITTEE Decisions of Defence Planning Committee in Ministerial Session
ORIGINAL: ENGLISH 11th May, 1967 DOCUMENT DEFENCE PLANNING COMMITTEE Decisions of Defence Planning Committee in Ministerial Session Note by the Chairman I attach for your information a list of the decisions
MI5. www.mi5.gov.uk/careers Careers Guide 2012/13. Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff.
Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff. MI5 Discretion is vital. You should not discuss your application, other than with your partner or a close
WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware
WHITEPAPER How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware How a DNS Firewall Helps in the Battle against Advanced As more and more information becomes available
The big data dilemma an inquiry by the House of Commons Select Committee on Science and Technology
The big data dilemma an inquiry by the House of Commons Select Committee on Science and Technology Evidence from the UK Computing Research Committee Definitive. 1 September 2015 The UK Computing Research
How To Protect Your Computer From Attack
FREQUENTLY ASKED QUESTIONS on C Y B E R S E C U R I T Y By IEEE USA s Committee on Communications Policy December 2011 This Frequently Asked Questions (FAQs) was prepared by IEEE-USA s Committee on Communications
White Paper: Cyber Hawk or Digital Dove
White Paper: Cyber Hawk or Digital Dove Published By: SkillBridge, LLC September 18, 2013 Today s Modern Warfare With the recent debate over whether or not the United States should take military action
Case No COMP/M.3649 - FINMECCANICA / BAES AVIONICS & COMMUNICATIONS. REGULATION (EC) No 139/2004 MERGER PROCEDURE
EN Case No COMP/M.3649 - FINMECCANICA / BAES AVIONICS & COMMUNICATIONS Only the English text is available and authentic. REGULATION (EC) No 139/2004 MERGER PROCEDURE Article 6(1)(b) NON-OPPOSITION Date:
Computer Security. Security.di.unimi.it/sicurezza1314/ Chapter 1: 1
Computer Security Security.di.unimi.it/sicurezza1314/ Chapter 1: 1 Info corso di Sicurezza Docente corso Andrea Lanzi: [email protected] Pagina corso: http://security.di.unimi.it/sicurezza1314/ Orario
Government Security Solutions YOUR PARTNER OF CHOICE. Protecting People, Places And Perimeters
Government Security Solutions YOUR PARTNER OF CHOICE Protecting People, Places And Perimeters From government buildings to military facilities to legislative offices and more, everything is a target. And
Regulation of Investigatory Powers Act 2000
Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen
The Defence Strategy of the Slovak Republic
The Defence Strategy of the Slovak Republic approved by the National Council of the Slovak Republic 23 September 2005 TABLE OF CONTENTS Introduction I II III IV V Slovak Republic in the Changing Security
THE BENEFITS. Facts/Figures
PERFORMANCE BASED LOGISTICS TRACK RECORD OF SUCCESS BAE Systems Large Aircraft Mr Tim Deacon, Nimrod Project Engineering Manager says of the IFS solution: Integrated Asset Management is an innovative solution
Dominic Taylor CEng MIET MIMechE MIRSE MCMI, Invensys Rail
MAXIMIZING THE RETURN ON INVESTMENT FROM ETCS OVERLAY Dominic Taylor CEng MIET MIMechE MIRSE MCMI, Invensys Rail SUMMARY ETCS Level 2 offers many benefits to rail from reduced infrastructure costs, through
Security Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc.
Security Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc. Executive Summary IFONE provides securable private cellular networks. It presents this paper
The main object of my research is :
The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is
Headquarters Army Legal Assistance Catterick Barracks British Forces Post Office 39
Headquarters Army Legal Assistance Catterick Barracks British Forces Post Office 39 Tel Civilian: (0049) (0)521 9254 3191 or 3196 Fax Civilian: (0049) (0)521 9254 3115 Tel Military: 94 8(81) 3191 or 3196
Cyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
Gaming System Monitoring and Analysis Effort
for the Gaming System Monitoring and Analysis Effort DHS/S&T/PIA-025 October 11, 2012 Contact Point Douglas Maughan DHS S&T Cyber Security Division 202-254-6145 Reviewing Official Jonathan R. Cantor Acting
Public Private Partnerships and National Input to International Cyber Security
Public Private Partnerships and National Input to International Cyber Security 10 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington,
Revealed: how US and UK spy agencies defeat internet privacy and security
http://www.theguardian.com/world /2013/sep/05/nsa gchq encryption codes security Revealed: how US and UK spy agencies defeat internet privacy and security NSA and GCHQ unlock encryption used to protect
Authentication and Security in Mobile Phones
Authentication and Security in Mobile Phones Greg Rose QUALCOMM Australia [email protected] ABSTRACT Mobile telephone systems have a checkered reputation regarding security and authentication features after
First National Data Quality Review: Executive Summary Quality Information Committee
First National Data Quality Review: Executive Summary Quality Information Committee Executive Summary Introduction to the report This report has been produced by the Quality Information Committee (QIC)
Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things
Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations
Intrusion Software Tools and Export Control Introduction. Export Control in Context
Intrusion Software Tools and Export Control Introduction The purpose of this Note is to explain the controls on export of intrusion software tools that were agreed by the Wassenaar Arrangement in December
FUTURE NAVY VISION. The Royal Navy Today, Tomorrow and Towards 2025. Projecting maritime power to protect and promote our nation s interests
FUTURE NAVY VISION The Royal Navy Today, Tomorrow and Towards 2025 Projecting maritime power to protect and promote our nation s interests The Royal Marine Commandos - The UK s specialist amphibious force.
8 Aerospace and Defense
This table shows a list of topics identified as relevant by different stakeholder groups. They can be considered as stakeholders suggestions or requests for topics to be monitored or disclosed by organizations.
Charter of Consumer Rights in the Digital World
DOC No: INFOSOC 37 08 DATE ISSUED: MARCH 2008 Charter of Consumer Rights in the Digital World Digital technologies contribute to an improvement in the quality of people s lives in many ways. They create
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
The Professionals policy is available for small businesses with up to 8 people and a turnover of 500,000 or less.
PROFESSIONALS Summary of Cover The Professionals policy is available for small businesses with up to 8 people and a turnover of 500,000 or less. Why choose AXA s Professionals policy? Tailor-made for your
Hybrid Warfare & Cyber Defence
Hybrid Warfare & Cyber Defence Maj Gen Thomas FRANZ, DEU AF SHAPE DCOS CIS & CD Characteristics of Hybrid Warfare Alternate means to achieve goals Lines blurred between: state-onstate wars, counterinsurgency
Whose IP Is It Anyways: Tales of IP Reputation Failures
Whose IP Is It Anyways: Tales of IP Reputation Failures SESSION ID: SPO-T07 Michael Hamelin Lead X-Force Security Architect IBM Security Systems @HackerJoe What is reputation? 2 House banners tell a story
Air Traffic Management Services Plan 2012-2017
Air Traffic Management Services Plan 2012-2017 Airservices Australia 2012 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process
A Solicitors Guide to. Employment Protection Insurance
A Solicitors Guide to Employment Protection Insurance An objective guide to Employment Protection Insurance and retainers Introduction Solicitors all over the country face the challenge of new forms of
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012
(U) SIGINT Strategy 2012-2016 23 February 2012 (U) Vision (U) Ensure Signals Intelligence provides THE decisive edge in advancing the full spectrum of U.S. national security interests. (U) Mission (U)
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
The Tradesmen policy is available for self employed persons and small businesses with up to 8 people and a turnover of 500,000 or less.
TRADESMEN Summary of Cover The Tradesmen policy is available for self employed persons and small businesses with up to 8 people and a turnover of 500,000 or less. Why choose AXA s Tradesmen policy? Tailor-made
EECS 588: Computer and Network Security. Introduction January 14, 2014
EECS 588: Computer and Network Security Introduction January 14, 2014 Today s Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components of your grade
An overwhelming majority of IaaS clouds leverage virtualization for their foundation.
1 2 3 An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 4 With the use of virtualization comes the use of a hypervisor. Normally, the hypervisor simply provisions resources
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
TETRA Security for Poland
TETRA ASSOCIATION TETRA Security for Poland Brian Murgatroyd TETRA ASSOCIATION former Chairman Security and Fraud Prevention Group Warren Systems (SFPG) Independent Security Consultant [email protected]
Strategic Issues e-commerce for Manufacturers Dealer Networks. 1. Leadership Dealers need leadership from their manufacturer in two areas:
Strategic Issues e-commerce for Manufacturers Dealer Networks Introduction This white paper illustrates the business case for manufacturers taking a strong role in e-commerce enabling their dealer networks.
RSA. Frequently Asked Questions. RSA Data Security, Inc. About Cryptography Export Laws. Answers to THE KEYS TO PRIVACY AND AUTHENTICATION
RSA Data Security, Inc. Answers to Frequently Asked Questions About Cryptography Export Laws RSA DATA SECURITY, INC. THE KEYS TO PRIVACY AND AUTHENTICATION Copyright Notice Copyright 1996 by RSA Data Security,
Recruitment Outsourcing:
Recruitment Outsourcing: Look Before You Leap The Benefits & Pitfalls of Recruitment Process Outsourcing (RPO) Introduction The outsourcing of administratively intensive HR functions is not new, and for
Conceptual Model for Enterprise Governance. Walter L Wilson
Conceptual Model for Walter L Wilson Agenda Define the and Architecture Define a Ground Station as an Business Process Define Define Levels and Types of Introduce Model Define effects of Engineering 2
Patch Management. Is it recommended to patch an Industrial Automation Control System and, if so, why? Siemens AG 2012. All Rights Reserved.
Patch Management Is it recommended to patch an Industrial Automation Control System and, if so, why? Facts Most of the computer components of modern Industrial Automation Control System are based on standard
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
RAMS, Systems Engineering and Systems Thinking
RAMS, Systems Engineering and Systems Thinking Presentation for The Joint Electrical Institutions Lecture Programme Ravindra K Bagia About Me Ravindra Bagia UTS Faculty of Engineering and IT Teaching:
CUSTOMER KEYNOTE Hal Buddenbohm
CUSTOMER KEYNOTE Hal Buddenbohm Supply Chain Director ITT Force Protection Systems Hal Buddenbohm is the Supply Chain Director at ITT Force Protection Systems in Thousand Oaks, CA. Prior to joining ITT,
Foundations of Computer Security
Foundations of Computer Security Lecture 1: Dr. Bill Young Department of Computer Sciences University of Texas at Austin Lecture 1: 1 Course Topics Topics we will cover include: What is computer security?
Fraudulent accounts in collections: improve detection and reduce collector workload. An Experian briefing paper
Fraudulent accounts in collections: improve detection and reduce collector workload An Experian briefing paper September 2010 1. The inter-relationship of fraud and collections The fraud and collections
Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.
RimApp RoadBLOCK goes beyond simple filtering! Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. However, traditional
FBI AND CYBER SECURITY
FBI AND CYBER SECURITY SSA John Caruthers SSA Ken Schmutz SSA Tom Winterhalter Mission The FBI is the only U.S. agency charged with the authority to investigate both criminal and national security investigations.
DEFENCE INSTRUCTIONS (GENERAL)
DEFENCE INSTRUCTIONS (GENERAL) New instruction 0 LOG 4 5 012 Regulation of technical integrity of Australian Defence Force materiel Department of Defence CANBERRA ACT 2600 10 September 2010 Issued with
15.3.3 OOA of Railway Ticket Reservation System
448 15.3.3 OOA of Railway Ticket System Assume that domain analysis is complete and DAD is ready for reference. The analyst also has a fair knowledge of the system and the system environment. For the sake
Identifying Ethical SEO
Choosing the right SEO provider means finding a partner to work with your business to increase your visibility and viability online. In this report we will identify the key points to help you chose an
Regulating and Monitoring Private Military and Security Companies in United Nations Peacekeeping Operations. Stephen Mathias 1
Regulating and Monitoring Private Military and Security Companies in United Nations Peacekeeping Operations Stephen Mathias 1 Introduction The nature of United Nations (UN) peace operations means that
Airports and their SCADA Systems. Dr Leigh Armistead, CISSP. Peregrine Technical Solutions
Airports and their SCADA Systems Dr Leigh Armistead, CISSP Peregrine Technical Solutions What We May Face For an attack to be successful it only has to cause disruption not loss of life to a significant
A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage
Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf
TERMS OF USE FOR NOTARIAL PERSONAL REPRESENTATION CERTIFICATES FOR AUTHENTICATION
TERMS OF USE FOR NOTARIAL PERSONAL REPRESENTATION CERTIFICATES FOR AUTHENTICATION Prior to the verification of the electronic certificate, or to access or use the certificate status information and other
Best value security report
Best value security report Getting the balance right between cost and quality Do more with less IT security for Local Government and the Emergency Services Thank you for downloading the best value security
Application of the Electronic Communications and Transactions Act to Online Merchants From Other Jurisdictions
Northwestern Journal of Technology and Intellectual Property Volume 1 Issue 1 Spring Article 7 Spring 2003 Application of the Electronic Communications and Transactions Act to Online Merchants From Other
