Threat Agent Library Helps Identify Information Security Risks
|
|
|
- Tracy Short
- 10 years ago
- Views:
Transcription
1 White Paper Intel Information Technology Computer Manufacturing Enterprise Security Threat Agent Library Helps Identify Information Security Risks Intel IT developed a unique standardized threat agent library (TAL) that provides a consistent, up-to-date reference describing the human agents that pose threats to IT systems and other information assets. The TAL quickly helps risk managers identify accurately and understand the importance of relevant threat agents. The library consists of 22 standardized archetypes defined using eight common attributes; the archetypes represent external and internal threat agents ranging from industrial spies to untrained employees. The library is designed to overcome the lack of standard threat agent definitions and the problem that threat information is often fragmented and sensationalized. Timothy Casey, Intel Corporation September 2007 IT@Intel
2 White Paper Threat Agent Library Helps Identify Information Security Risks Executive Summary The TAL provides a single standardized set of archetypal agent definitions ranging from government spies to untrained employees. Our Intel IT Threat Assessment Group developed a unique, standardized threat agent library (TAL) that provides a consistent, up-to-date reference describing the human agents that pose threats to IT systems and other information assets. The TAL quickly helps risk management professionals (called risk managers in this paper) identify relevant threat agents and understand the importance of the threats. Threat information has historically been fragmented and sensationalized, with a lack of standard agent definitions. This made it difficult for risk managers to quickly and consistently assess risks from specific agents. The TAL addresses these problems by providing a single standardized set of archetypal agent definitions ranging from government spies to untrained employees. To develop the TAL, we: Assembled a cross-functional team of security experts Devised eight common agent attributes and defined 22 agents based on unique combinations of these attributes Rated and described the threat that each agent represents to Intel. We regularly review and update this rating. We recently published the library within Intel. Internal groups are using it both as a stand-alone tool and as part of other tools supporting standard risk assessment methodologies, helping to improve the consistency and accuracy of risk assessments. We plan to enhance the library by developing agent definitions into full personas and by adding a matrix of common agent exploits.
3 Threat Agent Library Helps Identify Information Security Risks White Paper Contents Executive Summary... 2 Business Challenge... 3 Threat Agent Library (TAL)... 4 Developing the TAL... 4 Agent Ratings... 8 Using the TAL... 9 Selecting Agents by Attributes... 9 Use within Risk Assessment Methodologies Future Threat Personas Matrix of Exploits Conclusion Authors Acronyms Business Challenge At Intel, risk management professionals (called risk managers in this paper) frequently assess threats to information assets such as corporate IT systems and data. To do so, they have to understand the potential human threat agents the categories of people who can harm those information assets. Historically, however, this has been challenging. A key problem has been the lack of industry standards or reference definitions of agents. People often have different concepts of even the most common agents, and they interpret a seemingly simple term such as spy very differently. This makes it difficult to share information or apply it consistently, and it leads to inconsistent profiles of the threats to systems. Definitions in general use are often too vague to be valuable in risk management efforts. For example, people use the term hacker very broadly to describe almost anyone who intrudes into computer systems for any purpose. We need much more specific definitions in order to analyze and protect against threats from the possible categories of intruders such as data miners, organized crime members, and vandals. Even if a risk management team can agree on the threat definitions, information about threats is often fragmented, sensationalized, and contradictory, making it difficult to understand the real threat and how to prioritize it. Some agents and their activities such as people who create malware or hack into corporate systems attract considerable publicity. This can result in the TV news effect : the most-publicized agents appear to be the biggest threat, so they receive a disproportionately large percentage of limited mitigation resources. In reality, there is a wide spectrum of less well known threat agents, including intellectual property thieves, members of organized crime, and well meaning but untrained employees who can unintentionally cause damage. Risk managers must carefully characterize and assess the threat from
4 White Paper Threat Agent Library Helps Identify Information Security Risks all of these potential agents to assess overall risk to information assets. However, often there is little aggregated information available about the activity of these agents and the threat that they represent. This lack of aggregated, consistent, up-to-date information makes risk assessment efforts considerably less efficient and more time consuming. Risk managers might have to research potential agents and their recent activity to develop even a basic threat profile for a specific asset. In addition, risk management projects may experience threat creep participants spend time repeatedly renegotiating threat definitions as the project progresses, causing delays. Threat Agent Library (TAL) In 2005, we began looking for a solution to these problems. We looked for existing agent definitions that we could apply to our own projects, but we found nothing detailed enough for our needs. We then decided to develop a library of archetypes representing the main threat agents relevant to Intel. We call this set of threat agents the Threat Agent Library (TAL). We focused our efforts on threats to information assets, although the library might also be used as a basis for identifying threats to other assets. Our goal was to create a set of standardized definitions and descriptions of threat agents, along with a standard vocabulary for describing them. This would provide a common reference to help ensure consistent results. We also hoped that the TAL would: Act as a collection point for multiple, fractured threat information sources, making it easier to share information Enable risk management efforts to quickly identify and focus on threat agents relevant to specific assets Help IT professionals build system defenses appropriate for specific threats. By including recognizable characters that embody key tactics and attributes of attackers, the TAL could enable these IT professionals to stay focused on the attacker mindset. Developing the TAL Intel IT assembled a cross-functional team of security specialists from different parts of Intel with expertise in corporate IT security, government security agencies, product security, law enforcement, and physical security. We believed that the team s broad experience dealing with real-world threats would enable us to counter the TV news effect and instead assess the real threat agents relevant to Intel. Over the life of the project, nearly two dozen senior subject matter experts contributed hundreds of hours to develop the library. We focused on creating a finite set of archetypes representing significant threat agents, rather than attempting to define a new agent for every possible combination of agent characteristics. For example, in risk assessments involving internal spies, assessors often consider spies with dozens of combinations of money and skills available. Each of these combinations must be considered separately in the assessment, dragging the assessment out many days or weeks longer than necessary. By limiting the scope, we believed that we could develop a useful library that was compact, simple, and easily understood. Specific projects could then adapt or extend our definitions for their needs. We tried to achieve a balance of detail and simplicity. We aimed to provide enough detail for agent definitions to be useful, while keeping the definitions simple enough for risk management professionals to quickly assimilate and use the information. 4
5 Threat Agent Library Helps Identify Information Security Risks White Paper Our agents do not represent specific individuals, and our library is not intended to identify individuals or to be used for investigating actual security events. To develop the library, we: 1. Created a simple taxonomy of eight attributes that we use to uniquely define each agent. The attributes also help risk managers identify which agents are relevant to each situation. 2. Created threat agent definitions based on the eight attributes, with a short description of each agent and its common tactics and actions. To date, we have identified 22 agents, as shown in Table 1. Agent Attributes We developed a common set of characteristics, or attributes, that we used to define each agent uniquely. We settled on eight attributes: intent, access, outcome, limits, resource, skill level, objective, and visibility. Intent This defines whether the agent intends to cause harm. Agents fall into two categories depending on their intent: Hostile: The agent starts with the intent to harm or inappropriately use Intel assets, and the agent takes deliberate actions to achieve that result. Non-Hostile: The agent is friendly and intends to protect Intel assets, but accidentally or mistakenly takes actions that result in harm. Some Intel departments have added a third category called Environmental, to ensure that risk managers take into account uncontrollable and non-targeted threats occurring in the physical environment, such as fire, flood, pandemic, and military actions. Table 1: Current Library of Threat Agents and Their Defining Attributes Access (1) Outcome (1-2) Limits (max) Resources (max) Skills (max) Objective (1 or more) Visibility (min) Intent NON-HOSTILE HOSTILE Employee Employee Reckless Untrained Info Partner Anarchist Civil Competitor Activist Corrupt Government Official Data Miner Employee Disgruntled Government Government Internal Irrational Cyberwarrior Spy Spy Individual Legal Mobster Adversary Radical Sensationalist Terrorist Thief Vandal Vendor Activist Internal External Acquisition/Theft Business Advantage Damage Embarrassment Tech Advantage Code of Conduct 1 1 Legal Extra-legal, minor Extra-legal, major Individual Club 1 1 Contest 1 Team 1 1 Organization Government None Minimal 1 1 Operational Adept Copy Deny 1 1 Destroy Damage Take All of the Above/ Don t Care Overt Covert Clandestine Multiple/Don t Care Source: Intel IT Threat Assessment Group, 2007
6 White Paper Threat Agent Library Helps Identify Information Security Risks Access This defines the extent of the agent s access to the company s assets. There are two options: Internal: Agent has internal access. External: Agent has only external access. Outcome This usually defines the agent s primary goal what the agent hopes to accomplish with a typical attack. However, with non-hostile agents, such as an untrained employee, the outcome may be unintentional. The agent may use many methods to achieve this goal, and the primary goal may have secondary or ancillary effects. Possible outcomes are: Acquisition/Theft: Illicit acquisition of valuable assets for resale or extortion in a way that preserves the assets integrity but may incidentally damage other items in the process. Business Advantage: Increased ability to compete in a market with a given set of products. The goal is to acquire business processes or assets. Damage: Injury to Intel personnel, physical or electronic assets, or intellectual property. Embarrassment: Public portrayal of Intel in an unflattering light, causing Intel to lose influence, credibility, competitiveness, or stock value. Technical Advantage: Illicit improvement of a specific product or production capability. The primary target is to acquire production processes or assets rather than a business process. Limits These are the legal and ethical limits that may constrain the agent. This characteristic also defines the extent to which the agent may be prepared to break the law. Options are: Code of Conduct: Agents typically follow both the applicable laws and an additional code of conduct accepted within a profession or an exchange of goods or services. Example: an auditor falls within the Information Partner agent archetype. Legal: Agents act within the limits of applicable laws. Example: Legal Adversary. Extra-legal, minor: Agents may break the law in relatively minor, non-violent ways, such as minor vandalism or trespass. Example: Activist. Extra-legal, major: Agents take no account of the law and may engage in felonious behavior resulting in significant financial impact or extreme violence. Example: members of organized crime organizations (Mobster agent). Resource This defines the organizational level at which an agent typically works, which in turn determines the resources available to that agent for use in an attack. This attribute is linked to the Skill Level attribute a specific organizational level implies that the agent has access to at least a specific skill level. Options are: Individual: Resources limited to the average individual; agent acts independently. Minimum skill level: None. Club: Members interact on a social and volunteer basis, often with little personal interest in the specific target. An example might be a core group of unrelated activists who regularly exchange tips on a particular blog. Group persists long term. Minimum skill level: Minimal. Contest: A short-lived and perhaps anonymous interaction that concludes when the participants have achieved a single goal. For example, people who break into systems just for thrills or prestige (agent Cyber-Vandal) may run contests to see who can break into a specific target first. Minimum skill level: Operational. Team: A formally organized group with a leader, typically motivated by a specific goal and organized around that goal. Group persists long term and typically operates within a single geography. Minimum skill level: Operational. Organization: Larger and better resourced than a Team; typically a company. Usually operates in multiple geographies and persists long term. Minimum skill level: Adept. Government: Controls public assets and functions within a jurisdiction; very well resourced and persists long term. Minimum skill level: Adept.
7 Threat Agent Library Helps Identify Information Security Risks White Paper Skill Level The special training or expertise an agent typically possesses. Options are: None: Has average intelligence and ability and can easily carry out random acts of disruption or destruction, but has no expertise or training in the specific methods necessary for a targeted attack. Minimal: Can copy and use existing techniques. Example: Untrained Employee. Operational: Understands underlying technology or methods and can create new attacks within a narrow domain. Adept: Expert in technology and attack methods, and can both apply existing attacks and create new ones to greatest advantage. Example: Legal Adversary. Objective The action that the agent intends to take in order to achieve a desired outcome. Options are: Copy: Make a replica of the asset so the agent has simultaneous access to it. Destroy: Destroy the asset, which becomes worthless to either Intel or the agent. Injure: Damage the asset, which remains in Intel s possession but has only limited functionality or value. Take: Gain possession of the asset so that Intel has no access to it Don t Care: The agent does not have a rational plan, or may make a choice opportunistically at the time of attack. Visibility The extent to which the agent intends to conceal or reveal his or her identity. Options are: Overt: The agent deliberately makes the attack and the agent s identity is known before or at the time of execution. Covert: The victim knows about the attack at the time it occurs, or soon after. However, the agent of the attack intends to remain unidentified. Clandestine: The agent intends to keep both the attack and his or her identity secret. Don t Care: The agent does not have a rational plan, may make a choice opportunistically at the time of attack, or may not place importance on secrecy. The Agents To define the agents, we used an iterative process that began with a simple one sentence description of each agent. Our cross-functional team then progressively refined these definitions using the team s experience supplemented with outside references and expertise. Each agent has a unique set of attribute values, as shown in Table 1. In addition to ensuring the uniqueness of each agent, this approach would enable risk managers to select relevant agents by first identifying the attributes that an agent must possess in order to represent a threat. We aimed to create agent definitions that were specific enough to be useful in risk assessments. For example, instead of defining a single agent to encompass all the current uses of the term hacker, we defined several different agents. One of these, Cyber Vandal, represented one original meaning of the term hacker: someone who intends to intrude into systems for thrills or prestige among peers. However, we also developed other real-world agents such as Data Miner, Internal Spy, Mobster, Government Spy, and Government Cyberwarrior to cover other agents that often are described using the umbrella term hacker. The information that we provide to risk managers includes the matrix of agents and their attributes (as in Table 1) and a text-based summary reference list including brief descriptions of the agents, their common tactics, and current ratings, as shown in Table 2. Some Intel business units add environmental agents such as natural disasters and pandemics to the library of human agents, to ensure that assessors take them into consideration. However, providing more detail about these is beyond the scope of our group, so these business units must consult other resources, such as local authorities and Intel security SMEs within the affected area, to characterize and assess those threats.
8 White Paper Threat Agent Library Helps Identify Information Security Risks Table 2. Summary Agent Information (Strength of Threat rating is proprietary and not included here.) Agent Label Insider Common Tactics/Actions Description Anarchist Violence, property destruction, physical business disruption Someone who rejects all forms of structure, private or public, and acts with few constraints Civil Activist Electronic or physical business disruption; theft of business data Highly motivated but non-violent supporter of cause Competitor Theft of IP or business data Business adversary who competes for revenues or resources (acquisitions, etc.) Corrupt Government Official Organizational or physical business disruption Person who inappropriately uses his or her position within the government to acquire company resources Cyber Vandal Network/computing disruption, web hijacking, malware Derives thrills from intrusion or destruction of property, without strong agenda Data Miner Theft of IP, PII, or business data Professional data gatherer external to the company (includes cyber methods) Employee, Disgruntled X Abuse of privileges for sabotage, cyber or physical Current or former employee with intent to harm the company Government Spy X Theft of IP or business data State-sponsored spy as a trusted insider, supporting idealistic goals Hostile Government Cyberwarrior Organizational, infrastructural, and physical business disruption, through network/computing disruption, web hijacking, malware State-sponsored attacker with significant resources to affect major disruption on national scale Internal Spy X Theft of IP, PII, or business data Professional data gatherer as a trusted insider, generally with a simple profit motive Irrational Individual Personal violence resulting in physical business disruption Someone with illogical purpose and irrational behavior Legal Adversary Organizational business disruption, access to IP or business data Adversary in legal proceedings against the company, warranted or not Mobster Theft of IP, PII, or business data; violence Manager of organized crime organization with significant resources Radical Activist Property destruction, physical business disruption Highly motivated, potentially destructive supporter of cause Sensationalist Public announcements for PR crises, theft of business data Attention-grabber who may employ any method for notoriety; looking for 15 minutes of fame Terrorist Violence, property destruction, physical business disruption Person who relies on the use of violence to support personal socio-political agenda Thief X Theft of hardware goods or IP, PII, or business data Opportunistic individual with simple profit motive Vendor X Theft of IP or business data Business partner who seeks inside information for financial advantage over competitors Non-Hostile Employee, Reckless X Benign shortcuts and misuse of authorizations, pushed wrong button Current employee who knowingly and deliberately circumvents safeguards for expediency, but intends no harm or serious consequences Employee, Untrained X Poor process, unforeseen mistakes, pushed wrong button Current employee with harmless intent but unknowingly misuses system or safeguards Information Partner X Poor internal protection of company proprietary materials Someone with whom the company has voluntarily shared sensitive data Source: Intel IT Threat Assessment Group, 2007 Agent Ratings The attributes of agents generally remain stable while the strength of their threat may change over time. For example, agents may engage in different activities, become increasingly common or powerful, or select different types of targets. To ensure that Intel risk managers have an up-todate picture of the threat that each agent currently represents to Intel, we: Provide a current rating for each threat agent based on factors such as the agent s recent activity. We rate the threat on a scale from low to high. We review and update this rating every six months and issue security briefings if significant changes occur. To rate each threat, we assess the current level of activity of the agent and how relevant that activity is to Intel, using internal and external information such as government and industry reports. In some cases, our assessment is qualitative. In other cases, we may have good quantitative data such as help desk records of problems that are due to errors by untrained employees. Our ratings include a description of current activities and incidents as well as background information about the agent. Abbreviated example ratings are shown in the Mobster detail box on the next page. The rated level of threat that each agent currently represents is proprietary to Intel and is not included here. 8
9 Threat Agent Library Helps Identify Information Security Risks White Paper Agent Rating: Mobster Manager of an organized crime organization Access: External Limits: Extra-legal, major Minimum Skills: Adept Visibility: Covert Background Outcome: Acquisition/Theft Resources: Organizational Objective: Take Summary: Mobsters lead organizations with a broad range of capabilities and functions, and may already be publicly known as leaders of organized crime. They are adept at utilizing their people and resources to force change in order to achieve their goal. For example, they are typically external but often can get access to insiders and other resources to drive changes facilitating even greater access. Activity: Organized crime organization activity has increased over the past five years in the areas of technology theft and cybercrime. This rise has been well documented. The ease and relative anonymity of cybercrime especially suits the needs of these organizations, and they are expanding their capabilities in this area. Additionally, since they are relatively new to the field, they are rapidly innovating new and unpredictable methods of operation. Most crime organizations are well funded and see technology theft and cybercrime as lucrative and worth significant investment. This investment usually includes either converting or planting insider agents into government and private organizations. In some areas of the world there are strong ties between organized crime and local government. Target: U.S. semiconductor technology is a popular target for organized crime. Processors are profitable and are easily stolen and resold on the black market. Furthermore, large technology suppliers undoubtedly represent attractive targets to a number of organizations, with nearly every business and technical area subject to attention and potential attack. More generally, other activities such as online gambling could enable the agent to blackmail employees with personal problems to provide assistance from the inside. Theft of personal identity information is a new and growing opportunity for this agent. Evaluation Considerations: This agent is external, but it uses organizational influence to change the playing field and leverage its contacts. The agent can assert almost unlimited influence in procuring intellectual property and the sale or distribution of goods. Mobsters use various methods, including insider manipulation and outright armed robbery. The agent s main impact is theft. The agent may resell stolen assets through covert (and difficult to trace) channels to avoid detection, taxes, and regulations. Activity is largely opportunistic with business-driven, objective-oriented, and savvy participants who are good at hiding and gaining legal protection. Using the TAL Risk management professionals and IT specialists can use the library to select agents by characteristics or with a pre-defined risk assessment methodology. We believe that the library can enable risk managers to quickly select relevant agents and safely ignore the rest, potentially increasing the speed and efficiency of security assessments. Selecting Agents by Attributes Using this method, risk managers identify the attributes necessary to pose a threat to a specific asset. Participants then select agents based on these attributes and other relevant information. For example, if we are concerned about recent damage to certain assets, and our assessment is that an agent had to have internal access to cause this damage, we might select the threat attribute Insider. If we identified the presence of untrained employees and a high accident rate, we might refine the selection to the threat agent Untrained Employee. We recommend strongly that risk managers first identify attributes rather than selecting agents based on their names. Partly because people have preconceptions about the meaning of names, selecting by agent name can lead to misinterpretation, complacency, and overlooking less obvious options. Furthermore, because the library consists of archetypes rather than exact descriptions of individuals, an exact match is not possible or desirable. 9
10 White Paper Threat Agent Library Helps Identify Information Security Risks Table 3. Example Questions to Identify Relevant Threat Agents Example Questions What is your most important asset and why? Are the assets located in a country perceived to have a high rate of corruption? Are all the employees who use this asset regularly trained or certified on using the asset? What s your current accident rate? If applicable, would violent acts toward your assets cause a significant business disruption? How easily could a malicious insider impact your assets? How much skill would a person require to damage the asset or to gain unauthorized access? Have all of your information or NDA partners been vetted to corporate security standards? Source: Intel IT Threat Assessment Group, 2007 Agent Characteristics Identified Helps identify agents who could damage the specified asset, such as technology or intellectual property. Helps assess the greatest potential impact as well as the type of asset threatened. Importance of government agents. Potential damage from unskilled employees. Danger from violent agents. Danger from hostile internal agents. Minimum skill level required. Potential threat from partners or insiders. Government and Industry Collaborating to Protect IT Sector Infrastructure In May 2007, The United States Department of Homeland Security published the IT Sector Specific Plan (IT SSP), which supports the National Infrastructure Protection Plan. The IT SSP is a planning document that provides guidance on how public and private entities will work together to protect IT sector infrastructure. The IT SSP represents an unprecedented collaboration between public and private IT sector entities to address complex, critical infrastructure protection challenges. Public-private working groups are building upon the momentum from IT SSP development, and Intel s Threat Agent Library is being used by one of these groups to refine the sector s risk management approach and threat analysis methodology. To learn more about the IT SSP, visit To help identify attributes of relevant agents, our team developed example questions, some of which are shown in Table 3. Risk managers can use these as a basis for developing a full set of questions to use when interviewing IT managers and professionals during risk assessments. Use within Risk Assessment Methodologies Intel is beginning to use the TAL within two risk assessment methodologies An Intel IT methodology that simultaneously addresses both general business risks and information security specific risks. The TAL is available within a tool that supports this methodology. A risk model-based methodology to perform regular security evaluations of Intel s manufacturing systems. The security evaluations in the second method rely on the expertise of the professionals who manage specific assets, such as servers and product tracking terminals. These experts provide quantitative assessments of the security of these assets based on their experience and knowledge; risk managers then include these assessments in a broader evaluation of the security of manufacturing systems. The accuracy and consistency of these evaluations therefore depend in part on the ability of IT professionals to assess threats to the assets they manage. In turn, each IT professional s assessment depends on his or her knowledge of possible threats. Intel manufacturing groups have begun making the TAL available to professionals in manufacturing IT. This provides them with a consistent set of information that they can use as a basis for their risk assessments, and provides them with information about potential threat agents that they might not otherwise consider. We expect that this will lead to more consistent evaluations and improve the overall accuracy of risk assessments. Some manufacturing groups have already used the TAL in risk assessments. In one project, this reduced the time required for the risk assessment by an estimated 30 percent, saving many hours of experts time. Before the TAL was available, participants spent a considerable amount of time discussing and reaching agreement on definitions of agents. The TAL accelerated this stage by providing predefined agents as a basis. Participants could review the definitions before meetings, further accelerating the process. Participants then evaluate the risk that these agents pose to specific assets. The agent ratings help with this process by describing agents activities, including which assets they target. 10
11 Threat Agent Library Helps Identify Information Security Risks White Paper With the risk model-based methodology, Intel uses a spreadsheet to calculate risks based on data from participants about assets, threats, and vulnerabilities. The TAL agents have been incorporated into the spreadsheet; data developed by participants plugs directly into risk calculations, helping generate more accurate and consistent risk assessments. The TAL may also be helpful for other purposes at Intel s massive global manufacturing organization. For example, it could provide a common language facilitating discussions about security issues among manufacturing groups worldwide. Future We are planning two significant TAL enhancements. Threat Personas Product designers increasingly use the persona technique to model potential customers. This helps the designers focus on their target audience. In that context, a persona is a description of an archetypal customer. The definition includes typical characteristics and behaviors. We expect to use the same approach to develop threat personas that model potential attackers. Our goal is to help our system designers get a clear picture of the attacker mindset and stay focused on it during system design. Matrix of Exploits We plan to create a matrix listing each agent s common attacks and other exploits. We believe this will help us prepare against specific possible types of attack. When conducting a risk assessment, this matrix will help us quickly map threats to vulnerabilities that we need to cover. As a simple example, if we determine that Mobster is a key threat agent, the matrix might show that mobsters have recently been using phishing attacks (fake s soliciting financial or other information). Security specialists could then check training logs to determine whether users have recently received training on how to resist these attacks. Conclusion We believe that the TAL provides a valuable reference source of standardized threat agent information that can accelerate and improve risk assessments. We expect to realize benefits as we increase our use of the TAL and integrate it into our risk assessment methodologies. We believe that there is a strong need for such standardized threat agent information, and we hope that other organizations will also find the TAL useful. Authors Timothy Casey is a senior security analyst with Intel Information Technology. Acronyms TAL Threat Agent Library IT SSP Information Technology Sector Specific Plan 11
12 This paper is for informational purposes only. THIS DOCUMENT IS PROVIDED "AS IS" WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE. Intel disclaims all liability, including liability for infringement of any proprietary rights, relating to use of information in this specification. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein. Intel, the Intel logo, Intel. Leap ahead. and Intel. Leap ahead. logo are trademarks of Intel Corporation in the U.S. and other countries. * Other names and brands may be claimed as the property of others. Copyright 2007, Intel Corporation. All rights reserved. Printed in USA Please Recycle 0907/SEP/RDA/PDF ITAI Number: w
Prioritizing Information Security Risks with Threat Agent Risk Assessment
IT@Intel White Paper Intel Information Technology Security December 2009 Prioritizing Information Security Risks with Threat Agent Risk Assessment Executive Overview The predictive output from TARA promotes
EXTREME CYBER SCENARIO PLANNING & ATTACK TREE ANALYSIS
EXTREME CYBER SCENARIO PLANNING & ATTACK TREE ANALYSIS Ian Green Manager, Cybercrime & Intelligence Commonwealth Bank of Australia Session ID: GRC T17 Session Classification: ADVANCED WHY? What keeps you
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
Gaining the upper hand in today s cyber security battle
IBM Global Technology Services Managed Security Services Gaining the upper hand in today s cyber security battle How threat intelligence can help you stop attackers in their tracks 2 Gaining the upper
IT@Intel. Measuring the Return on IT Security Investments. White Paper Intel Information Technology Computer Manufacturing Information Security
White Paper Intel Information Technology Computer Manufacturing Information Security Measuring the Return on IT Security Investments Intel IT developed a model for measuring return on security investment
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media
January 2012 Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 All contents are Copyright 1992 2012 Cisco Systems, Inc. All rights reserved. This document
Roadmap for Transforming Intel s Business with Advanced Analytics
IT Best Practices Business Intelligence and IT Business Transformation November 2011 Roadmap for Transforming Intel s Business with Advanced Analytics Executive Overview is working in close partnership
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Getting real about cyber threats: where are you headed?
Getting real about cyber threats: where are you headed? Energy, utilities and power generation companies that understand today s cyber threats will be in the best position to defeat them June 2011 At a
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
INSIDE. Cyberterrorism and the Home User By Sarah Gordon, Senior Research Fellow
Symantec Security Response WHITE PAPER Cyberterrorism and the Home User By Sarah Gordon, Senior Research Fellow Symantec Security Response INSIDE What it is? How does this affect me? What can I do to make
Managing the Ongoing Challenge of Insider Threats
CYBERSECURITY IN THE FEDERAL GOVERNMENT Managing the Ongoing Challenge of Insider Threats A WHITE PAPER PRESENTED BY: May 2015 PREPARED BY MARKET CONNECTIONS, INC. 11350 RANDOM HILLS ROAD, SUITE 800 FAIRFAX,
Federal Bureau of Investigation
Federal Bureau of Investigation SSA John Caruthers Cyber Criminal Section SSA Kenneth Schmutz Cyber National Security Section April 11, 2012 FBI Mission Cyber Threats FBI Response 1. Protect the United
Security Practices for Online Collaboration and Social Media
Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Solving the Security Puzzle
Solving the Security Puzzle How Government Agencies Can Mitigate Today s Threats Abstract The federal government is in the midst of a massive IT revolution. The rapid adoption of mobile, cloud and Big
9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500
INFO 1500 9. Information Assurance and Security, Protecting Information Resources 11. ecommerce and ebusiness Janeela Maraj Tutorial 9 21/11/2014 9. Information Assurance and Security, Protecting Information
Implementing the U.S. Cybersecurity Framework at Intel A Case Study
SESSION ID: STR-W01 Implementing the U.S. Cybersecurity Framework at Intel A Case Study Tim Casey Senior Strategic Risk Analyst Intel Information Security @timcaseycyber How would you represent your entire
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
FBI CHALLENGES IN A CYBER-BASED WORLD
FBI CHALLENGES IN A CYBER-BASED WORLD Federal Bureau of Investigation Assistant General Counsel Robert Bergida 202-651-3209 Overview Cyber Threats FBI Mission FBI Response Terrorism remains the FBI s top
Fostering Incident Response and Digital Forensics Research
Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel [email protected] September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital
Cyber Intelligence Workforce
Cyber Intelligence Workforce Troy Townsend Melissa Kasan Ludwick September 17, 2013 Agenda Project Background Research Methodology Findings Training and Education Project Findings Workshop Results Objectives
Web Protection for Your Business, Customers and Data
WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation
Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting
Win the race against time to stay ahead of cybercriminals
IBM Software Win the race against time to stay ahead of cybercriminals Get to the root cause of attacks fast with IBM Security QRadar Incident Forensics Highlights Help reduce the time required to determine
IT@Intel. Aligning IT with Business Goals through Strategic Planning
White Paper Intel Information Technology Computer Manufacturing Strategic Planning Aligning IT with Business Goals through Strategic Planning Intel IT has developed and implemented a new approach to strategic
White Paper An Enterprise Security Program and Architecture to Support Business Drivers
White Paper An Enterprise Security Program and Architecture to Support Business Drivers seccuris.com (866) 644-8442 Contents Introduction... 3 Information Assurance... 4 Sherwood Applied Business Security
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
IT@Intel. Memory Sizing for Server Virtualization. White Paper Intel Information Technology Computer Manufacturing Server Virtualization
White Paper Intel Information Technology Computer Manufacturing Server Virtualization Memory Sizing for Server Virtualization Intel IT has standardized on 16 gigabytes (GB) of memory for dual-socket virtualization
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
Sycamore Leaf Solutions LLC
Sycamore Leaf Solutions LLC Terms of Service Terms of Service The Terms of Service for Sycamore Leaf Solutions ("Terms of Service") are effective immediately upon the User's acceptance of the Terms of
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the
National Infrastructure Protection Center
National Infrastructure Protection Center Risk Management: An Essential Guide to Protecting Critical Assets November 2002 Summary As organizations increase security measures and attempt to identify vulnerabilities
Identifying Cyber Risks and How they Impact Your Business
10 December, 2014 Identifying Cyber Risks and How they Impact Your Business David Bateman, Partner, K&L Gates, Seattle Sasi-Kanth Mallela, Special Counsel, K&L Gates, London Copyright 2013 by K&L Gates
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
Risk Assessment Guide
KirkpatrickPrice Assessment Guide Designed Exclusively for PRISM International Members KirkpatrickPrice. innovation. integrity. delivered. KirkpatrickPrice Assessment Guide 2 Document Purpose The Assessment
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE.
Terms & conditions for the use of this Website IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE. By using this website you are deemed to have full
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security
IBM Security X-Force Threat Intelligence
IBM Security X-Force Threat Intelligence Use dynamic IBM X-Force data with IBM Security QRadar to detect the latest Internet threats Highlights Automatically feed IBM X-Force data into IBM QRadar Security
CORE Security and GLBA
CORE Security and GLBA Addressing the Graham-Leach-Bliley Act with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected] www.coresecurity.com
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
Cyber Security for audit committees
AUDIT COMMITTEE INSTITUTE Cyber Security for audit committees An introduction kpmg.com/globalaci 2 Audit Committee Institute An introduction to cyber security for audit committees Audit committees have
Research Note Engaging in Cyber Warfare
Research Note Engaging in Cyber Warfare By: Devin Luco Copyright 2013, ASA Institute for Risk & Innovation Keywords: Cyber War, Cyber Warfare, Cyber Attacks, Cyber Threats Abstract This research note defines
Cyber Threats: Exposures and Breach Costs
Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals
Types of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
A Layperson s Guide To DoS Attacks
A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4
Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.
TrendLabs Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. We live out our digital lives on the Internet. There, communication is quicker and easier, and our
Stay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz [email protected] IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie
IBM Security Privileged Identity Manager helps prevent insider threats
IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged
Managing Security Risks in Modern IT Networks
Managing Security Risks in Modern IT Networks White Paper Table of Contents Executive summary... 3 Introduction: networks under siege... 3 How great is the problem?... 3 Spyware: a growing issue... 3 Feeling
What s Holding Back the Cloud?
MAY 2012 Peer Research What s Holding Back the Cloud? Intel Survey on Increasing IT Professionals Confidence in Cloud Security Why You Should Read This Document This report captures key findings from a
Internet Reputation Management Guide. Building a Roadmap for Continued Success
Internet Reputation Management Guide Building a Roadmap for Continued Success About BrandProtect BrandProtect is the leader in multi-channel Internet threat monitoring and risk mitigation. The company
Internet Reputation Management Guidelines Building a Roadmap for Continued Success
Internet Reputation Management Guidelines Building a Roadmap for Continued Success Table of Contents Page INTERNET REPUTATION MANAGEMENT GUIDELINES 1. Background 3 2. Reputation Management Roadmap 5 3.
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to
In an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
Collateral Effects of Cyberwar
Your texte here. Collateral Effects of Cyberwar by Ilia Kolochenko for Geneva Information Security Day 9 th of October 2015 Quick Facts and Numbers About Cybersecurity In 2014 the annual cost of global
SECURITY CONSIDERATIONS FOR LAW FIRMS
SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,
Evaluating Thin-Client Security in a Changing Threat Landscape
IT@Intel White Paper Intel Information Technology Business Solutions April 2010 Evaluating Thin-Client Security in a Changing Threat Landscape Executive Overview Equivalent security controls can be, and
Privacy in the Cloud A Microsoft Perspective
A Microsoft Perspective November 2010 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date of publication. Because Microsoft
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs EXECUTIVE SUMMARY Supervisory Control and Data Acquisition (SCADA) systems are used for remote
Leveraging Privileged Identity Governance to Improve Security Posture
Leveraging Privileged Identity Governance to Improve Security Posture Understanding the Privileged Insider Threat It s no secret that attacks on IT systems and information breaches have increased in both
How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
Sample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510
TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME Haya Fetais & Mohammed Shabana Saint Leo University COM- 510 November 23, 2014 Introduction Globalization and technological developments have infiltrated
GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
Business Case. for an. Information Security Awareness Program
Business Case (BS.ISAP.01) 1 (9) Business Case for an Information Security Business Case (BS.ISAP.01) 2 Contents 1. Background 3 2. Purpose of This Paper 3 3. Business Impact 3 4. The Importance of Security
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
Acceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
Corporate Spying An Overview
Corporate Spying An Overview With the boom in informational and technological advancements in recent years, there comes the good and the bad the bad being more susceptibility to the theft of confidential
