Eight Ingredients of Communications Infrastructure: A Systematic and Comprehensive Framework for Enhancing Network Reliability and Security
|
|
|
- Lawrence Bradford
- 10 years ago
- Views:
Transcription
1 Eight Ingredients of Infrastructure: A Systematic and Comprehensive Framework for Enhancing Network Reliability and Security Karl F. Rauscher, Richard E. Krock, and James P. Runyon Controlled improvement in the reliability and security of any system requires a comprehensive analysis. This requires the systematic identification of the fundamental underlying components of the system using a rigorous discipline. If successful, this process will illuminate areas for concern and identify areas for potential system enhancements. Such comprehensive analysis can be conducted for communications infrastructure using a framework of eight ingredients. This paper will explore these eight ingredients and identify their usage in vulnerability analysis and best practice identification for enhancing the reliability and security of communications infrastructure Lucent Technologies Inc. Introduction The communications infrastructure is now recognized as the key infrastructure upon which all other critical infrastructures depend [11]. These other critical infrastructures include: transportation, banking and finance, public health, law enforcement, energy, water, agriculture, government, and others (Figure 1). The reliability and security of the communications infrastructure are vital for the ongoing operation, control, and support for these other infrastructures on which our national security, economy, and our way of life depend. In the early 1990s, the FCC chartered the Network Reliability and Interoperability Council (NRIC) [5], an industry-based FCC advisory group chartered under the FACA (Federal Advisory Committee Act), to address the reliability and interoperability of the national communications network. Biannually, the FCC has re-chartered NRIC to focus on various areas of concern, beginning with network reliability and subsequently on network signaling reliability, Y2K preparedness, packet-switched networks, homeland security, and emergency. This is shown in Figure 2. Network reliability, interoperability, and security recommendations in the form of NRIC best practices (BPs) have been developed by communications experts for use within the industry. Prior to NRIC V, best practices were developed from an historic analogy perspective. Analysis of previous network outages by industry experts was used to identify best practices to address these past events (i.e., network outages). Starting with NRIC V, development of BPs has been refined and extended, based on the NRIC charter, by leveraging a systematic and rigorous process that analyzes not only past events, but includes looking at Bell Labs Technical Journal 11(3), (2006) 2006 Lucent Technologies Inc. Published by Wiley Periodicals, Inc. Published online in Wiley InterScience ( DOI: /bltj.20179
2 possible problems that may not yet have happened based on knowledge of the inherent vulnerabilities [10]. This required developing a systematic way of categorizing the communications infrastructure. The eight ingredient framework shown in Figure 3 has been proved to be thorough and comprehensive in the description of communications infrastructure. These eight ingredients are the following: 1. Human. Humans operate the network and present one of the most complex vulnerabilities to analyze. The human ingredient includes intentional and unintentional behaviors, physical and mental limitations, education and training, humanmachine interfaces, and personal ethics [2]. 2. Policy. Policies include any agreed or anticipated behavior between entities, such as companies or governments. They include agreements, standards, policies, and regulations (ASPR) and provide a framework that defines the expected interaction between government and the communications industry. 3. Hardware. The electronic and physical components that compose the network nodes include the hardware frames, electronics circuit packs and cards, metallic and fiber optic transmission cables, and semiconductor chips. 4. Software. Today s complex communications networks gain their power and flexibility from the computer code that controls the equipment. This category covers all aspects of creating, maintaining, and protecting that code, including physical storage, development and testing of code, version control, and control of code delivery. 5. Networks. Networks include the various topological configurations of nodes, synchronization, redundancy, and physical and logical diversity. 6. Payload. The purpose of a communications network is to deliver some form of communications, be it voice, data, or multimedia. The payload category includes the information transported across the infrastructure, traffic patterns and statistics, information interception, and information corruption. 7. Environment. systems are in the physical universe and, as such, operate in various Panel 1. Abbreviations, Acronyms, and Terms ASPR Agreements, standards, policy, and regulations ATIS Alliance for Telecommunications Industry Solutions BP Best practice CQR Quality and Reliability FACA Federal Advisory Committee Act FCC Federal Commission IEEE Institute of Electrical and Electronics Engineers NGN Next-generation network NRIC Network Reliability and Interoperability Council NRSC Network Reliability Steering Committee NSTAC National Security Telecommunications Advisory Committee Y2K Year 2000 environments. These environments range from temperature-controlled buildings to installations exposed to harsh conditions such as outside terminals and cell towers that are exposed to inclement weather, trenches where cables are buried, space where satellites orbit, and the ocean where submarine cables reside. FINANCIAL PUBLIC HEALTH COMMUNICATIONS INFRASTRUCTURE TRANSPORTATION Other infrastructures Figure 1. Other infrastructures dependency on the communications infrastructure. LAW ENFORCEMENT ENERGY 74 Bell Labs Technical Journal DOI: /bltj
3 Reliability Interoperability (Telecom Act of 96) Y2K Packet switching Homeland security Emergency NRC I 1992 NRC II NRIC III NRIC IV NRIC V NRIC VI NRIC VII 2005 Systematic vulnerability assessment Historic analogy NRC National Reliability Council NRIC Network Reliability and Interoperability Council Y2K Year 2000 Figure 2. Historical overview of NRIC charters. Human Hardware Networks Environment Policy Software Payload Power Figure 3. Eight ingredients of communications infrastructure. 8. Power. Without electrical power, electronic systems simply don t work. The power required for communications networks includes the internal power infrastructure, batteries, grounding, cabling, fuses, back-up emergency generators and fuel, and commercial power. This eight ingredient framework has been proven to be very useful by key industry-government-academic fora. First used by the IEEE Technical Committee on Quality and Reliability (CQR) to anticipate the challenges of emerging technologies, it has been used by the FCC Network Reliability and Interoperability Council (NRIC) toward the development of vulnerability-based best practices, by the ATIS Network Reliability Steering Committee (NRSC) to identify possible influencing factors driving observed improvements, and by the President s National Security Telecommunications Advisory Committee (NSTAC) [4] to prepare for next-generation networks. The framework has enabled subject matter experts to conduct complete analyses, assessments, and reviews, despite an enormous and very complex scope. The very challenging and critical missions of these and other groups were greatly assisted by the comprehensive attributes of the framework. Further, the framework of eight ingredients has been shown to extend beyond current legacy networks, to be equally effective in understanding future networks (i.e., next-generation networks) and other infrastructures (e.g., energy). Vulnerability Analysis Using the Eight Ingredients Vulnerability analysis is a distinct approach to protect a system from unknown threats. This is in contrast to the most commonly used threat-based approaches, which are based on reacting to previously seen or anticipated new attacks. A vulnerability is a characteristic of the communications infrastructure that renders it, or some portion of it, susceptible to damage or compromise. A threat is an exploitation of one or more vulnerabilities that results in damage to DOI: /bltj Bell Labs Technical Journal 75
4 or compromise of the communication network or some portion of it [6 10]. Vulnerability While the communications industry may be surprised by the particular method of a future attack (either by terrorists or nature), it should not be surprised by a threat exploiting vulnerabilities to damage communications. The people who design, build, and maintain these communication systems and networks know the nuances of their systems and the points at which they are vulnerable. By systematically addressing these vulnerabilities, the communications industry can directly prepare for any number of unknown threats attempting to exploit those vulnerabilities. Figure 4 illustrates a vulnerability within one of the ingredients. The rectangular box represents one of the ingredients essential to the operation of the communications infrastructure. The finite number of vulnerabilities in each ingredient is illustrated with the circular hole(s) in the box. The vulnerability-based approach has fundamental distinctions from the traditional threat-based protection methods, and is vital for optimally protecting the reliability and security of the network. For example, prior to the September 11, 2001, event, the airline industry knew of the cockpit door access vulnerability, but had not previously seen that vulnerability being exploited as it was that day when the airplane was used as a missile. Similarly, the communications industry must identify and effectively address its vulnerabilities to protect itself from some yet unenvisioned forms of attack or exploitation that would compromise the reliability and security of the network. For example, cyber security vulnerabilities could be used in an attack on the communications infrastructure and compromise the reliability of the system. The primary objectives in assessing vulnerabilities are: 1. Be complete: do not overlook anything. 2. Master knowledge: understand the nature of each susceptibility fully. 3. Recognize distribution: capture all instances of a vulnerabilities presence. 4. Understand dependencies: anticipate the impact and consider coordinated and blended attacks [1]. When completed properly, this analysis will result in the identification of a complete and finite number of vulnerabilities for each of the eight ingredients, and therefore for the system as a whole. Figure 5 illustrates the eight ingredients of a communications network, each with a finite number of vulnerabilites. Environment Hardware Human Network Software Payload Vulnerabilities Figure 4. Vulnerabilities of the communications networks. Power Policy Figure 5. Vulnerabilities in the eight ingredients of network reliability and security. 76 Bell Labs Technical Journal DOI: /bltj
5 Threats As stated earlier, threats are attempts to exploit one or more vulnerabilities that can result in damage to communications, but threats are not limited to terrorism or other intentional attacks. Natural disasters (e.g., hurricanes) [3, 14] as well as unintentional human errors continue to attack networks in unforeseen ways. Figure 6 provides a schematic illustration of the relationship of vulnerabilities to threats and the resulting damage. It shows how a threat can be constructed by someone wishing to attack the communications network by leveraging one or more vulnerabilities. Damage to communications takes place when a threat successfully exploits one or more of these vulnerabilities. Figure 7 illustrates how an infinite number of threats, many not currently known, can attempt to exploit a single vulnerability. Figure 8, which follows, illustrates how threats can exploit one or more vulnerabilities of each of the eight ingredients resulting in damage to communications. A blended attack occurs when a single threat exploits multiple vulnerabilities. As an example, Threat 1 is based on exercising a single environmental vulnerability of a system (e.g., unauthorized equipment access). Threat 3 is a blended attack that leverages a combination of network and payload vulnerabilities (e.g., cyber attack). Historically, threat analysis supports decisions involving setting Threat 1 Vulnerability exploited Threat 2 Vulnerabilities exploited Figure 6. Threats, vulnerabilities, and damage. Figure 7. Multiple threats exploiting one vulnerability. DOI: /bltj Bell Labs Technical Journal 77
6 Threat-1 Threat-2 Environment Hardware Threat-3... Human Payload Network Policy Threat-n Power Software Figure 8. Threats leveraging vulnerabilities. defense priorities based on the likelihood of a specific threat occurring. Because of the large number of combinations and permutations of variables, developing an effective security plan based on threats varies in effectiveness it is very efficient when the likelihood of having a commanding knowledge of the only possible threats is high. On the other hand, it is very ineffective if the knowledge of possible threats is less certain. Depending on the risks and consequences, it may be appropriate. The threat-only based approach has as its fundamental weakness the fact that it is either based on hard to obtain intelligence or on a reactive response to previously seen attacks. It is limited in its effectiveness by leaving its user vulnerable to being surprised by an attacker or by being one step behind the creative attacker. The next section discusses an alternative approach, which uses pre-emptive vulnerability analysis in addition to basing response modeling on previously seen threats. Vulnerability Analysis Using the Eight Ingredients As cited earlier, the communications industry utilizes the framework of eight ingredients to provide a structure with which to systematically and rigorously manage the identification of vulnerabilities within the communications industry. Teams of industry experts brainstorm areas of concern and system failures. The outputs of these sessions are categorized into one of the eight ingredients. These outputs are then analyzed by individuals with expertise within each of the specific ingredients 78 Bell Labs Technical Journal DOI: /bltj
7 to develop a finite but comprehensive list of vulnerabilities [8]. The major benefit of systematically addressing the vulnerabilities of a system is that protection is provided for general classes of problems, independent of knowing what the specific threat may be. While the fundamental vulnerabilities of the communications infrastructure can be enumerated in a controlled manner, the number of threats that can exercise those vulnerabilities are infinite and are constantly changing. As noted well in [13], One fact dominates all homeland security assessments: terrorists are strategic actors. They choose their targets deliberately based on the weaknesses they observe in our defenses and our preparedness. We must defend ourselves against a wide range of means and methods of attack. Our enemies are working to obtain chemical, biological, radiological, and nuclear weapons for the purpose of wreaking unprecedented damage on America. Terrorism depends on surprise. With it, a terrorist attack has the potential to do massive damage to an unwitting and unprepared target. By addressing classes of problems with the identification of best practices, these new threats, regardless of the source, are eliminated. As shown in Figure 9, the implementation of best practices eliminates or disables the vulnerability, thereby rendering ineffective the threats attempting to exercise that vulnerability. Threat Network Software Figure 9. Vulnerability removal prevents damage. The vulnerability-based approach is not an exclusive strategy. This approach is intended to be used in addition to traditional threat-based approaches, and is consistent with the President s National Strategy for Homeland Security [12, 13]. The primary lesson learned is that threats and their probability of being exercised continue to change and evolve. The industry s response to these changes should take place in a timely fashion, but such responses are no substitute for proactive, systematic coverage of vulnerabilities within the communications infrastructure as we cannot predict how threats will evolve. The need to proactively address vulnerabilities rather than just focusing on previously seen attacks is clearly demonstrated in security, a unique area of reliability. While reliability was once only measured in terms of the availability of the network and the ability of information to traverse the network successfully, the openness of today s network puts even the reliability of the transmitted information at risk. This has made security of the network an inseparable component of overall reliability. Security is difficult to measure since network administrators may not even be aware that an attack is under way or has occurred previously. Undetected attacks may steal information or gain access to networks. Protecting against only previously seen attacks would not help protect against undetected attacks. Analyzing and addressing system vulnerabilities would close holes that undetected attacks may be exploiting. Conclusion The systematic identification of the vulnerabilities within the communications infrastructure was an historic undertaking and accomplishment. While it is essential to utilize multiple approaches to protect communications infrastructure, the vulnerability analysis approach is fundamentally distinct from the traditional threat-based protection methods. A threat-based approach is based on knowledge of the things or people that threaten the network and what drives them. While engineers do not know what drives a terrorist, they do know the equipment DOI: /bltj Bell Labs Technical Journal 79
8 that composes the network and what vulnerabilities it may have. Vulnerability analysis utilizes that knowledge to protect against unimagined and unknown attacks. By identifying the finite number of vulnerabilities within a system, we can effectively protect the communications network from threats we have already seen, and from those that we have not yet seen. The eight ingredients of communications infrastructure have been successfully used over the past several years by various corporations, and national and government advisory groups. These groups were chartered to analyze the performance of the network and provide guidance on improving network reliability and performance. Hundreds of best practices have been developed with this method. They now stand as the most authoritative collection of guidance for the industry, developed by the industry, in the areas of reliability, interoperability, physical security, cyber security, and emergency. These best practices have been recognized both domestically and internationally as a cornerstone in the reliable and secure operation of communications networks. The development of these best practices has its foundation in the use of the eight ingredients and has affirmed that the eight ingredients provide comprehensive coverage of the nation s most critical infrastructure. Acknowledgements The authors wish to thank all of the dedicated participants of numerous industry-government fora for dedicated contributions to the advancing the reliability and security of public communications networks. References [1] Federal Commission, Report and Order and Further Notice of Proposed Rulemaking, Revision of the Commission s Rules to Ensure Compatibility With Enhanced 911 Emergency Calling Systems, FCC , adopted June 12, 1996, p. 8. [2] A. Macwan, Approach for Identification and Analysis of Human Vulnerabilities in Protecting Telecommunications Infrastructure, Bell Labs Tech. J., 9:2 (2004), [3] B. L. Malone III, Wireless Search and Rescue: Concepts for Improved Capabilities, Bell Labs Tech. J., 9:2 (2004), [4] National Security Telecommunications Advisory Committee, Next Generation Networks Task Force Report, 2006, < nstac/reports/2006/nstac%20next% 20Generation%20Networks%20Task% 20Force%20Report.pdf>. [5] Network Reliability and Interoperability Council, < [6] Network Reliability and Interoperability Council VI, Homeland Security Physical Security (Focus Group 1A) Prevention Report, Issue 1, Dec. 2002, p. 27, < fg/nricvifg.html>. [7] Network Reliability and Interoperability Council VI, Homeland Security Physical Security (Focus Group 1A) Prevention and Restoration Report, Issue 2, Mar. 2003, pp. 27, 41, < [8] Network Reliability and Interoperability Council VI, Homeland Security Physical Security (Focus Group 1A) Final Report, Issue 3, Dec. 2003, < [9] Network Reliability and Interoperability Council VII, Focus Group 3A Wireless Network Reliability Final Report, Issue 3, Sept. 2005, < [10] Network Reliability and Interoperability Council VII, Focus Group 3B Public Data Network Reliability Final Report, Issue 3, Sept. 2005, < [11] K. F. Rauscher, Protecting Infrastructure, Bell Labs Tech. J., 9:2 (2004), 1 4. [12] United States, Department of Homeland Security, Strategic Plan, Feb. 23, 2004, < DHS_StratPlan_FINAL_spread.pdf>. [13] United States, Office of Homeland Security, National Strategy for Homeland Security, July 2002, < assetlibrary/nat_strat_hls.pdf>. [14] United States, Office of Homeland Security, National Strategy for Homeland Security, July 2002, pp. vii viii, < interweb/assetlibrary/nat_strat_hls.pdf>. [15] Wireless Emergency Response Team, Wireless Emergency Response Team (WERT) Final Report for the September 11, 2001 New York City World Trade Center Terrorist Attack, WERT, Oct. 2001, < (Manuscript approved May 2006) 80 Bell Labs Technical Journal DOI: /bltj
9 KARL F. RAUSCHER, a Bell Labs Fellow and executive director of the Bell Labs Network Reliability and Security Office in Washington, D.C., has provided leadership for numerous critical government-industry fora, including the IEEE Quality and Reliability (CQR) Council, the Network Reliability Steering Committee (NRSC), the Network Reliability and Interoperability Council (NRIC), and the National Security Telecommunications Advisory Committee (NSTAC). He has been an adviser for network reliability issues on five continents and has served as an expert witness for the U.S. Congress Select Committee on Homeland Security regarding the Power Blackout of He is also the president of the non-profit Wireless Emergency Response Team (WERT) that conducts search and rescue efforts using advanced wireless technology. He holds a bachelor of science degree in electrical engineering from Penn State University in University Park, Pennsylvania, a master s degree in electrical engineering from Rutgers University in New Brunswick, New Jersey; and a Master s degree in biblical studies from the Dallas Theological Seminary in Texas. manager, he was a distinguished member of technical staff in software feature development, systems engineering, and network architecture for communications systems, and for 10 years he served as an architecture manager for Lucent s ADSL, cable TV, and fiber-to-the-home broadband platforms. He has been awarded four U.S. patents and has multiple publications in the Bell Labs Technical Journal and other industry forums. In the last few years, Mr. Runyon has been an active participant in a number of FCCchartered federal advisory committees. As a member of the Network Reliability Steering Committee (NRSC), he has provided leadership in five significant studies on network outages. Mr. Runyon is a member of IEEE, a member and administrator for several Network Reliability and Interoperability Council (NRIC) focus groups, and serves as manager for the NRIC Best Practice Web site. RICHARD E. KROCK is a member of technical staff in the Services Technology department at Lucent Worldwide Services in Lisle, Illinois. His responsibilities include the analysis of network outages and the identification and implementation of countermeasures. He has been an active member of the past two Network Reliability and Interpretability Councils and has led various sub-teams related to power. He has provided consulting on emergency preparedness/disaster recovery both domestically and internationally, and also represents Lucent at the Telecom Information Sharing and Analysis Center, part of the National Coordinating Center for Telecommunications. Mr. Krock holds a B.S. degree in electrical engineering from Valparaiso University in Indiana and an M.B.A in telecommunications from Illinois Institute of Technology in Chicago. He is also a licensed professional engineer. JAMES P. RUNYON is a technical manager in the Network Reliability Office at Bell Labs in Naperville, Illinois. He holds a B.S. degree in chemistry from Taylor University in Upland, Indiana, and an M.S. degree in computer science from the University of Wisconsin in Milwaukee. Prior to becoming technical DOI: /bltj Bell Labs Technical Journal 81
Federal Communications Commission
Homeland Security Policy Council Federal Communications Commission Amal Abdallah Senior Attorney International Bureau Federal Communications Commission 1 Homeland Security Sectors Agriculture Banking and
How To Protect The Internet From Natural Disasters
Network Security Policy: The U.S. Experience Patricia Cooper International Bureau U.S. Federal Communications Commission Network Security: The U.S. Experience Network Security: How we define it U.S. Approach:
Security in Space: Intelsat Information Assurance
Security in Space: Intelsat Information Assurance 14/03/6997 Intelsat Information Assurance Intelsat maintains the highest standards of Information Assurance by assessing and building the Intelsat infrastructure,
National Communications System. December 6, 2007
1 National Communications System December 6, 2007 2 National Communications System (NCS) Established in 1963 in response to communications failures associated with the Cuban Missile Crisis The mandate
How To Set Up An Ip Trunk For A Business
Charter Business : White paper SIP Trunking: A new voice in communications service WHITE PAPER With the rise of next-generation technology, business customers have more options than ever from providers
EMP... Electromagnetic Pulse. one of the greatest threats facing technology-driven clients today
EMP... Electromagnetic Pulse one of the greatest threats facing technology-driven clients today Do you remember in the movie Oceans Eleven when Las Vegas was rendered powerless by an EMP event? That could
Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com
Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests
Subject: Critical Infrastructure Identification, Prioritization, and Protection
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,
Section A: Introduction, Definitions and Principles of Infrastructure Resilience
Section A: Introduction, Definitions and Principles of Infrastructure Resilience A1. This section introduces infrastructure resilience, sets out the background and provides definitions. Introduction Purpose
December 17, 2003 Homeland Security Presidential Directive/Hspd-7
For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).
network PRoteCtion and information L G S H a S P e R F o R M e D assurance networks R e D t e a M S e C U R i t Y
Solving the Federal Government s Toughest Cyber Security Problems NETWORK PROTECTION AND INFORMATION ASSURANCE NETWORKS WITH A RICH HERITAGE OF ACHIEVEMENT AND LEVERAGING THE EXPERTISE AND RESOURCES OF
Dr. Emmanuel Hooper, PhD, PhD, PhD Presentation title SUB TITLE HERE National Broadband Plan Public Safety and Homeland Security Workshop
Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Harvard University, Leadership for Networked World Global Information Intelligence: http://globalinfointel.com SUB
MetroNet6 - Homeland Security IPv6 R&D over Wireless
MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force [email protected] Acknowledgement Reference:
Assessment Profile: Establishing Curricular Categories for Homeland Security Education
Assessment Profile: Establishing Curricular Categories for Homeland Security Education During any examination or assessment of the subject, homeland security, it becomes quite evident that by the definition(s)
IM-93-1 ADP System Security Requirements and Review Process - Federal Guidelines
IM-93-1 ADP System Security Requirements and Review Process - Federal Guidelines U.S. Department of Health and Human Services Administration for Children and Families Washington, D.C. 20447 Information
TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE
TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE HOUSE COMMITTEE ON GOVERNMENT REFORM ON THE 9/11 COMMISSION RECOMMENDATIONS ******* August
Cybersecurity Converged Resilience :
Cybersecurity Converged Resilience : The cybersecurity of critical infrastructure 2 AECOM Port Authority of New York and New Jersey (PANYNJ), New York, New York, United States. AECOM, working with the
Business Continuity and. Wireless World. Presented by: Tom Serio Manager BC/DR Verizon Wireless
Disaster Recovery Journal Spring World 2010 Business Continuity and Disaster Recovery in a Wireless World Presented by: Tom Serio Manager BC/DR Verizon Wireless March 23, 2010 Goals Goal of Presentation:
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
LOCAL RADIO STATION MODEL VULNERABILITY ASSESSMENT CHECKLIST. Developed by the Toolkit Working Group for the Media Security and Reliability Council
LOCAL RADIO STATION MODEL VULNERABILITY ASSESSMENT CHECKLIST Developed by the Toolkit Working Group for the Media Security and Reliability Council November 16, 2004 INDEX A. Introduction...1 1. Scope...1
CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense
CONNECT PROTECT Communication, Networking and Security Solutions for Defense Engage Communication provides Defense, Homeland Security and Intelligence Communities with innovative and cost effective solutions
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE
STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE COMMITTEE ON ENERGY AND NATURAL RESOURCES UNITED STATES SENATE
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA
1 Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand
NRSC PANDEMIC CHECKLIST
NRSC PANDEMIC CHECKLIST Version 1 August 31, 2009 Prepared by the Alliance for Telecommunications Industry Solutions (ATIS) Network Reliability Steering Committee (NRSC) ATIS is committed to providing
Cyber Security Risk Management
Our Ref.: B1/15C B9/29C 15 September 2015 The Chief Executive All Authorized Institutions Dear Sir/Madam, Cyber Security Risk Management I am writing to draw your attention to the growing importance of
The Joint Commission Approach to Evaluation of Emergency Management New Standards
The Joint Commission Approach to Evaluation of Emergency Management New Standards (Effective January 1, 2008) EC. 4.11 through EC. 4.18 Revised EC. 4.20 Emergency Management Drill Standard Lewis Soloff
Computer and Network Security in Higher Education
Mark Luker and Rodney Petersen Computer and Network Security in Higher Education Mark Luker and Rodney Petersen, Editors A Publication of EDUCAUSE Copyright 2003 Jossey-Bass Inc. Published by Jossey-Bass,
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
ANNEX B COMMUNICATIONS
ANNEX B COMMUNICATIONS APPROVAL & IMPLEMENTATION Annex B Communications This emergency management plan is hereby approved. This plan is effective immediately and supersedes all previous editions. Jeff
v. 03/03/2015 Page ii
The Trident University International (Trident) catalog consists of two parts: Policy Handbook and Academic Programs, which reflect current academic policies, procedures, program and degree offerings, course
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 In the Matter of Wireline Competition Bureau Short Term Network Change Notification filed by Verizon New York Inc. Wireline Competition
STATE OF MARYLAND Strategy for Homeland Security
STATE OF MARYLAND Strategy for Homeland Security Published June 2004 Governor s Office of Homeland Security Dennis R. Schrader, Director Robert L. Ehrlich, Jr. Governor Michael S. Steele Lt. Governor HOMELAND
THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
Computer Network Engineering
226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering
Satellite REPRINTED FROM. John D. Prentice, Stratos Global Corp., USA, www.oilfieldtechnology.com
Satellite solutions John D. Prentice, Stratos Global Corp., USA, discusses how new satellite solutions impact offshore and land based exploration and production. REPRINTED FROM www.oilfieldtechnology.com
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
MSRC Best Practices. Communications Infrastructure Security, Access & Restoration Working Group
MSRC Best Practices MEDIA SECURITY AND RELIABILITY COUNCIL Adopted Best Practices Recommendations Communications Infrastructure Security, Access & Restoration Working Group National Recommendations Prevention
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Performs the Federal coordination role for supporting the energy requirements associated with National Special Security Events.
ESF Coordinator: Energy Primary Agency: Energy Support Agencies: Agriculture Commerce Defense Homeland Security the Interior Labor State Transportation Environmental Protection Agency Nuclear Regulatory
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
White Paper AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING AND SOLUTIONS FOR IT AND TELECOM DECISION MAKERS. Executive Summary
AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING AND SOLUTIONS FOR IT AND TELECOM DECISION MAKERS Executive Summary Today s businesses rely heavily on voice communication systems and data networks to such
Before the Federal Communications Commission Washington, D.C. 20554 ) ) ) ) ) ) ORDER. Adopted: September 17, 2015 Released: September 17, 2015
Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of STATE OF MICHIGAN Request for Waiver of Section 90.179(a of the Commission s Rules ORDER Adopted: September 17, 2015
Business Continuity White Paper
White Paper January 2011 Introduction In today s demanding business environment, few companies can afford having a key facility or branch location go off-line, or face service interruptions at headquarters.
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
OEMC Four Core Missions
Office of Emergency Management and Communications Earl W. Zuelke,, Jr. Deputy Director Office of Emergency Management Richard M. Daley Mayor James Argiropoulos Acting Executive Director OEMC Four Core
It also provides guidance for rapid alerting and warning to key officials and the general public of a potential or occurring emergency or disaster.
Emergency Support Function #2 Communications ESF Coordinator: Information Technology Department Support Agencies: Tucson Fire Department Parks and Recreation Department Tucson Police Department Tucson
SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning
SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
TELECOMMUNICATION SYSTEM HAZARD MITIGATION STRATEGIC PLANNING
TELECOMMUNICATION SYSTEM HAZARD MITIGATION STRATEGIC PLANNING A.K. Tang 1 1 President, L&T Engineering and Project Management Consultant, Mississauga. Canada Email: [email protected] ABSTRACT: Telecommunication
2. OVERVIEW OF THE PRIVATE INFRASTRUCTURE
A Functional Model for Critical Infrastructure Information Sharing and Analysis Maturing and Expanding Efforts ISAC Council White Paper January 31, 2004 1. PURPOSE/OBJECTIVES This paper is an effort to
FUNCTIONAL AREA 12. Network Administration (NET)
FUNCTIONAL AREA 12 Network Administration (NET) Incumbents in this functional area address interoperability issues related to hardware, software, and connectivity of communications such as cable, fiber
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
Water Infrastructure Interdependencies
Water Infrastructure Interdependencies John Whitler US EPA Office of Water Water Security Division February 12, 2006 November 2005 DRAFT For Official Use Only Do Not Cite, Circulate, or Copy 1 Overview
Module 1: Introduction to Designing Security
Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case
Exam 1 - CSIS 3755 Information Assurance
Name: Exam 1 - CSIS 3755 Information Assurance True/False Indicate whether the statement is true or false. 1. Antiquated or outdated infrastructure can lead to reliable and trustworthy systems. 2. Information
NETWORK SECURITY ASPECTS & VULNERABILITIES
NETWORK SECURITY ASPECTS & VULNERABILITIES Luis Sousa Cardoso FIINA President Brdo pri Kranju, 19. in 20. maj 2003 1 Background Importance of Network Explosive growth of computers and network - To protect
Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec
Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition
Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts
the amount of data will grow. It is projected by the industry that utilities will go from moving and managing 7 terabytes of data to 800 terabytes.
Before the Department of Energy Washington, D.C. 20585 In the Matter of Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities To Inform Federal Smart
Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
Delaware s Transportation Management Program
Delaware s Transportation Management Program Operations Incident and Event Management Homeland Security Delaware Department of Transportation Transportation Management Center DelTrac is the Delaware Department
Public Service Commission CAPITAL CIRCLE OFFICE CENTER? 2540 SHUMARD OAK BOULEVARD TALLAHASSEE, FLORIDA 32399-0850
State of Florida Public Service Commission CAPITAL CIRCLE OFFICE CENTER? 2540 SHUMARD OAK BOULEVARD TALLAHASSEE, FLORIDA 32399-0850 -M-E-M-O-R-A-N-D-U-M- DATE: September 12, 2007 TO: FROM: RE: Lisa Polak
Microwave Photonic Systems Inc. Joshua L. Korson & Richard J. Stewart
Fiber Optic Communications Equipment Provides Backhaul Infrastructure for Critical Satellite Based Continuity of Communications Solutions: IRIDUIM, INMARSAT, GEO SATCOM Microwave Photonic Systems Inc.
Access Mediation: Preserving Network Security and Integrity
Access Mediation: Preserving Network Security and Integrity Definition Access mediation is the process of examining and controlling signaling traffic between networks, resources and users by filtering
JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper
> A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information
Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative [email protected] (302) 831 1580
Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative [email protected] (302) 831 1580 The Cybersecurity Initiative was established at the University of Delaware in 2014 as an integrated learning
Accelerating Complex Event Processing with Memory- Centric DataBase (MCDB)
Accelerating Complex Event Processing with Memory- Centric DataBase (MCDB) A FedCentric Technologies White Paper January 2008 Executive Summary Events happen in real-time; orders are taken, calls are placed,
