CERT-FI First 12 months. Kauto Huopio FICORA



Similar documents
FICORA s strategy 2020

Denial of Service (DoS) Technical Primer

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

INTRODUCTION TO FIREWALL SECURITY

PATCH MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

Cyber Security and Critical Information Infrastructure

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee , Geneva

About Botnet, and the influence that Botnet gives to broadband ISP

Society, Law Enforcement and the Internet

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

Security and Risk Analysis of VoIP Networks

Emerging Security Technological Threats

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Basics of Internet Security

INFORMATION SECURITY REVIEW

Information Security Basic Concepts

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Network Security Policy: Best Practices White Paper

MANAGED SECURITY SERVICES

How To Protect Your Network From Attack From A Hacker On A University Server

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Network Service, Systems and Data Communications Monitoring Policy

Acceptable Usage Policy

Lith Networking and Network Marketing Safety

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

Network Security in Vietnam and VNCERT. Network Security in Vietnam and VNCERT

IPv6 deployment experiences from DNA Finland. Oskari Rasi

Strategies to Protect Against Distributed Denial of Service (DD

Second-generation (GenII) honeypots

Networking for Caribbean Development

E-Business, E-Commerce

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Promoting Network Security (A Service Provider Perspective)

VoIP Security, an overview of the Threat Landscape

Detecting peer-to-peer botnets

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Complete Protection against Evolving DDoS Threats

(BDT) BDT/POL/CYB/Circular

WLAN Information Security Best Practice Document

Fraud and Abuse Policy

Estonia 2007 Cyberattakcs

: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

6. Exercise: Writing Security Advisories

Security Toolsets for ISP Defense

Intrusion Forecasting Framework for Early Warning System against Cyber Attack

INTRUSION DETECTION SYSTEMS and Network Security

How To Protect A Network From Attack From A Hacker (Hbss)

SecurityDAM On-demand, Cloud-based DDoS Mitigation

INSTANT MESSAGING SECURITY

Top tips for improved network security

Best Practices for Outdoor Wireless Security

FRANKFORT PLANT BOARD CABLE MODEM INTERNET BROADBAND INTERNET SERVICE DISCLOSURES

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency

A Decision Maker s Guide to Securing an IT Infrastructure

Modular Network Security. Tyler Carter, McAfee Network Security

Service Description DDoS Mitigation Service

2010 Carnegie Mellon University. Malware and Malicious Traffic

Traffic Monitoring : Experience

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

What legal aspects are needed to address specific ICT related issues?

2012 Infrastructure Security Report. 8th Annual Edition Kleber Carriello Consulting Engineer

Legislative Council Panel on Information Technology and Broadcasting. Hacking and Virus Activities and Preventive Measures

WORMS HALMSTAD UNIVERSITY. Network Security. Network Design and Computer Management. Project Title:

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

Cybersecurity and Incident Response Initiatives: Brazil and Americas

Thales Service Definition for PSN Secure Gateway Service for Cloud Services

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

DDoS Attack and Its Defense

INFORMATION TECHNOLOGY ENGINEER V

Network monitoring and analysis tools:

Fundamentals of Network Security - Theory and Practice-

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

How To Ensure The C.E.A.S.A

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Network Security Administrator

Cyber Security ( Lao PDR )

Transcription:

CERT-FI First 12 months Kauto Huopio FICORA

FICORA Finnish Communications Regulatory Authority communications regulator operating under the Ministry of Transport and Communications total staff ~230 persons academic background ~100 budgetary independence all funding from fees collected from user organisations

FICORA operating areas Telecommunications telecommunications regulation inspection of operators telecommunications standardisation information security Radiocommunications radiocommunicatons regulation frequency management & surveillance equipment market control

FICORA operating areas cont. Electronic media monitoring on TV advertising Television fees collection of television fees Postal operations regulator

Information security FICORA s telecommunications regulator traditional area : security issues regarding telecommunications networks and operators Present goverment program: How to administratively organise security management issues regarding telecommunications networks (..including data networks & Internet) secure telecommunications seen as key issue TIHA project result: COMSEC -> FICORA QCB -> commercial vendors CERT -> FICORA Information security unit formed 1.7.2001

Information security unit: Key operating areas Telecommunications security (COMSEC) Privacy in telecommunications Electronic signatures / PKI E-commerce Observation and assistance of/to security incidents CERT-functionality

Unit personnel Head of unit Timo Lehtimäki Unit Secretary Aija Lindholm CERT-FI Information Security Law COMSEC Kauto Huopio Information Security Analyst CERT-FI Coordinator Jani Arnell Information Security Analyst Eeva Lantto Lawyer Sami Kilkkilä Information Security Analyst Johanna Kinnari Information Security Analyst Arsi Heinonen Information Security Analyst Kirsi Sunila-Putilin Lawyer

CERT FI main tasks to observe and collect information on threats concerning telecommunications infrastructure prevent harmful effects caused by telecommunications security issues inform public on observed vulnerabilities and security issues give public advice on security incident response follow up international development in the area

Target group Finland Telecommunications service providers traditional telcos data operators, ISP:s value added service providers Public and private sector Individual citizens

CERT-FI timeline planning started 1.7.2001 present personnel recruited 4Q/2001, 4Q/2002 open for business 2.1.2002 first major incident OpenSSH outbreak Jan/Feb 2002 TERENA TI Level 2 application 1Q/2003 FIRST membership application 1Q/2003

CERT-legislation Modifications to the Act on Telecommunications Security (1.9.2002) CERT function is given officially to FICORA telecommunications operators (including data carriers & ISP:s) are required to report significiant security events and network problems to FICORA operators are required to pay an administration fee to FICORA

Significiant event? basic ideology: events that one should follow anyhow concentrated portscanning significiant traffic anomalies break-in attempts attacks that have an effect to usability (naturally) successiful breakins failures on basic services (SMTP,DNS, DHCP) important routing mishaps detected software vulnerabilities social engineering attempts

Partners - Finland Customers/other CERT:s participate in CERT working group meets 4-5 times / year Other CERT groups inside Finland FUNET CERT (academic research network) operator CSIRT/abuse teams (Sonera, Finnet Group etc) major IT outsourcing houses (TietoEnator, Novo etc) Police various units Central Criminal Police (KRP) Computer Crime Unit Security Police (SUPO) Finnish Defence Forces

CERT-FI in figures - year 2002 Recorded contacts: 285 of which incidents 138 incident=event or related series of events affecting communications security

CERT-FI: warnings 93 compared to CERT/CC ~25 European/Finnish software enviroment no AOL Instant Messenger issues.. slightly more relaxed warning release rules vs. CERT/CC if public information, exploit exists and/or sensible resolution possibilities -> release trying to limit the Microsoft warning flood subscribers to CERT-FI-ALERT mailing list: ~800

Training & education WWW-site with general information on security issues general whitepaper type documents on personal firewalls security issues with P2P networks security issues with IRC / instant messaging software WLAN security popular lectures / presentations in conferences

CERT-FI: vulnerability coordination no real cases leading to significiant vulnerability coordination activities..yet 8 cases raported directly to CERT-FI (cc:) policy on vulnerability information handling available (finnish) being a government organisation causes additional legal considerations

Situational awarness all the traditional securityfocus mailing lists plus.. cisco-nsp, juniper-nsp, full-disclosure, nsp-sec NANOG, operator forums virus bulletins local finnish lists & newsgroups N websites, traffic monitors all important finnish operators under speed dial getting distilled information is not enough, must read the anyway

CERT-FI as part of incident response process key questions: WHAT, HOW, TO WHERE not so important: WHO Attacked enviroment in safe mode and prevention of further damage Can sanitize information Good experiences Protection of evidence Guidance to police contacts

Incident highlights 2002 OpenSSH breakin series Jan/Feb 2002 Slapper/Scalper OpenSSL/Apache issue Many worm-related issues (getting distribution sites of exploit code used by the worm shut down these not in Finland Assistance in the Sonera CDR case

A word on DDoS wasted bandwidth = money on IP capacity internal tracking / limitation resources vary from operator to operator..not to mention inter-operator tools/processes It is not just IRC servers but mail servers core routers Top attacks we ve observed are in the 1 Gbit/s range this is costing operators money tools, resources, methods to combat DDoS available!

Current/future concerns really nasty worms/viruses WLAN security wardriving, warchalking, warspamming, war-whatever Attacks towards network infrastructure (routers, other active network elements) first are out there groups trying to specialise themselves on transforming Cisco boxes to DDoS generators Juniper BSD-enviroment Attacks towards M2M (machine-2-machine) communications equipment with added IP connectivity

CERT-FI in 2003 personnell 3 -> 4 operational support systems development incident handling system IDS / attack data integration project CERT test enviroment monitoring of internet baseline noise what is arriving into a empty IP connection vulnerability evaluation platfoms (all major OS:s)

Contact details Telecommunicatons network sector director Mr. Tapani Rantanen Head of Information Security Unit Mr. Timo Lehtimäki Information Security Analyst / CERT-FI coordinator Mr. Kauto Huopio tel. +358-9-6966772 mobile +358-50-5826131

Contact information Viestintävirasto / CERT-FI http://www.cert.fi cert@ficora.fi duty desk +358-9-6966510 (office hours) fax +358-9-6966515 PGP-fingerprint: 03B1 F7F0 6892 F27F 15D1 A98F D351 7DA8 3CDA 0200