Cyber Security. From Computer Security to Information Assurance : Evolving Doctrines & Consequences. Peter Sommer



Similar documents
Contingency Planning

Chapter 7 Information System Security and Control

External Supplier Control Requirements

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Nine Steps to Smart Security for Small Businesses

White Paper. Information Security -- Network Assessment

Injazat s Managed Services Portfolio

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Service Children s Education

Your complete guide to Cloud Computing

Brainloop Cloud Security

INFORMATION TECHNOLOGY ENGINEER V

Supplier Security Assessment Questionnaire

ABB s approach concerning IS Security for Automation Systems

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

Internet Safety and Security: Strategies for Building an Internet Safety Wall

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Desktop Solutions SolutioWhitepaper

IIABSC Spring Conference

JOB DESCRIPTION CONTRACTUAL POSITION

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

An Introduction to the Cloud

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

Cloud Computing and Records Management

Information Security Policy

Secure Remote Control Security Features for Enterprise Remote Access and Control

Certified Information Systems Auditor (CISA)

Cyber Security and Critical Information Infrastructure

Managing internet security

VIRGINIA STATE UNIVERSITY RISK ANALYSIS SURVEY INFORMATION TECHNOLOGY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

INFORMATION & COMMUNICATIONS TECHNOLOGY (ICT) PHYSICAL & ENVIRONMENTAL SECURITY POLICY

MAXIMUM PROTECTION, MINIMUM DOWNTIME

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery

Five keys to a more secure data environment

HIPAA Security COMPLIANCE Checklist For Employers

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

CONTENTS. PCI DSS Compliance Guide

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Ensuring security the last barrier to Cloud adoption

Outsourcing With ASPs in the Internet Age

General Computer Controls

How To Protect Decd Information From Harm

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

FDIC Division of Supervision and Consumer Protection

Cyber security Building confidence in your digital future

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

EHRs and Information Availability: Are You At Risk?

Assessing the strength of your security operating model

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

CloudDesk - Security in the Cloud INFORMATION

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

Validating Enterprise Systems: A Practical Guide

4 Ways an Information Security Analyst Improves Business Productivity

Module 1: Facilitated e-learning

IT - General Controls Questionnaire

September 20, 2013 Senior IT Examiner Gene Lilienthal

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Security and Privacy

EDP HOSTING SERVICES Reducing Your Costs & Protecting Your Business

The Protection Mission a constant endeavor

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach.

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

Solving the Desktop Dilemma

EXIN Cloud Computing Foundation

Information security controls. Briefing for clients on Experian information security controls

ITAR Compliance Best Practices Guide

Hosted Desktop Model vs. SBC, VDI and Traditional Desktop Position Document

OCC 98-3 OCC BULLETIN

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

Payment Card Industry Data Security Standard

Cyber Security Where Do I Begin?

E-Business, E-Commerce

THREATS AND VULNERABILITIES FOR C 4 I IN COMMERCIAL TELECOMMUNICATIONS: A PARADIGM FOR MITIGATION

Information Security Team

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

<cloud> Secure Hosting Services

Enterprise Risk Management taking on new dimensions

Internal Audit Progress Report Performance and Overview Committee (19 th August 2015) Cheshire Fire Authority


Managing business risk

Unit 3 Cyber security

INSIDE. Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats

Seamless ICT Infrastructure Security.

MANAGED SERVICES PROVIDER. Dynamic Solutions. Superior Results.

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

ISO Controls and Objectives

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group

Data Centres North Data Centre Security is the tail wagging the dog? May

Local Area Networking

Data Protection in a Virtualized Environment

CYBER SECURITY Audit, Test & Compliance

Transcription:

Cyber Security 11 11 July July 2011 2011 From Computer Security to Information Assurance : Evolving Doctrines & Consequences Peter Sommer London London School School of of Economics Economics

Why a Global Cyber Shock is Unlikely People don t immediately die Physical destruction of assets is rare Essential networks are designed for resilience Essential data is easily backed-up But localised disruption, misery and loss are all too feasible!

What Makes a Global Shock? Ingredients of Triggering Event All the ingredients to cause an event and their likelihood Potential for Overloading Affected System Potential to Cascade into other Systems Tipping Points where there is no quick return to normal life

What Makes a Global Shock? Just because few cyber events aren t global shocks doesn t mean that cyber security isn t critically important to: Individuals Organisations Nation States

Cyber Security: what sort of problem is it? A series of individual technical problems with technical solutions A series of technical and managerial problems with technical and managerial solutions A complex set of problems with many partial solutions but with the aim of achieving information assurance

Offline Input Batch Operations Processing Output Instructions awaiting processing

Batch Operations - Risks Business Interruption Fraud input output manipulative Software/hardware fails bad design and maintenance Physical - mechanics & bombs, fire, flood insiders only

Batch Operations plus remote telecoms third parties may now be able to intrude

Bureau Operations Several organisations share same computer - time-share

Bureau Operations - Risks Business Interruption Fraud input output manipulative Loss of confidentiality Software/hardware fails bad design and maintenance Physical - mechanics & bombs, fire, flood remote access means insiders and outsiders

Interactive Computing Central Unit + Dumb Terminals All processing takes place in mainframe, but each user interacts in realtime

Traditional Computer Security Security by Ring-Fence... Physical Barriers - Computer Room Logical Barriers - Access Control Personnel Peter Sommer Controls 2011

Interactive Computing - Risks Business Interruption Fraud input output manipulative Loss of confidentiality Software/hardware fails bad design and maintenance Physical - mechanics & bombs, fire, flood many more potential criminals

The PC: Desk-top Computing originally: stand-alone alone Computing Power & Data on the Desk Democratising Computing the beginning of the end of DP departmental power

PCs (stand-alone) alone) - Risks Initially: minimal, though corporate data could be accumulated and become a target for industrial espionage When connected (modem or via LAN): much greater opportunities for industrial espionage, unauthorized access, etc Viruses New applications, GUIs and speed of response of PCs all encourage end-users to demand more of big computers and those who run them

PCs (hobbyist) About this time we get a growing number of hobbyist users: Recreational hackers Enthusiastic business folk Bulletin Boards etc: Provide social meeting place Means to distribute cheap software Means to distribute malware

LANs - file-server

LANs - Risks Business Interruption Fraud input output manipulative Industrial Espionage Viruses Physical - mechanics & bombs, fire, flood insiders and outsiders PC OSs have poor security; low cost of LANs tends to mean small budget for security; neither PCs nor servers enjoy strong physical protection; many more people are computer- literate

LANs - Risks LANs-plus plus-servers servers can be used to operate small to medium-sized businesses, as well as departments within large corporations Applications can include: accounts sales marketing R & D, design, presentation etc etc They are thus well worth attacking New applications, GUIs and speed of response of LANconnected PCs all encourage end-users to demand more of big computers and those who run them

Client / Server

Open Systems - Hybrids

Internet Connections... EDI Banking Service / Credit Verification E-mail hub Associate Business Internet!

Internet Connections - Risks Risks depend on how connection is achieved: to stand-alone alone PCs most risks: relatively low viruses via LANs potentially opens LAN to global visitors - TCP/IP is universal, non-proprietary good quality information security management plus good technology is essential

Internet Connections - Risks Business Interruption Fraud input output manipulative Loss of confidentiality Knowledge of security weaknesses is widespread Physical - mechanics & bombs, fire, flood plus Logical: : viruses and external cyber attacks insiders are still a threat but huge numbers of outsiders have potential access - plus use of sophisticated attack tools

Attack methods: Spreading of Knowledge...

The Cloud

Cloud - Risks Business Interruption Fraud input output manipulative Loss of confidentiality Physical - mechanics & bombs, fire, flood plus Logical: : viruses and external cyber attacks DDOS Contractual Failure of connectivity insiders are still a threat but huge numbers of outsiders have potential access - plus use of sophisticated attack tools

A history of how computer systems have been managed > > 1970: Computer company supplies hardware & software 1970: unbundling : one company supplies hardware; others supply software businesses need to develop their own EDP management skills businesses create their own development shops

A history of how computer systems have been managed 1970s: growth of specialist software houses, consultants; EDP 1970s: management of bureau services 1970s: need for telecoms and network suppliers and specialists late 1970s: IT strategists late 1970s: independent purchase of PCs early 1980s: independent use of modems, online services

A history of how computer systems have been managed Mid-1980s: EDP becomes more strategic > > Management Information Services Mid-1980s: attempts to bring PCs into general planning Late 1980s: increased use of consultancies Late 1980s to date : outsourcing > the Cloud

A history of how computer systems have been managed 1990s to date: new computer architectures lead to flatter management structures - what is the role for corporate IT? Late 1980s to date: employees have home computers and laptops - and use them for work 1995 to date: Internet and Intranet development - experimental groups 1995 to date: outsourcing >>> Cloud computing: Service Level Agreements

Multipliers Cheaper Computer Hardware Cheaper Data Storage Faster and Easier Communications More commercial applications More social / cultural applications More industrial and retail use of Just In Time Frequent re-ordering Low local stocks Semi-autonomous systems

Multipliers More Government to Business ICT interaction More Government to Citizen ICT interaction Abandonment of older facilities Local Offices Local Market places etc Older paper-based transactions No easy way back!

Doctrines What sort of problems do we need to address and how do we do so? From the Tech Problem / Tech Solution to Information Assurance

Security Doctrines Batch processing: Problems are very small; mostly of software and hardware failure Doctrine: better testing! Batch processing bureaux: Doctrine: better testing + basic authentication of users

Security Doctrines Real-Time computing Central computing resource + dumb terminals Security by ring-fence Physical Logical Personnel Development of access control security software (tech( problem/tech solution paradigm) EDP Audit to address complexity

EDP Audit Ideas borrowed from traditional audit Standards checklists of features a good system has Confidentiality Integrity Availability Specific requirements of particular system Standards are still with us ISO27000

EDP Audit Standards are still with us ISO27000 Advantages: puts an organisation and its ICT infrastructure through a testing process which may reveal defects Disadvantages: how and from where do you derive the checklist? Is it complete and up-to to-date? What are the costs? May compliance lead to self-deceit that all is well?

Tech Problem / Tech Solution we have a problem of unauthorised access we need better access control Bell LaPadula models we have buggy software we need better software testing Mathematical proofs Automated testing schemes we are attacked by viruses we need anti-virus software we are worried about intruders we need firewalls, and intrusion detection systems

The changing security paradigm Physical Barriers - Computer Room Logical Barriers - Access Control Personnel Peter Sommer Controls 2011

De-perimeterisation We can no longer simply guard the perimeter of a computer system because it no longer exists

Cloud Computing Data available everywhere Users only pay for what they need (back to bureaux and out-sourcing) But requires: High levels of security of information (encryption) High levels of access control / authentication

The changing security doctrine the simple technical problems / technical solutions approach is dead security can t be addressed by formula or simplistic certification centralised control of corporate security functions is no longer feasible

New doctrines Information Systems The study of the impact of computer and telecommunications technologies on Individuals Businesses and Organisations Management Government Society as a whole Using the Social Sciences Sociology Anthropology Economics Management Science

New doctrines Information Security Management Need to add other types of discipline beyond the tech problem/tech solution paradigm The Social Sciences Organisation Analysis Management Criminology Anthropology Economics Notions of Risk Management Insurance disciplines

New doctrines Information Assurance Security can t be perfected, but can be managed The purpose now is to have sufficient confidence that a computer mediated process can be trusted Human and organisational aspects have to be understood and engineered for Re-examination examination of notions of trust and risk management as well as the techie and standards approaches Role of law as an enforcer and stimulant to better security

Information Assurance Practicalities Tech measures still important Access Control / Identity Management Malware Detection Firewalls Intrusion Detection Fraud / Anomaly Detection Crypto for Confidentiality and Authentication

Information Assurance Practicalities Management Approaches System Specification Threat / Risk Analysis System roll-out out User training Sensitive HR, including vetting, employee monitoring User interface to tech facilities Penetration testing

Information Assurance Practicalities Management Approaches Contingency / Recovery Plans, because: Tech methods will sometimes fail Zero-day threats Modern systems are too complex to fully identify and analyse the risks Systems, interconnections and hidden dependencies Rate of change means systems are never static and neither are the threats

Shape of Disaster Transactions\Revenue\Profits Inception Risk Spread Risk Recovery factors Time

Shape of Disaster Profits Time Contribution of Contingency Plan..

Recovery Factors You can t bring back a 100% service immediately so what should you prioritise? What is already available that can be deployed? Back-up data What do you need to acquire / prepare for? Management structure A Plan Recovery Sites Third Party facilities Load-balancing

56

National Security Dimension Two dominating features of national cyber security: 80-85% 85% of CNI is in private, not government control Attribution of hostile attacks

National Security Dimension Attribution of hostile attacks If you can t establish, at battle speed, the source of an attack, you can t retaliate Defence based on deterrence no longer works

National Security Dimension 80-85% 85% of CNI is in private, not government control Private companies have responsibilities to produce profit for share-holders, holders, not a greater public good Information Assurance is best applied initially at the local level By people who understand the local environment

National Security Dimension Public/Private Partnerships won t work without an economic incentive, or licensing / regulation neither is politically easy Can a government run a complex CNI business?

National Security Dimension Role of military limited to protecting their own systems Many future armed conflicts will use cyber weaponry alongside conventional kinetic weapons Protection Attack But the military can t run complex CNI businesses

National Security Dimension National cyber shields are very difficult to design and manage How, in practical terms, do you identify the CNI networks and systems? What happens to international businesses, or businesses with key international links/partners? Will the national cyber shield block important traffic? Is running a cyber shield compatible with the role of an intelligence agency?

Information Assurance Managing Risks relating to the use, processing, storage, transmission of information. includes: Planning, Design Risk Assessment Prevention Detection Reaction Recovery, Loss Mitigation

Information Assurance Protection short of Perfection Technical and Managerial techniques work hand-in in-hand Ability to recover in addition to ability to prevent Measures best applied locally.

Costs and Information Assurance Over time, hardware as a percentage of total spend has fallen dramatically. Commoditised general software is also incredibly cheap. The main costs now are in now customising these to specific individual needs. Reliable systemic security may soon be the biggest cost centre of all

Information Assurance Do we need to slow down the rate of change we accept? Just because a new technology or service becomes available, do we immediately have to adopt it?

Cyber Security 11 11 July July 2011 2011 From Computer Security to Information Assurance : Evolving Doctrines & Consequences Peter Sommer London London School School of of Economics Economics p.m.sommer@lse.ac.uk peter@pmsommer.com pmsommer.com