Emerging Risks in Network and Information Systems Security



Similar documents
CyberSecurity Research in Crete

10 Quick Tips to Mobile Security

TLP WHITE. Denial of service attacks: what you need to know

Cyber Security: Beginners Guide to Firewalls

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Malware & Botnets. Botnets

Introduction to Computer Security

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

High Speed Internet - User Guide. Welcome to. your world.

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

The Hidden Dangers of Public WiFi

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Network Security and the Small Business

Internet threats: steps to security for your small business

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

GlobalSign Malware Monitoring

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

National Cyber Security Month 2015: Daily Security Awareness Tips

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Loophole+ with Ethical Hacking and Penetration Testing

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Information Security Threat Trends

Introduction: 1. Daily 360 Website Scanning for Malware

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

E-BUSINESS THREATS AND SOLUTIONS

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Computer Security Self-Test: Questions & Scenarios

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

FRAUD ALERT THESE SCAMS CAN COST YOU MONEY

COB 302 Management Information System (Lesson 8)

Cyber Security Management

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

ZNetLive Malware Monitoring

67% 61% STATE OF CLOUD SECURITY BULLETIN. Information Security in the Energy Sector. Summer 2013 FROM APR SEP 2012

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Defending Against Data Beaches: Internal Controls for Cybersecurity

Attacks from the Inside

Managing IT Security with Penetration Testing

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU

Cyber Security Awareness. Internet Safety Intro.

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Emerging Security Technological Threats

2012 NCSA / McAfee Online Safety Survey

Firewall and UTM Solutions Guide

Proofpoint Uncovers Internet of Things (IoT) Cyberattack

Security Threats on National Defense ICT based on IoT

Earth vs. The Giant Spider: Amazingly True Stories of Real Penetration Tests

Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing

(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation

FORBIDDEN - Ethical Hacking Workshop Duration

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Security Fort Mac

Welcome. Thank you for choosing Cogeco High Speed Internet.

I know what is identity theft but how do I know if mine has been stolen?

Stop DDoS Attacks in Minutes

Protecting your business from fraud

SECURING INFORMATION SYSTEMS

3 day Workshop on Cyber Security & Ethical Hacking

PCI Compliance for Healthcare

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

INFORMATION SECURITY FOR YOUR AGENCY

DON T BE FOOLED BY SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam FREE GUIDE. December 2014 Oliver James Enterprise

Social Media and Cyber Safety

Opportunities in Indian IT Security Market

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

N-Dimension Solutions Cyber Security for Utilities

1 Introduction. Agenda Item: Work Item:

3 Marketing Security Risks. How to combat the threats to the security of your Marketing Database

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Promoting Network Security (A Service Provider Perspective)

Transcription:

Emerging Risks Emerging Risks in Network and Information Systems Security Evangelos Markatos FORTH-ICS, Crete, Greece in collaboration with Louis Marinos ENISA

Roadmap Motivation Why is this work important? Which are the drivers of the emerging threats? Technical Dimensions New Applications Market Trends Which are the Risks? Current, Emerging, and Future Scenarios Objectives How do you come up with one? Examples

Roadmap Motivation Why is this work important? Which are the drivers of the emerging threats? Technical Dimensions New Applications Market Trends Which are the Risks? Current, Emerging, and Future Scenarios Objectives How do you come up with one? Examples

Motivation Prepare for the future Anticipate the emerging risks you can prepare better you can inform beneficiaries you may be one step ahead in the security arms race

A strategy for a Secure Information Society one of the cornerstones in developing a culture of security is improving our knowledge of the problem. to facilitate effective responses to existing and emerging threats to electronic networks...

Federal Plan for Cybersecurity We need to Assess security implications of emerging information technologies Develop and apply new metrics to assess cyber security and information assurance They found that: Integration of emerging technologies into the IT infrastructure increases the breadth of and access to vulnerabilities. emerging technologies will present more information than can reasonably be analyzed with existing capabilities. A particularly difficult problem is finding trends and patterns in attacks

So We need to Collect information for Current, Emerging, and Future threats and vulnerabilities in Network and information systems security Current threats: now Emerging threats: next 3 years Future threats: 3 years after that

Roadmap Motivation Why is this work important? Which are the drivers of the emerging threats? Technical Dimensions New Applications Market Trends Which are the Risks? Current, Emerging, and Future Scenarios Objectives How do you come up with one? Examples

What drives emerging threats? Technical Dimensions What will be the technologies of the future? Application Dimensions What will be the applications of the future? Future Market Trends and Dimensions What are the trends in the market?

Drivers: Technical Dimensions Which technical dimensions drive future threats? Wireless Networks Wireless networks could potential be eavesdropped Wireless devices may become more transparent Less visible more integrated with other appliances Proliferation of Broadband Networks i.e. compromised computers have more firepower today. e.g. a 1 Mbps DSL computer can send 10 Gbytes of information per day One million (1,000,000) SPAM email messages 10 million attack packets 10 years ago a computer on a 28.8Kbps modem Had two-three orders of magnitude less firepower

Drivers: Technical Dimensions (II) Which technical dimensions drive future threats? Device miniaturization Devices will not remind of a traditional computer They will be integrated into other devices (doors, kitchens, etc.) They may not run (properly configured) protection software (e.g. Antivirus) Digital identities (e.g. RFID) More products will have a digital ID People will frequently carry (or wear) products with digital IDs Digital ID readers will proliferate (in public buildings, etc.)

Drivers: Applications Smart Mobile Phones Eavesdropping, Loss of privacy, stalking E-banking, e-commerce, e-everything Financial loss, attacks to banking system, attacks to the stock market, etc. Smart Home AmI Lots of wireless potential vulnerable devices Smart Vehicles What if the computer that controls the brakes is compromised?

Drivers: Applications (II) E-health What if the computer which controls a medical device gets compromised? What if our medical record is stored in a compromised computer? E-government More and more of our personal information will be stored on-line Blogs Blogs encourage people, including minors, to publish their information on the web This may be used for stalking today It may be used to invade their privacy, etc.

Drivers: Future Market Trends and Dimensions On-line services will become more common Online services: commerce, entertainment, news, etc. Even a second-life is possible on-line Mobile phone use will prevail People are on the go mobile phones are needed to support our mobile world Much like electricity supports industrialized nations Service-oriented information society European Economy moves away from traditional products and steps into new forms of services The Internet enables these services to be composed to create even fancier ones E.g. find a doctor who has an opening at a date a time compatible with your schedule and your mother s schedule and who is located nearby

Roadmap Motivation Why is this work important? Which are the drivers of the emerging threats? Technical Dimensions New Applications Market Trends Which are the Risks? Current, Emerging, and Future Scenarios Objectives How do you come up with one? Examples

Current Risks SPAM to email addresses, phones, etc. Botnets zombie computers Phishing Using more means (phones, SMS) More targeted ( Hi Pal. We met at the IST conf. Let me tell you about ) Identity theft Login/password Route hijacking Divert/Intercept traffic from the Internet Instant Messaging Chat, etc. SMS, etc.

Current Risks Peer-to-peer systems File sharing systems Download malware Malware on Cell Phones Through SMS, MMS, (free) games Hackers in Stock Market Through compromised bank accounts Software Vulnerabilities Software is getting larger and more complex No protection (e.g. antivirus) in some devices Mobile phones Printers, Refrigerators, kitchens, stoves, etc.

Emerging Risks SCADA Supervisory Control And Data Acquisition Increased home automation A hacker may penetrate the computer which controls the front door Massive collections of personal data Invisible data collection in public places Invisible data collection in private premises Security is more an art rather than a science

Emerging Risks (II) DoS attack to the home telephone Image hackers/spamers calling all the time on the telephone Hacking home heat and/or air-conditioning system Turn on/off the stove while the owner is away Internet users are younger, less experienced, and more prone to targeted attacks Internet users may not have strong motives to clean up their compromised computers Malware over multiple networks (GSM, GPRS, Internet, Bluetooth)

Future Risks Manageability Currently we manage a few digital devices: Computer, PDA, mobile phone, laptop In the future we will have 10 s if not 100 s of such devices most of which will be hidden Over-use of ICT People use ICT even when not needed They send email instead of talking to people They use e-voting systems when traditional raise your hand votes work just fine Such approaches open the road to cyber attackers Use home appliances to attack infrastructures Use thousands of compromised phones to jam the telephone network Use thousands of compromised Airconditioning units to overload the electric power GRID

Roadmap Motivation Why is this work important? Which are the drivers of the emerging threats? Technical Dimensions New Applications Market Trends Which are the Risks? Current, Emerging, and Future Scenarios Objectives How do you come up with one? Examples

Scenarios: Objectives Goals: Present easy to say story Set the stage by an example Explain Who may be the victims? Who may be the attackers? What is the magnitude of the attack? Is there any way we could have prevented it?

Scenarios: How do you come up with one? Think 1. Ask what if questions What if an attacker manages to compromise X? What if an attacker manages to get my login and password for my bank She would be ample to empty my bank account 2. Combine them with real-life events What of an attacker manages to compromise X at a time of Y? What if an attacker manages to get my login and password for my bank at the time of my Christmas bonus? She would be able to get more money

Scenarios: How do you come up with one? II 3. Explore the dimension of scale What if an attacker manages to compromise X? What if an attacker manages to compromise lots of Xes? e.g. what if an attacker manages to compromise 1000 bank accounts? She may be able to steal 1000 times more money She may be able to shutter the credibility of the bank What if an attacker manages to compromise lots of accounts in several different banks She may be able to undermine the credibility of the banking system

Bank Compromization: What if an attacker manages to compromise one bank account? Time: What if the attacker waits before withdrawing the money from the account? Scale: What if the attacker manages to compromise a large number of accounts? Real Life: What if the attacker compromises an account at a time of a stock market crisis? The attacker may be able to compromise more accounts without getting noticed and withdraw a large amount of money The attacker may be able to collect personal information about the owner of the account and use it for blackmail The attacker may be able to escalate the stock market crisis

Scenario I: Stock Market Manipulation Mr Smith subscribes to an stock-market alerting SMS service which informs him of promising stock One day he received an alert for a large rise in OILUC (Oil United Consortium) and he decided to immediately sell some of his OILUC stock through his mobile phone. The day after he realized that there was no rise in the price of OILUC Actually thousands of people sold their OILUC stock at rock bottom price as a result of the fake SMS messages they received

Scenario I: Stock Market Manipulation Dimensions of the problem Phishing: Mr Smith received a fake SMS for an alleged increase in his stock m-banking Mr. Smith was able to sell stock via his mobile phone Mobile way of life People on the go make important financial decisions without having the time to thoroughly double-check them

Scenario II: Bank Crash John Cracker managed to get the personal data (names, phones, and email addresses) of 100.000 customers of the Western European Credit Bank He sent a phishing email to half of them inviting them to check out the alleged new features of the web site of the bank. John managed to collect usernames and passwords for about 500 accounts. Then he launched a double attack: He robbed the accounts He send the telephone numbers of the victims to reporters alerting them of the fact

Scenario II: Bank Crash Most of the victims found themselves learning about the phishing scam live on the evening news. The impact was so huge that all the bank s customers demanded to withdraw their money. To avoid crashing, next day the bank remain closed until people calm down. Then John released the second part of his attack. He sent email to the rest of the bank s customers seemingly on behalf of the Bank president where he: Apologized for the problem Told them that although the bank is closed, the web site of the bank is open and that through it they can transfer their money to an account of their choice

Scenario II Dimensions of the problem: Phishing The customers of the bank were tricked by email messages E-banking People used e-banking to transfer money The media The extend of the problem was aggravated by the media and this eventually resulted in panic Two-phase attack The first phase creates panic through a small number of compromised accounts The second phase harvests more money from people in panic

In closing The dimensions that drive emerging risks are: New technology Wireless networks, residential broadband networks, device miniaturization, etc. New applications Mobile phones, e-banking, e-government, etc. Social Engineering Phishing, etc. We need to Understand the dimensions of the problem Work towards addressing current, emerging and future risks.

Emerging Risks Emerging Risks in Network and Information Systems Security Evangelos Markatos FORTH-ICS, Crete, Greece in collaboration with Louis Marinos ENISA

Back up Slides

PITAC s Report 2005 US Report Findings: Funding for fundamental research in civilian cyber security should also be substantially increased at other agencies, most notably DHS and DARPA. As a result, the PITAC recommends that the Federal government strengthen its cyber security technology transfer partnership with the private sector. Specifically, the Federal government should place greater emphasis on the development of metrics, models, datasets, and testbeds so that new products and best practices can be evaluated;

Things to remember What is the most important thing I would like you to remember Privacy Pervasiveness ICT Integration Social ENGineering PPING

Scenarios (III) Exploit both scale and real-life events What if an attacker manages to compromise one traffic light? She may be able to obstruct traffic in one intersection She may even cause accidents, which will obstruct traffic even further What if an attacker manages to compromise several traffic lights? She may be able to obstruct traffic in a whole city What of an attacker manages to compromise several traffic lights during rush hour? She may create chaos