Incident Management ITU Pillars & Qatar Case Study Michael Lewis, Deputy Director



Similar documents
Qatar Computer Emergency Team

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA

ITU Cybersecurity Work Programme to Assist Developing Countries

Cybersecurity for ALL

Regional Seminar on Cyber Preparedness ITU s work in Cybersecurity and Global Cybersecurity Index (GCI)

CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency

Romanian National Computer Security Incident Response Team CERT-RO.

INTERNATIONAL TELECOMMUNICATION UNION

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

What legal aspects are needed to address specific ICT related issues?

Cybersecurity and Incident Response Initiatives: Brazil and Americas

Executive Director Centre for Cyber Victim Counselling /

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Building National and Regional Cybersecurity Competences through the UbuntuNet Alliance NRENS

TOPICS TO BE COVERED: First Workshop for Computer Security Incident Management Experts

DNS Security Survey for National Computer Security Incident Response Teams December 2010

Department of Homeland Security Federal Government Offerings, Products, and Services

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s

NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka

New challenges in Data privacy.

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

U. S. Attorney Office Northern District of Texas March 2013

A BRAINSTORMING ON SECURITY FIRE DRILLS

Department of Management Services. Request for Information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED March 2015

VRDA Vulnerability Response Decision Assistance

Overview of ITU Cybersecurity Activities

Cyber Security a Global Challenge; What and how Thailand is doing

Cyber security Country Experience: Establishment of Information Security Projects.

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

ITU National Cybersecurity/CIIP Self-Assessment Tool

DANCERT RFC2350 Description Date: Dissemination Level:

Microsoft s cybersecurity commitment

Creating and Managing Computer Security Incident Response Teams (CSIRTs)

Middle East I.T. Security Business Survey

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

Incident Response & Handling

ICS-CERT Year in Review. Industrial Control Systems Cyber Emergency Response Team. National Cybersecurity and Communications Integration Center

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

(BDT) BDT/POL/CYB/Circular

Lith Networking and Network Marketing Safety

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Actions and Recommendations (A/R) Summary

FS-ISAC CHARLES BRETZ

Internet Governance Forum Hyderabad, India Dimensions of cyber-security and cyber-crime 4 December 2008

Promoting a cyber security culture and demand compliance with minimum security standards;

Network Marketing Strategy - Overview of the Colorado Cyber Security Program

Coordinating Attack Response at Internet Scale (CARIS)

Middle East. Bahrain Kuwait Oman Qatar Saudi Arabia United Arab Emirates

Microsoft Security Response Center (MSRC) Microsoft Malware Protection Center (MMPC)

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

Capacity Building to Strengthen Cybersecurity: Thailand Update

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

Current Threat Scenario and Recent Attack Trends

Cyber Security: Policy of the Internet Infrastructure

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

SECURING PAYMENTS IN THE CYBER WORLD

ICS-CERT Incident Response Summary Report

Cyber ITU. By Tomas Lamanauskas, ITU

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Cyber Security ( Lao PDR )

Cyber-Security: Private-Sector Efforts Addressing Cyber Threats

Building CSIRT Capabilities

Glasnost or Tyranny? You Can Have Secure and Open Networks!

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY

Cybersecurity Risk Management in the Telecom Sector. MUSTAPHA HUNEYD Corporate Information Security

White Paper on Financial Industry Regulatory Climate

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

ICBA Summary of FFIEC Cybersecurity Assessment Tool

CYBERSECURITY INDEX OF INDICES

Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity

Bradford J. Willke, CISSP

CERT/CC Overview & CSIRT Development Team Activities

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)

The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness

SECURITY ADVISORY FROM PATTON ELECTRONICS

FFIEC Cybersecurity Assessment Tool

Logging In: Auditing Cybersecurity in an Unsecure World

CERT's role in national Cyber Security: policy suggestions

US-CERT Overview & Cyber Threats

4/21/2015. Jim Reavis CEO, Cloud Security Alliance. Cloud Security Alliance, Agenda

ITU-IMPACT Training and Skills Development Course Catalogue

Best Practices for National Cyber Security: Building a National Computer Security Incident Management Capability, Version 2.0

The Comprehensive National Cybersecurity Initiative

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

Managing Denial of Service (DoS) Attacks

National Cybersecurity & Communications Integration Center (NCCIC)

Korea s experience of massive DDoS attacks from Botnet

How To Understand And Understand The European Priorities In Information Security

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

CYBER SECURITY INFORMATION SHARING & COLLABORATION

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Transcription:

Incident Management ITU Pillars & Qatar Case Study Michael Lewis, Deputy Director

2 Thanks To the ITU for sponsoring the initiative ictqatar has worked closely with the ITU-D since the project s inception, from the WTDC 06 Doha conference to the regional meeting in February To the BCDE of Australia for hosting the event And to my Aussie friends for the cultural tutorial! G day!

3 Users on Internet Computers Devices Vulnerabilities Exploits Financial Incentives Criminal Activity General Trends

4 The Economic Issues of CyberCrime Barriers to entry are low resources are essentially free (!) technical requirements are modest Risks for criminals are low, Rewards high! Returns are tantalizingly large Opportunities grow with continued E-volution of services Difficult to trace and attribute Investigation costly in time, resources, money CRIKEY! Cybercrime is a growth industry!

5 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best practices of the community Developing a National Cybersecurity Strategy Establishing National Government-Industry Collaboration Creating National Incident Management Capability Deterring Cybercrime Promoting a National Culture of Cybersecurity

6 The Approach in Qatar Q-CERT was established in December 2005 as the National CERT for the State of Qatar. A project of the Supreme Council for Information and Communications Technology ictqatar In partnership with the CERT Coordination Center of Carnegie Mellon University A member of regional & international communities of information security teams (GCC, AL, FIRST) The program is organized into three major groups

7 Outreach, Awareness, & Training Conduct Information Security training Formalize incident response through building organizational CSIRTs Host workshops & conferences Organize public awareness campaigns Cooperate with schools & universities Provide forums for discussion and training

8 Critical Infrastructure Protection Lead the National Information Assurance Framework project (in alignment with ITU Framework initiative) Shape national info-sec mandates and policies on the use of protocols & international standards Work with Critical Sector Organizations to improve their security postures banking & finance, oil & gas, government, ict, etc. Foster creation of sector working groups

9 Incident Management Distribute Alerts Collect Reports Coordinate Incidents Conduct Incident Analysis Provide Cyber Forensics Training & Resources HoneyNet, Malware, & Botnet Eradication and the Cyber Security Network

10 Front-Line Incident Response Who do they call? end-user first responder Help Desk IT Department Network Ops Push Alerts, Updates, Patches Receive Reports Respond to Incidents! Observe Escalation Procedures Report as needed to national center An organizational CSIRT to formalize internal incident response

11 National CSIRT Bank CSIRT Ministry CSIRT Oil co. CSIRT Organizational CSIRT Organizational CSIRT Identify Points-of-Contact Exchange Encryption Keys Establish NDAs & MoUs National Coordination Center Government CSIRT ISP CSIRT Sector-specific CSIRT Scope-of-Service Incident Coordination & Reporting Incident Analysis & Forensics Outreach, Awareness, & Training Critical Infrastructure Protection The National Cyber-Security Network

12 Regional Cooperation Kuwait Bahrain Oman Saudi Arabia The GCC-CERT UAE Establish PoCs Exchange Keys Data Exchange Agreements Conduct Technical Meetings Qatar

13 GCC-CERT Milestones April 2006 May 17 June 12-13 July 18-19 Nov - Dec 2007 May 2008 Concept Paper on regional GCC-CERT GCC calls for creation of national CERTs & authorizes the GCC-CERT QATAR convenes a workshop on Building National CERT programs QATAR hosts a second regional workshop Country visits & National CERT workshops Legal considerations & working meetings Formally constituted as a GCC committee

14 External Relations National Coordination Center Government CSIRT Education CSIRT Sector-specific CSIRT Regional Organizations MENOG GCC-CERT International Organizations FIRST ITU Other National CSIRTs CERT/CC ++

15 The Full Picture end users organizational CSIRTs The CSN National CSIRT external organizations GCC-CERT At each level, organizations have relations with external partners and professional societies

16 Incident Management An example for our constituents a genericized DDOS attack events over 48 hours Day 1 Day 2 Day 3 11:00 22:00 01:00 11:00 14:00 17:00 10:00 DDoS Start OrgCalls National team Change IP ISP Filter TCP Dump Data Collection Discover attack is actively monitored Start TCP dump data analysis Apply Filtering Rules ISP Data Collection and analysis

17 Impact of Mitigation Strategies Volume Sample attack traffic, over time Packets/sec Goals: Early detection Reduced impact Compressed timeline Test escalation time 11:00 22:00 DDoS Start Org Calls National Team 01:00 Change IP ISP Filter 11:00 TCP Dump Data Collection Discover attack Is actively monitored 14:00 Start TCP dump data analysis 17:00 Apply Filtering Rules 10:00 ISP Data Collection and analysis

NYA1 18 Aftermath Questions What can be done to improve detection and response? When did the attack actually start? When did it stop? Was there a discernible pattern that might help future early detection strategies? Review the impact of mitigation strategies what worked? What didn t? Review the sequence of deploying the mitigation strategies was order important? Was the proper escalation procedure observed? Were the right partners involved?

Slide 18 NYA1 Under Revision Nora Yousef al-abdulla; 08.06.2008

19 General Questions Are there default strategies that can be designed in advance and rapidly deployed for different types of incidents? If so, what is the threshold/trigger for their activation? What are the respective responsibilities of targeted site/isp/csirt? Are there liability issues involved, regarding intervention and advice?

20 Building a Culture of Cybersecurity Identify constituents & counterparts national, regional, international Establish trusted relations and secure communications Conduct regular, targeted events to share experience and build human networks Recent events from Q-CERT

21 June 10-11 Q-CERT continued its support of the emerging Info- Sec community of Doha by participating in the Doha Information Security Conference (DISC), organized by the WTC of Qatar.

22 June 12 Q-CERT presented a workshop at Qtel, the primary ISP of Qatar, to further ongoing technical cooperation. Q-CERT as the National CSIRT Trends Briefing Botnet Overview Botnet Technical Assessment Botnet Eradication Project Incident Analysis & Cyber Forensics

23 June 15 Q-CERT hosted a meeting of the regional GCC-CERT, which formally convened as a committee of the GCC Ministry of Post, Communication, and IT

24 June 18 Q-CERT and Microsoft co-hosted a signing ceremony at the Doha Sheraton to formally establish Q-CERT as a member of the Microsoft Security Program.

25 June 19 Q-CERT hosted a meeting of the Qatar Information Security Forum (QISF) on the topic of CyberCrime Legislation.

26 June 22-27 Q-CERT served as a gold sponsor for the FIRST annual membership meeting in Vancouver

27 June 24-29 Q-CERT conducted a four-day workshop Information Security for Technical Staff targeting critical-sector organizations.

28 June 30 July 3 Q-CERT senior technical staff spent a week at the CERT/CC for training in the administration and use of the CCAP forensics analysis system.

29 July 1 Q-CERT organized and presented a workshop on National CSIRTs and Regional Cooperation for the Arab League in Cairo.

www.qcert.org Thank You www.qcert.org