How To Understand Cyber Security



Similar documents
Directives and Legislation

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

Data Security Incident Response Plan. [Insert Organization Name]

Defensible Strategy To. Cyber Incident Response

PUBLIC SAFETY CYBER SECURITY

CYBER INFORMATION SECURITY AWARENESS AND PROTECTION PRACTICES. Strengthening Your Community at the Organizational Level

The Impact of Cybercrime on Business

Cyber Security and your Financial Institution: Are you ready for the increased scrutiny related to cyber risks?

Internet threats: steps to security for your small business

Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age

Utica College. Information Security Plan

Attachment A. Identification of Risks/Cybersecurity Governance

INFORMATION SECURITY CYBER LIABILITY RISK MANAGEMENT. October Sponsored by:

Establishing a State Cyber Crimes Unit White Paper

OCIE CYBERSECURITY INITIATIVE

External Supplier Control Requirements

Aftermath of a Data Breach Study

AUDIT TAX SYSTEMS ADVISORY

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S.

How To Audit The Mint'S Information Technology

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

Cyber Risks in the Boardroom

Into the cybersecurity breach

Management Standards for Information Security Measures for the Central Government Computer Systems

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

AN INFORMATION GOVERNANCE BEST

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution

Privilege Gone Wild: The State of Privileged Account Management in 2015

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

The Importance of Cyber Threat Intelligence to a Strong Security Posture

State of the Applications : Only 11% of Information Security Managers Feel Their Applications are Secure. 1/11

Incident Response. Proactive Incident Management. Sean Curran Director

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution

Cybersecurity. Are you prepared?

Cyber Risk in Healthcare AOHC, 3 June 2015

EXECUTIVE GUIDE FOR LAW ENFORCEMENT 2014 CYBER THREATS

U. S. Attorney Office Northern District of Texas March 2013

AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN Siskiyou Boulevard Ashland OR 97520

THE RISK OF SOCIAL ENGINEERING ON INFORMATION SECURITY:

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES. second edition

Network Security Policy

California State University, Chico. Information Security Incident Management Plan

Cybersecurity: What CFO s Need to Know

PCI Compliance for Healthcare

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

(U) Law Enforcement at Risk for Harassment and Identity Theft through Doxing

Harvard University Payment Card Industry (PCI) Compliance Business Process Documentation

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

Cyber and Data Security. Proposal form

Executive Overview...4. Importance to Citizens, Businesses and Government...5. Emergency Management and Preparedness...6

CYBERSECURITY HOT TOPICS

Application Intrusion Detection

UBC Incident Response Plan

Mitigating and managing cyber risk: ten issues to consider

Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014

How To Perform An External Security Vulnerability Assessment Of An External Computer System

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Study of the Impact of cyber crime on businesses In canada

TOLL FRAUD POLICIES AND PREVENTION

Bradley University Credit Card Security Incident Response Team (Response Team)

The SQL Injection Threat & Recent Retail Breaches

Incident Response Guidance for Unclassified Information Systems

Information Technology

I N T E L L I G E N C E A S S E S S M E N T

Security Awareness Training Policy

PRIVACY BREACH POLICY

Administrative Procedures Memorandum A1452

DATA BREACH COVERAGE

Working with the FBI

Information Security for the Rest of Us

SCAC Annual Conference. Cybersecurity Demystified

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Information Incident Management Policy

Impact of Data Breaches

A REPORT BY HARVARD BUSINESS REVIEW ANALYTIC SERVICES Meeting the Cyber Risk Challenge. Sponsored by

1. Ask what your financial institution knows or has personally experienced with regard to internal and external data breaches.

PCI DSS Overview and Solutions. Anwar McEntee

Digital Barracuda Information Security Reports that the Risk from Viruses and Worms is Only the Tip of the Iceberg FACT SHEET

Emergency Response Plans. More than a phone tree Less than an encyclopedia Doing it just right

Responsible Access and Use of Information Technology Resources and Services Policy

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Security Incident Management Policy

STATEMENT OF WORK (SOW) for CYBER VULNERABILITY ASSESSMENT

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

The Human Factor in Data Protection

Information Security Incident Management Guidelines

Exposing the Cybersecurity Cracks: A Global Perspective

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Cybersecurity for Meaningful Use FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013

Fraud and Abuse Policy

NATIONAL POLICING CYBERCRIME SUMMIT. October 19 & 20, 2015 Toronto

IT Security Incident Management Policies and Practices

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

ESKISP Conduct security testing, under supervision

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

Transcription:

Law Enforcement Perceptions of Cyber Security International Association of Chiefs of Police Canadian Association of Chiefs of Police May 2013 This study made possible through financial and program support of IACP, CACP, and Digital Boundary Group, Inc. Committee Members Director Terry Sult, Sandy Springs (Chair) Dave Roberts, IACP Jim Emerson, Chair, CCDE D/Chief, Bill Moore, Halifax D/Chief Steve Beckett, Waterloo Regional Christopher Pouge, Trustwave Eldon Amoroso, CACP 2 Technical Track 1

Other Project Aspects Financial Support: IACP CACP Digital Boundary Group Other Participants Academica Group - Survey Instrument, Analysis 3 Methodology The survey was administered online by the IACP, and was directed by a committee of the IACP, CACP, police executives and private sector IACP members. Professional survey company consulted for reliability, credibility Due to a suspected low response rate, all known contacts of the IACP and CACP rather than a random sample, were solicited. In order to represent the population of chiefs of police (4,800), a sample size of 400 was sought (456 responses were collected). The survey was in-field from April 4 th to April 29 th 4 Technical Track 2

Survey Caveats Bias always present to some degree Those who are interested will respond Chiefs may have different views of importance of IT Governance of IT could impact results (police, city, outsource) Survey does not deal with internal threats related but different All that being said, results are interesting, important and good first step! 5 Executive Summary This study made possible through financial and program support of IACP, CACP, and Digital Boundary Group, Inc. Technical Track 3

Executive Summary Most respondents believed cyber attack was a threat, and potential impacts quite serious Yet only 1/2 could say that current policies, practices and technologies sufficient to minimize risk Only 1/3 could say that their agency s cyber security had ever been audited Positive correlation between having been attacked and having had cyber security audit performed Among respondents who felt cyber security audits important, 50% could say with certainty they had NEVER been audited 7 Executive Summary Perceived threat of a cyber attack much higher among those who had experienced a cyber attack Percentage who responded unknown on a number of questions was relatively high Data seems to show that cyber attacks are seen as a real threat with consequences yet many doing relatively little to mitigate risk (particularly the case among smaller organizations) In certain sectors of respondents, up to 29% had been attacked. Of these attacks, 25% had been successful to some degree 8 Technical Track 4

Respondent Profile This study made possible through financial and program support of IACP, CACP, and Digital Boundary Group, Inc. Agency Jurisdiction Q. Please indicate the jurisdiction of your agency. 10 Technical Track 5

Number of Full-time Sworn Officers by Agency Jurisdiction Total US: Municipal Police Dept. Agency Jurisdiction US: Sheriff or County Dept. US: State Police Agency Other: US or Canada n=456 n=385 n=26 n=21 n=24 Mean 201 70 567 1769 537 Median 31 26 136 1100 23 Minimum 0 1 4 122 0 Maximum 6000 1400 3400 6000 5000 Q. How many full time sworn officers did your agency employ on December 31, 2012? 11 Provision of IT Maintenance Agency Size Less than 50 employees 50+ Employees n=254 n=200 My agency 28% 35% Central IT Services 20% 30% Combination of internal and central 17% 29% Outside Contractor 32% 4% Other 3% 3% Q. Who maintains your agency's information technology and information systems? 12 Technical Track 6

Findings This study made possible through financial and program support of IACP, CACP, and Digital Boundary Group, Inc. 3.1 Cyber Attack Experiences This study made possible through financial and program support of IACP, CACP, and Digital Boundary Group, Inc. Technical Track 7

Prevalence of Cyber Attacks 11% of respondents reported that their agency had been the target of a cyber attack in the past 12 months. This figure was lowest among U.S. Municipal agencies, and agencies with less than 50 employees. Overall, approximately two fifths of respondents did not know whether their agency had been the target of an attack. Results did not vary by type of IT provider. Agency Jurisdiction Agency Size Q. Has your agency been the target of a cyber attack in the past 12 months (regardless whether the attack was successful)? 15 Nature of the Cyber Attack Respondents who reported a cyber attack, n=51 Denial of service is the most common description for the nature of the attack (37%), followed by accessing or collecting confidential information other than information regarding investigations or officers/staff. Other Responses Routine attempts to access secured networks Probing for access to systems Twitter feed hacked Network virus vulnerabilities Attempts to breach firewalls Theft of bandwidth services Unknown Q. What was the nature of the attack (regardless of whether it was successful)? Please check all that apply. 16 Technical Track 8

Target of the Cyber Attack Respondents who reported a cyber attack, n=51 Nearly half of respondents reported that their agency website was the target of the cyber attack. The records management system was the next most likely target, though only 12% indicated that this was the target of the cyber attack. Other Responses Email system City s network Network access Police Dispatch Lines Unknown Q. What specific resources were the target of the attack (regardless of whether it was successful)? Please check all that apply. 17 Agency Response Respondents who reported a cyber attack, n=51 Notification of the IT provider, and monitoring the attack are the most common agency responses to a cyber attack. One in three respondents report systems being taken offline, and a similar proportion reported having passwords and security levels changed. Other Responses Attempts were successfully stopped by firewall Notified FBI Made reports to APCO, NENA, Homeland Security and FBI Q. How did your agency respond? Please check all that apply. 18 Technical Track 9

Source of the Attack Respondents who reported a cyber attack, n=51 Little seems to be known about the source of cyber attacks, other than being attributed to a hacker. 18% were able to report that the source was known to be of international origin. There were no known instances of staff, organized crime, or terrorists being the culprits of the cyber attacks. Other Response Traditional malware vector (novice) Q. Who was the source of the attack on your agency? Please check all that apply. 19 Outcome of the Cyber Attack Respondents who reported a cyber attack, n=51 In only 25% of cases was the attack considered successful. Almost half report that the attack was limited to probing systems/resources and close to one third state that the attack was discovered and addressed. Since only 51 respondents indicated that they had been subject to an attack, it is not possible to determine statistical differences by agency characteristics. Q. If yes, was the attack successful? 20 Technical Track 10

Impact of the Cyber Attack Respondents who reported a cyber attack, n=51 The impact is commonly limited to denying public access to agency resources, or disrupting communications. There were no stated instances of investigations being compromised by the release of confidential information. Other Responses No/minimal impact. Specific area taken down for a short time period Deployment of cyber security resources Profanity on agency website Officer work stations out of service until vulnerability resolved Q. How did the attack impact your agency? Please check all that apply. 21 3.2 Cyber Attack Perceptions This study made possible through financial and program support of IACP, CACP, and Digital Boundary Group, Inc. Technical Track 11

Perceived Risk of Cyber Attack The large majority of respondents felt that cyber attacks are a risk to their organization. Among these, half felt that the threat is moderately serious while 29% felt the threat was more serious (rating it a 4 or a 5). Q. Do you believe that cyber attacks are a risk to your organization? Q. How serious is the threat of a cyber attack on your agency? 23 Perceived Risk of Cyber Attack By combining the results of the two charts shown on the previous slide, the data can be represented in another way. Here we see that among all respondents, close to two thirds believe that a cyber attack is a moderately serious to very serious threat. Q. Do you believe that cyber attacks are a risk to your organization? Q. How serious is the threat of a cyber attack on your agency? 24 Technical Track 12

Perceived Risk by Agency Size Larger agencies are more likely than smaller agencies to view cyber attacks as a very serious threat. Smaller agencies are more likely to believe that there is no perceived risk, or to not know whether there is a risk. Q. Do you believe that cyber attacks are a risk to your organization? Q. How serious is the threat of a cyber attack on your agency? 25 Perceived Risk by Agency Type The only statistically significant differences by agency type were that chiefs of US Municipal Departments were more likely than chiefs of US State Police Agencies to feel that cyber attacks were a moderately serious threat, whereas chiefs of US State Police Departments were more likely to view cyber attacks as a very serious threat. Q. Do you believe that cyber attacks are a risk to your organization? Q. How serious is the threat of a cyber attack on your agency? 26 Technical Track 13

Perceived Risk by Experience of Cyber Attack Respondents whose agency had experienced a cyber attack were significantly more likely to see the risk of a cyber attack as a very serious threat. Q. Do you believe that cyber attacks are a risk to your organization? Q. How serious is the threat of a cyber attack on your agency? 27 Risk of Specific Sources of Attack Hacker organizations or individuals are considered the greatest threat, followed by international sources. The lowest threat is perceived to be internal staff. Q. How serious do you view the following potential sources of attack? 28 Technical Track 14

Potential Impact of a Cyber Attack The greatest perceived impacts of a cyber attack that gained access to the Records Management System were the loss of credibility of electronically stored records, followed by the loss of critical data in ongoing investigations and compromised investigations. Over half of respondents also felt that an attack on the RMS would put officers in danger. Q. In your view, what is the potential impact if a cyber attack gained access to your Records Management System? 29 Sufficiency of Current Policies, Practices and Technologies Approximately half of respondents felt that their current policies, practices and technologies were sufficient to minimize the risks of a cyber attack against their agency, 30% indicated that they were not and 21% did not know. Differences by agency size and type were not significant. Q. Do you believe that your current policies, practices, and technologies are sufficient to minimize the risks of a successful cyber attack against your agency's resources? 30 Technical Track 15

3.3 Agency Cyber Security Measures This study made possible through financial and program support of IACP, CACP, and Digital Boundary Group, Inc. Actions Taken to Mitigate Cyber Attack Risk The most common actions taken are technological as well as having security policies in place and enforced. Only 13% regularly had audits performed by a third party, and only 18% conducted penetration tests. Q. What actions does your agency regularly undertake to mitigate risks associated with cyber attacks? Please check all that apply. 32 Technical Track 16

Actions Taken by Agency Size Larger agencies were significantly more likely to have security policies in place and enforced, to remind system users of these policies, to have audits regularly performed by a government agency, and conduct penetration tests. Larger agencies were also more likely to report that their IT was managed by a central IT office/bureau. There were no noteworthy differences by type of agency or by how the agency s IT was maintained. Q. What actions does your agency regularly undertake to mitigate risks associated with cyber attacks? Please check all that apply. 33 Cyber Security Audits Only one third of respondents indicated that their agency s cyber security had been audited. Of these, the large majority (87%) stated that their agency had implemented the audit recommendations. Q. Has your agency's cyber security ever been audited? Q. If yes, do you know if the recommendations made were implemented? 34 Technical Track 17

Cyber Security Audits by Agency Size Agencies with 50 employees or more were more likely to have had their cyber security audited than agencies with 0 to 49 employees. Among agencies who had an audit completed, the likelihood of implementing the recommendations did not vary by agency size. Q. Has your agency's cyber security ever been audited? 35 Cyber Security Audits by Agency Type US State Police Agencies were significantly more likely to have had their cyber security audited than US Sheriff or County Agencies. Among agencies who had an audit completed, the likelihood of implementing the recommendations did not vary by agency type. Q. Has your agency's cyber security ever been audited? 36 Technical Track 18

Cyber Security Audits by Attack Experience and Perceived Risk Agencies who had been the target of a cyber attack were significantly more likely to have had a cyber audit completed. A respondent s perceived risk of cyber attack and the likelihood that their agency had a cyber security audit conducted were positively correlated. Q. Has your agency's cyber security ever been audited? 37 Importance of Cyber Security Audits Almost all respondents felt that it is at least somewhat important that law enforcement agencies conduct regular cyber security audits, and 29% felt that it is very important. Q. How important is it that law enforcement agencies regularly conduct cyber security audits? 38 Technical Track 19

Agency Audits by Perceived Importance There was a positive correlation between having conducted a cyber security audit and the perceived importance of law enforcement agencies regularly doing cyber security audits. Q. How important is it that law enforcement agencies regularly conduct cyber security audits? Q. Has your agency s cyber security ever been audited? 39 Participation in FBI Security Task Force Only 10% of respondents indicated that their agency had been invited to participate in a Cyber Security Task Force, and 25% did not know. Among those who had been invited to participate, 39% were currently participating. Q. Has your agency ever been invited to participate in an FBI Cyber Security Task Force? Q. If yes, at what level of participation? 40 Technical Track 20

Worked with Federal Agencies Only 10% of respondents indicated that their agency worked with other federal agencies in the prevention, mitigation, or response to a cyber attack. Of these, half had worked with the FBI, 16% with the Secret Service, and 13% with DHS. Other agencies worked with included NSA, CIA, RCMP, NCRIC, NCIC, and CJIS. Q. Has your agency worked with other federal agencies directly in the prevention, mitigation, or response to a cyber attack? Q. If yes, please identify the agencies with whom you have worked. 41 3.4 Knowledge and Training This study made possible through financial and program support of IACP, CACP, and Digital Boundary Group, Inc. Technical Track 21

Knowledge Level Needed for Law Enforcement Chief Executives Respondents felt that law enforcement chief executives need to be more than just aware of how to maintain the security of their agency s information systems, they need to be knowledgeable to very knowledgeable. Q. How knowledgeable should law enforcement chief executives be with regard to maintaining the security of their agency's information systems and resources? 43 Most Appropriate Training The most appropriate cyber security training for chief executives of law enforcement agencies was deemed to be training to understand the general risks associated, followed by familiarity with policy issues associated with cyber attacks. Q. What is the nature of training regarding cyber security that would be appropriate for chief executives of law enforcement agencies? 44 Technical Track 22

Most Appropriate Method of Training Conference presentations at key trade shows were seen as the best way to provide executive training, followed by online videos, webinars, or other presentations. Other Responses In house training Training at local training centres, colleges Meetings with IT staff In person / small groups Consultant services All of the choices Can t be one size fits all Q. How best should executive training be provided? 45 Next Steps This study made possible through financial and program support of IACP, CACP, and Digital Boundary Group, Inc. Technical Track 23

Next Steps A Cyber Security Plenary Session Philadelphia Develop Training / Stress Test 6-8 sites (support needed!) Trustwave tentatively update 2011 LE Executive Cyber Security Agency Guide Develop Tech Minute video covering the research results from the survey Digital Boundary Group to develop draft survey report, executive summary and Script for Tech Minute CCDE to propose resolution and model policy for Philadelphia CCDE to create complimentary survey regarding capabilities to process digital evidence 47 Technical Track 24