1 / 28

Michigan Cyber Range

Michigan Cyber Range. Don Welch Merit Network. Agenda. Problem Merit’s Contribution to the Solution Opportunities to Participate. Critical Infrastructure. Risk. Confidentially 2011 Sony 101,000,000 through two attacks one lawsuit $1 Billion CD 2012 Tricare $4.9 Billion USD

alida
Download Presentation

Michigan Cyber Range

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Michigan Cyber Range Don Welch Merit Network

  2. Agenda • Problem • Merit’s Contribution to the Solution • Opportunities to Participate

  3. Critical Infrastructure

  4. Risk • Confidentially • 2011 Sony 101,000,000 through two attacks one lawsuit $1 Billion CD • 2012 Tricare $4.9 Billion USD • 2012 Utah Medicaid 78,000 accounts • Aug 2012 University of South Carolina 34,000 people • Aug 2012 Oxford and Cambridge • Integrity • 2010 Stuxnet destroyed Iranian centrifuges • Availability • 2009 Twitter denial of service attack • 2012 WikiLeaks • Aug 2012 AT&T DNS • Aug 2012 RasGas

  5. Risk • Industrial-Control Systems (ICS) • Supervisor Control and Data Acquisition (SCADA)

  6. Cyber-Attack Threat • “Cyber-Attacks Are the Biggest National Security Threat.” • Leon Panetta • “My greatest fear is that, rather than having a cyber –Pearl Harbor event, we will instead have this death of a thousand cuts.” • Richard Clarke • “Catastrophic Cyber Attack Possible” • Hon. Mike Rogers • “The worst part of my job is what I know.” • Mike Macedonia

  7. Militia? Colonial Era: Militia supplemented the provincial Forces to provide defense and public safety

  8. Developing an Effective Militia • Marksmanship • Fieldcraft • Organization

  9. Cyber Defense - Crawl • Technical Skills • Understand communication links • Operating systems • Applications • Security fundamentals

  10. Cyber Defense - Walk • Understand attacks • Vulnerabilities • Types of attacks • How to attack

  11. Understand Defense - Walk

  12. Cyber Defense - Run • Learn how to defend • Understand system vulnerabilities • Assess the risk • Mitigate the risk • Adapt – outthink the adversary • Work as a team

  13. Experience – OJT?

  14. Experience • Safe environment • Live opponent • As a team • Properly structured exercise • High quality feedback

  15. Mission • The mission of the Michigan Cyber Range is to provide a state-of-the-art unclassified facility and program for world-class cybersecurity training and education. • The Michigan Cyber Range will be a center of excellence in how to best prepare people to defend our Nation’s critical infrastructure. • The Michigan Cyber Range will also be a center of excellence in cybersecurity.

  16. Description • An unclassified physical facility that is overlaid on the Merit Network with safe access facilities • Initially 2 sites, each with the ability to support 1000 nodes each, but scalable to much larger configurations • Using virtualization, and actual systems the Range will be capable of modeling very complex networks • Nodes are servers, PCs, network security systems and other network enabled devices • A cybersecurity program that serves education, private industry, the national guard and government individuals and organizations

  17. NIST NICE • National Institute of Standards and Technology • National Initiate for Cybersecurity Education • Knowledge, Skills and Abilities (KSA) and tasks for IT staff functions • Translates nicely to learning objectives • Build lessons, courses and training from these KSAs

  18. Users • Education • Higher Education uses the Range as a regular component of course work • Research platform • Special K-12 programs, and competitions • Commercial • Operators • Ex: Utilities, Manufacturing, Finance, Health Care • Vendors • Hardware, Software and Security • Government • Federal, State, Local • National Guard

  19. Architecture • Runs over the Merit Network • Separate from the production network • Initially 2, scalable to 10 sites with each site composed of • Management Rack and 1-10 Range Racks per site • Test Rack for non-standard equipment • Each Range Rack can host up to 1000 virtual machines • Virtual machines are: virtual servers, workstations, devices, switches, routers, etc. • Openflow switches • Uses layers to create specified network configurations • Allows for simultaneous use • Out of band control layer and monitoring layer • Traffic • Packet generation • Replay • Mirrored traffic

  20. Architecture • Scenario Builder: CyberSMART – Utah State • Research, Organize, Create and Edit an exercise scenario • Matched with specific objectives • Guided and collaborative planning process

  21. Exercise Engine • SAIC: CyberNEXS • More than keeping score: what really happened?

  22. Range Map Additional Site/Classroom Ferris State University Additional Site/Classroom Camp Grayling Initial Access Classroom Merit Network Initial Site and Access Classroom Kellogg ANG Base Initial Site and Access Classroom Eastern Michigan University

  23. Use Cases • Platform as a Service • Secure sandbox • Tools • Libraries • Turnkey • A complete course/exercise ready for execution • Training • Crawl, Walk and Run level training • Complete training experience – with a Red Team • Structured and instrumented to achieve specific learning objectives

  24. Access • Residential • Access from a secure facility • Blended • Access from remote facilities with constraints • Distance • Unrestricted secure access

  25. Partnerships • Federal • NIST, DHS, DoE, • State • Governor, Michigan State Police, Department of Technology Management and Budget, Michigan National Guard • Education • Universities, Community Colleges, K-12 • Industry • Users: Utilities, IT Service Providers, Financial, Health Care • Vendors: Security, Hardware, Software

  26. Time Line • 2012 • Initial funding • Executive Director hired • Construction started • Staff hiring • Curriculum developed • 2013 • First training session • Used by EMU • Expanded training • Event program • Additional educational institutions • 2014 • New training facility • Add educational institutions, capacity and training events • 2015 • Full training portfolio • Self-sustaining

  27. Summary • Cybersecurity is one of the major security challenges facing the nation • The majority of these challenges will be met by civilians working for private companies • Effective preparation demands • Exercises against live adversaries in a safe but realistic environment • Working as a team, preferably the company team • Continually building upon knowledge and experience • Based on a public-private partnerships • Operational January 2013 • May become a NET+ Service

  28. Questions?

More Related