280 likes | 439 Views
Session 4 (A) Secure, Dependable and Trusted Infrastructures: State-of-the-art and IST Call 1 Objectives Skopje, FYROM, 15 December 2006. Network and Information Security An Introduction. Network and Information Security
E N D
Session 4 (A)Secure, Dependable and Trusted Infrastructures: State-of-the-art and IST Call 1 ObjectivesSkopje, FYROM, 15 December 2006
Network and Information Security An Introduction • Network and Information Security • “The ability of a network or an information system to resist, at a given level of confidence, accidental events or malicious actions that compromise the availability, authenticity, integrity and confidentiality of stored and transmitted data and the related services offered by or accessible via these networks and systems” SAFETY = SECURITY + PRIVACY Source: communication form the Commission “Network and Information Society: Proposal for a European Policy Approach”, COM (2001) 298 final
Network and Information Security Operative Context • System landscape has changed and keeps changing dramatically “The Walled Fortress” “The Open Metropolis” • Closed doors, physical isolation • Less organised attacks • Security as protection • Defending data and systems • Open, unbounded, interconnected • User-targeted focussed attacks • Financial gain • Trust as an enabler Source: Jacques Bus, “Security Research in the EU FP for RTD”, available at http://wwwes.cs.utwente.nl/safe-nl/meetings/24-6-2005/jacques.pdf
The “New Metropolis” LandscapeKey Features • Industry: demand for secure SW is much higher than available security expertise • Auditors and lawyers: who is accountable and liable for what? • Users: security segmentation and market definition are increasingly blurring; “service infrastructure” covers network infrastructure, perimeter, desktop, server and applicationsecurity • Society: trust becomes a key enabler for service provision and use And last but not least • RTD: new complex scenarios introduce security issues not addressed by conventional engineering processes
The “New Metropolis” LandscapeSecurityTechnology Overview • Basic security building blocks are available and ready to use • Today’s applications can in general be run securely but • Managing the complexity is the challenge • Security is subject to restrictions (reduced flexibility and openness) • Vulnerable layers: L2 (networks), L7 (internet) • (Increasingly) security as service • Part of an overall SOA architecture • Focus on the user security needs
The “New Metropolis” LandscapeCommon Types of New Threats 2nd Q 2006 Source: J. Franco, Panda Software, “Internet Threats: Perception vs. Reality”
Economic Significance ofTypical Security Threats Source: communication form the Commission “Network and Information Society: Proposal for a European Policy Approach”, COM (2001) 298 final
Attempts at SolutionsKey Action Lines • Information sharing and policy framework • Adoption of consistent laws to enable enforcement world-wide • Intelligence: proper threat assessment • User-focussed: technology and education to address the weak link • Education: promote user awareness • RTD: develop broad range of technology solutions
Attempts at SolutionsFocus of Current Security Projects and Initiatives1/2 • Holistic system security • Interdependency and complexity theory • System reliability and availability theory • Cascading theory • Scenario analysis, simulation and modelling, etc • Risk management & vulnerability analysis • Prevention and detection • Information sharing systems • Early warning systems • Intrusion / malware detection and response • Incident response & recovery Source: CI2RCO D6, “Report on the Analysis and Evaluation of CIIP R&D programmes. Available at http://www.ci2rco.org/.
Attempts at SolutionsFocus of Current Security Projects and Initiatives2/2 • Survivability of systems • HW and firmware security • Secure and resilient operating systems • Service continuity & availability • Policies and legal environment • Fundamental RTD • Security architecture and frameworks • Fundamental protocols • Fault tolerance • Standardisation • Achieving trust and resilience • Assurance of compound secure components Source: CI2RCO D6, “Report on the Analysis and Evaluation of CIIP R&D programmes. Available at http://www.ci2rco.org/.
EU FP ICT Security Research Key Objectives • Roadmapping of security issues (FP5), leading to FP6 research on • Dependable, resilient ICT infrastructures • Security and dependability challenges arising from complexity, ubiquity and autonomy • Resilience, self-healing, mobility, dynamic content and volatile environments • Management and control of large-scale dependable systems • Understanding and management of interdependencies • Proper assessment and evaluation
EU FP6 Security Research Current R&D Project Portfolio • A total portfolio of 37 projects • 11 Integrated Projects • Biosec, eJustice, Inspired, Prime, Secocq, Seinit, Open TC, Deserec, Serenity, IRRIIS, 3dface • 4 Networks of Excellence • Ecrypt, Fidis, Biosecure, Resist • 18 Specific Targeted Research Projects • Digital Passport, Medsi, Positif, Scard, Secure Justice, Secure Phone, Discreet, Crutial, Hidenets, Humabio, Mds, Mit, Pepers, ubisec&sense, Antiphish, Fastmatch, Connect, s3ms • 4 Coordination Actions • SecurIST, CI2RCO, ESFORS, GRID €146 m, ~500 participants, ~€35 m per year funding
RESILIENT ICT INFRASTRUCTURES SEINIT, DESEREC, SERENITY, UBISEC&SENSE, HIDENETS, SECURIST, IRRIIS, RESIST, CRUTIAL, NEDSI, CI2RCO, GRID IDENTITY, PRIVACY, RIGHTS, ASSETS OPEN-TC, FIDIS, PRIME, eCRYPT, SECOCQ, eJUSTICE, INSPIRED, CONNECT, DISCREET, POSITIF, SCARD, SECURE-JUSTICE BIOMETRICS TO BENEFIT EU CITIZENS 3DFACE, BIOSEC, BIOSECURE, MIT, HUMABIO, DIGITAL PASSPORT, SECUREPHONE TRUST IN THE INTERNET ANTIPHISH, FASTMATCH, MDS, PEPERS, S3MS, ESFORS EU FP6 Security Research R&D Project Portfolio Structure
Resilient ICT InfrastructuresFP6 Project Case Study: CRUTIAL • CRUTIAL: CRitical UTility InfrastructurAL Resilience • Objectives: • Identify and describe control system scenarios • Model interdependent infrastructures taking into account the multiple dimensions of interdependencies, and attempting at casting them into new architectural patterns, resilient to both accidental failures and malicious attacks • Project Type: Specific Targeted Research Project (STREP) • URL: http://crutial.cesiricerca.it/default.asp
Biometrics to Benefit EU Citizens FP6 Project Case Study: HUMABIO • HUMABIO: HUman Monitoring and Authentication using Biodynamic Indicators and BehaviOural Analysis • Objectives: • Develop a modular, robust, multimodal biometric security authentication and monitoring system utilizing biodynamic physiological profile data • Create the necessary enhanced security framework for the integration of the biometric authentication system to controlled and monitored ambient intelligence environments • Project Type: Specific Targeted Research Project (STREP) • URL: http://www.humabio-eu.org/objectives.html
Identity, Privacy, Rights, Assets FP6 Project Case Study: SECOCQ • SECOCQ: SEcure COmmunication based on Quantum Cryptography • Objectives: • Specify, design, and validate the feasibility of an open, Quantum Key Distribution infrastructure dedicated to secure communication • Fully develop the basic enabling technology • Project Type: Integrated Project (IP) • URL: http://www.secoqc.net/
Biometrics to Benefit EU Citizens FP6 Project Case Study: ANTIPHISH • ANTIPHISH: ANTIcipatory Learning for Reliable PHISing Prevention • Objectives: • Develop trainable and adaptive filters that are able to detect variations of previous phishing messages, and also capable of anticipating new forms of phishing attacks • Implement this technology at real world settings (filtering of e-mail traffic online, content filtering at the edge of wireless networks) • Project Type: Specific Targeted Research Project (STREP) • URL: http://www.antiphishresearch.org/
What Lies Ahead?The Vision • Ubiquitous systems • Heterogeneity, Interoperability, Scalability, Evolvability, Complexity • New security, dependability and privacy challenges • Applications utilising shared and co-owned services out of different domains of control that require to obey separate security policies and ask for diverse security and dependability qualities
What Lies Ahead?Core Concepts • From dependability • A system property denoting the trustworthiness of a system that allows reliance to be justifiably placed on the service it delivers • Resilience • Embraces dependability and survivability as it captures the property and capacity of a system to autonomously tackle, adapt, respond, recover, self-heal, reconfigure, etc, and be flexible enough to accommodate & tolerate faults / upsets / disruptions and attacks • Plasticity • Embraces the properties and capabilities that would make digital environments and systems to be able to dynamically adapt and evolve securing the seamless control and use of data, information, knowledge, etc
What Lies Ahead?Driving Technologies • Miniaturisation and new emerging technologies • From micro- to nano-scale electronics • RFIDs, PANs, WSNs,…. • Growing intercommunication and convergence • Computing, communications and media technologies • Underpinned by trust and security • ICT drawing on other sciences and technologies • Organic systems • Advanced cognitive and robotics systems • Systems able to learn and evolve
Seventh Framework Programme 2007-2013 (FP7) COOPERATION Programme IDEAS Programme PEOPLE Programme CAPACITIES Programme From the Vision of the Future to FP7 ResearchThe FP7 Security Research Agenda ICT Work Programme 2007-2008 (Draft) 1st Call – 24 April 2007 2nd Call Challenge 1 “Pervasive and Trusted Network and Service Infrastructures” Objective 1.4 “Secure, Dependable and Trusted Infrastructures” Objective 1.6New Paradigms and Experimental FacilitiesObjective 1.7Critical Infrastructure Protection
FP7 Security ResearchKey Objectives in Call 1 • Security and resilience in network infrastructures • Scalable, secure and resilient architectures and technologies • Real-time detection and recovery against intrusions, malfunctions, and failures • Security and trust in dynamic and reconfigurable service architectures • Supporting the secure composition of service coalitions • Managed operation across several administrative or business domains • Flexible business models
FP7 Security ResearchKey Objectives in Call 1 • Trusted computing infrastructures • Interoperability, end-to-end security of data and services • ID management and privacy enhancing tools • Configurable, context-dependent, user controlled, trust policies for ID management • Underpinning technologies • Security and dependability in the engineering of infrastructure, SW and service systems • Trust policies • For assessing and managing the risks associated with ID and private data
FP7 Security ResearchKey Objectives in Call 1 • And also, Co-ordination and Support Actions (CSAs) • Longer-term visions, metrics, benchmarks, research roadmaps • Support of standardisation • IN-CO • Co-ordination of research projects
For Further Information1/2 • ICT for Trust and Security • http://cordis.europa.eu/ist/trust-security/index.html • ftp://ftp.cordis.europa.eu/pub/ist/docs/trust-security/networkhreats-24102006-presentations_en.zip • IST 2006 – “Secure, Dependable and Trusted Infrastructures” Session • http://ec.europa.eu/information_society/istevent/2006/cf/conference-detail.cfm?id=1038 • EPCIP – European Programme for Critical Infrastructure Protection • http://ec.europa.eu/justice_home/funding/epcip/funding_epcip_en.htm
For Further Information2/2 • ENISA – European Network and Information Security Agency • http://www.enisa.eu.int • http://www.enisa.eu.int/pages/09_03.htm • ETRICS 2006 – International Conference on Emerging Trends in Information and Communication Security • http://www.etrics.org/ • Responding to the Threat – presentation by G. Pinkney, Symantec Managed Security Services • http://www.bcs-southwest.org.uk/presentations/GrahemPinkney.pdf • The Threat Landscape and Security Trends – presentation by Jeremy Ward, Symantec • http://www.bcs-southwest.org.uk/presentations/ThreatLandscape.pdf
THANK YOU!!! • Raphael Koumeri • planet@skypro.be • Angeliki Skamvetsaki • askam@planet.gr