180 likes | 296 Views
Information Assurance Management. Telecommunications and Information Security Workshop 2000. TISW 2000. National Telecommunications Information Agency (NTIA) Richard Clark, NSC, National Coordinator for Security, Infrastructure Protection and Counter-Terrorism.
E N D
Information Assurance Management Telecommunications and Information Security Workshop 2000
TISW 2000 • National Telecommunications Information Agency (NTIA) • Richard Clark, NSC, National Coordinator for Security, Infrastructure Protection and Counter-Terrorism. • Attacks and reporting are up...Disney, Ikea, all hit in the last few weeks.
TISW 2000 • 5 Trends is vulnerabilities: • Good News: B2B is driving down prices and increasing production... • Bad News: You are only as secure as the least secure partner... • Deregulation of Electrical Power requires a vast new information exchange system to manage...
TISW 2000 • VoIP convergence: retains all the vulnerabilities of both voice systems and IP...How is this to be secured? • Expansion of wireless networks-We are slow to put in place...watch others for vulnerabilities. By 2003, 165 million anonymous connections... • Broadband - We are becoming more reliant on it...privacy rights are in jeopardy.
TISW 2000 • 5 things Industry can contribute: • People - “Cyber Corps” pay for undergrad and graduate degrees in InfoSec. Money to stimulate academia to start degree programs. • Share information - Telecom, Banking now, Power sector by the end of the year. • Horizontal distributed attack warning • 90% of successful attacks are the result of failure to install available patches. DOE and DOD working secure push to force patch installation.
TISW 2000 • Standards - Not the role of government to create standards...they will not regulate Cyber Space. • All Banks must achieve Cyber security • Health Care soon to follow • Visa standards required for all its venders • Generally accepted - varies by industry
TISW 2000 • Next generation of telecom infrastructure with security built in and seamless use • Government R&D money to be used to identify gaps where market forces are not working • Policy questions: Do we have to preserve privacy or anonymity? Or can we have both? Or neither? • Continuity - non-partisan, not interrupted by changes in administrations.
TISW 2000 • Michael Jacobs - DepDir InfoSec NSA • Information Assurance Counter-measures Triad: • Technology • Policy and procedures • Awareness, training & education • Stability is required for effective security
TISW 2000 • Only three counter-measures available to protect those infrastructures: • Cyber security awareness and education • Strong Crypto • Good security-enabled commercial information technology.
TISW 2000 • Howard Schmidt - Corporate Security Officer for Microsoft. • Old comm adage: GIGO • New Comm adage: GIGO...garbage in Gospel out...Said on the Net...must be true! • New exposure to risk in every new device • Looming issues...
TISW 2000 • Digital Divide - Have’s vs. Have nots • Spectrum management - wireless • Privacy • Encryption and export controls • Taxation and jurisdiction • Security of broadband persistent connections
TISW 2000 • NITA panel discussions • Engineer security from the start • Administer the network securely • Test the system - configuration management • Respond to known weaknesses - have a plan! • Incentive to be part of the system - move SysAdmin from IT to Security • 2-element authentication vs. Strong passwords • for root or Admin access
TISW 2000 • Common server tasks set to specific users • Programmatic practices • Best Practices • PEN-TEST • Firewalls • URL Blocking • Anti-virus • Secure Authentication
TISW 2000 • Emergency Response Program • Open source monitoring • Event correlation & analysis • CERT • Forensic team • Cyber Insurance • Actuarial base won’t meet needs • Assessment -Security Program Elements
TISW 2000 • Protect • Detect • Respond • Collapse of the Internet? • Yes! At the nodes of the search engines
TISW 2000 • How to influence the Board? • IDS outside the Firewall • Fiduciary responsibility to stockholders • Personal, financial risk • Exposure and Risk • Foreseeability • Due care and diligence
TISW 2000 • DDoS - failure to exercise due diligence • Link liability • Like Y2K requirements, you must be able to prove your infosec security procedures • Process in place - not just things! • HIPAA...”anticipated threats or hazards to security or integrity of customer records and information...”
TISW 2000 • SEC using the same language • Banking regs the same • Due diligence - document, document, document! • Anticipate & Avoid vs. Respond and React