490 likes | 653 Views
Cybersecurity & Cyberwar What Everyone Needs to Know Part 3. Ranette Halverson Department of Computer Science - MSU. 1. Don’t’ Get Fooled: Why can’t we build a new, more Secure Internet?. Good question! .secure Model “Secure, protected zone” Security is required No hosted malware
E N D
Cybersecurity & CyberwarWhat Everyone Needs to Know Part 3 Ranette Halverson Department of Computer Science - MSU
1. Don’t’ Get Fooled: Why can’t we build a new, more Secure Internet? • Good question! • .secure Model • “Secure, protected zone” • Security is required • No hosted malware • Fully implemented top-of-line protections • Rapid vulnerability patching • How can you enforce???
Can .secure work? • Only secures the websites • Assures you which web sites are safe • Website won’t “attack” you, but site could be breached • No protection from malicious actors • Scale (size) • Bigger NW More Security Problems • Smaller NW Not Useful • Companies can reduce or separate NWs • Air gap doesn’t always work
2. Rethink Security DNS Changer virus – 2012 • Estonia-based, cybercriminal ring • Infected 570K computers worldwide • Caused uses to use criminals DNS servers, then to fraudulent web sites (est. $14 M) • FBI – took control but couldn’t shut it down – No internet • 9 months: provided service & notified victims (cost $87K) • Finally, “unplugged”
What is Resilience? • Ability to Adapt & Recover from Adverse Conditions • Not specific to computing… • With respect to organizations & systems • Prepared for attacks • Maintain functionality while under attack • Intrusion Tolerance ~ accept attacks happen, keep systems running whatever the damage • Capacity to work under degraded conditions • Recover quickly • Learn from mistakes
Continuity Plans & Fault Tolerance • Old: Natural Disasters ~ Goal - Up & Running Fast • Fire, Redundancy, Reliability • E.G. Space Shuttle • New: Cyber Attack ~ Goal – preserve functions • Quickly lock-down data, turn-on defenses, shut down NW, fail gracefully • Never critical failure from single attack • Distributed control & services • Failure must be evident • Metrics
Human Component • Adaptability & Recovery requires Individuals & Processes • Don’t Freak Out – Keep Calm & Carry On Challenges & Conflicts • Fear drives up budgets, drives down confidence • Redundancy is wasteful • Resiliency is understanding how different pieces fit together, how to keep them together, how to bring them back together after attack
3. Reframe the Problem (and the Solution): What can we learn from Public Health? Centers for Disease Control = 1947 • Understand emerging threats, determine trusted partners, share information with everyone Cyber CDC needed • Research & information sharing, cooperation & collaboration • Threat & incident watch, data dissemination, threat analysis, intervention recommendations, coordination of prevention • Transparency – like person with unreported disease
4. Learn from History: What can (real) Pirates teach us about Cybersecurity? • Omit this section • Interesting reading
5. Protect World Wide Governance for the WWW: What is the role of International Institutions? International Telegraph Union (ITU) – 1865 • Nations convened, agreed to set of standards for TELEGRAPH • Included privacy • But nations “reserve right to stop any transmission considered dangerous for state security, or in violation of national laws, public order, or morals” • Ensured Governments would retain control
International TelecommunicationsUnion • Name change + radio telephone • 2012 – Dubai meeting - considered Internet • Digital version of the Cold War • Proposal to include Internet passed • ½ nations disagreed & walked out • Unenforceable • Control vs. Open Internet
Governance of WWW & Internet • Differing points of view • Governments should control WWW & internet • Governments should have no role • Declaration of Independence of Cyberspace, J. Barlow (p181) – Electronic Frontier Foundation • https://www.eff.org/cyberspace-independence • Do you agree?
Problems with Declaration • Governments see internet as crucial to • Global commerce & communication • National security • Economic prosperity • There is no “Free” part of the internet • Every piece of equipment within country is subject to laws • People using internet are subject to laws of residence • Governments uncomfortable with unregulated, uncontrollable
6. “Graft” the Rule of Law: Do we need a Cyberspace Treaty? • We all follow HUNDREDS of rules daily! • Name some! -- What would happen if we didn’t? • Do we need Cyber Rules? Do we want them? • Countries say they want a Cyberspace Treaties….but those with most power, want to keep it!
Why the Reticence about Treaty? • Powerful fear it will restrict them, allow others to catch up, or others will ignore • Different priorities by various states • Like 1967 Outer Space Treaty • No one owns space, used for lots of things, prohibits harmful interference, bans launch of nuclear weapons • Also, Antarctica • Challenge – Cyberspace is different from anything else • “Control expectations & developing principles, rules & procedures, & norms about how states behave with respect to the domain”
2001 Council of Europe’s Convention on Cybercrime • US, Japan, Canada & South Africa joined Europe • Could develop into greater treaty • GRAFT – horticulture term • Rather than start anew, build off established frameworks & common interests, • “Everyone” wants internet to run smoothly & cyber crime to be controlled
7. Understand Limits of State in Cyberspace: Why can’t the Government Handle it? • 1440 – Gutenberg Printing Press • The first Information Revolution • Wars Nation-States as we know today • Govt. still have difficulty keeping up • Pirate Bay (see video) ~ peer-to-peer sharing • Some prosecuted, but couldn’t stop site from moving • WikiLeaks – Julian Assange • Protected by Ecuador (William Snowden by Russia) • Switzerland, Sweden, Australia
Limits of Governments - Cyberspace • Other Governments don’t cooperate • Limited by territory • Most Cyberspace controlled by private entities • “98% of US govt. communications, including classified, travel over civilian-owned-&-operated NWs & systems” (Adm. McConnell) • Early days, “1-company monopolies” – telephone, power • Inability to control or prioritize (packets) • Need balance
8. Rethink Government’s Role: How to better Organize for Cybersecurity? • Governments move slowly! (At least in the US!!) • 2004 GAO – Need National Cybersecurity Policy – still none • No substantive cyber-legislation since 2002 • Federal Risk & Authorization Management Program (FedRAMP) • 2013 – one-time security certification for contractors • Took 6 months to get first company certified! • Overall in US - Mixed-up collection of policies, intelligence, sharing (or not) among agencies
Concerns with Government Involvement~~ Intelligence Agencies • Privacy – spying on private citizens! • It has happened ~ It is still happening (in US) • Focus on espionage • Operate with less oversight & transparency • Great responsibility, little power! • Several other agencies & departments – develop standards • Overlap, gaps, conflicts, few incentives
Other US Agencies - Departments • Develop standards for various industries • NIST, Federal Reserve, NERC • Problems with multiple overseers: • Overlap, gaps, conflicts, few incentives, unclear standards • No clear delineation of authority & leadership • One Solution: Buying Power ($100 billion/year) • Example: COBOL • Government Requirements become Standards
Spam levels around the world drop by 70% • Could have been a hews headline in 2008. How? Brian Krebs, Washington Post • Investigating McColo – web hosting co., Calif., - hosting large number of cybercriminal gangs • Contacted large ISPs, asked them to stop providing service • Hurricane Electric – dropped McColo • Visa & child porn, 2002 ~ terminated & reported • 80% sites shut down or couldn’t accept Visa • Lessons learned – need cooperation & action!
9. Approach It as a Public-Private Problem: How do we better Coordinate Defense? • Some companies monitor & to stop questionable activities • Digital currencies – Bit Coin, Linden Dollar (Second Life) • Can be used by everyone, w/o banks • Easy for criminals to use , no tracking, no banks, gambling, money laundering • ISPs – recognize unusual traffic • Anti-Bot Code of Conduct – US – Voluntary – supported by ISPs • Companies: protect “self” – not “cooperative” w/ law enf.
Cost vs. Risk ~ Public vs. Private • Hard to justify paying for unseen risk (Consider MSU) • Public infrastructure – too big for one entity to manage • Need Security Standards – private & public cooperation • Too many choices & companies offering services • US + SANS (private) + others consortium; UK joined • Developed 20 controls addresses KNOWN threats • No consensus: Government vs. Private • Major Co. Lack of cooperation with Govt. ~ Apple, Yahoo
10. Exercise Is Good for You: How can webetter PREPAREfor Cyber Incidents? • Red Team – improve preparation – e.g. Facebook 2013 • Test Beds – simulations, NW, environments • Honeypot – Honeynet – isolated, open to attacks • Cyber Range – offensive test bed (Stuxnet??) • Practices • Identify deficiencies, develop new plans, understand extent • Strengthen defences, diffuse tensions
Obstacles in Exercises • TESTS: Too specific vs. Too general • Self Test – do they really “try” hard • Must have specific stated goals, purpose • Who’s goals?? Everyone is different! • Interactions with others hard to simulate
11. Build Cybersecurity Incentives: Why should I do what you want? Few incentives but to protect self! What’s happening? • Individual Bad Security – endangers others • No updates, lack of transparency & security • Incentives not understood – no financial return • Too many involved – Who’s responsible? • Ex: Android phone: Google, Mfg., Carrier? • Security makes thing worse?? TRUSTe(certify)
Some Successful incentives • Limited Liability for Credit Card Customers • CVV – asking limits merchant liability, illegal to store • Payment Card Industry Data Security Standards
Why not security? • $ spent on security is not spent on company goal • Leaders don’t understand long-term rick & cost • Need consumer awareness & demand • May need government requirements • Price of defense is more than price of attack • New Markets – e.g. Selling Zero Days
12. Learn to Share: How can we betterCollaborateon Information? SHARE! • Banking ~ Takedown Companies • Find fake sites & remove • Lack of sharing cost clients $330 M • Some info can only be determined via the attack! • Malware digital signature • Address very specific target • Time sensitive • Sharing can help the adversary adjust
Sharing ~ With whom? How? • Centralized vs. Decentralized • Information Sharing & Analysis Centers (ISACs - 1998) • Organized around specific industries ~ e.g. IT-ISAC • Few formal procedures • DoD – “anonymous” system for contractors & vendors • Companies Fear Sharing
13. Demand Disclosure: What is the Role of Transparency? Laws? • California 2003 – data breaches must be disclosed ~ bill delayed (not just digital) • 2004 state DB breached & legislators info. Released • 2005 Law went into effect! • 2013 – 46 states have similar laws • Disclosure Accountability • 2011 study: 500 of 1000 companies chose not to investigate breaches of security
14. Get “Vigorous” about Responsibility: How can we create Accountability for Security? Lack of Accountability & Enforcement • HIPPA: Medical records: fines, prosecution • 2003-2006 – 19,420 complaints, NO penalties • 1/3 corporate boards address Cyber Issues (2012) • “Low-hanging fruit” (= easy) • Exploitation of widely know vulnerabilities • Default passwords, unpatched systems, lack of security • Stupid Humans
Compliance vs. Security • Govt. Regulations Compliance • Govt. Regulations make companies Nervous! • What’s the difference?? Why is this bad?? • Compliance replaces accountability • Liability, Cyber Insurance Can increase accountability • Insurance enforces good practices • Need Education • Risk, Overall cost
15. Find the IT Crowd: How do we solve the Cyber People Problem? • Two problems ~ Numbers & Talent • Normal Us & lack of knowledge & Lack of Cyber professionals • Small talent Pool – E.G. Homeland Security stats • 2008: 40 cybersecurity employees • 2012: 400 + 1500 contractors • 2013: add 600 • US has only 3% to 10% cyber personnel needed • Govt. is contracting out more & more
Actual Personnel Issues ~ Various Stats • Quality: satisfied with 40% of applicants • Bidding War among companies (Most >$100,000) • Govt. hires ~ Trains ~ Lose to private industry $$$ • Inflexibility of Govt. & Corporate vs. Smaller Private Co.
Solutions to Cyber Security Problem? • Collaboration: Private & Public sectors • Enable govt. to compete with public sector • Hiring, pay scales, personnel exchanges • Bigger Pipeline in Education • STEM Education deficient • 2004 ~ 60K CMPS Majors; 2013 ~ 38K • Training for non-cyber personnel • Programs – most I’ve never heard of! (p.239)
16. Do Your Part: Protecting Myself (& the Internet)? WE must do our part – take the initiative! We have met the enemy, & he is us! ~ Pogo • Australian Study – prevent 85% of successful intrusions • Whitelisting, Rapid patching, Restrict administrator access • USAF Base Commander – demanded 1-digit password • Ret. Army officer: most important for cybersecurity • “Stop being so *#$* stupid on computers!”
Practical Actions! • Passwords: Update often ~ Use strong passwords, esp. email ~ don’t share or reuse ~ use password manager • Access: Don’t use real answers on security questions • Multi-factor Authentication: password + card/biometric, etc. • SW: Keep up-to-date • Secure your wireless NW (encryption, passwords), don’t use unencrypted “free” WiFi • back-up, Back-Up, BACK-UP!!! • Use highest privacy/security setting
Practical Actions (more) • Behavior: careful clicking links, opening attachments • Mobile Devices: Take care with mobile devices, don’t allow location information • Sharing information voluntarily • Facebook, Twitter, Instagram
Conclusion ~ 5 key trends…Where is Cybersecurity headed next? • Rise of Cloud Computing • Big Data • Mobile Revolution • Demographic Shift • Internet of Things
1. Rise of Cloud Computing • Subscription service • Limitless computational resources • Save 40% to 80% costs • Changing balance of cyberspace power • Individual machines not so important • Cloud security personnel probably better than local • New Security Issues • Concentrated Risk • Is our data separated??
2. Big Data • Quantity + Meta-data • Unprecedented knowledge ~ may breakdown social, legal, ethical boundaries • New Applications: Netflix • Massive: data distribution & customer preference analysis • Lots of unknowns regarding the data
3. Mobile Revolution ~ 1973 • Unbelievably Everything! • Battle of Bandwidth • Security Risks are Mobile • Who should have oversight for “mobile”? • Where will it end?
4. Demographic Shift • Once a western phenomenon, now truly world-wide! • New values, uses, culture • What does this mean for the future?
5. Internet of Things ~ IoT • Digital Systems fully embedded into Real World • Everything can be linked to a web-enabled device to collect & make use of data • World of Distributed Sensors • Interoperability ~ an obstacle? • Threat: Now even my refrigerator is open to attack! Door locks!
ConclusionWhat do I really need to know in the end? • Knowns • Known Unknowns • Unknown Unknowns • Accept & Manage Risks