1 / 17

Focus Group 1B Cybersecurity Dr. Bill Hancock, CISSP, CISM Cable & Wireless FG1B Chair

Focus Group 1B Cybersecurity Dr. Bill Hancock, CISSP, CISM Cable & Wireless FG1B Chair bill.hancock@cw.com 972-740-7347. Purpose of Today’s Brief. Brief discussion of work completed for NRIC by FG1B Brief discussion on blended attacks

Download Presentation

Focus Group 1B Cybersecurity Dr. Bill Hancock, CISSP, CISM Cable & Wireless FG1B Chair

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Focus Group 1B Cybersecurity Dr. Bill Hancock, CISSP, CISM Cable & Wireless FG1B Chair bill.hancock@cw.com 972-740-7347

  2. Purpose of Today’s Brief • Brief discussion of work completed for NRIC by FG1B • Brief discussion on blended attacks • Request for approval of seven additional BPs since March, 2003 • Preparation for survey in 2004 • Recommendations for NRIC VII

  3. Charter of FG1B • Generate Best Practices for cybersecurity • Telecommunications sector • Internet services • Propose New Actions (if needed) • Deliverables • December 2002 – prevention (105 BPs) • March 2003 – recovery (48 BPs) • December 2003 blended atack (7 BPs) • Have made all deliverables, complete and on-time

  4. FG1B Members

  5. FG1B Outreach • Extensive outreach in the last 12 months • Most major telecommunications events • Standards organizations • Industry groups • Congressional testimony • Webinars • Industry trade publications • Writing (books, papers) • Email and phone support to implementers

  6. Security Technologies risk assessment forensics privacy smart cards intrusion detection e-Business access controls digital signatures Application and Commerce Security Fraud & Risk Management spam applets Policy, Audit and Security Management PKI worms Audit Avoidance Reliance Identification Compliance Assurance Pattern matching Network Security Authentication Suppliers Content filtering Employees Privacy Authorization Partners Information flow Internet services viruses Customers Applications Data tokens VPNs biometrics firewalls e-Mail RAS web servers e-directories AberdeenGroup monitoring and reporting cryptography

  7. BPs and Implementation Guidance + 1300 pages 160 BPs

  8. Blended Attack BPs • Working with FG1A • Base definition: physical attack combined with a cyber attack to disable infrastructure in a meaningful and intense manner • Highly complex • Many potential combinations • Range from simple-to-do attacks to sophisticated variants

  9. Type ASpecific Targeting Against a Technology Type • Definition: A coordinated attack against the physical and cyber attributes of a specific product or technology type • Examples: • Physical attack against an HVAC control system monitoring facility with a cyber attack against SNMP-managed HVAC entities at specific locations • Certificate authority server farm physical locations are attacked to access consoles and then used to “poison” root keys via cyber attack to disable all PKI and crypto-sharing entities

  10. Type BSpecific Blended Attack Against Single Infrastructure Entity • Definition: Blended attack against a specific infrastructure entity by attacking the physical management control locations and simultaneously attacking management or control “plane” cyber entities • Examples: • Power grid – grid management locations are physically disabled with munitions and grid management network disabled via cyberattack (router table attack, autonomous malicious logic, etc.) • Telco NOC – NOC primary and backups attacked by physical attack and NOC management network and entities attacked by cyber attack • Airport – multi-spectrum wireless jamming of emergency voice/data wireless communications while physically attacking airport communications blockhouse facilities or fiber junctions • Manufacturing or process facility – main SCADA control facilities physically attacked and SCADA networks and interconnects suffer cyberattack to disable process control facilities throughout the network

  11. Type CMulti-phased Sequenced Blended Attack Against Multiple Infrastructures • Definition: A coordinated physical and cyber attack against two or more different infrastructure constructs causing dependency outages/disruption that are difficult to manage or recover, causing grievous harm and economic disruption on a wide scale • Example: • Power and Telco: physical attacks (phase 1) to cut 345KVA power lines coordinated with a cyber attack (phase 2) ASN.1 vulnerability “worm” attack against Telco voice infrastructure • Telco voice and Internet: physical attacks against main NOC and hosting locations combined with ASN.1or similar cyberattacks against routers, switches and other interconnects to disrupt/disable separate voice and data networks simultaneously

  12. Stopping Blended Attacks is Like…

  13. Today’s Request: 7 New BPs • Mostly geared towards attack situations • Four for prevention • 6-6-8107 Pre-establish working relationships between cyber and physical security teams. • 6-6-8108 Authentication System Failure • 6-6-8109 Automated patching systems may be unauthenticated • 6-6-8110 News Disinformation • Three for recovery • 6-6-8564 Authentication System Failure • 6-6-8565 Automated patching systems may be unauthenticated • 6-6-8566 News Disinformation

  14. 2004 Survey Preparation • Fg1B or its equivalent NRIC VII will need to work extensively with the survey creation team • Do not expect quick adoption of some cybersecurity BPs due to complexity and technology issues • Security is a process with many solutions along the path…

  15. FG1B Recommendations for NRIC VII • Most of these were provided in our March 2003 documentation • Work for NRIC VII will need to include these items, some of which are long-term issues • Establish a working relationship with DHS cybersecurity teams due to long-term “heavy lift” of some popular and extensively used technologies that require a lot of R&D and engineering work over the next few years • New recommendations: • “Clean and scrub” of all BPs from NRIC I-VII to consolidate BPs and repair conflicts • Identify specific action plans for “heavy lift” efforts • Work on evangelism of use of FG1B BPs throughout all areas of US Government and all network environments (many apply to any organization which uses network technologies) • Accelerate efforts on blended attack BPs

  16. Ultimately, Security is All About…

  17. Focus Group 1B Cybersecurity Dr. Bill Hancock, CISSP, CISM Cable & Wireless FG1B Chair bill.hancock@cw.com 972-740-7347

More Related