dr. peter fonash - ieeesites.ieee.org/njcoast/files/2015/02/strengthening-the-cyber... · incidents...

24
Homeland Security Dr. Peter Fonash Chief Technology Officer (CTO) Strengthening the Cyber Ecosystem Presented to IEEE Privacy Office of Cybersecurity and Communications (CS&C)

Upload: dodang

Post on 28-Jul-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

Homeland Security

Dr. Peter Fonash Chief Technology Officer (CTO)

Strengthening the Cyber

Ecosystem

Presented to IEEE Privacy

Office of Cybersecurity and Communications (CS&C)

Homeland Security

Office of Cybersecurity and Communications

What is the Cyber Ecosystem?

The cyber ecosystem is global, evolving and

includes government and private sector

information infrastructure; the interacting people,

processes, data, information and communications

technologies; and the environment and conditions

that influence their cybersecurity

2

Homeland Security

Office of Cybersecurity and Communications

Strengthening the Cyber and Communications

Ecosystem for the Future Today

Many unknown vulnerabilities

Incidents spread at network speed

and defenses are manual

Many attacks are undetected

Independently defended systems

Inconsistent security policies

Users do not follow best practices

Attacks increasing in number and

virulence

Non-interoperable proprietary

solutions

Defenses not integrated or

interoperable

3

Future

Baked in security = fewer

vulnerabilities

Near real-time response with more

automated defenses

Many attacks, but less impact

Information sharing and increasingly

collaborative defenses

Consistent security practices

Unauthorized activity quickly

identified

Ability to learn and adapt defenses in

near-real time

Plug and play interoperable

architecture fostering innovation

Adversaries will continue to have robust and evolving capabilities

Homeland Security

Office of Cybersecurity and Communications

The Cyber Threat Landscape Continues to

Evolve

• Identity Theft

• Fraud, Extortion

• Intellectual Property theft

4

• Nation State Espionage

• Denial of Service

• Data Manipulation

• ICS / SCADA Compromise

Example threats: worms, viruses, trojans, advanced persistent threats (APT),

botnets, distributed denial of service attacks (DDoS), insider threats

Example threat objectives:

Greater Cyber Capability

Gre

ater

Des

tru

ctiv

e In

ten

t Each day, capabilities

become more ubiquitous

Major conflict can cause

the intent severity to shift

Homeland Security

Office of Cybersecurity and Communications

The Challenge: Cyber Attacks, Targets, Effects

Human Organization

Devices & Linkages

Fear & Doubt

Confusion

Dollar Losses

Reputation Loss

Alter Behaviors

Inaccuracies

Induced Failures

Denial of Service

Data Exfiltration

Malfunctions

Performance Loss

Lost Comms

ATTACKS TARGETS EFFECTS

Insider Attacks;

Social Engineering

Data and Policy

Corruption

Worms, Viruses

Flooding

Backdoor Implants

Physical Destruction;

Supply Chain

Code Manipulation

Malware

Modified From AF SAB Cyber Report, 2008

Mission Layer

App/Session Layer

OS/Network Layer

HW/Systems Layer

Supporting Infrastructure

5

Homeland Security

Office of Cybersecurity and Communications

100

75

50

25

0

Percent

‘04 ‘05 ‘06 ‘07 ‘08 ‘09 ‘10 ‘11 ‘12 ‘13

Time to Compromise

Time to Discovery

Innovation Gap

Percent of Breaches Where Time to Compromise / Time to Discovery was Days or Less

Homeland Security

Office of Cybersecurity and Communications

Cyber-Physical Attack Consequence Options Increasing

D. Evans, “The Internet of Things: How the Next Evolution of the Internet Is Changing Everything,” Cisco Report, April 2011

7

Homeland Security

Office of Cybersecurity and Communications

Where are we: Ecosystem Evolution

Loosely interconnected cyber ecosystem, non real time sharing of information or collective response

Advanced analytics and decision making to predict, prevent and respond to attack in collaborative, automated and adaptive manner across ecosystem

We are

here

8

Homeland Security

Office of Cybersecurity and Communications

Strengthening the Cyber Ecosystem

• Enhanced Analytics and Situation Awareness

– Situation awareness--information sharing

– Improved analytics based on “big data analytics”

– Collective action based on shared information

• Automated & Adaptive Capabilities

• Greater Effectiveness & Integration

– Integrated tools

– Response from months to seconds

– Plug & play technology/interoperability

– Signature/Reputation/Behavior based detection

9

Homeland Security

Office of Cybersecurity and Communications

Why Enhanced Analytics and Situation

Awareness?

• Supports Identify, Protect, Prevent, Detect and

Respond/Recover

– Situation awareness and common operational picture

• Aggregation of data enables “Big Data

Analytics”

• Informs and facilitates collective automated

response

• Parallels exist in other areas (disease control)

10

Homeland Security

Office of Cybersecurity and Communications

Why Should DHS Do Enhanced Analytics

and Situation Awareness

• Most diverse and unique sources of cyber data

• DHS has established partnerships and

information sharing role

• Facilitates our Identify, Protect, Prevent, Detect,

Respond and Recover roles

• Infrastructure established and funded (in out

years)

11

Homeland Security

Office of Cybersecurity and Communications

Precedent for Enhanced Analytics and Situation

Awareness

NOAA CDC FAA DHS

Collection of weather related data

Storage of many years of data

Collect most recent weather data from all available relevant sources

Analysis of interrelated data points with possible impacts on weather changes

Statistical modeling to create prediction of future changes to current weather based upon past history

Provide both raw data and weather predictions to large variety of users

Provide mitigation recommendations to areas with potential impacts

Collect medical data related to contagious diseases

Store all collected data

Analyze possible relationships of medical information

Collect most recent medical information with potential contagious possibilities from as many sources as possible

Track efforts to control spread of disease

Continuously analyze changes in information being collected

Utilize modeling to create prediction of future spread of disease.

Provide recommendations to mitigate future spread of disease

Collect information related to all aircraft, airfield, and traffic related incidents

Store all collected data

Select all data related to an accident and incident

Analyze current and past related information to determine possible causes

Recommend changes to mitigate future incidents and accidents

Collect all relevant cyber information o .gov o Anonymized from Sectors,

Industry, States, etc.

Store in appropriate data bases relevant to user access controls

Collect non-cyber information that may be relevant in predicting potential future attacks

Analyze data for patterns and anomalies for determining potential threats

Provide/collect raw and analyzed information to/from relevant stakeholders

Provide, describe, or obtain mitigation measures to/from stakeholders

Recommend legal/policy changes to improve cyber security

Reduces physical damage. Saves lives. Allows for preparation time.

Reduces sickness & death. Saves expenses.

Reduces airline incidents. Reduces physical damage. Saves lives.

Provides warning of potential attack Reduces financial losses, equipment damage, information losses, and secondary impacts such as power loss, water contamination, etc.

12

Homeland Security

Office of Cybersecurity and Communications

Challenges

• CS&C has some limited ability to forecast near-future ongoing cyber-threats, but little ability to predict out-year threats and trends

– Nascent science

• Different sources of data have different use requirements

• For improved forecasting prediction capabilities, need:

– More data… increase in data points, by being more trusted as a data broker with a global reach

– More diverse data, accepted and used (today data of many types is discarded if collected at all)

– Improved understanding of significance (diagnostic value) of data

– Improved modeling and computation capabilities

– Have to accept that data precursor-to-effect relationships are far less consistent than in other domains, so unknown threats will always be major factors

– To defend in depth, need improved defenses that would function against even unknown threats

13

Homeland Security

Office of Cybersecurity and Communications

Objective State: Informed Risk Management &

Adaptive, Agile Defense Static Defense (put the infrastructure in

the best possible condition – hygiene)

– Prevent • Continuous Authentication, Authorization • General User Awareness and Education • Interoperability • Machine Learning and Evolution • Moving Target • Privacy • Risk-Based Investment & Data

management • Security Built In • Situational Awareness • Defense-In Depth

– Detect • Continuous Monitoring • Behavior Monitoring Based on Business

Rules • Sensors

Dynamic Defense (Continual improvement and adaptation)

– Real time Information sharing • Continuous Information Sharing and

Exchange with Cloud • Common Situational Awareness

– Respond • Automated Identification, Selection, and

Assessment of Defensive Actions • Adjustments, Automated Courses of

Action • Share Courses of Action • Informed Decision Making--Human on the

Loop

– Recover • Automated Courses of Action • Automated Cleaning, Patching, and

Configuration • Adapt Hygiene Based Lessons Learned

14

Automated Information Sharing

Homeland Security

Office of Cybersecurity and Communications

Automated Collective Action throughout the

Ecosystem

Automated Information Sharing

(Trusted Broker/Exchange Agent)

Government International

Static Static

Academia

Static

Public

Static

Industry

Static

Sample Bilateral Information Sharing

Static = Static Defense (best hygiene)

Dynamic = Dynamic Defense (based on situational awareness)

CERT

ISACs

DIB

Dynamic Dynamic Dynamic Dynamic Dynamic

15

Homeland Security

Office of Cybersecurity and Communications

Key Comparisons---Cyber Challenges

NOAA-NWS NIH/CDC DHS/CS&C

Data

Context

• Weather is generally

cyclical and broadly

predictable. Specific

events (Tornado path)

may be difficult to predict

in specific detail more

than minutes or hours

beforehand

• Historic data is highly

relevant to future

probabilities

• Epidemics are somewhat

cyclical and predictable.

Specific details may be highly

unpredictable but once

identified, the epidemiology

may be predictable.

• Data is sometimes useful for

forecasting disease category

evolution and highly relevant

to understanding epidemiology

and public health

consequences.

• Some data is a poor predictor of

future activity.

• The near-future course of an

ongoing identified attack can

often be forecast. Some

successful forms of cybercrime

and attacks persist for years,

and may be predictable in the

aggregate, but difficult to predict

specifically.

• Unique major threats may be

intentionally unpredictable.

Structural

Context

• Human activity may

have large scale (e.g.

changes in regional

environment due to

agriculture; Global

warming) and small

scale changes (local

effects due to urban

build-up)

• Outlier climate events

volcanoes, nuclear war,

large-meteors.

• The disease agent and vector

may each evolve in response

to human activity, rendering

current defenses ineffective.

• Outlier events include

evolution of new virulent

organisms, or biological attack

as acts of war.

• Specific attacks may be adapted

or otherwise be changed quickly

in response to defensive

intervention.

• Attack methods and practices

may evolve over time in

response to intervention.

• Attacks of new types must be

assumed to be in constant

development.

• Outlier: Coordinated attacks by

cyber-weapons as acts of war.

16

Homeland Security

Office of Cybersecurity and Communications

Key Comparisons ---Cyber Challenges,

Continued

17

NOAA-NWS NIH/CDC DHS/CS&C

Data

collection

and

integration

• Decades of highly

relevant historical data

available.

• Trusted data broker.

• Decades of relevant historical

data available

• Data meaning may be

sometimes obfuscated by

similar symptoms, epitophy,

etc.

• Trusted data broker.

• Very little historical data

• Early stages of defining what

data is relevant and how to use

• Significant progress and

momentum on data standards

and metrics

• Issues of access, data

protection, disclosure, legal

and regulatory frameworks

need to be addressed

Multi-scale

modeling

and

forecasting

• Physics-based

• Models have been

validated and improved

over time

• Epidemiology Models have

been validated and improved

over time.

• Public health models have

been validated and improved

over time

• Use of wide range of data

(e.g. weather data to predict

Malaria vector-mosquito

population, National Retail

Data Monitor to track OTC

medicine sales)

• Assessments based on trade-

craft and expert heuristics

versus rigorous models

• Analytical frameworks very

immature

• Analysis requires

understanding of complex

relationships between

technology and people

(security personnel,

adversaries)

Homeland Security

Office of Cybersecurity and Communications

Goal: Integrated Adaptive Cyber Defense (IACD):

Enabling Enterprise Owners & Operators

External Stakeholders

Cyber Weather Map Visualization

Internet

Orchestration & Analytics

Reputation Data & Analytics

Cyber Data Sources &

Data Feeds

Commercial Feeds

Analytics

Human

Automated

Example Enterprise

Boundary Protection (e.g., IDS, IPS, Proxy, etc.)

Infrastructure Protection (e.g., Server, Router, etc.)

Host Protection (e.g., AV, Virtualization, etc.)

Threat Information & Configuration Details

Security Providers (e.g., Antivirus, IDS,

IPS Providers)

Federated Information Sharing

• High Speed Machine to Machine

• Human In/On the Loop

Community’s Internet of Things

18

Homeland Security

Office of Cybersecurity and Communications

Transparency: Organizations should be transparent and notify

individuals regarding collection, use, dissemination, and maintenance

of personally identifiable information (PII).

Individual Participation: Organizations should involve the individual in

the process of using PII and, to the extent practicable, seek individual

consent for the collection, use, dissemination, and maintenance of PII.

Organizations should also provide mechanisms for appropriate access,

correction, and redress regarding use of PII.

Purpose Specification: Organizations should specifically articulate the

authority that permits the collection of PII and specifically articulate the

purpose or purposes for which the PII is intended to be used.

Data Minimization: Organizations should only collect PII that is directly

relevant and necessary to accomplish the specified purpose(s) and

only retain PII for as long as is necessary to fulfill the specified

purpose(s).

19

Privacy Principles (Fair Information Practice Principles

(FIPPs)

Homeland Security

Office of Cybersecurity and Communications

Use Limitation: Organizations should use PII solely for the purpose(s)

specified in the notice. Sharing PII should be for a purpose compatible

with the purpose for which the PII was collected.

Data Quality and Integrity: Organizations should, to the extent

practicable, ensure that PII is accurate, relevant, timely, and complete.

Security: Organizations should protect PII (in all media) through

appropriate security safeguards against risks such as loss, unauthorized

access or use, destruction, modification, or unintended or inappropriate

disclosure.

Accountability and Auditing: Organizations should be accountable for

complying with these principles, providing training to all employees and

contractors who use PII, and auditing the actual use of PII to demonstrate

compliance with these principles and all applicable privacy protection

requirements.

20

Privacy Principles (Fair Information Practice Principles

(FIPPs) (continued)

Homeland Security

Office of Cybersecurity and Communications

Summary

Success requires:

– Common situation awareness based on real time

information sharing

– Collaborative automated courses of action based on

common awareness and trust

– Effective and efficient tools

• Integrated tools & data framework

• Common data model

• Low barriers to innovation

• Adaptive sensing, sense making, decision making & courses

of action

21

Homeland Security

Office of Cybersecurity and Communications

Backup Slides

22

Homeland Security

Office of Cybersecurity and Communications

In Meteorological Terms

Interconnect weather-stations

Enable automatic triggering of storm sirens based on shared weather data

Enable next-generation weather prediction

23

Homeland Security

Office of Cybersecurity and Communications

Define the Layers

Human and Organization: The mission is executed at this layer

Mission: Includes mission capabilities such as command and control or

weapon systems

Application and Session: Includes applications such as databases

and web browsers

Operating System and Network: Protocols and components such as

routers and firewalls, along with their associated operating software

Hardware and Systems: Central processing units (CPUs) and storage

arrays

Devices and Linkages: Materials and devices that provide the

underpinnings of computing devices and networks. This layer

includes communication links and electronic devices such as wires,

antennas, transistors, and chips

24