How to Mitigate the Consequences What are the Countermeasures?

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Operating System Security
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #12-1 Chapter 12: Design Principles Overview Principles –Least Privilege –Fail-Safe.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
(Breather)‏ Principles of Secure Design by Matt Bishop (augmented by Michael Rothstein)‏
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Computer Security: Principles and Practice
Controls for Information Security
Stephen S. Yau CSE , Fall Security Strategies.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
Information Security Technological Security Implementation and Privacy Protection.
SEC835 Database and Web application security Information Security Architecture.
Intranet, Extranet, Firewall. Intranet and Extranet.
Storage Security and Management: Security Framework
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Chapter 6 of the Executive Guide manual Technology.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Chapter 2 Securing Network Server and User Workstations.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Module 11: Designing Security for Network Perimeters.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Security fundamentals Topic 10 Securing the network perimeter.
Module 2: Designing Network Security
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
IS3220 Information Technology Infrastructure Security
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Security fundamentals
CS457 Introduction to Information Security Systems
Securing Information Systems
Your Partner for Superior Cybersecurity
Your security risk is higher than ever.
Issues and Protections
Cybersecurity - What’s Next? June 2017
Network Security (the Internet Security)
Security Standard: “reasonable security”
Secure Software Confidentiality Integrity Data Security Authentication
Introduction to the Federal Defense Acquisition Regulation
LAND RECORDS INFORMATION SYSTEMS DIVISION
I have many checklists: how do I get started with cyber security?
Chapter 19: Building Systems with Assurance
Security.
Cybersecurity Threat Assessment
PLANNING A SECURE BASELINE INSTALLATION
Operating System Concepts
Designing IIS Security (IIS – Internet Information Service)
Design Principles Thanks to Matt Bishop 2006 CS 395: Computer Security.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

How to Mitigate the Consequences What are the Countermeasures? CYRAIL Final Conference Paris, 18.09.2018 How to Mitigate the Consequences What are the Countermeasures? Taha Abdelmoutaleb Cherfia fortiss

Common Mitigation Strategies Introduction of common mitigation strategies that are appropriate to address the threats targeting railways in order to prevent or minimize their impact on the different critical assets.

Common Mitigation Strategies System Administration Bastion Hosts Logging and Monitoring Multi-Factor Authentication Administrator Audit Logging 3 4 2 5 1 SA AS NS DP DS Device Security Access Controls Antivirus / Anti-Malware Firewalls Hardware Encryption Application Security Application Firewalls Database Firewalls Application Whitelisting Email Security Data Leakage Protection Data Protection Data Encryption Secure Socket Layer Transport Layer Security Digital Signature Password Policy Network Security Network Segmentation Network Access Control Internet Protocol Security Network Intrusion Detection/Prevention Virtual Private Network

System Administration Objective: System Administration is the foundation for any infrastructure security measures, and it needs to be a top priority. It provides measures to prevent intruders from getting control over the system. Solutions: Bastion Hosts Logging and Monitoring Host Hardening Multi-Factor Authentication Administrator Audit Logging

Application Security Objective: Application Security provides measures to protect and secure an application from different attacks that exploit its vulnerabilities at different stages of an application lifecycle from design to deployment. Solutions: Application Firewalls Database Firewalls Application Whitelisting Email Security Data Leakage Protection (DLP)

Network Security Objective: Network Security is is the combination of physical and software preventative measures and activities that protect the underlying network infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure. Solutions: Network Segmentation Network Access Control Internet Protocol Security Network Intrusion Detection/Prevention Virtual Private Network (VPN)

Device Security Objective: Device Security (DS) involves protecting endpoint devices such as personal computers, mobile devices and servers from cyber-attacks. It provides mechanisms to restrict access rights to these endpoints to authorized users. Solutions: Access Controls Antivirus / Anti-Malware Firewalls Hardware Encryption

Data Protection Objective: Data Protection is the process of safeguarding the use of data systems and networks to prevent the unauthorized use of data, and the unintentional or deliberate distortion of data. Solutions: Data Encryption Secure Socket Layer (SSL) Transport Layer Security (TLS) Digital Signature Password Policy

Human Factor People play a fundamental role in an effective cybersecurity strategy because they are often the weakest link in the cybersecurity chain. Solution: Railway actors should provide Cybersecurity Awareness Training to their employees including executives, systems administrators, developers, and incident reporters to ensure they are aware of their responsibilities with regard to cybersecurity concerns. Cybersecurity training should include training on policies and potential cybersecurity threats to the railway actor and its business. Verizon, “2018 Data Breach Investigations Report” (2018). Available at: https://www.verizonenterprise.com/resources/reports/rp_DBIR_2018_Report_en_xg.pdf

Advanced Mitigation Strategies Security by Design and Multiple Independent Layers of Security are some of the trending concepts in cybersecurity that may help to provide a strong mitigation strategy.

Traditional Security Security cannot be an afterthought! Before: Security is considered after the definition of the system, meaning that security mechanisms are fitted into its pre-existing design. Conflicts with the system requirements + New vulnerabilities

Security by Design Security Security should play an integral role throughout all phases of the system life cycle. Analysis Design Security Planning Implementation Maintenance

Security by Design: Principles Description Least Privilege An entity should be given only those privileges that it needs in order to complete its task. Fail Safely Unless an entity is given an explicit access to an object, it should be denied access to that object. Economy of Mechanism Security mechanisms should be as simple as possible. Complete Mediation Each and every access to an object must be checked to ensure that it is allowed Open Design Security should not depend on secrecy of its design or implementation. Separation of Privilege A system should not grant permission based on a single condition. Least Common Mechanism Mechanism used to access resources should not be shared Psychological Acceptability Security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present. Defense in Depth Use of multiple security mechanisms such that if one mechanism fails, another will be already in place to prevent a full breach.

MILS: Multiple Independent Layers of Security MILS is a high-assurance security architecture based on the concepts of separation and controlled information flow. MILS is founded on the understanding that security is not a one-size- fits all proposition. MILS supports the coexistence of both trustworthy and untrusted components. Each component is isolated and each may communicate with the others based on the policy enforcements functions. MILS architecture allows the execution of multiple components at different safety/security levels or classifications (mixed-criticality).

MILS: Properties In order to be effective, all system security must be NEAT Property Description Non-bypassable Policy enforcement functions cannot be circumvented Evaluatable Policy enforcement functions are small enough and simple enough that proof correctness is practical and affordable Always-invoked Policy enforcement functions are invoked each and every time Tamperproof Policy enforcement functions and the data that configures them cannot be modified without authorization