CYBERCRIME & VULNERABILITY ISSUES: WHAT EMERGENCY MANAGERS NEED TO KNOW Jim Duncan, Security Engineer Juniper Networks, Secure Development Lifecycle Initiative.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Chapter 1  Introduction 1 Chapter 1: Introduction.
Lecture 19 Page 1 CS 111 Online Protecting Operating Systems Resources How do we use these various tools to protect actual OS resources? Memory? Files?
Technology in Education Issues we need to know. Social, Ethical, and Legal. By: Kara Bushey ECED 201.
Chapter 10 Schedule Your Schedule. Copyright 2004 by Pearson Education, Inc. Identifying And Scheduling Tasks The schedule from the Software Development.
Copyright © 2015 Juniper Networks, Inc. 1 Cybercrime & Vulnerability Issues: What Emergency Managers Need to Know North Carolina Emergency Management Association.
Infotex Awareness Training Tools. m.infotex.com/tools Information Security Tools.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Password Management for Multiple Accounts Some Security.
Engineering Secure Software. Lottery Story A Threat We Can’t Ignore  Documented incidents are prevalent Carnegie Melon’s SEI has studied over 700 cybercrimes.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Why Cryptosystems Fail Ross Anderson Presented by Su Zhang 1.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Reducing Crime in Cyberspace: A Privacy Industry View Stephanie Perrin Adam Shostack Zero-Knowledge Systems, Inc.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Welcome to the wonderful world of……. . A Quick & Easy Guide.  What IS ?  A quick, easy and convenient way to send a letter to friends, family.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Software Engineering Experimentation Rules for Reviewing Papers Jeff Offutt See my editorials 17(3) and 17(4) in STVR
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Social Media Roundup Bad social media: 7 Ways to lose your audience.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Lecture 19 Page 1 CS 236 Online 16. Account Monitoring and Control Why it’s important: –Inactive accounts are often attacker’s path into your system –Nobody’s.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
ISPAB Panel on Usable Security Mary Frances Theofanos - NIST Ellen Cram Kowalczyk - Microsoft.
Secure Operating Systems Lesson 4: Access Control.
ESTHER W. MAINA D61/70649/2008 MANAGEMENT INFORMATION SYSTEMS SEMINAR CASE STUDY CRITICAL SUCCESS FACTORS FOR E-COMMERCE IN THAILAND: CULTURAL AND INFRASTRUCTURAL.
By Liam Wright Manga comic group Japan SAFETY on your computer.
INTERNAL CONTROLS What are they? Why should I care?
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
Lecture 4 Page 1 CS 111 Online Modularity and Virtualization CS 111 On-Line MS Program Operating Systems Peter Reiher.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Role Of Network IDS in Network Perimeter Defense.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
Mobile Money 1/37 Fiserv Mobile Money Staff Education © 2010 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. All trademarks.
Protection of Transportation Infrastructure from Cyber Attacks EXECUTIVE BRIEFING.
Centre of Expertise - Security Securing your business against cybercrime Or surely we do not have anything to worry about...do we?
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
3.6 Fundamentals of cyber security
Security Standard: “reasonable security”
Information Security.
Password Management Limit login attempts Encrypt your passwords
Control system network security issues and recommendations
University of west Alabama Ed 505 Tasha Vaughn
Cybersecurity Awareness
How to Mitigate the Consequences What are the Countermeasures?
The Issues with Technology in education
Topic 5: Communication and the Internet
16. Account Monitoring and Control
6. Application Software Security
Presentation transcript:

CYBERCRIME & VULNERABILITY ISSUES: WHAT EMERGENCY MANAGERS NEED TO KNOW Jim Duncan, Security Engineer Juniper Networks, Secure Development Lifecycle Initiative Tuesday, North Carolina Emergency Management Association Fall Conference

2 Copyright © 2014 Juniper Networks, Inc. BRIEF BIOGRAPHY Subject-Matter Expert on software vulnerabilities Currently working on prevention of flaws (Juniper SDL program) Previously, product-security and cyber-security incident responder  Juniper, BB&T, Cisco, Penn State University, Old Dominion University  TRANSITS Instructor – helping National CSIRTs in emerging economies  Participant in multiple IRT and cybercrime-fighting forums (FIRST, ICASI)  Critical Infrastructure Protection evangelist (NIAC VDF, CVSS, ISACs)  Ideal candidate for the exit row! (Also soccer referee, parliamentarian, piano technician, pistolsmith, etc., can’t keep a job!)

3 Copyright © 2014 Juniper Networks, Inc. WHY AM I HERE TODAY? Cybercrime and vulnerabilities are here to stay  You know that already; this will not be yet another trend report Technology Complexity – the Internet of Things – growing without bound  Implications for interactions with other disciplines both exciting and scary  Security, if any, is frequently low priority, or omitted from consideration entirely  Definitely no security in Version 0.1, which is what is deployed to first responders!  Technology is just a tool, you should not need to be an expert in it  How many of you are well-versed in internal combustion? My goal is impart observations, rules, etc., for thinking about cyber systems and understanding the larger threats and countermeasures

4 Copyright © 2014 Juniper Networks, Inc. PROBLEMS

5 Copyright © 2014 Juniper Networks, Inc. NATURE OF CYBERCRIME “Cybercriminals are business people, too.”  Amazing parallels to counterfeiting of old: front office, back office, etc.  Well-financed, distributed, smart, not greedy (mostly)  Misalignment of cultural expectations is a complicating factor  Definitions of “crimes” vary from place to place, hard to get support sometimes  Resourceful: example of CAPTCHA workaround  Well-researched: example of bank phishing aimed at small church officials  Follow the money and/or spirit: motivations explain a lot  All of the above apply to nation-state and populist activities, too

6 Copyright © 2014 Juniper Networks, Inc. CONFIDENTIALITY/PRIVACY/REPUTATIONAL THREATS SWATting and EAS hijacks; not much help here except the obvious D0Xing of staff and officials – Internet-based embarrassment is deadly  Teach staff how to protect themselves online if you expect them to protect other people’s stuff online.  Consider reputation-monitoring services Monitor and prevent exfiltration of data in your stewardship  Don’t assume data was erased – it can never be completely erased  Use full-disk encryption and test it  Consider reputation-monitoring services for this as well

7 Copyright © 2014 Juniper Networks, Inc. TELECOMMUNICATIONS THREATS DoS can’t be prevented, but often it can be managed  Various services for ensuring against DoS or mitigating once underway  Work with your ISP (maybe more than one ISP)  Make sure you have experts involved Telephony DoS is old, but new again  Multiple efforts in multiple countries to improve technological response  “Honeypots” deployed to look for TDoS, do-not-call violations, other errors  VoIP is exciting, isn’t it? Yeehaw!  Fundamental flaw: circuit-switched v. packet-switched security models

8 Copyright © 2014 Juniper Networks, Inc. TRANSPORTATION THREATS GPS spoofing and jamming  Documented that thieves are using spoofing to hide stolen vehicles  Florida(?) motorist operated a cellphone jammer from his car during his daily commutes to force other motorists to put down their cellphones  Easy to imagine similar stunts to fraudulently redirect consumers away from competitors’ gas pumps or (pick a retail industry) How do you know your GPS is receiving correct data? Anyone? Highway sign hijacks are clever, but what if they are subtle?  Instead of “zombie” alerts, consider believable “Detour via…” instructions

9 Copyright © 2014 Juniper Networks, Inc. ENVIRONMENTAL THREATS EMP and solar flares  Really naïve in this area, despite decades of study  Recent work very revealing and alarming, but seems to be ignored Structural HVAC, building & power controls, SCADA systems  Never underestimate the potential for someone to inadvertently connect these systems to something they shouldn’t be connected to  And never underestimate the ability of criminals to find them (e.g., Target)  What do you do when your EOC gets too hot? Too cold? Too wet? Dry?  Example of first World Trade Center attack in the early 1990s

10 Copyright © 2014 Juniper Networks, Inc. CASE STUDY NOT YET PUBLISHED Analysis of pre-hospital information system used by EMTs  It was in another state, not North Carolina. Relax! Resume breathing… Criminals’ delight:  No AUP, no password policies  Ruggedized laptop running unpatched XP, plans to upgrade to Win7  No full-disk encryption  Brand-name software vendor truly did not keep PII on device, but…  Helpful cache was uncovered, unencrypted, with PII for 13,500 patients! THIS HAPPENED IN 2014!!! This is all too believable, unfortunately

11 Copyright © 2014 Juniper Networks, Inc. SOLUTIONS

12 Copyright © 2014 Juniper Networks, Inc. OCCAM’S RAZOR, HANLON’S RAZOR, ETC. Occam’s Razor: “When considering multiple possible causes, select the cause requiring the least complexity”  Not guaranteed to be correct, but likely Hanlon’s Razor: “Never attribute to malice that which is adequately explained by stupidity.” Duncan’s Corollary: “Never attribute to an attack that which is adequately explained by negligence.”  “Negligence” can be misconfiguration, software flaw, or user error  Example of inadvertent internally-sourced “attack”

13 Copyright © 2014 Juniper Networks, Inc. AVOID BYSTANDER EFFECT/DIFFUSION OF DUTY First responders would never do this in the real world, but they fall prey to it in the cyber world: Don’t assume someone else will respond! Ask questions. Lots of questions.  Recipients of questions: be professional and answer appropriately  Consider documenting individual findings in “security observation reports” Advocate for proper brainstorming practices  In the first round, get the ideas out there; no vetting whatsoever  Second round, go back and evaluate the first-round responses  Disciplined facilitator is sometimes needed for this to be effective

14 Copyright © 2014 Juniper Networks, Inc. REPLACE BLACKLISTING WITH WHITELISTING Blacklisting: “That, which is not expressly denied, is permitted.”  Far too many systems start out this way  Painful to go back and close up unnecessary ports/services/features Whitelisting: “That, which is not expressly permitted, is denied.”  Much safer  Start with all services disabled, then enable only those that are needed Example: Instead of allowing browsing everywhere, and then blocking access to a few pages, block all pages except for a selected few.

15 Copyright © 2014 Juniper Networks, Inc. GET SMART AND STAY SMART ON CRYPTO “Gosh, crypto is hard!” Doesn’t have to be difficult to understand the basics  Key length is important: long, but not too long (time is an issue, too)  Key space should be as large as possible (or reasonably pragmatic)  Don’t keep plaintext and encrypted text around, close by  Repetition means something failed; algorithm selection is important  Watch out for so-called “security improvement trade-offs”  Example of password-typing alternate-left-right scheme (“key space”, above) Full-disk encryption is worth mentioning again, at this point

16 Copyright © 2014 Juniper Networks, Inc. UNDERSTAND SPHERE OF ACTION Expectations and assumptions creep into our thought processes, distort our reasoning, and cause us to produce incorrect results Cyber threats are global but not the typical disasters most of you handle  Example of NRP and Lori Bush, “There’s the hurricane/forest fire/flood!” Cultural & linguistic differences affect results  Example of CAPTCHA workaround, earlier  Mismatch of importance regarding Asia/Pacific “loss of face”  Example of encipher/decipher v. encrypt/decrypt  Time and date formats (ISO-8601), ICS phonetic alphabet

17 Copyright © 2014 Juniper Networks, Inc. POLICIES AND PROCEDURES No excuses for not having Acceptable Use Policies, Password Policies, Data Retention Policies, and so forth; write’em down, publicize them Don’t expect staff to pick good password management schemes; research apps, make recommendations (working group for NCEMA?) Consider implementing two-factor access schemes Remember that policies and guidelines should be viewed primarily as tools for education; enforcement comes only when education fails

18 Copyright © 2014 Juniper Networks, Inc. FIGURE OUT WHAT HAPPENED LATER “Accountability is the price of openness.” [Daniel E. Geer, Sc.D.] No one builds a perfect system, so institute appropriate logging and auditing mechanisms so that after something goes wrong, you can backtrack to figure out what happened Study Ken Thompson’s “Reflections on Trusting Trust”  1984 ACM Turing Award lecture  Brilliant, short (3 pages) explanation on how all systems are flawed because humans are involved, and cannot be separated  Completely destroys the “Many eyes makes good security” argument

19 Copyright © 2014 Juniper Networks, Inc. DON’T ATTEMPT TO BUILD PERFECT SYSTEMS “The perfect is the enemy of the good enough” (or something like that) Lots of unnecessary effort is expended on lofty conceptions of the really cool and awesomely beautiful solution to a basic problem Don’t build seamless systems, especially in an emergency “Make them seamful, but with beautiful seams.” [Mark Weiser]  Example from ruggedized telecom-in-a-box in Hurricane Katrina

20 Copyright © 2014 Juniper Networks, Inc. BE PART OF THE SOLUTION, NOT THE PRECIPITATE Encourage proper brainstorming  Need sector-specific experts like you to think up interesting problems  We don’t know the stuff that you don’t even know you already know Roll up the results into tabletop exercises Collaborate with cybersecurity incident responders  We both learn from each other  We can help with cross-sector exercises  We’ll know who to call when we find something important

21 Copyright © 2014 Juniper Networks, Inc. ANYTHING ELSE? Q&A Contact Information: Jim Duncan, +1