1  Carnegie Mellon University System Security and U. Rich Pethia Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
© 2003 Carnegie Mellon University slide 1 Building CSIRT Capabilities and the State of the Practice Georgia Killcrece CSIRT Development Team CERT ® Training.
Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by the U.S. Department of Defense © 1998 by Carnegie Mellon.
Building Capabilities for Incident Handling and Response
S2-1 © 2001 Carnegie Mellon University OCTAVE SM Process 2 Identify Operational Area Management Knowledge Software Engineering Institute Carnegie Mellon.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
CERT Centers, Software Engineering Institute Carnegie Mellon University Pittsburgh, PA SEI is sponsored by the U.S. Department of Defense ©
© 2001 by Carnegie Mellon University PPA-1 OCTAVE SM : Participants Briefing Software Engineering Institute Carnegie Mellon University Pittsburgh, PA
DHS, National Cyber Security Division Overview
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
1 Telstra in Confidence Managing Security for our Mobile Technology.
Security on the Internet: The Problem, Solutions and Perspectives Alain Patrick AINA Copyright, ECA, June 2006.
Increasing customer value through effective security risk management
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Legal and Ethical Issues in Computer Security
S5-1 © 2001 Carnegie Mellon University OCTAVE SM Process 5 Identify Key Components Software Engineering Institute Carnegie Mellon University Pittsburgh,
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
E-Commerce: The Second Wave Fifth Annual Edition Chapter 12: Planning for Electronic Commerce.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
Stephen S. Yau CSE , Fall Security Strategies.
© 2003 by Carnegie Mellon University page 1 Information Security Risk Evaluation for Colleges and Universities Carol Woody Senior Technical Staff Software.
Organizational Project Management Maturity: Roadmap to Success
Network security policy: best practices
Business Continuity and You! The Ohio State University Business & Finance Enterprise Continuity Program Quarterly Update October 2008Business and Finance.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
EASTERN MICHIGAN UNIVERSITY Continuity of Operations Planning (COOP)
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
© 2007 Carnegie Mellon University Secure Coding Initiative Jason A. Rafail Monday, May 14 th, 2007.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Seán Paul McGurk National Cybersecurity and Communications
© 2001 by Carnegie Mellon University PSM-1 OCTAVE SM : Senior Management Briefing Software Engineering Institute Carnegie Mellon University Pittsburgh,
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
1  Carnegie Mellon University Protecting Information Infrastructures Rich Pethia Software Engineering Institute Carnegie Mellon University Pittsburgh,
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Computer & Internet Security Sean Lanham, CISSP - ISO University of Texas at Arlington Information Security Office.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Larry Clinton Operations Officer Internet Security Alliance
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Crosswalk of Public Health Accreditation and the Public Health Code of Ethics Highlighted items relate to the Water Supply case studied discussed in the.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Conficker Update John Crain. What is Conficker? An Internet worm  Malicious code that is self-replicating and distributed over a network A blended threat.
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
CSCE 548 Secure Software Development Security Operations.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
High Performance Research Network Dept. / Supercomputing Center 1 DDoS Detection and Response System NetWRAP : Running on KREONET Yoonjoo Kwon
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
1  Carnegie Mellon University Overview of the CERT/CC and the Survivable Systems Initiative Andrew P. Moore CERT Coordination Center.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Mgt Project Portfolio Management and the PMO Module 8 - Fundamentals of the Program Management Office Dr. Alan C. Maltz Howe School of Technology.
Building Global CSIRT Capabilities Barbara Laswell, Ph. D
Critical Security Controls
Legal and Ethical Issues in Computer Security
Secure Coding Initiative
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
Intrusion Detection system
Security week 1 Introductions Class website Syllabus review
Presentation transcript:

1  Carnegie Mellon University System Security and U. Rich Pethia Software Engineering Institute Carnegie Mellon University Pittsburgh, PA This work is sponsored by the U.S. Department of Defense.

2  Carnegie Mellon University CERT Coordination Center The SEI established the Computer Emergency Response Team Coordination Center in The CERT/CC’s mission is to respond to security emergencies on the Internet, serve as a focal point for reporting and resolving security vulnerabilities, serve as a model to help others establish incident response teams, and raise awareness of security issues.

3  Carnegie Mellon University Activity Since 1988, the CERT/CC has responded to over 100,000 security incidents that have affected hundreds of thousands of Internet sites; has worked over 5000 reported vulnerabilities, and has issued hundreds of advisories and bulletins. In addition, the CERT/CC has helped foster the creation of over 90 other incident response teams.

4  Carnegie Mellon University The Internet has Become Indispensable to Business, Government, Universities The Internet allows organizations to: conduct electronic commerce provide better customer service collaborate with business & research partners reduce communications costs improve internal communication access needed information rapidly

5  Carnegie Mellon University The Risks While computer networks revolutionize the way you do business, the risks computer networks introduce can be fatal to a business. Network attacks lead to lost: money time products reputation lives sensitive information

6  Carnegie Mellon University Incidents Reported to CERT/CC

7  Carnegie Mellon University Vulnerabilities Reports are Increasing

8  Carnegie Mellon University Surveyed Companies Identify Risks -1 Source - Computer Security Institute/FBI Survey Attacks

9  Carnegie Mellon University Surveyed Companies Identify Risks -2 Source - Computer Security Institute/FBI Survey Attacks

10  Carnegie Mellon University How Did We Get Here?

11  Carnegie Mellon University The Problem In the rush to benefit from using the Internet, organizations often overlook significant risks. the engineering practices and technology used by system providers do not produce systems that are immune to attack network and system operators do not have the people and practices to defend against attacks and minimize damage policy and law in cyber-space are immature and lag the pace of change

12  Carnegie Mellon University Strain on System Administrators - 1 There is continued movement to complex,client-server, peer to peer, and heterogeneous configurations with distributed management. There is little evidence of security improvements in most products; new vulnerabilities are found routinely. Comprehensive security solutions are lacking; current tools address only parts of the problem.

13  Carnegie Mellon University Strain on System Administrators - 2 Engineering for ease of use has not been matched by engineering for ease of secure administration ease of use and increased utility are driving a dramatic explosion in use system administration and security administration are more difficult than a decade ago this growing gap brings increased vulnerability

14  Carnegie Mellon University Other Reasons for Concern Many security audits and evaluations only skim the surface of the organization and its technology; major risks are often overlooked. Lack of understanding leads to reliance on partial solutions.

15  Carnegie Mellon University More Sophisticated Intruders Intruders are growing in number and type building technical knowledge and skills gaining leverage through automation building skills in vulnerability discovery becoming more skilled at masking their behavior

16  Carnegie Mellon University Attack Sophistication vs. Intruder Technical Knowledge High Low password guessing self-replicating code password cracking exploiting known vulnerabilities disabling audits back doors hijacking sessions sweepers sniffers packet spoofing GUI automated probes/scans denial of service www attacks Tools Attackers Intruder Knowledge Attack Sophistication “stealth” / advanced scanning techniques burglaries network mgmt. diagnostics DDOS attacks network worms

17  Carnegie Mellon University So What?

18  Carnegie Mellon University Its going to get worse - 1 Explosive growth of the Internet continues where will all the capable system administrators come from? Market growth will drive vendors time to market, features, performance, cost are primary “invisible” quality features such as security are secondary

19  Carnegie Mellon University Its going to get worse - 2 More sensitive applications connected to the Internet low cost of communications, ease of connection, and power of products engineered for the Internet will drive out other forms of networking hunger for connectivity, data and benefits of electronic interaction will continue to push widespread use of Internet technology

20  Carnegie Mellon University Its going to get worse - 3 The death of the firewall traditional approaches depend on complete administrative control and strong perimeter controls today’s business practices and wide area networks violate these basic principles -no central point of network control -more interconnections with customers, suppliers, partners -more network applications -“the network is the computer” -who’s an “insider”and who’s an “outsider”

21  Carnegie Mellon University What Can You Do Now?

22  Carnegie Mellon University Prioritized Risks Establish a Context-Sensitive Risk Management Process Environment Technology Staffing Threats Security Requirements Applications of Technology Security Incidents Identify Self-Directed Assessment Analyze and Prioritize Mitigate -Critical assets -Organization Issues -Technology Issues Vulnerabilities Mission & Asset Value Data Threat Data Mitigation Plans Technology Practices Organization Improvements

23  Carnegie Mellon University Need Effective security management programs must be sensitive to organizations’ goals and constraints. Key Ideas Identify critical assets (data, software, services, reputation) and protection requirements Identify solution constraints: policy, regulation Assess organization and technology against requirements Develop strategy and plan to address deficiencies How Match responsibility with authority Identify a core group to facilitate the process Systematically walk through the steps with participation from all parts of organization Develop actionable plan Assessment & Planning

24  Carnegie Mellon University Implementation Need Pervasive understanding of security policy, management practices and technical practices Key Ideas Organizations can improve the security & survivability of networked systems by adopting security policies and practices Its simple, but its not easy How Translate actionable plan into policies and practices borrow heavily from published work assign roles & responsibilities Document, train, refresh Check up, measure, enforce

25  Carnegie Mellon University Crisis Management Need Organizations need to build and mature a computer security incident response capability Key Ideas Anticipate problems and desired outcomes Pre-plan actions Maintain ongoing awareness of evolving threats & vulnerabilities – adjust action plan accordingly How Establish organizational focal point Identify action plans for likely scenarios Capture lessons learned & update plans

26  Carnegie Mellon University Need Many of today’s solutions won’t work tomorrow. Key Ideas Structured networking helps organizations stay on top of a dynamic and rapidly changing problem Sharing lessons learned leads to better practices and policies How Identify networking opportunities (ISA, ISACs, ISSA, InfraGuard, I4, FIRST, etc.) Plug in to group(s) of choice Participate! Get Plugged In

27  Carnegie Mellon University CERT Contact Information 24-hour hotline: CERT personnel answer 8:30 a.m. — 8:00 p.m. EST(GMT-5) / EDT(GMT-4), and are on call for emergencies during other hours. Fax: Web site: Electronic US mail:CERT Coordination Center Software Engineering Institute Carnegie Mellon University 4500 Fifth Avenue Pittsburgh PA USA