Critical Infrastructure Protection (and Policy) H. Scott Matthews March 5, 2003.

Slides:



Advertisements
Similar presentations
Critical Infrastructure Protection Policy Priorities Sara Pinheiro European Commission DG Home Affairs.
Advertisements

Department of Homeland Security Site Assistance Visit (SAV)
International Course on Development and Disasters with Special Focus on Health February 10 – 21, 2003: St Anns, Jamaica CDERA Experience in Institutional.
OCTAVESM Process 4 Create Threat Profiles
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Idaho Critical Infrastructure and Key Resources Protection Program and Fusion Center Brief.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
GEORGE MASON UNIVERSITY Center for Infrastructure Protection and Homeland Security Integrating Critical Infrastructure into Emergency Management Programs.
National Infrastructure Protection Plan
S2-1 © 2001 Carnegie Mellon University OCTAVE SM Process 2 Identify Operational Area Management Knowledge Software Engineering Institute Carnegie Mellon.
DHS, National Cyber Security Division Overview
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
Lecture 1: Overview modified from slides of Lawrie Brown.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 25, 2004.
Critical Infrastructure Interdependencies H. Scott Matthews March 30, 2004.
1 July 23, 2002 Strategic Technology Plan Briefing to LOT Committee.
(Geneva, Switzerland, September 2014)
Randy Marchany VA Tech Computing Center
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Risk Assessment Frameworks
Affiliated Information Security Collaborative An Affiliated Enterprise Approach to Information Security Deans and Vice Presidents Meeting April 17, 2014.
61 What is hazard risk management?. 62 Emergency risk management is “a systematic process that produces a range of measures that contribute to the well.
Risk Management October What is RISK MANAGEMENT? –The process concerned with identification, measurement, control and minimization of security risks.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Managing Risks, Countering Threats: Protecting Critical National Infrastructure Against Terrorism Martin Rudner Canadian Centre of Intelligence and Security.
Association of Defense Communities June 23, 2015
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
International Comparisons - CANADA "Are there emergency management principles promoted in Canada and what influence do they have on the practice and teaching.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Information Warfare Midterm Overview. Lectures Covered Everything until (including) March 2 nd Reading: – All lecture slides – Denning book: Chapters.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
Concern Worldwide’s Approach to Disaster Risk Reduction.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
CSCE 548 Secure Software Development Security Operations.
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
AUSTRALIA. A National Strategy for Enhancing the Safety and Security of our Food Supply ที่มา : We pride ourselves on our high safety and security standards.
© Plan Plan’s Security Framework – A Refresher. © Plan Understanding Ourselves Values - Child Rights, Impartial, Neutral, Sensitive Mandate - Child Centred,
1 Certification and Accreditation CS Unit 4:RISK MANAGEMENT Jesus Gonzalez Kalpana Bahunoothula Jocelyne Farah.
Chapter 1: Security Governance Through Principles and Policies
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 16 – IT Security.
Disaster Recovery Planning (DRP) DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Risk Assessment: A Practical Guide to Assessing Operational Risk
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Critical Infrastructure Protection Policy Priorities
The U.S. Department of Homeland Security
Good practices for risk assessment and control activities
Presentation transcript:

Critical Infrastructure Protection (and Policy) H. Scott Matthews March 5, 2003

Recap of Last Lecture  Midterm Questions? Due today, 5pm!  Infrastructure interdependencies exist  4 types, 6 dimensions  Some caused by our influence,  Some by management (systems)  Some by necessity  The interdependencies compound risk  We do not yet understand them well  Have high-level, not detailed models  Infrastructure sectors ‘depend’ on each other more than average sectors depend on them

Threat  Any circumstance or event with the potential to cause harm to a system in the form of destruction, disclosure, adverse modification, and/or the denial of service.  Examples: Hackers, electrical storms  Need to know likelihood of threats  Sources: National Information Systems Security (INFOSEC) Glossary, NSTISSI No. 4009, Aug. 1997) - generalized form of it

Vulnerability  Weakness in a system, or its components (e.g., system security procedures, design, controls) that could be exploited by a threat  Examples: Software bugs, structural design

Risk  The likelihood that a particular threat using a specific attack, will exploit a particular vulnerability of a system that results in an undesirable consequence  Risk Assessment  Process of analyzing threats to and vulnerabilities of a system and the potential impact the loss of system would have.  Resulting analysis is used as a basis for identifying appropriate and cost-effective counter- measures.  Computing expected loss functions

Risk Management  The process concerned with identification, measurement, control and minimization of security risks in systems to a level commensurate with the value of the assets protected.

Leaders Organic Essentials Infrastructure Population Military Classic Warden Defense Model

Military Phys. Infrastructure Leaders Population Econo-Tech. Infrastructure New Defense Model

Strategic Objectives of Plan  Identify and protect infrastructures and assets most critical to society  Provide warnings for specific, imminent threats  Over time protect other assets through federal, state, local gov’t and private sector collaboration  Homeland Security a “Shared Responsibility”  Source: “The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets”, White House, Feb 2003.

To Achieve Strategic Vision  Understand motivation of enemies  Understand preferred tactics  Comprehensive assessment of:  Assets and vulnerabilities  Challenges of mitigating risk  Key assets may not be part of critical infrastructure but affect prestige, morale, confidence (e.g. WTC, Golden Gate Bridge)

Effects of Attacks  Direct - loss of service  Attack on a critical node, system, function  E.g. bridge  Indirect  Attack leads to behavioral/psychological  Exploitation  Using one to destroy another  May involve interdependencies

Guiding Principles  Assure safety, confidence, service  Responsibility, accountability  Collaborative partnerships govt/industry  Market Solutions where possible  Information sharing  International cooperation  Development of technology and expertise  Safeguard privacy and freedoms

Responsibility Chain  Federal Govt - oversee & coordinate, set policies, ensure 3 strategic obj’s  State and Local - identify and secure their assets, emergency response, act as central points for requesting help, coordinate information flows  Private Sector - owns most of CI  Continue to perform RA/RM, reassess  Help identify vulnerabilities of national concern

What’s Missing?  Anything non-terrorist  Natural disasters  Accidents  Focus on terrorist-based attacks, while timely, is short-sighted given the range of threats and vulnerabilities to CI