1  Carnegie Mellon University Protecting Information Infrastructures Rich Pethia Software Engineering Institute Carnegie Mellon University Pittsburgh,

Slides:



Advertisements
Similar presentations
1 Skilling Up for Patient-Centered E-Health E. Vance Wilson University of Wisconsin-Milwaukee.
Advertisements

© 2003 Carnegie Mellon University slide 1 Building CSIRT Capabilities and the State of the Practice Georgia Killcrece CSIRT Development Team CERT ® Training.
Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by the U.S. Department of Defense © 1998 by Carnegie Mellon.
CERT Centers, Software Engineering Institute Carnegie Mellon University Pittsburgh, PA SEI is sponsored by the U.S. Department of Defense ©
1  Carnegie Mellon University System Security and U. Rich Pethia Software Engineering Institute Carnegie Mellon University Pittsburgh, PA
HIPAA Security Standards What’s happening in your office?
1 Telstra in Confidence Managing Security for our Mobile Technology.
Security on the Internet: The Problem, Solutions and Perspectives Alain Patrick AINA Copyright, ECA, June 2006.
Security Controls – What Works
Legal and Ethical Issues in Computer Security
Or, How to Spend Your Weekends… Fall 2007 Agenda General Overview of the CISO Arena Technical Security Information Security Strategic Security Kirk Bailey.
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
STATE OF THE PRACTICE OF INTRUSION DETECTION TECHNOLOGIES Presented by Hap Huynh Based on content by SEI.
Stephen S. Yau CSE , Fall Security Strategies.
© 2003 by Carnegie Mellon University page 1 Information Security Risk Evaluation for Colleges and Universities Carol Woody Senior Technical Staff Software.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Join Our Research Efforts in CCAA to Improve Cybersecurity Robustness, Resiliency and Management in Enterprises Information Slides to Encourage Your Organization.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
The Internetworked E-Business Enterprise
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
SEC835 Database and Web application security Information Security Architecture.
Storage Security and Management: Security Framework
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Lessons Learned in Smart Grid Cyber Security
© 2007 Carnegie Mellon University Secure Coding Initiative Jason A. Rafail Monday, May 14 th, 2007.
PCI: As complicated as it sounds? Gerry Lawrence CTO
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
© 2001 by Carnegie Mellon University PSM-1 OCTAVE SM : Senior Management Briefing Software Engineering Institute Carnegie Mellon University Pittsburgh,
Putting a Face on Electronic Commerce Kathy Warden.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Computer & Internet Security Sean Lanham, CISSP - ISO University of Texas at Arlington Information Security Office.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Focus Group 1B Cybersecurity Dr. Bill Hancock, CISSP Cable and Wireless America FG1B Chair
Larry Clinton Operations Officer Internet Security Alliance
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Cyber Security Nevada Businesses Overview June, 2014.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Communications-Electronics Security Group. Excellence in Infosec.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Service Level Agreements Service Level Statements NO YES The process of negotiating and defining the levels of user service (service levels) required.
Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by the U.S. Department of Defense © 2000 by Carnegie Mellon.
CSCE 548 Secure Software Development Security Operations.
Marv Adams Chief Information Officer November 29, 2001.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
High Performance Research Network Dept. / Supercomputing Center 1 DDoS Detection and Response System NetWRAP : Running on KREONET Yoonjoo Kwon
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Carnegie Mellon University Software Engineering Institute Lecture 4 The Survivable Network Analysis Method: Evaluating Survivability of Critical Systems.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
1  Carnegie Mellon University Overview of the CERT/CC and the Survivable Systems Initiative Andrew P. Moore CERT Coordination Center.
CS457 Introduction to Information Security Systems
Building Global CSIRT Capabilities Barbara Laswell, Ph. D
Network Security (the Internet Security)
Critical Security Controls
Major Event Response Time Declining
Legal and Ethical Issues in Computer Security
Secure Coding Initiative
Joe, Larry, Josh, Susan, Mary, & Ken
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
Intrusion Detection system
Security week 1 Introductions Class website Syllabus review
Presentation transcript:

1  Carnegie Mellon University Protecting Information Infrastructures Rich Pethia Software Engineering Institute Carnegie Mellon University Pittsburgh, PA This work is sponsored by the U.S. Department of Defense.

2  Carnegie Mellon University Survivable Systems Initiative The SEI established, with DARPA sponsorship, the Computer Emergency Response Team Coordination Center in The CERT/CC’s mission is to respond to security emergencies on the Internet, serve as a focal point for reporting security vulnerabilities, serve as a model to help others establish incident response teams, and raise awareness of security issues.

3  Carnegie Mellon University Activity Since 1988, the CERT/CC has responded to over 18,000 security incidents that have affected over 220,000 Internet sites; has worked over 1200 reported vulnerabilities, and has issued 255 advisories and bulletins. In addition, the CERT/CC has helped foster the creation of over 80 other incident response teams.

4  Carnegie Mellon University Initiative Goal Ensure that appropriate technology, systems management practices, and supporting infrastructures are used to resist, recognize and recover from attacks on networked systems, to limit damage and to ensure continuity of critical services in spite of successful attacks.

5  Carnegie Mellon University Focus Areas CERT/CC: Foster global security incident response and coordination by facilitating the creation of a self-sustaining incident response infrastructure. Survivable Network Management: Establish the use of security monitoring and improvement practices and tools as routine practice by network service providers and major Internet sites.

6  Carnegie Mellon University Focus Areas - 2 Survivable Network Technology: Reduce security incidents caused by errors in software architecture, design, or implementation.

7  Carnegie Mellon University Initiative Strategies Repaired Systems Research Results Technology Evaluation Survivable Network Technology Survivable Network Management CERT Coordination Center Protected Systems Improved Systems

8  Carnegie Mellon University Why?

9  Carnegie Mellon University Networks Are Indispensable to Business Networked systems allow organizations to: conduct electronic commerce provide better customer service collaborate with partners reduce communications costs improve internal communication access needed information rapidly

10  Carnegie Mellon University The Problem In the rush to benefit from using networks, organizations often overlook significant security issues. The engineering practices and technology used by system providers are often not sufficient to prevent the fielding of systems vulnerable to attack Network and system operators do not always follow best practices that would prevent such attacks or minimize damage

11  Carnegie Mellon University The Risks While computer networks revolutionize the way you do business, the risks computer networks introduce can be fatal to a business. Network attacks lead to lost: money time products reputation lives sensitive information

12  Carnegie Mellon University Examples Increasing damage from attacks high technology bank robbery loss of intellectual property - $2M in one case extensive compromise of operational systems - 15,000 hour recovery operation in one case medical records tampering altering results of diagnostic tests compromising the integrity of CAT scan data extortion - demanding payments to avoid operational problems

13  Carnegie Mellon University Strain on System Administrators There is continued movement to complex,client-server and heterogeneous configurations with distributed management There is little evidence of security improvements in most products; new vulnerabilities are found routinely Comprehensive security solutions are lacking; current tools address only parts of the problem

14  Carnegie Mellon University Strain on System Administrators Engineering for ease of use has not been matched by engineering for ease of secure administration ease of use and increased utility are driving a dramatic explosion in use system administration and security administration are more difficult than a decade ago this growing gap brings increased vulnerability

15  Carnegie Mellon University Internet Growth BS and MS Degrees in Computer and Information Sciences ,000,000 50, Source: Digest of Education Statistics 1997, US Office of Educational Research and Improvement, Washington DC, publisher: US Superintendent of Document, 1997 Source: Internet Domain Survey by Network Wizards,

16  Carnegie Mellon University Yesterday’s Solutions Won’t Work in Today’s Systems Open, highly distributed systems Unknown perimeters No central administrative control No global visibility Unknown components (COTS, Java, etc.) Unknown participants Untrusted insiders Large-scale coordinated attacks

17  Carnegie Mellon University More Sophisticated Intruders Intruders are building technical knowledge and skills gaining leverage through automation exploiting network interconnections and moving easily through the infrastructure becoming more skilled at masking their behavior

18  Carnegie Mellon University Attack Sophistication vs. Intruder Technical Knowledge High Low password guessing self-replicating code password cracking exploiting known vulnerabilities disabling audits back doors hijacking sessions sweepers sniffers packet spoofing GUI automated probes/scans denial of service www attacks Tools Attackers Intruder Knowledge Attack Sophistication “stealth” / advanced scanning techniques burglaries network mgmt. diagnostics

19  Carnegie Mellon University Vulnerability Exploit Cycle Advanced Intruders Discover Vulnerability Crude Exploit Tools Distributed Novice Intruders Use Crude Exploit Tools Automated Scanning/Exploit Tools Developed Widespread Use of Automated Scanning/Exploit Tools Intruders Begin Using New Types of Exploits

20  Carnegie Mellon University So What?

21  Carnegie Mellon University Its going to get worse Explosive growth of the Internet continues continues to double in size every months where will all the capable system administrators come from? Market growth will drive vendors time to market, features, performance, cost are primary “invisible” quality features such as security are secondary

22  Carnegie Mellon University Its going to get worse More sensitive applications connected to the Internet low cost of communications, ease of connection, and power of products engineered for the Internet will drive out other forms of networking hunger for data and benefits of electronic interaction will continue to push widespread use of information technology

23  Carnegie Mellon University Its going to get worse The death of the firewall traditional approaches depend on complete administrative control and strong perimeter controls today’s business practices and wide area networks violate these basic principles -no central point of network control -more interconnections with customers, suppliers, partners -more network applications -“the network is the computer” -who’s an “insider”and who’s an “outsider”

24  Carnegie Mellon University Its going to get worse Beware of snake-oil the market for security products and services is growing faster than the supply of quality product and service providers an informed consumer base needs understanding, not just awareness sometimes the suppliers don’t understand either “if you want it badly, you’ll get it badly”

25  Carnegie Mellon University Before it gets better Strong market for security professionals will eventually drive graduate and certificate programs Increasing understanding by technology users will build demand for quality security products; vendors will pay attention to the market Insurance industry will provide incentives for improved business security practices

26  Carnegie Mellon University Before it gets better Technology will continue to improve and we will figure out how to use it encryption strong authentication survivable systems Increased collaboration across government and industry

27  Carnegie Mellon University CERT Contact Information 24-hour hotline: CERT personnel answer 8:30 a.m. — 8:00 p.m. EST(GMT-5) / EDT(GMT-4), and are on call for emergencies during other hours. Fax: Anonymous FTP archive: ftp://info.cert.org/pub/ Web site: Electronic US mail:CERT Coordination Center Software Engineering Institute Carnegie Mellon University 4500 Fifth Avenue Pittsburgh PA USA