Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions May 16, 2015 DRAFT1.

Similar presentations


Presentation on theme: "Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions May 16, 2015 DRAFT1."— Presentation transcript:

1 Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions May 16, 2015 DRAFT1 Chapter 14: Cyber Warfare: An Architecture for Deterrence

2 Introduction to Cyber Warfare and Cyber Deterrence Over 120 countries are actively conducting cyber operations, primarily espionage It is estimated that the Chinese have over 100,000 activity duty cyber warriors, and over independent 80,000 hackers, who often carry out mission in the national interest As stated in CNCI #10, cyber deterrence is a “strategy that will deter interference and attack in cyberspace… and developing appropriate responses by both state and non-state actors.” 5/16/2015 DRAFT2 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

3 Methodology and Assumptions Cyber deterrence is a cutting edge research problem, a very difficult one, in particular because attributing cyber activities is so difficult due to the technology This research approach considers: –National Security Goals –Cyber Warfare Laws & Treaties –Strategic Functions –Solutions Architecture for Cyber Deterrence –Technical Functions 5/16/2015 DRAFT3 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

4 Methodology & Assumptions 2 5/16/2015 DRAFT4 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

5 Cyber Deterrence Challenges Assigning attribution –Internet technology makes it relatively easy to misdirect attribution to other parties Unpredictability of cyber attack impacts Potential damage due to counter- retaliation Nation states, non-state actors, and individuals are at a peer level, all capable of waging attacks No clear legal framework exists 5/16/2015 DRAFT5 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

6 Legal and Treaty Assumptions Legality of cyber operations should be clarified in national and international treaties (allowing for non-disclosure) Monitoring of suspected remote servers should be allowed,and attacked if they are non-life- critical, because servers used for attack may belong to unaware 3 rd parties Use of 3 rd party servers should be defined unlawful according to the laws of war International investigations should be enabled 5/16/2015 DRAFT6 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

7 5/16/2015 DRAFT7 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions Cyber Deterrence Strategy Used in the book With permission from The RAND Corporation [Libicki 2010]

8 Cyber Deterrence Retaliation Probabilities (Sample) 5/16/2015 DRAFT8 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions Used in the book With permission from The RAND Corporation [Libicki 2010]

9 Reference Model 5/16/2015 DRAFT9 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

10 Attacker Conceptual Architecture 5/16/2015 DRAFT10 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

11 Conceptual Application Architecture: Rapid Attribution 5/16/2015 DRAFT11 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

12 Conceptual Information Architecture: Sample Record RECORD: 1 {'IPv4 Address': '173.201.21.161', 'FTP Open on Port': '21', 'RDP Open on Port': '3389', 'Ping Response':'Alive', 'Attack Organization': 'Aurora', 'Attack Role': 'Control Server'} RECORD: 2 {'IPv4 Address': '69.164.192.46', 'Ping Response':'Alive', 'Attack Organization': 'Aurora', 'Attack Role': 'Control Server'} RECORD: 3 {'IPv4 Address': '168.95.1.1', 'Ping Response':'Alive', 'Attack Organization': 'Aurora', 'Attack Role': 'Control Server'} RECORD: 4 {'IPv4 Address': '203.69.66.1', 'Ping Response':'Alive', 'Attack Organization': 'Aurora', 'Attack Role': 'Control Server’} 5/16/2015 DRAFT12 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

13 Architectural Prototypes Bot with Threaded Scanning Botnet with Distributed Scanning 5/16/2015 DRAFT13 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions Performance ActualsPerformance Projected

14 REVIEW CHAPTER SUMMARY Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions 5/16/2015 DRAFT14


Download ppt "Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions May 16, 2015 DRAFT1."

Similar presentations


Ads by Google