communications-electronics security group sniffing agent recruitment computer hacking password...

67
Communications-Electronics Security Group

Upload: nguyenkiet

Post on 21-Jun-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Communications-Electronics Security Group

Page 2: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Communications-ElectronicsSecurity Group

Excellence in Infosec

Page 3: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Information Assurance for UKGovernment

Internet, Intranet and ExtranetSecurity

Chairman - John DoodyHead of Infosec Customer Services Group

Page 4: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Agenda

• Introduction John Doody• GSI Connection and Accreditation Roger Griffin• BS7799 Application within DETR Terry Wells• GSI Procedures and BS7799

Introduction into the Home Office John Laskey• IAG and e-commerce in MOD John Peters• Panel discussion All

Page 5: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Introduction

John Doody

Page 6: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Government Secure Intranet

• Threats

• Risks

• Architecture

Page 7: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

The increasing need forinformation security

IncreasingThreats

from viruses,hackers, fraud,

espionage

IncreasingExposure

greater dependenceon IT, increasing

connectivity

IncreasingExpectations

from customers,partners, auditors,

regulators

Page 8: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Information Security BreachesSurvey 2000 (sponsored by DTI)

• UK e-commerce transactions in 1999 werevalued at c. £2.8bn

• This sum is projected to grow ten-fold over thenext 3 years

• 1 in 3 business in the UK currently buys or sellsover the Internet - or is intending to in the nearfuture

Page 9: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

• The cost of a single serious security breach canbe in excess of £100,000

• Over 60% of organisations sampled, hadsuffered a security breach in the last 2 years

• 1 in 5 organisations still does not take any formof security into account before buying andselling over the Internet

Waiting for the electronic Nemesis?

Page 10: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Worse to follow?

“By 2003, losses due to Internet security

vulnerabilities will exceed those incurred by

non-Internet credit card fraud”

GartnerGroup - May 1999

Page 11: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

The longer term?

“The 21st Century will be dominated byinformation wars and increased economic andfinancial espionage”

Alvin Toffler

Page 12: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Growing proliferation of hacking tools and know-howHigh

Low 1980 1985 1990 1995Source: US General Accounting

Office, May 1996

password guessing

password cracking

exploiting known vulnerabilities

backdoors

sniffers

stealth diagnostics

packet spoofing

Sophistication of Tools

Knowledge Required

Page 13: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

The world of information warfare

Espionage Sabotage

Deception

Eavesdropping

Networksniffing

Agentrecruitment

Computerhacking

Passwordcracking

Open source intelligence

“Denial-of-service” attacks

Computer viruses, worms,logic bombs

Electronicweapons

Informationblockades

Trojan horseprogramsPerception

management

Datamodification

Network or emailaddress spoofing

Hoaxemails

Social engineering

Page 14: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Key Principles

Partnership

Trust

Confidentiality

Page 15: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Availability

The world of information security

Encryption

Platformsecurity

Personnel security

Monitoring &intrusion detection

Passwordmanagement

Physicalsecurity

Infrastructure securitymanagement

Business continuitymanagement

Fallbackplanning

Virus prevention & detection

Certificate registration& management

Penetration testing

Authentication &access control

Incident response &crisis management

RiskmanagementFirewall & connectivity

management

Securityarchitecture

Confidentiality

Integrity

Page 16: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

UK Modernising GovernmentInitiative

• All policy making Government Departmentsconnected and conducting businesselectronically by 2002

• All Transactions within Government and to thethe Citizen conducted electronically by 2005

• Civilian Access to government achieved viaelectronic kiosks and digital TV

• Access into Government via a Portal by the useof Smartcards

Page 17: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Government Secure Intranet (GSI)

• Infrastructure for “Open” Government - baselinefor future connectivity (Modernising Government)

• Initiative started 1996• Connect all Central Government Departments by

end of 1999 (3 did not make it - 70 did)• 100% of Government /Citizen business by

electronic means - 2005• Now available as Managed Service

Page 18: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Business Drivers

• Better Internal Communications• Better Access by External Bodies• Centralised Management

– Reduce Costs• resources

• transport

• time

– Enhanced Service Quality

• Commitment to Electronic Business• Public connectivity

Page 19: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

xGSI System Architecture

GSI Central BearerNetwork

(RESTRICTED High)

Dept(R)

Department(CONFIDENTIAL)

INTERNET(Hostile)

F/W

IP Crypto

FirewallDepartment(RESTRICTED)

Department(CONFIDENTIAL)

IP Crypto

IP Crypto

Mail Relay

Management Centre

Page 20: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Interoperability: HMG Root

Portal

TSP

HMGRoot

Dept A Dept B Dept C Dept D

Page 21: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Communications-Electronics Security Group

Page 22: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Accreditation and Connectionof CMPS to GSI

By

Dr Roger M Griffin

Page 23: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Agenda

• CMPS.

• The System.

• Accreditation Issues.

• On-going Activities.

Page 24: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

CMPS

• Integration of Civil Service Collegeinto the Cabinet Office within CMPS.

• HMG corporate reform programmeand wider Modernisation agenda.

• Opportunity to benefit from increasedinvestment.

• Projecting a powerful “joined-up”image.

• Use of GSI in knowledge sharing.

Page 25: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

The System

• Based on servers running WindowsNT Server Version 4, SP 4.

• PC clients running Windows NTWorkstation v 4, SP 4.

• ISDN links to Edinburgh andGlasgow offices.

• 2Mb dedicated line betweenSunningdale and London.

Page 26: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Sunningdale System Diagram

Page 27: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Accreditation Issues

• Approach to accreditation.

• Application to connect to GSI:– Community Security Policy.

• Security documentation:– System Security Policy.

– Security Operating Procedures.

– Laptop policy.

– Contingency plan.

Page 28: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

• Personnel issues:– Security culture.

– Clearance policy.

– College staff and associates.

– Account creation.

– Visitors, students (UK and overseas).

Accreditation Issues

Page 29: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

• Physical security aspects:– Access tokens.

– Intruder detection systems.

– CCTV.

Accreditation Issues

Page 30: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

• Network security issues:– RAS users.

– Password generators.

– Security modems.

– Separate unclassified network.

– Firewall options.

– Password screen saver.

– Audit processes.

Accreditation Issues

Page 31: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Future Developments

• Use of GSI security features to establish:– Electronic booking system for course places.

– Course fee /credit transfer facility.

• Extension of CMPS training activities viae-commerce.

Page 32: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Benefits and Conclusions

• Development of an e-strategy to addressenhanced training opportunities.

• Improved CMPS network security andfunctionality.

• Better support for HMG initiatives.

• A highly successful process gainingaccreditation for GSI connection on 11May 2000.

Page 33: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,
Page 34: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Communications-Electronics Security Group

Page 35: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

BS 7799The British Standard for

Information Security ManagementApplication within DETR

BS 7799The British Standard for

Information Security ManagementApplication within DETR

Terry Wells IT Security OfficerDepartment of the Environment, Transport, and the Regions

[email protected] www.detr.gov.uk

Terry Wells IT Security OfficerDepartment of the Environment, Transport, and the Regions

[email protected] www.detr.gov.uk

Page 36: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

• The Standard - origins & development

• UK Government initiative

• DETR’s experience

• the future

• The Standard - origins & development

• UK Government initiative

• DETR’s experience

• the future

IntroductionIntroduction

Page 37: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

The Standard - Part 1The Standard - Part 1

• Information security - not just IT security

• a code of practice

• best advice, guidance, voluntary

• approach and coverage

• Information security - not just IT security

• a code of practice

• best advice, guidance, voluntary

• approach and coverage

Page 38: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

The Standard - Part 2The Standard - Part 2

• How to manage it in an organisation

• not a rigid set of technical measures

• risk assessment is the driver

• organisations set their own scope

• How to manage it in an organisation

• not a rigid set of technical measures

• risk assessment is the driver

• organisations set their own scope

Page 39: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Certification Scheme (UK)Certification Scheme (UK)

• called “C:cure”

• accredited auditors

• three-year certificates

• initial audit, then six-monthly checks

• called “C:cure”

• accredited auditors

• three-year certificates

• initial audit, then six-monthly checks

Page 40: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

UK Government initiativeUK Government initiative

• Cabinet Office driving it

• common auditable standard

• Manual of Protective Security updated

• Departments now planning for compliance

• Cabinet Office driving it

• common auditable standard

• Manual of Protective Security updated

• Departments now planning for compliance

Page 41: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

DETR’s experienceDETR’s experience

• appointed a ‘Departmental Champion’

• established an ‘Action Group’

• identified ‘Key Systems’

• commissioned an initial ‘Gap Analysis’

• appointed a ‘Departmental Champion’

• established an ‘Action Group’

• identified ‘Key Systems’

• commissioned an initial ‘Gap Analysis’

Page 42: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Lessons learnt so farLessons learnt so far

• need more, and fuller, documentation

• need greater awareness among staff

• need to improve co-ordination

• need more, and fuller, documentation

• need greater awareness among staff

• need to improve co-ordination

Page 43: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

The futureThe future

• work toward compliance in key systems

• maintain compliance once achieved

• review new and changed processes

• consider ‘stepping up’ to certification

• work toward compliance in key systems

• maintain compliance once achieved

• review new and changed processes

• consider ‘stepping up’ to certification

Page 44: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Communications-Electronics Security Group

Page 45: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

GSI Procedures and BS7799 Introductioninto the Home Office

• John Laskey• Home Office, Departmental Security Unit

(DSU), London

• email: [email protected]

Page 46: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Offices throughout Great Britain andNorthern Ireland

Headquarters

• Criminal Justice

• Constitutionalpolicy

• Policing policy

• Fire/EmergencyPlanning

Major Agencies

• Prisons: policy &management

• Immigration control

• Passport issue

• Forensic Science

Page 47: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Until recently, many Home OfficeUntil recently, many Home Officestaff hadstaff had...

• no access to network facilities;

• differing systems/protocols;

• no access to Internet facilities:

..new approaches were needed

Page 48: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

New Approaches to IT

• New networks, to be built from COTSproducts

• Links to the Government Secure Intranet(GSI) which would:

• give access to Internet browsing/email;

• provide secure (i.e. RESTRICTED) emailfacilities to other GSI users.

Page 49: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

New Network/GSI Projects:How DSU Helped

• Accrediting the new core network toRESTRICTED (i.e. = U.S. ‘S.B.U’) level

• ‘Selling’ Infosec back to key IT players as‘business enabling’

• Recommending changes through ouraccreditation inspections

• Enlisting the support of top managers to endestablished - but insecure - practices

Page 50: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Balancing Security & Functionality

• Agreeing initial restrictions on browsingrights

• Prohibiting use of certain ‘mobile codes’(e.g. Active X, Java Script)

• Conservative approaches did restrictfunctionality - debates with senior users!

• New standard approaches to security a goodrehearsal for BS7799 implementationBS7799 implementation

Page 51: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

BS 7799 - Business Functions tobe Investigated

• IT security policy

• IT system administration & use

• Physical security

• Accommodation

• Personnel management

• Personnel security

• Business continuity planning

• Staff training & security awareness

Page 52: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

BS 7799 Action Plan #1• June 2000 - determine essential areas

for compliance - a work plan for aconsultant

• July 2000 - senior ‘champion’convenes BS7799 steering group

• September 2000 - consultant reportsto DSU

• October/November 2000 - steeringgroup agrees detailed plans for fullimplementation

• December 2000 - final report to the‘champion’/central government

Page 53: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

BS7799 Action Plan #2

Gap Analysis

Independent ConsultancyReporting on

Main business areas/key processes

BS7799 Facilitator

Departmental Security OfficerHead of DSU

BS7799

Project TeamsConsidering all aspects of security compliance

Wide range of disciplines

BS7799

Co-ordination GroupMembers from throughout the Home Office

Senior Home Office Manager

'BS7799 Champion'

UK Government

Cabinet OfficeOverseeing BS7799 implementation across UK government

Page 54: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Conclusions• Home Office a traditional department

• Much work yet to be done in developingsecure IT practices for all of its parts

• GSI and BS7799 are cornerstones of a moreeffective approach to security

Page 55: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Communications-Electronics Security Group

Page 56: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

SHAREDENVIRONMENTSInternet, Intranet and Others

John PetersMinistry of Defence (UK)

UNCLASSIFIED

Directorate of Security (Policy)DSy(Pol)

MOD

FILENAME: NISSC 00© Crown Copyright 1996-9. All Rights Reserved.FILENAME: NISSC 00© Crown Copyright 1996-9. All Rights Reserved.

Output: 30-Jun-00Slide: 1 of 10

Author: Sy(Pol)2aUNCLASSIFIED

Page 57: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

SMART PROCUREMENT

Shorten TimescalesFaster, Better, CheaperIntegrated Project Teams

UNCLASSIFIED

Directorate of Security (Policy)DSy(Pol)

MOD

FILENAME: NISSC 00© Crown Copyright 1996-9. All Rights Reserved.FILENAME: NISSC 00© Crown Copyright 1996-9. All Rights Reserved.

Output: Slide: 2 of 10

Author: Sy(Pol)2aUNCLASSIFIED

Page 58: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

INTEGRATED PROJECT TEAMS

UserLogisticScientificProcurementIndustry

UNCLASSIFIED

Directorate of Security (Policy)DSy(Pol)

MOD

FILENAME: NISSC 00© Crown Copyright 1996-9. All Rights Reserved.FILENAME: NISSC 00© Crown Copyright 1996-9. All Rights Reserved.

Output: Slide: 3 of 10

Author: Sy(Pol)2aUNCLASSIFIED

Page 59: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

SHARED DATA ENVIRONMENTS

Project SpecificBusiness to BusinessCustomersPrime ContractorSub-Contractors

UNCLASSIFIED

Directorate of Security (Policy)DSy(Pol)

MOD

FILENAME: NISSC 00© Crown Copyright 1996-9. All Rights Reserved.FILENAME: NISSC 00© Crown Copyright 1996-9. All Rights Reserved.

Output: Slide: 4 of 10

Author: Sy(Pol)2aUNCLASSIFIED

Page 60: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

SHARED DATA ENVIRONMENTSInformation Requirements

Programme DataProduct DataDesignManufactureSupport

UNCLASSIFIED

Directorate of Security (Policy)DSy(Pol)

MOD

FILENAME: NISSC 00© Crown Copyright 1996-9. All Rights Reserved.FILENAME: NISSC 00© Crown Copyright 1996-9. All Rights Reserved.

Output: Slide: 5 of 10

Author: Sy(Pol)2aUNCLASSIFIED

Page 61: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

SECURITY ISSUES

• System High• RESTRICTED• Boundaries• Accreditation• Management• Compliance

UNCLASSIFIED

Directorate of Security (Policy)DSy(Pol)

MOD

FILENAME: NISSC 00© Crown Copyright 1996-9. All Rights Reserved.FILENAME: NISSC 00© Crown Copyright 1996-9. All Rights Reserved.

Output: Slide: 6 of 10

Author: Sy(Pol)2aUNCLASSIFIED

Page 62: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

DEFENCE E-COMMERCESERVICE

Bridge to SuppliersTrading IntermediaryE-mailWeb BrowsingDial-in

UNCLASSIFIED

Directorate of Security (Policy)DSy(Pol)

MOD

FILENAME: NISSC 00© Crown Copyright 1996-9. All Rights Reserved.FILENAME: NISSC 00© Crown Copyright 1996-9. All Rights Reserved.

Output: Slide: 7 of 10

Author: Sy(Pol)2aUNCLASSIFIED

Page 63: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

DOMAINS AND COMMUNITIES

• MOD• Trading• Procurement• Suppliers• Internet• VAN

UNCLASSIFIED

Directorate of Security (Policy)DSy(Pol)

MOD

FILENAME: NISSC 00© Crown Copyright 1996-9. All Rights Reserved.FILENAME: NISSC 00© Crown Copyright 1996-9. All Rights Reserved.

Output: Slide: 8 of 10

Author: Sy(Pol)2aUNCLASSIFIED

Page 64: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

INTERNATIONALCOLLABORATION

CoalitionsShared Information SystemsNational Affiliated SystemsCommon Accreditation Process

UNCLASSIFIED

Directorate of Security (Policy)DSy(Pol)

MOD

FILENAME: NISSC 00© Crown Copyright 1996-9. All Rights Reserved.FILENAME: NISSC 00© Crown Copyright 1996-9. All Rights Reserved.

Output: Slide: 9 of 10

Author: Sy(Pol)2aUNCLASSIFIED

Page 65: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

MULTINATIONALMULTINATIONALSYSTEMSSYSTEMS

Security Management PolicyEvaluationCertificationAccreditation

UNCLASSIFIED

Directorate of Security (Policy)DSy(Pol)

MOD

FILENAME: NISSC 00© Crown Copyright 1996-9. All Rights Reserved.FILENAME: NISSC 00© Crown Copyright 1996-9. All Rights Reserved.

Output: Slide: 10 of 10

Author: Sy(Pol)2aUNCLASSIFIED

Page 66: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Communications-Electronics Security Group

Page 67: Communications-Electronics Security Group sniffing Agent recruitment Computer hacking Password cracking Open source intelligence “Denial-of-service” attacks Computer viruses, worms,

Panel Discussion