cybersecurity 101 - truman...

26
Cybersecurity 101

Upload: others

Post on 23-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

Cybersecurity 101

Page 2: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

What  words  come  to  mind  when  you  hear  cybersecurity  cyber-­‐security    cyber  security?  

 

Page 3: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

The Internet enables…

3  

Page 4: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

Agenda I.  Threat  Landscape  

II.  Domes;c  Debate    

III.  Interna;onal  Challenges  

IV.  Simula;on  

Page 5: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

The Threat Landscape

§  Cyber  Space  &  Secur

ity  

Page 6: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

Not all cyber events are “attacks”

Cyber  Intrusion  (Access  &  Persistent  Access):      Cyber  Espionage/  ExploitaAon:      Cyber  ABack:    

 Break  In/Poten;al  to  Break  In  

 Spying  and/or  Stealing  

 Disrup;on  or  Destruc;on  

Page 7: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

Cyber Threat Matrix

7  

Na;on  States  

Organized  Crime  

Hacker  Groups  

Terrorist  Groups  

Lone  Hackers  

Page 8: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

Computer Network Attack (CNA) v. Computer Network Exploitation (CNE)

Capability  

Intent  

Page 9: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

CNE: Russia A  liMle  bit  “too  quiet?”  •  Nashi  •  Russian  Business  Network    U;liza;on:  •  Strategic  Espionage  •  Integrated  Military  Doctrine    Major  Events:  •  Estonia  (2007)  •  Georgia  (2008)  

 

Page 10: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

CNE: China

Prolific  Economic  Espionage  •  Comment  Crew/APT1/PLA  61398      U;liza;on:  •  Poli;cal  Intelligence  •  Military  Intelligence  •  Economic  Espionage  

Page 11: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

CNA: North Korea

Cost-­‐Effec;ve  Harassment  •  Reconnaissance  General  Bureau  •  DarkSeoul  Gang    Major  Events:  •  South  Korean  Banks    •  South  Korean  GPS  

Page 12: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

CNA: Iran Asymmetric  Capabili;es  •  Iranian  Cyber  Army  •  Iranian  Cyber  Police  Force  •  Cudng  Sword  of  Jus;ce  •  Al  Qassam    Major  Events:  •  Shamoon  •  Opera;on  Ababil  

Page 13: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

Syrian Electronic Army & Cyber Hizbollah Syrian  Electronic  Army  

§  Pro-­‐Assad  “Hack;vists”  §  Monitor  Syrian  Rebels  §  AMack  Western  Media  

Cyber  Hizbollah  

   §  Mobilize  &  Train  §  Spread  Doctrine  

Page 14: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

The Domestic Debate

§  Cyber  Space  &  Secur

ity  

Page 15: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

Should  companies  be  required  to  meet  certain  cybersecurity  standards?  

Page 16: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

2012/13: The Debate on the Hill

Two  Key  Elements  of  the  debate:  1.  Cri;cal  Infrastructure  2.  Informa;on  Sharing  

16  

Page 17: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

Critical Infrastructure Public  Health   Telecommunica;ons   Power  

Banks  Oil/Gas  

Transporta;on  

Water  Supply   Agriculture  

Page 18: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

Information Sharing

§  What  are  you  sharing?    

§  Who  are  you  sharing  it  with?  

§  What  can  it  be  used  for?  

 

Page 19: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

The Interest Groups Reduce  the  AMack  Surface  Create  a  Na;onal  Picture  

Anonymize  Info  Civilian  Agency  Clear  Defini;ons  

No  Mandates  Legal  Protec;on  

Na;onal  Security  Leaders  

Privacy  &  Civil  Liber;es  

Business  (Chamber  of  Commerce)  

Page 20: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

POTUS Responds: Executive Order

Page 21: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

Now What?

Page 22: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

International Challenges

§  Cyber  Space  &  Secur

ity  

Page 23: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

23  

Page 24: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

The Onion Router

Messages  are  encrypted  mulAple  Ames  from  delivery  to  receipt  

Page 25: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

TOR Stinks? YES  

NO  

Page 26: Cybersecurity 101 - Truman Projecttrumanproject.org/wp-content/uploads/2014/06/Cybersecurity-101.pdf · Not all cyber events are “attacks” CyberIntrusion(Access& PersistentAccess):

Truman Worldview