cybersecurity by the numbers

50
Cybersecurity by the #s Regulatory Internet Governance Symposium – Vanuatu 20 October 2016

Upload: apnic

Post on 15-Apr-2017

277 views

Category:

Internet


1 download

TRANSCRIPT

Page 1: Cybersecurity by the numbers

Cybersecurity by the #sRegulatory Internet Governance Symposium – Vanuatu

20 October 2016

Page 2: Cybersecurity by the numbers

Cybersecurity by the #sNetwork Security• A view from the logical

layer

• Network Security

• What are we up against?

• The cybersecurity ecosystem

CERT | CSIRT• Incident Response

• Coordination

• Information Sharing

• Building a CERT

• Components of a CERT/CSIRT

• The Road Forward

Page 3: Cybersecurity by the numbers

A view from the logical layer

https://www.icann.org/news/multimedia/1563

Page 4: Cybersecurity by the numbers

The fundamental challenge00101000 01101001 01101110 00101001 01110011 01100101 01100011 01110101 01110010 01101001 01110100 01111001 00100000 01100010 01111001 00100000 01100100 01100101 01110011 01101001 01100111 01101110

(in)Security by Design

https://blog.apnic.net/2015/07/07/mapping-the-internet-in-the-asia-pacific/

Page 5: Cybersecurity by the numbers

Confidentiality Integrity Availability

SE

CU

RIT

Y

prevents unauthorized

use or disclosure of information

safeguards the accuracy and

completeness of information

authorized users have reliable and timely access to

information

Goals of Information Security

Page 6: Cybersecurity by the numbers

Terms: Breaking it down

• Threat– Any circumstance or factor with the potential to cause harm– a motivated, capable adversary

• Vulnerability– A weakness in a system; in procedures, design, or implementation

that can be exploited• Software bugs, design flaws, operational mistakes

• Risk– The probability that a particular vulnerability will occur– The severity (impact) of that occurrence

= likelihood x consequences

Page 7: Cybersecurity by the numbers

Security tradeoffs

• Services offered vs. security provided– Each service offers its own security risk– The more services, the less security

• Ease of use vs. security– Every security mechanism causes inconvenience– The more “plug n play”, the less security

• Risk of loss vs. Cost of security – Assets carry value and risk of loss– The higher the value, the higher the security cost

• These factors can be balanced in a comprehensive security policy

Page 8: Cybersecurity by the numbers

What are we up against?

Page 9: Cybersecurity by the numbers

What can the attackers do?

• Eavesdropping – Listen in on communications

• Masquerading – Impersonating someone else

• Forgery – Invent or duplicate/replay information

• Trespass – Obtain unauthorised access

• Subversion – Modify data and messages in transit

• Destruction – Vandalise or delete important data

• Disruption – Disable or prevent access to services

• Infiltration – Hide out inside our machines

• Hijacking – “Own” and use machines for nefarious purposes

Page 10: Cybersecurity by the numbers

And why do they do it?

Motivation Examples

Knowledge driven • Recreational• Research

Issue-based • Hacktivism• Patriotism

Antisocial • Revenge• Vandalism

Competitive • Theft of IP• Damage to competitors

Criminal • Theft of assets• Extortion

Strategic • Espionage• State-driven or sponsored

Page 11: Cybersecurity by the numbers

And, how to they do it?

• Targeting the user– Masquerading– “Phishing”– DNS Cache Poisoning

• IP Address “spoofing”

• Disruption– DoS attacks– DDoS attacks

Page 12: Cybersecurity by the numbers

“Phishing”

• “Fishing” for information such as usernames, passwords, credit card details, other personal information

• Ex: Forged emails apparently from legitimate enterprises, direct users to forged websites.

Page 13: Cybersecurity by the numbers

DNS Cache Poisoning

The Internet

www.apnic.netwww.apnic.net?

www.apnic.net

199.43.0.44

DNS

175.98.98.133 203.119.102.244

199.43.0.44

☹︎

Page 14: Cybersecurity by the numbers

Securing websites – SSL certificates

The Internet

www.apnic.net

www.apnic.net?

203.119.102.244

DNS

175.98.98.133 203.119.102.244☺ SSL

Page 15: Cybersecurity by the numbers

Securing DNS – DNSSEC

The Internet

www.apnic.net

www.apnic.net?

DNS

175.98.98.133 203.119.102.244☺ 203.119.102.244

SEC

Page 16: Cybersecurity by the numbers

Misusing IP Addresses…

The InternetGlobal Routing Table

4.128/960.100/1660.100.0/20135.22/16…

Global Routing Table

4.128/960.100/1660.100.0/20135.22/16199.43.0.0/24 …

Announce199.43.0.0/24

R

202.12.29.0/24

Traffic199.43.0.0/24

☹︎

Page 17: Cybersecurity by the numbers

Misusing IP Addresses…

The InternetGlobal Routing Table

4.128/960.100/1660.100.0/20135.22/16…

Global Routing Table

4.128/960.100/1660.100.0/20135.22/16202.12.29.0/24…

Announce202.12.29.0/24

R

202.12.29.0/24RPKI

Page 18: Cybersecurity by the numbers

IP address spoofing

InternetISP

203.119.102.244

175.98.98.133

RequestSrc: 175.98.98.133Dst: 203.119.102.244

ResponseSrc: 203.119.102.244Dst: 175.98.98.133

Page 19: Cybersecurity by the numbers

IP address spoofing

InternetISP

203.119.102.244

175.98.98.133

ResponseSrc: 203.119.102.244Dst: 199.43.0.44

199.43.0.44

RequestSrc: 199.43.0.44Dst: 203.119.102.244

☹︎

Page 20: Cybersecurity by the numbers

DoS attack: Amplification

InternetISP

203.119.102.244

175.98.98.133

199.43.0.44

RequestSrc: 199.43.0.44Dst: 203.119.102.244

☹︎

ResponseSrc: 203.119.102.244Dst: 199.43.0.44

BIG PAYLOAD

RequestSrc: 199.43.0.44Dst: 203.119.102.244

RequestSrc: 199.43.0.44Dst: 203.119.102.244

RequestSrc: 199.43.0.44Dst: 203.119.102.244

RequestSrc: 199.43.0.44Dst: 203.119.102.244

ResponseSrc: 203.119.102.244Dst: 199.43.0.44

BIG PAYLOAD

ResponseSrc: 203.119.102.244Dst: 199.43.0.44

BIG PAYLOAD

ResponseSrc: 203.119.102.244Dst: 199.43.0.44

BIG PAYLOAD

ResponseSrc: 203.119.102.244Dst: 199.43.0.44

BIG PAYLOAD

Page 21: Cybersecurity by the numbers

Defeating IP spoofing – BCP38

InternetISP

203.119.102.244

175.98.98.133

BCP38 (2000) Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing

BCP38

ISP

RequestSrc: 199.43.0.44Dst: 203.119.102.244

Page 22: Cybersecurity by the numbers

DDoS attack: Distributed DoS

InternetISP

☹︎“Botnet”

Page 23: Cybersecurity by the numbers

Network Security In A Nutshell• Ensuring Confidentiality's, Integrity, Availability

• Building a risk management approach

• Implemented through cybersecurity program

C

I

A

• Security as a process

• Technology, people, and process

Page 24: Cybersecurity by the numbers

The Bigger Picture

Network & Information Security

Cybersecurity

Page 25: Cybersecurity by the numbers

Internet Security Ecosystem

Page 26: Cybersecurity by the numbers

Asia-PacificCERTs

incident response

coordination

info sharing

Page 27: Cybersecurity by the numbers

Asia-PacificCERTs

incident response

Page 28: Cybersecurity by the numbers

Incident ResponseSecurity Incident• A computer security incident is a violation or imminent threat of violation of

computer security policies, acceptable use policies, or standard security practices

• Examples:– An attacker commands a botnet to send high volumes of connection requests to a web

server, causing it to crash

– Users are tricked into opening a “quarterly report” sent via email that is actually malware; running the tool has infected their computers and established connections with an external host.

– An attacker obtains sensitive data and threatens that the details will be released publicly if the organization does not pay a designated sum of money.

(Source: NIST SP800-61Incident Handling Guide)

Page 29: Cybersecurity by the numbers

1. Preparation – Preparing to handle

Incidents – Preventing Incidents

2. Detection and Analysis Source: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf

Stages of Incident Handling

3. Containment, Eradication & Recovery

4. Post Incident Activities

Page 30: Cybersecurity by the numbers

Asia-PacificCERTs

incident response

coordination

Page 31: Cybersecurity by the numbers

Coordination

Source: NIST Computer Security Incident Handling Guide

Page 32: Cybersecurity by the numbers

Asia-PacificCERTs

incident response

coordination

info sharing

Page 33: Cybersecurity by the numbers

Information Sharing• Trusted Group

• Sharing of threat intelligence

• Co-ordinated Response

• Reach out to the community

Page 34: Cybersecurity by the numbers

Why a Team? • Dedicated resources for Incident Management

– Dedicated Service(s) – Human Resources – Specific Polices and SOPs – Expertise & Skillsets

• Structured Incident Management / Handling Procedures

• Integration with other activities Internal & External to the organization – SOC / IT – CERTs / ISACs etc

Page 35: Cybersecurity by the numbers

Building a- CERT- CSIRT

Page 36: Cybersecurity by the numbers

Defining a CSIRT …is a team that performs, coordinates, and supports the response to security incidents that involve sites within a defined constituency

• In ways which the specific community agrees to be in its general interest

• Team = Organization that does Incident Response (IR) work!

• Must react to reported security incidents or threat faced by the constituency

Page 37: Cybersecurity by the numbers

Defining a CSIRT …is a team that performs, coordinates, and supports the response to security incidents that involve sites within a defined constituency

• Mandate & Terms of Reference

• Defined Structure

• Operational Capacity

Page 38: Cybersecurity by the numbers

38

Components of a CERT/CSIRT

Page 39: Cybersecurity by the numbers

Constituency• Who is the Team meant to serve?

• Constituency help defines: – What is the purpose & nature of the CSIRT – Who is the CSIRT Serving– What types of security incidents the CSIRT handles – What are the relationship with other CSIRTs

• Constituencies might overlap – Co-ordination is key – CSIRT of the “Last Resort”

Page 40: Cybersecurity by the numbers

Different Types of CSIRTs• National CSIRTs • Coordination Centers • Analysis Centers • Enterprise CSIRTs• Vendor Teams • Incident Response Providers• Regional CERTs

Source: US-CERT https://www.cert.org/incident-management/csirt-development/csirt-faq.cfm

Page 41: Cybersecurity by the numbers

Policies & SOPs• Specific for Incident Response & Handling

• Definition of Security Incidents and Related Terms

• Define Scope, Roles & Responsibilities

• Sharing of Information within the organization or with external parties

• What to do in the event of a security incident– Specific SOP for dealing with different types of incidents – Forms, Templates, Required information– How to reach you outside office hours

• Dealing with Crisis – Escalation (Internal & External) – Dealing with the Media /Press

• Setting Realistic Expectations – Dealing with Service Providers

Page 42: Cybersecurity by the numbers

Team Structure• Team Models

– Central Incident Response Team – Distributed Incident Response Team – Co-ordination Team

• Functions / Workflow – Incident Reporting

• Report from internal or external

– Incident Analysis • What is happening, Impact, Patterns

– Incident Response • Containment, Eradication & Recovery • Post-Incident Activity / Recommendations

• How many people do we need in a team?

Page 43: Cybersecurity by the numbers

Services • Incident Handling & Response

– Core activity

• Advisory / Notification – Issue advisory relevant to constituency

• Education and Awareness– Promoting best practices – Policies and SOPs– Cyber Security Exercises

• Information Sharing – i.e. Global / Regional CSIRTs groups, ISACS

• Other Services– Reactive – Proactive – Security Quality Management

Page 44: Cybersecurity by the numbers

Types of Services Example * Enterprise CSIRT *

Proactive Services Reactive Services Security Quality Management Services

• Security Alerts • Security Reporting • Security Diagnosis• Monitoring of

Websites

• Vulnerability Handling • Incident Handling • Artifact Handling

• Security Consultation• Security Education • Security Training • Evaluation of

Technologies

Source: NTT-CERThttps://conference.apnic.net/data/39/150304_ntt-cert-activity_1425447986.pdf

Page 45: Cybersecurity by the numbers

Tools & Facilities• Basically two categories of tools

– Managing Incident Reports– Tools for analysis

• Handling & Managing Incidents Reported – Able to collect & store incidents reported – Track status, produce reports – Function of system can be mapped to SOP – Encryption tools for secure communication

• Security Incidents Monitoring & Analysis – Tools for processing or analyzing logs, binaries, network traffic – Forensics Tools – Tools for information sharing – Labs / Separate resources for analysis / testing – Tools in the Public domains (i.e. Passive DNS)

• Office / Work facilities – Secure room, Office facilities, etc

• Good Resource: FIRST Membership Site Visit: http://www.first.org/membership/site-visit-V1.0.pdf

Page 46: Cybersecurity by the numbers

Building Relationships• Internal

– Early buy-in from leadership and constituency– Costing

• The cost tends to vary based on a lot of factors

– Size of team – Services provided – Nature of Organisation

• Start Small

– Using open source tools– Scale up as capability and need grows

• External– Becoming of a part of a trusted community

• Attending Meetings / Conferences • Capacity Development (Training)

Page 47: Cybersecurity by the numbers

Asia-PacificCERTs

incident response

coordination

info sharing

Page 48: Cybersecurity by the numbers

Road Forward“Establishment of a National Computer Emergency Response Team (CERT) that is capable of dealing with relevant Cybersecurity threats for citizens, tourists, businesses and government in Vanuatu”

Page 49: Cybersecurity by the numbers

Lets stay engaged!

Klée AikenExternal Relations [email protected]

Adli Wahid Security Specialist FIRST Board [email protected]

Upcoming security engagements:

• APCERT Conference | Tokyo, JP• 24 to 27 Oct 2016

• NGN Forum | Suva, FJ• 1 to 3 Nov 2016

• Technical Assistance | Suva & Nadi, FJ• 24 to 26 Nov 2016

• PacNOG 19 | Nadi, FJ• 28 Nov to 2 Dec

Page 50: Cybersecurity by the numbers

Tankio tumas!Questions?