powered by powered by connecting organizations, building community michigan cyber range

43
Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range Michigan Cyber Range

Upload: kennedi-campbell

Post on 01-Apr-2015

218 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered byPowered by Connecting Organizations, Building Community

Michigan Cyber Michigan Cyber RangeRange

Michigan Cyber Michigan Cyber RangeRange

Page 2: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

IntroductionIntroduction

2

Page 3: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

IntroductionIntroduction

Dr. Joe Adams Vice President of Research and

Cyber Security 26 years Army Signal Corps Associate Professor at US Military

Academy 3 time winner of the NSA’s Inter-

Service Academy CDX Senior Member IEEE

3

Page 4: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

AgendaAgenda

Who am I? Where is the Threat? How am I at risk? How to prepare?

4

Page 5: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

Attack SurfaceAttack Surface

5

Page 6: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

Attack SurfaceAttack Surface

6

Page 7: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

Attack SurfaceAttack Surface

7

Page 8: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

Attack SurfaceAttack Surface

8

Page 9: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

Attack SurfaceAttack Surface

9

Page 10: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

Why is this so hard?Why is this so hard?

10

Page 11: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

PlansPlans

11

Page 12: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

The Price of Doing BusinessThe Price of Doing Business

12

Page 13: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by13

Page 14: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

Security TheaterSecurity Theater

14

Page 15: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

An Example of WhyAn Example of Why

15

Page 16: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

What can we do?What can we do?

16

Page 17: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

What has to be protected?What has to be protected?

17

Page 18: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

What can we monitor?What can we monitor?

18

Page 19: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

What is on its own?What is on its own?

19

Page 20: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

Make a planMake a plan

20

Page 21: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

PolicyPolicy

21

Page 22: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

Education and AwarenessEducation and Awareness

22

Page 23: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

The ResultThe Result

23

Page 24: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

But then…But then…

24

Page 25: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

Practice the planPractice the plan

25

Page 26: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

CommunicationCommunication

26

Page 27: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

Fight complacencyFight complacency

27

Page 28: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

Internal AuditsInternal Audits

28

Page 29: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

Build HabitsBuild Habits

29

Page 30: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

It only takes onceIt only takes once

30

Page 31: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

What we’ve talked aboutWhat we’ve talked about

31

Page 32: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

What we’ve talked aboutWhat we’ve talked about

32

Page 33: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

What we’ve talked aboutWhat we’ve talked about

33

Page 34: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

What we’ve talked aboutWhat we’ve talked about

34

Page 35: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

Skills training & maintenance

Classes Events Networking

Accessible

Persistent

Using the Cyber RangeUsing the Cyber Range

Page 36: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

ClassesClasses

17 Certifications Pen Testing, Incident Handling, Ethical Hacking Forensics Leadership Disaster Recovery

Classes held: At Merit or at the customer’s location Online

Cost includes: Tuition Certification Exam

http://www.merit.edu/cyberrange/courses.php

Page 37: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

Capture the FlagCapture the Flag

Self-Paced Threads of flags to find

Individual skills Penetration testing Forensics SCADA

Scoring engine Encourages competition

Page 38: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

Force on ForceForce on Force

Paintball Multiple teams; everyone for themselves Penetrate system, plant a flag, secure the system

Red vs Blue Focus on system & service

security and continuity Force on Force

Incident Response Asynchronous Red team creates havoc Blue team diagnoses and

recovers

Page 39: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

Welcome to AlphavilleWelcome to Alphaville

Page 40: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

AlphavilleAlphaville

Page 41: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

AlphavilleAlphaville

A persistent training environment A Network of Things More realistic than an IP range

Every exercise is a separate, customizable copy of the town and its infrastructure

Heterogeneous environment Wide variety of operating systems and services Residents of Alphaville provide “background noise” Bot nets, rootkits, and backdoors

Page 42: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

Flexible terms & pricing Pay for what you use

Voucher/Credit system

Using the Cyber RangeUsing the Cyber Range

Page 43: Powered by Powered by Connecting Organizations, Building Community Michigan Cyber Range

Powered by

Questions?Questions?

http://www.merit.edu/cyberrange/43