1 / 34

Cyber Security / Cyber Warfare Hype or underestimated?

Cyber Security / Cyber Warfare Hype or underestimated?. Bert Oltmans Director Defence, Justice and Public Safety CEE&CIS Region. Agenda. Current Environment Facts & Figures Cyber Security in Defense. A Definition.

merton
Télécharger la présentation

Cyber Security / Cyber Warfare Hype or underestimated?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Security / Cyber WarfareHype or underestimated? Bert Oltmans Director Defence, Justice and Public Safety CEE&CIS Region

  2. Agenda • Current Environment • Facts & Figures • Cyber Security in Defense

  3. A Definition Cyber Security is an extension of traditional IT security that protects applications and data connected to the internet and exposed to attack, including offensive (cyber warfare) as well as defensive and proactive security measures.

  4. Threat Environment • Cyber Warfare is a reality • And many incidents more…and growing

  5. The Battlefield TodayThe network is the battlefield JXTATM Overlay Peer-to-Peer Network SensorGrid Virtual Mapping Internet SCF / Field Command • The network has become the battlefield • Used for Communications, collaboration, decision support, simulation and modeling • Provides content delivery & information sharing

  6. The Warfighter Challenge NATO Doctrine: • Network Centric Operations require a “Share-to-Win” attitude • Cyber Security Policies mandate a “need to know” strategy

  7. The Transformation in Defense • Cyber Security is becoming a Nationalconcern • US Cyber Command (USCYBERCOM) created on May 21, 2010 • “The admiral said he believes a cyber attack could trigger a response in accordance with Article 5 of the NATO Charter, which states that an attack on any alliance member is an attack on all alliance members” Navy Adm. James G. Stavridis, 29 November 2010 – Time Interview

  8. Regional Cyberspace 2010 Data Breach Investigations Report

  9. Role of Governments • Increased importance of National Entities like CERT’s to monitor the Nation’s Critical Infrastructures and provide guidance

  10. Facts & Figures

  11. Amount of Data in Databases Doubles Yearly Two Thirds of Sensitive and Regulated Data Resides in Databases… 1,800 Exabytes 2011 Source: IDC, 2008

  12. Over 900M Breached Records Resulted from Compromised Database Servers 2010 Data Breach Investigations Report

  13. How do Database Breaches Occur?Bad Guys Exploit Your Weaknesses! 48% involved privilege misuse 40% resulted from hacking 38% utilized malware 28% employed social tactics 15% comprised physical attacks 2010 Data Breach Investigations Report

  14. Cyber Security in DefenseSome thoughts • Design/Procure Information Systems geared to Threat Environment (including Cyberspace) • Treat Information Technology as Mission Critical – not - Mission Enabling • Have Policies and Doctrines that acknowledge Cyber Warfare

  15. Information Systems in CyberspaceIt starts with a secure product A model for continuous improvement… (Ref.: “PDCA Cycle”, originally developed by Walter A. Shewhart; Sometime referred as Deming Cycle.)

  16. CYBERSPACE Information Systems in CyberspaceAnd a Secure Implementation PEOPLE PROCESSES TECHNOLOGY

  17. Software Security End User Perspectives Vendor patch issuance practices are most visible with customers, … BUT… Producing secure software requires • Focused attention as early as the design phase • Ongoing commitment throughout the entire development and pre-release phases • Effective remediation procedures

  18. Make IT Mission Critical Include Deployment and Support • User Management • Strong Authentication • Fine-grained Authorizations • Access Control • Controlling Privileged Users • Custom Security Policies • RBAC & LBAC Implementation Core Platform Security • Monitoring • Enterprise-Wide Auditing • Configuration • Data Protection • Network Encryption • Data Encryption • Backup Encryption • Secure Operating Environment • Multi-Level Security • Fault Tolerance • Ubiquitous Support

  19. Policies & Doctrines • Cover Defensive and Offensive measures • Implement down to single combat unit

  20. JICPAC Supports Coalition Forces with Access to Secure Information • OVERVIEW • Joint Intelligence Center of the Pacific (JICPAC) is located within the US Pacific Command (PACOM) Pearl Harbor, HI • SOLUTIONS • JICPAC Trusted Workstation (TWS): • SunRay Ultra-thin client • Trusted Extensions for Solaris • CC EAL4 Certification on NEBS-certified Sun Servers • RESULTS • Reduced acquisition costs and power consumption through the consolidation of multiple PC clients into a single Sun Ray ultra-thin client • Improved end-user operational efficiencies in the secure information workflows with complete audit trails through simultaneous connection to multiple networks • Compatible with existing applications since they run in a Solaris open environment • CHALLENGES / OPPORTUNITIES • Security was preserved through air-gap networks (entirely disconnected) yet analyst required multiple networks and therefore 1 to 1 mapping of multiple desktop clients creating clutter and manual process • Logging of audit trails was mostly on the “honor-system” with manual documentation • Local clients meant far more maintenance and chance for degradation of information assurance levels

  21. Albanian MoD Safeguards Classified Data to Prepare for NATO Accession • OVERVIEW • Agency responsible for implementing the govt’s defense & foreign policy objectives, & protecting the security of 3.6 million Albanian people • Industry: Public Sector • Employees: 500 CUSTOMER PERSPECTIVE “Oracle’s unbreakable security platform enables us to guarantee the integrity of sensitive defense data without impeding access to it by authorized personnel. We now have our data consolidated on a secure, scalable platform - enabling us to prepare for the accession to NATO.” Genci Kokoshi, Chief of Information Technology • CHALLENGES / OPPORTUNITIES • Consolidate all structured and unstructured classified data on a secure, scalable, electronic platform prior to the April 2009 accession to the North Atlantic Treaty Organization (NATO) • Enforce the highest internationally recognized standards for providing & auditing authorized access to classified Ministry of Defense (MoD) information • Protect the integrity of sensitive military documents relating to Albania’s role in NATO operations assurance levels • RESULTS • Provided a secure Web-based data storage platform to create and publish classified content • Offered 100 users a single sign on and secure, seamless access to job-appropriate data • Enabled the organization to set up user accounts in only a few hours • SOLUTIONS • Oracle Universal Content Management • Oracle Identity Management • Oracle Virtual Directory • Oracle Access Manager

  22. For More Information oracle.com/database/security search.oracle.com database security

  23. Q & A bert.oltmans@oracle.com

  24. Disk Backups Exports Off-Site Facilities Oracle Advanced SecurityProtect Data from Unauthorized Users Application • Complete encryption for application data at rest to prevent direct access to data stored in database files, on tape, exports, etc. by IT Staff/OS users • Efficient application data encryption without application changes • Built-in two-tier key management for SoD with support for centralized key management using HSM/KMS • Strong authentication of database users for greater identity assurance

  25. Oracle Database VaultEnforce Security Policies Inside the Database SecurityDBA Application DBA Procurement Application HR Finance select * from finance.customers DBA • Automatic and customizable DBA separation of duties and protective realms • Enforce who, where, when, and how using rules and factors • Enforce least privilege for privileged database users • Prevent application by-pass and enforce enterprise data governance • Securely consolidate application data or enable multi-tenant data management

  26. Policies HR Data ! Alerts CRM Data Built-in Reports ERP Data Custom Reports Databases Oracle Audit VaultAudit Database Activity in Real-Time Audit Data Auditor • Consolidate database audit trail into secure centralized repository • Detect and alert on suspicious activities, including privileged users • Out-of-the box compliance reports for SOX, PCI, and other regulations • E.g., privileged user audit, entitlements, failed logins, regulated data changes • Streamline audits with report generation, notification, attestation, archiving, etc.

  27. Oracle Total RecallTrack Changes to Sensitive Data select salary from emp AS OF TIMESTAMP '02-MAY-09 12.00 AM‘ where emp.title = ‘admin’ • Transparently track application data changes over time • Efficient, tamper-resistant storage of archives in the database • Real-time access to historical application data using SQL • Simplified incident forensics and recovery

  28. Oracle Database FirewallFirst Line of Defense Allow Log Alert Substitute Applications Block Built-in Reports Custom Reports Alerts Policies • Monitor database activity to prevent unauthorized database access, SQL injections, privilege or role escalation, illegal access to sensitive data, etc. • Highly accurate SQL grammar based analysis without costly false positives • Flexible SQL level enforcement options based on white lists and black lists • Scalable architecture provides enterprise performance in all deployment modes • Built-in and custom compliance reports for SOX, PCI, and other regulations

  29. Oracle Configuration ManagementSecure Your Database Environment Monitor Discover Classify Assess Prioritize Fix Monitor ConfigurationManagement & Audit AssetManagement PolicyManagement Vulnerability Management Analysis & Analytics • Discover and classify databases into policy groups • Scan databases against 400+ best practices and industry standards, custom enterprise-specific configuration policies • Detect and event prevent unauthorized database configuration changes • Change management dashboards and compliance reports

  30. Oracle Data MaskingIrreversibly De-Identify Data for Non-Production Use Production Non-Production Data never leaves Database • Make application data securely available in non-production environments • Prevent application developers and testers from seeing production data • Extensible template library and policies for data masking automation • Referential integrity automatically preserved so applications continue to work

  31. Oracle Database Defense In Depth • Oracle Advanced Security • Oracle Identity Management • Oracle Database Vault • Oracle Label Security • Oracle Audit Vault • Oracle Total Recall • Oracle Database Firewall • Oracle Configuration Management • Oracle Data Masking Data Masking Secure Configuration Monitoring and Blocking Auditing Authorization Authentication Encryption Data

More Related