SlideShare a Scribd company logo
1 of 4
Mr. Curtis W. Dukes, Deputy National Manager
National Security Agency
THE STATE OF NATIONAL
SECURITY SYSTEMS
Connectivity Creates Significant Challenges
• We all share the same cyberspace; convergence has brought nearly
all networks together
• Even networks that are ostensibly “stand alone” have external
connections or dependencies
Cyber Defense is Largely Executed Individually
• Person by person, enterprise by enterprise
• This means that security is not consistent and systems are too
easy to exploit
It Pays to Invest in Defense
• Poor Cyber Hygiene played a pivotal role in recent costly, high-profile
cyber incidents
• We need to raise the basic level of security across the board.
Both security functionality across products and services, and
the security hygiene of connected systems
CURRENT CYBER TRENDS
INTRUSION LIFECYCLE
AND MITIGATIONS
Move Laterally
Collect, Exfil,
Destroy Data
Establish
Persistence
Install ToolsReconnaissance Initial Exploit
• Enable Anti-Exploitation
Features
• Take Advantage
of Software Improvements
• Secure Host Baseline
Collect target email addresses,
scan servers for vulnerabilities
Spear-phishing, water-holing,
exploit CVE, SQL injection,
exploit zero-day vulnerability, etc.
Privilege escalate on local computer; use “run
keys,” “scheduled tasks,” “services,” or other
persistence points on Windows computer
Backdoor implant or beacon for command
and control (C2) and download modules
Use public services (e.g., Google, Twitter,
Facebook) for C2
Collect administrative credentials from Group Policy scripts
or local machine using open source tools
Use pass-the-hash (PtH) and other methods to use stolen
credentials to spread to other computers
Search for more privileged credentials (e.g., Domain Admin)
to control entire network
• Implement Application
Whitelisting
• Implement Intrusion
Prevention System
• Offline Backups, Thin
Clients/Sandboxing
(Other)
• Use Anti-Virus File
Reputation Services
• Use DNS Reputation
Services
• Control Admin Privileges
• Limit Host –Host Comms
• Segregate Networks
Use SSL, Tor, BitTorrent, and other
encrypted anonymous protocols to
hide exfil traffic
Use drivers and special malware to
destroy data and render systems
unusable and unrecoverable
Protections provided by the NSA Top Ten Mitigations
& Host Mitigations Package
NSA TOP 10 MITIGATIONS AND HOST
MITIGATIONS PACKAGES

More Related Content

Viewers also liked

手機與加油的重要提示
手機與加油的重要提示手機與加油的重要提示
手機與加油的重要提示
honan4108
 
Zaragoza Turismo 19
Zaragoza Turismo 19Zaragoza Turismo 19
Zaragoza Turismo 19
Saucepolis blog & Hotel Sauce
 
交點高雄vol.7 - Morgan - 鬼島風雲錄
交點高雄vol.7 - Morgan - 鬼島風雲錄交點高雄vol.7 - Morgan - 鬼島風雲錄
交點高雄vol.7 - Morgan - 鬼島風雲錄
交點
 

Viewers also liked (9)

Hoofdstuk 4.
Hoofdstuk 4.Hoofdstuk 4.
Hoofdstuk 4.
 
Social Media Metrics
Social Media MetricsSocial Media Metrics
Social Media Metrics
 
手機與加油的重要提示
手機與加油的重要提示手機與加油的重要提示
手機與加油的重要提示
 
Zaragoza Turismo 19
Zaragoza Turismo 19Zaragoza Turismo 19
Zaragoza Turismo 19
 
November 15 cloud bees clusterhq meetup fli, flockerhub, and jenkins
November 15 cloud bees clusterhq meetup   fli, flockerhub, and jenkinsNovember 15 cloud bees clusterhq meetup   fli, flockerhub, and jenkins
November 15 cloud bees clusterhq meetup fli, flockerhub, and jenkins
 
Careers in design industry and anthropology
Careers in design industry and anthropologyCareers in design industry and anthropology
Careers in design industry and anthropology
 
Radical Management Preface Introduction Steve Denning
Radical Management Preface Introduction Steve DenningRadical Management Preface Introduction Steve Denning
Radical Management Preface Introduction Steve Denning
 
交點高雄vol.7 - Morgan - 鬼島風雲錄
交點高雄vol.7 - Morgan - 鬼島風雲錄交點高雄vol.7 - Morgan - 鬼島風雲錄
交點高雄vol.7 - Morgan - 鬼島風雲錄
 
Ældreudspil 2013
Ældreudspil 2013Ældreudspil 2013
Ældreudspil 2013
 

More from scoopnewsgroup

More from scoopnewsgroup (20)

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMA
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choice
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernization
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecture
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformation
 
IC Fireside Chat
IC Fireside ChatIC Fireside Chat
IC Fireside Chat
 
The Edge to AI
The Edge to AIThe Edge to AI
The Edge to AI
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happy
 
Opening Remarks
Opening RemarksOpening Remarks
Opening Remarks
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linux
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Age
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Government
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factory
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

The State of National Security Systems - Curtis Dukes

  • 1. Mr. Curtis W. Dukes, Deputy National Manager National Security Agency THE STATE OF NATIONAL SECURITY SYSTEMS
  • 2. Connectivity Creates Significant Challenges • We all share the same cyberspace; convergence has brought nearly all networks together • Even networks that are ostensibly “stand alone” have external connections or dependencies Cyber Defense is Largely Executed Individually • Person by person, enterprise by enterprise • This means that security is not consistent and systems are too easy to exploit It Pays to Invest in Defense • Poor Cyber Hygiene played a pivotal role in recent costly, high-profile cyber incidents • We need to raise the basic level of security across the board. Both security functionality across products and services, and the security hygiene of connected systems CURRENT CYBER TRENDS
  • 3. INTRUSION LIFECYCLE AND MITIGATIONS Move Laterally Collect, Exfil, Destroy Data Establish Persistence Install ToolsReconnaissance Initial Exploit • Enable Anti-Exploitation Features • Take Advantage of Software Improvements • Secure Host Baseline Collect target email addresses, scan servers for vulnerabilities Spear-phishing, water-holing, exploit CVE, SQL injection, exploit zero-day vulnerability, etc. Privilege escalate on local computer; use “run keys,” “scheduled tasks,” “services,” or other persistence points on Windows computer Backdoor implant or beacon for command and control (C2) and download modules Use public services (e.g., Google, Twitter, Facebook) for C2 Collect administrative credentials from Group Policy scripts or local machine using open source tools Use pass-the-hash (PtH) and other methods to use stolen credentials to spread to other computers Search for more privileged credentials (e.g., Domain Admin) to control entire network • Implement Application Whitelisting • Implement Intrusion Prevention System • Offline Backups, Thin Clients/Sandboxing (Other) • Use Anti-Virus File Reputation Services • Use DNS Reputation Services • Control Admin Privileges • Limit Host –Host Comms • Segregate Networks Use SSL, Tor, BitTorrent, and other encrypted anonymous protocols to hide exfil traffic Use drivers and special malware to destroy data and render systems unusable and unrecoverable Protections provided by the NSA Top Ten Mitigations & Host Mitigations Package
  • 4. NSA TOP 10 MITIGATIONS AND HOST MITIGATIONS PACKAGES

Editor's Notes

  1. Hi, my name is _____________, and I am here to talk about the Information Assurance mission at NSA.
  2. For those of you that are less familiar with the National Security Agency (NSA) and Information Assurance (IA) missions, let me share a little background. NSA has had the responsibility for executing two missions in support of National objectives, Signals Intelligence (SIGINT) and Information Assurance, for over 60 years. And, while we’re perhaps best known for our intelligence mission, the pendulum is swinging towards a renewed focus on cyber. (U) Our IA mission is to: Protect classified and military mission systems. Advise and support Federal Government customers Support the security of key private sector and infrastructure systems Now that cyberspace is the primary arena in which we protect information, our goal is to lead the Community in designing state of the art information assurance and cybersecurity solutions to secure the nation’s core mission environment against any and all evolving threats. NSA IA provides our customers with flexible, timely, and risk-sensitive security solutions, as well as traditional information assurance engineering and field support. We analyze current and future Department of Defense, Intelligence Community, Federal, and commercial information assurance requirements and gaps to deliver innovative solutions to secure information that crosses security, or community-of-interest, networks. We apply our unique expertise and capabilities to consume information from a variety of sources, characterize that information in a way that makes the data more understandable, and normalizing the data into concise mitigations, best practices, and strategies. We also conduct 24x7 information assurance operations, proactively hunting for sophisticated cyber adversaries within national security networks. Sufficiently novel or unexpected adversarial acts will sometimes succeed, therefore, classified networks should therefore undergo intermittent “hunts.” These advanced operations try to smoke-out intrusions that slipped through the cracks. Not only our these operations used to identify vulnerabilities, and then provide mitigation tactics, techniques and procedures to harden national security networks, but they can cause adversaries to temper their acts or even lose confidence in some techniques or other intrusions.   As part of NSA, we have a decisive advantage that the adversary and corporate America cannot access- the NSA SIGINT mission. We leverage the Agency’s SIGINT information to better identify, track, understand, and counter the adversaries, sometimes before they act against a network or system. This is a two-way street, since information we garner from executing the defensive mission can be shared with the SIGINT mission, and vice versa.
  3. Here is an example of how we map our capabilities and mitigations against a typical adversary lifecycle.
  4. Here is an example of how we map our capabilities and mitigations against a typical adversary lifecycle.